...company wants to subnet an IP address of 170.1.0.0/27 as it is resulting in too much traffic that is delaying the performance of it here is how you would do it To calculate an IP subnet mask you will need to have a network class, IP address, subnet mask, mask bits, the maximum required IP subnets and the maximum required hosts per subnet, by calculating the subnet it will provide you with a hexadecimal IP address, wildcard mask to use the ACL (Access control lists), the subnet ID, broadcast address, the subnet address range. The method to calculate an IP subnet mask for CIDR is first of all you need the IP address which is 170.1.0.0/27 you will need to convert this bit-length prefix into a quad dotted decimal representation to do this you look at the number after the slash / which is 27 because, it says quad we have to find 4 numbers that sum up to 27 which is 27= 8+8+8+3 Then you would look at the conversion of how to convert quad- dotted into bit length using the conversion tables If we let the IP address equal 170.1.0.0/26 using the tables you can say 26= 8+8+8+2 26=255.255.255.192 So the IP address is 170.1.0.0 and the subnet mask in quad dotted format is 255.255.255.192 Then you will need to calculate the number of bits used for subnetting to their corresponding subnet mask The ranges of the subnet mask is 0,128,192,224,240,248,252,254,255 You can convert the subnet mask into the number bits used for subnetting from the tables, for the subnet mask 255 is default...
Words: 522 - Pages: 3
...comprised of two parts: a network portion and a host portion. The network portion of an address is the same for all devices that reside in the same network. The host portion identifies a specific host within a given network. The subnet mask is used to determine the network portion of an IP address. Devices on the same network can communicate directly; devices on different networks require an intermediary Layer 3 device, such as a router, to communicate. To understand the operation of devices on a network, we need to look at addresses the way devices do—in binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network address. This lab provides instructions on how to determine the network and host portion of IP addresses by converting addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation. You will then apply this information to identify addresses in the network. Convert IPv4 Addresses from Dotted Decimal to Binary In Part 1, you will convert decimal numbers to their binary equivalent. After you have mastered this activity, you will convert IPv4 addresses and subnet masks from dotted decimal to their binary form. Convert decimal numbers to their binary equivalent. Fill in the following table by converting the decimal number to an 8-bit binary number. The first number has been completed...
Words: 1123 - Pages: 5
...46 subnets and provide information for subnets #1, #4, #5, and #46 Step 1: Convert the network address to binary 215.251.145.0/24 is a class C address with a subnet mask of 24 bits of ones First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=0, 16=1, 8=0, 4=1, 2=1, 1=1 215 = 11010111. Second Octet = 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=0, 2=1, 1=1 251 = 11111011 Third Octet = 128.64.32.16.8.4.2.1, 128=1, 64=0, 32=0, 16=1, 8=0, 4=0, 2=0, 1=1 145 = 10010001 Fourth Octet = 0 11010111.11111011.10010001.00000000 Network address Step 2: Convert Subnet mask into binary First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Second Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Third Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Forth Octet = 0 11111111.11111111.11111111.00000000 Subnet mask Step 3: Calculate the subnets required 46 subnets required per instructions: Use the formula 2 to the power of X to find out how many bits to borrow from the subnet mask. 2^5= 32 and is insufficient to cover the subnets required so, 2^6 = 64 x is 6 we need 6 bits from last octet of the subnet mask to cover our subnets. I need 46 subnets but I have total 64 available so that leaves me with; 64-46 = 18 extra subnets to use at a later date. Original Network address in binary: 11010111.11111011.10010001.00000000 Replace subnet bits...
Words: 1170 - Pages: 5
...up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating the subnet mask, determining (sub)network id’s...
Words: 7956 - Pages: 32
...The number of hosts per subnet. C. The number of subnet masks. D. The number to subtract from 255/ Answer: ___________________________________________ 3. What is the magic number for CIDRs 26? A. 128 B. 16 C. 32 D. 64 Answer: _____________________________________________ 4. How many hosts are in a Class B network? A. 16,777,216 B. 2048 C. 65536 D. 512 Answer: ________________________________________________ 5. What subnet does 192.168.74.232 /28 belong? A. 192.168.74.32 B. 192.168.74.240 C. 192.168.74.192 D. 192.168.74.224 Subnet: _____ Network #: _____ Broadcast #: ____ Magic #: _____ # of Bits | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | Power | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | Value/Magic # | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Octet Mask | 255 | 254 | 252 | 248 | 240 | 224 | 192 | 128 | Binary | 11111111 | 11111110 | 11111100 | 11111000 | 11110000 | 11100000 | 11000000 | 10000000 | 1. #-of-Bits: is the number of bits per octet. 2. Shows the bit power, i.e., 23 represents 2 * 2 * 2 = 8 or 2 to the power of 3. 3. Value/Magic # represents the binary value of the bit, i.e., bit 4 has a value of 8. 4. The Octet Mask when all bits are turned on equal 255. Seven bits are 254. Six bits are 252 and so forth. 5. This is the binary representation of the octet mask using ones and zeros. You can only enter numbers into the computer for each octet. Magic Number Subnet Groupings: |...
