A2 - Computer Networking Problems PDF
A2 - Computer Networking Problems PDF
segments.
Figure 6
File Server
Segment
192.168.0
Wireless
Access Point
Router 1
Segment
192.168.1
Segment
A B 192.168.2
Router 2 Switch
9 (b) What physical network topology is used within segment 192.168.2 to connect the
computers to the switch?
............................................................................................................................................
(1 mark)
9 (c) When the computers in segment 192.168.2 were configured on the network, they were
programmed with a subnet mask.
What is the purpose of a subnet mask, and what would the subnet mask be in this
case?
Purpose: ............................................................................................................................
............................................................................................................................................
............................................................................................................................................
(2 marks)
9 (d) Laptop computers connect to the network wirelessly using Wi-Fi. Wireless
communication is less secure than communication using cables.
Explain two measures that the Wireless Access Point could use to improve the security
of the network.
Measure 1: ..........................................................................................................................
............................................................................................................................................
............................................................................................................................................
Measure 2: .........................................................................................................................
............................................................................................................................................
............................................................................................................................................
(2 marks)
Explain how the CSMA/CD method is used, including what happens in the event of a
collision occurring.
In this question you will also be assessed on your ability to use good English and to
organise your answer clearly in complete sentences, using specialist vocabulary where
appropriate.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(6 marks)
____
14
9 (a) (i) 192.168.0.x where x is not 0 or 255; 1
9 (b) Star; 1
9 (c) Identify which other computers are on same segment // can have
packets/data sent directly to them;
Identify which other computers are on a different segment // must have
packets/data sent to them via the router;
R network for subnet
MAX 1
255.255.255.0 / FFFFFF00 / 11111111111111111111111100000000; 2
15
Computing COMP3 - AQA GCE Mark Scheme 2010 June series
Figure 5
File Server
Segment
192.168.0
Router 1
Segment
Segment
192.168.1
192.168.1
A B
Router 2
Segment
Segment
192.168.2
192.168.2
8 (b) When the computers in segment 192.168.2 were configured on the LAN, they were
programmed with a subnet mask.
..........................................................................................................................................
(1 mark)
8 (c) The LAN has a bus topology and has been divided into segments.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(2 marks)
8 (d) Alternatively, the LAN could have been constructed using a star topology.
8 (d) (i) State one advantage of using a bus topology and explain how the advantage is
achieved.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
8 (d) (ii) State one advantage of using a star topology and explain how the advantage is
achieved.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
8 (b) 255.255.255.0; 1
8 (d) (ii) Improved security as: data only travels down one link // is not sent
throughout network // is not sent to all nodes;
Improved reliability as if one link fails the other links/nodes are not
affected;
Speed of link remains constant // speed not affected by number of
connections/collisions // faster connection as: no collisions/links not
shared;
A cable for link
R responses about terminal/computer failure Max
Must have explanation as well as advantage for mark 1
10 Do not write
outside the
box
Figure 8 shows the physical topology of the Local Area Network (LAN) to which her
computer is connected. The LAN is divided up into segments. It also shows a web
server that her computer connects to through the Internet.
Figure 8
Segment
192.168.0 File
server
A B C D
Router 1
Segment 192.168.1
Segment
Router 2 Switch 192.168.2
Gateway Internet
Web server
5 (a) Suggest suitable IP addresses for:
5 (a) (iii) the network adapter card in the students computer, labelled C
............................................................................................................................................
(3 marks)
............................................................................................................................................
(1 mark)
(10)
M/Jun13/COMP3
Do not write
11 outside the
box
5 (c) When the computers in segment 192.168.1 were configured on the network, they were
programmed with a subnet mask.
............................................................................................................................................
(1 mark)
5 (d) The student has been accessing data from the file server computer that is labelled D
on Figure 8. This file server uses a server operating system.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
5 (e) Some other students using laptops are connected to the LAN by Wi-Fi through the
Wireless Access Point that is labelled E on Figure 8. Wireless communication is
less secure than communication using cables.
5 (e) (i) Describe one measure that could be implemented by the Wireless Access Point to
improve the security of the network.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
5 (e) (ii) Explain why Wi-Fi has been chosen for this connection rather than Bluetooth.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
Turn over
(11)
M/Jun13/COMP3
12 Do not write
outside the
box
Figure 8 is repeated below so that you can answer question part 5 (f) without having to
turn back in the question paper booklet.
Figure 8 (repeated)
Segment
192.168.0 File
server
A B C D
Router 1
Segment 192.168.1
Segment
Router 2 Switch 192.168.2
Gateway Internet
Web server
The student now uploads a file from her computer to a web server over the Internet.
5 (f) Write a detailed description of how one packet of data that the student is uploading
to the web server will be routed from her computer in the United Kingdom to the web
server that is located in Chicago in the United States of America. You may assume
that the web browser software on the students computer has already looked up, using
a domain name server, the IP address of the web server.
how the packet will be routed within the LAN from the students computer to the
gateway and
how, once it has reached the gateway, the packet will be routed across the Internet
to the web server that the data is being uploaded to.
In your answer you will be assessed on your ability to use good English, and to
organise your answer clearly in complete sentences, using specialist vocabulary where
appropriate. (8 marks)
(12)
M/Jun13/COMP3
Do not write
13 outside the
box
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
Turn over
(13)
M/Jun13/COMP3
14 Do not write
outside the
box
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
Difference 1: ......................................................................................................................
............................................................................................................................................
Difference 2: ......................................................................................................................
............................................................................................................................................
(2 marks)
____
18
(14)
M/Jun13/COMP3
5 (a) (i) 192.168.0.x where x is not 0 or 255; 1
Must be a specific IP address
R. addresses that include port numbers
8 of 24
MARK SCHEME A-level Computing COMP3 June 2013
9 of 24
MARK SCHEME A-level Computing COMP3 June 2013
Internal:
External:
10 of 24
MARK SCHEME A-level Computing COMP3 June 2013
11 of 24
MARK SCHEME A-level Computing COMP3 June 2013
12 of 24
MARK SCHEME A-level Computing COMP3 June 2013
Routable Non-Routable
(Globally) Many computers/devices
unique. may have same address.
Allocated by a Not allocated centrally //
central/regional allocated by a home
issuing authority user/company/ISP.
(A example).
Can be Difficult/impossible to
2
connected to connect to over Internet //
directly over the from outside of network.
Internet / from
outside private
network
Owner can be Owner cannot be looked
looked up using up using WHOIS protocol
WHOIS protocol
A. non-routable IP addresses more secure as
cannot be connected to over Internet/from
outside network
A. can identify location from a routable IP
address
13 of 24
C131901_CPT5 10/23/03 8:36 AM Page 14
Figure 6 below shows the local area network (LAN) of the supermarket chains head office.
It consists of three Ethernet bus segments with IP addresses 192.80.0, 192.80.1 and 192.80.2
connected together by routers.
IP addresses that begin with 192 are private addresses.
The head office hosts an on-line ordering service for customers on a Web server with public
IP address 213.97.56.21.
The Web server and the local area network are connected to the Internet through a router and
firewall.
The local area network is a server-based network.
There is one file server and domain controller and one print server.
192.80.1.5
Segment File server
192.80.0 192.80.1.2 192.80.1.3 192.80.1.4 & Domain
controller
Segment
192.80.0.1 Router 192.80.1.1 192.80.1
Print
Server
192.80.0.2 Segment
Router 192.80.2.1
192.80.2
192.80.2.2 192.80.2.3 192.80.2.4 192.80.2.5
Web server
213.97.56.21
Router
192.80.0.3 213.97.56.19 Internet
&
Firewall
Figure 6
M/0104/CPT5
C131901_CPT5 10/23/03 8:36 AM Page 15
LEAVE
15 MARGIN
BLANK
(d) Draw a diagram to show how segment 192.80.1 would be wired using a switch..
(2 marks)
(e) Why must the router-firewall and the Web server have public IP addresses?
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(f) The computer with IP address 192.80.1.3 uses the TCP/IP protocol to send a document
to be printed to the print server. Describe how the TCP/IP protocol is used to route the
document to its destination. Your description should cover the role of the two routers
and network card addresses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(5 marks)
C131901_CPT5 10/23/03 8:36 AM Page 16
LEAVE
16 MARGIN
BLANK
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(h) The local area network is a server-based network. What is meant by a server-based
network?
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(2 marks)
15
END OF QUESTIONS
Switch
(e) So that these are reachable from anywhere on the Internet//so that
can be seen/reached from the world outside;
R. So can be reached by another branch of supermarket 1
(f) Document split into smaller chunks; A. segments/packets/frames
Destination IP address doesnt match this segments IP address;
Document chunks sent to nearest router;
Using its network card address/MAC address;
Router sends chunks to router connected to print server segment;
Using its routing tables and;
This router's network card address;
This router sends chunks to print server;
to max 5
(g) To block access to/from the internal private network from/to the Internet;
To stop certain kinds of access to the Web server, e.g. telnet;
To close ports to prevent users from connecting to them;
To block connections on unwanted ports;
To prevent unauthorised access to the private computers;
A. Filtering
to max 1
Total 15
Grand Total 65
C156474_CPT5_Jan_2008 5/10/07 09:24 Page 10
LEAVE
10 MARGIN
BLANK
6 The head office of an organisation consists of several large offices, each with many
computers linked as a local area network (LAN). The LAN also links to the Internet via a
router and firewall. In each office, the computers are linked as a segment as shown in
Figure 4.
Figure 4
Router
& Internet
(ii) Firewall (i)
Router
(iii) 172.31.15.3 172.31.15.4 Segment 172.31.15
Router
172.31.19.4 Segment 172.31.19
..................
Segment 172.31.1
Router
172.31.45.4 Segment 172.31.45
(a) IP addresses that begin with 172.31 are non-routable addresses. Why are these used
within the LAN?
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
(b) The network manager has registered IP address 212.99.34.23 with the Internet registrar.
(i) ....................................................................................................................................
(ii) ....................................................................................................................................
(iii) ....................................................................................................................................
(3 marks)
(10)
M/Jan08/CPT5
C156474_CPT5_Jan_2008 5/10/07 09:24 Page 11
LEAVE
11 MARGIN
BLANK
1 ...........................................................................................................................................
.............................................................................................................................................
2 ...........................................................................................................................................
.............................................................................................................................................
(2 marks)
(d) (i) What would be a suitable subnet mask for this LAN?
....................................................................................................................................
(1 mark)
(ii) Using addresses 172.31.15.3 and 172.31.19.5 explain how a subnet mask is used
to determine whether the computers are on the same subnet.
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
(3 marks)
10
(11)
M/Jan08/CPT5
6 (a) because machines do not need a direct presence on the Internet; 1
more secure; A private addresses;
R machines dont need access to the Internet
devices outside of the LAN cannot access them / route to them;
6 (b) (iii) 172.31.1.x; where x can be any number between 2 and 254 1
6 (c) too much traffic if single network causing too many collisions
6 (d) (i) 255.255.255.0 // 1111 1111 1111 1111 1111 1111 0000 0000 ; 1
6 (d) (ii) 172.31.15.3 = 1010 1100 0001 1111 0000 1111 0000 0011 3 The binary
numbers are
172.31.19.5 = 1010 1100 0001 1111 0001 0011 0000 0101 provided so
you can
255.255.255.0 = 1111 1111 1111 1111 1111 1111 0000 0000 check the
answers
AND operation of subnet mask with each IP address; to isolate when a
subnet IDs/network address; (or by example) candidate
uses them to
subnet IDs compared; if same, then on same subnet; explain.
if matches NE They are not
worth marks
by
themselves.
8
C150995_CPT5 6/12/06 13:35 Page 10
LEAVE
10 MARGIN
BLANK
6 A school Local Area Network (LAN) uses the TCP/IP protocol to communicate between
computers.
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
Application Layer
(i)
(1 mark)
(ii)
(1 mark)
(iii) Give one example of a type of application found in the Application Layer.
....................................................................................................................................
(1 mark)
(c) This LAN uses the Ethernet protocol as its Data Link Layer, which uses Ethernet MAC
(Media Access Control) addressing to route Ethernet frames. What is an Ethernet
MAC address?
.............................................................................................................................................
(1 mark)
(d) The school now wants to connect to the Internet. Every computer in the LAN is given
an IP address with a network ID of 192.168.4 and a subnet mask of 255.255.255.0.
....................................................................................................................................
(1 mark)
....................................................................................................................................
(1 mark)
M/Jan07/CPT5
C150995_CPT5 6/12/06 13:35 Page 11
LEAVE
11 MARGIN
BLANK
....................................................................................................................................
....................................................................................................................................
(1 mark)
(iv) IP addresses starting with 192.168 are private addresses. Why were private
addresses chosen for the individual computers on the network?
....................................................................................................................................
....................................................................................................................................
(1 mark)
(e) The school registers the IP address 222.125.105.15 with the Internet registrar. How can
this IP address be used to connect to the Internet?
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(2 marks)
11
(iii) telnet;
http (client) // web server // IRC Client Server;
email; internet/web browser;
FTP; snmp;
TFTP; A instant messaging / VoIP;
SMTP; https; max 1 3
(iii) change the subnet mask // get another network ID // get class A or B
network ID;
split the network into subnets; R segments max 1
Total 4
10
C144685_CPT5.qxd 16/8/05 11:32 am Page 8
LEAVE
8 MARGIN
BLANK
6 A small organisation, Acme Consultants, with four stand-alone computers in an office, want
to set up a peer-to-peer network in order to share the printer connected to one of the
computers.
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
(b) If an Ethernet switch is used to set up the network, draw a labelled diagram of the
physical layout of the network.
(2 marks)
(c) It is decided to set the IP addresses for each computer manually and use a subnet mask
of 255.255.255.0.
....................................................................................................................................
(1 mark)
....................................................................................................................................
(1 mark)
....................................................................................................................................
(1 mark)
M/Jan06/CPT5
C144685_CPT5.qxd 16/8/05 11:32 am Page 9
LEAVE
9 MARGIN
BLANK
(d) Acme Consultants now want to connect their network to the Internet using an ADSL
line. A router is used to connect the network switch to the ADSL modem.
....................................................................................................................................
....................................................................................................................................
(1 mark)
(ii) The IP addresses 192.168.5.1 and 222.125.105.15 are assigned to the router.
Which of the IP addresses needs to be registered with the Internet registrar and why?
IP address: ...................................................................................................................
Reason...........................................................................................................................
......................................................................................................................................
(2 marks)
Figure 4
General
You can get IP settings assigned automatically if your network supports
this capability. Otherwise, you need to ask your network administrator for
the appropriate IP settings.
(iii) Figure 4 above shows part of the TCP/IP configuration window displayed on the
monitor of computer A. What IP address should be entered for the Default
gateway?
......................................................................................................................................
(1 mark)
10
b)
Computer/PC Computer/PC
T.O. if a server included in diagram
I boxes
Switch I routers / modems
1 mark for switch with 4 computers/PCs connected; 1 mark for printer connected to computer; 2
(since 0 means all addresses on subnet, and 255 is reserved as broadcast address) 1
d) i) a router is a device that receives datagrams/packets from one computer and uses the IP
addresses that they contain to pass on these packets, correctly formatted, to another computer;
a router is a device that uses IP addresses to route packets/datagrams;
Reason: router needs to have a presence on Internet so that it can be reached from anywhere;
Public address must be unique over whole Internet // must be visible on Internet // provides
iii) 192.168.5.1
1 Total 10
7
C138312_CPT5 15/9/04 8:26 am Page 14
LEAVE
14 MARGIN
BLANK
10 Figure 4 shows the TCP/IP protocol stack applied to a LAN (Local Area Network).
Application
FTP protocol
FTP FTP
client server
Transport
TCP protocol
TCP TCP
Network
IP protocol
IP IP
Link
Ethernet protocol
Ethernet Ethernet
driver driver
Ethernet cable
Figure 4
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
...........................................................................................................................................
(1 mark)
(c) State a suitable type of network cable for the physical connections of this LAN.
...........................................................................................................................................
(1 mark)
M/0105/CPT5
C138312_CPT5 15/9/04 8:26 am Page 15
LEAVE
15 MARGIN
BLANK
(d) Give two examples of an IP address that could belong to the same LAN.
1 ........................................................................................................................................
2 ........................................................................................................................................
(2 marks)
..................................................................................................................................
(1 mark)
..................................................................................................................................
(1 mark)
(f) The Ethernet protocol layer uses Ethernet MAC (Media Access Control) addressing to
route Ethernet frames. What is an Ethernet MAC address?
...........................................................................................................................................
(1 mark)
1 ........................................................................................................................................
1 ........................................................................................................................................
2 ........................................................................................................................................
1 ........................................................................................................................................
(2 marks)
(h) Give one example of another type of application found in the Application layer.
...........................................................................................................................................
(1 mark)
(i) If two local area networks are connected through the Internet each must have a
registered public IP address.
Name the type of organisation responsible for recording the allocation of public IP
addresses.
...........................................................................................................................................
(1 mark)
12
END OF QUESTIONS
M/0105/CPT5
Mark Scheme GCE - Computing
(d) Need first octet or first and second octet or first, second and third octet to be
identical. Also must have four octets.
For example:
R without full stops
192.168.0.1
192.168.0.2
One mark for four octets;
One mark for same LAN; 2
(i) 192.168.0; 1
(ii) 1 or 2; 1
Telnet;
Internet browser;
http (client) // web server;
email;
FTP;
TFTP;
SMTP;
R Non-networked applications such as word processor 1
Total 12
141785_CPT5 12/13/04 11:39 AM Page 14
LEAVE
14 MARGIN
BLANK
Figure 4
M/0205/CPT5
141785_CPT5 12/13/04 12:46 PM Page 15
LEAVE
15 MARGIN
BLANK
(b) Draw a diagram to show how segment 192.80.2.x would be wired using a hub.
(2 marks)
(c) Why must the router-firewall and the Web server have public IP addresses?
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(d) The computer with IP address 192.80.2.4 uses the TCP/IP protocol to send a web page
to the Web server. Describe how the TCP/IP protocol is used to route the web page to
the Web server. Your description should cover the role of the two routers and network
card addresses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(5 marks)
141785_CPT5 12/13/04 11:39 AM Page 16
LEAVE
16 MARGIN
BLANK
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(f) The local area network is a server-based network. What is a server-based network?
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(2 marks)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
15
END OF QUESTIONS
M/0105/CPT5
(b) One mark for central hub and one mark for computers connected to hub as shown
NB If hub incorrect answer scores zero
If hub correct but computers incorrect answer scores one mark Don't have to label
Router can be replaced by a computer labelled with router's computers with
IP address their IP addresses.
A. IP addresses in
place of computers
Router
+ router
Switch
Don't have to label
server if drawn as
shown
(c) So that these are reachable from anywhere on the Internet//so that can be seen/reached
from the world outside;
A. So that they can be uniquely identified.
R. So can be reached by another branch of company 1
13
(d) Document(Web page) split into smaller chunks; A. segments/packets/frames
Destination IP address doesnt match this segments IP address so document chunks
sent to nearest router/default router/gateway;
Using nearest router's network card address/MAC address;
Router sends chunks to router connected to web server segment using its routing tables;
And using network card address of router connected to web server;
This router sends chunks to Web Server;
Web server rebuilds document;
End to end connection established//port/socket connections made; max 5
(e) To block access to/from the internal private network from/to the Internet/world outside;
To stop/limit/block/restrict certain kinds of access to the Web server, e.g. telnet;
To close ports to prevent users from connecting to them;
To block connections on unwanted ports;
To prevent unauthorised access to the private computers;
A. Filtering
R To stop hackers (must state more than this = one of the above answers)
max 1
(f) A network in which resource security/user authentication/ administration/resource
allocation;
managed/controlled by/carried out by servers;
OR
A network in which servers provide specialist services (A. specific servers e.g. web
servers) ;
for client computers;
OR
Shared information stored on servers;
rather than individual PCs/client computers; 2
(g) A database server is software/computer that processes SQL requests from client
computers returning results to the clients across a network or using network protocols
Database (the data resides on the same machine as the database server);
server Client requests data from server, server responds with data (require request, data and
listens on response); max 1
a
particular
port for Total 15
client
requests.
TCP/IP
protocol
used.
14
C160020_CPT5_June_2008 24/8/07 15:49 Page 8
8 Areas outside
the box will
not be scanned
for marking
8 The diagram shows a Local Area Network consisting of two subnets. A, F and G are desktop
PCs.
Subnet L Subnet R
D
B E
C
F G
8 (a) (i) Name the networking devices labelled C and E.
C ................................................................................................................................
E ................................................................................................................................
(2 marks)
8 (a) (ii) If the network ID of subnet L is 192.168.7 and the network ID of subnet R is
192.168.8, what are the IP addresses at ports B and D?
B ................................................................................................................................
D ................................................................................................................................
(1 mark)
8 (a) (iii) What would be a suitable subnet mask for this network?
....................................................................................................................................
(1 mark)
....................................................................................................................................
(1 mark)
8 (b) (i) How many different host IDs does subnet L support?
....................................................................................................................................
(1 mark)
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
(2 marks)
END OF QUESTIONS
8
Copyright 2008 AQA and its licensors. All rights reserved.
(08)
M/Jun08/CPT5
8 a (i) C Router; A Brouter; A Gateway;
E Switch/hub ; 2
8 a (ii) B 192.168.7.1
D 192.168.8.1 1 mark
(not 0 or 255) 1
8 b (i) 1
8 b (ii) 2
(i) (ii)
253; Because only the final byte is available for hosts;*
But 0, 1 and 255 are reserved;
254; Because only the final byte is available for hosts;*
But 0 and 255 are reserved
// 1 and 255 are reserved
// 0 and 1 are reserved;
255; Because only the final byte is available for hosts;*
But 0/ 1 / 255 is reserved;
256; Because only the final byte is available for hosts;
*Because only the final byte is available for hosts is equivalent to there are 256 possible
combinations