Monday, October 12, 2015

When you connect to the Internet, your Internet Service Provider (known as ISP) assigns an IP address. Depending on the type of service you subscribed, you may be allocated to use static or dynamic IP address. A static IP address is a permanent (non-changing) IP address assigned to you. Most users on the other hand gets an dynamically assigned IP address from their ISP. The device (a router, gateway or computer) connected to your ISP allows you to connect to the Internet, and also allows you to change its IP address. This article only pertains to changing an IP address of dynamically assigned IP address (via the DHCP).

Change your IP Country with a Virtual Private Network

You may want to change your public IP address for a variety of reasons. If your IP address is banned by certain game servers or your download allowance from a P2P network has expired, obtaining a different IP address from your current ISP will solve your problem (see instruction below). However, if you wish to bypass regional block and wish to obtain an IP address from a different country, changing an IP address from your ISP will not help you. For example, if you want to watch BBC, Netflix, Spotify or Hulu from a region where those services are blocked, you will need a VPN service to obtain an IP address of a country where the service is allowed. With VPN, you'll also surf Internet anonymously with added security.
Here are a few VPN providers we recommend:

We receive compensation when a purchase is made from the referred link. Our recommendation is based on our research and positive feedback we received from the users who've used the services.

Ok, I got it so how do I change IP address?

If you renew your IP address from your current ISP, your ISP may or may not assign you a new IP address. Depending on how you're connected to the Internet, you may have to reset different device. If you're connected via a router, you'll have to change IP address of your router. If you're connected directly to the Internet via a layer-2 gateway, you'll have to change your computer's IP address. Most home network is connected via a router, so chances are that you need to change IP address of your router. In this article, I will describe how to change IP address of your router and also show you how to change IP address of your computer. There are a number of ways to change IP address, so I'll describe easiest method first and then describe a bit more complicated methods.
In order to verify that you've changed an IP address of your device, you'll have to visit Find My IP page of our website.

How to change IP address of a router?

A router is a layer 3 networking device that connects multiple computers to the Internet. In home network with dynamically assigned IP address, a router is assigned a public IP address and all the computers connected to the router is assigned a private IP address. When computers connected to the router visits the Internet, the world views your computer with a public IP address of your router. So, if you want the world to see you with a different IP address, you'll have to change IP address of your router. Here are a few ways to change IP address of your router.
  • Turn off your router for a minute and turn it back on. The common nature of DHCP is to "remember" the device and assign you the same IP address you had before, so simply turning off your router and turning it back on will not likely change IP address. However, if you try multiple times you may get lucky and will obtain a new IP address from your ISP. If multiple tries doesn't get you a new IP address, try leaving the router turned off overnight and restart in the morning.
  • Reconnect your router to your ISP via administrative Interface. Most routers allow you to disconnect from upstream ISP, and reconnect via a point-and-click from the Administrative Console. Each router vendor provides a different UI to achieve this, but once you login to the Administrative Console of the router you should be able to locate the reconnect button. The screenshot below is the method provided by the Asus RT-N66W model.

How to change IP address of a computer?

  • Shutdown your computer for a minute and turn it back on. Again, the common nature of DHCP is to assign the device same IP address each time it connects to the network, it's unlikely that you'll receive different address first time your restart your computer. If you restart a few times, you may get lucky and get a new IP address from your router.
  • Renew your IP address. You may manully release your IP address and obtain a new IP address with Windows ipconfig utility. Please follow the following steps.
  • On Windows 7 and below, click Start -> Run, and type cmd as shown below. On Windows 8, type WIN key and X key to bring Power User Menu -> Choose Run.
    On the Command Prompt screen, run "ipconfig /release" and "ipconfig /renew" commands as shown below. You'll have to start Elevated Command Prompt (Run as System Administrator) to execute ipconfig command.
    C:\> ipconfig
    
    Windows IP Configuration
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 192.168.1.101
            Subnet Mask . . . . . . . . . . . : 255.255.255.0
            Default Gateway . . . . . . . . . : 192.168.1.1
    
    C:\> ipconfig /release
    Windows IP Configuration
    
    No operation can be performed on Local Area Connection while it has its media
    disconnected.
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 0.0.0.0
            Subnet Mask . . . . . . . . . . . : 0.0.0.0
            Default Gateway . . . . . . . . . :
    
    Ethernet adapter Local Area Connection:
    
            Media State . . . . . . . . . . . : Media disconnected
    
    C:\> ipconfig /renew
    
    Windows IP Configuration
    
    Ethernet adapter Wireless Network Connection:
    
            Connection-specific DNS Suffix  . :
            IP Address. . . . . . . . . . . . : 192.168.1.102
            Subnet Mask . . . . . . . . . . . : 255.255.255.0
            Default Gateway . . . . . . . . . : 192.168.1.1
    
    Verify that you have a new IP address by either typing ipconfig command, or by visiting Find My IP page. On our example above, the IP address has been changed from 192.168.1.101 to 192.168.1.102. Again, the nature of DHCP is to assign the device same IP address as before so you may have run this step multiple times to change your IP address.
  • You may use a proxy server or VPN to conceal your true IP address, and borrow an IP from a 3rd-party Proxy or VPN provider.

Use someone else's network

As with Hide IP Address, you can always use someone else's network and obtain an IP address from that network. Try using free Wi-Fi services from a local coffee shop, hotel, library or any other public offerings. An IP address does not travel with your computer, so using someone else's network may be a viable solution.

A Virtual Private Network (VPN) is a network technology which extends private network (such as LAN) over a public network such as the Internet. A VPN allows a computer (or a network) to be connected securely as if they are physically wired together. Corporations use VPN to allow remote workers to connect securely to their private network. A VPN is also used to interconnect remote offices with a head office as if they are physically connected.
Besides interconnecting private networks, a VPN is also used to hide ip address or change ip addressby connecting to a 3rd-party VPN provider to protect oneself from exposing to public networks.

Advantages

  1. The primary reason for implementing VPN technology is to create a secure connection to the other endpoint. Creating a WAN connectivity is very costly, and may not be practical for individual users making client to server connection. The information exchanged between the two VPN endpoints is encrypted, and hence no eavesdropping can occur when information is transmitted over public network.
  2. A VPN can also be used to hide your privacy by disguising true IP address of the user's computer. Online gamers may use VPN to hide IP address of their computers, and business owners may use VPN to change IP address to protect their identity from their competitors.

Disadvantages

  1. Since all virtual private network traffic is encrypted, there will be 10-15% increase in payload transmitted over VPN. This additional overhead causes (1) computing devices to use more processing power to encrypt the data, (2) send more data over the network, and finally (3) takes longer to transmit data as there will be 10-15% additional data. With advancement in computing and network technologies, the additional processing power required to encrypt/decrypt and additional data transmission have negligible impact on overall usage of the network.
  2. Not all VPN appliances interoperate well, so a VPN device from one vendor may not work well from a device from another vendor. A network engineer implementing the VPN technology must verify compability between the two endpoints. Similarly, a client to server connection may cause slowness (or degrade in QoS) if VPN is not properly setup.

VPN Protocols

A virtual private network is created by establishing a virtual tunnel between two endpoints via a virtual tunneling protocol or by data encryption. Some of the most popular VPN protocols include IPsec, SSL/TLS, PPTP and L2TP.

Authentication

A VPN connection whether it's a client to server or network to network, tunnel endpoints must be authenticated before establishing a secure connection. A user initiated VPN connection either use password or two-factor authentication whereas network-to-network tunnels often use digital certificates (private/public key combination).
If you have any questions about VPN technology, please post your question on VPN Forum.

Many readers of our website are contacting us for help on *allegedly* hacked IP address, and remedies for getting it back. One of the user is telling us his IP address used to be 64.3.x.y in Dallas and now it's 67.72.x.y located in Utah (per ip lookup); and hence his IP address is stolen, and his computer is running very slow and acting abnormal.
For a non-computer person, this may sound like a user's IP address has been hacked but in reality your IP address cannot be hacked. Chances are that you're getting your IP address dynamically from your Service Provider whom may be servicing multiple areas. When you disconnect from your ISP and reconnect to the Internet, you're getting a new IP address from your Internet Service Provider and this IP address may or may not be the same as previously assigned. This does not mean you're sharing this IP address with someone else, as you've just assigned a new IP address and your old IP address may have been assigned to a new person in Utah. As ISPs servicing multiple cities, they may allocate their IP address how ever they desire, and this may cause location of IP address to be incorrectly shown. Getting an IP address that shows remote location (Utah) does not slow down your computer, or cause it to act abnormal.
If your computer is acting slow or behave abnormal, you may have spyware or virus on your computer. Slowness of your computer has nothing to do with your IP address. You may wish to scan your computer for virus, and remove them.

If someone knows my IP address, can they hack my computer?

Depending on how your computer is connected to the Internet and the type of security in place, your computer may vulnerable for hack. In reality, chances of your computer being hacked from your known IP address is very unlikely. The trouble of hacker trying to gain access to your computer doesn't justify hacking into your computer unless you have billions of dollars in your bank account accessible from your personal computer. The most easiest way for hackers to gain access to your computer is through virus, not by attacking an IP address.

I have a static IP address. Can my computer (or server) hacked?

Having a static IP address doesn't increase the chance of your server being hacked, but vulnerable software and configuration may allow hackers to randomly attack your computer. Hackers learn known vulnerability on certain types of software, and using known vulnerability hackers randomly attack machines. Servers directly connected to the Internet are more exposed than the personal computers sitting behind the router with firewall. Unless you're a network professional managing servers, chances of your personal computer hacked is very small. Again, the easiest way to hack into your computer is by through a rootkit or virus.
IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonate another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in the IP header. IP spoofing involves solving the algorithm that is used to select the order sent values, and to modify them correctly.
Ipconfig is a MS-DOS command-line tool used to display and manage the network settings of your computer. Ipconfig is available on Windows machines, and it displays the current network connection details and DHCP client settings.
Ipconfig is an external MS-DOS command, and is available on Windows 95, Windows 98, ME, NT, 2000, XP and Windows Vista Operating Systems. On Windows 9x machines, a graphical tools such as winipconifg or winipcfg may be used instead. On Linux machine, the ifconfig command performs equivalent function.

C:\> ipconfig /?

USAGE:
    ipconfig [/? | /all | /renew [adapter] | /release [adapter] |
              /flushdns | /displaydns | /registerdns |
              /showclassid adapter |
              /setclassid adapter [classid] ]

where
    adapter         Connection name
                   (wildcard characters * and ? allowed, see examples)

    Options:
       /?           Display this help message
       /all         Display full configuration information.
       /release     Release the IP address for the specified adapter.
       /renew       Renew the IP address for the specified adapter.
       /flushdns    Purges the DNS Resolver cache.
       /registerdns Refreshes all DHCP leases and re-registers DNS names
       /displaydns  Display the contents of the DNS Resolver Cache.
       /showclassid Displays all the dhcp class IDs allowed for adapter.
       /setclassid  Modifies the dhcp class id.

The default is to display only the IP address, subnet mask and
default gateway for each adapter bound to TCP/IP.

For Release and Renew, if no adapter name is specified, then the IP address
leases for all adapters bound to TCP/IP will be released or renewed.

For Setclassid, if no ClassId is specified, then the ClassId is removed.

Examples:
    > ipconfig                   ... Show information.
    > ipconfig /all              ... Show detailed information
    > ipconfig /renew            ... renew all adapters
    > ipconfig /renew EL*        ... renew any connection that has its
                                     name starting with EL
    > ipconfig /release *Con*    ... release all matching connections,
                                     eg. "Local Area Connection 1" or
                                         "Local Area Connection 2"

C:\>ipconfig /all

Windows IP Configuration

        Host Name . . . . . . . . . . . . : topwebhosts
        Primary Dns Suffix  . . . . . . . :
        Node Type . . . . . . . . . . . . : Hybrid
        IP Routing Enabled. . . . . . . . : No
        WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        Description . . . . . . . . . . . : Intel(R) PRO/Wireless LAN 2100 3B Mi
ni PCI Adapter
        Physical Address. . . . . . . . . : 00-0C-F1-65-5B-70
        Dhcp Enabled. . . . . . . . . . . : Yes
        Autoconfiguration Enabled . . . . : Yes
        IP Address. . . . . . . . . . . . : 192.168.1.100
        Subnet Mask . . . . . . . . . . . : 255.255.255.0
        Default Gateway . . . . . . . . . : 192.168.1.1
        DHCP Server . . . . . . . . . . . : 192.168.1.1
        DNS Servers . . . . . . . . . . . : 192.168.1.1
        Lease Obtained. . . . . . . . . . : Thursday, February 08, 2007 2:27:17
PM
        Lease Expires . . . . . . . . . . : Thursday, February 15, 2007 2:27:17
PM

Ethernet adapter Local Area Connection:

        Media State . . . . . . . . . . . : Media disconnected
        Description . . . . . . . . . . . : Intel(R) PRO/1000 MT Mobile Connecti
on
        Physical Address. . . . . . . . . : 00-0D-60-FB-4E-E9

To learn the names of ethernet adapters that you can optionally specify with "ipconfig" command, you may simply type ipconfig command by itself. The command output displays all adapters by name that are available on your computer: e.g. "Local Area Connection", "Wireless Network Connection".
Ipconfig command is most often used to diagnose network problem on a Windows machine. If you're using DHCP, you may try releasing and renewing IP address by performing "ipconfig /release" and "ipconfig /renew" commands shown below.
C:\> ipconfig /release
Windows IP Configuration

No operation can be performed on Local Area Connection while it has its media di
sconnected.

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        IP Address. . . . . . . . . . . . : 0.0.0.0
        Subnet Mask . . . . . . . . . . . : 0.0.0.0
        Default Gateway . . . . . . . . . :

Ethernet adapter Local Area Connection:

        Media State . . . . . . . . . . . : Media disconnected

C:\> ipconfig /renew

Windows IP Configuration

Ethernet adapter Wireless Network Connection:

        Connection-specific DNS Suffix  . :
        IP Address. . . . . . . . . . . . : 192.168.1.100
        Subnet Mask . . . . . . . . . . . : 255.255.255.0
        Default Gateway . . . . . . . . . : 192.168.1.1

To workaround DNS caching issue, you may perform "ipconfig /flushdns" to clear DNS cache value on your computer. DNS uses TTL (Time-To-Live) value which let the intermediate name servers to cache DNS information. If you changed your DNS settings, and your computer doesn't see the change immediately, you may perform "ipconfig /flushdns" to clear the DNS cache.
C:\> ipconfig /flushdns

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.


FAQ:

On Windows Vista machine, if you are getting an error "The requested operation requires elevation", you'll need to run Command Prompt as an administrator. To do this, you'll need to do the following:
All Programs -> Accessories -> right click Command Prompt and click Run as administrator!

An IP address is an address assigned to a device on the Internet. It is analogous to postal address where a letter is delivered, and an IP address is computer's address where internet traffic is delivered. An IP address is assigned to you by your Internet Service Provider (ISP). When you signup with your ISP, your ISP either assigns you a static IP address or a dynamic IP address depending on the contract. If you need to setup a web server or an email service, you'll need a static IP address. If you are just browsing an Internet, you may just get by with a dynamic IP address.

What is a static IP address?

A static IP address is an address that is permanently assigned to you by your ISP (as long as your contract is in good standing), and does not change even if your computer reboots. A static IP address is usually assigned to a server hosting websites, and providing email, database and FTP services. A static IP address is also assigned to a commercial leased line, or public organization requiring same IP address each and every time. Since static IP address is assigned to you, you'll have to manually configure your machine (router or server) to use the static IP address assigned to you.
Static IP address Advantages
  • Address does not change - good for web servers, email servers and other Internet servers.
  • Use DNS to map domain name to IP address, and use domain name to address the static IP address. Similar can be achieved with Dynamic DNS for dynamic IP address, but it's not as clean as the static IP address.
Static IP address Disadvantages
  • Expensive than dynamic IP address - ISPs generally charge additional fee for static IP addresses.
  • Need additional security - Since same IP is assigned to a machine, hackers try brute force attack on the machine over period of time.

What is a dynamic IP address?

A dynamic IP address is an IP address dynamically assigned to your computer by your ISP. Each time your computer (or router) is rebooted, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. Since your ISP dynamically assigns an IP address to a computing device on reboot, your device may not always receive the same IP address previous assigned to it. Even if your machine is always on and permanently connected, some ISPs do change IP address on-the-fly even though this is very rare. A sticky nature of DHCP generally reassigns same IP address to the same machine, it is not guaranteed to receive same IP address as IP pool may exhaust at times and lease time may expire. To find your dynamic IP address, you may visit What is my IP address page.
Dynamic IP address Advantages
  • Cheaper than static IP address.
  • Changing IP address gives more privacy.
Dynamic IP address Disadvantages
  • Requires DHCP server to obtain an IP address.
  • Non-static. Each time IP address changes, you may have to find you IP address again.

DHCP, Dynamic Host Configuration Protocol, is a communications protocol that dynamically assigns unique IP addresses to network devices. As a network device joins or leaves an IP-based network, DHCP automatically renews or releases an IP address.
DHCP runs in a client/server mode, where server sets up a pool of available IP addresses for a network. A DHCP server also provides network gateway, subnet masks, name server addresses and amount of time ("lease") that a given IP address will be valid. A DHCP client retrieve those parameters and use them to join the existing network.
DHCP allows network administrators centrally manage and automate the assignment of the IP addresses without having to worry about assigning duplicate addresses, making network administration a lot easier to manage.

TCP/IP, Transmission Control Protocol/Internet Protocol, is a suite of communications protocols used to interconnect network devices on the Internet. TCP/IP implements layers of protocol stacks, and each layer provides a well-defined network services to the upper layer protocol. TCP and IP are the two protocols used by TCP/IP, as well as the (higher) application, (lower) data link and (lower) physical layer protocols.
LayerProtocols
5. ApplicationDNS, FTP, HTTP, IMAP, POP3, SMTP, SSH, Telnet, SSL, ...
4. TransportTCP, UDP, ...
3. NetworkIP (IPv4, IPv6), ICMP, ARP, ...
2. Data Link802.3 (Ethernet), 802.11 (Wi-Fi), PPP, ...
1. PhysicalEthernet (NIC), Wireless (NIC), Cat 5/RJ-45, ...
Ethernet is the most widely used local area network (LAN) technology, that defines wiring and signaling standards for the physical layer of TCP/IP. Ethernet was originally standardized as IEEE 802.3 with a data transmission rate of 10 Mb/s. Newer versions of Ethernet were introduced lately to offer higher data rates. Fast Ethernet and Gigabit Ethernet support data rates of 100 Mbps and 1 Gbps (1000 Mbps) respectively. An Ethernet LAN may use coaxial cable (10Base2), unshielded twisted pair wiring (10BaseT, 100BaseT and 1000BaseT), or fiber optic cable. Ethernet devices compete for access to the network using a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). With prosperity of Internet, Wi-Fi, the wireless LAN technology standardized by IEEE 802.11, is used in hybrid with Ethernet LAN to offer portability.

2. Ethernet Standards

IEEE 802.3 is the signaling standards for Ethernet, and IEEE 802.11 is the standards for Wi-Fi. The standards documents may be obtained free of charge at the following website:http://standards.ieee.org/getieee802/
MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.
MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network administrator. DHCPrelies on MAC address to assign IP addresses to network devices.

How do I find a MAC address of network device?

Operating Systems support various command-line and GUI utilities to allow users to find MAC address of the system. On Unix variants including Solaris and Linux support "ifconfig -a""ip link list" or "ip address show" command that displays MAC address of the network device among other useful information. Windows including NT, 2000, XP and 2003 support "ipconfig /all" command that displays MAC address. On a MacOS, one can find MAC address by opening "System Preferences", then selecting "Network".
An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>) if additional subnetwork is needed. Use the Subnet Calculator to retrieve subnetwork information from IP address and Subnet Mask. It is called a subnet mask because it is used to identify network address of an IP address by perfoming a bitwise AND operation on the netmask.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose, and cannot be assigned to hosts. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts.
Examples of commonly used netmasks for classed networks are 8-bits (Class A), 16-bits (Class B) and 24-bits (Class C), and classless networks are as follows:
ClassAddress# of HostsNetmask (Binary)Netmask (Decimal)
CIDR/4240,435,45611110000 00000000 00000000 00000000240.0.0.0
CIDR/5134,217,72811111000 00000000 00000000 00000000248.0.0.0
CIDR/667,108,86411111100 00000000 00000000 00000000252.0.0.0
CIDR/733,554,43211111110 00000000 00000000 00000000254.0.0.0
A/816,777,21611111111 00000000 00000000 00000000255.0.0.0
CIDR/98,388,60811111111 10000000 00000000 00000000255.128.0.0
CIDR/104,194,30411111111 11000000 00000000 00000000255.192.0.0
CIDR/112,097,15211111111 11100000 00000000 00000000255.224.0.0
CIDR/121,048,57611111111 11110000 00000000 00000000255.240.0.0
CIDR/13524,28811111111 11111000 00000000 00000000255.248.0.0
CIDR/14262,14411111111 11111100 00000000 00000000255.252.0.0
CIDR/15131,07211111111 11111110 00000000 00000000255.254.0.0
B/1665,53411111111 11111111 00000000 00000000255.255.0.0
CIDR/1732,76811111111 11111111 10000000 00000000255.255.128.0
CIDR/1816,38411111111 11111111 11000000 00000000255.255.192.0
CIDR/198,19211111111 11111111 11100000 00000000255.255.224.0
CIDR/204,09611111111 11111111 11110000 00000000255.255.240.0
CIDR/212,04811111111 11111111 11111000 00000000255.255.248.0
CIDR/221,02411111111 11111111 11111100 00000000255.255.252.0
CIDR/2351211111111 11111111 11111110 00000000255.255.254.0
C/2425611111111 11111111 11111111 00000000255.255.255.0
CIDR/2512811111111 11111111 11111111 10000000255.255.255.128
CIDR/266411111111 11111111 11111111 11000000255.255.255.192
CIDR/273211111111 11111111 11111111 11100000255.255.255.224
CIDR/281611111111 11111111 11111111 11110000255.255.255.240
CIDR/29811111111 11111111 11111111 11111000255.255.255.248
CIDR/30411111111 11111111 11111111 11111100255.255.255.252

Subnetting an IP network is to separate a big network into smaller multiple networks for reorganization and security purposes. All nodes (hosts) in a subnetwork see all packets transmitted by any node in a network. Performance of a network is adversely affected under heavy traffic load due to collisions and retransmissions.
Applying a subnet mask to an IP address separates network address from host address. The network bits are represented by the 1's in the mask, and the host bits are represented by 0's. Performing a bitwise logical AND operation on the IP address with the subnet mask produces the network address. For example, applying the Class C subnet mask to our IP address 216.3.128.12 produces the following network address:
IP:   1101 1000 . 0000 0011 . 1000 0000 . 0000 1100  (216.003.128.012)
Mask: 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000  (255.255.255.000)
      ---------------------------------------------
      1101 1000 . 0000 0011 . 1000 0000 . 0000 0000  (216.003.128.000)

Subnetting Network 
Here is another scenario where subnetting is needed. Pretend that a web host with a Class C network needs to divide the network so that parts of the network can be leased to its customers. Let's assume that a host has a network address of 216.3.128.0 (as shown in the example above). Let's say that we're going to divide the network into 2 and dedicate the first half to itself, and the other half to its customers.
   216 .   3 . 128 . (0000 0000)  (1st half assigned to the web host)
   216 .   3 . 128 . (1000 0000)  (2nd half assigned to the customers)
The web host will have the subnet mask of 216.3.128.128 (/25). Now, we'll further divide the 2nd half into eight block of 16 IP addresses.
   216 .   3 . 128 . (1000 0000)  Customer 1 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1001 0000)  Customer 2 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1010 0000)  Customer 3 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1011 0000)  Customer 4 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1100 0000)  Customer 5 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1101 0000)  Customer 6 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1110 0000)  Customer 7 -- Gets 16 IPs (14 usable)
   216 .   3 . 128 . (1111 0000)  Customer 8 -- Gets 16 IPs (14 usable)
   -----------------------------
   255 . 255 . 255 . (1111 0000)  (Subnet mask of 255.255.255.240)
You may use Subnet Calculator to ease your calculation.

CIDR - Classless Inter Domain Routing 
Classless InterDomain Routing (CIDR) was invented to keep the Internet from running out of IP Addresses. The IPv4, a 32-bit, addresses have a limit of 4,294,967,296 (232) unique IP addresses. The classful address scheme (Class A, B and C) of allocating IP addresses in 8-bit increments can be very wasteful. With classful addressing scheme, a minimum number of IP addresses allocated to an organization is 256 (Class C). Giving 256 IP addresses to an organization only requiring 15 IP addresses is wasteful. Also, an organization requiring more than 256 IP addresses (let's say 1,000 IP addresses) is assigned a Class B, which allocates 65,536 IP addresses. Similarly, an organization requiring more than 65,636 (65,634 usable IPs) is assigned a Class A network, which allocates 16,777,216 (16.7 Million) IP addresses. This type of address allocation is very wasteful.
With CIDR, a network of IP addresses is allocated in 1-bit increments as opposed to 8-bits in classful network. The use of a CIDR notated address can easily represent classful addresses (Class A = /8, Class B = /16, and Class C = /24). The number next to the slash (i.e. /8) represents the number of bits assigned to the network address. The example shown above can be illustrated with CIDR as follows:
   216.3.128.12, with subnet mask of 255.255.255.128 is written as
   216.3.128.12/25

   Similarly, the 8 customers with the block of 16 IP addresses can be
   written as:

   216.3.128.129/28, 216.3.128.130/28, and etc.
With an introduction of CIDR addressing scheme, IP addresses are more efficiently allocated to ISPs and customers; and hence there is less risk of IP addresses running out anytime soon. For detailed specification on CIDR, please review RFC 1519. With introduction of additional gaming, medical, applicance and telecom devices requiring static IP addresses in addition to more than 6.5 billion (July 2006 est.) world population, the IPv4 addresses with CIDR addressing scheme will eventually run out. To solve shortage of IPv4 addresses, the IPv6 (128-bit) address scheme was introduced in 1993.

Internet Protocol Version 6 (or IPv6) is a successor of IPv4 Address standard developed by IETF, which is designed to solve IPv4 address exhaustion problem. IPv4 uses a 32-bit numbering scheme to represent an IP address, which has an address space of 232 or 4.3 billion. IPv6, on the other hand, uses 128-bit numbering scheme (2128) which has big enough address space for many decades to come. IPv6 is intended to replace the IPv4, but the introduction of CIDR (Classless Inter-Domain Routing) allocation scheme in 1993 within the IPv4 prolonged lifespan of IPv4 Addresses. With an anticipation of smartphones, tablets, smart appliances and other electronic devices joining Internet every day, IPv4 address space will eventually exhaust. As of May 2014 per Google Statistics, 96% of Internet traffic is IPv4 and only 4% is represented by IPv6. IPv4 and IPv6 are not interoperable by design, so the transition from IPv4 to IPv6 require "transition mechanism" such as Stateless IP/ICMP Translation, Transport Relay, 6rd and other IPv6 transition mechanisms to make them interoperable.

IPv6 Address Types

IPv6 addresses are classified into three categories: unicast, anycast and multicast addressing.
  • Unicast Address - An unicast IP address is an identifier for a single network interface. An IPv6 packet sent to an unicast address is delivered to a single interface.
  • Anycast Address - An anycast IP address is identifier for a set of interfaces assigned to a group but belonging to different nodes. An IPv6 packet sent to an anycast address is delivered to a single node closest to the sender identified by the routing algorithm.
  • Multicast Address - A multicast IP address is identifier for a set of interfaces that may belong to differentn nodes. An IPv6 packet sent to a multicast address is delivered to all interfaces identified by the multicast address.
Unlike IPv4 addressing scheme, the IPv6 addressing scheme does not implement broadcast address. Instead, IPv6 implements multicast address to send packets to a group of nodes and avoids distributing to every nodes in the network. IPv6 also has a scope, which specifies which part of the network it's address is valid and unique.

Coloned Decimals

The IPv6 addresses are comprised of 128-bits (or 8 groups of 4 hexadecimal digits separated by colons), with possibility of omitting zeros to abbreviate the full address. An example of IPv6 address may look like 2001:0db8:0012:0001:3c5e:7354:0000:5db1. For convenience, an IPv6 address can be represented in shorter notation by omitting leading zeros. The example address above can be also be represented as 2001:db8:12:1:3c5e:7354:0:5db1.
When abbreviating IPv6 address, the following rules apply:
  • One or more leading zeros in any group of 8 hexadecimal digits can be removed. For example, 0012 can be written 12 and 0000 can be converted to 0. (see example above).
  • Consecutive group of zeros are replaced with a double colon ::. The loopback address, 0000:0000:0000:0000:0000:0000:0000:0001 can be abbreviated to ::1.

What are the differences between IPv4 and IPv6?

The IPv4 and IPv6 share a similar architecture, and they will coexist until IPv6 completely replaces the IPv4.
  • IPv4 is represented by 32-bit number, and IPv6 is represented by 128-bit number. This translates to 4.3 billion address space for IPv4 and 340 trillion address space for IPv6.
  • IPv4 is separated by 4 groups of 2 hexadecimal digits by a dot, whereas IPV6 is separated by 8 groups of 4 hexadecimal digits by a colon.
  • IPv4 does not support short-hand notation, but IPv6 does by omitting leading zeros.

Why is IPv6 matter?

With an explosive demand for smartphones, tablets and computers, more IP addresses are needed than IPv4 can support. There are over 7 billion people in the world with phones, tablets and computers each requiring an IP address. The IPv4 has an address space of 4.3 billion, which will soon exhaust. The transition from IPv4 to IPv6 is necessary, and they will coexist as they are not interoperable.
The users will not likely notice the difference or even notice it. With over 95% of IP addresses being IPv4, it will be quiet some time before we'll see all devices communicating via IPv6.
Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP network. Any device connected to the IP network must have an unique IP address within the network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify an entity.

Dotted Decimals

The traditional IP Addresses (known as IPv4) uses a 32-bit number to represent an IP address, and it defines both network and host address. A 32-bit number is capable of providing roughly 4 billion unique numbers, and hence IPv4 addresses running out as more devices are connected to the IP network. A new version of the IP protocol (IPv6) has been invented to offer virtually limitless number of unique addresses. An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255). An example of IPv4 address is 216.3.128.12, which is the IP address previously assigned to iplocation.net.

An IPv4 address is divided into two parts: network and host address. The network address determines how many of the 32 bits are used for the network address, and remaining bits for the host address. The host address can further divided into subnetwork and host number.

Class A, B, C and CIDR networks
Traditionally IP network is classified as A, B or C network. The computers identified the class by the first 3 bits (A=000, B=100, C=110), while humans identify the class by first octet(8-bit) number. With scarcity of IP addresses, the class-based system has been replaced by Classless Inter-Domain Routing (CIDR) to more efficiently allocate IP addresses.
ClassNetwork AddressNumber of HostsNetmask
CIDR/4240,435,456240.0.0.0
CIDR/5134,217,728248.0.0.0
CIDR/667,108,864252.0.0.0
CIDR/733,554,432254.0.0.0
A/8 (1-126)16,777,216255.0.0.0
CIDR/98,388,608255.128.0.0
CIDR/104,194,304255.192.0.0
CIDR/112,097,152255.224.0.0
CIDR/121,048,576255.240.0.0
CIDR/13524,288255.248.0.0
CIDR/14262,144255.252.0.0
CIDR/15131,072255.254.0.0
B/16 (128-191)65,534255.255.0.0
CIDR/1732,768255.255.128.0
CIDR/1816,384255.255.192.0
CIDR/198,192255.255.224.0
CIDR/204,096255.255.240.0
CIDR/212,048255.255.248.0
CIDR/221,024255.255.252.0
CIDR/23512255.255.254.0
C/24 (192-223)256255.255.255.0
CIDR/25128255.255.255.128
CIDR/2664255.255.255.192
CIDR/2732255.255.255.224
CIDR/2816255.255.255.240
CIDR/298255.255.255.248
CIDR/304255.255.255.252
Note: (1) 127 Network Address reserved for loopback test. (2) Class D (224-247, Multicast) and Class E (248-255, Experimental) are not intended to be used in public operation. 

Public and Private IP Addresses 

In order to maintain uniqueness within global namespace, the IP addresses are publicly registered with the Network Information Center (NIC) to avoid address conflicts. Devices that need to be publicly identified such as web or mail servers must have a globally unique IP address, and they are assigned a public IP address. Devices that do not require public access may be assigned a private IP address, and make it uniquely identifiable within one organization. For example, a network printer may be assigned a private IP address to prevent the world from printing from it. To allow organizations to freely assign private IP addresses, the NIC has reserved certain address blocks for private use. A private network is a network that uses RFC 1918 IP address space. The following IP blocks are reserved for private IP addresses.
ClassStarting IP AddressEnding IP Address
A10.0.0.010.255.255.255
B172.16.0.0172.31.255.255
C192.168.0.0192.168.255.255
In addition to above classful private addresses, 169.254.0.0 through 169.254.255.255 addresses are reserved for Zeroconf (or APIPA, Automatic Private IP Addressing) to automatically create the usable IP network without configuration.

What is loopback IP address? 

The loopback IP address is the address used to access itself. The IPv4 designated 127.0.0.1 as the loopback address with the 255.0.0.0 subnet mask. A loopback interface is also known as a virtual IP, which does not associate with hardware interface. On Linux systems, the loopback interface is commonly called lo or lo0. The corresponding hostname for this interface is called localhost.
The loopback address is used to test network software without physically installing a Network InterfaceCard (NIC), and without having to physically connect the machine to a TCP/IP network. A good example of this is to access the web server running on itself by using http://127.0.0.1 or http://localhost.


Ip location

Friday, October 9, 2015


The KMPlayer is a versatile media player which can cover various types of container format such as VCD, DVD, AVI, MKV, Ogg Theora, OGM, 3GP, MPEG-1/2/4, WMV, RealMedia, and QuickTime among others. It handles a wide range of subtitles and allows you to capture audio, video, and screenshots in many ways.
The player provides both internal and external filters with a fully controlled environment in terms of connections to other splitters, decoders, audio/video transform filters and renderers without grappling with the DirectShow merit system. Internal filters are not registered to user's system to keep it from being messed up with system filters.
In December 2008 KMPlayer was bought by Pandora.tv, and continues to be made available as freeware.

Download

VLC Media Player is the most popular and robust multi format, free media player available. The open source media player was publically released in 2001 by non-profit organization VideoLAN Project. VLC Media Player quickly became very popular thanks to its versatile multi-format playback capabilities. It was aided by compatibility and codec issues which rendered competitor media players like QuickTime, Windows and Real Media Player useless to many popular video and music file formats. The easy, basic UI and huge array of customization options have enforced VLC Media Player’s position at the top of the free media players.
Flexibility
VLC plays almost any video or music file format you can find. At its launch this was a revolution compared to the default media players most people were using that often crashed or displayed “codecs missing” error messages when trying to play media files. VLC can play MPEG, AVI, RMBV, FLV, QuickTime, WMV, MP4 and a shed load of other media file formats. For a full list of compatible file formats please click here. Not only can VLC Media Player handle loads of different formats, VLC can also playback partial or incomplete media files so you can preview downloads before they finish.
Easy to Use
VLC’s UI is definitely a case of function over beauty. The basic look does however make the player extremely easy to use. Simply drag and drop files to play or open them using files and folders then use the classic media navigation buttons to play, pause, stop, skip, edit playback speed, change the volume, brightness, etc. A huge variety of skins and customization options mean the standard appearance shouldn’t be enough to prevent you choosing VLC as your default media player.
Advanced Options
Don’t let VLC Media Player’s simple interface fool you, within the playback, audio, video, tools and view tabs are a huge variety of player options. You can play with synchronization settings including a graphic equalizer with multiple pre-sets, overlays, special effects, AtmoLight video effects, audio spatializer and customizable range compression settings. You can even add subtitles to videos by adding the SRT file to the video’s folder.
Download


MediaMonkey is a music manager and music player for serious music collectors. It catalogues your CDs and your audio files such as OGG, WMA, MPC, FLAC, APE, WAV and MP3. It offers an intelligent tag editor which looks up missing Album Art and track information via Freedb and the web. The app also has an automated file and directory namer to organize your music library.
Key Features Include:
  • Organize music and edit tags in your audio library with a powerful, intuitive interface.
  • Automatically lookup and tag Album Art and other metadata.
  • Manage 50,000+ files in your music collection without slowdown.
  • Play MP3s and other audio formats, and never again worry about varying volume.
  • Record CDs into OGG, MP3, FLAC and WMA files.
  • Convert MP3s, OGG, FLAC and WMA files into other formats with the Audio Converter.
  • Create playlists and music mixes quickly and easily to suit any occasion.
  • Synchronize with iPods / MP3 players effortlessly and convert tracks on-the-fly.
  • Download audio content using the new integrated Podcatcher.
  • Use MediaMonkey for Parties with Party Mode.
  • Create Statistics and other Reports of your music collection as Excel, html, or xml files.
  • Customizable Skins, visualizations, plug-ins and scripts to make MediaMonkey do what you want it to.
Download

The K-Lite Codec Pack is a collection of DirectShow filters, VFW/ACM codecs and tools. Codecs and DirectShow filters are needed for encoding and decoding audio and video formats. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your audio and movie files.

The K-Lite Codec Pack has a couple of major advantages compared to other codec packs:

It is updated frequently. So it is always up-to-date with the newest and/or best components.
All components have been carefully selected for specific purposes. It is not just a random bunch of stuff thrown together.
It is very user-friendly and easy to use.
The installation is fully customizable, meaning that you are able to install just those components that you really want.
The customization abilities go beyond the component level. Some components are able to handle multiple formats. You can specify exactly which components should handle which formats. The pack can thus be fully tweaked to your own specific needs and preferences.
Uninstallation removes everything that was installed by the pack. Including all registry keys.
It is extremely easy to make a fully customized unattended installation with the integrated wizard.
It does not contain any bad, buggy or unstable codecs.
With the K-Lite Codec Pack you should be able to play all the popular audio and video formats and even several less common formats.

Download
 K-Lite Codec Pack 11.50 (Full)

Filehippo

Wednesday, October 7, 2015

If you need to install or reinstall Windows 10, you can use the tools on this page to create your own installation media using either a USB flash drive or a DVD.

Before you begin

  • Make sure you have:
    • An internet connection (internet service provider fees may apply).
    • Sufficient data storage available on a computer, USB or external drive for the download.
    • A blank USB or DVD (and DVD burner) with at least 4 GB of space if you want to create media. We recommend using a blank USB or blank DVD, because any content on it will be deleted.
  • Read the System Requirements.
  • If you will be installing the operating system for the first time, you will need your Windows product key (xxxxx-xxxxx-xxxxx-xxxxx-xxxxx). For more information about product keys and when they are required, visit the FAQ page.   
Use the media creation tool to download Windows. This tool provides the best download experience for customers running Windows 7, 8.1 and 10. To learn how to use the tool, go to the Installing Windows 10 using the media creation tool page. Tool includes:
  • File formats optimized for download speed.
  • Built in media creation options for USBs and DVDs.
  • Optional conversion to ISO file format.
If you’re on an Enterprise edition, the media creation tool won’t work for an upgrade. Please see the Volume Licensing Service Center for more information.
IMPORTANT: To upgrade for free, select Upgrade this PC now in the tool. You should NOT be asked for a product key during the upgrade process. If you create a USB and use it to install, make sure to remove the USB as soon as setup begins. If you don't, you may be prompted for a product key. If this happens, remove the USB and restart your PC to continue with setup.
Will you be running the tool from a 32 bit or a 64 bit device? Download the version for the device that will run the tool.
Subscribe to RSS Feed Follow me on Twitter!