4 bits
we need to borrow 7 bits to subnet 172.16.100.0 to have at least 500 hosts and the subnet mask will be 255.255.254.0
If you need to divide it up into the maximum number of subnets containing at least 500 hosts each, you should use a /23 subnet mask. This will provide you with 128 networks of 510 hosts each. If you used a /24 mask, you would be limited to 254 hosts. Similarly, a /22 mask would be wasteful, allowing you 1022 hosts.
You would need at least 9 bits to borrow. Since 8 bits gives only 255 the additional bit will get you 256. Adding 256 + 128 gives you at least 384 subnets or hosts.
If you go with a subnet of 182.168.1.0/255.255.255.0 you can support up to 254 IP addresses. So 30 PCs would not be an issue,
N - network bitsH - host bitsIf you are following the first octet rule, this is a class B network with a subnet mask of 255.255.0.0 (N.N.H.H). We can subnet this by "borrowing" some bits from the host portion. There are 16 network bits and 16 host bits. There is a simple formula to calculate the proper subnet mask.2 to the power of what equals at least 510(2^X)? We have a total of 16 host bits to borrow from. 2^1...2^2...2^3...Etc2^9= 512 - 2 = 510 host addressesWe subtract two because the network and broadcast address are not usable addresses. As we can see we need at least 9 host bits to get 510 hosts per subnet.Take 32 and subtract it from the host bits you need. So 32-9=23. Your subnet mask now has 23 network bits instead of 16.In binary the original subnet mask would be 11111111.11111111.00000000.00000000.In binary the new subnet mask is 11111111.11111111.11111110.00000000.If you convert this into dotted decimal form you get 255.255.254.0.TLDR: 172.30.0.0 - 172.30.1.255255.255.254.0
As we are using a class B network for the Subnetting and we have to make a total of at least 130 subnetworks...so, class B default subnet mask is 255.255.0.0 or 16 bits for networkingand we have to make 130 sunets. so it will come under the block size of 256 or we need 8 bits more to make 130 subnets.so our answer is 16+8=24ie, we will use subnet mask of 255.255.255.0 for this class B address.
For a start, two computers on the same network should have the same subnet mask. If two computers that are indeed on the same network have different subnet masks, there is a design problem. Now, even if you look only at the last subnet mask - the least restrictive one - the computers are NOT on the same subnet mask. The subnet mask 255.255.0.0 indicates that the first two bytes (or the first 16 bits) of an IP address have to match, to be considered part of the same network. If you look at the IP addresses, this is not the case.
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the Internet.
First, I don't know that it's true that P2P networking doesn't exist in large IT environments. File/printer sharing and peer-to-peer applications, if the ports are opened on the local subnet, are frequently allowed, at least internally. Exposing P2P file-sharing apps outside of a corporate DMZ poses an unconscionable security hazard. But from a centralized administration perspective--the more turnover you have with users, groups, apps, and access makes centralized administration the only effective solution for maximizing user uptime and network security.
Nowadays most mobile phone networks will offer you at least 3 phone options. Some of the most familiar networks that offer 3 or more phone options are Sprint, AT&T, Virgin Mobil among others.
i dnt know
Computers have a unique IP address to identify them, just like in the real world having 2 equal addresses causes confusion.They don't have their own subnet though, they are part of a subnet which consists of at least 2 pc's. Subnets each have their own broadcast address and default gateway, as well as a limited amount of IP-addresses (determined by the subnet mask) to prevent abuse and to ease scaling.