Solved

maximum number of host

Posted on 2006-07-22
3
508 Views
Last Modified: 2010-05-18
A network on the Internet has a subnet mask of 255.255.248.0. What is the maximum number of hosts it can handle
is it  510
0
Comment
Question by:teera
3 Comments
 
LVL 22

Assisted Solution

by:Rick Hobbs
Rick Hobbs earned 100 total points
ID: 17161813
no it is 2048.
0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 200 total points
ID: 17162121
Lets say you have the mask for a 10.0.0.0 network;

10.0.0.0 255.255.248.0

So the first subnet starts from 10.0.0.1 to 10.0.7.254

This would be a total of 2046 addresses usable.

The first => 10.0.0.0
The last => 10.0.7.255

They both cannot be used, since the first is your "network address" and last is the "Broadcast address"

So in effect, you will get 2046 ip addresses.

Cheers,
Rajesh

0
 
LVL 1

Expert Comment

by:mbavisi
ID: 17164724
255.255.248.0  is like a CIDR /21 , which is like a an allocation of 8 contigious Class Cs (/24)

I find a lot of the questions from yourself can be answered if you read a beginners quide to networking.   below are a selection ...........

07/22/2006 300 maximum number of host  PAQ Networking
07/22/2006 350 minimum number of bits  PAQ Networking
07/22/2006 350 the broadcast address of 168.40.8.0  
07/22/2006 subnet mark for 35 host and 2 network
07/22/2006 1 byte is equal to 8 bit or not

Any admins out there, you cant seriously say these are legitimate questions?
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question