1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
10

In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw

ork. Complete the steps as follows: 1. Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the new LAN. You’ve determined that you need 50 subnets for the Class B network beginning with the network ID 172.20.0.0. How many host bits will you need to use for network information in the new subnets? 2. After the subnetting is complete, how many unused subnets will be waiting on hold for future expansion, and how many possible hosts can each subnet contain?
Computers and Technology
1 answer:
defon3 years ago
7 0

Answer:

1. 10 bits

2. 1022 Hosts / Subnet

Explanation:

Given Network ID is 172.20.0.0

Class B network contains :

Network ID = 16 bits

Host ID = 16 bits

For subnetting always host id bits are used.

Number of subnets required = 50. Subnets are always in power of two. Nearest power of two to 50 is 26 = 64.

So, to create subnet we require 6 bits from host id and 64 subnets can be created with those 6 bits.

1)

Number of host bits needed for new subnets for network information = 6 bits.

Therefore, New network information contains :

Network ID of subnet = 16 + 6 = 22 bits

Host ID = 16- 6 = 10 bits.

2)

Subnets required = 50

Subnets created with 6 bits = 64.

Number of subnets unused for future expansion = 64 - 50 = 14 subnets.

Host ID part contains 10 bits. Therefore, Total number of Hosts /Subnet = 210 = 1024 Hosts.

Number of usable hosts per subnet = 1024 -2 = 1022 Hosts / Subnet.

You might be interested in
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Who has a brainpop acct. can i pls use it !
RSB [31]

Answer:

Союз нерушимый республик свободных

Сплотила навеки Великая Русь.

Да здравствует созданный волей народов

Единый, могучий Советский Союз!

Славься, Отечество наше свободное,

Дружбы, народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы, к победе ведет!

Сквозь грозы сияло нам солнце свободы,

И Ленин великий нам путь озарил.

Нас вырастил Сталин - на верность народу

На труд и на подвиги нас вдохновил.

Славься, Отечество чаше свободное,

Счастья народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!

Skvoz grozy siialo nam solntse svobody,

I Lenin velikij nam put ozaril.

Nas vyrastil Stalin - na vernost narodu

Na trud i na podvigi nas vdokhnovil.

Slavsia, Otechestvo chashe svobodnoe,

Schastia narodov nadezhnyj oplot!

Znamia sovetskoe, znamia narodnoe

Pust ot pobedy k pobede vedet!

Мы армию нашу растили в сраженьях,

Захватчиков подлых с дороги сметем!

Мы в битвах решаем судьбу поколений,

Мы к славе Отчизну свою поведем!

Славься, Отечество наше свободное,

Славы народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!Explanation:

8 0
3 years ago
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
3 years ago
Which option allows users to access the handout master to modify it?
leonid [27]

Answer:

b

Explanation:

im the goat

3 0
3 years ago
Read 2 more answers
You invested $2,300 in a stock. Your account now has a value of $2,643. Your percentage gain on the investment (rounded to the n
nasty-shy [4]
Your percentage gain on the investment was d)15%

To find percentage increase we subtract original number from new number.
2,643 - 2,300 = 343
Then we divide 343 by 2,300 = .1491
Then you multiply by 100. 
.1491 * 100 = 14.91
It is a 14.91% (rounded) increase.
So the nearest percent out of these options would be 15%.

Hope this helps you! (:
-Hamilton1757
4 0
4 years ago
Read 2 more answers
Other questions:
  • Using a second hash function to compute increments for probe increments is called
    15·1 answer
  • Data silos are often associated with ________________.
    12·1 answer
  • Does the Main Content (MC) of a web page include searchboxes?
    10·1 answer
  • A Linux-based OS is called a _____.
    9·1 answer
  • What is the term that is used to describe a computer system that could store literary documents, link them according to logical
    8·1 answer
  • What do u mean by software​
    7·1 answer
  • Rayna wants to create an organizational chart in her document. Which of the following commands should she click in the Illustrat
    14·1 answer
  • True or False: Variablename must start with a number.
    13·1 answer
  • A numeric literal that is written with a decimal point is called a ________. real number floating-point value decimal literal do
    6·1 answer
  • You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!