SlideShare a Scribd company logo
BAIT2164 COMPUTER NETWORKS
1
Tutorial 6 (Part 2)
Using the network diagram and information given create an addressing scheme
which utilizes variable-length subnet masks.
1. This company will be using the class C address 192.168.10.0. Remember to
start with your largest groups first.
Hosts
Required
Network
Address
Subnet
Mask
First
Useable
Address
Last
Useable
Address
Broadcast
Address
BAIT2164 COMPUTER NETWORKS
2
2. This company will be using the class C address 222.10.150.0. Remember to
start with your largest groups first.
Hosts
Required
Network
Address
Subnet
Mask
First
Useable
Address
Last
Useable
Address
Broadcast
Address
BAIT2164 COMPUTER NETWORKS
3
3. This company will be using the class C address 199.55.78.0. Remember to
start with your largest groups first.
Hosts
Required
Network
Address
Subnet
Mask
First
Useable
Address
Last
Useable
Address
Broadcast
Address
BAIT2164 COMPUTER NETWORKS
4
4. This company will be using the class C address 222.22.2.0. Remember to
start with your largest groups first.
Hosts
Required
Network
Address
Subnet
Mask
First
Useable
Address
Last
Useable
Address
Broadcast
Address
BAIT2164 COMPUTER NETWORKS
5
5. This company will be using the class C address 222.22.2.0. Remember to
start with your largest groups first.
Hosts
Required
Network
Address
Subnet
Mask
First
Useable
Address
Last
Useable
Address
Broadcast
Address
BAIT2164 COMPUTER NETWORKS
6
6. The school system you are working for is using the private address of
172.32.0.0 to subnet the entire district. Use the Class B address chart to
break down the sub-subnetwork addresses for the different schools and
offices. At this stage of the problem you are creating sub-subnets with the
third octet of the IP address. Remember which octet of the IP address you are
working in.
School System Address 172.32.0.0
Eastern Elementary has been given 512 hosts, with the address range of
172.32.42.0 / 21 (255.255.248.0). Based on the information below supply the
required address ranges and subnet masks for each school area. Use the Class C
address chart to break down the sub-subnetworks.
BAIT2164 COMPUTER NETWORKS
7
Hint:
Another way to look at this problem is to see that with the third octet range of 42 to
43 you have access to 2 groups of 255 addresses (172.32.42.0 and 172.32.43.0).
Think in terms of having two Class C VLSM charts.
Eastern Elementary School
Address Range 172.32.42.0 to 172.32.43.255
South High in part 1 of this problem has been given 2,048 hosts, with the address
range of 172.32.16.0 / 21 (255.255.248.0). Based on the information below supply
the required address ranges and subnet masks for each school area. Use both the
Class B and Class C address charts to break down the sub-subnetwork addresses
for the different areas of the network.
Hint:
With this problem you are creating sub-subnets with both the third and fourth octets
of the IP address. You may need to use the Class B VLSM chart for the Students
addressing information. All the other addresses will be using the Class C VLSM
chart. Another way to look at this problem is to see that with the third octect range of
16 to 23 you have access to 8 groups of 255 addresses or eight Class C VLSM
charts.
South High School
Address Range 172.32.16.0 to 172.32.23.255
BAIT2164 COMPUTER NETWORKS
8

More Related Content

Viewers also liked

Modulo 3
Modulo 3Modulo 3
#IMPACTv #LiveTalk by R. Bergenfield
#IMPACTv #LiveTalk by R. Bergenfield#IMPACTv #LiveTalk by R. Bergenfield
#IMPACTv #LiveTalk by R. Bergenfield
impactv
 
Summit 05 Presentations 12a Tessier, Todd
Summit 05   Presentations   12a   Tessier, ToddSummit 05   Presentations   12a   Tessier, Todd
Summit 05 Presentations 12a Tessier, Toddbwatson
 
#IMPACTv #LiveTalk by Yee Won Chong
#IMPACTv #LiveTalk by Yee Won Chong#IMPACTv #LiveTalk by Yee Won Chong
#IMPACTv #LiveTalk by Yee Won Chong
impactv
 
Summit 05 Cd Prestn 10a Tessier Bc
Summit 05   Cd   Prestn   10a   Tessier BcSummit 05   Cd   Prestn   10a   Tessier Bc
Summit 05 Cd Prestn 10a Tessier Bcbwatson
 
Perception Book
Perception BookPerception Book
Perception Book
cristencapron
 
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
JaytiThakar94
 
Romantic Age Characteristics.
Romantic Age Characteristics.Romantic Age Characteristics.
Romantic Age Characteristics.
Supriya Reginald
 

Viewers also liked (9)

Modulo 3
Modulo 3Modulo 3
Modulo 3
 
#IMPACTv #LiveTalk by R. Bergenfield
#IMPACTv #LiveTalk by R. Bergenfield#IMPACTv #LiveTalk by R. Bergenfield
#IMPACTv #LiveTalk by R. Bergenfield
 
References
ReferencesReferences
References
 
Summit 05 Presentations 12a Tessier, Todd
Summit 05   Presentations   12a   Tessier, ToddSummit 05   Presentations   12a   Tessier, Todd
Summit 05 Presentations 12a Tessier, Todd
 
#IMPACTv #LiveTalk by Yee Won Chong
#IMPACTv #LiveTalk by Yee Won Chong#IMPACTv #LiveTalk by Yee Won Chong
#IMPACTv #LiveTalk by Yee Won Chong
 
Summit 05 Cd Prestn 10a Tessier Bc
Summit 05   Cd   Prestn   10a   Tessier BcSummit 05   Cd   Prestn   10a   Tessier Bc
Summit 05 Cd Prestn 10a Tessier Bc
 
Perception Book
Perception BookPerception Book
Perception Book
 
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
Feminist Approach and Gender Study with Counter Argument, "Frailty! thy name ...
 
Romantic Age Characteristics.
Romantic Age Characteristics.Romantic Age Characteristics.
Romantic Age Characteristics.
 

Similar to BAIT2164 Tutorial 6 (Part 2)

Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
CYBERINTELLIGENTS
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
Jose Eduardo Osorio Marroquin
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
Vivek chan
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
HNDE Labuduwa Galle
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
inventionjournals
 
Data Communications and Network -Subnetting
Data Communications and Network -SubnettingData Communications and Network -Subnetting
Data Communications and Network -Subnetting
Chandrakant Divate
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputerirawan afrianto
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
DIPESH30
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
Zakaria Hossain
 
subnet network Addressing Network v1.pdf
subnet network Addressing Network v1.pdfsubnet network Addressing Network v1.pdf
subnet network Addressing Network v1.pdf
ssuser00e6e21
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.ppt
sol zem
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principlesswascher
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptx
NourhanTarek23
 
Subnetting
SubnettingSubnetting
Subnetting
Fekadu Abera
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 

Similar to BAIT2164 Tutorial 6 (Part 2) (20)

Day 5.5 subnetting
Day 5.5 subnettingDay 5.5 subnetting
Day 5.5 subnetting
 
Ch05
Ch05Ch05
Ch05
 
Vlsm workbook instructors edition v2 0-solucionario
Vlsm workbook  instructors edition   v2 0-solucionarioVlsm workbook  instructors edition   v2 0-solucionario
Vlsm workbook instructors edition v2 0-solucionario
 
Data network
Data networkData network
Data network
 
Data network
Data networkData network
Data network
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
03_cidr.ppt
03_cidr.ppt03_cidr.ppt
03_cidr.ppt
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
 
Data Communications and Network -Subnetting
Data Communications and Network -SubnettingData Communications and Network -Subnetting
Data Communications and Network -Subnetting
 
Soal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan KomputerSoal Subnetting - Jaringan Komputer
Soal Subnetting - Jaringan Komputer
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
subnet network Addressing Network v1.pdf
subnet network Addressing Network v1.pdfsubnet network Addressing Network v1.pdf
subnet network Addressing Network v1.pdf
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP-address trial.ppt
IP-address trial.pptIP-address trial.ppt
IP-address trial.ppt
 
Subnetting Principles
Subnetting PrinciplesSubnetting Principles
Subnetting Principles
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptx
 
Subnetting
SubnettingSubnetting
Subnetting
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 

More from limsh

BAIT2164 Topics for Revision
BAIT2164 Topics for RevisionBAIT2164 Topics for Revision
BAIT2164 Topics for Revision
limsh
 
BAIT2164 Tutorial 9
BAIT2164 Tutorial 9BAIT2164 Tutorial 9
BAIT2164 Tutorial 9
limsh
 
BAIT2164 Tutorial 8
BAIT2164 Tutorial 8BAIT2164 Tutorial 8
BAIT2164 Tutorial 8
limsh
 
BAIT2164 Tutorial 6 (Part 1)
BAIT2164 Tutorial 6 (Part 1)BAIT2164 Tutorial 6 (Part 1)
BAIT2164 Tutorial 6 (Part 1)limsh
 
BAIT2164 Tutorial 5
BAIT2164 Tutorial 5BAIT2164 Tutorial 5
BAIT2164 Tutorial 5
limsh
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4limsh
 
BAIT2164 Tutorial 3
BAIT2164 Tutorial 3BAIT2164 Tutorial 3
BAIT2164 Tutorial 3
limsh
 
BAIT2164 Tutorial 2
BAIT2164 Tutorial 2BAIT2164 Tutorial 2
BAIT2164 Tutorial 2
limsh
 
BAIT2164 Tutorial 1
BAIT2164 Tutorial 1BAIT2164 Tutorial 1
BAIT2164 Tutorial 1limsh
 
BAIT1103 Assignment Presentation
BAIT1103 Assignment PresentationBAIT1103 Assignment Presentation
BAIT1103 Assignment Presentationlimsh
 
BAIT1103 Tutorial 8
BAIT1103 Tutorial 8BAIT1103 Tutorial 8
BAIT1103 Tutorial 8limsh
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8limsh
 
BAIT1103 Tutorial 7
BAIT1103 Tutorial 7BAIT1103 Tutorial 7
BAIT1103 Tutorial 7limsh
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
BAIT1103 Tutorial 6
BAIT1103 Tutorial 6BAIT1103 Tutorial 6
BAIT1103 Tutorial 6limsh
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
BAIT1103 Tutorial 5
BAIT1103 Tutorial 5BAIT1103 Tutorial 5
BAIT1103 Tutorial 5limsh
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5limsh
 
BAIT1103 Tutorial 4
BAIT1103 Tutorial 4BAIT1103 Tutorial 4
BAIT1103 Tutorial 4limsh
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4limsh
 

More from limsh (20)

BAIT2164 Topics for Revision
BAIT2164 Topics for RevisionBAIT2164 Topics for Revision
BAIT2164 Topics for Revision
 
BAIT2164 Tutorial 9
BAIT2164 Tutorial 9BAIT2164 Tutorial 9
BAIT2164 Tutorial 9
 
BAIT2164 Tutorial 8
BAIT2164 Tutorial 8BAIT2164 Tutorial 8
BAIT2164 Tutorial 8
 
BAIT2164 Tutorial 6 (Part 1)
BAIT2164 Tutorial 6 (Part 1)BAIT2164 Tutorial 6 (Part 1)
BAIT2164 Tutorial 6 (Part 1)
 
BAIT2164 Tutorial 5
BAIT2164 Tutorial 5BAIT2164 Tutorial 5
BAIT2164 Tutorial 5
 
BAIT2164 Tutorial 4
BAIT2164 Tutorial 4BAIT2164 Tutorial 4
BAIT2164 Tutorial 4
 
BAIT2164 Tutorial 3
BAIT2164 Tutorial 3BAIT2164 Tutorial 3
BAIT2164 Tutorial 3
 
BAIT2164 Tutorial 2
BAIT2164 Tutorial 2BAIT2164 Tutorial 2
BAIT2164 Tutorial 2
 
BAIT2164 Tutorial 1
BAIT2164 Tutorial 1BAIT2164 Tutorial 1
BAIT2164 Tutorial 1
 
BAIT1103 Assignment Presentation
BAIT1103 Assignment PresentationBAIT1103 Assignment Presentation
BAIT1103 Assignment Presentation
 
BAIT1103 Tutorial 8
BAIT1103 Tutorial 8BAIT1103 Tutorial 8
BAIT1103 Tutorial 8
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
BAIT1103 Tutorial 7
BAIT1103 Tutorial 7BAIT1103 Tutorial 7
BAIT1103 Tutorial 7
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
BAIT1103 Tutorial 6
BAIT1103 Tutorial 6BAIT1103 Tutorial 6
BAIT1103 Tutorial 6
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
BAIT1103 Tutorial 5
BAIT1103 Tutorial 5BAIT1103 Tutorial 5
BAIT1103 Tutorial 5
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
BAIT1103 Tutorial 4
BAIT1103 Tutorial 4BAIT1103 Tutorial 4
BAIT1103 Tutorial 4
 
BAIT1103 Chapter 4
BAIT1103 Chapter 4BAIT1103 Chapter 4
BAIT1103 Chapter 4
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 

BAIT2164 Tutorial 6 (Part 2)

  • 1. BAIT2164 COMPUTER NETWORKS 1 Tutorial 6 (Part 2) Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. 1. This company will be using the class C address 192.168.10.0. Remember to start with your largest groups first. Hosts Required Network Address Subnet Mask First Useable Address Last Useable Address Broadcast Address
  • 2. BAIT2164 COMPUTER NETWORKS 2 2. This company will be using the class C address 222.10.150.0. Remember to start with your largest groups first. Hosts Required Network Address Subnet Mask First Useable Address Last Useable Address Broadcast Address
  • 3. BAIT2164 COMPUTER NETWORKS 3 3. This company will be using the class C address 199.55.78.0. Remember to start with your largest groups first. Hosts Required Network Address Subnet Mask First Useable Address Last Useable Address Broadcast Address
  • 4. BAIT2164 COMPUTER NETWORKS 4 4. This company will be using the class C address 222.22.2.0. Remember to start with your largest groups first. Hosts Required Network Address Subnet Mask First Useable Address Last Useable Address Broadcast Address
  • 5. BAIT2164 COMPUTER NETWORKS 5 5. This company will be using the class C address 222.22.2.0. Remember to start with your largest groups first. Hosts Required Network Address Subnet Mask First Useable Address Last Useable Address Broadcast Address
  • 6. BAIT2164 COMPUTER NETWORKS 6 6. The school system you are working for is using the private address of 172.32.0.0 to subnet the entire district. Use the Class B address chart to break down the sub-subnetwork addresses for the different schools and offices. At this stage of the problem you are creating sub-subnets with the third octet of the IP address. Remember which octet of the IP address you are working in. School System Address 172.32.0.0 Eastern Elementary has been given 512 hosts, with the address range of 172.32.42.0 / 21 (255.255.248.0). Based on the information below supply the required address ranges and subnet masks for each school area. Use the Class C address chart to break down the sub-subnetworks.
  • 7. BAIT2164 COMPUTER NETWORKS 7 Hint: Another way to look at this problem is to see that with the third octet range of 42 to 43 you have access to 2 groups of 255 addresses (172.32.42.0 and 172.32.43.0). Think in terms of having two Class C VLSM charts. Eastern Elementary School Address Range 172.32.42.0 to 172.32.43.255 South High in part 1 of this problem has been given 2,048 hosts, with the address range of 172.32.16.0 / 21 (255.255.248.0). Based on the information below supply the required address ranges and subnet masks for each school area. Use both the Class B and Class C address charts to break down the sub-subnetwork addresses for the different areas of the network. Hint: With this problem you are creating sub-subnets with both the third and fourth octets of the IP address. You may need to use the Class B VLSM chart for the Students addressing information. All the other addresses will be using the Class C VLSM chart. Another way to look at this problem is to see that with the third octect range of 16 to 23 you have access to 8 groups of 255 addresses or eight Class C VLSM charts. South High School Address Range 172.32.16.0 to 172.32.23.255