Question

In: Computer Science

For a netmask of 255.255.128.0, tell a) how many bits are defined for network number portion...

For a netmask of 255.255.128.0, tell

a) how many bits are defined for network number portion

b) how many bits are defined for host number portion.

(Be sure not to include any spaces in your answers. Just indicate the number for each answer.)

Solutions

Expert Solution

a)  17
b)  15

Explanation:
-------------
255.255.128.0
Let's convert all octets to binary separately
Converting 255 to binary
Divide 255 successively by 2 until the quotient is 0
   > 255/2 = 127, remainder is 1
   > 127/2 = 63, remainder is 1
   > 63/2 = 31, remainder is 1
   > 31/2 = 15, remainder is 1
   > 15/2 = 7, remainder is 1
   > 7/2 = 3, remainder is 1
   > 3/2 = 1, remainder is 1
   > 1/2 = 0, remainder is 1
Read remainders from the bottom to top as 11111111
So, 255 of decimal is 11111111 in binary
255 in binary is 11111111

Converting 128 to binary
Divide 128 successively by 2 until the quotient is 0
   > 128/2 = 64, remainder is 0
   > 64/2 = 32, remainder is 0
   > 32/2 = 16, remainder is 0
   > 16/2 = 8, remainder is 0
   > 8/2 = 4, remainder is 0
   > 4/2 = 2, remainder is 0
   > 2/2 = 1, remainder is 0
   > 1/2 = 0, remainder is 1
Read remainders from the bottom to top as 10000000
So, 128 of decimal is 10000000 in binary
128 in binary is 10000000

Converting 0 to binary
Divide 0 successively by 2 until the quotient is 0
Read remainders from the bottom to top as
So, 0 of decimal is 00000000 in binary

====================================================================================
||    255.255.128.0 in binary notation is 11111111.11111111.10000000.00000000    ||
====================================================================================

number of ones = 17
number of zeros = 15

Related Solutions

Given a network of Class B, how many bits should be borrowed from the HostID in...
Given a network of Class B, how many bits should be borrowed from the HostID in order to build 100 subnets with 200 host in each one of them? Hint: this question have multiple answers, write all the possible answers and necessary calculation steps and explanation.
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
Write a program that copies the even number of bits from a into the corresponding bits...
Write a program that copies the even number of bits from a into the corresponding bits in b ,only use bit-manipulation instructions, no loop int main () { uint_32 a = 0 xaabbccdd ; uint_32 b = 0 x11223344 ; // Replace bits 0 ,2 ,4 ,... of b with bits 0 ,2 ,4 ,... from a . uint_32 result = ...; // Print out the result as a hexadecimal number }
4.1. To explain how the signal dynamic range is related with the number of bits in...
4.1. To explain how the signal dynamic range is related with the number of bits in codewords. 4.2. Analyse the linear quantization characteristic, parameters, features. 4.3. Analyse the nonlinear quantization characteristic, parameters features.
a. Represent 2.25 in fixed point form with 4 bits for the integer portion and 4...
a. Represent 2.25 in fixed point form with 4 bits for the integer portion and 4 bits for the fractional point. b. Represent-1.75 in the same form c. Now add 2.25 with-1.75 in the fixed point form
In UART protocol, how many bits are NECESSARILY added into a data package for the interfacing...
In UART protocol, how many bits are NECESSARILY added into a data package for the interfacing to be successful? What is the function of those bits?
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For...
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For PC absolute addressing, describe how to write assembly program to jump to code located in a different program memory page.
How many bits are required to represent all the elements currently in the Periodic Table?
How many bits are required to represent all the elements currently in the Periodic Table?
Part#1 What are the default username and password for Kali Linux? How many bits is the...
Part#1 What are the default username and password for Kali Linux? How many bits is the MD5 hashing algorithm? How many bits is the SHA1 hashing algorithm? Which hashing algorithm is more accurate, MD5 or SHA1? Part#2 What is the command to unmount a partition? In what directories are mount points typically created on Linux? When the ls –l command is used, what is designated in the first column to indicate a file? When the ls –l command is used,...
How would you perform a mathematical analysis on a least number of n bits problem? (For...
How would you perform a mathematical analysis on a least number of n bits problem? (For example, least number n bits that could be extracted from a database of bad phone numbers).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT