What is the missing subnet id

Assignment Help Computer Networking
Reference no: EM13161025

Assume the organization has the public IP address 201.10.15.0 and has subnetted it to get five subnets. They have assigned subnet IDs to the subnets as follows:

SUB1: 201.10.15.32

SUB2: 201.10.15.64

SUB3:

SUB4: 201.10.15.128

SUB5: 201.10.15.160

Also, router R3's interfaces have IP addresses 201.10.15.161 and 201.10.15.97.

What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID

order?

What is the range of IP addresses that may be used for hosts on SUB3?

Reference no: EM13161025

Questions Cloud

Algorithm for partitioning a set of n weights into k : give a greedy algorithm for partitioning a set of n weights into k bins. b) does it find the perfect solution?
Code for the haunted house game : Improve the game by adding more features, for example you can examine more items, more props etc. You may implement this using more lists regarding items and props, remember, you should check if the object is being carried or in the location of th..
Assembly language point-of-view : From an Assembly Language point-of-view, any registers that are touched by a function need to first be preserved and then later restored to their original value when that function ends, if that functions wishes to leave no side-effects after its exec..
Compare and contrast the shape of most animal cells : (A) Compare and contrast the shape of most animal cells with respect to most plant cells in terms of osmotic potential? (B) What is it that osmosis requires that sets it apart from simple diffusion?
What is the missing subnet id : What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID  order? What is the range of IP addresses that may be used for hosts on SUB3?
Write a command to do an alphabetical sort on the third fiel : Write the command to run the file called 'process' assuming it is in your current directory, has execute permission, but that your current directory is not in the standard path command search list:
Hexadeciaml numerals are integers written : Hexadeciaml numerals are integers written in base 16. The digits used are '0' through '9' plus 'a' for the "digit 10", 'b' for the "digit 11", 'c' for the "digit 12", 'd' for the "digit 13", 'e' for the "digit 14", and 'f' for the "digit 15". For exa..
Program that will ask for a month : Write a program that will ask for a month (1-12) and a year (yyyy). the program should then produce a calendar showing the month name and year and have all of the days displayed under it.
Function whose job is to output some sequence : Write a function whose job is to output some sequence of "interesting" #'s. The numbers should be separated from one another somehow so they don't all run together. This function may need to call another function, where the second function determines..

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Value of server farms-virtualization to large organization

Describe at lease 750 words(in your own words) what is meant by "server farm" and by "virtualization". What is the value of server farms and virtualization to large organization?

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  Write recursive subroutine to calculate factorial function

Write down simple (closed) subroutine sum(A,n) to sum the array of n integers and return result un EDSAC using "initial orders. Write down recursive subroutine fact(n) which calculates factorial function.

  Derive general expression for width of bit propagation speed

Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Determine time take to send file between two hosts

Assume two hosts, A and B, are separated by 10,000 kilometers and are connected by direct link of R =1 Mbps. Assume propagation speed over link is 2.5?108 meters/sec .How long does it take to send file, suppose it is sent continuously?

  Explain personnel implication setting up wan on global basis

Explain what the personnel implications are when setting up a WAN on a global basis. What are some of the barriers involved with global teams?

  Determine result of scrambling sequence using techniques

Determine the result of scrambling sequence 11100000000000 by using one of the following scrambling techniques? Suppose that last non-zero signal level has been positive.

  Alternatives company consider to increase capacity

Fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  Bandwidth of mbps ethernet link if signal-to-noise ratio

Using the frequency definition of bandwidth, what should the bandwidth of 10 Mbps Ethernet link be if the signal-to-noise ratio is 20 dB?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd