Has this network been sub-netted

Assignment Help Computer Networking
Reference no: EM13166597

 Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network? b. Has this network been sub-netted? How do you know? c. How many IP addresses would there be on the above network (show your work)? d. How would this IP address be expressed using CIDR notation (show your work)? e. What is the range of the block of addresses this Host belongs to using CIDR notation? f. Give the network address and the broadcast address of the network this Host belongs to. 

Reference no: EM13166597

Questions Cloud

Modify the btod procedure : Modify the BTOD procedure so that leading zeros are replaced by blanks. For example, if the result is "0" - "5" - "9," the leading 0 in the hundreds position gets replaced by a blank, giving " " - "5" - "9."
Non-finitely-describable languages closed underconcatenation : Are the non-finitely-describable languages closed under concatenation? Kleene closure? Complementation? Union?
Use a loop to allow a user to enter a series of numbers : Use a loop to allow a user to enter a series of numbers and then print out the series of numbers when the user is done. The user stops the lseries program by entering -1 (or any negative number).
Prints out a summary for a list of prescriptions : Create a class that prints out a summary for a list of prescriptions. Using your Prescription class and some if statements you will read in 3 prescriptions and print out an appropriate summary with a list of the prescriptions
Has this network been sub-netted : Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?
Extended grep for regular expressions : That contain the word "as" exactly onceb) that contain the word "sa" more than once
What ip range would an isp provide to a customer : Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a)
Program that evaluates a infix expression : Program that evaluates a infix expression using stacks terminated by an equal sign. for example: (4-2)-5)/(2+1)-2))=the expression will contain single digit and the operators +, -, *,/. Make sure to consider the operator precedence.
Life with plaster cast-painting-within-a-painting : Explain why you think an artist might choose to re-paint a painting into his or her work. In what ways is it the same painting? In what ways does it become different?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the steps take to stop cybersquatter

You are a owner of the register trademark, and you just found that domain name is being held hostage for large sum of money. In around 300 words, Explain the steps which you would take to stop cybersquatter.

  The law of diminishing returns

The law of diminishing returns says that you get a smaller and smaller return (benefit) as you invest more and more. An example would be: if you spend $100 on insulating your home

  What is the total efficiency of the protocol

What would the value of the field containing the parity bits be for the case of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  What are the four addresses for network

If you have a class B network and want to divide it into subnets, each with 126 hosts, which subnet mask should you use? What are the four addresses (broadcast and network number) for the network starting at 131.204.18?

  What resources are available on the internet

What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation? (List at least three resources in your response.)

  Compute total time required to transfer file

Compute the total time required to transfer a 1000KB file on a 1Mbps link with an RTD of 100msec ans a packet size of 1 KB in the following cases.a).

  Deduce expression for link utilization u of data link

Deduce the expression for link utilization U of a data link which uses sliding-window flow control and returns ACK for every OTHER frame received.

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Analyze network security threats and vulnerabilities

Given the need for secure, online business communications, analyze network security threats and vulnerabilities and design network security solutions

  How many times message m is modified before destination

When a message travels from source to destination through two routers, how many times the message M is modified before it reaches to the destination as M. Show your work to determine this number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd