1. get the right next IP of addresses of first byte 0 2. refactor some methods to handle illegal IPs or IPNets 3. add some unit tests Signed-off-by: Bruce Ma <brucema19901024@gmail.com>