Subnet mask, Computer Networking

Assignment Help:

Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available?

Ans) 172.16.2 120 is a standard Class B address with a subnet mask that permits 254 hosts. You are a

network administrator and have been allocate the IP address of 201.222.5.0. You require to have

20 subnets with 5 hosts per subnet. The subnet mask is 255.255.255.248.   

 


Related Discussions:- Subnet mask

Urgent pointer - transport layer, Urgent Pointer This 16 bite whic...

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

Explain short term and medium-term scheduling, What are short, long and med...

What are short, long and medium-term scheduling? Long term scheduler verifies which programs are admitted to the system for processing. It controls the degree of multiprogrammi

Define the distance vector routing, Q. Define the Distance Vector Routing? ...

Q. Define the Distance Vector Routing? Distance Vector Routing Every router periodically shares its knowledge about the entire internet with its neighbours Sharing

Network comp. architecture, Write discussion on Associative mapping - compu...

Write discussion on Associative mapping - computer architecture

Connection oriented multiplexing and de multiplexing, Connection Oriented M...

Connection Oriented Multiplexing And De multiplexing TCP socket  identified by 4 tuple: a.Source IP address b.Source port number c.Destination IP address d.Destina

Mention different categories of computer networks, Mention different catego...

Mention different categories of computer networks (on the basis of scale) and distinguish one from the other. Local Area Network (LAN): Metropolitan Area Network (MAN): W

Transport layer in osi model, The Transport layer implements reliable data ...

The Transport layer implements reliable data transport services. The various functions of Transport Layer are listed below The transport layer is meant for transmitting the data

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd