Design ip network based on requirements for company

Assignment Help Computer Networking
Reference no: EM1363984

XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Design the IP network based on the requirements stated above and answer the following:

1) Total number of network bits
2) Total number of host bits
3) Subnet mask of the network
4) Total number of useable subnets
5) Total number of useable host IP in each subnet

Let's say, you are the administrator of subnet # X. Now find the followings of your assigned subnet.

a) Subnet address of your assigned (Ex: subnet - 17) network.
b) Broadcast address of your assigned network
c) IP address of the 634th host.

Reference no: EM1363984

Questions Cloud

Weaknesses and growth opportunities : Explain what can you conclude about this organization's strengths, weaknesses and opportunities for growth
What is the charge density on the surface : What is the charge density on the surface. suppose that air resistance can be neglected.
Using t accounts to record transactions : Use T accounts to record transactions involving assets, liabilites and owners equity for the following:
Health effects of smoking cigarettes : Compare and contrast the health effects of smoking cigarettes, cigars, and smokeless tobacco. Also discuss why they are not all the same in terms of health risks.
Design ip network based on requirements for company : XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Design the IP network based on the requirements stated above.
Create a presentation for management : Suppose the risk-adjusted cost of capital is 12 percent, compute net present value for each proposal. Include the cash flows from salvage value and the tax benefits of depreciation
Using eeoc information to determine training needs : Retaliation and workplace bullying are among the current trends - information you find on the EEOC website as a way to determine needs for training in your organization?
Describe how consumer decision making can be influenced : Describe and Discuss how consumer decision making can be influenced in retailing
Trait theory account for individual variability : How does trait theory account for individual variability across time and across situations? Please use several different sources of information to support your response. 200-250 words.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Explaining wireless networking and wep enabled phone

In using wireless networking and WEP enabled phone, how is security important? would you trust the methods that exist today to secure these technologies?

  Types of cable connection of bank network

Even though the loading dock is nowhere near the shop floor, the dock is 1100 feet from the front office. What types of cable will work to make this connection? Choose the best medium for this project.

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Cbc-pad is block chiper mode of operation in rc block cipher

CBC-pad is a block chiper mode of operation used in RC5 block cipher, but it could be used in any block cipher. That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

  Compute maximum throughput rate-host can achieve in network

Consider a 100mbps token ring network with 10 stations having a ring latency of 50¹s. Calculate the maximum throughput rate that one host can achieve in the network.

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  Typical signal sequence in a synchronous connection

A typical signal sequence in synchronous connection contains significant amount of information in addition to just intended message or data.

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Create four subnets having same number of ip addresses

Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets?

  Brief description of rfc and its importance to internet

Choose an existing RFC and share it with the class by providing a brief description of the RFC and its importance to the Internet.

  Design lan with operation over a distance

You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics.

  Action-connected to switch refuse to communicate network

PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd