Half sales office and half business office users

Assignment Help Basic Computer Science
Reference no: EM13971993

Create a 1-page network diagram showing the components and devices needed to build a simple office network based on the following scenario:

  • 50 employees, half Sales office and half Business office users
  • 2 subnets - Separate LANs within the office 30 hosts per subnet (25 employees, 1 printer and 2 servers, and 2 more available addresses.
  • 2 network printers, one per subnet
  • 1 connection to the WAN/Internet
  • One core router with 2 Ethernet interfaces (one for each existing subnet) and one Serial for WAN
  • Each subnet using one switch for all hosts
  • Plan for growth for up to 6 subnets - which do not need to be in the diagram

Identify the different collision and broadcast domains on your network diagram. In your diagram, draw a green circle around each collision domain and a red circle around each broadcast domain.

Developa subnet scheme using this address: You have been assigned an IP address and subnet mask: 192.168.111.0 /24. Plan to support two subnets, and allow for growth to as many as 6 subnets in the future.

Subnet 1 (not subnet zero) will be used to provide a range of IP addresses for the Sales office users connected to a switch. The switch will connect to an Ethernet interface on the core router. Subnet 2 will be used to provide a range of IP addresses connected to the other Ethernet interface of the core router with a switch for the Business office users. The router IP addresses on the Ethernet ports for both networks will be the last useable IP address from the respective network. The Sales and Business office each will have one printer per network. It will be assigned the first useable IP address for the respective networks.

Writea summary discussing how to determine the number of host and subnets needed for this task and how to determine the custom subnet mask. Include the following as part of the summary:

  • A table identifying for each subnet, the subnet address, subnet mask in dotted decimal, highest useable address, lowest useable address, and broadcast address
  • The IP address, subnet mask and gateway address for the printer in the Sales office and the printer in the Business office
  • Your network diagram should show the addressing scheme for the router, switches, servers, and printer interfaces and the network addresses for the two existing subnets.
  • Recommended connectivity protocols to the WAN and for future expansion using 2 additional routers within the organization.

Reference no: EM13971993

Questions Cloud

Explain clearly why they are strong or weak : Using the Company as Hewlett Packard and IT (Information Technology)as the Industry- a). describe one strong force and one weak force impacting your industry and company. Explain clearly why they are strong or weak?
Connection with the average maturity of the obligations : As one of several advisors to the U.S. Secretary of the Treasury, you have been asked to submit a memo in connection with the average maturity of the obligations of the federal government. The basic premise is that the average maturity is far too sho..
Are you able to keep pace with the work required : Reflect on the progress that you have made in regard to your capstone project and presentation. Are you able to keep pace with the work required
Under what circumstances would duration equal maturity : We have the Goncalves par bond paying a coupon rate of 8% and having a maturity of 20 years. If the coupon rate of Goncalves were to alter to 4%, what would the new duration be? What is the meaning of duration? Under what circumstances would duration..
Half sales office and half business office users : Create a 1-page network diagram showing the components and devices needed to build a simple office network based on the following scenario: 50 employees, half Sales office and half Business office users
Permanently restricted and temporarily restricted net assets : What is the traditional name for this statement? What is the purpose of this statement? What are the main sections of this statement? Discuss the difference between permanently restricted and temporarily restricted net assets.
Express the firm real revenues, real costs and real profit : Suppose the supply of capital is inelastic and given by Ks = 27. Plot thecapital supply line on the same graph as the capital demand curve. Findthe real rental rate of capital that clears the market and show it on thegraph.5. How many goods will t..
Accrual of accounting differ from cash basis of accounting : What is the purpose of this statement? Where in the financial statements would there be important explanatory information? In what financial statement would one identify the purchase of long-term investments? How does the accrual basis of accounting ..
What does the intercept mean now : Regress Conflict on coital frequency, female's age, and number of children. Using the couples dataset. a. Interpret all b's and the intercept. What does the intercept mean now

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Instructions must execute in a single clock

An implementation where every instruction executes in 1 clock cycle using a variable length clock, which for each instruction is only as long as it needs to be. (Such an approach is not terribly practical, but it will allow us to see what is being sa..

  Write a program that simulates a guessing game in a gui

Write a program that simulates a guessing game in a GUI program.

  How is data reported by exif viewer

How is data reported by EXIF Viewer

  How digital media has changed core business processes

Digital media has changed the ways ideas, information, and arguments in society are communicated both locally and globally. Individuals and organizations frequently use digital media as a means to influence individuals and organizations.

  Write a java program that produces a simple formatted report

For this lab you will write a Java program that produces a simple formatted report. The program will prompt the user to enter a file name. This file must contain information in a specific format (detailed below).

  Cons of cloud storage for both personal files

Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files.

  What is the probability that a dishonest claimant

What is the probability that a dishonest claimant is falsely verified as an authentic entity, i.e., what is the probability that the dishonest claimant responds correctly to all 11 challenges?

  Calculate the total wages for an employee

Design and create a program to calculate the total wages for an employee. An employee is paid $10 per hour for the first 40 hours. The employee is paid $15 per hour for every hour greater than 40 hours and up to 50 hours.

  Advantages and disadvantages of dbms-provided security

Describe the advantages and disadvantages of DBMS-provided security

  Human nature is the single greatest vulnerability

Human nature is the single greatest vulnerability in any control system and cannot be ignored. Organizations should always take human behavior into account when designing access plans and strategies. Human beings can pose unintentional threats when t..

  Modern machines consist of multiple levels

Explain why modern machines consist of multiple levels of virtual machines. Why not just have two levels, the digital logic level and the high-language programming level?

  Context-free languages is closed under the regular opeations

Show that the class of context-free languages is closed under the regular opeations, union, concatenation, and star.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd