Has this network been sub-netted

Assignment Help Computer Networking
Reference no: EM13166597

 Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network? b. Has this network been sub-netted? How do you know? c. How many IP addresses would there be on the above network (show your work)? d. How would this IP address be expressed using CIDR notation (show your work)? e. What is the range of the block of addresses this Host belongs to using CIDR notation? f. Give the network address and the broadcast address of the network this Host belongs to. 

Reference no: EM13166597

Questions Cloud

Modify the btod procedure : Modify the BTOD procedure so that leading zeros are replaced by blanks. For example, if the result is "0" - "5" - "9," the leading 0 in the hundreds position gets replaced by a blank, giving " " - "5" - "9."
Non-finitely-describable languages closed underconcatenation : Are the non-finitely-describable languages closed under concatenation? Kleene closure? Complementation? Union?
Use a loop to allow a user to enter a series of numbers : Use a loop to allow a user to enter a series of numbers and then print out the series of numbers when the user is done. The user stops the lseries program by entering -1 (or any negative number).
Prints out a summary for a list of prescriptions : Create a class that prints out a summary for a list of prescriptions. Using your Prescription class and some if statements you will read in 3 prescriptions and print out an appropriate summary with a list of the prescriptions
Has this network been sub-netted : Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?
Extended grep for regular expressions : That contain the word "as" exactly onceb) that contain the word "sa" more than once
What ip range would an isp provide to a customer : Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a)
Program that evaluates a infix expression : Program that evaluates a infix expression using stacks terminated by an equal sign. for example: (4-2)-5)/(2+1)-2))=the expression will contain single digit and the operators +, -, *,/. Make sure to consider the operator precedence.
Life with plaster cast-painting-within-a-painting : Explain why you think an artist might choose to re-paint a painting into his or her work. In what ways is it the same painting? In what ways does it become different?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain where ip best solution method

Post note describing an example where IP would be the best solution method. at lease 100 words. Where do we go from here with Operations Research and Management Science?

  Count back from the secondary after last frame

If the poll bit is on in the sixth frame, what will be the N(R) count back from the secondary after the last frame? Assume error-free operation.

  Create communication system to permit transmission

Create a communication system (block diagram) which will permit transmission of these four sources over telephone using frequency division multiplexing and TDM PCM assume using 4 bit samples.

  What is the biggest problem in routing security

Describe what is the biggest problem in routing security also discuss political feasibility and what factors go into determining whether something is politically feasible in an organization

  Share resources on wins server

Client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why?

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Vpn access for employees to remotely access

Explain best option for VPN access for employees to remotely access the Ocper, Inc. network and describe your reasoning.

  Reliable deal with supplier and client reluctance

How might reliable deal with supplier and client reluctance to provide detailed information about their internal operation?

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Advantages and disadvantages of connection method

Prepare a three-column table (one column for each technology) in which you list the advantages and disadvantages of each connection method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd