Determine and list the ip address ranges

Assignment Help Computer Networking
Reference no: EM13775234

IP Subnetting

Read the following scenario and answer the questions that follow:

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and will need to support 180 network connections. The Administration Building also houses the Computer Center where the college servers and network backbone are located. The sixth building is the library, which must support 80 network connections.

You have been directed not to use a flat network of 1260 IP addresses assigned from a Class B network range. Instead, he would like to use multiple subnets.

Playing the role of the network administrator, what steps would you take to accomplish this setup using subnets instead of using a flat network of 1260 IP addresses assigned from a Class B network range? Determine and list the IP address ranges and masks associated with each building and explain the process you used to obtain the IP addresses and masks showing the obtained addresses and masks.

Reference no: EM13775234

Questions Cloud

Health care administration in the 21st century : Ascertain the major ramifications of having professional staff compromise the boundaries of ethics and medical conduct.
What is the irac method of case analysis : What is the IRAC method of case analysis? How do you think the methodology, as described in this article, will help you to succeed in this course
Summarize the recent proposal that you researched : Summarize the recent proposal that you researched. Compare and contrast the pros and cons of the proposal, and recommend whether or not the proposal should be adopted.
What is their return on investment : RaiCam Company is calculating financial performance indicators The following information is provided: What is their Return on Investment? Input your number to one decimal place, for example .121 would be input as 12.1
Determine and list the ip address ranges : Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and wil..
Describe the methodological approach you would use : Imagine that you are going to do sociological research. Describe the topic. Describe the methodological approach you would use. Explain why you selected your preferred approach
What is the sales volume variance : Fuller Company builds swimming pools. Fuller budgets that they will build 13 pools during the month of April at a price of $20124 per pool. Actual pools built by Fuller during April were 16 pools at a price of $20740 per pool. What is the Sales Volum..
How might this threat change in the next five years : What is the greatest domestic terrorist threat the United States faces today? How might this threat change in the next five years
Write a research paper on eyeglass technology : Write a research paper on Eyeglass Technology.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the methods to tackle and mitigate rf multipath

Describe the methods to tackle and mitigate RF multipath that impact to WLAN throughput. Explain the purposes of POE in WLAN design.

  Write ip range and network sizes in the subject line

Please write your IP range and network sizes in the subject Line. Or at least, write them in the first lines of your posting. This way we will not have to go back to the top of the discussion thread to see if your calculations were done correctly.

  What routing protocol is suitable for retail customer

What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.

  Explain the role of a voip gateway

Explain the role of a VoIP gateway-Define the PSTN hierarchy and key components of the network

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  Example for a dynamic network

A TCL Script to show an example for a dynamic network where the routing adjusts to a link failure.

  Clock controlled access and high-bandwidth internet access

Zippy Car, a medium-sized business wants to house the company-owned web servers in a facility that offers round-the-clock controlled access and high-bandwidth internet access.

  Your friend has a small design shop with windows nt 40

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Compute devices accommodated by t-type tdm line

Determine no. of foll. devices that could be accommodated by T1-type TDM line if 1% of line capacity is reserved for synchronization purposes.

  Describe components, devices involved in each topology

Outline the three general network topologies (bus, ring, and star). Describe the components, devices, and arrangement of components and devices involved in each topology, as well as some of the pros and cons of each configuration.

  1a describe the high level steps involved for decryption

1.a describe the high level steps involved for decryption using a feistel cipher.b modify the pseudo code provided in

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd