answersLogoWhite

0

IP address can really help to identify which type of network it is connected to. First we have to know the class of IP, there are 3 class of IP that we can use.

Class A : 1.0.0.0 - - 126.255.255.255 (255.0.0.0) [Revised]

Class B : 128.0.0.0 - - 191.255.255.255 (255.255.0.0)

Class C : 192.0.0.0 - - 223.255.255.255 (255.255.255.0)

Second, we have to identify if the given IP is from private or public range, every class of IP has its private range of IP.

Class A : 10.0.0.0 - 10.255.255.255

Class B : 172.16.0.0 - 172.31.255.255

Class C : 192.168.0.0 - 192.168.255.255

After deciding that we can get a bulk piece of information about the network with which it is connected.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

How is an IPv6 IP address used that begins with 2000 that begins with FE80?

An IP address that begins with 2000 and with FE80 can be many of peoples. It is an address that is located in the network to help identify someone.


What does an IP address look like?

It isan address that helps to identify a node on network and in a unique manner.it helps computers over an internet or network to communicate with each other.helps to transfer data from one node to another by the help of encapsulation


How can you determine which resources are shared on a network?

This might help you: https://www.raymond.cc/blog/scanning-for-connected-computers-in-local-network-and-finding-shared-folders/


What is netwok?

A computer network is a collection of computers that is connected together so that they can communicate. Read this tutorial it will help u: http://f1tutorials.com/Tutorials/Network/computer_network.html


Can data loggers be connected to desktop PC's?

Data loggers can be connected to your pc with the proper network connections. There are numerous connectins that are available on the market right now that can help you


What are the advantages of MAC Address Filtering?

MAC filtering takes network security to the next level by only granting access to specific network cards.A MAC (media access control) address is a unique identifier for a network card; no two cards have the same MAC address, so it functions like a fingerprint - even a wireless card and an Ethernet card built-in to the same laptop won't have the same MAC address. Therefore, MAC address filtering adds security by only allowing network cards with the right "fingerprint" to access the network.However, it should be noted that MAC address filtering is not a strong form of security. MAC addresses are extremely easy to "spoof" - that is, it's easy to fake the address of a legitimate network card. If an attacker is able to identify the MAC address of a permitted network card, they can masquerade as the legit card. Therefore, MAC address filtering is not a replacement for using encryption. MAC address filtering can help security if used in an environment running WPA.


How do shutdown lan connected computer through their ip address?

If you are the legitimate administrator of the (Windows) computer in question, you can do this using the Computer Management tool. If you are not, this is illegal (and the odds are you won't be able to anyway).


Why is it useful to intentionally break a ppp encapsulation configuration?

Intentionally breaking a PPP encapsulation configuration can be useful for testing and troubleshooting purposes. By deliberately causing a failure in the configuration, you can simulate real-world scenarios, identify potential issues, and verify the resilience of the network to failures. This process can help network administrators proactively address and resolve any vulnerabilities before they impact the network's performance.


What does an four-group series of numbers separated by periods represent?

A four-group series of numbers separated by periods typically represents an IP address. Each group of numbers in an IP address can range from 0 to 255, and the groups represent different parts of the address that help identify devices on a network.


When a group of computers is connected together in a small area without the help of telephone lines it is called?

That is called a Local Area Network (or LAN for short)


What is the cluster graph?

A cluster graph is a type of graph in which the vertices can be grouped into clusters or communities based on their connections within the graph. It is used to study the structure of complex networks and identify groups of vertices that are more densely connected to each other than to the rest of the network. Cluster graphs help in visualizing and analyzing the natural communities that exist within a network.


Is there a website that can tell me if a particular web address is legitimate?

http://www.phishtank.com/ is just one of many sites that can help identify a fake/phishing/illegitimate web address. a