How to allot ip address to different subnets

Assignment Help Computer Networking
Reference no: EM1386208

Assume you are network manager for central university. Medium size university with 13,000 students. University has 10 separate colleges(like business,art,journalism),3 of which are relatively large(300 faculty and staff memebers,2000 students and 3 buildings) and 7 of which are relatively small(200 faculty and staff , 1000 stdents and 1 building). Additionally there are another 2000 staff members who work in different administration department (e.g. library,maintenance,finance)spread over another 10 buildings.There are 4 resience halls which house a total of 2000 students. Assume university has 128.100.XXX.XXX address reange on Internet. How would you allot IP address to different subnets? How would you control process by which IP address are allotted to individual computers? you will have to make some suppositions to answer both questions so make sure to stable you suppositions. "

Reference no: EM1386208

Questions Cloud

Choose a firm which became an mne with location advantages : Choose a firm which became an MNE with location advantages and depict the steps the firm took in a specific country(s) to accomplish
Explain how br increased as power increased : Breathing Rate increasesas Power raise. However, it is not expectedto increase linearly throughout the Power domain. Explain how BR increased as Power increased
Sample of southern phone company subscribers : A survey of the number of calls received by a sample of Southern Phone Company subscribers last week revealed the following information.
Differences that sun and shade leaves share : Determine some of the differences that sun and shade leaves share? What does this say about the adaptations they've made to survive intheir respective environments?
How to allot ip address to different subnets : How would you allot IP address to different subnets? How would you control process by which IP address are allotted to individual computers?
Contemporary-issue paper on same-sex marriages : Choose a contemporary issue that has generated polarized view points (environmental policy, taxation and income redistribution, benefits for same-sex couples, worker's rights, and etc.).
Analysis of holding cost and ordering cost : Analysis of holding cost, ordering cost, and set-up cost develop an inventory policy and develop a one-page or less report for Figi Fabricating
Practices embodied in philosophy : Critically discuss some of the traditional/conventional models, theories, and practices embodied in philosophy, culture, and common sense that we typically draw on and make use of (explicitly or implicitly) in creating a "realistic," objective pic..
Botany questions : In lecture we discussed plants transitioning from water to land, thus pretend you were this plant clearly identify at least theree things you need to survive on land.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Find features and capacities for web server computer

Find out the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will require for her site.

  Explain different strategies-transfer file between computers

In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.

  Wireless network modulation schemes essential in networking

Describe what wireless network modulation schemes are and why they are essential in wireless networking. Choose one of the modulation schemes and sum-up it.

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Determine the ip addresses of google and yahoo

Determine the IP addresses of www.google.com and www.yahoo.com. Modify hosts file to map www.google.com to yahoo's IP address and try to do google search. Remove modification to host file and repeat.

  Factors for moving wireless nics into more dominant role

Explain whether this is still true today, and write down factors are moving wireless NICs into more dominant role, if any.

  Create communication system to permit transmission

Create a communication system (block diagram) which will permit transmission of these four sources over telephone using frequency division multiplexing and TDM PCM assume using 4 bit samples.

  Computing smallest window size to optimize the throughput

Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd