Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Time left 0:59:48 Question 1 Not yet answered Marked out of 100 An IP address is an address used in order to uniquely identify a

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Time left 0:59:48 Question 1 Not yet answered Marked out of 100 An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 64 birary bits, which can be divisible into a network portion and user portion with the help of a subnet mask which is also in binary bits Example: What is the mistake? (user) What is your correction? (host) if there is no mistake, please put down NONE in your answer(s). What is the mistake? (NONE) What is your correction? (NONE) Flag question What is the mistake? Question 2 Not yet answered What is your correction? Marked out of 2.00 Fag question Question 3 Not yet The binary bits are broken into 8 octets (1 octet 8 bits). Each octet is converted to decimal and separated by a dot. For this reason, an IP address is said to be expressed in dotted decimal format (for example, 173.18.1.100). The value in each octet ranges from 0 to 255 decimal, or 00000000-11111111 binary answered Question 3 Not yet The binary bits are broken into 8 octets (1 octet - 8 bits). Each octet is converted to decimal and separated by a dotFor this reason, an IP address is said to be expressed in dotted decimal format for example, 173.18.611001. The value in each otet ranges from 0 to 256 decimal, or 0000000011111111 binary What is the mistake? Marked out of too Eestion Question 4 Naty What is your correction? Mando 700 Question yat award Max out of 1.00 Here is how binary octets convert to decimal The night most bit of an octet holds a value of 2 to the power of The bit to the left of that holds a value of 2 to the power of 1. This continues until the lemost bit, which holds a value of 2 to the power at 7. So, if all binary bits are a one, the decimal equivalent would be 256 What is the mistake 1 Flag question Time left 0:59:30 What is your correction? Question 6 Not yet answered Marked out 2.00 Flag Gestion Question 7 Not yet answered Marted out of 1.00 The octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are 6 different classes of networks. Domestic uses focus on classes A to C, while the rest are reserved What is the mistake?! Flag question What is your correction? Question 8 Not yet answered Marked out of 200 P Flag question Question 9 Also note that the terms "Class A, Class B and so on are used in our lesson in order to help facilitate the understanding of IP Question 9 Not yet Tiene left 0 50 30 Also note that the terms "Class A Class B and so on are used in our lesson in order to help facilitate the understanding of addressing and subetting. These terms are less commonly used in the industry anymore because of the introduction of class interdomain routing (CIDR) What is the mistake?! wered Marked out of 1.00 7 Flag question Question 10 Not yet What is your correction? Marbed out of FF Question Question 11 Not yet nered Marked out of 1.00 Fug Question in a Class A address, the first octet is the network portion, so the Class A network has a major network address of 00.00 127.255.255.255. Octets 2, 3, and 4 the next 24 bits) are for the network manager to divide into subnets and hosts as he sees fit. Class A addresses are used for networks that have up to 16777214 hosts (usable) What is the mistake? Time left 0 50 24 Question 12 Not yet What is your correction? Marted out of 2.00 Fing question Question 13 animed Marked out of 1.00 Flag w In a class address, the first two octets are the network portion, so the Class network has a major network address at 128.0.0.0 - 191.255.255.255. Octets 3 and 4 (16 bhi e for local subnets and hosts. Class addresses are used for networks that have up to 65634 hosts usable. What is the mistaker Question 14 NY and What is your correction Markedutor 2.00 Timelett 0 5918 Qui 15 No yet wered Maries out of 100 In a class address, the first 2 octets are the network portion. The Class network has a major network address of 102.000. 223.255.255.255. Oct 4 (8 bits) is for local subnets and hosts - perfect for networks with trus than 255 hosts What is the mistake? 16 What is your correction Hot doute 200 49 17 in assadores, it is used for musicasting options Unide the previous thesis not editorum networking operations Close addresses have their first is set to "T" and the dinit set to see w bit network adres, mowing that the vies within the range of 224000 230.256205206 milticast groups What is the most 100 Time Left 0:59-16 What is your correction Quesos 18 Not yet wered Mad out 2.00 ag Quo 19 Not yet wed Marked to TOO A network mask helps us know which portion of the address Identifies the network and which portion of the deseti the node for host). Once you have the address and the mask represented in binary, then identification of the network and hosto is easier. Any address bts that have corresponding mask is set to represent the node for host D. What is the mistake? 20 What is your correction 200 Den 21 In order to be a network, extend the default mask with some of the bit from the host portion of the into MacBook Pro III A Moodle HSUHK - Google Time left 0:59-10 Question 21 Not yet Machad out of 100 In order to subnet a network, extend the default mask with some of the bits from the host in portion of the address in order to create a subnetwork ID. For example, given a class network of 200.0.5.0 which has a default mask of 255.255.2550 BY extending the mask to be 255.255.255.224, you have taken three bits indicated by sub") from the original Post portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host addresses, 32 of which can actually be assigned to a dice. So, with this in mind, there eight subnets have been created What is the mistake? Rag Out 22 yer ward What is your correction? Mart 200 un Mest page moto Lecture State Houte You are logged in a RACHENG Tin Y Logout

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Theory And Application Bio Science And Bio Technology International Conferences DTA And BSBT 2011 Held As Part Of The Future Generation In Computer And Information Science 258

Authors: Tai-hoon Kim ,Hojjat Adeli ,Alfredo Cuzzocrea ,Tughrul Arslan ,Yanchun Zhang ,Jianhua Ma ,Kyo-il Chung ,Siti Mariyam ,Xiaofeng Song

2011th Edition

3642271561, 978-3642271564

More Books

Students also viewed these Databases questions