Words: 681 - Pages: 3
...INSTITUTE OF INFORMATION & COMMUNICATION TECHNOLOGY “NETWORK MANAGEMENT & SECURITY ASSIGNMENT” CLASS: BS (IT) PART-IV MORNING (REGULAR) |STUDENT’S NAME |ROLL # | |“HIRA KHAN” |2K8/IT/35 | |D/O: ABDUL ALEEM KHAN | | Q#1: What is IP address and also define classes of IP address? Ans: IP ADDRESS: "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible. An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections...
Words: 2246 - Pages: 9
...up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating the subnet mask, determining (sub)network id’s...
Words: 7956 - Pages: 32
...TCP/IP Subnetting The core components of TCP/IP are the IP address and the Subnet mask. The entire purpose of the Subnet Mask is to show the computer where to separate the IP Address into the Network ID and the Host ID. When read in Binary, a Subnet Mask will always be a string of 1’s followed by a string of 0’s. The 1’s cover the Network ID while the 0’s cover the Host ID. The IP Address is separated between the last 1 and the first 0. Network ID Host ID 10101010.01010101 11001100.11100011 = IP Address 11111111.11111111 00000000.00000000 = Subnet Mask TCP/IP addresses are made up of 4 sets of numbers called “Octets.” Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255. There are three classes of IP Address by default. They are determined by the value of their first octet. Each Class address has a particular default Subnet Mask. Class “A” = 1-127 Default Subnet Mask = 255.0.0.0 Class “B” = 128-191 Default Subnet Mask = 255.255.0.0 Class “C” = 192-223 Default Subnet Mask = 255.255.255.0 When viewed in Binary, you’ll notice a pattern. Class “A” always begins with a 0 00000001-01111111 Class “B” always begins with a 10 10000000-10111111 Class “C” always begins with a 110 11000000-11011111 The remaining classes (any with a value of 224 or higher in the first octet) are not used for public use, and are not considered valid. Also, though technically a Class “A” address, 127.0.0.1 is reserved for testing...
Words: 1137 - Pages: 5
...1. How many bits of mask are required to provide 30 host addresses? 5 30 = 11110 2. How many networks will be created using a 255.255.0.0 given a class A IP network (i.e., 10.0.0.0)? Over 16,000,000 3. What would be the dotted decimal equivalent of the slash notation of /30? 30/8= 3r6 255.255.255.252 4. What would be the dotted decimal equivalent of the slash notation of /8? 8/8= 1 255.0.0.0 5. What would be the dotted decimal equivalent of the slash notation of /17? 17/8= 2r1 255.255.128.0 6. What would be the dotted decimal equivalent o the slash notation of /12? 12/8= 1r4 255.240.0.0 7. Given 9 bits of mask for the host portion, how many host addresses are available? 2^9-2= 510 8. Given 13 bits of mask for the host portion, how many host addresses are available? 2^13-2= 8190 9. Given 3 bits of mask for the host portion, how many host addresses are available? 2^3-2= 6 10. Given 8 bits of mask for the network portion, how many subnets are available? 2^8= 256 11. Given 4 bits of mask for the network portion, how many subnets are available? 2^4= 16 12. Explain the reasoning behind the concept of “subnet zero.” Using subnet zero for addressing was discouraged because of the confusion inherent in having a network and a subnet with indistinguishable addresses, consider the IP address 172.16.1.10. If you calculate the subnet address corresponding to this IP address, the answer you get is subnet 172.16.0.0 (subnet zero). Note that this subnet address is identical...
Words: 440 - Pages: 2
...Chapter 5 Questions (Subnetting) Brian M. Robinson IT/240 February 1, 2013 Derrick Sorrells Chapter 5 Questions (Subnetting) 1. An IPv6 address is made up of how many bits? An Ipv6 address is made up of 128 bits. Because IPv6 has 128 bits, instead of the 32 bits that IPv4 has, the need for private addressing is eliminated. This is because IPv6 has 3.4 x 10^38 addresses, compared to the 4 billion addresses that IPv4 has. This is more than enough IP addresses to handle the needs of networking for the foreseeable future and beyond. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. The most important task performed by subnetting is that it helps determine whether the host is communicating with computer that is on the same network, or subnet, or a different network or subnet. The distinction matters because if the host is talking to a computer on the same subnet, then no router is needed. If the two are on separate subnets, then the router must then be involved to facilitate communications. 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 192.156.90.100 b. 172.19.243.254 c. 11.200.99.180 d. 221.24.250.207 e. 12.12.12.12 The IP address 172.19.243.254 is a private address and cannot be routed across the internet. For Class A, addresses beginning with 10; for Class B, addresses starting with 172.16 and running through 172.31; and for Class...
Words: 824 - Pages: 4
...Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol. Include the IPv6 multicast address for all routers and all hosts. Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use an Internet search engine to aid in this response. Provide citations for the Internet resources you used. A big feature of IPv6 is the implementation of stateless autoconfiguration. With stateless autoconfiguration, a host dynamically learns the /64 prefix used on the subnet, and then calculates the rest of the address by using an EUI-64 interface id based on the network interface card...
Words: 883 - Pages: 4
...Project Description Implement an appropriate addressing scheme, to subnet an IP address for different sized subnets. Introduction I have undertaken this project for the module network models and technologies. The project requires me to implement addressing schemes and to subnet an IP address for different sized subnets. The following topics will also be discussed: * Binary * HEX & decimal number systems * Octet, IP Address, IPv4/IPv6 * Subnet Mask * Network and Host IDs * Address Classes, classful and classless address schemes * Minimising wasteful use of IP addresses * CIDR * Subnetting * VLSM * Health and Safety * Evaluation * Bibliography Binary Computers see things in terms of binary. In binary everything is described as having two values or states: on or off, true or false, 1 or 0 and yes or no. A light switch could be regarded as a binary system, since it is always either on or off. As complex as they might seem computers can be regarded as a box full of light switches. Each switch is called a bit which is short for binary digit and a computer can turn each of these bits on or off. The computer describes 1 as being on and 0 as being off. By itself, a single bit is kind of useless, as it can only represent one of two things. Imagine if you could only count using either zero or one. Alone, you could never count past one. On the other hand, if you got a bunch of friends together who could also count using...
Words: 2448 - Pages: 10
...Running head: WAN DESIGN WAN Design for Acme Manufacturing UoP Student Axia College of University of Phoenix WAN Design for Acme Manufacturing Acme Manufacturing is a rapidly expanding company that is headquartered in Atlanta, Georgia. The headquarters building houses corporate operations, marketing, administrative staff, and accounting. Across the street from headquarters are the engineering and sales offices. Acme also has distribution offices in Chicago, Phoenix, and New York. Having just acquired a manufacturing facility in China, the company is now in need of a WAN that will allow each office to securely communicate with one another. Acme will also need a telecommunications system that facilitates communication in the most efficient manner. In order to achieve the desired connectivity, an array of products and services will be necessary. Logical Network Design The network topology used for Acme’s WAN should be a star topology with each site having only a direct connection to headquarters; the benefit is that network administration is centralized. The engineering and sales offices will connect to headquarters over the public WAN through a VPN configured with L2TP and IPSec for security. The manufacturing facility in China can be linked to headquarters through a leased satellite connection. Acme should lease three fractional T1 leased lines that extend from the headquarters in Atlanta to the distribution centers, one line each to Phoenix, Chicago, and New...
Words: 1356 - Pages: 6
...NETW-202 Introduction to Networking with Lab Final Exam Answers Follow Link Below To Get Tutorial https://homeworklance.com/downloads/netw-202-introduction-to-networking-with-lab-final-exam-answers/ NETW-202 Introduction to Networking with Lab Final Exam Answers 1. (TCO 5) _____ is a network-scanning technique used to identify which host IP addresses are operational. (Points : 5) 2. (TCO 5) _____ create(s) noise that interferes with information being transmitted across unshielded copper cabling. (Points : 5) 3. (TCO 5) _____ is used in Ethernet where some pairs of twisted-pair wires are crossed, when comparing the RJ-45 connectors on either end of the cable. These 10BASE-T and 100BASE-T cables connect the pair at pins 1 and 2 on each end to pins 3 and 6 on the other end. (Points : 5) 4. (TCO 5) _____ is a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium. (Points : 5) 5. (TCO 5) _____ are a collection of data that establishes a reference for network performance and behavior over a period of time. (Points : 5) 6. (TCO 5) The ______ provides a physical connection to the network (from the network end (Telco, ISP) of the user-to-network equipment), forwards traffic, and provides a clocking signal used to synchronize data transmission. (Points : 5) 7. (TCO 5) The _______ command will bring up a router interface. (Points : 5) 8. (TCO 5) A(n) _____ is an interference...
Words: 8529 - Pages: 35
...Gerald Boursiquot Network & Infrastructure Bever Branson Budget/Proposal/Visio NT 1210 May 23, 2013 In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each employee will be using. With the rationale in mind of estimating that there would be at least 4 possible devices per user, plus three possible printers per department, and the addition of a Wireless Access Point on the Management floor, network hardware which should include the printers we previously mentioned, one router for the LAN and WAN connections, a wireless access point, 12 printers for the entire organizations printing needs, and 5 servers We determined that there had to be one File and Print server, A Directory server that is also running DNS and DHCP, an E-commerce/Database server, a Web Proxy server and a Web...
Words: 3659 - Pages: 15