Devise a feasible network addressing scheme

Assignment Help Computer Networking
Reference no: EM131199041

You will be given an IP address block 183.200.100.0/24. Your task is to devise a feasible network addressing scheme for a large company with a number of geographically distributed offices around the country. There are five locations, with the number of computers at each site 47, 9, 25, 15 and 30 respectively. The location with 47 hosts is the head office, to which every other branch has a wide area network connection through a serial link.

Your solution should cover the following major technical aspects.

- Firstly, you should show the detailed design procedure of the subnetting scheme.

- Secondly, for each subnet you need to identify and present the subnet details: network address, subnet mask, number of host and network bits, broadcast address, and range of usable addresses.

- Thirdly, you should illustrate the network interconnection topology on a diagram, including the network devices required, a number of hosts in each of the five locations, and the network address on each subnet.

Furthermore, the report should follow formal academic style as described in Appendix 1 Report Format, where additional requirements are also listed.

Appendix 1 - Report Format

- Each small group should write their own report. "Plagiarism is considered to be an act of fraudulence and an offence against University discipline. Alleged plagiarism will be investigated and dealt with appropriately by the University." Each group member should actively contribute to the work.

- The report should be handed in by Friday 22nd April 2016. Any report submitted late will be penalised under the usual rules.

- The assignment is to be submitted electronically via the Moodle TurnItIn link. You should also send an electronic copy to the module coordinator. The above submission deadline applies to both electronic copies.

- A minimum length for the report would be five (5) A4 pages of text (single line spacing, 12 point text, reasonable margins).

- The overall report should be typed and contain

1. Summary (or Abstract)
- Should show at a glance what is in the report.

2. Introduction
- What the report is about.
- Why subnetting is required, especially in the given context?
- What are the major steps in designing a subnetting scheme?

3. A well ordered series of sections relating to the three major technical aspects required for your solution.

4. Discussion and conclusion
- Can both fixed and variable length subnet mask schemes be applicable in the given scenario? Why?
- Any reflection on subnetting in this assignment and beyond. Bind the sections together in a good overview.

5. Referencing
To support your writing or to avoid plagiarism, you may need to place a list of numbered references, if any, at the end of your report. Remember to explicitly refer to all references using the Harvard system in your main text.

6. Only include your Banner numbers in the file you submit; not your actual names as marking is intended to be anonymous.

7. Each group should submit only ONE file in the upload link provided.

Reference no: EM131199041

Questions Cloud

Problem about the sustainable growth rate : If If the Hunter Corp. has an ROE of 10 and a payout ratio of 18 percent, what is its sustainable growth rate?(Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)
Calculate real gdp do affect the calculated growth rate : Your answer should demonstrate that the prices that are used to calculate real GDP do affect the calculated growth rate, but typically not by very much.
Some of the implications of trend : Accounting is becoming a global business language. Provide some evidence of this assertion. What are some of the implications of this trend?
Did the real value of welfare payments increase or decrease : Fill the blanks in the following table. Did the real value of welfare payments increase or decrease over this period?
Devise a feasible network addressing scheme : CCNA1: Introduction to Networks COMP07012 - identify and present the subnet details: network address, subnet mask, number of host and network bits, broadcast address, and range of usable addresses.
Many aspects of accounting and business : The CPA is involved in many aspects of accounting and business. Let's discuss some other tasks, other than external auditing, that the CPA performs. What are some non-traditional areas where CPAs are now involved?
How much foreign exchange gain or loss should it report : Assuming that MNC did not enter into a forward contract, how much foreign exchange gain or loss should it report on its 2013 income statement with regard to this transaction?
Draw a representative indifference curve for each mother : Draw the set of hours worked and consumption combinations that these mothers face .- Draw a representative indifference curve for each mother.
Compute the bond yield to maturity today : The bond has a $1,000 maturity value and a coupon rate equal to 7 percent, and it matures in eight years. Interest is paid annually. Compute the bond's yield to maturity today.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Since mac address is unique for each device

Since MAC address is unique for each device, why Internet does not use MAC address for routing and communications, instead, they assign an IP address to each machine? Here we do not count that MAC address is longer than IPv4 address (since IPv6 ha..

  Create spreadsheet analyzing cost-savings of replacing lan

Create a spreadsheet analyzing cost and savings of replacing the LAN with wi-fi network for organization of 450 people.

  Common network for all onboard systems

This module item is similar to the previous case study. You need to analyze and study the subject presented below and compose a report answering the questions posed.

  Available support of both the ipad and the galaxy tab

Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab

  Data gathering from rfc of udp protocol

data gathering from RFC of UDP protocol for these Quality Models

  Assignment on mirror mirror on the ceiling flexible

assignment on mirror mirror on the ceiling flexible wireless links for the data center.please answer the following

  Analyze the new system and determine the design issues

Analyze the new system and determine the design issues with this new system.

  Research and discuss on buffer-overflow attacks

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  When organizations develop risk management plans they need

when organizations develop risk management plans they need to consider the value of the assets being protected and the

  Maintaining list of bad public-key certificates

Assuming that it is possible to protect the repository from attack, what are the disadvantages of this approach?

  What is the null and alternative hypothesis

Find the chi-square statistic.

  Examine the vulnerabilities of an ftp file transfer

Examine the vulnerabilities of an FTP file transfer, perform the activity - Capture network traffic using WireShark or Ethereal

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd