Design ip addressing scheme for five departments

Assignment Help Computer Networking
Reference no: EM1354116

You are hired to design an IP addressing scheme for five departments that will provide security and access to the Internet. Each department requires between 1,500 - 2,000 IP addresses. The company will have 2,000 IP addresses accessing the Internet at any given time. Start by designing an IP addressing scheme, then, for each department, assign an IP address range and specify the subnet mask.

Departments IP address range Subnet Mask
Department A
Department B
Department C
Department D
Department E

Next, determine which NAT method you would implement for this scenario. The plan should have all of the appropriate NAT commands and the verification commands used to prove the accuracy of your configuration. Your paper should reflect the correct configuration commands and the appropriate show commands to verify your work. Write a 1-2 page paper listing the plan to present to your superior, who has a technical background, that details your plan and your timeline for implementation. Include your proposed network changes and a two-sentence outage message that will be sent by a broadcast email to the affected users, who like to complain when the network is not available. Also include other concerns about this change and other departments that should potentially be contacted before the change.

Reference no: EM1354116

Questions Cloud

Explain types of workplace environments : Organizational structure according to Mintzberg; types of workplace environments
Create a decision tree for decision analysis : Create a decision tree for decision situation explained in problem 25 and indicate the best decision
Constructive and destructive conflict : Determine the differences between constructive and destructive conflict. How do they affect networking?
How much force did the contestant exert on the ball : A spherical mirror is polished on both sides. When the convex side is used as a mirror, the magnification is +1/4. What is the magnification when the concave side is used as the mirror, the object remaining the same distance from the mirror.
Design ip addressing scheme for five departments : You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.
Promoting better health and productivity : Are workplace wellness programs effective in promoting better health and productivity among employees, including stress reduction?
Explain what is meant by organizational structure : Organizational Structure and its Components - Explain What is meant by organizational structure
Explain accounts receivable-sec site : Your company's accounts payable clerk is asked to fill in for your accounts receivable clerk. Many things look unfamiliar to her, and she needs some explanations. You start by saying, "Accounts receivable is claims from monies due to the company."..
Show components of organizational structures : Organisation structure and its impact on training - Explain what are the components of organizational structures?

Reviews

Write a Review

Computer Networking Questions & Answers

  Optimal algorithm for mutual exclusion in computer networks

In Ricart and agrawala's An optimal algorithm for mutual exclusion in computer networks paper if we are updating the code with taking the priorities.

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  Recognizing the malicious activity

What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities.

  Represent the encryption of plaintext with key using des

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Prove that y' = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented).

  Explaining reconnaissance tools

Write down some popular reconnaissance tools?

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  Create a small network for an organization

You are to create a small network (less than 50 but greater than 20 nodes) for organization of choice consisting of multiple operating systems, security mechanisms, and devices.

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Decision-making process to help the company grow

How would you utilize this information in the decision-making process to help the company grow?

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd