Lab 18 Answer TemplateProblem 1:
IP address: 192.168.10.0 /27 (given)
a. Subnet Mask: 255.255.255.224
b. Bits Borrowed: 3
c. Number of subnets: 8
d. Magic number: 32
e. Number of valid hosts per subnet: 30
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.30
i. Broadcast address in subnet 0: 192.168.10.31
j. (Sub) Network address in subnet 3: 192.168.10.64
k. Last usable host address in subnet 4: 192.168.10.158
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.30
192.168.10.31
1
192.168.10.32
192.168.10.33
192.168.10.62
192.168.10.63
2
192.168.10.64
192.168.10.65
192.168.10.94
192.168.10.95
3
192.168.10.96
192.168.10.97
192.168.10.126
192.168.10.127
4
192.168.10.128
192.168.10.129
192.168.10.158
192.168.10.159
5
192.168.10.160
192.168.10.161
192.168.10.190
192.168.10.191
6
192.168.10.192
192.168.10.193
192.168.10.222
192.168.10.223
7
192.168.10.224
192.168.10.225
192.168.10.254
192.168.10.255Problem 2:
IP address: 192.168.10.0 / 26 (given)
a. Subnet Mask: 255.255.255.192
b. Bits Borrowed:
c. Number of subnets: _4
d. Magic number:
e. Number of valid hosts per subnet: 62
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.62
i. Broadcast address in subnet 0: 192.168.10.63
j. (Sub) Network address in subnet 1: 192.168.10.64
k. Last usable host address in subnet 2: 192.168.10.190
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.14
192.168.10.15
1
192.168.10.16
192.168.10.17
192.168.10.30
192.168.10.31
2
192.168.10.32
192.168.10.33
192.168.10.46
192.168.10.47
3
192.168.10.48
192.168.10.49
192.168.10.62
192.168.10.63
Etc.
Problem 3:
IP address: 192.168.10.0 (given)
Subnet Mask: 255.255.255.240
a. Slash prefix: _________________________________________
b. Bits Borrowed: _________________________________________
c. Number of possible subnets: _________________________________________
d. Magic number: _________________________________________
e. Number of usable hosts per subnet: _________________________________________
f. (Sub) network address of subnet 0: _________________________________________
g. First usable host address in subnet 0: _________________________________________
h. Last usable host address in subnet 0: _________________________________________
i. Broadcast address in subnet 0: _________________________________________
j. (Sub) Network address in subnet 1: _________________________________________
k. Last usable host address in subnet 2: _________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
Problem 4:
IP address: 192.168.10.0 (given)
Minimum number of subnets needed: 31
a. Slash prefix: _ ...
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
IP Addressing and Subnetting
1. Write the default Masks for the Class A, Class B and Class C IP addresses.
2. How we can distinguish Class A, Class B, Class C, Class D and Class E IP addresses from each other. Write the range of first octet in decimal and Binary for all the 5 IP address classes.
3. Write the default subnet Masks for the following IP addresses:
4. Write down the three available ranges for assigning Private IP addresses recommended by IANA (Internet Assigned Number Authority).
5. A broadcast address is the one that addresses to all the hosts in any network. State that to create a broadcast address, all the bits of network ID portion or all the bits of host ID portion are set to 1? Write down the broadcast addresses of the networks to which the following IP addresses belong, write network addresses and ranges of their valid IP address too. (No subnetting).
6. Subnet Mask or Custom mask tells us that how many bits are used for Subnet ID portion and how many for host ID portion. Identify how many bits are used for sub netting in the following IP address using its subnet mask:
7. Extract the Network Addresses of the given IP addresses in question number 8, using the subnet masks given with them. (Remember that ANDing the IP address with the Mask extracts the network address from the given IP address).
8. Suppose you have a class C Network 208.94.115.0. Your task is to design a subnet scheme so that we can create 16 Network segments (subnets) within this Network. Each subnet should support 10-14 hosts.
9. Suppose you have a class C Network 220.94.115.0. Your task is to design a subnet scheme so that we can create 28 Network segments (subnets) within this Network. Each subnet should support hosts as given below.
• 2 Network Segment support 30 Hosts
• 4 Network Segment support 14 Hosts
• 8 Network Segment support 6 Hosts
• 14 Network Segment support 2 Hosts
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
please write a short essay to address the following questions. Lengt.docxDIPESH30
please write a short essay to address the following questions. Length: 500 word count to the minimum.
“Blogs, Twitter, Facebook, and a host of other news and social-media sites have allowed average citizens to become newsmakers. Is this a good or bad thing? Is the increase in citizen journalism leading to inaccuracies in reporting? Or can we trust that Americans will “consider the source” and verify any questionable information they read on a blog?”
Requirements:
1.Word count: 500.
2.Submissions must be in Word format (doc, docx) or Rich Text format (rtf). Attached file sent to my email will not be graded.
3.VeriCite has been activated to prevent plagiarism and no credit will be issued if Similarity Index points to 20% or higher.
.
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
please write a diary entry from the perspective of a French Revolutionary of the Third Estate (bourgeoisie, worker, or peasant), a member of the First Estate (clergy) or a member of the Second Estate (nobles). Your entry should have a well established mood, or writing that evokes certain feelings or emotions in readers through words and descriptions. Some examples of mood through setting, diction, and tone can be found
HERE
.
In addition, your journal should incorporate at least
THREE
of the following vocabulary terms:
Louis XVI
Estates-General
National Assembly
Tennis Court Oath
estate (First, Second, Third)
The Enlightenment
Great Fear
.
More Related Content
Similar to Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
This presentation of CyberLab explains how Transmission Control Protocol(TCP) Internet Protocol(IP) works and it also describes what is IP addressing and it's various classes. at the end of Presentation an overview of subnatting also given.
Visit:
www.cyberLabzone.com
IP Addressing and Subnetting
1. Write the default Masks for the Class A, Class B and Class C IP addresses.
2. How we can distinguish Class A, Class B, Class C, Class D and Class E IP addresses from each other. Write the range of first octet in decimal and Binary for all the 5 IP address classes.
3. Write the default subnet Masks for the following IP addresses:
4. Write down the three available ranges for assigning Private IP addresses recommended by IANA (Internet Assigned Number Authority).
5. A broadcast address is the one that addresses to all the hosts in any network. State that to create a broadcast address, all the bits of network ID portion or all the bits of host ID portion are set to 1? Write down the broadcast addresses of the networks to which the following IP addresses belong, write network addresses and ranges of their valid IP address too. (No subnetting).
6. Subnet Mask or Custom mask tells us that how many bits are used for Subnet ID portion and how many for host ID portion. Identify how many bits are used for sub netting in the following IP address using its subnet mask:
7. Extract the Network Addresses of the given IP addresses in question number 8, using the subnet masks given with them. (Remember that ANDing the IP address with the Mask extracts the network address from the given IP address).
8. Suppose you have a class C Network 208.94.115.0. Your task is to design a subnet scheme so that we can create 16 Network segments (subnets) within this Network. Each subnet should support 10-14 hosts.
9. Suppose you have a class C Network 220.94.115.0. Your task is to design a subnet scheme so that we can create 28 Network segments (subnets) within this Network. Each subnet should support hosts as given below.
• 2 Network Segment support 30 Hosts
• 4 Network Segment support 14 Hosts
• 8 Network Segment support 6 Hosts
• 14 Network Segment support 2 Hosts
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
please write a short essay to address the following questions. Lengt.docxDIPESH30
please write a short essay to address the following questions. Length: 500 word count to the minimum.
“Blogs, Twitter, Facebook, and a host of other news and social-media sites have allowed average citizens to become newsmakers. Is this a good or bad thing? Is the increase in citizen journalism leading to inaccuracies in reporting? Or can we trust that Americans will “consider the source” and verify any questionable information they read on a blog?”
Requirements:
1.Word count: 500.
2.Submissions must be in Word format (doc, docx) or Rich Text format (rtf). Attached file sent to my email will not be graded.
3.VeriCite has been activated to prevent plagiarism and no credit will be issued if Similarity Index points to 20% or higher.
.
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
please write a diary entry from the perspective of a French Revolutionary of the Third Estate (bourgeoisie, worker, or peasant), a member of the First Estate (clergy) or a member of the Second Estate (nobles). Your entry should have a well established mood, or writing that evokes certain feelings or emotions in readers through words and descriptions. Some examples of mood through setting, diction, and tone can be found
HERE
.
In addition, your journal should incorporate at least
THREE
of the following vocabulary terms:
Louis XVI
Estates-General
National Assembly
Tennis Court Oath
estate (First, Second, Third)
The Enlightenment
Great Fear
.
Please write the definition for these words and provide .docxDIPESH30
Please write the definition for these words and
provide two
examples
for each one
The definition should relate to “linguistic form“ / grammar
See attached file. you have
three hours and an half
to do the assignemnt
.
Please view the filmThomas A. Edison Father of Invention, A .docxDIPESH30
Please view the film:
Thomas A. Edison: Father of Invention
, A & E Television (New York, NY: A & E Television Networks, 1996); Available on the Hagerty Library catalogue at: http://records.library.drexel.edu/record=b2133926~S9
And discuss:
Edison is portrayed rather herocially in this film, what would you do to present a more balanced view of Edison the man and inventor? Based on my lecture, discuss why or why not Edison should be considered the creator of the light bulb?
.
Please watch the clip from the movie The Break Up. Then reflect w.docxDIPESH30
Please watch the clip from the movie "The Break Up." Then reflect who you think is most at fault and why.
Then I would you like to think about a conflict you have had and think about what could have been done differently to resolve it.
Write a one page paper (double spaced)
https://www.youtube.com/watch?v=_bqhVqTuFO4
.
please write a report on Social Media and ERP SystemReport should.docxDIPESH30
please write a report on Social Media and ERP System:
Report should be a detail study on social media, effects of social media on business.Use of ERP Systems in social media and its benefits.During presentatio the students should present the use of ERP Systems in the social media aspect.
pages: 15
font size: 11
spaces: 1.5
please see attached file
due date tomorrow, within 24 hour
.
