File Name: ip addressing and subnetting workbook version 1.5 file.zip
- IP Addressing and Subnetting - Workbook-Student
- The ABCs of IP Version 6
- IP Addressing and Subnetting Workbook - Student Version 1 5
Views 2 Downloads 0 File size KB.
IP Addressing and Subnetting - Workbook-Student
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Ip addressing and subnetting instructors workbook. Upcoming SlideShare. Like this document? Why not share! Ip Addressing And Subnetting Teache Embed Size px.
Start on. Show related SlideShares at end. WordPress Shortcode. Swapnil Kapate , Network Engineer Follow. Full Name Comment goes here. Are you sure you want to Yes No. Htet Htet Lynn. Chritzan Sawayan. Show More. No Downloads. Views Total views. Actions Shares. No notes for slide. Ip addressing and subnetting instructors workbook 1. HostClass B — Leading bit pattern 10 HostClass C — Leading bit pattern Inside Cover 3.
Address Class Identification Address Class Default Subnet MasksWrite the correct default subnet mask for each of the following addresses By now you should be able to lookat an IP address and tell what class it is. Default Subnet Masks: Class A IP Address: Address Class: C Network Portion: Network Host IP Address: 1 1 0 0 0 0 0 0. Each independent of the other.
This can only be accomplished by usinga custom subnet mask. A custom subnet mask borrows bits from the host portion of theaddress to create a subnetwork address between the network and host portions of an IPaddress. In this example each range has 14 usable addresses in it. The computer must stillAND the IP address against the custom subnet mask to see what the network portion is andwhich subnetwork it belongs to. In the next set of problems you will determine the necessary information to determine thecorrect subnet mask for a variety of IP addresses.
Number of 64 32 16 8 4 2 - Hosts Number of Subnets - 2 4 8 16 32 64 64 32 16 8 4 2 1 - Binary values Add the binary value numbers to the left of the line to 8 -2 Subtract 2 for the number of create the custom subnet mask.
All bits remaining belong to the host portion of the address. Number of 64 32 16 8 4 2 - Hosts Number of Subnets - 2 4 8 16 32 64 64 32 16 8 4 2 1 - Binary values SubnettingProblem 1 Number of needed usable subnets 14 Number of needed usable hosts 14 Network Address Show your work for Problem 1 in the space below.
In this problem the range is The first address in each subnet range is the subnet The first and last range of addresses are not usable. The first usable range of addresses is: SubnettingProblem 2 Number of needed usable subnets Number of needed usable hosts 60 Network Address You just clipped your first slide!
Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips. Visibility Others can see my Clipboard. Cancel Save.
The ABCs of IP Version 6
Views 3 Downloads 0 File size KB. Write the default. If you are familiar with counting in binary you w. Problem: ISP provided Divide the network into 8 subnets.
Report Download. Host Leading bit pattern Leading bit pattern 10 Produced by: Robb Jones jonesr careertech. Address Class IdentificationAddress By now you should be able to look at an IP address and tell what class it is.
Host Class B 28 9 Leading bit pattern Host Class C Leading bit pattern By now you should be able to look at an IP address and tell what class it is. Unfortunately your computer doesn t think that way. IP Address: What you can figure out in your head
IP Addressing and Subnetting Workbook - Student Version 1 5
Rated 3. Help with my best critical analysis essay on presidential elections presidential election essay three Critical essay Avatar analysisEssay Writing Help. Buy Essay help me write top analysis essay us help me Help me write critical analysis essay on presidential Help me write critical analysis essay best buy.
This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA. Home current Explore. Words: 5, Pages:
Chapter 1. Integration and Coexistence Strategies Chapter 6. This document is ideal for anyone, including account managers and system engineers, who is. We have kept the technical content in this document as generic as possible.