What is subnet mask

Assignment Help Computer Engineering
Reference no: EM132333021

Explain the Internet Protocol (IP) in detail. If necessary, include a diagram or an example in your posting/answer (a picture or an example is worth a thousand words!) Your answer/posting should answer one or more questions below:

- What is an IP address? Why is an IP address important? Can you convert a 8 bit binary number to a decimal number (or a decimal number to a 8 bit binary number)? Does an IP address consist of four octets (or how many bits in an IP address?)? Is 123.234.23.256 a valid IP address? Can you convert an IP address in decimal form to one in binary format? Explain how. Any example?

- What is a classful IP address? Classful vs Classless IP address (what is the difference?).

- What is a subnet mask? Why do we need a subnet mask? If an IP address alone good enough? What is a (default) subnet mask of a class A (or B and C) IP address? If an IP address is classful, do we really need a subnet mask information? For example, 221.123.12.7 is a class A IP address? What is the (default) subnet mask of 221.123.12.7?

- An IP address is called hierarchical as it is made up of two parts: a network portion and a host portion. What are a network portion and a host portion of an IP address? To answer this question, you should understand the job of a subnet mask.

- Explain private IP addresses vs public IP addresses. What is the difference? Why do we need a private IP address?

- What is an IP header? In the IP header, there are many different IP header fields. What do you think the most important fields are in the IP header?

- Explain a OSI model. In the OSI model, Is IP a layer 3 (or a network layer) protocol ? Is a router a layer 3 device (or why explain why a router is called a layer 3 device)

Do NOT discuss the followings:

-IP version 6

- IP subnetting or VLSM (Variable Length Subnetting Mask)

Reference no: EM132333021

Questions Cloud

From the cryptography flash cards in this week learning : From the Cryptography Flash Cards in this week's learning, please select one term, and include the following as your primary discussion response:
Social information technology and business frameworks : Social Information Technology (IT) and Business Frameworks. The Leavitt Business Diamond framework consists of four crucial components.
The target of network or system intrusion : Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted?
What is data mining : What is Data Mining ? The article discussed Customer Insights and Disney. How could Customer Insights be used on a cruise ship?
What is subnet mask : What is a classful IP address? Classful vs Classless IP address (what is the difference?). What is a subnet mask? Why do we need a subnet mask?
Most of us have had to deal with passphrase policies : Most of us have had to deal with passphrase policies that include things like "must include two uppercase characters, two lowercase characters,
Malware developers to disguise their code : Discuss the techniques used by malware developers to disguise their code and prevent it from being analyzed.
Club membership activities are managed by database : The Baltimore Horse Club has about 100 members. All the club's membership activities are managed by a database.
Tonya foreshadows some serious obstacles to overcome : In discussion with Josh, Tonya foreshadows "some serious obstacles to overcome." Describe these obstacles in detail.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compare the role of share and ntfs permissions

"magz64"- Compare and contrast the role of share and New Technology File System (NTFS) permissions, and the manner in which an administrator uses them in order to secure resources (i.e., files, folders) on a computer.

  Calculate the mortgage payments

A program written in Java (without a graphical user interface) that will compute and display the monthly payment amount to fully amortize a $200,000.00 loan over a 30 year term at 5.75? interest.

  Suggest an efficient representation for your abstract type

Suggest an efficient representation for your abstract type. Use any suitable programming language.

  Create a slide on security center of excellence

Create a slide of risk management. Create a slide on security center of excellence and security framework (Security lifecycle, disaster recovery).

  Describe adornos views on pseudo-individualization

Describe Adorno's views on standardization and pseudo-individualization. Do you find merit in or agree with Adorno's theory of popular culture? Why or why not?

  How many firewalls should protect the application

What considerations and methods can be used to ensure easy downloading and reading of the encrypted documents while minimizing the risk of compromise?

  Explain what the cpu should do when an interrupt occurs

Explain what the CPU should do when an interrupt occurs. Include in your answer the method the CPU uses to detect an interrupt, how it is handled, and what happens when the interrupt has been serviced.

  Constructing a workable methodology

You will need to describe the overall process and the main elements i.e. the main stages or phases, the main techniques and when they would be used

  Explain why to implement a queue using a linked list

Explain why, to implement a queue using a linked list, it is recommended to extract nodes from the top of the list and insert nodes at the tail of the list.

  Describe the impact that crowdsourcing has had

Examine the invention and growth of crowdsourcing in the field of interface design. Describe the impact that crowdsourcing has had on the field of interface design.

  Define the cloud services for business continuity

The CEO of your company is concerned that a natural disaster could make your company's information systems unavailable long enough to significantly.

  Add functionality to your companys web site

You are the project manager for a project to add functionality to your company's web site. The project has been broken down into four iterations (releases).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd