Question

a) An IP address is a number that uniquely identifies a device within a computer network....

a) An IP address is a number that uniquely identifies a device within a computer network. This address can be derived from a General Network Address.
i. Using any network address of your choice, explain how you would generate IP addresses by subnet masking.
ii. Briefly explain the concept of Host Address and Network Address.

Homework Answers

Answer #1

IP Address:

An IP address is an identifier or label used to identify a machine on the internet or a particular network. Each of the devices on the internet must have an IP address for identification.

IPv4 is the first version of Internet Protocol that uses a 32-bit address and this protocol is most widely used.

Total number of IP address supported by IPv4 = 232

The netmask and subnet mask is used to divide the IP address as given below:

The netmask is a sequence of '1' followed by a sequence of '0' and it is used to divide an IP address into multiple subnets.

The subnet mask is a sequence of '1' followed by a sequence of '0' and it is used to separate a big network into smaller multiple networks.

The subnet mask is used to separate the IP address into a network address and host address.

It is made by setting '1' to all network bits and '0' to all host bits. In a network, the first and last IP addresses are used for the special purpose and the remaining addresses are used as a host address.

Address class:

Class A:

The range of the first octet: 0 to 127

The first bit of the first octet is used to identify the class and always set to zero.

Subnet mask = 255.0.0.0

Class B:

First octet range: 128 to 191

The first two bit of the first octet is used to identify the class and always set to 10.

Subnet mask = 255.255.0.0

Class C:

First octet range: 192 to 223

The first three bits of the first octet is used to identify the class and always set to 110.

Subnet mask = 255.255.255.0

i.

For example:

Let us suppose the given IP address is:

193.62.83.0

The above address belongs to class C.

The netmask in binary representation will be:

11111111 11111111 11111111 00000000

The netmask in decimal representation will be:

255.255.255.0

A class C address can be used to generate 28 = 256 addresses.

The first address will be = 193.62.83.0

The second address will be = 193.62.83.1

The second last address will be = 193.62.83.254

The last address will be = 193.62.83.255

ii.

Let us suppose the given IP address is:

193.62.83.0

The above address belongs to class C.

The class C netmask is:

255.255.255.0

Here, the first 24 bits are used for network id, and the last 8 bits are used for host id.

The total number of IP addresses will be = 28 = 256

In a network, the first and last IP addresses are used for the special purpose and the remaining addresses are used as a host address.

The total number of the host address in this network will be = 256 - 2 = 254

The network id is used to identify the network and the host id is used to find the host in that identified network.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In a class C subnet, we know the IP address of one of the hosts and...
In a class C subnet, we know the IP address of one of the hosts and the subnet mask as given below: IP Address: 198.48.82.176 Subnet mask: 255.255.255.224 1) What is the first valid host address in the subnet? (in dotted decimal) 2) What is the last valid address in the subnet? (in dotted decimal) 3) What is the subnet network address? (in dotted decimal) 4) What is the subnet broadcast address? (in dotted decimal) 5) What is the number...
Given a Class B network and a number of subnets required, complete the table to identify...
Given a Class B network and a number of subnets required, complete the table to identify the number of bits to borrow from the host field for the subnet field and the maximum number of host addresses available per subnet. Number of Subnets Required Number of Bits to Borrow for the Subnet Field Maximum Number of Hosts per Subnet Subnet Mask in Binary and Decimal Representations 5 3    23 = 8 Class B has 16 host bits by definition. If...
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits...
Using the following information (Machine’s IP=33.32.31.30, Machine’s Netmask=/29, Parent’s Netmask=255.255.240.0 ), determine a. how many bits are used for host number on the child network (subnet) b. how many usable addresses can exist on this child network (subnet) c. what the first usable address is on this child network (subnet) d. what the last usable address is on this child network (subnet) e. what the child network’s (subnet's) broadcast address is f. what the child network's (subnet's) network number is...
You are to create 17 subnets on a class B network with the IP address: 172.20.112.1?...
You are to create 17 subnets on a class B network with the IP address: 172.20.112.1? How many bits do you need to uniquely identify each subnet? (focus on the binary representation more so than the networking aspect of the question) : hint what is the minimum number of bits do you need to represent 17 different entities. (show all steps) Subtract 10 – 7 using 2’s complement (show all steps) Find the two’s complement of the following number:   10110111(show...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
1. The memory units that follow are specified by the number of words times the number...
1. The memory units that follow are specified by the number of words times the number of bits per word. How many address lines and input/output data lines are needed in each case? (a) 8K X 16 (b) 2G X 8 (c) 16M X 32 (d) 256K X 64 2. Give the number of bytes stored in each memory unit in question 1. 3. Word number 563 decimal in the memory shown in Fig. 7.3 (see Mano-Ch7.pdf) contains the binary...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
Analysis: This section should include the issue register as a bare minimum, but may include also...
Analysis: This section should include the issue register as a bare minimum, but may include also why-why diagrams, a Pareto chart, a waste table and/or value-added analysis table. Flow analysis or simulation of this case study might be possible but might require making a lot of assumptions given the provided data. The first part of the project: Introduction    Walmart has continued to retain the top position on the Fortune 500 list for a consecutive fifth year. The brand has...
These tests are intended for undergraduate students in college or those under 18 years of age....
These tests are intended for undergraduate students in college or those under 18 years of age. Read these directions carefully! The below test includes 10 questions, randomly selected from a large inventory. Most questions will be different each time you take the test, You must answer at least 9 out of 10 questions correctly to receive your Certificate. You have 40 minutes to complete each test, and you must answer all 10 questions in order to to see your results....
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT