Business Data Networks and Security, 9e (Panko) Chapter 9 TCP/IP Internetworking II 1) In IP subnet planning, having a large subnet part allows more hosts per subnet. Answer: FALSE 2) When the subnet part is made larger, the host part must be smaller. Answer: TRUE 3) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above Answer: D 4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above Answer: B 5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534 Answer: D 6) You have a 20-bit network part and a …show more content…
A) DNS servers B) DHCP servers C) directory servers D) identity servers Answer: B 35) ________ servers provide ________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic Answer: D 36) Clients can send a DHCP request message to multiple DHCP servers. Answer: TRUE 37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains Answer: B 38) Which of the above is NOT an element in a network management system? A) The manager. B) Agents. C) Objects. D) All of the above ARE elements in network management systems. Answer: D 39) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) Both A and B D) Neither A nor B Answer: B 40) In SNMP, the manager communicates directly with the managed device. Answer: FALSE 41) In SNMP, "object" is another name for "managed device." Answer: FALSE 42) In SNMP, the time-to-live value for a router interface is the value for an object. Answer: TRUE 43) The management information base (MIB) is a(n) ________. A) schema B) actual database C) Either A or B D) Neither A nor B Answer: C 44) Human interface functionality is defined by the SNMP standard. Answer: FALSE 45) Which of the following would be an SNMP object? A) Number of rows in
3 bits need to be borrowed at minimum with a total of 8 subnets. There will be 8190 hosts per subnet. 213=8192 8192-2=8190
If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.
5. Administration departments spread over another 10 buildings. LAN IP’s: Building 1 (128.100.17.x), Building 2 (128.100.18.x), Building 3 (128.100.19.x), Building 4 (128.100.20.x), Building 5 (128.100.21.x), Building 6 (128.100.22.x), Building 7 (128.100.23.x), Building 8 (128.100.24.x), Building 9 (128.100.25.x), and Building 10 (128.100.26.x). Router IP’s will be respectively as follows: (128.100.254.11), (128.100.254.12), (128.100.254.13), (128.100.254.14), (128.100.254.15), (128.100.254.16), (128.100.254.17), (128.100.254.18),
As table summaries, the school asked students to make sure that network is running differently to make sure that students, administration and general public all aren’t sharing their own network. The facility blueprints must identify how many port connections will be required by floor. The approximation total, we required should be 222 IP addresses, with 194 addresses on the student network. The subnetting of the network is going to be divided into two subnets that provide security and separation of data between the faculty staff and students.
The purpose of this paper is to talk about the technical requirements for the Newton Ad Agency in their company startup. Newton is looking to open three locations. Location one will be their headquarters and will be located in Austin Texas. Location two is located in New York and location three is their satellite office which is located two miles from their headquarters. The key take away for this paper is to show the IP addressing and sub netting addresses for the three locations. The following IP range has been given, 192.168.100.0 – 192.168.103.255.
17. A company builds a network that connects its 1000 branch offices with about ten employees
7. These recomendiations can be implemented with little change to the current existing networks within 5th SFG. A statement of work will be required to create a full time knowledge mainager to oversee the
AnswerB is incorrect because an IPv4 address is a 32-bit address consisting of four 8-bitoctets, each octet ranging from
e) If a company has seven sites, how many leased lines will it need if it uses a PSDN? [391]
The next step is to determine what our Network ID’s will be, and what our usable hosts will be. This is done by going back to the binary. There are 8 bits in each octet which is in base 2 the numerical value of the binary numbers. This is equal to 28 or 256. When we borrow the one bit from the third octet we are now adding that one bit to the original eight this changes our binary value from 8 bits to 9 bits which is equal to 29 or 512. This means that we will now have 512 IP Addresses per subnet, and if we apply the formula 2n-2 this will give us 510 usable hosts per subnet. We can then take this same formula without the minus 2 to calculate the number of subnets that we will obtain from this calculation. There are still seven “on” bits to the left in this octet. This is equal to 27 or 128. This means that will obtain 128 subnets with this CIDR calculation.
You must design an IP version 4 addressing scheme that will accommodate the LANs and WAN links between the offices. The LANs and WANs should use a single public class C IP address of 197.120.45.0 that has been sub-netted using Variable Length Subnet Masks.
Many organizations and companies ignore the importance of planning and administering a structured model approach to network layer addressing. Many problems result from such disorganization: there are duplicate network addresses; illegal addresses that routers cannot route to the Internet, running out of addresses for existing or future use; or have larger than required
In this Exercise, you will explain IP addres components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP.
Complete Case Projects 3-1, 3-2, & 3-3 of Guide to Networking Essentials. After determining if a client-based or client/server model will be used, substantively justify your choice in 200 to 300 words.
8. What is a subnet mask? A subnet allows the flow of a network traffic between hosts to be segregated based on a network configuration. The most recognizeable aspect of subnetting is the subnet mask. Like IP addresses , a subnet mask contains 4 bytes (32 bits)and is often written using the same "dotted-decimal" notation. For example, a very common subnet mask in its binary representation 11111111 11111111 11111111 00000000 is typically shown in the equivalent, more readable form 255.255.255.0