Assignment 2.doc

7
05726302 Jameel Nelson INFO3405 Assignment #2 1. The IP address 192.168.52.0 falls into class C and the default subnet mask is 255.255.255.0 2. A block of 8 (2 3 ) is used to accommodate the 5 subnets that are to be created with 3 subnet addresses remaining unused. This is so since it is impossible to define an IP address block to accommodate exactly 5 subnets. 3. (a) The default subnet mask 255.255.255.0 converted to binary is 11111111. 11111111. 11111111.00000000 A block of 2 3 (8) is required to designate 5 subnets therefore 3 bits of the host portion are used resulting in 11111111. 11111111. 11111111.11100000 The new subnet mask is 255.255.255.224/27 (b) Logical AND operation performed on network address and subnet mask Dot-decimal Binary Form Network Address 192.168.52.0 11000000.10101000.00100100.0000 0000 Subnet Mask 255.255.255.2 24 11111111. 11111111. 11111111.11100000 Subnet ID 192.168.52.0 11000000.10101000.00100100.0000

Transcript of Assignment 2.doc

Page 1: Assignment 2.doc

05726302Jameel NelsonINFO3405 Assignment #2

1.

The IP address 192.168.52.0 falls into class C and the default subnet mask is

255.255.255.0

2.

A block of 8 (2 3) is used to accommodate the 5 subnets that are to be created with 3

subnet addresses remaining unused. This is so since it is impossible to define an IP

address block to accommodate exactly 5 subnets.

3.

(a)

The default subnet mask 255.255.255.0 converted to binary is

11111111. 11111111. 11111111.00000000

A block of 23 (8) is required to designate 5 subnets therefore 3 bits of the host portion are

used resulting in 11111111. 11111111. 11111111.11100000

The new subnet mask is 255.255.255.224/27

(b)

Logical AND operation performed on network address and subnet mask

Dot-decimal Binary Form

Network Address 192.168.52.0 11000000.10101000.00100100.00000000

Subnet Mask 255.255.255.224 11111111. 11111111. 11111111.11100000

Subnet ID 192.168.52.0 11000000.10101000.00100100.00000000

(c)

Logical OR operationDot-decimal Binary Form

Subnet Address 192.168.52.0 11000000.10101000.00100100.00000000

Inverted Subnet Mask 0.0.0.31 00000000. 00000000. 00000000.00011111

Network Broadcast Address

192.168.52.31 11000000.10101000.00100100.00011111

Page 2: Assignment 2.doc

4.(a), (b) & (c)

Subnet Addresses

Binary Form Subnet Hosts Ranges

Subnet Broadcast Address

192.168.52.0 11000000.10101000.00100100.000 /00000

192.168.52.1 to 192.168.52.30

192.168.52.31

192.168.52.32 11000000.10101000.00100100.001 /00000

192.168.52.33 to192.168.52.62

192.168.52.63

192.168.52.64 11000000.10101000.00100100.010 /00000

192.168.52.65 to192.168.52.94

192.168.52.95

192.168.52.96 11000000.10101000.00100100.011 /00000

192.168.52.97 to192.168.52.126

192.168.52.127

192.168.52.128 11000000.10101000.00100100.100 /00000

192.168.52.129 to192.168.52.158

192.168.52.159

192.168.52.160 11000000.10101000.00100100.101 /00000

192.168.52.161 to192.168.52.190

192.168.52.191

192.168.52.192 11000000.10101000.00100100.110 /00000

192.168.52.193 to192.168.52.222

192.168.52.223

192.168.52.224 11000000.10101000.00100100.111/00000

192.168.52.215 to192.168.52.244

192.168.52.245

Page 3: Assignment 2.doc

5.

Page 4: Assignment 2.doc

6

(a)

(i)

It should be determined whether there are other wireless networks or wireless devices

present within range and whether such networks or devices would interfere with the

wireless LAN. A non interfering channel for operation would have to be chosen in the

event that there are networks in operation that may cause possible interference. Also any

obstacles that would defer signal strength also need to be identified such as walls, ceiling

tiles, furniture, coated glass and people.

(ii)

Security also needs to be considered such as user authentication as well as data

encryption. Security considerations for all access points to the network need to be

considered as well. WEP should be turned on in order to provide a level of security for

the network and also changing the default WEP keys.

Page 5: Assignment 2.doc

(iii)

Determining which IEE 802.11 standard is appropriate for the wireless network. An

802.11a should be considered if there is a need to run applications such as voice or video,

and there is a small densely compacted concentration of users.

802.11b should be considered if price is a primary consideration since it costs

approximately a quarter as much an 802.11a network covering the same area.

802.11g should be considered if there is a need for backwards compatibility with 802.11b

equipment.

(b)

The firewall is used to protect unwanted intrusion to the network which includes the

server, which is in turn connected to the router. The wireless access point is connected to

the router with the use of an Ethernet cable and is used to transmit the signal from the

router to the 5 PCs. Computers A, B, C, D and E are in turn outfitted with wireless

network cards in order to communicate with the wireless access point. We assume that

the computers are within close proximity (100ft to a little over 300ft) to the access point

Page 6: Assignment 2.doc

and obstruction such as walls, ceiling tiles, and interference from other wireless devices

are at a minimum..