Definition

32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system). In IPv4, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet.The 32-bit IP address (we have a separate definition of it with IP address) is often depicted as a dot address (also called dotted quad notation) - that is, four groups (or quads) of decimal numbers separated by periods. Here's an example:

``` 130.5.5.25
```

Each of the decimal numbers represents a string of eight binary digits. Thus, the above IP address really is this string of 0s and 1s:

``` 10000010.00000101.00000101.00011001
```

As you can see, we inserted periods between each eight-digit sequence just as we did for the decimal version of the IP address. Obviously, the decimal version of the IP address is easier to read and that's the form most commonly used.

Some portion of the IP address represents the network number or address and some portion represents the local machine address (also known as the host number or address). IP addresses can be one of several classes, each determining how many bits represent the network number and how many represent the host number. The most common class used by large organizations (Class B) allows 16 bits for the network number and 16 for the host number. Using the above example, here's how the IP address is divided:

``` <--Network address--><--Host address--> 130.5 . 5.25
```

If you wanted to add subnetting to this address, then some portion (in this example, eight bits) of the host address could be used for a subnet address. Thus:

``` <--Network address--><--Subnet address--><--Host address--> 130.5 . 5 . 25
```

To simplify this explanation, we've divided the subnet into a neat eight bits but an organization could choose some other scheme using only part of the third quad or even part of the fourth quad.

Once a packet has arrived at an organization's gateway or connection point with its unique network number, it can be routed within the organization's internal gateways using the subnet number. The router knows which bits to look at (and which not to look at) by looking at a subnet mask, which is a screen of numbers that tells you which numbers to look at underneath.

This was last updated in March 2007

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### Virtual wire network transport mission could increase SDN usage

SDN's use as virtual wire to provide network transport could get the technology out of the data center to underlay SD-WAN better ...

• ### Viptela names former Cisco exec Akkiraju CEO amid SD-WAN market shift

Viptela, a startup in the SD-WAN market, taps former Cisco exec Praveen Akkiraju as its new CEO. Akkiraju's immediate goal for ...

• ### I2RS, Interface to the Routing System, remains viable SDN hybrid

One SDN blogger discusses I2RS, a hybrid model of SDN in the works, while another expert categorizes NFV and SDN vendors. Also, ...

## SearchEnterpriseWAN

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

• ### Cloud-managed networking makes VPN a snap

Provisioning and deploying a WAN and VPN is an everyday function for engineers. But can you do that for an office 4,000 miles ...

• ### Three new takes on WAN optimization

Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the ...

## SearchUnifiedCommunications

• ### A Skype for Business deployment requires plenty of planning

Here's some advice for a Skype for Business deployment: Plan, plan, plan. Doing your homework upfront and allotting enough ...

• ### Microsoft team collaboration software gains momentum

In UC news, Microsoft team collaboration tools garner more interest among organizations. Plus, email encryption services see ...

• ### Team messaging apps go mainstream, could have ripple effect

As team messaging applications such as Slack and Cisco Spark grow in popularity, they could decrease reliance on email, 1-800 ...

## SearchMobileComputing

• ### Advanced Citrix XenMobile MDM comes to Intune, but who's buying?

Citrix XenMobile mobile device management policies, features and mobile apps will soon be available to Microsoft shops as an ...

• ### Look to the future of the wearable technology trend

The enterprise potential for wearable technology is high, with accurate health trackers and 3D graphics becoming more common. ...

• ### Surface Pro 4 vs. iPad Pro in the battle for enterprise supremacy

The Surface Pro 4 brings Windows 10 to the table. The iPad Pro offers a better user experience. Which one is the right fit for ...

## SearchDataCenter

• ### Use a Linux file system journal for data integrity, performance

Understand the three different file system journaling modes for Linux, as well as which mount option provides the best levels of ...

• ### Test yourself on modern data center networking architecture

Evolving business needs demand a new approach to data center networking. Keep yourself updated on SDN, VXLAN and other ...

• ### To reap the benefits of hyper-convergence, manage it right

Use a policy-based approach to manage hyper-converged infrastructure.

## SearchITChannel

• ### Citrix Summit 2017: Round-up

One of the first major vendor events of the year has concluded with plenty for the channel to think about.

• ### Intermedia boosts support for channel ecosystem

Cloud company will invest in a sales enablement and engineering practice as well as system and tool capabilities to improve ...

• ### IBM gives DS8880 arrays an 'F,' as in flash

The expansion of the IBM DS8880 hardware line introduces all-flash models designed around the vendor's High-Performance Flash ...

Close