CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
4th Edition
ISBN: 9781305107168
Author: Jason Eckert
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12, Problem 1DE
Explanation of Solution
Number of hosts per network:
The default subnet mask of class A is 255.0.0.08.
The IP address is 32 bits.
In this problem, we take 4 bits from the host and add it to network bits.
So,
8 + 4 = 12 bits.
Therefore, the mask bit is = 12.
Consider each octet has 8 bits
In this, we take 8 bits from the 1st octet and 4 bit from the 2nd octet so it can be used in 11 departments.
The remaining bits are
4 bits+ 8 bits+ 8 bits= 20 bits...
Explanation of Solution
Five range of addresses:
The first 5 range of addresses that can be assigned to different departments are,
SUBNET | RANGE OF HOST | SUBNET SIZE | BROADCAST |
100.0.0.0 | 100.0.0.1 TO 100.15.255.254 | 1048574 | 100.15.255.255 |
100... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most
significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all O's
or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?
Type your answer.
Suppose Alan, with a Web-based e-mail account (such as Gmail or Yahoo! Mail), sends a
message to Benson, who accesses his mail from his mail server using POP3. Discuss how the
message gets from Alan's host to Benson's host. Be sure to list the series of application-layer
protocols that are used to move the message between the two hosts.
Assuming that your company uses the class A network 100.0.0.0/8, with what subnet mask would you need to configure all computers on the network to divide this network 11 times to match the 11 departments? How many hosts can you have per network?What are the first five ranges of addressesthat you can assign to differentdepartments?
Chapter 12 Solutions
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Which of the following instructions falls in the category of data transfer instructions? JUMP LOAD ROTATE ANDarrow_forwardAn organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that exist per subnet will be 25. What subnet mask would you use to solve the problem?arrow_forwardGiven the following topology of a network, the router Node 3 connects the two subnets together: Nodes 1 and 2 are 'inside' of the subnet neta, Nodes 4 and 5 are 'outside' of neta and Node 3 with a firewall is the gateway of neta. The two networks have the prefix 192.168 as the first two octets in their IP addresses, e.g, Node 1 has IP address 192.168.1.11. eth1: 1.11 eth1: 2.21 1 2 eth1: 1.12 neta eth 1: 1.1 3 eth2: 2.1 netb 4 5 eth1: 2.22 (i) Suppose in the firewall on Node 3 the default policy is ACCEPT. Write packet filtering rules for the following goal. Suppose Node 5 hosts a web server supporting both HTTP and HTTPs. Set rules in Node 3 that prevents Node 2 from browsing any web pages at Node 5. Now change in Node3 the default policy as DROP and write packet filtering rules for the following goal. (ii) Allow all nodes in the subnet neta to browsing HTTP pages hosted at Node 5. (iii) Allow hosts in netb to SSH into Nodel.arrow_forward
- Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B. Are all of the requests being sent through the same socket at Host C? If they are being passed through different sockets, do both of the sockets have port 80? Discuss and explain.arrow_forwardAn organization wants to use the Private network number 192.168.90.0 across four subnets. The maximum number of hosts that exist per subnet will be 25. What subnet mask would the administrator use to solve the problem?arrow_forwardSuppose we have a web page which contains 10 objects including: a html main file, 8 jpg image, and a .mp3 background music. For simplicity, assume each of the 10 objects has a size of 4 Kbits and that each object can be completely transferred in one TCP packet. Furthermore, assume the round-trip time between the server and client is RTT= 250 ms, and the download rate is 1 Mbps. What will be the time it takes to complete transferring the web page running in the non-persistent mode? Total delay = msarrow_forward
- If you help me I will give you positive response. Thanks As soon as possible.arrow_forwardGiven the MAC address of an interface is F3:22:1F:20:30:40, what IPv6 link local address would be generated? a. FE80::F122:1FFF:FE20:3040/64 b. FE80::F322:1FFF:FE20:3040/64 c. FE80::F122:1F20:FFFE:3040/64 d. FE80::D322:1F20:FFFE:3040/64arrow_forwardGiven a Network Address of 172.16.10.0/21, subnet this address so that each Subnet can cater for 505 hosts. WORK OUT THE RELEVANT SUBNETS AVAILABLEarrow_forward
- The scenario includes one DHCP server in an Active Directory domain. The server is configured to provide IP addresses to DHCP clients on two different subnets. The subnets are separated by a router that has DHCP Forwarding enabled. In this scenario, you use ten of the excluded IP addresses to configure servers and other devices with static IP addresses and five additional IP addresses are left available for static configuration of new devices that you might want to add in the future. Write up the Powershell script for the following according to scenario IP configuration: Installing DHCP role (DHCP1) Creating DHCP security group (your Arid Number) in DHCP1 Note: Security Group should create with your arid number. Authorizing the DHCP1server in DC1 How to getClient4 adapter hardware information Disable and Enable a Network Adapter of Client4arrow_forwardAn ISP allocates the 3000:FACE:6/48 block of IPV6 addresses to an enterprise. The entrprise assigns a the subnet id = 2B with an interface id = 2. Using the 3+1+4 address rule, what is the most compressed IPV6 representation of the address? 3000:FACE:6:2:2B/64 3000:FACE:6:0:2:2B/64 3000:FACE:6:2000::2B/64 3000:FACE:6:2:2B/64arrow_forwardAn ISP is granted a block of addresses starting with 130.100.0.0/16. The ISP needs to distribute these addresses to 4 large companies. Each company requires 1024 IP addresses. Write the address ranges for these companies into the following table with /n notation. Company First address Last address 1 2 3 4arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education