Question

Question 11 The IP address for the above network is 192.168.151.0/24 (a) What is the total number of networks in the diagram
0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) The total number of networks is 19.

Nも ALto At12 Nt6 Ni5 NI) NIZ At 2

b)

Without VLSM, the network can't satisfy the specified conditions. Since there are a total of 19 networks, FLSM is not possible as we need 15 IP's for each internal network which requires a total of 19*15=285 IP's. But, we have a maximum of 256 IP's. FLSM can't be possible here.

S.No Actual IP's Required IP's Total IP's
N1 to N19 13 user PC's

2 additional

(one for n/w IP + one for broadcast IPs)

13+2=15

c)

With the help of VLSM, we can achieve the above network with ease. We can reduce the wastage of IP's in Variable Lenght Subnet Masking(VLSM). We can assign IP's as per our requirement.

Our block size can be greater than or equal to our host's requirement.

Out of 19 networks, we have 9 internal networks which support 13 User PCs, i.e., we need a total of 15*9=135 IPs.

9 Subnets with block size 16. They are 0-15,16-30,31-45,46-60,61-75,76-90.91-105,106-120,121-135.

For the remaining 10 networks, serial connections we need 4 hosts each i.e., 10*4=40 IPs. The block size is 4 for serial connections. They are 136-139,140-143,---and so on.

SNo Actual IP's Required IP's Total Block Size
N1 - N9 13 User PC's n/w IP + broadcast IP 15 16
N10 - N19 (Router-Router Connections) 2 2 4 4
Add a comment
Know the answer?
Add Answer to:
Question 11 The IP address for the above network is 192.168.151.0/24 (a) What is the total number of networks in the diagram above? (b) Each individual internal network (the networks behind the r...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • COMPUTER NETWORKS: 1.   An organization with a Class B IP address of 128.25.0.0/16 wants eight subnets...

    COMPUTER NETWORKS: 1.   An organization with a Class B IP address of 128.25.0.0/16 wants eight subnets in its network. There are some legacy routers. Hence, they do not want to use zero and all-ones subnets. a.   How many bits are used in each of the following three fields? netID: ______________       subnetID: __________   hostID: _________________ b.   Determine the subnet mask that needs to be set in the hosts in dotted decimal notation. Subnet Mask in dotted decimal notation: ¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬_______________________________________ c.  ...

  • COMPUTER NETWORKS: 3.   Consider an organization that needs 400 IP addresses. The organization has been assigned...

    COMPUTER NETWORKS: 3.   Consider an organization that needs 400 IP addresses. The organization has been assigned two blocks Class C addresses. 200.128.64.0 – 200.128.64.255, and 200.128.65.0 – 200.128.65.255. Having obtained these 512 addresses, the organization decided to subnet its address space with 3 bit subnetID. e.   Determine the number of subnets possible in this organization. The organization plans to use zero and all-ones subnets. Number of subnets possible: __________________________________________________ f.   Determine the number of hosts possible in each subnet. Number...

  • 7. Write down the last network address for the network classes listed below: (do not use any reserved address) Class C Class B Class A Tabie 3 3 marksy 8. The following host IP addresses all belong t...

    7. Write down the last network address for the network classes listed below: (do not use any reserved address) Class C Class B Class A Tabie 3 3 marksy 8. The following host IP addresses all belong to IP4 subnetted networks. Using the information provided (IP address and network prefix length), fill in the table with the Subnetwork Address of the subnet to which the host belongs, the subnet mask and the number of host each subnetwork can accommodate. Host...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow...

    1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow to happen within the myofiber? (5 points) 2. According to the paper, what is the major disadvantage of relying on glycolysis during high-intensity exercise? (5 points) 3. Using Figure 1 in the paper, briefly describe the different sources of ATP production at 50% versus 90% AND explain whether you believe this depiction of ATP production applies to a Type IIX myofiber in a human....

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • summatize the following info and break them into differeng key points. write them in yojr own...

    summatize the following info and break them into differeng key points. write them in yojr own words   apartus 6.1 Introduction—The design of a successful hot box appa- ratus is influenced by many factors. Before beginning the design of an apparatus meeting this standard, the designer shall review the discussion on the limitations and accuracy, Section 13, discussions of the energy flows in a hot box, Annex A2, the metering box wall loss flow, Annex A3, and flanking loss, Annex...

  • And there was a buy-sell arrangement which laid out the conditions under which either shareholder could...

    And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT