SlideShare a Scribd company logo
Assignment # 1
Internet Architecture and Protocols
IP Addressing and Subnetting
1. Write the default Masks for the Class A, Class B and Class C IP
addresses.
 For Class A: 255.0.0.0
 For Class B: 255.255.0.0
 For Class C: 255.255.255.0
2. How we can distinguish Class A, Class B, Class C, Class D and Class E
IP addresses from eachother. Write the range of first octetin decimal
and Binary for all the 5 IP address classes.
Class Address Ending
Address
Starting Address in binary Ending Address in
binary
A 1.0.0.0 126.255.255.255 00000001.00000000.
00000000. 00000000
0111110.11111111.
11111111. 11111111
B 128.0.0.0 191.255.255.255 10000000. 00000000.
00000000. 00000000
10111111.11111111.
11111111. 11111111
C 192.0.0.0 223.255.255.255 11000000. 00000000.
00000000. 00000000
11011111.11111111.
11111111. 11111111
D 224.0.0.0 239.255.255.255 11100000. 00000000.
00000000. 00000000
11101111.11111111.
11111111. 11111111
E 240.0.0.0 255.255.255.255 11110000. 00000000.
00000000. 00000000
11110111.11111111.
11111111. 11111111
3. Write the default subnet Masks forthe following IP addresses:
IP Address Class Default Subnet Mask
179.65.225.4 B 255.255.0.0
222.35.20 C 255.255.255.0
111.7.80.0 A 255.0.0.0
4. Write down the three available ranges for assigning Private IP addresses recommended by IANA
(Internet Assigned Number Authority).
Address Blocks
IP Address Class Private IP Address
10.0.0.0 A 10.255.255.255
172.16..0.0 B 172.31.255.255
192.168.0.0 C 192.168.255.255
5. A broadcast address is the one that addresses to all the hosts in any network. State that to create a
broadcast address,all the bits of network ID portion or all the bits of host ID portion are set to 1? Write
down the broadcast addresses ofthe networks to which the following IP addresses belong,write network
addresses and ranges of their valid IP address too.(No subnetting)
IP Address Network Address Broadcast Address
129.65.225.4 129.65.0.0 129.65.255.255
211.35.20.18 211.35.20.0 211.35.20.255
180.47.115.6 180.47.0.0 180.47.255.255
6. Subnet Mask or Custom mask tells us that how many bits are used for Subnet ID portion and how many
for host ID portion. Identify how many bits are used for sub netting in the following IP address using its
subnet mask:
IP Address Subnet Mask Binary Subnet ID bits Host ID bits
135.65.225.4 255.255.240.0 255.255.11110000.0 20 12
210.35.20.18 255.255.255.248 255.255.255.11111000 29 3
190.47.115.6 255.255.254.0 255.255.11111110.0 23 9
7. Extract the Network Addresses of the given IP addresses in question number 8, using the subnet masks
given with them. (Remember that ANDing the IP address with the Mask extracts the network address from
the given IP address).
1- IP Address 135.65.11100001.4
Subnet Mask 255.255.11110000.0
After AND
Network Address 135.65.11100000.0 135.65.224.0
2- IP Address 210.35.20.00010010
Subnet Mask 255.255.255.11111000
After AND
Network Address 210.35.20.00010000 210.35.20.16
3- IP Address 190.47.01110011.6
Subnet Mask 255.255.11111110.0
After AND
Network Address 190.47.01110010.0 190.47.114.0
8. Which of the following Subnet masks would allow a class A network to allow subnets to have up to 150
hosts and allow for up to 164 subnets?
a. 255.0.0.0 b. 255.255.255.0 c. 255.255.192.0 d. 255.255.240.0 e.255.255.252.0
For allowing 150 hosts minimum 8 bits of host part should be available. And for allowing 164 subnets
8 bits are minimal required. All of these will allow to have up to 8 host’s bits and 8 network bits
available. According to the formula
2n >= required hosts For Hosts
2n >= required subnets For Subnets
9. Suppose you have a class C Network 208.94.115.0. Your task is to design a subnet scheme so that we can
create 16 Network segments (subnets)within this Network. Each subnet should support 10-14 hosts.
2n >= 14
24 >= 14
16 > 14
So, n = 4.
a. How many bits would you use for the subnet ID?
28 bits are used for subnet ID.
b. How many bits would you use for the Host ID?
4 bits are used for Host ID
c. How many maximum possible subnets will be there?
24 subnets are possible because we have 8 bits for Host ID. So,
16 maximum subnets are possible.
d. How many maximum possible hosts will be there in each subnet?
24 subnets are possible because we have 8 bits for Host ID. So,
16 maximum hosts are possible per subnet.
e. Write down the Subnet Mask of your scheme.
208.94.115.11110000
255.255.255.240
f. Write down All the valid IP addresses
Valid IP’s
 208.94.115.0/28
 208.94.115.16/28
 208.94.115.32/28
 208.94.115..48/28
 208.94.115.64/28
 208.94.115.80/28
 208.94.115.96/28
 208.94.115.112/28
 208.94.115.128/28
 208.94.115.160/28
 208.94.115.176/28
 208.94.115.192/28
 208.94.115.208/28
 208.94.115.224/28
 208.94.115.240/28
g. The broadcast address ofthe First subnet ofyour scheme.
208.94.115.15 /28
10. Suppose you have a class C Network 220.94.115.0. Your task is to design a subnet scheme so that we can
create 28 Network segments (subnets)within this Network. Each subnet should support hosts as given
below.
Steps
1- Write IP
220.94.115.0
2- Convert to binary
220.94.115.00000000
3- Find n
2n >= max host value
2n >= 30
25 >= 30
N=5
4- Give bits to network
220.94.115.11100000
5- IP of this network
220.94.115.224
6- Subnet Mask of IP
255.255.255.224/27
7- Subnets
 220.94.115.0/27
 220.94.115.32/027
 220.94.115.64/027
 220.94.115.96/027
 220.94.115.128/027
 220.94.115.160/027
 220.94.115.192/027
 220.94.115.224/027
These are the network segments that can be created. Each subnet will support up to 32 hosts.
To make the 28 segments we can use Class A or B for more segments.

More Related Content

What's hot

Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_addressrizwanaabassi
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
AnhMai173354
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
Wamuyu Murakaru
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
vssnsarma
 
Sub Netting
Sub NettingSub Netting
Sub Netting
Lilesh Pathe
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
Amit Kundu
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
teknetir
 
Ip addressing
Ip addressingIp addressing
Ip addressing
sid1322
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
AYESHA JAVED
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
SangeethaSasi1
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
wacasr12
 

What's hot (20)

Subnetting a class_c_address
Subnetting a class_c_addressSubnetting a class_c_address
Subnetting a class_c_address
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Chapter 17 : static routing
Chapter 17 : static routingChapter 17 : static routing
Chapter 17 : static routing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Subnetting
SubnettingSubnetting
Subnetting
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 

Similar to Assignment 1 iap

Ip subnetting
Ip subnettingIp subnetting
Ip subnetting
lazygurram
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
Shreehari Dhat
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputerirawan afrianto
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
Đồng Quốc Vương
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
monujangir2
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
DIPESH30
 
How IP address works
How IP address worksHow IP address works
How IP address works
Sanjeev Kumar Jaiswal
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
Saad Tanvir
 
Subnetting
SubnettingSubnetting
Subnetting
Netwax Lab
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
JAIGANESH SEKAR
 
TCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptxTCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptx
SalmanButt80
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
kurtmctaggart
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Dân Chơi
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
Manisha Keim
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnettingnithinj54
 
Network Layer
Network LayerNetwork Layer
Network Layer
Kamal Acharya
 

Similar to Assignment 1 iap (20)

Ip subnetting
Ip subnettingIp subnetting
Ip subnetting
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputer
 
CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014CCNA 1 Chapter 9 v5.0 2014
CCNA 1 Chapter 9 v5.0 2014
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnetting
SubnettingSubnetting
Subnetting
 
Wipro telecom training i pv4 concepts
Wipro telecom training   i pv4 conceptsWipro telecom training   i pv4 concepts
Wipro telecom training i pv4 concepts
 
13788 3
13788 313788 3
13788 3
 
TCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptxTCP/IP suite presentation slides and data.pptx
TCP/IP suite presentation slides and data.pptx
 
Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2Expl net fund_chapter_06_i_pv4_part_2
Expl net fund_chapter_06_i_pv4_part_2
 
I Paddress
I PaddressI Paddress
I Paddress
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
Ip -subnetting
Ip  -subnettingIp  -subnetting
Ip -subnetting
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

More from university of Gujrat, pakistan

Change management
Change management Change management
Change management
university of Gujrat, pakistan
 
Latest Trends in Digital Marketing
Latest Trends in Digital MarketingLatest Trends in Digital Marketing
Latest Trends in Digital Marketing
university of Gujrat, pakistan
 
Dark web (2)
Dark web (2)Dark web (2)
Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)
university of Gujrat, pakistan
 
Certification accreditation and licensure (1)
Certification accreditation and licensure (1)Certification accreditation and licensure (1)
Certification accreditation and licensure (1)
university of Gujrat, pakistan
 
biggest technology trends
biggest technology trendsbiggest technology trends
biggest technology trends
university of Gujrat, pakistan
 
Freedom of information (1)
Freedom of information (1)Freedom of information (1)
Freedom of information (1)
university of Gujrat, pakistan
 
Individual cognition ppt (1)
Individual cognition ppt (1)Individual cognition ppt (1)
Individual cognition ppt (1)
university of Gujrat, pakistan
 
Top 10 highest (1)
Top 10 highest (1)Top 10 highest (1)
Top 10 highest (1)
university of Gujrat, pakistan
 
creativity and imagination
creativity and imagination creativity and imagination
creativity and imagination
university of Gujrat, pakistan
 
Brainstorming 078 (1)
Brainstorming 078 (1)Brainstorming 078 (1)
Brainstorming 078 (1)
university of Gujrat, pakistan
 
speeh-artificial intelligemce
speeh-artificial intelligemce speeh-artificial intelligemce
speeh-artificial intelligemce
university of Gujrat, pakistan
 
Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)
university of Gujrat, pakistan
 
Motivation
MotivationMotivation
Vision of artificial intelligence (1)
Vision of artificial intelligence (1)Vision of artificial intelligence (1)
Vision of artificial intelligence (1)
university of Gujrat, pakistan
 
Entrepreneurship (1)
Entrepreneurship (1)Entrepreneurship (1)
Entrepreneurship (1)
university of Gujrat, pakistan
 
Role of professional societies
Role of professional societiesRole of professional societies
Role of professional societies
university of Gujrat, pakistan
 
Dealing with culticultural environment (1)
Dealing with culticultural environment (1)Dealing with culticultural environment (1)
Dealing with culticultural environment (1)
university of Gujrat, pakistan
 
Dealing with problem complexity (1)
Dealing with problem complexity (1)Dealing with problem complexity (1)
Dealing with problem complexity (1)
university of Gujrat, pakistan
 
cyber security and cyber crime
cyber security and cyber crime cyber security and cyber crime
cyber security and cyber crime
university of Gujrat, pakistan
 

More from university of Gujrat, pakistan (20)

Change management
Change management Change management
Change management
 
Latest Trends in Digital Marketing
Latest Trends in Digital MarketingLatest Trends in Digital Marketing
Latest Trends in Digital Marketing
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)
 
Certification accreditation and licensure (1)
Certification accreditation and licensure (1)Certification accreditation and licensure (1)
Certification accreditation and licensure (1)
 
biggest technology trends
biggest technology trendsbiggest technology trends
biggest technology trends
 
Freedom of information (1)
Freedom of information (1)Freedom of information (1)
Freedom of information (1)
 
Individual cognition ppt (1)
Individual cognition ppt (1)Individual cognition ppt (1)
Individual cognition ppt (1)
 
Top 10 highest (1)
Top 10 highest (1)Top 10 highest (1)
Top 10 highest (1)
 
creativity and imagination
creativity and imagination creativity and imagination
creativity and imagination
 
Brainstorming 078 (1)
Brainstorming 078 (1)Brainstorming 078 (1)
Brainstorming 078 (1)
 
speeh-artificial intelligemce
speeh-artificial intelligemce speeh-artificial intelligemce
speeh-artificial intelligemce
 
Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)
 
Motivation
MotivationMotivation
Motivation
 
Vision of artificial intelligence (1)
Vision of artificial intelligence (1)Vision of artificial intelligence (1)
Vision of artificial intelligence (1)
 
Entrepreneurship (1)
Entrepreneurship (1)Entrepreneurship (1)
Entrepreneurship (1)
 
Role of professional societies
Role of professional societiesRole of professional societies
Role of professional societies
 
Dealing with culticultural environment (1)
Dealing with culticultural environment (1)Dealing with culticultural environment (1)
Dealing with culticultural environment (1)
 
Dealing with problem complexity (1)
Dealing with problem complexity (1)Dealing with problem complexity (1)
Dealing with problem complexity (1)
 
cyber security and cyber crime
cyber security and cyber crime cyber security and cyber crime
cyber security and cyber crime
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Assignment 1 iap

  • 1. Assignment # 1 Internet Architecture and Protocols IP Addressing and Subnetting 1. Write the default Masks for the Class A, Class B and Class C IP addresses.  For Class A: 255.0.0.0  For Class B: 255.255.0.0  For Class C: 255.255.255.0 2. How we can distinguish Class A, Class B, Class C, Class D and Class E IP addresses from eachother. Write the range of first octetin decimal and Binary for all the 5 IP address classes. Class Address Ending Address Starting Address in binary Ending Address in binary A 1.0.0.0 126.255.255.255 00000001.00000000. 00000000. 00000000 0111110.11111111. 11111111. 11111111 B 128.0.0.0 191.255.255.255 10000000. 00000000. 00000000. 00000000 10111111.11111111. 11111111. 11111111 C 192.0.0.0 223.255.255.255 11000000. 00000000. 00000000. 00000000 11011111.11111111. 11111111. 11111111 D 224.0.0.0 239.255.255.255 11100000. 00000000. 00000000. 00000000 11101111.11111111. 11111111. 11111111 E 240.0.0.0 255.255.255.255 11110000. 00000000. 00000000. 00000000 11110111.11111111. 11111111. 11111111 3. Write the default subnet Masks forthe following IP addresses: IP Address Class Default Subnet Mask 179.65.225.4 B 255.255.0.0 222.35.20 C 255.255.255.0 111.7.80.0 A 255.0.0.0 4. Write down the three available ranges for assigning Private IP addresses recommended by IANA (Internet Assigned Number Authority). Address Blocks IP Address Class Private IP Address 10.0.0.0 A 10.255.255.255 172.16..0.0 B 172.31.255.255 192.168.0.0 C 192.168.255.255 5. A broadcast address is the one that addresses to all the hosts in any network. State that to create a broadcast address,all the bits of network ID portion or all the bits of host ID portion are set to 1? Write
  • 2. down the broadcast addresses ofthe networks to which the following IP addresses belong,write network addresses and ranges of their valid IP address too.(No subnetting) IP Address Network Address Broadcast Address 129.65.225.4 129.65.0.0 129.65.255.255 211.35.20.18 211.35.20.0 211.35.20.255 180.47.115.6 180.47.0.0 180.47.255.255 6. Subnet Mask or Custom mask tells us that how many bits are used for Subnet ID portion and how many for host ID portion. Identify how many bits are used for sub netting in the following IP address using its subnet mask: IP Address Subnet Mask Binary Subnet ID bits Host ID bits 135.65.225.4 255.255.240.0 255.255.11110000.0 20 12 210.35.20.18 255.255.255.248 255.255.255.11111000 29 3 190.47.115.6 255.255.254.0 255.255.11111110.0 23 9 7. Extract the Network Addresses of the given IP addresses in question number 8, using the subnet masks given with them. (Remember that ANDing the IP address with the Mask extracts the network address from the given IP address). 1- IP Address 135.65.11100001.4 Subnet Mask 255.255.11110000.0 After AND Network Address 135.65.11100000.0 135.65.224.0 2- IP Address 210.35.20.00010010 Subnet Mask 255.255.255.11111000 After AND Network Address 210.35.20.00010000 210.35.20.16 3- IP Address 190.47.01110011.6 Subnet Mask 255.255.11111110.0 After AND Network Address 190.47.01110010.0 190.47.114.0 8. Which of the following Subnet masks would allow a class A network to allow subnets to have up to 150 hosts and allow for up to 164 subnets? a. 255.0.0.0 b. 255.255.255.0 c. 255.255.192.0 d. 255.255.240.0 e.255.255.252.0 For allowing 150 hosts minimum 8 bits of host part should be available. And for allowing 164 subnets 8 bits are minimal required. All of these will allow to have up to 8 host’s bits and 8 network bits available. According to the formula 2n >= required hosts For Hosts 2n >= required subnets For Subnets 9. Suppose you have a class C Network 208.94.115.0. Your task is to design a subnet scheme so that we can create 16 Network segments (subnets)within this Network. Each subnet should support 10-14 hosts. 2n >= 14 24 >= 14 16 > 14 So, n = 4. a. How many bits would you use for the subnet ID? 28 bits are used for subnet ID. b. How many bits would you use for the Host ID? 4 bits are used for Host ID c. How many maximum possible subnets will be there?
  • 3. 24 subnets are possible because we have 8 bits for Host ID. So, 16 maximum subnets are possible. d. How many maximum possible hosts will be there in each subnet? 24 subnets are possible because we have 8 bits for Host ID. So, 16 maximum hosts are possible per subnet. e. Write down the Subnet Mask of your scheme. 208.94.115.11110000 255.255.255.240 f. Write down All the valid IP addresses Valid IP’s  208.94.115.0/28  208.94.115.16/28  208.94.115.32/28  208.94.115..48/28  208.94.115.64/28  208.94.115.80/28  208.94.115.96/28  208.94.115.112/28  208.94.115.128/28  208.94.115.160/28  208.94.115.176/28  208.94.115.192/28  208.94.115.208/28  208.94.115.224/28  208.94.115.240/28 g. The broadcast address ofthe First subnet ofyour scheme. 208.94.115.15 /28 10. Suppose you have a class C Network 220.94.115.0. Your task is to design a subnet scheme so that we can create 28 Network segments (subnets)within this Network. Each subnet should support hosts as given below. Steps 1- Write IP 220.94.115.0 2- Convert to binary 220.94.115.00000000 3- Find n 2n >= max host value 2n >= 30 25 >= 30 N=5 4- Give bits to network 220.94.115.11100000 5- IP of this network 220.94.115.224 6- Subnet Mask of IP 255.255.255.224/27
  • 4. 7- Subnets  220.94.115.0/27  220.94.115.32/027  220.94.115.64/027  220.94.115.96/027  220.94.115.128/027  220.94.115.160/027  220.94.115.192/027  220.94.115.224/027 These are the network segments that can be created. Each subnet will support up to 32 hosts. To make the 28 segments we can use Class A or B for more segments.