Question

In: Computer Science

As the network administrator for a growing ISP, you want to make efficient use of your...

As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four subnetwork addresses the mask will create.

Solutions

Expert Solution

Given IP: 192.168.88

We need to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each.
Next power of 2 after 18 = 32
Next power of 2 after 24 = 32

Total network addresses required = 32*32=2^10

Number of bits required =10

Netmask=32-10=22

Therefore:

Address: 192.168.88.0

Netmask: 255.255.252.0 = 22

Hosts/Net: 1022


Subnets

So, our IP address becomes: 192.168.88.0/22

We need to get 20 to 24 addresses for this we will require 5 bits. Out netmask for the subnet = 27.
We will get 32 subnets with 30 hosts per network

Netmask:   255.255.255.224 = 27


The first four subnet address are:

Network:   192.168.88.0/27
Broadcast: 192.168.88.31 
HostMin:   192.168.88.1
HostMax:   192.168.88.30
Hosts/Net: 30

Network:   192.168.88.32/27     
Broadcast: 192.168.88.63
HostMin:   192.168.88.33        
HostMax:   192.168.88.62
Hosts/Net: 30                   

Network:   192.168.88.64/27
Broadcast: 192.168.88.95        
HostMin:   192.168.88.65        
HostMax:   192.168.88.94
Hosts/Net: 30                   

Network:   192.168.88.96/27
Broadcast: 192.168.88.127       
HostMin:   192.168.88.97        
HostMax:   192.168.88.126       
Hosts/Net: 30


Related Solutions

As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
You are a network administrator for your organization and arerequired to plan and deploy a...
You are a network administrator for your organization and are required to plan and deploy a new file and print server that will service Windows, Linux, and Macintosh client computers. In addition, the server will provide DHCP services on the network and host a small Web site listing company information. In a brief document, draft the services that you plan to implement for this server and the methods that you will use to maximize the security of the system.
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a networking problem from the internet and design the networking solution. Use lucidchart or vision.
You have been named the network administrator for a large insurance firm. Your responsibility is to...
You have been named the network administrator for a large insurance firm. Your responsibility is to come up with a plan for the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in deploying the infrastructure (LANs, firewalls, routers, switches, IDS and sensors, servers, database servers, and addressing scheme) including specifics about the configurations. An understanding of the security issues the company...
You work as a network administrator for a college located in your local city. Next door...
You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have been moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes...
You want to use the idea of electromagnetic induction to make the bulb in your small...
You want to use the idea of electromagnetic induction to make the bulb in your small flashlight glow; it glows when the potential difference across it is 1.5 V. You have a small bar magnet and a coil with 100 turns, each with area 3.0
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
(b) You have been employed as a network administrator in an organization. If you have to...
(b) You have been employed as a network administrator in an organization. If you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this? (c) Of the various firewall types available for use in a business network, which type collects network connection information...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT