Question

In: Computer Science

1) Suppose we have the following IP addresses for two different organizations, we have to create...

1) Suppose we have the following IP addresses for two different organizations, we have to create 5 networks having 30 hosts in it. Find first sub network ID, Fist address, Last address and Broadcast for each of the following given addresses?

a) 14.23.120.8

b) 252.5.15.111

Solutions

Expert Solution

Network ID

First address

Last address

Broadcast

14.23.120.0

14.23.120.1

14.23.120.30

14.23.120.31

14.23.120.32

14.23.120.33

14.23.120.62

14.23.120.63

14.23.120.64

14.23.120.65

14.23.120.94

14.23.120.95

14.23.120.96

14.23.120.97

14.23.120.126

14.23.120.127

14.23.120.128

14.23.120.129

14.23.120.158

14.23.120.159

We need 30 hosts per subnet and formula of IPv4 is 2^n where n is number of bits to borrow from default subnet mask where here default subnet mask is used for class c which is 255.255.255.0 where 256 hosts are available but we divide it into 5 subnet so we cant get that exact number as 2^n is applied so we will get 8 subnet 2^3=8 so we need 3 bits to borrow from 255.255.255.0 so new subnet mask will be 255.255.255.224 and bits are borrowed from binary so for clarification.

11111111.11111111.11111111.00000000 for 255.255.255.0
11111111.11111111.11111111.11100000 new subnet mask with 8 subnet 255.255.255.224

same calculation for 2nd network

Network ID

First address

Last address

Broadcast

252.5.15.0

252.5.15.1

252.5.15.30

252.5.15.31

252.5.15.32

252.5.15.33

252.5.15.62

252.5.15.63

252.5.15.64

252.5.15.65

252.5.15.94

252.5.15.95

252.5.15.96

252.5.15.97

252.5.15.126

252.5.15.127

252.5.15.128

252.5.15.129

252.5.15.158

252.5.15.159

if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and i can edit and change the answers if you argue, thanks :)


Related Solutions

You have been asked to create a list of all MAC addresses and corresponding IP addresses...
You have been asked to create a list of all MAC addresses and corresponding IP addresses and computer names in your network. Propose at least two methods for performing this task. Your network has almost 100 computers in a Windows Server 2016 domain network with statically assigned IP addresses. Using the tools available in Windows Server 2016, carry out the procedure you think will work best. Write a short report of your results and submit it to your instructor.
1) Windows Powershell: Maps IP addresses to MAC addresses. Maps IP addresses to MAC addresses. Run...
1) Windows Powershell: Maps IP addresses to MAC addresses. Maps IP addresses to MAC addresses. Run arp /? What does the command show? 2) Ping is used to test the ability of one network host to communicate with another. Run: ping cnn.com or ping yahoo.com or ping facebook.com write down the results
PC2 and PC4 have been configured correctly with the IP addresses 172.156.2.22 and 172.156.2.44. But PC2...
PC2 and PC4 have been configured correctly with the IP addresses 172.156.2.22 and 172.156.2.44. But PC2 cannot communicate with PC4 (i.e., they cannot ping each other). The network technician knows that the problem is related to some configuration settings. What would be missing in the configuration? On which device(s)? [write your answer in no more than 25 words] Based on your answer in (1), what will you do to prove that you are right? [write your answer in no more...
For the following classess IP addresses, identify what the ned id and the host id are...
For the following classess IP addresses, identify what the ned id and the host id are 119.120.231.15/12 11.30.125.141/17 244.192.168.10/18 199.10.155.121/28
"We want to verify that IP(·) and IP^-1(·) are truely inverse operations. We consider a vector...
"We want to verify that IP(·) and IP^-1(·) are truely inverse operations. We consider a vector x = (x1, x2, . . . ,x64) of 64 bit. Show that IPfive bits of x, i.e. for xi, i = 1,2,3,4,5.
Suppose We put five different dice into a hat. The dice have the following number of...
Suppose We put five different dice into a hat. The dice have the following number of side:4,6,8,12,20. When we choose a die from the hat, each of the five of the dice are equally likely to appear. a) What is the probabilty that a “6” appears? b) Now, suppose a “6” appears, what is the probability is was the 6-sided die that was chosen?
total compensation plans for two organization. The organizations must be in different industries, have different employee...
total compensation plans for two organization. The organizations must be in different industries, have different employee groups, and utilize different pay strategies. Assess direct and indirect reward plans available to two types of employee positions. The total reward plans that are offered The similarities and differences that exist among the plans How well each organization's reward plan supports expectations
Explain an example in which a variable has two different addresses at different places in a...
Explain an example in which a variable has two different addresses at different places in a program.
Use the following network address: 172.192.0.0/10 to create four (4) different /12 subnet addresses. Identify the...
Use the following network address: 172.192.0.0/10 to create four (4) different /12 subnet addresses. Identify the range of IPv4 addresses. Identify the broadcast address for each of the above subnet addresses.
An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations...
An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations each with 408 hosts, two organizations each with 128 hosts, and three organizations each with 42 hosts. • Find the number and range of addresses in the ISP block. • Find the range of addresses for each organization and the range of unallocated addresses. • Show the outline of the address distribution and the forwarding table.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT