Dotted-Decimal to Prefix Length (CIDR) Conversion Convert the following subnets and subnet masks shown in dotted-decimal format into the equivalent prefix length format. Example: 192.168.1.0 255.255.255.0; Answer: /24 192.168.1.0 255.255.255.128; Answer: /25 192.168.1.128 255.255.255.192; Answer: /26 192.168.1.32 255.255.255.224; Answer: /27 192.168.1.96 255.255.255.248; Answer: /29 192.168.1.48 255.255.255.252; Answer: /30 172.16.128.0 255.255.224.0; Answer: /20 172.16.8.0 255.255
Words: 471 - Pages: 2
Meeting Analysis Steven Hines I attended a meeting with the 4th Sustainment Brigade Communications group. The intent of the meeting was review the training calendar, make an outline for headquarters restructuring, and address any Service Member or Staff issues that may have arisen. The meeting started out with everyone assembling in a conference room complete with a projector and conference phone. After everyone was assembled each member introduced themselves. The location of the
Words: 310 - Pages: 2
and because address space on the Internet is limited, there is a need for some organization to control and allocate address number blocks. IP address management was formerly a responsibility of the IANA, which contracted with Network Solutions Inc. for the actual services. In December 1997, IANA turned this responsibility over to ARIN, which, along with Reseaux IP Europeans (RIPE), APNIC, LACNIC and AfriNIC, now manages the world's Internet address assignments and allocation B. .The Internet Assigned
Words: 604 - Pages: 3
Device | Interface | IP Address | Subnet Mask | Default Gateway | Building1 | G0/0 | 172.31.103.1 | 255.255.255.240 | N/A | | G0/1 | 172.31.103.33 | | N/A | | S0/0/0 | 172.31.103.97 | | N/A | Building2 | G0/0 | 172.31.103.65 | 255.255.255.240 | N/A | | G0/1 | 172.31.103.81 | 255.255.255.240 | N/A | | S0/0/0 | 172.31.103.98 | 255.255.255.252 | N/A | ASW-1 | VLAN 1 | 172.31.103.2 | 225.255.255.224 | | ASW-2 | VLAN 1 | 172.31.103.34 | | | ASW-3 | VLAN 1 |
Words: 294 - Pages: 2
Host Configuration Protocol) and DNS (Domain Name System) are both servers that work best together and when clients need multiple systems synchronized to one central location. DNS servers provide domain names and network resources. It associates TCP/IP addresses assigned to clients with domain names. It is designed for query lookups and hold distributive zones. This means that all computers may operate and share address pools in the event one fails. Another benefit of using DHCP servers with DNS servers
Words: 299 - Pages: 2
Chapter 2 Solutions Review Questions 1. Your colleague is trying to upgrade from Windows Server 2003 Datacenter Edition to Windows Server 2008 Standard Edition, but the Setup program won’t allow the upgrade. Which of the following is the problem? Answer: c. Windows Server 2003 Datacenter Edition cannot be upgraded to Windows Server 2008 Standard Edition. 2. Your IT director heard about a fast but inexpensive new computer and purchased it to be the new Windows Server 2008 server on
Words: 3139 - Pages: 13
Ping Sweeps & Port Scans: Potential Dangers and Defense Strategies THIS IS MY ORIGINAL WORK, PLEASE DO NOT SUBMIT IT AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations
Words: 1200 - Pages: 5
------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- -------------------------------------------------
Words: 1401 - Pages: 6
Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence
Words: 343 - Pages: 2
On November 9, 2011, Manhattan U.S. Attorney’s Office announced that they have charged the seven individual for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four million computers located in over one hundred countries which generated at least $14 million in illegitimate income. Of the computers infected with malware, at least 500,000 were in the United States, including computers belonging to US government agencies, educational institutions, non-profit
Words: 314 - Pages: 2