Question

In: Computer Science

Exercise 2: Identifying Invalid IP Addresses with the default Subnetmask, explain your answer a. 131.107.256.80 b....

Exercise 2: Identifying Invalid IP Addresses with the default Subnetmask, explain your answer a. 131.107.256.80 b. 222.222.255.222 c. 231.200.1.1 d. 126.1.0.0 e. 0.127.4.100 f. 190.7.2.0 g. 127.1.1.1 h. 198.121.254.255 i 255.255.255.255

Solutions

Expert Solution

Solution:

(2)

The answer will be "(a) 131.107.256.80"

(a)

Given,

=>IP address = 131.107.256.80

Explanation:

=>IP address is of 32 bits, each octet contains 8 bits.

=>8 bits values can be from 00000000(0) to 11111111(255).

=>So range of each octet = [0, 255]

=>In the given IP address third octet value is 256 hence it is not a valid IP address.

(b)

Given,

=>IP address = 222.222.255.222

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address.

(c)

Given,

=>IP address = 231.200.1.1

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address.

(d)

Given,

=>IP address = 126.1.0.0

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address.

(e)

Given,

=>IP address = 0.127.4.100

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address.

(f)

Given,

=>IP address = 190.7.2.0

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address.

(g)

Given,

=>IP address = 127.1.1.1

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address

(h)

Given,

=>IP address = 198.121.254.255

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address

(i)

Given,

=>IP address = 255.255.255.255

Explanation:

=>In the given IP address all the octet's value come in the range [0, 255] hence the given IP address is a valid IP address

I have explained each and every part with the help of statements attached to it.


Related Solutions

- Is using HTML5 will support responsiveness by default? Explain your answer. - Search for some...
- Is using HTML5 will support responsiveness by default? Explain your answer. - Search for some of the libraries or frameworks that can help you to build a more responsive web page and write down some of your findings. - In your opinion, is it better to use a library? and why? argue with your colleagues by posing at least one response to their post.
Explain when a basis adjustment for loss property is taken. Include in your answer the default...
Explain when a basis adjustment for loss property is taken. Include in your answer the default application and election available to Corporation/Shareholder. Discuss when it would make sense to use the election. Include in your answer an example to illustrate your analysis.
[Only answer part 2] part 1: What is the public IP address of your machine? How...
[Only answer part 2] part 1: What is the public IP address of your machine? How can you know your public IP address of the machine? (Hint: ask Google.) How does a website know your public IP address? Is it different from the IP address shown on the network interface obtained by ifconfig? part2: Why are they different? (Hint: NAT.) What does this NAT thing do (briefly explain it in one sentence)? Who did it? (Hint: the VirtualBox software may...
1. Explain the conflict between regionalism and the GATT/WTO system. Make sure your answer addresses trade...
1. Explain the conflict between regionalism and the GATT/WTO system. Make sure your answer addresses trade creation versus trade diversion 2. Explain the two major reasons why the GATT/WTO process has stalled. Who is harmed by a “nonfunctioning” global trade negotiating system? What would it take to reinvigorate the process? 3.  Through what processes did cartels try to manipulate the price of commodities? State and briefly explain two mechanisms.
Answer all questions in full answer google the case 1- In continuing your understanding of IP...
Answer all questions in full answer google the case 1- In continuing your understanding of IP protection you are to research the concept of trade dress and how this was a factor in the case of Knitwaves vs Lolly Togs. What was the basis of the case and what was the outcome. 2- Research the case of Louis Vuitton vs Dooney & Burke and post your understanding of the IP violation that was involved and what was the outcome? 3-...
Write a 1-page paper that addresses the following: Explain your diagnosis for the patient, including your...
Write a 1-page paper that addresses the following: Explain your diagnosis for the patient, including your rationale for the diagnosis. Describe an appropriate drug therapy plan based on the patient’s history, diagnosis, and drugs currently prescribed. Justify why you would recommend this drug therapy plan for this patient. Be specific and provide examples. Please review the rubric. Patient HL comes into the clinic with the following symptoms: nausea, vomiting, and diarrhea. The patient has a history of drug abuse and...
Exercise 14-12 Partially correct answer. Your answer is partially correct. Try again. On January 2, 2012,...
Exercise 14-12 Partially correct answer. Your answer is partially correct. Try again. On January 2, 2012, Cheyenne Corporation issued $2,100,000 of 10% bonds at 97 due December 31, 2021. Interest on the bonds is payable annually each December 31. The discount on the bonds is also being amortized on a straight-line basis over the 10 years. (Straight-line is not materially different in effect from the preferable “interest method”.) The bonds are callable at 102 (i.e., at 102% of face amount),...
7. With regard to credit default swaps, explain: a) The general concept b) The contributing role...
7. With regard to credit default swaps, explain: a) The general concept b) The contributing role they played overall in the Great Recession c) The unusual application of them in the “The Big Short”
Normalize the following data by: a) identifying the functional dependencies, b) stating your assumptions, \ c)...
Normalize the following data by: a) identifying the functional dependencies, b) stating your assumptions, \ c) creating relations, and d) identifying primary and foreign keys. Customer Number| First Name |Last Name |Phone | Invoice Number| Date |Item Type |Quantity Item Price
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure....
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure. Why is it important to know Subnetting and VLSM? 2.) Explain Functions at the OSI and TCP/IP Model Layers.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT