What is the missing subnet id

Assignment Help Computer Networking
Reference no: EM13161025

Assume the organization has the public IP address 201.10.15.0 and has subnetted it to get five subnets. They have assigned subnet IDs to the subnets as follows:

SUB1: 201.10.15.32

SUB2: 201.10.15.64

SUB3:

SUB4: 201.10.15.128

SUB5: 201.10.15.160

Also, router R3's interfaces have IP addresses 201.10.15.161 and 201.10.15.97.

What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID

order?

What is the range of IP addresses that may be used for hosts on SUB3?

Reference no: EM13161025

Questions Cloud

Algorithm for partitioning a set of n weights into k : give a greedy algorithm for partitioning a set of n weights into k bins. b) does it find the perfect solution?
Code for the haunted house game : Improve the game by adding more features, for example you can examine more items, more props etc. You may implement this using more lists regarding items and props, remember, you should check if the object is being carried or in the location of th..
Assembly language point-of-view : From an Assembly Language point-of-view, any registers that are touched by a function need to first be preserved and then later restored to their original value when that function ends, if that functions wishes to leave no side-effects after its exec..
Compare and contrast the shape of most animal cells : (A) Compare and contrast the shape of most animal cells with respect to most plant cells in terms of osmotic potential? (B) What is it that osmosis requires that sets it apart from simple diffusion?
What is the missing subnet id : What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID  order? What is the range of IP addresses that may be used for hosts on SUB3?
Write a command to do an alphabetical sort on the third fiel : Write the command to run the file called 'process' assuming it is in your current directory, has execute permission, but that your current directory is not in the standard path command search list:
Hexadeciaml numerals are integers written : Hexadeciaml numerals are integers written in base 16. The digits used are '0' through '9' plus 'a' for the "digit 10", 'b' for the "digit 11", 'c' for the "digit 12", 'd' for the "digit 13", 'e' for the "digit 14", and 'f' for the "digit 15". For exa..
Program that will ask for a month : Write a program that will ask for a month (1-12) and a year (yyyy). the program should then produce a calendar showing the month name and year and have all of the days displayed under it.
Function whose job is to output some sequence : Write a function whose job is to output some sequence of "interesting" #'s. The numbers should be separated from one another somehow so they don't all run together. This function may need to call another function, where the second function determines..

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Explain possible violations of moral rights and of justice

In your judgment, were possible utilitarian benefits of building Caltex plant in 1977 more significant than possible violations of moral rights and of justice which may be involved?

  Write down steps to browse site ausing same url

Employees will open their Web browser and enter personnel.mycompany.com in URL address box to browse this Web site. Write down steps which you take so that each computer in company can browse site using this URL?

  Explaining decryption function

Determine the decryption function. What is the decrypted plaintext?

  Simulate the network using netml

A satisfactory assignment document has been prepared; a network has been created and is depicted in a diagram in the assignment document and graphs which explain the behavior of the network in its original setup are presented including the throughp..

  Which data hazards added to datapath

Which of data hazards can be prevented if forwarding is added to datapath? For each such hazards, list register number and two instructions involved.

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Determine nr count back from secondary after last frame

If poll bits are in the sixth frame, determine the N(R) count back from secondary after last frame? Suppose error-free operation.

  Explain use of virtual private network-tunneling protocol

Can they use virtual private network and tunneling protocol, or is a better technique available? Justify your answer.

  Sketch the fsm specification for protocol

Sketch the FSM specification for this protocol (one FSM for X, one for Y, and one for Z). udtsend() function must include name of recipient.

  Explain networking concepts by using osi model as framework

Explain networking concepts by using OSI Model as framework. Explain protocols at different layers of the OSI model and describe their functionality.

  Advantages of using extranet instead of private phone lines

Write down the benefits of using extranet instead of dedicated/private phone lines in this situation? How do you expect your customers restaurants to react to change to extranets?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd