Free Essay

How to Calculate Subnets

In:

Submitted By jlg58
Words 942
Pages 4
How to Calculate Subnets
Subnets and Hosts Borrow 2 bits
S S H H H H H H # of subnets = 22 = 4 Subnet mask = 2 bits = 128 + 64 = 192 Range of hosts = 26 = 64 TT Range Useable Range Network ID 0 – 63 64 – 127 65 - 126 128 – 191 129 - 190 Broadcast 192 – 255 Address

Borrow 3 bits
S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 Range of hosts = 25 = 32 Range 0 – 31 32 – 63 64 – 95 96 – 127 128 – 159 160 – 191 192 – 223 224 – 255 Useable Range 33 - 62 65 - 94 97 -126 129 -158 161 -190 193 -222

Network ID

Broadcast Address

©1999 Dan Foss

How to Calculate Subnets
Decimal/Binary Subnet Ranges

Borrow 2 bits
S S H H H H H H # of subnets = 22 = 4 = 00000100 Subnet mask = 2 bits = 128 + 64 = 192 = 11000000 Range of hosts = 26 = 64 = 01000000 [Range ……………………………] [Useable Range …………………...] Network ID 0 – 63 00 000000 – 00 111111 64 – 127 01 000000 – 01 111111 65 - 126 01 000001 – 01 111110 128 – 191 10 000000 – 10 111111 129 – 190 10 000001 – 10 111110 Broadcast 192 – 255 11 000000 – 11 111111 Address

Borrow 3 bits
S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000 Range of hosts = 25 = 32 = 00100000 [Range ……………………………] Network ID 0 – 31 000 00000 – 000 11111 32 – 63 001 00000 – 001 11111 64 – 95 010 00000 – 010 11111 96 – 127 011 00000 – 011 11111 128 – 159 100 00000 – 100 11111 160 – 191 101 00000 – 101 11111 192 – 223 110 00000 – 110 11111 Broadcast 224 – 255 111 00000 – 111 11111 Address [Useable Range …………………...] 33 – 62 65 – 94 97 – 126 129 – 158 161 – 190 193 – 222 001 00001 – 001 11110 010 00001 – 010 11110 011 00001 – 011 11110 100 00001 – 100 11110 101 00001 – 101 11110 110 00001 – 110 11110

©1999 Dan Foss

How to Calculate Subnets
Binary Subnet Ranges

Borrow 2 bits
S S H H H H H H # of subnets = 22 = 4 = 00000100 Subnet mask = 2 bits = 128 + 64 = 192 = 11000000 Range of hosts = 26 = 64 = 01000000 [Net] [ID] 0 64 128 192 [Useable] [Broadcast] [Range] 63 65 – 126 127 129 – 190 191 255 [Network] [Useable Range …….] [ID] 00 000000 01 000000 01 000001 – 01 111110 10 000000 10 000001 – 10 111110 11 000000 [Broadcast] 00 111111 01 111111 10 111111 11 111111

Borrow 3 bits
S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000 Range of hosts = 25 = 32 = 00100000 [Net] [ID] 0 32 64 96 128 160 192 224 [Useable] [Broadcast] [Range] 31 33 – 62 63 65 – 94 95 97 – 126 127 129 – 158 159 161 – 190 191 193 – 222 223 255 [Network] [ID] 000 00000 001 00000 010 00000 011 00000 100 00000 101 00000 110 00000 111 00000 [Useable Range …….] [Broadcast] 000 11111 001 11111 010 11111 011 11111 100 11111 101 11111 110 11111 111 11111

001 00001 – 001 11110 010 00001 – 010 11110 011 00001 – 011 11110 100 00001 – 100 11110 101 00001 – 101 11110 110 00001 – 110 11110

©1999 Dan Foss

How to subnet in your head.
Subnet Patterns

Step One

left to right

Count

1

2

3

4

5

6
Right to left

7

8

Step two
Document Binary Place Value

2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4
"+4"

2
"+2"

1
"+1"

Step Three
ADD Equals

left to right

128

"+64" "+32" "+16" "+8"

128 192 224 240 248 252 254 255
Close your eyes and Repeat steps 1-3

Step Four
Bits Borrowed Range of Hosts Subnet Mask
Written by Daniel Foss http://ohiocatc.treca.org

1 128

2 64

3 32

4 16

5 8

6 4

7 2

8 1

128 192 224 240 248 252 254 255
Subnet Patterns Page 1

How to subnet in your head.
1 Bit Borrowed Range of Hosts Subnet Mask 2 Bits Borrowed Range of Hosts Subnet Mask 3 Bits Borrowed Range of Hosts Subnet Mask 4 Bits Borrowed Range of Hosts Subnet Mask 5 Bits Borrowed Range of Hosts Subnet Mask 6 Bits Borrowed Range of Hosts Subnet Mask 7 Bits Borrowed Range of Hosts Subnet Mask 8 Bits Borrowed Range of Hosts Subnet Mask
Written By Daniel Foss http://ohiocatc.treca.org

1 128

2 64

3 32

4 16

5 8

6 4

7 2

8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255 1 128 2 64 3 32 4 16 5 8 6 4 7 2 8 1

128 192 224 240 248 252 254 255
Subnet Masks 4/4/01

Similar Documents

Premium Essay

D1 Iw

...company wants to subnet an IP address of 170.1.0.0/27 as it is resulting in too much traffic that is delaying the performance of it here is how you would do it To calculate an IP subnet mask you will need to have a network class, IP address, subnet mask, mask bits, the maximum required IP subnets and the maximum required hosts per subnet, by calculating the subnet it will provide you with a hexadecimal IP address, wildcard mask to use the ACL (Access control lists), the subnet ID, broadcast address, the subnet address range. The method to calculate an IP subnet mask for CIDR is first of all you need the IP address which is 170.1.0.0/27 you will need to convert this bit-length prefix into a quad dotted decimal representation to do this you look at the number after the slash / which is 27 because, it says quad we have to find 4 numbers that sum up to 27 which is 27= 8+8+8+3 Then you would look at the conversion of how to convert quad- dotted into bit length using the conversion tables If we let the IP address equal 170.1.0.0/26 using the tables you can say 26= 8+8+8+2 26=255.255.255.192 So the IP address is 170.1.0.0 and the subnet mask in quad dotted format is 255.255.255.192 Then you will need to calculate the number of bits used for subnetting to their corresponding subnet mask The ranges of the subnet mask is 0,128,192,224,240,248,252,254,255 You can convert the subnet mask into the number bits used for subnetting from the tables, for the subnet mask 255 is default...

Words: 522 - Pages: 3

Free Essay

Mcts

...comprised of two parts: a network portion and a host portion. The network portion of an address is the same for all devices that reside in the same network. The host portion identifies a specific host within a given network. The subnet mask is used to determine the network portion of an IP address. Devices on the same network can communicate directly; devices on different networks require an intermediary Layer 3 device, such as a router, to communicate. To understand the operation of devices on a network, we need to look at addresses the way devices do—in binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network address. This lab provides instructions on how to determine the network and host portion of IP addresses by converting addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation. You will then apply this information to identify addresses in the network. Convert IPv4 Addresses from Dotted Decimal to Binary In Part 1, you will convert decimal numbers to their binary equivalent. After you have mastered this activity, you will convert IPv4 addresses and subnet masks from dotted decimal to their binary form. Convert decimal numbers to their binary equivalent. Fill in the following table by converting the decimal number to an 8-bit binary number. The first number has been completed...

Words: 1123 - Pages: 5

Premium Essay

Subnetting Made Simple

...up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating the subnet mask, determining (sub)network id’s...

Words: 7956 - Pages: 32

Premium Essay

Subnet Assignment

...46 subnets and provide information for subnets #1, #4, #5, and #46 Step 1: Convert the network address to binary 215.251.145.0/24 is a class C address with a subnet mask of 24 bits of ones First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=0, 16=1, 8=0, 4=1, 2=1, 1=1 215 = 11010111. Second Octet = 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=0, 2=1, 1=1 251 = 11111011 Third Octet = 128.64.32.16.8.4.2.1, 128=1, 64=0, 32=0, 16=1, 8=0, 4=0, 2=0, 1=1 145 = 10010001 Fourth Octet = 0 11010111.11111011.10010001.00000000 Network address Step 2: Convert Subnet mask into binary First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Second Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Third Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Forth Octet = 0 11111111.11111111.11111111.00000000 Subnet mask Step 3: Calculate the subnets required 46 subnets required per instructions: Use the formula 2 to the power of X to find out how many bits to borrow from the subnet mask. 2^5= 32 and is insufficient to cover the subnets required so, 2^6 = 64 x is 6 we need 6 bits from last octet of the subnet mask to cover our subnets. I need 46 subnets but I have total 64 available so that leaves me with; 64-46 = 18 extra subnets to use at a later date. Original Network address in binary: 11010111.11111011.10010001.00000000 Replace subnet bits...

Words: 1170 - Pages: 5

Premium Essay

Paper

...The number of hosts per subnet. C. The number of subnet masks. D. The number to subtract from 255/ Answer: ___________________________________________ 3. What is the magic number for CIDRs 26? A. 128 B. 16 C. 32 D. 64 Answer: _____________________________________________ 4. How many hosts are in a Class B network? A. 16,777,216 B. 2048 C. 65536 D. 512 Answer: ________________________________________________ 5. What subnet does 192.168.74.232 /28 belong? A. 192.168.74.32 B. 192.168.74.240 C. 192.168.74.192 D. 192.168.74.224 Subnet: _____ Network #: _____ Broadcast #: ____ Magic #: _____ # of Bits | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | Power | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | Value/Magic # | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Octet Mask | 255 | 254 | 252 | 248 | 240 | 224 | 192 | 128 | Binary | 11111111 | 11111110 | 11111100 | 11111000 | 11110000 | 11100000 | 11000000 | 10000000 | 1. #-of-Bits: is the number of bits per octet. 2. Shows the bit power, i.e., 23 represents 2 * 2 * 2 = 8 or 2 to the power of 3. 3. Value/Magic # represents the binary value of the bit, i.e., bit 4 has a value of 8. 4. The Octet Mask when all bits are turned on equal 255. Seven bits are 254. Six bits are 252 and so forth. 5. This is the binary representation of the octet mask using ones and zeros. You can only enter numbers into the computer for each octet. Magic Number Subnet Groupings: |...

Words: 681 - Pages: 3

Premium Essay

It Substituting

...INSTITUTE OF INFORMATION & COMMUNICATION TECHNOLOGY “NETWORK MANAGEMENT & SECURITY ASSIGNMENT” CLASS: BS (IT) PART-IV MORNING (REGULAR) |STUDENT’S NAME |ROLL # | |“HIRA KHAN” |2K8/IT/35 | |D/O: ABDUL ALEEM KHAN | | Q#1: What is IP address and also define classes of IP address? Ans: IP ADDRESS: "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible. An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections...

Words: 2246 - Pages: 9

Premium Essay

Narnia

...up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating the subnet mask, determining (sub)network id’s...

Words: 7956 - Pages: 32

Premium Essay

Subnet

...TCP/IP Subnetting The core components of TCP/IP are the IP address and the Subnet mask. The entire purpose of the Subnet Mask is to show the computer where to separate the IP Address into the Network ID and the Host ID. When read in Binary, a Subnet Mask will always be a string of 1’s followed by a string of 0’s. The 1’s cover the Network ID while the 0’s cover the Host ID. The IP Address is separated between the last 1 and the first 0. Network ID Host ID 10101010.01010101 11001100.11100011 = IP Address 11111111.11111111 00000000.00000000 = Subnet Mask TCP/IP addresses are made up of 4 sets of numbers called “Octets.” Each octet is an 8 bit binary string. The largest possible value that can be created with 8 characters in binary is 255. There are three classes of IP Address by default. They are determined by the value of their first octet. Each Class address has a particular default Subnet Mask. Class “A” = 1-127 Default Subnet Mask = 255.0.0.0 Class “B” = 128-191 Default Subnet Mask = 255.255.0.0 Class “C” = 192-223 Default Subnet Mask = 255.255.255.0 When viewed in Binary, you’ll notice a pattern. Class “A” always begins with a 0 00000001-01111111 Class “B” always begins with a 10 10000000-10111111 Class “C” always begins with a 110 11000000-11011111 The remaining classes (any with a value of 224 or higher in the first octet) are not used for public use, and are not considered valid. Also, though technically a Class “A” address, 127.0.0.1 is reserved for testing...

Words: 1137 - Pages: 5

Premium Essay

Nt 1330

...1. How many bits of mask are required to provide 30 host addresses? 5 30 = 11110 2. How many networks will be created using a 255.255.0.0 given a class A IP network (i.e., 10.0.0.0)? Over 16,000,000 3. What would be the dotted decimal equivalent of the slash notation of /30? 30/8= 3r6 255.255.255.252 4. What would be the dotted decimal equivalent of the slash notation of /8? 8/8= 1 255.0.0.0 5. What would be the dotted decimal equivalent of the slash notation of /17? 17/8= 2r1 255.255.128.0 6. What would be the dotted decimal equivalent o the slash notation of /12? 12/8= 1r4 255.240.0.0 7. Given 9 bits of mask for the host portion, how many host addresses are available? 2^9-2= 510 8. Given 13 bits of mask for the host portion, how many host addresses are available? 2^13-2= 8190 9. Given 3 bits of mask for the host portion, how many host addresses are available? 2^3-2= 6 10. Given 8 bits of mask for the network portion, how many subnets are available? 2^8= 256 11. Given 4 bits of mask for the network portion, how many subnets are available? 2^4= 16 12. Explain the reasoning behind the concept of “subnet zero.” Using subnet zero for addressing was discouraged because of the confusion inherent in having a network and a subnet with indistinguishable addresses, consider the IP address 172.16.1.10. If you calculate the subnet address corresponding to this IP address, the answer you get is subnet 172.16.0.0 (subnet zero). Note that this subnet address is identical...

Words: 440 - Pages: 2

Premium Essay

It 240 Week4

...Chapter 5 Questions (Subnetting) Brian M. Robinson IT/240 February 1, 2013 Derrick Sorrells Chapter 5 Questions (Subnetting) 1. An IPv6 address is made up of how many bits? An Ipv6 address is made up of 128 bits. Because IPv6 has 128 bits, instead of the 32 bits that IPv4 has, the need for private addressing is eliminated. This is because IPv6 has 3.4 x 10^38 addresses, compared to the 4 billion addresses that IPv4 has. This is more than enough IP addresses to handle the needs of networking for the foreseeable future and beyond. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. The most important task performed by subnetting is that it helps determine whether the host is communicating with computer that is on the same network, or subnet, or a different network or subnet. The distinction matters because if the host is talking to a computer on the same subnet, then no router is needed. If the two are on separate subnets, then the router must then be involved to facilitate communications. 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 192.156.90.100 b. 172.19.243.254 c. 11.200.99.180 d. 221.24.250.207 e. 12.12.12.12 The IP address 172.19.243.254 is a private address and cannot be routed across the internet. For Class A, addresses beginning with 10; for Class B, addresses starting with 172.16 and running through 172.31; and for Class...

Words: 824 - Pages: 4

Free Essay

Ipv6 Address Type

...Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables  Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address  Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol.  Include the IPv6 multicast address for all routers and all hosts.  Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use an Internet search engine to aid in this response. Provide citations for the Internet resources you used.   A big feature of IPv6 is the implementation of stateless autoconfiguration. With stateless autoconfiguration, a host dynamically learns the /64 prefix used on the subnet, and then calculates the rest of the address by using an EUI-64 interface id based on the network interface card...

Words: 883 - Pages: 4

Premium Essay

Subnetting and Ipv4 Addresses

...Project Description Implement an appropriate addressing scheme, to subnet an IP address for different sized subnets. Introduction I have undertaken this project for the module network models and technologies. The project requires me to implement addressing schemes and to subnet an IP address for different sized subnets. The following topics will also be discussed: * Binary * HEX & decimal number systems * Octet, IP Address, IPv4/IPv6 * Subnet Mask * Network and Host IDs * Address Classes, classful and classless address schemes * Minimising wasteful use of IP addresses * CIDR * Subnetting * VLSM * Health and Safety * Evaluation * Bibliography Binary Computers see things in terms of binary. In binary everything is described as having two values or states: on or off, true or false, 1 or 0 and yes or no. A light switch could be regarded as a binary system, since it is always either on or off. As complex as they might seem computers can be regarded as a box full of light switches. Each switch is called a bit which is short for binary digit and a computer can turn each of these bits on or off. The computer describes 1 as being on and 0 as being off. By itself, a single bit is kind of useless, as it can only represent one of two things. Imagine if you could only count using either zero or one. Alone, you could never count past one. On the other hand, if you got a bunch of friends together who could also count using...

Words: 2448 - Pages: 10

Premium Essay

It242 Final Project

...Running head: WAN DESIGN WAN Design for Acme Manufacturing UoP Student Axia College of University of Phoenix WAN Design for Acme Manufacturing Acme Manufacturing is a rapidly expanding company that is headquartered in Atlanta, Georgia. The headquarters building houses corporate operations, marketing, administrative staff, and accounting. Across the street from headquarters are the engineering and sales offices. Acme also has distribution offices in Chicago, Phoenix, and New York. Having just acquired a manufacturing facility in China, the company is now in need of a WAN that will allow each office to securely communicate with one another. Acme will also need a telecommunications system that facilitates communication in the most efficient manner. In order to achieve the desired connectivity, an array of products and services will be necessary. Logical Network Design The network topology used for Acme’s WAN should be a star topology with each site having only a direct connection to headquarters; the benefit is that network administration is centralized. The engineering and sales offices will connect to headquarters over the public WAN through a VPN configured with L2TP and IPSec for security. The manufacturing facility in China can be linked to headquarters through a leased satellite connection. Acme should lease three fractional T1 leased lines that extend from the headquarters in Atlanta to the distribution centers, one line each to Phoenix, Chicago, and New...

Words: 1356 - Pages: 6

Premium Essay

Netw-202 Introduction to Networking with Lab Final Exam Answers

...NETW-202 Introduction to Networking with Lab Final Exam Answers Follow Link Below To Get Tutorial https://homeworklance.com/downloads/netw-202-introduction-to-networking-with-lab-final-exam-answers/ NETW-202 Introduction to Networking with Lab Final Exam Answers 1. (TCO 5) _____ is a network-scanning technique used to identify which host IP addresses are operational. (Points : 5) 2. (TCO 5) _____ create(s) noise that interferes with information being transmitted across unshielded copper cabling. (Points : 5) 3. (TCO 5) _____ is used in Ethernet where some pairs of twisted-pair wires are crossed, when comparing the RJ-45 connectors on either end of the cable. These 10BASE-T and 100BASE-T cables connect the pair at pins 1 and 2 on each end to pins 3 and 6 on the other end. (Points : 5) 4. (TCO 5) _____ is a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium. (Points : 5) 5. (TCO 5) _____ are a collection of data that establishes a reference for network performance and behavior over a period of time. (Points : 5) 6. (TCO 5) The ______ provides a physical connection to the network (from the network end (Telco, ISP) of the user-to-network equipment), forwards traffic, and provides a clocking signal used to synchronize data transmission. (Points : 5) 7. (TCO 5) The _______ command will bring up a router interface. (Points : 5) 8. (TCO 5) A(n) _____ is an interference...

Words: 8529 - Pages: 35

Premium Essay

Ip Address Schema

...Gerald Boursiquot Network & Infrastructure Bever Branson Budget/Proposal/Visio NT 1210 May 23, 2013 In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each employee will be using. With the rationale in mind of estimating that there would be at least 4 possible devices per user, plus three possible printers per department, and the addition of a Wireless Access Point on the Management floor, network hardware which should include the printers we previously mentioned, one router for the LAN and WAN connections, a wireless access point, 12 printers for the entire organizations printing needs, and 5 servers We determined that there had to be one File and Print server, A Directory server that is also running DNS and DHCP, an E-commerce/Database server, a Web Proxy server and a Web...

Words: 3659 - Pages: 15