Arrangement of subnet masks to form subnets for departments

Assignment Help Computer Networking
Reference no: EM1387860

The organization has class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

A 72 hosts
B 35 hosts
C 20 hosts
D 18 hosts

There are 145 hosts in all.

a) Write down possible arrangement of subnet masks to make this possible.

b) Recommend what company might do if department D grows to 34 hosts.

Reference no: EM1387860

Questions Cloud

Rationale for dissemination plan : Critically discuss the rationale for a dissemination plan for a research or evidence-based project. How significant is the knowledge of the research process to you in your continued practice of nursing?
Core performance measures : Critically discuss core performance measures and indicates one teaching learning strategy to better meet the need expressed by hospital personnel.
Approximate mean for the sample proportions : The instructor plans to draw a histogram of the 1,100 sample proportions. What will be the approximate mean for the 1,100 sample proportions?
Double stranded fragment of viral dna : A double-stranded fragment of viral DNA, one of whose strands is shown below, encodes two polypeptides called vir-1 and vir-2. Adding this double stranded DNA fragment to an in vitro transcription and translation system yields peptides of 10 residues
Arrangement of subnet masks to form subnets for departments : The organization has class C network 200.1.1 and wishes to form subnets for four departments. Write down possible arrangement of subnet masks to make this possible.
Random sample of records of sales : A realtor took a random sample of records of sales of homes from the files maintained by the Albuquerque Board of Realtors.
Difference between isotonic and isometric contractions : Describe the difference between isotonic and isometric contractions. What differences did you notice between the spongy and compact bone?
Healthcare legal issues : You're a new administrator at Jamestown hospital. You receive a call from nurse manager of emergency room department. Dr. Smith, an emergency room physician and an employee of your hospital.
Sandpaper replacement for which they have sole rights : nip-Snap has a high share in the new market for sandpaper replacement products. Their Razorside is a steel sandpaper replacement for which they have sole rights. They have 5% of this growing market.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Locate two disaster recovery services used by small business

Use the Web to locate two disaster recovery services that could be used by a small business such as Dirt Bikes. Compare them in terms of the services they offer.

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

  Deliver voip services also internet radio and tv

In terms of spectrum, does AT&T, Verizon, Sprint, etc...have access to amount of spectrum required to deliver VoIP services as well as Internet radio and TV?

  Determine the correct subnet mask for network

Router on one of the subnets will connect network to Internet. All computers on network will require access to the Internet. Determine the correct subnet mask for network?

  Protocol implementations to permit all nodes to communicate

Illustrate how many protocols and protocol implementations are required to permit all nodes to communicate?

  List possible ways to interconnect three computers

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  Typical signal sequence in a synchronous connection

A typical signal sequence in synchronous connection contains significant amount of information in addition to just intended message or data.

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Explain main components of good security policy

Write down the main components of good security policy? Write down some of the most common attacks, and how can the network be protected against these attacks?

  Number of rtcp bandwidth allocated to receiver

Let RTP session consisting of four users, all of which are sending and receiving packets to same multicast address. How much RTCP bandwidth will each receiver be allocated?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd