Given 192.168.31.0 a. How many bits are in the host field for this network? _ b. If we need to set up 30 subnets, how many bits must be used for subnetting? _ c. How many bits are left over that can be used for host addresses? _ d. How many subnets can we create from this? _ total subnet? usable subnet? e. How many hosts could be assigned on each subnet? _ total possible host? Usable hosts? f. What subnet mask will be used? _ g. What is the network address for this entire network? _ h. What is the broadcash address for this entire network? _ Show Solution
Given 192.168.31.0 a. How many bits are in the host field for this network? _ b. If we need to set up 30 subnets, how many bits must be used for subnetting? _ c. How many bits are left over that can be used for host addresses? _ d. How many subnets can we create from this? _ total subnet? usable subnet? e. How many hosts could be assigned on each subnet? _ total possible host? Usable hosts? f. What subnet mask will be used? _ g. What is the network address for this entire network? _ h. What is the broadcash address for this entire network? _ Show Solution
Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter6: Security Technology: Access Controls, Firewalls, And Vpns
Section: Chapter Questions
Problem 2RQ
Related questions
Question
Given 192.168.31.0
a. How many bits are in the host field for this network? _
b. If we need to set up 30 subnets, how many bits must be used for subnetting? _
c. How many bits are left over that can be used for host addresses? _
d. How many subnets can we create from this? _ total subnet? usable subnet?
e. How many hosts could be assigned on each subnet? _ total possible host? Usable hosts?
f. What subnet mask will be used? _
g. What is the network address for this entire network? _
h. What is the broadcash address for this entire network? _
Show Solution
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning