Question

In: Computer Science

As the network administrator for a growing ISP, you want to make efficient use of your...

As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four subnetwork addresses the mask will create. [5 marks]

please answer fast in 30 minutes and the subject is data commniucations and network.

Solutions

Expert Solution

The Class C network (lets say 192.168.1.0) has the ability to have 254 hosts (192.168.1.1 - 192.168.1.254, due to the fact that the 192.168.1.0 is the network address and 192.168.1.255 is the network address).

If you break down the subnet mask in to binary (11111111.11111111.11111111.00000000)
you will see that there are 8 spots here. To break this down you will go like this
|128|64|32|16|8|4|2|1|
so you can see that the proper mask will end up being 11111111.11111111.11111111.|1|1|1|1|0|0|0|0| in binary. As this spot will allow 16 addresses per network. It also allows for 16 networks.
To calculate that in decimal it would be 128+64+32+16 = 240 giving a 255.255.255.240 mask. End result 16 networks with 16 addresses per network with upto 14 usable addresses per network. Meeting the requirements for your 16 customers, each having 10-14 addresses needed per network.

The networks will be
192.168.1.0
192.168.1.16
192.168.1.32
192.168.1.48

Each network will be able to exactly hold 14 address (because of the first and last being the network and broadcast addresses) and your mask will be 255.255.255.240.


Related Solutions

As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
You are a network administrator for your organization and arerequired to plan and deploy a...
You are a network administrator for your organization and are required to plan and deploy a new file and print server that will service Windows, Linux, and Macintosh client computers. In addition, the server will provide DHCP services on the network and host a small Web site listing company information. In a brief document, draft the services that you plan to implement for this server and the methods that you will use to maximize the security of the system.
You have been named the network administrator for a large insurance firm. Your responsibility is to...
You have been named the network administrator for a large insurance firm. Your responsibility is to come up with a plan for the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in deploying the infrastructure (LANs, firewalls, routers, switches, IDS and sensors, servers, database servers, and addressing scheme) including specifics about the configurations. An understanding of the security issues the company...
You work as a network administrator for a college located in your local city. Next door...
You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have been moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes...
You want to use the idea of electromagnetic induction to make the bulb in your small...
You want to use the idea of electromagnetic induction to make the bulb in your small flashlight glow; it glows when the potential difference across it is 1.5 V. You have a small bar magnet and a coil with 100 turns, each with area 3.0
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
(b) You have been employed as a network administrator in an organization. If you have to...
(b) You have been employed as a network administrator in an organization. If you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this? (c) Of the various firewall types available for use in a business network, which type collects network connection information...
With your knowledge on the Efficient Market Hypothesis answer to the following questions: Suppose you want...
With your knowledge on the Efficient Market Hypothesis answer to the following questions: Suppose you want to study the aerospace industry to invest your money in it. Your studies show that the industry has had some steady growth and has never missed dividend payments in the past 100 years. Does it make the stocks in this industry attractive enough for you to use in your portfolio? Why and why not?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT