Describe the ip address and subnet

Assignment Help Computer Networking
Reference no: EM13311796

1. IP: 143.190.149.158
Subnet Mast: 255.255.0.0
Class Type:
Network Address :
Broadcast Address :

2. IP: 177.158.74.9
Subnet Mast: 255.255.254.0
Class Type:
Network Address:
Broadcast Address:

3. IP: 75.194.14.163
Subnet Mast: 255.255.0.0
Class Type:
Network Address:
Broad cast Address:

4. IP: 15.38.58.248
SubNet Mast : 255.255.0.0
Class Type:
Network Address:
Broad cast Address:

5. IP: 198.231.15.26
Subnet Mast: 255.255.255.0
Class Type:
Network Address:
Broadcast Address:

6. IP: 136.34.51.95
Subnet Mast: 255.255.224.0
Class Type:
Network Address:
Broadcast Address:


7. IP: 149.59.50.245
Subnet Mast: 255.192.0
Class Type:
Network Address:
Broad cast Address:
1) Using the IP address and subnet mask in the exhibit .
Identify the address that is in the same subnet.

IP 198.132.202.255
Subnet 255.255.252.0

A) 198.132.199.244
B) 198.132.204.199
C) 198.132.201.205
D) 198.132.206.198

2) Which of the following subnet masks would offer 30 usable subnets with a minimum of 2040 usable hosts per subnet? We have been assigned the IP address in the exhibit. Choose the best answer.

200.177.0.0

A.)255.255.248.0
B) 255.255.224.0
C) 255.255.192.0
D.) 255.240.0.0

3) Which of the following statements would best describe following the IP address and subnet?

IP 192.192.192.56
Subnet 255.255.255.240

A.) This is a Class B address that is masking 12 bits for sub-netting, yielding 14 valid subnets.
B) The Subnet mask is borrowing 4 Host bits which creates 14 usable subnets with 14 usable hosts per subnet.
C) this is a Class C address that is using 4 host bits which creates 16 usable subnets with 16 usable hosts per subnet
D this is a Class C address that is using 4 host bits which creates 14 subnets with 14 hosts per subnet.

4.) Which of the following subnet masks would offer 8 usable subnets with a minimum of 2000 usable hosts per subnet? We have been assigned the IP address in the exhibit. Choose the best answer.
Exhibit: 200.200.0.0

A) 255.248.0.0 B)255.24.0.0 C) 255.255.240.0 D) 255.255.192.0

5.) Using the following IP address in the exhibit, identify which of the following best describe the exhibit
A) This address and mask will yield a total of 1022 usable host: usable networks.
B)This is a Class A address with 22 bits masked for subnetting for a total of 1024 hosts per network, with 64 total networks.
C) This is a Class A address that is using 14 bits for subnetting
D) There are 22 bits masked with this Class B IP address, offer of 1020 hosts per network, with 64 total networks.

6.) Which of the following subnet masks would offer 18 subnets, and hosts for the next five years, with each subnet having up to 580 hosts?

Exhibit : 154.78.0.0/16

A) 255.255.224.0
B) 255.255.252.0
C) 255.255.254.0
D) 255.255.192.0

Reference no: EM13311796

Questions Cloud

Find the magnitude of the acceleration of the two objects : two objects of unequal mass hung vertically over frictionless pulley of negligible mass. Determine the magnitude of the acceleration of the two objects
The three main institutions in gender socialization : The three main institutions in gender socialization
What is the turntable''s rotation angular velocity : A 210g , 30.0-cm-diameter turntable rotates on frictionless bearings at 61.0rpm. What is the turntable's rotation angular velocity when the block reaches the outer edge
Determine the wavelength of radio waves : An FM station broadcasts classical music at 89.1 MHz (megahertz, or 106 Hz). Find the wavelength (in m, nm, and A) of these radio waves. m nm A
Describe the ip address and subnet : Which of the following subnet masks would offer 30 usable subnets with a minimum of 2040 usable hosts per subnet? We have been assigned the IP address in the exhibit. Choose the best answer.
How far does the block slide : A spring of spring constant k = 340 Nm-1 is used to launch a 1.5-kg block along a horizontal surface by compressing the spring by a distance of 18 cm. how far does the block slide
Further explore : Further explore.
What is the maximum potential energy of the child : A 20-kg child swings back and forth on a swing such that her height h in m from the ground as a function of x is described by: h(x) = 0.5 + 0.45x2 for -1.2 m ? x ? 1.2 m, What is the maximum potential energy of the child
Challenged by modern working women : How have notions of 'men's work' been challenged by modern working women? You may choose to focus on specific examples (eg. within a particular industry or national context) or to discuss more generally.

Reviews

Write a Review

Computer Networking Questions & Answers

  What rfc describes the gopher protocol

What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  What routing protocol is suitable for retail customer

What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.

  Understand about compatibility in network architecture

What you understand about 'Compatibility' in network architecture and explain which topology suits the client-server network environment.

  Provide network design-transferring of videos and music file

Provide a network design, a drawing of a solution to address the following: Transferring of videos and music files between computers, Sharing Internet connection, one laser printer, and one photo printer

  Describe mechanism used for signaling between client-server

Describe the mechanism used for signaling between client and server to indicate that persistent connection is being closed. Can client, server, or both signal close of connection?

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Investigate employees connect using wireless and not cables

You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.

  Write main advantage of using domain controlled network

Write down the main advantages to using Domain controlled network? Write down some concerns and disadvantages to switching to domain network?

  How many users can be supported if circuit switching is used

Suppose users share a 1Mbps link. Also suppose each user requires 100Kbps when transmitting, but each user transmits only 20% of the time. When circuit switching is used, how many users can be supported?

  Discuss at least three major evolutionary steps

A. How does Donn Parker's model compare with the X.805 framework? B. If an organization consulted you about its decision on an enterprise security framework, which would you recommend and why?

  How many bits delivered to network-layer ptotocol

The destination network has a maximum packet size of 1240 bits. How many bits,including headers,are delivered to the network-layer ptotocol at the destination?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd