Free Essay

Mcts

In:

Submitted By jeneferbermusa
Words 1123
Pages 5
Lab – Converting IPv4 Addresses to Binary
Objectives
Part 1: Convert IPv4 Addresses from Dotted Decimal to Binary
Part 2: Use Bitwise ANDing Operation to Determine Network Addresses
Part 3: Apply Network Address Calculations
Background / Scenario
Every IPv4 address is comprised of two parts: a network portion and a host portion. The network portion of an address is the same for all devices that reside in the same network. The host portion identifies a specific host within a given network. The subnet mask is used to determine the network portion of an IP address. Devices on the same network can communicate directly; devices on different networks require an intermediary Layer 3 device, such as a router, to communicate.
To understand the operation of devices on a network, we need to look at addresses the way devices do—in binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network address.
This lab provides instructions on how to determine the network and host portion of IP addresses by converting addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation. You will then apply this information to identify addresses in the network.
Convert IPv4 Addresses from Dotted Decimal to Binary
In Part 1, you will convert decimal numbers to their binary equivalent. After you have mastered this activity, you will convert IPv4 addresses and subnet masks from dotted decimal to their binary form.
Convert decimal numbers to their binary equivalent.
Fill in the following table by converting the decimal number to an 8-bit binary number. The first number has been completed for your reference. Recall that the eight binary bit values in an octet are based on the powers of 2, and from left to right are 128, 64, 32, 16, 8, 4, 2, and 1. Decimal | Binary | 192 | 11000000 | 168 | | 10 | | 255 | | 2 | | *

Convert the IPv4 addresses to their binary equivalent.
An IPv4 address can be converted using the same technique you used above. Fill in the table below with the binary equivalent of the addresses provided. To make your answers easier to read, separate the binary octets with a period. Decimal | Binary | 192.168.10.10 | 11000000.10101000.00001010.00001010 | 209.165.200.229 | | 172.16.18.183 | | 10.86.252.17 | | 255.255.255.128 | | 255.255.192.0 | |
Use Bitwise ANDing Operation to Determine Network Addresses
In Part 2, you will use the bitwise ANDing operation to calculate the network address for the provided host addresses. You will first need to convert an IPv4 decimal address and subnet mask to their binary equivalent. Once you have the binary form of the network address, convert it to its decimal form.
Note: The ANDing process compares the binary value in each bit position of the 32-bit host IP with the corresponding position in the 32-bit subnet mask. If there two 0s or a 0 and a 1, the ANDing result is 0. If there are two 1s, the result is a 1, as shown in the example here.
Determine the number of bits to use to calculate the network address. Description | Decimal | Binary | IP Address | 192.168.10.131 | 11000000.10101000.00001010.10000011 | Subnet Mask | 255.255.255.192 | 11111111.11111111.11111111.11000000 | Network Address | 192.168.10.128 | 11000000.10101000.00001010.10000000 |
How do you determine what bits to use to calculate the network address?
____________________________________________________________________________________
In the example above, how many bits are used to calculate the network address?
______________

Use the ANDing operation to determine the network address.
Enter the missing information into the table below: Description | Decimal | Binary | IP Address | 172.16.145.29 | | Subnet Mask | 255.255.0.0 | | Network Address | | |
Enter the missing information into the table below: Description | Decimal | Binary | IP Address | 192.168.10.10 | | Subnet Mask | 255.255.255.0 | | Network Address | | |
Enter the missing information into the table below: Description | Decimal | Binary | IP Address | 192.168.68.210 | | Subnet Mask | 255.255.255.128 | | Network Address | | |
Enter the missing information into the table below: Description | Decimal | Binary | IP Address | 172.16.188.15 | | Subnet Mask | 255.255.240.0 | | Network Address | | |
Enter the missing information into the table below: Description | Decimal | Binary | IP Address | 10.172.2.8 | | Subnet Mask | 255.224.0.0 | | Network Address | | | *

Apply Network Address Calculations
In Part 3, you must calculate the network address for the given IP addresses and subnet masks. After you have the network address, you should be able to determine the responses needed to complete the lab.
Determine whether IP addresses are on same network.
You are configuring two PCs for your network. PC-A is given an IP address of 192.168.1.18, and PC-B is given an IP address of 192.168.1.33. Both PCs receive a subnet mask of 255.255.255.240.
What is the network address for PC-A? ___________________________
What is the network address for PC-B? ___________________________
Will these PCs be able to communicate directly with each other? _______
What is the highest address that can be given to PC-B that allows it to be on the same network as PC-A?
___________________________
You are configuring two PCs for your network. PC-A is given an IP address of 10.0.0.16, and PC-B is given an IP address of 10.1.14.68. Both PCs receive a subnet mask of 255.254.0.0.
What is the network address for PC-A? __________________________
What is the network address for PC-B? __________________________
Will these PCs be able to communicate directly with each other? ______
What is the lowest address that can be given to PC-B that allows it to be on the same network as PC-A?
___________________________
Identify the default gateway address.
Your company has a policy to use the first IP address in a network as the default gateway address. A host on the local-area network (LAN) has an IP address of 172.16.140.24 and a subnet mask of 255.255.192.0.
What is the network address for this network?
___________________________
What is the default gateway address for this host?
___________________________
Your company has a policy to use the first IP address in a network as the default gateway address. You have been instructed to configure a new server with an IP address of 192.168.184.227 and a subnet mask of 255.255.255.248.
What is the network address for this network?
___________________________
What is the default gateway for this server?
___________________________
Reflection
Why is the subnet mask important in determining the network address?
_______________________________________________________________________________________
_______________________________________________________________________________________

Similar Documents

Free Essay

Mct Online

...Topics : Sound Generation Introduction: From 'O' level physics, you have learned that sound is the vibration of air within the frequencies of range of 20 Hz. to 20KHz. If we can generate these air waves, we can make sound. A loud speaker is made up of a moving coil wound round a permanent magnet as shown in Figure 1. When an alternating current passes through the moving coil (also known as voice coil), a force is transmitted to the paper cone. The moving cone produces air pressure waves and acoustic energy is radiated. The frequency of the alternating current through the coil will be the same frequency as the sound wave. Permanent Magnet Cone radiator X Flexible suspension Moving coil Figure 1. Dynamic loudspeaker construction Microcontroller Technology Page 1 If a program, when executed, can generate a square wave of say 440 Hz. (the A note) at the output where speaker/buzzer is connected, a tone radiated from the speaker will be heard. It is not difficult at all to generate such a frequency using a program. The principle is to have a delay routine of the right duration and have the logic state of speaker/buzzer output pin toggle every time when the delay routine expires. For example, to generate a 500 Hz. wave, a delay routine of 1 ms is needed. This 1 ms duration is derived from the following. Given, frequency, f= 500 Hz. 1 1 Period , T    2mS f 500 Since the signal needs to change state at every half cycle therefore the Delay...

Words: 406 - Pages: 2

Premium Essay

Mct Q&a

...(G) On Keypad & Sensor : 1. How many I/O interface pins between keypad (4x4) and PIC18f4520? - Keypad (4x4) has 8 I/O interface pins. - In this example schematic that has RB0 to R07 connected to the 8 I/O pins on to the Keypad (4x4) - PIC18f4520 has 36 I/O pins that grouped into 5 ports - It should require 8 pins to connect a 4x4 keypad. 2. How to detect if a key is depressed? E.g. Of flowchart when things are input. E.g. Of flowchart when things are input. End End Wait for Key Release Wait for Key Release Swap I/O back to original setup Swap I/O back to original setup Combine ‘R’ and ‘T’ and put into global variable Combine ‘R’ and ‘T’ and put into global variable Read another input (Keypad) and put into variable (e.g. ‘T’) Read another input (Keypad) and put into variable (e.g. ‘T’) Swap I/O Swap I/O Read the input (from Keypad) and put into variable (e.g. ‘P’) Read the input (from Keypad) and put into variable (e.g. ‘P’) Start Start - When a key depression has been detected and an interrupt generated, the MCU will need to determine which of the keys is being pressed. - E.g. Initial a row high, and scan the 4 columns to see if any are high, if one is, then you have found a pressed key. 3. How to identify which of the 16 keys were depressed (decode the key from the (4x4) matrix)? -The Keys are in a matrix, the PIC must determine which row and column matches the key press. - Once a key is pressed, a row/column...

Words: 1276 - Pages: 6

Free Essay

Mct Programming

...1. Introduction Asd asd asda sd asdas d A wiki is run using wiki software, otherwise known as a wiki engine. There are dozens of different wiki engines in use, both standalone and part of other software, such as bug tracking systems. Some wiki engines are open source, whereas others are proprietary. Some permit control over different functions (levels of access); for example, editing rights may permit changing, adding or removing material. Others may permit access without enforcing access control. Other rules may also be imposed to organize content. A wiki engine is a type of content management system, but it differs from most other such systems, including blog software, in that the content is created without any defined owner or leader, and wikis have little implicit structure, allowing structure to emerge according to the needs of the users.[2] The encyclopedia project Wikipedia is by far the most popular wiki-based website, and is in fact one of the most widely viewed sites of any kind of the world, having been ranked in the top ten since 2007. Wikipedia is not a single wiki but rather a collection of hundreds of wikis, one for each language. There are at least tens of thousands of other wikis in use, both public and private, including wikis functioning as knowledge management resources, notetaking tools, community websites and intranets. Ward Cunningham, the developer of the first wiki software, WikiWikiWeb, originally described it as "the simplest online database that...

Words: 264 - Pages: 2

Premium Essay

Mct Answer Sheet for Term Test

...What is a Keypad? A keypad is a set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order on a pad, which can be used as an efficient input device. A keypad may be purely numeric, as that found on a calculator or a digital door lock, or alphanumeric as those used on cellular phones. Explanation for Keypad Aside from the row of number keys found on the upper portion of a computer keyboard, a separate numerical pad is also located on the right side for efficient data entry. For more compact computers such as laptops and notebooks, external plug-in keypads may be purchased separately. Phone keypads are typically alphanumeric, allowing the user to enter names and text messages. They also provide an easier way of remembering phone numbers. For instance, 1-800-DELIVER is a way of marketing a food chain delivery service, but it's easier to remember than the actual number customers would call (1-800-335-4837). How many I/0 interface pins between keypad (4x4) and PIC18f4520? A standard Microcontroller Keypad (4x4) has a 8 I/0 interface pins. In the example below, RB0 to R07 is connected to the 8 I/O pins of the Keypad (4x4) The standard PIC18f4520 Microcontroller has 36 I/O pins that are grouped into 5 ports respectively. Due to this, It should require 8 pins to connect the 4x4 Keypad to make it work. How to detect if the key is pressed? E.g. Of flowchart when things are input. When a key depression has been detected...

Words: 467 - Pages: 2

Free Essay

Mcts Guide to Microsoft Windows 7 Chapter 1

...1. A friend has asked you which version of Windows 7 should be purchased to start a new multimedia-based home entertainment system. Your friend will not require business support features, but will require support communicating with an Xbox 360. Which version of Windows 7 do you recommend? a. Windows 7 Ultimate b. Windows 7 Home Basic c. Windows 7 Home Premium d. Windows 7 Enterprise 2. Windows 7 supports only cooperative multitasking. True or False? 3. The Graphics Processing Unit is a hardware component capable of quickly drawing items to the screen. 4. A graphics card capable of running the Aero Theme must have drivers certified to which standard (select two)? a. DirectX b. WDDM c. WDF d. WDM e. Vendor 5. All device drivers are considered safe to install if they are _____ by Microsoft. a. compiled b. certified WDDM c. digitally signed d. reviewed by WHQL 6. You are considering purchasing a USB microphone. You are not sure it is compatible with Windows 7. What type of logo should you look for on the product packaging? a. WHQL b. compatible with Windows 7 c. WDDM driver d. Vendor certified e. Ultimate 7. Your workstation is running Windows 7 Professional and you decide to share a folder on your computer. Twenty-two? people in your office are trying to connect to that folder at the same time over the network. The first 20 people can connect, the other two cannot. To fix this you could _____. a. buy a computer, software, and licenses...

Words: 1062 - Pages: 5

Premium Essay

Unit 9 Movement Control Team

...Introduction: Movement Control Teams (MCT) have played a vital role in the Army providing decentralized execution of movement responsibilities to a variety of transportation nodes. Within the transportation node, an MCT is designed to execute missions in movement regulation, area missions, documentation, intermodal and division support. Because of the critical role an MCT has in transportation, there is an increased demand for them to deploy in support of operational forces. While an MCT may have the experience in deployments, their home station skills diminish due to their reliance on the Logistics Readiness Center (LRC) to provide the technical experience and continuity for a variety of missions within the continental United States (CONUS)...

Words: 1464 - Pages: 6

Free Essay

Counselling

...|TENTATIVE DATE SHEET FOR TERM-END EXAMINATION –DECEMBER, 2013 | |MASTERS DEGREE PROGRAMMES | |Permission for appearing in the examination is provisional and is subject to the following conditions: | |(1)Your registration for these courses is valid and not time barred. (2) You have submitted the required number of assignments in the courses by due date wherever applicable (3) You have completed the minimum time | |to pursue these courses as per the provision of your programme (4) You have paid the examination fee for all the courses you are appearing in the examination | |In case of non compliance of any of the above conditions, the result of all such courses will not be declared. | | ...

Words: 1614 - Pages: 7

Premium Essay

Multicultural Counselling Therapy, Six-Step Model Of Crisis Intervention

...communication is important in PAR and understanding participants in a non judgemental environment and also the power dynamic between researcher and participants are equal” (Visser & Moleko. 2012: 66). Multicultural counselling therapy (MCT) The Multicultural counselling therapy (MCT) is an effective approach to therapy as it is not a conventional or mainstream psychology approach and it is versatile in the sense that it focuses on the diverse and culturally different aspect in counselling therapy. “Culture is seen as a group of individual’s values and behaviours and it is important to note that culture is more than just ethnic or racial heritage, but it is factors like age, gender, religion, sexual orientation, physical and mental ability, and socio-economic status” (Corey, Nicholas, and Bawa. 2017: 20). In MCT it is important to keep in mind these different aspects and to be aware and empathic of different worldviews, the objective of this approach is to be open-minded and to be able to adapt to the situation. “It is important to note that in MCT, it consists of different theories and approaches and it depends on the individual in relation to their cultural context” (Hartman, 2018). In order to understand an individual in context to the MCT, it is imperative to understand one’s self and their own cultural background and beliefs. The six-step model of Crisis Intervention The six-step model of crisis intervention, consist of six steps: step 1- Defining the problem, step 2-...

Words: 1941 - Pages: 8

Free Essay

Management

...|TENTATIVE DATE SHEET FOR TERM-END EXAMINATION –DECEMBER, 2012 | |BCA AND MASTERS DEGREE PROGRAMMES | |Permission for appearing in the examination is provisional and is subject to the following conditions: (1) your registration for these courses is valid and not time barred. (2)You have submitted the required number of | |assignments in the courses by due date wherever applicable (3) You have completed the minimum time to pursue these courses as per the provision of your programme (4) You have paid the examination fee for all the | |courses you are appearing in the examination | |In case of non compliance of any of the above conditions, the result of all such courses will not be declared. | | ...

Words: 1929 - Pages: 8

Premium Essay

Anhssysvhdhvhvhdvv

...MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) 9/8/15, 8:37 PM Share your Notes, Comments and more. Join the inGenius Community today. Complete your Profile. MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) Search this book: Assessment Test MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) by William Panek Sybex © 2010 > Assessment Test 1. What filename extension is applied by default to custom consoles that are created for the MMC? A. .mmc B. .msc C. .con D. .mcn 2. You want to create roaming profiles for users in the sales department. They frequently log on at computers in a central area. The profiles should be configured as mandatory and roaming profiles. Which users are able to manage mandatory profiles on Windows 7 computers? A. The user who uses the profile B. Server operators C. Power users D. Administrators http://mmlviewer.books24x7.com/book/id_41094/viewer.asp?bookid=41094&chunkid=709183989 Page 1 of 13 MCTS Microsoft Windows 7 Configuration Study Guide (Exam 70-680) 9/8/15, 8:37 PM 3. You want to monitor the CPU, memory, and disk usage on your computer to ensure that there are no bottlenecks. Which MMC snap-in would you load to access System Monitor? A. System Monitor B. Reliability Monitor C. ActiveX Control D. Performance Logs and Alerts 4. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user ...

Words: 3377 - Pages: 14

Premium Essay

Monetary Policy

...Monetary Policy Design in a DSGE Model 1. A simple model 1.1 Households The utility function of a representative household is ∞ ⎛ ξ C1−σ L1+η ⎞ Et ∑ β s ⎜ t + s t + s − t + s ⎟ 1+η ⎠ s =0 ⎝ 1−σ (1) The dynamics of the demand shock is ζ t = ζ t −1 + eζ ,t , where ξt = eζ . The consumption is t θ −1 ⎡ 1 ⎤ θ −1 composed of lots of goods. It is composed in a CES function Ct = ⎢ ∫ Ct (i ) θ di ⎥ . The i =0 ⎣ ⎦ 1 1−θ 1−θ consumer price index is P = ⎡ ∫ P (i ) di ⎤ . Then the demand function of each good is t t ⎢ i =0 ⎥ ⎣ ⎦ 1 θ ⎡ P (i ) ⎤ Ct (i ) = ⎢ t ⎥ Ct ⎣ Pt ⎦ The budget constraint is −θ PCt + Bt = Wt Lt + Π t + Rt −1 Bt −1 t The first order condition for Ct , Lt , and Bt are Ct−σ = λt Pt Lη = λtWt t λt = Rt λt +1|t After some calculation, we have the Euler equation and labor supply equation ξt +1Ct−+σ / Pt +1 1 β Rt Et =1 −σ ξt Ct / Pt ξt Ct−σ Pt 1.2 Firms (2) = Lη t Wt (3) Assume there is a type of price stickiness in the economy, that each firm has a probability φ that cannot change its price, and fixed the level as the last time. And it has a probability 1 − φ that can re-optimal its price. The problem of a firm which can re-optimal its price in time t is 1 Et ∑ (βφ ) s Λ t + s [ Pt* (i )Yt (i ) − Wt Lt (i )] s =0 ∞ ⎡ Pt * ⎤ s.t.Yt + s (i ) = ⎢ ⎥ Ct and Yt (i ) = At Lt (i ) ⎣ Pt + s ⎦ The dynamics of the technology shock is at = ρ a at −1 + ea ,t , where at = ln( At ) . The first order condition is ...

Words: 1198 - Pages: 5

Free Essay

Coconut Oil

...HOW CAN COCONUT OIL BE USED IN THE DIET? Coconut oil can be substituted for any solid or liquid oil, lard, butter or margarine in baking or cooking on the stove, and can be mixed directly into foods already prepared. Some people take it straight with a spoon, but for most people it may be hard to swallow this way and more pleasant to take with food. When cooking on the stove, coconut oil smokes if heated to greater than 350 degrees or medium heat. You can avoid this problem by adding a little olive or peanut oil. Coconut oil can be used at any temperature in the oven when mixed in foods. WHAT IS THE NUTRIENT CONTENT OF COCONUT OIL? DOES IT CONTAIN OMEGA-3 FATTY ACIDS? Coconut oil has about 117-120 calories per tablespoons, about the same as other oils. It contains 57-60% medium chain triglycerides, which are absorbed directly without the need for digestive enzymes. Part of it is metabolized by the liver to ketones which can be used by most cells in the body for energy. This portion of the coconut oil is not stored as fat. Coconut oil is about 86% saturated fat, most of which is the medium chain fats that are metabolized differently than animal saturated fats. It contains no cholesterol and no transfat as long as is non-hydrogenated. An advantage of a saturated fat is that there is nowhere on the molecule for free radicals or oxidants to attach. About 6% of the oil is monounsaturated and 2% polyunsaturated. Coconut oil also contains a small amount of phytosterols...

Words: 2326 - Pages: 10

Premium Essay

Testing

...Certifications: A+ ACE Associate Project Manager CAPM Certification CBAP" - Certified Business Analysis Professional CCCI - Certified Computer Crime Investigator CCE - Certified Computer Examiner CCFT - Certified Computer Forensic Technician CCSA/CCSE Check Point CEECS - Certified Electronic Evidence Collection Specialist CEH - Certified Ethical Hacker CEIC - Computer and Enterprise Investigations Conference CFCE - Certified Forensic Computer Examiner CFE - Certified Fraud Examiner CFIA - Certified Forensic Investigation Analyst CHFI - Certified Hacking Forensic Investigator CIFI - Certified International Information Systems Forensic Investigator CISA - Certified Information Systems Auditor CISM - Certified Information Security Manager CISSP - Certified Information Systems Security Professional CISSP-ISSAP - Information Systems Security Architecture Professional CISSP-ISSEP - Information Systems Security Engineering Professional CISSP-ISSMP - Information Systems Security Management Professional CIW - Certified Internet Webmaster CNA - Certified Novell 5 Administrator CNE - Certified Netware Engineer CNSS 4013 Recognition CPE - Certified PGP Engineer - PGP Corporation CSA - Certified Security Analyst CSE - Certified Steganography Examiner CSFA - CyberSecurity Forensic Analyst CSICI - CyberSecurity Institute Certified Instructor CSIH - Certified Computer Security Incident Handler CSTA - Certified Security Testing Associate CSTP - Certified Security...

Words: 1957 - Pages: 8

Free Essay

Disadvantage of Goats Milk

...http://www.quickanddirtytips.com/health-fitness/trends-fads/goat-milk-better-you?page=all How is Goat Milk Different from Cow Milk? One of the first things you’ll notice is that goat milk is two or three times as expensive as cow milk. Mostly, that’s because it’s still a pretty small niche market, so the goat milk producers don’t enjoy the same economy of scale as those who produce cow milk.  In today’s economy, in order to get me to spend three times as much for something, you’re going to have to convince me that it’s superior in some sort of significant way. I’m often willing to spend more for something simply because it tastes better, such as really good chocolate.  Goat milk definitely tastes different than cow milk but flavor is purely a matter of preference. I suspect it has a lot to do with what you’re used to. To someone used to drinking cow milk, goat milk can taste sort of funky. Personally, while I enjoy that goat-y taste in cheese, I find it a little off-putting in the glass. But, again, that’s purely subjective.  Is Goat Milk More Nutritious? People who sell goat milk often point out that goat milk is higher in protein, vitamin A, calcium, and potassium than cow milk—which it is. Of course, they usually don’t mention that goat milk is lower in folate, B12, selenium, and omega-3.  But it doesn’t really matter; the nutritional differences are all quite small. I’d consider the two to be nutritionally equivalent. Is Goat Milk Easier to Digest? For those who...

Words: 964 - Pages: 4

Premium Essay

Evaluate the Pluralist View of the Ownership and Control of the Mass Media

...Evaluate the pluralist view of the ownership and control of the mass media The mass media is the means by which messages and images are communicated to a mass audience, it does this through its various Mass Communication Technologies (MCTs), and for instance the Internet is a very powerful and influential MCT communicating worldwide. MCTs educate, persuade and inform as well as entertain their audience. Media is geographically dispersed and has no limits due to its global domination. It is also culturally diverse and socially mixed. Pluralists believe that the mass media is reflective of social reality, and acts as a 'mirror'. They state that it has a functional role in meeting the demands of its mass audience, and thus owes a duty to the people. Marxists on the other hand would argue that the media constructs desires and creates social reality. In other words it is a sculptor of a worldview and distorts social reality which is based on exploitation of a powerless majority, thus it is an ideological tool of the powerful bourgeoisie and reflects their interests. Over eighty percent of the media is owned by Trans National Corporations. But does ownership have any effect on the media coordinators? According to pluralists the answer is simply no. They back this by highlighting the fact that power is dispersed within society and that different pressure and interest groups all influence the media, which reacts accordingly. For instance Green Peace;...

Words: 624 - Pages: 3