1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
12

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the

maximum number of hosts possible on each subnet.
Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?
Computers and Technology
1 answer:
ira [324]3 years ago
4 0
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

You might be interested in
If i'm wanting to use hydra on linux to crack a password and the issue regarding hashes occurs, what shall i do?
Inessa05 [86]
Give up do research and then try again
7 0
4 years ago
Each row in a database is a set of unique information called a(n)
blondinia [14]

A row, which is also called a tuple.

4 0
3 years ago
Read 2 more answers
Which activity should be part of a long-term plan to positively affect your
STatiana [176]
D that is the answer but I need 20 words to send this text
5 0
3 years ago
You need to add cells c3 and c7, and multiply c3 by c6. based on the order of operations, what would you do
Julli [10]
Multiply first, and then add.
6 0
4 years ago
Read 2 more answers
____ refers to typing your entire e-mail message or discussion group post using only capital letters.
Over [174]
The answer to this question is: Shouting
7 0
3 years ago
Other questions:
  • It is either snoming or below freezing
    10·1 answer
  • Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
    11·2 answers
  • A network that operates without relying on a server is the ________ network.
    6·1 answer
  • Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
    11·1 answer
  • I accidentally pressed the challenge button while I was scrolling through. I didn't mean to press that challenge, instead of the
    11·2 answers
  • The data manipulation language (DML) of SQL contains SELECT, INSERT, DELETE, and UPDATE statements, whereas the data definition
    12·1 answer
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s
    8·1 answer
  • Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio
    11·1 answer
  • The method "someOtherMethod" is NOT defined as static. This means...
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!