Question

In: Computer Science

if I want to set a network in a company, this network consist of a PCs,...

if I want to set a network in a company, this network consist of a PCs, laptops and a printer;

given that the number of needed host (PCs and laptops) is 73.

how many subnets are possible?

and how many subnets are required?

what is the number of usable IP addresses that are needed?

please help with a detailed answer so i can learn how to calculate other similar questions

Solutions

Expert Solution

For 73 Host,

Possible addresses- 128

We can consider 255.255.255.128 net mask that are available for 126 hosts.

The total number of IP addresses in a subnet is a power of two. So that's: 1, 2, 4, 8, 16, ... etc.

The first IP address in a subnet is a multiple (0, 1, 2, 3 ...) of the number of IP addresses in the subnet.

For example you started with IP address-192.168.1.24 for subnet- 255.255.255.128

IP Address: 192.168.1.24
Network Address: 192.168.1.0
Usable Host IP Range: 192.168.1.1 - 192.168.1.126
Broadcast Address: 192.168.1.127
Total Number of Hosts: 128
Number of Usable Hosts: 126
Subnet Mask: 255.255.255.128
Wildcard Mask: 0.0.0.127
Binary Subnet Mask: 11111111.11111111.11111111.10000000
IP Class: C
  • All 2 of the Possible /25 Networks for 192.168.1.*
Network Address Usable Host Range Broadcast Address:
192.168.1.0 192.168.1.1 - 192.168.1.126 192.168.1.127
192.168.1.128 192.168.1.129 - 192.168.1.254 192.168.1.255

/25 -- 2 Subnets -- 126 Hosts/Subnet

Network # IP Range Broadcast
.0 .1-.126 .127
.128 .129-.254 .255
  • Size: 128

Netmask: 255.255.255.128 or /25
Starts with multiple of 128;
Note: This is a rather large subnet.

'd' in IP address a.b.c.d;
1st - last 1st - last
0 - 127 128 - 255

Related Solutions

What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks...
What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks of MACsec(IEEE 802.1AE). What is there?
You are an IT company and want to get a daycare's network design, hardware, software, and...
You are an IT company and want to get a daycare's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a daycare's network design, hardware, software, and...
You are an IT company and want to get a daycare's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. DMZ Architecture: What is your DMZ architecture? What devices and their function are included? How are DMZ devices connected? How are you planning to provide security to protect the DMZ and at the same time maintaining friendly access to customers?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. What’s the difference between IDS and Firewall? What is a promiscuous mode in IDS? What is an in-line mode in IDS? When is appropriate to use one or the other in your network? Specific to a travel agency what firewall & IDS vendors’ such as Palo Alto Networks, Check Point, Cisco, etc., and select product(s) suitable for the travel agency. Justify your...
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Submit a list of all e-Commerce applications required in the travel agency's network. Make sure to include a description of each application.
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Routing Protocols. Are routed protocol and routing protocol the same?  Give examples of both. What routing protocol(s) are you planning to use in the travel agency network? Justify your selection. As the travel agency network uses private ip addresses, what routing feature does need to be configured to access the WAN with public ip address? What device does have the feature?
Hello I have a data set of stock price from previous year. I want to know...
Hello I have a data set of stock price from previous year. I want to know the probability of stock price to be more than a certain value after x days starting from where the dataset ends. Which way do i need to approach. I thought of logistic regression, if its correct what do i need to do to move forward. Thank you!
You are an IT company and want to get a travel agency's network design, hardware, software, and security.
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Submit a list of all e-Commerce applications required in the enterprise network. Make sure to include a description of each application.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT