Describe concept of subnetting and subnet mask

Assignment Help Computer Networking
Reference no: EM1369907

Q1) Explain the concept of subnetting and the concept of subnet masks. Why do we use subnetting? How do we know which bits are used to identify the network?

Q2) Present and discuss the results in Lab report. Why is it possible to make two subnets when a class C address and subnet mask of 255.255.255.128 was used? What happens when 255.255.255.255 is used as a subnet mask? What is the difference in the results when class B address is used? Press the CIDR Calculator tab. Enter address 132.168.123.144. Choose CIDR subnet mask to be 15 bits long. Generate 4, 32, 128 and 2048 subnets. Note the number of subnet bits needed for each case. Note the Host range and the Subnet Size for each case.

Q3) Explain the obtained results.

Q4) Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. Suppose all of the interfaces in each of these three subnets are required to have a prefix 223.1.17/24. Also suppose that subnet 1 is required to support up to 125 interfaces, and subnets 2 and 3 are each required to support up to 60 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints. You can use Advanced Subnet Calculator to solve this problem.

Reference no: EM1369907

Questions Cloud

Determine maximum size of set l-tcp sequence number : Determine the maximum size of set L such that TCP sequence number doesn't run out? Remember TCP sequence number field size is 4 bytes.
Career planning : What skills and temperaments do you believe are needed for a successful career in planning and is this something you would be interested in doing yourself?
Determine minimum efficient scale of production : Town employees occasionally use their own automobiles on official business. The currentreimbursement rate is $.25 per mile. The employees union complains to town manager thatnumerous studies demonstrate
Managerial incompetence or inexperience : Prepare an organization chart.Must be my own develop chart not one form the internet and have my name steven on it
Describe concept of subnetting and subnet mask : Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?
Risk management question : Prepare a paper in which you define the following corporate risk terms and describe their relevance to your organization
Computation of of long run equilibrium price : Suppose that the position of a nation's aggregate demand curve has not been changed, but long-run equilibrium price level has declined.
Business resolve an hr issue : Strategic Result In this section, share how this technology recommendation will create a strategic approach to solving the problem chosen.
Determine seperate total of positive and negative numbers : Read set of 40 positive and negative numbers entered from keyboard and determine seperate total of positive and negative numbers. How to show modular design of above statement

Reviews

Write a Review

Computer Networking Questions & Answers

  How many users can be supported if circuit switching is used

Suppose users share a 1Mbps link. Also suppose each user requires 100Kbps when transmitting, but each user transmits only 20% of the time. When circuit switching is used, how many users can be supported?

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  Address type certification certification issue with company

Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system

  Creating plan to set up local area network

Create a plan to set up a local area network. Design a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan.

  Purpose of key tag in rrsig resource record

Determine the purpose of the key tag in the RRSIG resource record.

  Relationship-individual characteristics and job satisfaction

What is the relationship between individual characteristics and job satisfaction?

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  Investigate employees connect using wireless and not cables

You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Design ip network based on requirements for company

XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Design the IP network based on the requirements stated above.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd