Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
How many bytes are used to represent the Node ID in a class A network
+1
vote
250
views
asked
Nov 22, 2021
in
Computer Networks
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Nov 22, 2021
by
(user.guest)
selected
Feb 3
by
(user.guest)
Best answer
The Node ID in a class A network is represented by 3 bytes. An IP is made up of 32 Bit, that is 4 octets, making a total of 32bits. One out of the 4 octet is allocated for the network ID leaving the other 3 for host ID.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
6.0k
views
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer. Can the data be encapsulated in one frame? If not, how many frames need to be sent? What is the size of the data in each frame?
asked
Sep 24, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
69
views
How many 64 x 8 RAM chips are needed to provide a memory capacity of 2048 bytes?
asked
May 3
in
Computer Architecture
by
(user.guest)
+1
vote
1
answer
581
views
In one case a byte is defined as a sequence of 8 bits. Each bit can be either zero or one. How many different bytes are possible?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
3.8k
views
An Ethernet MAC sublayer receives 42 bytes of data from the LLC sublayer. How many bytes of padding must be added to the data?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.6k
views
How many hexadecimal digits are needed to define the netid in each of the following classes?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
2.1k
views
Suppose that N switches supporting K VLAN groups are to be connected via a trunking protocol. How many ports are needed to connect the switches? Justify your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
8.3k
views
Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
225
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
192
views
What are the service premitives? Write some of the primitives used in a computer network?
asked
Sep 1, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
140
views
A new version of the TCP header that accommodates a round-trip time of 200ms, a network bandwidth of 100Mbps, a maximum segment lifetime of 150 sec, How many bits will you need for the advertised window field and for the sequence number field?
asked
Apr 20
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
1.4k
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
867
views
If a label in a connection-oriented service is n bits, how many virtual circuits can be established at the same time?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
976
views
Give an example showing why a network operator might want one class of packets to be given priority over another class of packets.
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
286
views
Explain The Fundamentals of Frequency and Time division multiplexing (FDM and TDM), and give an example of where FDM and TDM would be used in a multimedia network
asked
Nov 21, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
271
views
Briefly discuss the history and future of multimedia. How might multimedia be used to improve the lives of its users? How might it influence users in negative ways? What might be its shortcomings?
asked
Oct 4, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
200
views
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
asked
Apr 13
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
22.5k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
120
views
How interface is similar to a class in Java ?
asked
Sep 1, 2021
in
Programming Languages & Algorithms
by
anonymous
+1
vote
0
answers
423
views
Compare and contrast three (3) performance assessment methods that could be used in evaluating the performance of computers. In each case demonstrate how it could be used to evaluate the performance of a set of computers.
asked
Jul 28, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
115
views
In relation to network bridges what layers of the OSI model are considered media layers
asked
Feb 28
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
209
views
In TCP Header format if a device wants to send 8 bytes of data. Is it valid or not? Explain why
asked
Oct 1, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
198
views
How many bits are in a byte?
asked
Sep 17, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.6k
views
What are the differences between a master device in a Bluetooth network and a base station in an 802.11 network?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
10.0k
views
Consider the circuit-switched network in Figure 1.13. Recall that there are 4 circuits on each link. Label the four switches A, B, C and D, going in the clockwise direction.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
394
views
What actions do the base station take to ensure that the loss probability of a transmitted frame does not increase when a mobile node gets farther away from a base station
asked
Dec 26, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.1k
views
What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.3k
views
Which address class(es) will allow you to have more than 1000 hosts per network?
asked
May 10, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
795
views
Which address class(es) will allow you to have more than 1000 hosts per network
asked
May 10, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
504
views
Which address class(es) will allow you to have more than 1000 hosts per network?
asked
Mar 22, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
3.0k
views
Using Dijkstra’s algorithm finds the shortest path of following network by taking C as the source node. Determine the least cost paths also.
asked
Apr 25, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
716
views
How many addressing modes are there in the Intel 8085 CPU ? Describe them.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
+1
vote
0
answers
641
views
Why the traditional IP cannot be used in the mobile network. In what way does mobile IP support mobile Hubs?
asked
Apr 28, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
667
views
What are the four types of transmission media are commonly used for local area network?
asked
Sep 6, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
427
views
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
Dec 18, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
372
views
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
359
views
Perform the subnetting on the below IP Address and find out the number of networks, network of, first host, last host, and broadcast id of each network.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
690
views
find out the number of networks, network of, first host, last host, and broadcast id of each network of this IP Address:192.168.10.0/28
asked
Dec 10, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
474
views
Duplicate: Determine the Network ID, First Valid Host, Last Valid Host, and Broadcast ID of the following network address/mask pairs:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
5.2k
views
Determine the Network ID, First Valid Host, Last Valid Host, and Broadcast ID of the following network address/mask pairs:
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
411
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.3k
views
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not have a link?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.8k
views
Assume a destination computer receives several packets from a source. How can it be sure that the fragments belonging to a datagram are not mixed from the fragments belonging to another datagram.
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...