a) Given ISP as an address 80.70.56.0/21, therefore the prefix length is 21.
• The number of addresses in the given ISP are N= 232-21= 211= 2048 addresses are present in the given block
• The first address can be calculated by converting the given address into binary format and performing an AND operation with its subnet mask that is
01010000 01001000 00111000 00000000- given address
AND 11111111 11111111 11111000 00000000 subnet mask
Result 01010000 01001000 00111000 00000000 first Address
• Therefore the first address in decimal format is 80.70.56.0/21, by adding 2047 addresses to the first address we get the last address of the block that is 80.70.63.255/21.
• The range of the address is 80.70.56.0/21 to 80.70.63.255/21
b) Given that 2 organizations are to be assigned 500 addresses each, 2 organizations have to be assigned 250 addresses each and 3 organizations must be assigned 50 addresses each.
• According to CIDR rules each organization or in a block the number of addresses must be a power of 2, as 500, 250, 50 are not power of 2.
• To satisfy the CIDR restriction 1, assign 512, 256, 64 block of addresses for the organization instead of 500, 250, 64.
• After assigning 2 blocks of 512 addresses each, 2 blocks of 256 addresses each, 3 blocks of 64 addresses each from 2048 addresses, 320 addresses are left out unassigned.
• Block1: let the first address be 80.70.56.0, as there are 512 addresses, the prefix length is 23, then the last address is the first address + 511.
• For the unassigned block as there are 320 addresses, according CIDR restriction the number of addresses in a block should be a power of 2, divide the unassigned block into two parts, unassigned block1 contains 256 addresses and Block2 contains 64 addresses.
• Therefore the ranges for each organization are assuming that all the blocks are continuous
Block name | Block size | Prefix | Range |
Block1 | 512 | 32-log2512= 23 | 80.70.56.0/23 to 80.70.57.255/23 |
Block2 | 512 | 32-log2512=23 | 80.70.58.0/23 to 80.70.59.255/23 |
Block3 | 256 | 32-log2256=24 | 80.70.60.0/24 to 80.70.60.255/24 |
Block4 | 256 | 32-log2256=24 | 80.70.61.0/24 to 80.70.61.255/24 |
Block5 | 64 | 32-log264= 26 | 80.70.62.0/26 to 80.70.62.63/26 |
Block6 | 64 | 32-log264= 26 | 80.70.62.64/26 to 80.70.62.127/26 |
Block7 | 64 | 32-log264= 26 | 80.70.62.128/26 to 80.70.62.191/26 |
Un B1 | 256 | 32-log2256=24 | 80.70.62.192/24 to 80.70.63.191/24 |
Un B2 | 64 | 32-log264= 26 | 80.70.63.192/26 to 80.70.63.255/26 |
c) The forwarding table of a router can be given as:
Subnet mask | Interface |
01010000 01000110 0011100 | m0 |
01010000 01000110 0011101 | m1 |
01010000 01000110 00111100 | m2 |
01010000 01000110 00111101 | m3 |
01010000 01000110 00111110 00 | m4 |
01010000 01000110 00111110 01 | m5 |
01010000 01000110 00111110 10 | m6 |
01010000 01000110 00111110 11 | un b1 |
01010000 01000110 00111111 | un b2 |
d) The diagrammatic representation of the router and the interfaces is given below:
An organization is granted a block of addresses with the beginning address 188.78.55.0/22. The organization needs to the following subblocks of addresses to use in its subnets as shown below Two subblock of 128 valid host addresses. Three subblock of 60 valid host addresses. One subblock of 16 valid host addresses. Design the subblocks and for each group starting from the first address in the given block of addresses and find the following: 1. Subnet mask 2. First and last...
COMPUTER NETWORKS: 1. An organization with a Class B IP address of 128.25.0.0/16 wants eight subnets in its network. There are some legacy routers. Hence, they do not want to use zero and all-ones subnets. a. How many bits are used in each of the following three fields? netID: ______________ subnetID: __________ hostID: _________________ b. Determine the subnet mask that needs to be set in the hosts in dotted decimal notation. Subnet Mask in dotted decimal notation: ¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬_______________________________________ c. ...
COMPUTER NETWORKS: 3. Consider an organization that needs 400 IP addresses. The organization has been assigned two blocks Class C addresses. 200.128.64.0 – 200.128.64.255, and 200.128.65.0 – 200.128.65.255. Having obtained these 512 addresses, the organization decided to subnet its address space with 3 bit subnetID. e. Determine the number of subnets possible in this organization. The organization plans to use zero and all-ones subnets. Number of subnets possible: __________________________________________________ f. Determine the number of hosts possible in each subnet. Number...
IP addresses 100.64.3.8/16 and 100.64.4.8/16 are allocated to two systems. It is assumed that Classless Inter-Domain Routing (CIDR) is used. (i) Are the systems on the same subnet? Explain your reasoning. (ii) Network 100.64.0.0/16 needs to be divided into several subnets. Each network has to accommodate 510 hosts. How many bits are required for the host portion of the IP address? (iii) How many subnets of this size are possible?
***Topic is Networking & Data Communications I. Conversion between binary and decimal forms of IP addresses Convert the binary IP address into decimal form. 10011010 . 00110010 . 00100000 . 00011111 01100101 . 11001101 . 11011111 . 11100000 Convert the IP addresses from decimal to binary form. 64.27.101.17 141.233.128.31 II. Determining Whether Two IP Addresses in Binary Form are on the Same Subnet In each of the following exercises, you are to use the subnet mask to determine whether the...
PART A 21 MARKS
SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write
your answers in the Examination Answer Booklet. Each question is
worth 1.5 marks (14 x 1.5 = 21 marks).
Question 1
An organisation has been granted a block of addresses with the mask
/22. If the organisation creates 8 equal-sized subnets, how many
addresses (including the special addresses) are available in each
subnet? Show your calculations.
Question 2
Give an example of a valid classful address...
In this assignment, you will implement a Memory Management System(MMS). Using C Programming Language..... MAKE SURE YOU USE C PROGRAMMING Your MMS will handle all requests of allocation of memory space by different users (one thread per user) …. HINT(You will use Pthreads and Semaphores). Your MMS will provide the user with an interface for making memory requests and also for freeing up memory that is no longer needed by the user. One of the jobs of your memory management...
Most people fail to recognize the importance of networking and negotiating to their career success. People who are good at networking tend to form better human relations with key individuals who can help them in advancing their professional careers. People who are good at negotiating have a better chance of getting what they truly desire. One’s ability to negotiate affects his or her compensation in the workplace. Negotiating Women, Inc. is a consulting company that focuses on women exclusively by...
CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...
Read the articles provided (Riggio, 2008) and Javidan &
Walker (2012). Perform a self-assessment of the global mindset
competencies. What competencies do you feel are your strengths?
Your areas for improvement? What next learning steps could you take
to address your areas for improvement?
LEADERSHIP DEVELOPMENT: THE CURRENT STATE AND FUTURE EXPECTATIONS Ronald E. Riggio Claremont McKenna College This article discusses the common themes in this special issue of Consulting Psychology Journal on "Leadership Development" and summarizes some of the...