Question

In: Computer Science

if I want to set a network in a company, this network consist of a PCs,...

if I want to set a network in a company, this network consist of a PCs, laptops and a printer;

given that the number of needed host (PCs and laptops) is 73.

how many subnets are possible?

and how many subnets are required?

what is the number of usable IP addresses that are needed?

please help with a detailed answer so i can learn how to calculate other similar questions

Solutions

Expert Solution

For 73 Host,

Possible addresses- 128

We can consider 255.255.255.128 net mask that are available for 126 hosts.

The total number of IP addresses in a subnet is a power of two. So that's: 1, 2, 4, 8, 16, ... etc.

The first IP address in a subnet is a multiple (0, 1, 2, 3 ...) of the number of IP addresses in the subnet.

For example you started with IP address-192.168.1.24 for subnet- 255.255.255.128

IP Address: 192.168.1.24
Network Address: 192.168.1.0
Usable Host IP Range: 192.168.1.1 - 192.168.1.126
Broadcast Address: 192.168.1.127
Total Number of Hosts: 128
Number of Usable Hosts: 126
Subnet Mask: 255.255.255.128
Wildcard Mask: 0.0.0.127
Binary Subnet Mask: 11111111.11111111.11111111.10000000
IP Class: C
  • All 2 of the Possible /25 Networks for 192.168.1.*
Network Address Usable Host Range Broadcast Address:
192.168.1.0 192.168.1.1 - 192.168.1.126 192.168.1.127
192.168.1.128 192.168.1.129 - 192.168.1.254 192.168.1.255

/25 -- 2 Subnets -- 126 Hosts/Subnet

Network # IP Range Broadcast
.0 .1-.126 .127
.128 .129-.254 .255
  • Size: 128

Netmask: 255.255.255.128 or /25
Starts with multiple of 128;
Note: This is a rather large subnet.

'd' in IP address a.b.c.d;
1st - last 1st - last
0 - 127 128 - 255

Related Solutions

What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks...
What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks of MACsec(IEEE 802.1AE). What is there?
You are an IT company and want to get a daycare's network design, hardware, software, and...
You are an IT company and want to get a daycare's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. DMZ Architecture: What is your DMZ architecture? What devices and their function are included? How are DMZ devices connected? How are you planning to provide security to protect the DMZ and at the same time maintaining friendly access to customers?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. What’s the difference between IDS and Firewall? What is a promiscuous mode in IDS? What is an in-line mode in IDS? When is appropriate to use one or the other in your network? Specific to a travel agency what firewall & IDS vendors’ such as Palo Alto Networks, Check Point, Cisco, etc., and select product(s) suitable for the travel agency. Justify your...
Hello I have a data set of stock price from previous year. I want to know...
Hello I have a data set of stock price from previous year. I want to know the probability of stock price to be more than a certain value after x days starting from where the dataset ends. Which way do i need to approach. I thought of logistic regression, if its correct what do i need to do to move forward. Thank you!
You are an IT company and want to get a travel agency's network design, hardware, software, and security.
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Submit a list of all e-Commerce applications required in the enterprise network. Make sure to include a description of each application.
The following is a small data set of 25 observations. I want you to calculate some...
The following is a small data set of 25 observations. I want you to calculate some statistics by hand to cement the class material. You can use the regular formula for the variance or the computational formula - I’m just interested in the correct result. If you use the computational formula, you will want to calculate a separate row of each value squared in order to calculate the Sum(x^2). Excel can be used to solve this problem. VarX 44 34...
The following is a small data set of 25 observations. I want you to calculate some...
The following is a small data set of 25 observations. I want you to calculate some statistics by hand to cement the class material. You can use the regular formula for the variance or the computational formula - I’m just interested in the correct result. If you use the computational formula, you will want to calculate a separate row of each value squared in order to calculate the Sum(x^2). Excel can be used to solve this problem. VarX 44 34...
You want to train a feedforward network to recognize a hand written symbol. The network should...
You want to train a feedforward network to recognize a hand written symbol. The network should have 7 hidden layers with 4 neurons each and categorize the image into one of 8 possible categories. The input is an image with resolutions 5 x 2 and a color depth of 2. Each layer - including the input - must have one additional neuron outside what was allocated, as a bias term. In total, how many trainable individual weight parameters (not matrices)...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT