Design the sub blocks and give the slash notation

Assignment Help Computer Networking
Reference no: EM131894478

Problem

1. In classless addressing, can two blocks have the same prefix length? Explain.

2. In classless addressing, we know the first address and one of the addresses in the block (not necessarily the last address). Can we find the prefix length? Explain.

3. An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to distribute these blocks to 2600 customers as follows:

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.

b. The second group has 400 small businesses; each needs approximately 16 addresses.

c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each subblock. Find out how many addresses are still available after these allocations.

Reference no: EM131894478

Questions Cloud

Regarding probability distributions : Which of the following is true regarding probability distributions? The more stocks you add to a portfolio the lower the beta.
Write a short program to use and test data types : We have used several data types in the programs in chapter. Write a short program to use and test them. Write a short program to test memory functions we used.
Discuss the cost goals to complete the project : Tony Prince is the project manager for the recreation and wellness intranet project. Team members include you, a programmer/analyst and aspiring project manager
Show how an integer is stored in four memory locations : Show how a 32-bit integer is stored in four memory locations (bytes x, x + 1, x + 2, and x + 3) using the little-endian byte order.
Design the sub blocks and give the slash notation : Design the sub blocks and give the slash notation for each subblock. Find out how many addresses are still available after these allocations.
Depreciate the machining center using macrs depreciation : ABC Company will purchase a machining center for $1,500,000. ABC will depreciate the machining center using MACRS depreciation.
Do you have any money invested in an account : Do you have any money invested in an account? If so, does it collect compound or simple interest?
How much should he invest in the risk-free security : If Nuada wants the portfolio to have an expected return equal to that of the market, how much should he invest in the risk-free security?
What is the expected return on silvanus stock : The market risk premium is 8.56 percent and the risk-free rate is 4.71 percent. What is the expected return (in percents) on Silvanus stock?

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe essential characteristics to the cloud

Describe essential characteristics to the cloud. Do some research on the topic and provide four substantive reference that supports this type of functionality.

  Does rule list any particular oddities-protocol makes unique

Does rule list any particular oddities or protocol(s) or anything which makes it unique (such as messages)? If so, list these. If not, what must be included?

  Shopping cart use similar or different protocols

Go to a prminent online electronic commerce site like Amazon.com. Choose several items for shopping cart. Go to check out.

  Explain what a mac address filter is

COIT20262 - Advanced Network Security - Explain what a MAC address filter is, and how it can be used as a security mechanism in WiFi.

  Data warehouses and network infrastructure

According to the textbook, information management is among the most critical functions of business success. Evaluate the level of impact of IT  enterprise architecture on information management (e.g., the flow of information throughout the company..

  Define organization implementing a vpn solution

From a very practical point, create a list of attributes you would expect to be present at any organization implementing a VPN solution for the first time. Then, explain the differences in attributes you would choose for a pharmaceutical company ..

  Which type of dns record identifies a mail server

Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers.

  Determine the data point that has the largest distance

Determine the data point that has the largest distance to the centre, and determine the data point that has the largest angle. Name the modulation method(s) used in this constellation pattern.

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

  Create a report exploring the stages

Create a report exploring the stages involved in a specific attack (of your choice) against a computing system.

  What is network infrastructure management

You have been tasked by your company to lead your team to plan, deploy and manage the computer / IT network for a large financial company "First Finance" who are shifting their head office to a new building. The whole project has to be completed i..

  Explaining significant obstacle to encryption

It is significant to know what issues are for encrypting data in the database. Comment on what you think is most significant obstacle to encryption. Describe your position.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd