Compare cert salaries and plan your next career move
kevin31 wrote: » Hi Guys, Can someone help with this the penny is just not dropping with me? What techniques do people use? thanks Kev
2^1 2 2^2 4 2^3 8 2^4 16 2^5 32 2^6 64 2^7 128 2^8 256 2^9 512 2^10 1024 2^11 2048 2^12 4096
128 /9 /17 /25 192 /10 /18 /26 224 /11 /19 /27 240 /12 /20 /28 248 /13 /21 /29 252 /14 /22 /30 254 /15 /23 255 /16 /24
meadIT wrote: » 128 /9 /17 /25 192 /10 /18 /26 224 /11 /19 /27 240 /12 /20 /28 248 /13 /21 /29 252 /14 /22 /30 254 /15 /23 255 /16 /24 A: Convert the /22 notation to decimal subnet mask using the table: 255.255.252.0. The network blocks are going to be multiples of 4 (256 - 252 = 4), so the networks will be 192.168.0.0, 192.168.4.0, 192.168.8.0. Answer is 192.168.4.0 What are the available hosts in the above subnet example? A: We know that the network address is 192.168.4.0, so the first host would be 192.168.4.1. We also know that the next network will be 192.168.8.0, so 192.168.7.255 will be our subnet's broadcast address, leaving 192.168.7.254 as the last available host. Answer is 192.168.4.1 - 192.168.7.254.
/17--/18---/19--/20--/21--/22--/23--/24 /25--/26---/27--/28--/29--/30--/31--/32 128--192--224--240--248--252--254--255 128---64---32---16----8----4----2----1
pleasehhelp wrote: » i have a few subnetting questions for you. please reply back at me.
mikej412 wrote: » This is an Internet Forum -- if you have a question that's relevant to this thread POST IT. Then the next available member who has the time and an answer will get back to you. And while we may help you with your homework -- we're not going to do it for you.
sthompson86 wrote: » Personally, I am for just focusing on Jeremeys CBT sub-netting videos and skipping the entire Subbing chapter in my Cisco ICND1 book, for the book just confuses me.
hermeszdata wrote: » Personally, I would not recommend this. What I would recommend is using additional resources in addition to what you already have. Learn the process each author "suggests" and then figure which works best for you. The process I use is actually a melding of 3 different processes. There are times where one process is more suitable than another. This is why a complete understanding of subnetting is so important. John
Compare salaries for top cybersecurity certifications. Free download for TechExams community.