Zijian Tang Lab4 Submission

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

MET CS CS625 Business Data Communications and Networks

Lab 4 Submission

This submission template is a convenient document for you to provide your


work and your answers for Lab 4. This submission template is intended to
be used in conjunction with the Lab 4 Instructions document. The
instructions document illustrates how to correctly derive the answers,
explains important theoretical and practical details, and contains the
complete set of instructions for this lab.

Name: Zijian Tang

Date: April 11, 2022

Page 1 of 6
Copyright 2014-2015 Boston University. All Rights Reserved.
Section One – Variable Length Subnet Masks

1. Explanation regarding fixed lengths subnet masks.

Subnet mask with fixed length means that the subnet mask has a permanent length, so
that the address blocks are spilite into various subnets which owns addresses of the
same number and has the same size and number of hosts.

In such a subnet mask, hosts can't have different counts. So, if in a fixed-length mask,
there are not enough hosts to fill the capacity of the subnet, and since the capacity is
fixed, the number of hosts will be less than the capacity. This will cause the remaining
capacity of IP addresses to be unused.

2. Calculations and results for the given scenarios. Make sure to show your work, but
you do not need to draw a diagram unless it assists you in answering the question.

Scenario A: Subnet 66.114.124.0/22 is used to support 217 hosts.


22 bits for network identifier—10 bits for host identifier
2^10=1024 total addresses. 1024-2=1022 can be assignable addresses.
1022-217=805 unused addresses.

Scenario B: Subnet 54.88.181.128/25 is used to support 119 hosts.


25 bits for network identifier—32-25=7 bits for host identifier
2^7=128 total addresses. 128-2=126 can be assignable addresses
127-119=8 unused addresses

Scenario C: Subnet 50.63.202.48/28 is used to support 1 host.


28 bits for network identifier—32-28=4 bits for host identifier
2^4=16 total addresses. 16-2=14 can be assignable addresses
14-1=13 unused addresses

4. Explanation regarding re-allocation of subnets.


Firstly, the re-allocation of subnets won’t necessarily solve the wasted addresses issues.
Also, the re-allocation will also require changes on to existing routers, DHCP servers,
switches, firewalls, and other network devices and controls.

6. Calculations and results for the given scenarios. Make sure to show your work.

Scenario A The organization is assigned the network described by CIDR entry


172.226.0.0/16. The organization needs two subnets, the first to support 45 hosts, and
the second to support 27 hosts. The organization allocates the first subnet as
172.226.0.0/26.

Page 2 of 6
a.
172.226.1.0/26
Network Identifier: 10101100 11100010 00000001 00
b.
27 hosts—5 bits for the host identifier
172.226.1.0/27
Network Identifier: 10101100 11100010 00000001 000
c.
For fixed length:
172.226.1.0/26
32-26=6 bits for host identifier
2^6=64 total addresses. 64-2=62 can be assignable addresses
62-27=35 unused addresses
For VLSM:
172.226.1.0/27
32-27=5 bits for host identifier
2^5=32 total addresses. 32-2=30 assignable addresses
30-27=3 unused addresses

Scenario B The organization is assigned the network described by CIDR entry


64.91.224.0/22. The organization needs two subnets, the first to support 390 hosts, and
the second to support 75 hosts. The organization allocates the first subnet as
64.91.224.0/23.

a.
64.91.225.0/23
Network Identifier: 01000000 01011011 1110000

b.
75 hosts—2^7=128 to cover. 32-7=25
64.91.224.0/25
Network Identifier: 01000000 01011011 11100000 0
c.
For fixed length:
64.91.225.0/23
32-23=9 bits for host identifier
2^9=512 total addresses. 512-2=510 can be assignable addresses
510-75=435 unused addresses
For VLSM:
64.91.224.0/25
32-25=7 bits for host identifier
2^7=128 total addresses. 128-2=126 assignable addresses
126-75=51 unused addresses

Page 3 of 6
Scenario C

a.
98.136.242.128/27
Network Identifier: 01100010 10001000 11110010 100
b.
18 hosts—2^5=32. 32-5=27
98.136.242.129/27
Network Identifier: 01100010 10001000 11110010 100
c.
For fixed length:
98.136.242.128/27
32-27=5 bits for host identifier
2^5=32 total addresses. 32-2=30 can be assignable addresses
30-18=12 unused addresses
For VLSM:
98.136.242.129/27
32-27=5 bits for host identifier
2^5=32 total addresses. 32-2=30 can be assignable addresses
30-18=12 unused addresses

7. Explanation of the effectiveness of using VLSMs for scenarios A, B, and C in number 6.

Scenario A
Yes, as the required hosts number is relatively close to 2^5, so VLSM can be exactly fit to
the required amount than the fixed length.

Scenario B
yes, as the bits required for host identifier save for 2 bits, thus save much more
addresses.

Scenario C
No, as the second subnet is required to be the same size as the first subnet.

9. Calculations and results of the allocations using VLSMs. Make sure to show your work.

a.
for first
b.
Subnet mask for First Identifier
11111111 11111111 11111110 00000000
255.255.254.0

Subnet Mask for Second Identifier

Page 4 of 6
11111111 11111111 11111111 10000000
255.255.255.128
c.
1st subnet: 2^9-2=510 hosts
2nd subnet: 2^7-2=126 hosts

d.
for first subnet

11101101 01110110 00000000 00000000/23


237.118.0.0/23

for second subnet

11101101 01110110 00000010 00000000/25


237.118.2.0/25

e.
on First subnet

11101101 01110110 00000001 11111111


237.118.1.255

for Second Subnet

11101101 01110110 00000010 01111111


237.118.2.127
f.
For Subnet 1

237.118.0.1 to 237.118.1.254

For Subnet 2

237.118.2.1- 237.118.2.126

Page 5 of 6
Your lab submission will be evaluated according to the following rubric.

Letter Qualities Demonstrated by the Lab Submission Grade


Grade Assigned
The answers, and answer justifications where required, are entirely complete and correct for all
A+  steps. The methodologies used to derive the answers are entirely applicable to the given
100 problems, and are implemented correctly, for all steps. There are absolutely no technical or other
errors present.
One insignificant technical or other error is present, but otherwise the answers, and answer
justifications where required, are entirely complete and correct for all steps. Excluding the
A  96
insignificant error, the methodologies used to derive the answers are entirely applicable to the
given problems, and are implemented correctly, for all steps.
One or two technical or other errors are present, but otherwise the answers, and answer
justifications where required, are entirely complete and correct for all steps. Excluding the one or
A-  92
two errors, the methodologies used to derive the answers are entirely applicable to the given
problems, and are implemented correctly, for all steps.
The answers, and answer justifications where required, are complete and correct for most steps.
B+  88 Likewise, the methodologies used to derive the answers are applicable to the given problems, and
Answers and are implemented correctly, for most steps.
Methodology The answers are correct or almost correct for most steps. Some answer justifications may be
Measures the B  85 missing or incorrect, but most are present and correct where required. The methodologies used to
correctness and derive the answers are applicable and implemented correctly for most steps.
completeness of The answers, and answer justifications where required, are complete and correct for about ¾ of
the answers and B-  82 the steps. Likewise, the methodologies used to derive the answers are applicable to the given
methodology problems, and are implemented correctly, for about ¾ of the steps.
used for lab The answers are correct or almost correct for about ¾ of the steps. Some answer justifications
steps C+  78 may be missing or incorrect. The methodologies used to derive the answers are applicable to the
given problems, and are implemented correctly, for about ¾ of the steps.
The answers for about half of the steps are either missing or incorrect. Likewise, the
C  75 methodologies used for about half of the steps are either inapplicable to the given problem, or are
implemented incorrectly. Some answer justifications are missing or incorrect where required.
The answers for most of the steps are either missing or incorrect. Likewise, the methodologies
C-  72 used for most of the steps are either inapplicable to the given problem, or are implemented
incorrectly. Some answer justifications are missing or incorrect where required.
The answers for almost all of the steps are either missing or incorrect. Likewise, the
D  67 methodologies used for almost all of the steps are either inapplicable to the given problem, or are
implemented incorrectly. Some answer justifications are missing or incorrect where required.
The answers for virtually all of the steps are either missing or incorrect. Likewise, the
methodologies used for virtually all of the steps are either inapplicable to the given problem, or
F0
are implemented incorrectly. Some or all answer justifications are missing or incorrect where
required.

Use the Ask the Facilitators Discussion Board if you have any questions
regarding how to approach this lab.

Save your assignment as lastnameFirstname_lab4.doc and submit it in the


Assignments section of the course.

For help uploading files please refer to the Technical Support page in the
syllabus.

Page 6 of 6

You might also like