Please write 200 wordsHow has the healthcare delivery system chang.docxDIPESH30
Please write 200 words
How has the healthcare delivery system changed?
For what types of patients and what types of care does each of the systems deliver? Would a patient have a need for more than one system? When (give examples and explain)?
What are the regulations related to the medical staff? What purpose do these regulations serve?
.
Please view the documentary on Typhoid Mary at httpswww..docxDIPESH30
Please view the documentary on Typhoid Mary at:
https
://
www
.
youtube
.com/watch?v=
Mc
8O9
EnAuLo
And read:
- Priscilla Wald, “Cultures and Carriers: "Typhoid Mary" and the Science of Social Control,”
Social Text
, No. 52/53,
Queer
Transexions
of Race, Nation, and Gender
(Autumn - Winter, 1997), pp. 181-214; Available in the Readings Folder and on JSTOR at:
http
://
www
.
jstor
.
org
/stable/466739
Then discuss:
Wald discusses how the concept of "social control" relates or is exemplified by the Mary
Mallon
ca
se
. Choose one of the aspects of Wald's argument and discuss how it relates to the Typhoid Mary documentary. Do these help us understand the significance the 'Typhoid Mary' case has for the history of medicine, or for the treatment of epidemics today?
.
Please use the two attachments posted to complete work. Detailed in.docxDIPESH30
Please use the two attachments posted to complete work. Detailed instructions, notes / additional information, links and some resources are listed therein.
#1. Discussion due Thursday 12/11/14 Noon
#2. Paper due Saturday 12/13/14 Noon
******12/11/14 Edit to add additional research sources for you if need for part2 of assignment.
Davidson, W. H. (1979). FACTOR ENDOWMENT, INNOVATION AND INTERNATIONAL TRADE THEORY.
Kyklos
,
32
(4), 764.
Handlin, A. H. (2011).
Government Grief : How to Help Your Small Business Survive Mindless Regulation, Political Corruption and Red Tape
. Santa Barbara, Calif: Praeger.
Warren, R. C. (2003). The evolution of business legitimacy.
European Business Review,
15
(3), 153. Retrieved from http://search.proquest.com/docview/225421529?accountid=8289
.
Please use the sources in the outline (see photos)The research.docxDIPESH30
Please use the sources in the outline (see photos)
The research essay is to be 12 pages, typed, double-spaced. 10-12 sources are to be used. It is to be on a social policy area and may focus on Canada, or Canada in comparative perspective.
1.
Discuss the National Child Benefit, introduced in 1997. Has this measure been effective in reducing child poverty? Can this measure be seen as the further extension of neoliberalism, or as a new form of state-provided social investment?
Please make a clear and wordy thesis (highlight this in red) use notions of this thesis throughout the paper please. Clear and concise english as this is a university level paper.
Please include your own ideas as well as recommendations.
if a point is made please provide proof with the sources or readings
Please use APA FORMAT.
Please ensure that the paper follows the format suggested in the outline.
.
Please submit a minimum of five (5) detailed and discussion-provokin.docxDIPESH30
Please submit a minimum of five (5) detailed and discussion-provoking questions based on the recent reading assignments, video clips and the other websites assigned.
Only complete questions will earn credit. Therefore, it is important for you to think carefully about formulating the kinds of questions intended to stimulate conversations. Ask detailed and specific, rather than broad, general questions. Do not ask, for example, ‘When was the first Mission established in California?’ Instead, ask something like ‘What is the ideological agenda behind maintaining figures like Father Junipero Serra as heroic in California textbooks?’
Other examples include:
Does recent news media coverage of the “riots” in Baltimore, Ferguson and other cities promote a message that is pro-police? If not, how does it engender understanding of the root causes of many of the frustrations of local residents?
In the film “Banned in Arizona,” why does Superintendent Tom Horne argue in favor of “individualism” and why does he say that the Mexican American Studies program encourages radical thinking? What, if anything, is radical about the way those courses teach students in Tucson, Arizona?
If the U.S. reinstated a Vietnam War era-like military draft instead of relying upon the current all-volunteer force, would current public support for war change at all? If so, how?
Please consider these guidelines in composing your questions:
1. Make certain to ask at least one question from each source.
2. Ask questions about things that interest you.
3. Write your questions as though you were asking them to the entire class.
4. Be sure to make specific reference to the readings in each question. Many good questions require at least two sentences.
5. Try and use the questions to critique the author's opinion.
6. These homework questions should attempt to raise larger issues and---when possible---to relate the readings to issues in our current world.
"This week, I want us to think about the concept of
bias
, and its application in the places we consume information. This is tricky territory because even the very presentation of this unit is fraught with bias—my personal bias, or frame of reference. I’m going to ask you to read a collection of articles that I think are important, but they all clearly have a perspective and an agenda that comes from a particular worldview. So let’s get that out in the open. Maybe nothing in your liberal arts education is free from bias, but that does not mean we shy away from considering the information, ideas, arguments and critiques.
What is bias? For the purposes of our consideration, bias is really just about a set of values that can color or distort fair judgment. We can sometimes recognize obvious bias in others, especially when people use overtly discriminatory or offensive language, or have a clear political or ideological perspective that makes everything they present go through that lens. But more than anything else, I want us to think a.
Please think about the various learning activities you engaged in du.docxDIPESH30
Please think about the various learning activities you engaged in during this unit.
write one page summarizing the following:
Multiculturalism plays an important role in many schools today.
How can this be incorporated into everyday lessons related to health, safety, and nutrition?
How has your school (or your children’s school) incorporated multiculturalism into their lesson?
.
Please type out the question and answer it underneath. Each question.docxDIPESH30
Please type out the question and answer it underneath. Each question should be about a page long DOUBLE SPACED and cited.
Please use the articles that I PROVIDE!
Due date is this Sunday the 14th.
First two articles answer the questions 1 & 2 , the last article answers question 3
PLEASE FOLLOW INSTRUCTIONS
.
Please use the following technique-Outline the legal issues t.docxDIPESH30
Please use the following technique:
-
Outline the legal issues that you are going to discuss in your answer
-
Define the legal rules that are relevant to the question
-
Apply the legal rules to the facts of the question
-
Formulate a decision of which party should be successful
The use of headings for each relationship discussed is suggested.
Application of legal principles to the facts is the most important and often the hardest step. I am more interested in how you arrived at your answer, than the actual conclusions that you draw. Having said that, the “kitchen sink approach” is not suggested – i.e. spilling all of your knowledge that is vaguely related to the issue raised into your answer.
Please do not simply say, “Andrew is liable for negligence.” You must go through the analysis for why or why not a particular tort claim will be successful.
Use the language of the question.
Be as comprehensive and thorough as possible when responding to each issue – canvas all possible answers. If you have considered the application of a particular contractual concept, but after analysis, you have decided that it is not applicable, please go through your analysis.
If any possible remedies are available to either party, please identify with supporting reasons.
Assume for each relationship that the matter is being litigated in court,
not
through alternative dispute resolution.
DUE: TUESDAY MARCH 24
th
, 2015 at beginning of class
No midterms will be accepted after this date.
Tort Law Problem
Andrew Black is the owner of Confederation Mall (“Mall”) located in New Minas, Nova Scotia. Mr. Black leases out many retail spaces in the Mall to a wide range of businesses. He prides himself as a local success story. The people of New Minas truly admire his entrepreneurial success.
George Orange, owner of Guppy World, a pet fish store, has been a long-time tenant of Confederation Mall. Colin and Darren work for Mr. Orange. Colin was repairing a ceiling fan when he asked Darren to toss him a screwdriver, as Colin was up on a step-ladder at the time. Darren, standing 15 feet away, underhand tosses the screwdriver to Colin. Darren overshoots the toss and the screwdriver shatters a glass fish tank containing a piranha fish. At the same time a customer, Sally, was walking towards the check-out to purchase fish food, when she slipped on the water from the broken tank, fell to the floor and fractured her wrist. She is also bitten on the ankle by the piranha. When Mr. Orange tried to assist Sally, he smelled a strong smell of alcoholic beverage coming from her mouth. Colin noted that Sally appeared to be staggering slightly before falling.
Sally was transported to the hospital by paramedics. The doctor determines that Sally’s foot needs to be amputated due to the piranha bite and she needs to wear a cast on her wrist for 6-8 weeks due to the fracture.
Word of the piranha bite spreads like wild fire throughout the Mall. Evelyn, who suff.
Please use from these stratagies This homework will be to copyies .docxDIPESH30
Please use from these stratagies
This homework will be to copyies with different stratgies !!11
Rubrics
Revising Reading
RAFT
Quick write
Learning loge
KAMAL
Gallery walks
Data charts
All about book
Cubing Clusters Authors chair
Words Walks
.
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxDIPESH30
PLEASE THOROUGHLY ANSWER THE FOLLOWING
FIVE
QUESTIONS BELOW IN A 500 Word Count Discussion
Contrast the dynamics between dominant cultures and subcultures either in a work setting or in society.
Explain why it is important to understand the impact of culture.
Give an example where you demonstrated your awareness and or openness to understanding a cultural difference.
Explain how these differences underscore the need for understanding diversity.
From the information given, develop guidelines for embracing diversity.
YOU MUST USE ONE CITED SCHOLARLY SOURCE. PROPERLY CITED IN APA FORM WITH AN REFERENCE PAGE ON THE BOTTOM. DO NOT USE WIKIPEDIA, THESAURUS, OR ENCYCLOPEDIA (THESE ARE NOT CITED SCHOLARLY SOURCES)
DO NOT TURN IN A PLAGIARIZED PAPER, WE WILL REPORT YOU.....
THIS PAPER IS DUE TODAY 12/11/2014.... 8 HOURS FROM NOW MAX NO LATER....SERIOUS INQUIRIES ONLY...DO NOT TAKE THIS PAPER IF YOU DO NOT KNOW THE TOPIC.....
.
Please share your thoughts about how well your employer, military .docxDIPESH30
Please share your thoughts about how well your employer, military base, or home responds to environmental concerns. Provide examples of some types.
1.
Issue 4
-
Re-Wilding
a. Explain what re-wilding is and how it became an issue.
b. Outline and discuss three main areas of disagreement between Josh Donlan and Rubenstein et al.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 5
-
Military Training and the Environment
a. Explain the history of military training and the environment.
b. Outline and discuss three main areas of disagreement between Benedict Cohen and Jamie Clark.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length.
All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 6
-
Carbon Emission Restrictions
a. Explain the history of carbon emissions and why the debate over carbon emissions exists.
b. Outline and discuss three main areas of disagreement between Paul Cicio and Eileen Claussen.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Explain in your own words the Section 2017 initiative which Jamie Clark describes on. Then describe how you think Benedict Cohen would respond to Jamie Clark's presentation of Section 2017. Your response should be at least 200 words in length. as source material for your response. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
Explain carbon trading, carbon offsets, and cap and trade. How are each similar? How are each different? Your response should be at least 200 words in length. as source material for your response. All sources used, , must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
.
Please select and answer one of the following topics in a well-org.docxDIPESH30
Please select and answer one of the following topics in a well-organized and thoughtful paper (a minimum of 10 pages in
length). Your paper must contain at least five references in addition to the text. CSU requires that students use the APA
style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sources
are to be followed.
1. If your employer's EMS is registered to ISO 14000, review the registration process. What were the most
difficult implementation activities? How long did it take? How easy was it to get worker buy-in and
participation? Cost? Others.
.
Please see the attachment for the actual work that is require. This.docxDIPESH30
Please see the attachment for the actual work that is require. This will be due on Sunday Nov 9, 2014.
THIS ISTHE CASE STUDY ATTACHED IS THE DIRECTIONS ON OW TO COMPLETE THE TASK.
Case Study Analysis
When it comes to planning events how many of us take the proper steps and put in the time and how many of us wait till the last minute to plan our event? What's the outcome of an event that has had the proper planning? Usually, a properly planned event is a huge success, and people leave-taking away information that will help them either improve, grow as a person or be successful at their job. People who try to plan events without taking the proper steps find themselves running into many problems along the way. Before they know it, they are out of time to fix any issues or problems that arise. Running out of time can lead to frustration, panic, and eventually the thought of “what am I going to do". Even though the steps to planning an event can be time-consuming, proper planning can ease frustration and anxiety, and lead to a successful event. Proper planning can eliminate the “What am I going to do” question.
Background
In the case study, Carl Robins did not plan for his event very well. He hired 15 new trainees and wanted to schedule a new hire orientation on June 15
th
. His goal was to have the new hires working by July. Carl had only been at his job for six months, and this was his first recruitment effort, so it is crucial for this event to work in Carl’s favor. Carl was contacted by Monica Carrolls, the soon to be Supervisor of the new hires, on May 15
th
. Monica was following up with Carl on how the planning for his orientation was going. She asked him about physicals, drug tests, the training schedule, orientation, manuals, and policy booklets. Carl told Monica that everything would be fine and ready to go in time for orientation. After Memorial Day, Carl finally decided to start planning for his event. Unfortunately; because Carl did not do any planning after hiring the fifteen new trainees and waited till the last minute to plan his event, he ran into multiple problems. When Carl finally decided to start planning for his event, he found that the training room where he was going to hold his orientation was booked for the whole month of June by a fellow associate named Joe. Joe was from technology services and needed the room for computer terminals. When he went to finalize the paperwork for his event, he found that some of the new hire trainees did not have completed transcripts or applications on file; nor had they gone to the clinic for their physicals and mandatory drug screenings. He then checked the orientation manuals and found that there were only three and that those three had missing pages. By now, Carl is very concerned, his anxiety is at a level high, and he is so frustrated that he sits with his head on his desk with the thought of “What am I going to do”.
Alternatives
At this point, Carl can .
Please see the attachment and look over the LOOK HERE FIRST file b.docxDIPESH30
Please see the attachment and look over the "LOOK HERE FIRST" file before handshaking to make sure you're committed to the assignment. Everything you need is within the zip folder attached. Thanks in advance. I had someone working on this and then they stopped answering me. Please don't be that person.
.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. Lab 18 Answer TemplateProblem 1:
IP address: 192.168.10.0 /27 (given)
a. Subnet Mask: 255.255.255.224
b. Bits Borrowed: 3
c. Number of subnets: 8
d. Magic number: 32
e. Number of valid hosts per subnet: 30
f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.30
i. Broadcast address in subnet 0: 192.168.10.31
j. (Sub) Network address in subnet 3: 192.168.10.64
k. Last usable host address in subnet 4: 192.168.10.158
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.30
192.168.10.31
1
192.168.10.32
192.168.10.33
192.168.10.62
192.168.10.63
2
192.168.10.64
192.168.10.65
192.168.10.94
192.168.10.95
3. h. Last usable host address in subnet 0: 192.168.10.62
i. Broadcast address in subnet 0: 192.168.10.63
j. (Sub) Network address in subnet 1: 192.168.10.64
k. Last usable host address in subnet 2: 192.168.10.190
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.14
192.168.10.15
1
192.168.10.16
192.168.10.17
192.168.10.30
192.168.10.31
2
192.168.10.32
192.168.10.33
192.168.10.46
192.168.10.47
3
192.168.10.48
192.168.10.49
192.168.10.62
192.168.10.63
Etc.
4. Problem 3:
IP address: 192.168.10.0 (given)
Subnet Mask: 255.255.255.240
a. Slash prefix:
_________________________________________
b. Bits Borrowed:
_________________________________________
c. Number of possible subnets:
_________________________________________
d. Magic number:
_________________________________________
e. Number of usable hosts per subnet:
_________________________________________
f. (Sub) network address of subnet 0:
_________________________________________
g. First usable host address in subnet 0:
_________________________________________
h. Last usable host address in subnet 0:
_________________________________________
i. Broadcast address in subnet 0:
_________________________________________
j. (Sub) Network address in subnet 1:
_________________________________________
5. k. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
6. Problem 4:
IP address: 192.168.10.0 (given)
Minimum number of subnets needed: 31
a. Slash prefix:
_________________________________________
b. Subnet Mask:
_________________________________________
c. Bits Borrowed:
_________________________________________
d. Number of possible subnets:
_________________________________________
e. Magic number:
_________________________________________
f. Number of valid hosts per subnet:
_________________________________________
g. (Sub) network address of subnet 0:
_________________________________________
h. First usable host address in subnet 0:
_________________________________________
i. Last usable host address in subnet 0:
_________________________________________
j. Broadcast address in subnet 0:
_________________________________________
k. (Sub) Network address in subnet 1:
_________________________________________
7. l. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
8. Problem 5:
IP address: 192.10.10.0 (given) (Note that this address is
slightly different than above)
Minimum number of hosts needed per subnet: 16
(Remember that the goal is to find a solution that will waste as
few host addresses as possible but still satisfy the
requirements.)
a. Slash prefix:
_________________________________________
b. Subnet Mask:
_________________________________________
c. Bits Borrowed:
_________________________________________
d. Number of possible subnets:
_________________________________________
e. Magic number:
_________________________________________
f. Number of valid hosts per subnet:
_________________________________________
g. (Sub) network address of subnet 0:
_________________________________________
h. First usable host address in subnet 0:
_________________________________________
i. Last usable host address in subnet 0:
_________________________________________
j. Broadcast address in subnet 0:
_________________________________________
k. (Sub) Network address in subnet 1:
_________________________________________
9. l. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
10. Answer the following questions. Try to answer them without
using tables to guide you:
1. How many usable hosts per sub-network will you have using
a /20 address? ______
2. Given a Class B address, what is the magic number if you
need to subnet using a /23 prefix? ______________________
3. In a Class B address, how many sub-networks can you have
with a /18 prefix? _______________
4. How many total addresses per network can you have with a
subnet mask of 255.255.224.0? (Note that total addresses
include network and broadcast addresses.)___________
Lab 18 Instructions
Fundamentals of Subnetting in IPv4
Assignment Instructions:
After reading the chapter on Subnetting IP Networks, complete
the tables in the following problems and answer the questions
provided. Note that you will only be assessed on your answers
to the questions. The tables are provided to guide you through
the process.
To assist you in this assignment, Problem 1 has already been
done for you. Information on how to work these problems is
presented in Problem 1.
[A Word template is provided for your answers.]
Problem 1
You are given an IP address of 192.168.10.0 /27.
Allow these instructions to guide you through your thought
process:
11. 1. Determine the Class.
To perform subnetting, you must know the address ranges for
class A, class B, and class C addresses. Recall from your
textbook the following ranges for the first octet:
Class A
1-127
Class B
128-191
Class C
192-223
2. Determine the default subnet mask.
The default subnet mask assumes a classful addressing system
where an entire octet (as opposed to part of an octet) comprises
the network portion of an IPv4 address. The following default
subnet masks are used for each class:
Class A
255.0.0.0
Class B
255.255.0.0
Class C
255.255.255.0
3. Determine the custom subnet mask.
Because of the vast number of wasted addresses in the classful
system of IPv4 addressing schemes, another system, classless
inter-domain routing (CIDR), was introduced. CIDR allows
part of an octet that would once have been assigned to only
hosts in classful addressing to now be assigned to the network.
This allows for more networks and fewer hosts per network –
12. and hence, fewer wasted host addresses.
Creating a custom subnet mask is easy once you understand the
concept of CIDR. An example will help here…
You are given the address of 192.168.10.0 and are told that it
needs to be subnetted using a /27 prefix.
First ask yourself to whick class does this address belong?
Given the number of the first octet, 192, you know that it is a
Class C address.
The default subnet mask for a Class C address is 255.255.255.0.
To find the custom subnet mask, let’s first review the concepts
of network bits, host bits, and slash prefixes.
An IPv4 address is a 32-bit address consisting of four 8-bit
octets. The /27 is the slash prefix, and it tells you how many
bits are in the network portion of the address and how many bits
are in the host portion. (Recall this from the previous chapter.)
The slash prefix is the way humans are able to easily determine
how many bits are in the network portion of the address. For a
computer, however, the slash prefix does not help. A computer
needs the information in binary form. Thus, the computer uses a
subnet mask. (This is typically written in dotted decimal format,
but ultimately, the computer translates this into binary.)
The network portion of an IP address consists of all 1s. The host
portion consists of all 0s. That is how the computer knows how
much of the address is network and how much is host. If we
know that the first 27 bits belong to the network portion, we
know that the remaining 5 belong to the host portion.
Writing this in binary form yields the following result:
13. 11111111 11111111 11111111 11100000
What is this number in dotted decimal format? It is
255.255.255.224. (Refer back to your lesson on binary
conversions if you have difficulty translating this IP address.)
This number is known as the custom subnet mask (or just subnet
mask, for short).
Therefore, 255.255.255.224 is the subnet mask in this problem.
4. Determine the number of bits borrowed.
Ask yourself the following question: With a /27 prefix, how
many bits are being borrowed from the host portion of this
address? Hint: What would be the prefix if this were a
“classful” address? It would be /24. That means you would have
24 bits in the network portion and 8 bits in the host portion.
However, with a /27 prefix, you are “borrowing” some of the
bits from the host portion to make it part of the network
address. Thus, 27 bits are in the network portion. How many
does that leave for the host portion? It leaves 5 (32 total bits –
27 network bits = 5 host bits). Therefore, how many bits are
being “borrowed” for the network portion from this octet? The
answer is 3. That is, there are 8 total bits in the last octet. 5 of
them represent the host portion, and 3 are being borrowed to use
in the network portion.
Thus, the answer to the question “How many bits are being
borrowed?” is 3.
5. Determine how many subnets are possible.
Using the number of bits borrowed, you can easily determine
the number of possible subnets by using the formula (2Number
of Bits Borrowed). Therefore, the number of valid subnets in
this example is 8 (i.e., 23 bits borrowed ).
6. Determine the number of valid hosts per subnet.
14. To determine the number of hosts per subnet, you first
determine the number of bits that make up the host portion of
the IP address. As mentioned above, the number of bits that
make up the host portion in this example is 5. Using the
formula, 2 Number of Host bits, you can determine the “magic
number.” The magic number is something you can use to
determine the network address of each subnet, but this will be
discussed in the next step. For now, you will use this magic
number to arrive at the number of valid hosts per subnet.
Once you determine the magic number, the number of valid
hosts is simply that number minus 2. Why is 2 subtracted from
it? It is because there are two addresses in a subnet that can
never be assigned to a host device. One address must always be
assigned to the network itself, and the other must be assigned to
the broadcast address. (Recall this also from the previous
chapter.)
Therefore, the “magic number” in this example is 32 (i.e., 25),
and the number of valid (“usable”, “assignable”) hosts per
subnet is 30 (i.e., 32 – 2).
7. Determine the network address, the broadcast address, the
first host address, and the last host address in each subnet.
To determine the network address of each subnet, start with the
network address given. Then, in each row of the table, add the
magic number to the previous row’s sub-network address. This
will give you the sub-network addresses for each row (subnet).
Next, add 1 to each row’s sub-network address. This will give
you the first usable host in each subnet.
Next, subtract 1 from each sub-network address. This will give
you the broadcast address for the previous row (subnet).
15. Finally, subtract 1 from each broadcast address. This will give
you the last usable host in each subnet.
All these fields have been filled in for you in the first problem.
Trace through them until you understand the algorithm. Once
you understand this, you should be able to easily complete the
remaining problems. Note that some problems require you to
work backwards. For example, instead of having the IP address
with the slash prefix, you might be given the number of hosts
needed per subnet. You will then need to figure out the slash
prefix, number of bits borrowed, etc. The key is to understand
how all these addresses (network, broadcast, and usable hosts)
fit together.
Although you will not have to complete any tables that involve
borrowing bits in the second or third octets, you need to be able
to answer some basic questions. First, you must know that the
algorithm remains virtually the same. The only differences are
in the calculations of the magic number and the number of
usable hosts per subnet.
The magic number is related to the octet from which you are
borrowing bits. For example, in the IP address 172.168.0.0/21,
you know that you are working with a Class B address in which
the first two octets would normally represent the network
portion of the address. Given that this example tells you that
you have a /21 prefix, you know that you are working in the
third octet rather than the fourth. How do you know this? The
classful address of this IP address is /16. (Note that classful
addresses are /8, /16, and /24.) Your reference point is /16
because you are working with a class B address. From there,
you can tell that 5 bits are being borrowed from this third octet
to make the subnet mask 255.255.248.0. The magic number is
23, or 8, and the first and second sub-network addresses are
172.168.0.0 and 172.168.8.0 respectively. Notice that the magic
number (8) is added to the previous sub-network address in the
16. third octet rather than the fourth. The number of usable hosts
per subnet is 211-2, or 2046. Why is the exponent 11 used
rather than 3? It is because the TOTAL number of bits in the
host portion is used to determine the number of hosts per subnet
– not merely the number of host bits in the third octet.
As you can see, when you subnet, the algorithm is virtually the
same. You need to merely be aware of the octet in which you
are working to determine the magic number, number of hosts
per subnet, etc. Again, although you will not have to work any
subnetting problems that are this extensive in this assignment,
you need to be able to answer some basic questions (i.e.,
number of hosts per subnet, magic number, etc.). Be aware that
you will encounter this in real world systems and in subsequent
networking classes, so it is best if you can achieve a basic
understanding of it now.
Now, it is your turn. Think of this as a puzzle and have fun with
it. Problem 1 is already worked for you.
Problem 1:
IP address: 192.168.10.0 /27 (given)
Ask yourself “What Class is this?” This is a Class C network
with a default subnet mask of 255.255.255.0.
Therefore, your reference point is /24. Anything over /24
represents the number of bits borrowed from the fourth octet.
This is how your custom subnet mask looks in binary form:
11111111 11111111 11111111 11100000.
a. Custom Subnet Mask: 255.255.255.224
b. Bits Borrowed: 3
c. Number of subnets: 8
d. Magic number: 32
e. Number of valid hosts per subnet: 30
17. f. (Sub) network address of subnet 0: 192.168.10.0
g. First usable host address in subnet 0: 192.168.10.1
h. Last usable host address in subnet 0: 192.168.10.30
i. Broadcast address in subnet 0: 192.168.10.31
j. (Sub) Network address in subnet 3: 192.168.10.64
k. Last usable host address in subnet 4: 192.168.10.158
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
192.168.10.0
192.168.10.1
192.168.10.30
192.168.10.31
1
192.168.10.32
192.168.10.33
192.168.10.62
192.168.10.63
2
192.168.10.64
192.168.10.65
192.168.10.94
192.168.10.95
3
192.168.10.96
192.168.10.97
192.168.10.126
192.168.10.127
4
192.168.10.128
192.168.10.129
192.168.10.158
192.168.10.159
19. i. Broadcast address in subnet 0:
_________________________________________
j. (Sub) Network address in subnet 1:
_________________________________________
k. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
20. Problem 3:
IP address: 192.168.10.0 (given)
Subnet Mask: 255.255.255.240
a. Slash prefix:
_________________________________________
b. Bits Borrowed:
_________________________________________
c. Number of possible subnets:
_________________________________________
d. Magic number:
_________________________________________
e. Number of usable hosts per subnet:
_________________________________________
f. (Sub) network address of subnet 0:
_________________________________________
g. First usable host address in subnet 0:
_________________________________________
h. Last usable host address in subnet 0:
_________________________________________
i. Broadcast address in subnet 0:
21. _________________________________________
j. (Sub) Network address in subnet 1:
_________________________________________
k. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
22. Problem 4:
IP address: 192.168.10.0 (given)
Minimum number of subnets needed: 31
a. Slash prefix:
_________________________________________
b. Subnet Mask:
_________________________________________
c. Bits Borrowed:
_________________________________________
d. Number of possible subnets:
_________________________________________
e. Magic number:
_________________________________________
f. Number of valid hosts per subnet:
_________________________________________
g. (Sub) network address of subnet 0:
_________________________________________
h. First usable host address in subnet 0:
_________________________________________
i. Last usable host address in subnet 0:
_________________________________________
j. Broadcast address in subnet 0:
23. _________________________________________
k. (Sub) Network address in subnet 1:
_________________________________________
l. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
24. Problem 5:
IP address: 192.10.10.0 (given) (Note that this address is
slightly different than above)
Minimum number of hosts needed per subnet: 16
(Remember that the goal is to find a solution that will waste as
few host addresses as possible but still satisfy the
requirements.)
a. Slash prefix:
_________________________________________
b. Subnet Mask:
_________________________________________
c. Bits Borrowed:
_________________________________________
d. Number of possible subnets:
_________________________________________
e. Magic number:
_________________________________________
f. Number of valid hosts per subnet:
_________________________________________
g. (Sub) network address of subnet 0:
_________________________________________
h. First usable host address in subnet 0:
_________________________________________
i. Last usable host address in subnet 0:
_________________________________________
j. Broadcast address in subnet 0:
25. _________________________________________
k. (Sub) Network address in subnet 1:
_________________________________________
l. Last usable host address in subnet 2:
_________________________________________
Subnet
Subnet address
1st Host address
Last Host address
Broadcast
0
1
2
3
Etc.
26. Answer the following questions. Try to answer them without
using tables to guide you:
1. How many usable hosts per sub-network will you have using
a /20 address? ______
2. Given a Class B address, what is the magic number if you
need to subnet using a /23 prefix? ______________________
3. In a Class B address, how many sub-networks can you have
with a /18 prefix? _______________
4. How many total addresses per network can you have with a
subnet mask of 255.255.224.0? (Note that total addresses
include network and broadcast addresses.)___________
Final Steps:
Save your Template
Save your answer template using the following convention:
[your first initial] + [your last name] + “_Lab18”. For example,
Joe Smith will save his file template as “JSmith_Lab18.doc”.
Deliverables:Submit your assignment by attaching your answer
template to the appropriate assignment link in Blackboard.