LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN: 9781337569798
Author: ECKERT
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12, Problem 1DE
Explanation of Solution
Number of hosts per network:
The default subnet mask of class A is 255.0.0.08.
The IP address is 32 bits.
In this problem, we take 4 bits from the host and add it to network bits.
So,
8 + 4 = 12 bits.
Therefore, the mask bit is = 12.
Consider each octet has 8 bits
In this, we take 8 bits from the 1st octet and 4 bit from the 2nd octet so it can be used in 11 departments.
The remaining bits are
4 bits+ 8 bits+ 8 bits= 20 bits...
Explanation of Solution
Five range of addresses:
The first 5 range of addresses that can be assigned to different departments are,
SUBNET | RANGE OF HOST | SUBNET SIZE | BROADCAST |
100.0.0.0 | 100.0.0.1 TO 100.15.255.254 | 1048574 | 100.15.255.255 |
100... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's.
How many hosts (i.e., host IDs) can there be on a class B network?
Suppose Alan, with a Web-based e-mail account (such as Gmail or Yahoo! Mail), sends a
message to Benson, who accesses his mail from his mail server using POP3. Discuss how the
message gets from Alan's host to Benson's host. Be sure to list the series of application-layer
protocols that are used to move the message between the two hosts.
Chapter 12 Solutions
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Assuming that your company uses the class A network 100.0.0.0/8, with what subnet mask would you need to configure all computers on the network to divide this network 11 times to match the 11 departments? How many hosts can you have per network?What are the first five ranges of addressesthat you can assign to differentdepartments?arrow_forwardAn organization wants to use the Private network number 192.168.90.0 across four subnets. The maximum number of hosts that exist per subnet will be 25. What subnet mask would the administrator use to solve the problem?arrow_forwardAn organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that exist per subnet will be 25. What subnet mask would you use to solve the problem?arrow_forward
- The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet ?arrow_forwardWhich of the following instructions falls in the category of data transfer instructions? JUMP LOAD ROTATE ANDarrow_forwardGiven the following topology of a network, the router Node 3 connects the two subnets together: Nodes 1 and 2 are 'inside' of the subnet neta, Nodes 4 and 5 are 'outside' of neta and Node 3 with a firewall is the gateway of neta. The two networks have the prefix 192.168 as the first two octets in their IP addresses, e.g, Node 1 has IP address 192.168.1.11. eth1: 1.11 eth1: 2.21 1 2 eth1: 1.12 neta eth 1: 1.1 3 eth2: 2.1 netb 4 5 eth1: 2.22 (i) Suppose in the firewall on Node 3 the default policy is ACCEPT. Write packet filtering rules for the following goal. Suppose Node 5 hosts a web server supporting both HTTP and HTTPs. Set rules in Node 3 that prevents Node 2 from browsing any web pages at Node 5. Now change in Node3 the default policy as DROP and write packet filtering rules for the following goal. (ii) Allow all nodes in the subnet neta to browsing HTTP pages hosted at Node 5. (iii) Allow hosts in netb to SSH into Nodel.arrow_forward
- Design a classfull network addressing scheme that will supply the minimum number of hosts per subnet, and allow enough extra subnets and hosts for 25% growth in all areas. IP Address 172.16.0.0 FO/O S//0/1 FO/O Sales Administrative FO/1 185 Hosts 30 Hosts SO/0/0 Marketing 50 Hosts,arrow_forwardSuppose the network layer provides the following service. The network layer in the sourcehost accepts a segment of maximum size 1,200 bytes and a destination host address from thetransport layer. The network layer then guarantees to deliver the segment to the transport layerat the destination host. Suppose many network application processes can be running at thedestination host In your protocols, does the transport layer “have to do anything” in the core of the computer network?arrow_forwardThe scenario includes one DHCP server in an Active Directory domain. The server is configured to provide IP addresses to DHCP clients on two different subnets. The subnets are separated by a router that has DHCP Forwarding enabled. In this scenario, you use ten of the excluded IP addresses to configure servers and other devices with static IP addresses and five additional IP addresses are left available for static configuration of new devices that you might want to add in the future. Write up the Powershell script for the following according to scenario IP configuration: Installing DHCP role (DHCP1) Creating DHCP security group (your Arid Number) in DHCP1 Note: Security Group should create with your arid number. Authorizing the DHCP1server in DC1 How to getClient4 adapter hardware information Disable and Enable a Network Adapter of Client4arrow_forward
- Given the MAC address of an interface is F3:22:1F:20:30:40, what IPv6 link local address would be generated? a. FE80::F122:1FFF:FE20:3040/64 b. FE80::F322:1FFF:FE20:3040/64 c. FE80::F122:1F20:FFFE:3040/64 d. FE80::D322:1F20:FFFE:3040/64arrow_forwardGiven a Network Address of 172.16.10.0/21, subnet this address so that each Subnet can cater for 505 hosts. WORK OUT THE RELEVANT SUBNETS AVAILABLEarrow_forwardAn ISP allocates the 3000:FACE:6/48 block of IPV6 addresses to an enterprise. The entrprise assigns a the subnet id = 2B with an interface id = 2. Using the 3+1+4 address rule, what is the most compressed IPV6 representation of the address? 3000:FACE:6:2:2B/64 3000:FACE:6:0:2:2B/64 3000:FACE:6:2000::2B/64 3000:FACE:6:2:2B/64arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education