Find ip address of your computer

Assignment Help Computer Networking
Reference no: EM13712065

Question- a. Find IP Address of your computer(My IP Address: 192.168.1.5)

Part 1- What is the length (#bytes) of the IP Address?

Part 2 - How many classes are there?

Part 3- Explain in your own words the range and usage of each class.

Question- b. Convert your IP Address (decimal) to binary

Question- c. Convert a binary IP Address, 11110000.10101010.00001111.11100011 to decimal

You have to find how many classes are there?

Reference no: EM13712065

Questions Cloud

Write class encapsulating the concept of weather forecast : Write a class encapsulating the concept of the weather forecast, assuming that it has the given attributes: the temperature and the sky conditions, which could be sunny, snowy, cloudy, or rainy.
Computes a students grade for an assignment : Write a C++ program that computes a student's grade for an assignment as a percentage given the student's score and total points.
Construct minimal avl trees of height : Construct minimal AVL trees of height 0, 1, 2, 3, and 4. you do not need to fill in the values, just draw the structure of the tree. Tip: Use the recursive definition for the number of nodes in a minimal AVL tree.
Design and implement an application to manage a tournament : Design and implement an application to manage a tennis tournament of 16 players - design and implement an application to manage a tournament. Is there anybody who knows how to do this?
Find ip address of your computer : Find IP Address of your computer(My IP Address: 192.168.1.5) - What is the length (#bytes) of the IP Address?
Find the closed from for tn : Find the closed from for T(n)= 4T (n/2) where T (1) =1 ( Tip: suppose n is a power of 2) - You have to evaluate the given question and provide all the computation.
Write the complete code for a public java class : Write the complete code for a public Java class called Change Machine that can hold nickels, dimes and quarters. Include a private instance variable to hold each type of coin that the machine hols.
Explain the synthesis of guar gum : Explain the synthesis of guar gum - Explain the life cycle and environmental impact of guar gum
Write a function called matrix summary : Write a function called matrixsummary that takes in one argument, a matrix or a vector, and returns four output values - the sum, mean, max and min of all the values in the matrix or vector.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the difference among client-server architecture

list and describe the four primary functional components of a software application and the three primary hardware

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  The tcpip protocol suite appears to have no equivalents to

1.the tcpip protocol suite appears to have no equivalents to the osi session and presentation layers. how are the

  Explain comprehensive disaster recovery plan for network

Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.

  Adoption of an enterprise security framework

How is the adoption of an enterprise security framework helpful for developing an enterprise security policy and how does Donn Parker's model compare with the X.805 framework?

  Storage systems increasingly rely on the internet

Storage systems increasingly rely on the Internet infrastructure as a transport medium. What are the advantages of this approach? What problems are present in terms of security and reliability?

  Describe the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface and explain the elements and capabilities of a fault, configuration, accounting, performance, and security server

  Design such a password protocol

Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.)

  A name the url of the document requested by the browser

consider the following string of ascii characters that were captured by wireshark when the browser sent an http get

  Explain sliding window error control system

In a sliding window error control system in which each byte is numbered, Station A sends a packet with bytes numbered 801 to 900. If the packet arrives with no errors, how does Station B respond?

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

  1 your experiences with the social networking sites like

1. your experiences with the social networking sites like craig list etc etc?2. include how long you have been using

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd