Comparative Analysis of Classless and Classful IPv4 Addressing Schemes
VerifiedAdded on 2025/04/08
|6
|1454
|102
AI Summary
Desklib provides past papers and solved assignments for students. This report compares classless and classful IPv4 addressing.

Assignment-2
1
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1.
Classless IPv4 Classful IPv4
The classless addressing does not support
any class concept.
The classful addressing contains five class
such as class A, B, C, D, E.
It allows the VLSM and variable length
subnet mask method for updating the
routing information.
All the devices in the network will have to
use the same subnet mask. And also it does
not provide the subnet information in the
routing updates
There is no concept of the network id and
host id.
The IP address and subnet mask are divided
into two host id and the network id.
2.
The class A addressing store a large amount of IP address so when the organisation take
the IP address from the class A it gets wasted as the subnet of class A has the 24 bit
which can server almost 17 million devices individually therefore a huge number of IP
get wasted when the company uses the class A addressing. When we come to class C it
contains a limited amount of the IP address, therefore, the medium or large company
does not want to use the class C addressing only the small organisation preferred taking
the class C addressing as their requirement is less.
3.
The IPv4 has the 32-bit address which contains both host and the network address. So to
differentiate between the host address and the network address we used the concept of
the mask which is known as subnet mask which is also of 32bit and represented in binary
form.
For ex- 192.168.1.1 has the subnet mask as 255.255.255.0
4.
The first address of the block address is known as the network address. The network
address as the host address 0. So by looking at an IP address, we can identify the IP
address is the network address as the IP address contain all the host ID 0. For ex-
14.0.0.0 is the network address and also 192.168.1.0 is known as network ID. By using
the network mask and performing the AND operation on the IP address we can find out
the network address from the given block address.
5.
The second level of the OSI model in computer networking is known as the data link layer. In
the IP/TCP reference model, it is a part of link layer. This level is majorly responsible for
local delivery of frames among the devices of similar lanes. Data link structures do not mark
the limits of a local network. Global addressing and networking routing are comparatively
higher-level tasks, which permits data link protocols to concentrate on addressing, local
delivery and arbitration of media. It often works in software as a driver for NIC (Network
2
Classless IPv4 Classful IPv4
The classless addressing does not support
any class concept.
The classful addressing contains five class
such as class A, B, C, D, E.
It allows the VLSM and variable length
subnet mask method for updating the
routing information.
All the devices in the network will have to
use the same subnet mask. And also it does
not provide the subnet information in the
routing updates
There is no concept of the network id and
host id.
The IP address and subnet mask are divided
into two host id and the network id.
2.
The class A addressing store a large amount of IP address so when the organisation take
the IP address from the class A it gets wasted as the subnet of class A has the 24 bit
which can server almost 17 million devices individually therefore a huge number of IP
get wasted when the company uses the class A addressing. When we come to class C it
contains a limited amount of the IP address, therefore, the medium or large company
does not want to use the class C addressing only the small organisation preferred taking
the class C addressing as their requirement is less.
3.
The IPv4 has the 32-bit address which contains both host and the network address. So to
differentiate between the host address and the network address we used the concept of
the mask which is known as subnet mask which is also of 32bit and represented in binary
form.
For ex- 192.168.1.1 has the subnet mask as 255.255.255.0
4.
The first address of the block address is known as the network address. The network
address as the host address 0. So by looking at an IP address, we can identify the IP
address is the network address as the IP address contain all the host ID 0. For ex-
14.0.0.0 is the network address and also 192.168.1.0 is known as network ID. By using
the network mask and performing the AND operation on the IP address we can find out
the network address from the given block address.
5.
The second level of the OSI model in computer networking is known as the data link layer. In
the IP/TCP reference model, it is a part of link layer. This level is majorly responsible for
local delivery of frames among the devices of similar lanes. Data link structures do not mark
the limits of a local network. Global addressing and networking routing are comparatively
higher-level tasks, which permits data link protocols to concentrate on addressing, local
delivery and arbitration of media. It often works in software as a driver for NIC (Network
2

Interface Card). It processes faster than network layer as of fewer analysis of packet is
necessary (GeeksforGeeks et al, 2019).
6.
NAT stands for Network Address Translation which is used for modifying and remapping the
network address information in the IP header table. The NAT gateway addressing for the
routing is used for whole private IP addressing. NAT is also used for hiding the private
addressing from the real world and only the single public address is made visible to the
world.
7.
Connection-Oriented Services Connectionless Services
In this, the connection needs to be
established first then only we can work
future.
In this, we do not need to establish the
connection first.
It works on the concept of reliability while
transferring the data.
There is no concept of reliability is
guaranteed.
We can transmit the packets again if the
previous packet is lost.
In this, we cannot retransmit the packets.
We use the process of the Signalling for
establishing the connection between the
source and the destination.
There is no such concept of the Signalling
process in the connectionless services.
8.
The network layer offers procedural and functional resources of transferring variable length
data arrangements to a destination from a source via one or more than one networks. It also
maintains the quality of services requested by the transport layer. It performs functions of
network routing along with performing reassembly, fragmentation and errors in report
delivery. The network layer answers to the various service requests sent by the transport
layer. It also lad about where the data will be transmitted by obtaining the appropriate address
of the end users. The network layer is mostly responsible for connections model. Such
connection is between the sending network and IP (SearchNetworking et al, 2019).
9.
The transport layer is mainly accountable for confirming accurate and correct end-to-end
communication in an OSI (Open Communication Interconnection) of the computer network
model. The layer is also responsible for management of data error connection and enables it
for efficient multiplexing. It is the fourth layer of OSI structure and permits for the receipt
and detailed transmission of data. At the time of sending data, this layer breaks the
application messages into various smaller segments which are moved along with the network
layer. This layer is required in the efficacy of processes including byte orientation and traffic
control.
3
necessary (GeeksforGeeks et al, 2019).
6.
NAT stands for Network Address Translation which is used for modifying and remapping the
network address information in the IP header table. The NAT gateway addressing for the
routing is used for whole private IP addressing. NAT is also used for hiding the private
addressing from the real world and only the single public address is made visible to the
world.
7.
Connection-Oriented Services Connectionless Services
In this, the connection needs to be
established first then only we can work
future.
In this, we do not need to establish the
connection first.
It works on the concept of reliability while
transferring the data.
There is no concept of reliability is
guaranteed.
We can transmit the packets again if the
previous packet is lost.
In this, we cannot retransmit the packets.
We use the process of the Signalling for
establishing the connection between the
source and the destination.
There is no such concept of the Signalling
process in the connectionless services.
8.
The network layer offers procedural and functional resources of transferring variable length
data arrangements to a destination from a source via one or more than one networks. It also
maintains the quality of services requested by the transport layer. It performs functions of
network routing along with performing reassembly, fragmentation and errors in report
delivery. The network layer answers to the various service requests sent by the transport
layer. It also lad about where the data will be transmitted by obtaining the appropriate address
of the end users. The network layer is mostly responsible for connections model. Such
connection is between the sending network and IP (SearchNetworking et al, 2019).
9.
The transport layer is mainly accountable for confirming accurate and correct end-to-end
communication in an OSI (Open Communication Interconnection) of the computer network
model. The layer is also responsible for management of data error connection and enables it
for efficient multiplexing. It is the fourth layer of OSI structure and permits for the receipt
and detailed transmission of data. At the time of sending data, this layer breaks the
application messages into various smaller segments which are moved along with the network
layer. This layer is required in the efficacy of processes including byte orientation and traffic
control.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10.
Some common address mapping protocols are:
ARP (Address Resolution Protocol) it is used for mapping the physical machine address
with the IP address which can be recognised by the local network.
RARP (Reverse Address Resolution Protocol) is used for those host machine which does
not know there IP address.
11.
ICMP stands for Internet Control Message Protocol it is used for finding the error report from
the device's network like the error generated by the router while the source IP packet is sent
to the router. It does not send the data between the system, so it is not the transport layer
protocol. It uses protocol number 1. We used the ICMP packet for detecting the error
message while sending the packets from source to destination (Dyclassroom et al, 2019).
12.
The Autonomous System (AS) is the router policy unit which is controlled by the common
network group or by the administrator. A routing domain is also referred to as an
Autonomous system. The communication between the routers in the Autonomous system in
done under the Interior gateway protocol.
13.
The purpose of RIP is to establish the route between the two different networks so that they
can easily communicate with each other. The RIP uses the maximum 15 hop count. The RIP
is also recognized dynamic routing protocol.
14.
The RIP is recognized as the distance vector routing protocol so receiving the router
information and the Autonomous system information, we used the RIP message request. The
RIP uses the hop count for measuring the distance between the sources to the destination.
15.
The OSPF has the interface metric which uses the best path selection process than the RIP
hop count. Similarly, the OSPF messages propagate faster as it handles the classless IP
address and also huge network than the RIP hop count. Therefore the OSPF is better and
faster than the RIP.
4
Some common address mapping protocols are:
ARP (Address Resolution Protocol) it is used for mapping the physical machine address
with the IP address which can be recognised by the local network.
RARP (Reverse Address Resolution Protocol) is used for those host machine which does
not know there IP address.
11.
ICMP stands for Internet Control Message Protocol it is used for finding the error report from
the device's network like the error generated by the router while the source IP packet is sent
to the router. It does not send the data between the system, so it is not the transport layer
protocol. It uses protocol number 1. We used the ICMP packet for detecting the error
message while sending the packets from source to destination (Dyclassroom et al, 2019).
12.
The Autonomous System (AS) is the router policy unit which is controlled by the common
network group or by the administrator. A routing domain is also referred to as an
Autonomous system. The communication between the routers in the Autonomous system in
done under the Interior gateway protocol.
13.
The purpose of RIP is to establish the route between the two different networks so that they
can easily communicate with each other. The RIP uses the maximum 15 hop count. The RIP
is also recognized dynamic routing protocol.
14.
