CS625_Lab3SubmissionTemplate

doc

School

Boston University *

*We aren’t endorsed by this school

Course

625

Subject

Computer Science

Date

Jan 9, 2024

Type

doc

Pages

6

Uploaded by MajorMuleMaster1001

Report
MET CS CS625 Business Data Communications and Networks Lab 3 Submission This submission template is a convenient document for you to provide your work and your answers for Lab 3. This submission template is intended to be used in conjunction with the Lab 3 Instructions document. The instructions document illustrates how to correctly derive the answers, explains important theoretical and practical details, and contains the complete set of instructions for this lab. Name: Jinwen Zheng Date:10/26/2023 Page 1 of 6
Section One – Subnet Calculations 2. Now you give this calculation a try with the following subnet entry: 66.147.242.171/15 Using the methodology listed in step 1, determine the number of hosts (usable IPv4 addresses) for this subnet. 2^(32 - 15)=131072 131072-2=131070 4. Now you give it a try by calculating the broadcast address for the following CIDR entry using the methodology listed in step 3. Represent your answers in dotted decimal notation, and make sure to show your work. 64.152.0.21/25 Network address 64.152.0.0 Calculate the broadcast address There are 32-25 bits will be fill with 1s 64---64 152---152 0---0 0---01111111-127 Broadcast address 64.152.0.127 6. Now, you give this a try with the CIDR entry below. Give the range of assignable IPv4 addresses for that subnet, using the methodology listed in step 5. Make sure to show your work. 66.147.242.171/15 Network address 64.146.0.0 Broadcast address 64.146.255.255 Range: 64.146.0.1---64.146.255.254 Page 2 of 6
8. Imagine that a network adapter on a subnet is represented with the CIDR entry 103.147.213.34/17, and that its subnet identifier spans 2 bits. Represent its network prefix and subnet identifier in binary using the methodology listed in step 7. Recall that from the perspective of a subnet, its network prefix and subnet identifier are both contained within its network identifier. Binary representation: 01100111 10010011 1 1010101 network prefix: 01100111 1001001 subnet identifier: 11 10. Imagine that an organization is given a block of addresses represented with 139.93.40.0/22, and that it intends to use 4 subnets on its network. Give the number of bits needed for the subnet identifier for 4 subnets, and list the network identifiers for all four subnets, in binary, using the methodology listed in step 9. Binary representation: 10001011 01011101 0010 10 00 00000000 2 bits needed for the subnet identifier. First subnet: 10001011 01011101 00100000 00000000 Second subnet: 10001011 01011101 00100100 00000000 Third subnet: 10001011 01011101 00101000 00000000 Fourth subnet: 10001011 01011101 00101100 00000000 12. Imagine that an organization is assigned the range of addresses identified by CIDR entry 66.216.112.0/21, and that the organization has decided to use 8 subnets. Answer the following series of questions about this scenario. Make sure to show your work, using a tool to convert from binary to decimal and vice versa when necessary. a. How many bits are needed for the subnet identifier, to distinguish one subnet from another on this network? 3bits b. What is the subnet mask for the 8 subnets in binary and in dotted decimal? 21+3=24bits subnet mask: 11111111.11111111.11111111.00000000 c. How many hosts are there per subnet? 256-2=254 d. What are the network identifiers for each subnet, in binary? 1. 01000010.11011000.01110000.00000000 2. 01000010.11011000.01110001.00000000 3. 01000010.11011000.01110010.00000000 Page 3 of 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4. 01000010.11011000.01110011.00000000 5. 01000010.11011000.01110100.00000000 6. 01000010.11011000.01110101.00000000 7. 01000010.11011000.01110110.00000000 8. 01000010.11011000.01110111.00000000 e. What are the network addresses for each subnet in dotted decimal notation? 1. 66.216.112.0 2. 66.216.113.0 3. 66.216.114.0 4. 66.216.115.0 5. 66.216.116.0 6. 66.216.117.0 7. 66.216.118.0 8. 66.216.119.0 f. What are the broadcast addresses for each subnet in dotted decimal notation? 1. 66.216.112.255 2. 66.216.113.255 3. 66.216.114.255 4. 66.216.115.255 5. 66.216.116.255 6. 66.216.117.255 7. 66.216.118.255 8. 66.216.119.255 g. What are the assignable IP addresses for each subnet? 1. 66.216.112.1 - 66.216.112.254 2. 66.216.113.1 - 66.216.113.254 3. 66.216.114.1 - 66.216.114.254 4. 66.216.115.1 - 66.216.115.254 5. 66.216.116.1 - 66.216.116.254 6. 66.216.117.1 - 66.216.117.254 7. 66.216.118.1 - 66.216.118.254 8. 66.216.119.1 - 66.216.119.254 13. In your own words, explain what a subnet is from a conceptual and a technical perspective, and also explain the advantages of using subnets versus using a single, monolithic computer network. From my perspective, a subnet is a logical division of a computer network that allows for the separation of network traffic and the isolation of network services. It is basically a smaller network within a larger network. A subnet can exist within a single physical network or across multiple physical networks. Advantages: 1. Subnetting allows for the expansion of a network without affecting the entire network. As the network grows, new Page 4 of 6
subnets can be created to accommodate additional devices without overwhelming the existing network infrastructure. 2. Subnets can be configured with different security policies and access controls, providing a layered approach to network security. Page 5 of 6
Your lab submission will be evaluated according to the following rubric. Letter Grade Qualities Demonstrated by the Lab Submission Grade Assigned Answers and Methodology Measures the correctness and completeness of the answers and methodology used for lab steps A+ 100 The answers, and answer justifications where required, are entirely complete and correct for all steps. The methodologies used to derive the answers are entirely applicable to the given problems, and are implemented correctly, for all steps. There are absolutely no technical or other errors present. A 96 One insignificant technical or other error is present, but otherwise the answers, and answer justifications where required, are entirely complete and correct for all steps. Excluding the insignificant error, the methodologies used to derive the answers are entirely applicable to the given problems, and are implemented correctly, for all steps. A- 92 One or two technical or other errors are present, but otherwise the answers, and answer justifications where required, are entirely complete and correct for all steps. Excluding the one or two errors, the methodologies used to derive the answers are entirely applicable to the given problems, and are implemented correctly, for all steps. B+ 88 The answers, and answer justifications where required, are complete and correct for most steps. Likewise, the methodologies used to derive the answers are applicable to the given problems, and are implemented correctly, for most steps. B 85 The answers are correct or almost correct for most steps. Some answer justifications may be missing or incorrect, but most are present and correct where required. The methodologies used to derive the answers are applicable and implemented correctly for most steps. B- 82 The answers, and answer justifications where required, are complete and correct for about ¾ of the steps. Likewise, the methodologies used to derive the answers are applicable to the given problems, and are implemented correctly, for about ¾ of the steps. C+ 78 The answers are correct or almost correct for about ¾ of the steps. Some answer justifications may be missing or incorrect. The methodologies used to derive the answers are applicable to the given problems, and are implemented correctly, for about ¾ of the steps. C 75 The answers for about half of the steps are either missing or incorrect. Likewise, the methodologies used for about half of the steps are either inapplicable to the given problem, or are implemented incorrectly. Some answer justifications are missing or incorrect where required. C- 72 The answers for most of the steps are either missing or incorrect. Likewise, the methodologies used for most of the steps are either inapplicable to the given problem, or are implemented incorrectly. Some answer justifications are missing or incorrect where required. D 67 The answers for almost all of the steps are either missing or incorrect. Likewise, the methodologies used for almost all of the steps are either inapplicable to the given problem, or are implemented incorrectly. Some answer justifications are missing or incorrect where required. F 0 The answers for virtually all of the steps are either missing or incorrect. Likewise, the methodologies used for virtually all of the steps are either inapplicable to the given problem, or are implemented incorrectly. Some or all answer justifications are missing or incorrect where required. Page 6 of 6 Use the Ask the Facilitators Discussion Board if you have any questions regarding how to approach this lab. Save your assignment as lastnameFirstname_lab3.doc and submit it in the Assignments section of the course. For help uploading files please refer to the Technical Support page in the syllabus.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help