The RIP is recognized as the distance vector routing protocol so receiving the router
information and the Autonomous system information, we used the RIP message request. The
RIP uses the hop count for measuring the distance between the sources to the destination.
15.
The OSPF has the interface metric which uses the best path selection process than the RIP
hop count. Similarly, the OSPF messages propagate faster as it handles the classless IP
address and also huge network than the RIP hop count. Therefore the OSPF is better and
faster than the RIP.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

16.
The main purpose of the BGP is to make the network stable and quickly the packets which
are required to send and reconnect the path fast for sending the packets. It provides the
routing based on the rules and path configured by the network admin. The BGP sends the
updated routing table only when there are any changes done in the table or which if only the
changes can affect the information. The BGP supports both IPV6 and the CIDR value
(Answers et al, 2019).
17.
Distance vector routing Link state routing
It required the less bandwidth. IT required the high bandwidth.
It updates the table based on the local
information.
It updates the table based on global
information.
It uses the Bellman-Ford algorithm. It works on the Dijkastra’s algorithm.
It configured the RIP and IGRP. It configured the OSPF and ISIS.
5
The main purpose of the BGP is to make the network stable and quickly the packets which
are required to send and reconnect the path fast for sending the packets. It provides the
routing based on the rules and path configured by the network admin. The BGP sends the
updated routing table only when there are any changes done in the table or which if only the
changes can affect the information. The BGP supports both IPV6 and the CIDR value
(Answers et al, 2019).
17.
Distance vector routing Link state routing
It required the less bandwidth. IT required the high bandwidth.
It updates the table based on the local
information.
It updates the table based on global
information.
It uses the Bellman-Ford algorithm. It works on the Dijkastra’s algorithm.
It configured the RIP and IGRP. It configured the OSPF and ISIS.
5

References-
Answers.yahoo(2019). Yahoo is now part of Oath. [online] Available at
https://answers.yahoo.com/question/index?qid=20111109153028AAk6V6H&guccounter=1
[Accessed 18 Jan. 2019].
Dyclassroom(2019). Network Address - Networking - DYclassroom | Have fun learning :-).
[online] Available at: https://www.dyclassroom.com/networking/network-address [Accessed
18 Jan. 2019].
GeeksforGeeks (2015). IP Addressing | Introduction and Classful Addressing -
GeeksforGeeks. [online] Available at: https://www.geeksforgeeks.org/ip-addressing-
introduction-and-classful-addressing/ [Accessed 18 Jan. 2019].
mask, F. and Butola, S. (2011). Finding the first and last address of a block of IP addresses
with subnet mask. [online] Server Fault. Available at:
https://serverfault.com/questions/327777/finding-the-first-and-last-address-of-a-block-of-ip-
addresses-with-subnet-mask [Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is Address Resolution Protocol (ARP)? - Definition from
WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP
[Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is autonomous system (AS)? - Definition from WhatIs.com.
[online] Available at: https://searchnetworking.techtarget.com/definition/autonomous-system
[Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is BGP (Border Gateway Protocol)? - Definition from
WhatIs.com. [online] Available at: https://searchnetworking.techtarget.com/definition/BGP-
Border-Gateway-Protocol [Accessed 18 Jan. 2019].
Tutorialspoint(2019). IPv4 Addressing. [online] Available at:
https://www.tutorialspoint.com/ipv4/ipv4_addressing.htm [Accessed 18 Jan. 2019].
6
Answers.yahoo(2019). Yahoo is now part of Oath. [online] Available at
https://answers.yahoo.com/question/index?qid=20111109153028AAk6V6H&guccounter=1
[Accessed 18 Jan. 2019].
Dyclassroom(2019). Network Address - Networking - DYclassroom | Have fun learning :-).
[online] Available at: https://www.dyclassroom.com/networking/network-address [Accessed
18 Jan. 2019].
GeeksforGeeks (2015). IP Addressing | Introduction and Classful Addressing -
GeeksforGeeks. [online] Available at: https://www.geeksforgeeks.org/ip-addressing-
introduction-and-classful-addressing/ [Accessed 18 Jan. 2019].
mask, F. and Butola, S. (2011). Finding the first and last address of a block of IP addresses
with subnet mask. [online] Server Fault. Available at:
https://serverfault.com/questions/327777/finding-the-first-and-last-address-of-a-block-of-ip-
addresses-with-subnet-mask [Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is Address Resolution Protocol (ARP)? - Definition from
WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP
[Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is autonomous system (AS)? - Definition from WhatIs.com.
[online] Available at: https://searchnetworking.techtarget.com/definition/autonomous-system
[Accessed 18 Jan. 2019].
SearchNetworking. (2019). What is BGP (Border Gateway Protocol)? - Definition from
WhatIs.com. [online] Available at: https://searchnetworking.techtarget.com/definition/BGP-
Border-Gateway-Protocol [Accessed 18 Jan. 2019].
Tutorialspoint(2019). IPv4 Addressing. [online] Available at:
https://www.tutorialspoint.com/ipv4/ipv4_addressing.htm [Accessed 18 Jan. 2019].
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.