How arrangement of subnet masks to make this possible

Assignment Help Computer Engineering
Reference no: EM1333883

An organization has a class C network 200.1.1 and wants to form subnets for four departments, with hosts as follows:

A 72 hosts
B 35 hosts
C 20 hosts
D 18 hosts

There are 145 hosts in all.

a) Give a possible arrangement of subnet masks to make this possible.

b) Suggest what the company might do if department D grows to 34 hosts.

Reference no: EM1333883

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Make a menu bar with a file menu

make a menu bar with a File menu that includes a Perform Action command and an Exit command. The Perform Action command computes either the sum or average of the rows or columns in the array and displays the result in a message box. The Exit comma..

  Implementing an intrusion detection system

Your company is trying to decide whether to implement an intrusion detection system (IDS), or an intrusion prevention system (IPS).

  What sorts of measures would you recommend

What sorts of measures would you recommend for minimizing changes to project schedules caused by non-availability of required human resources, or conflicts with the personal plans of project workers (e.g. vacations).

  Reconfigur the network for your company

You could like to automate entry and updating of the routing information, however you are concerned regarding the excessive memory and the processor utilization in case you implement the dynamic routing protocols.

  Verilog system

Develop a verilog system which utilizes a block code for the error management. The system must accept a 15-word block of 8-bit data words one word at a time.

  Determining the priority of period of execution of irqj

Determining the priority of period of execution of IRQJ

  Developing the flowchart as per the algorithm

Design an algorithm to prepare a job applicant report. Input contains of a series of records which consists of the Social Security number or equivalent, last name, first name, middle initial, verbal test score, science test score, math test score,..

  Benefit of ethical hacking

Describe what you consider is the main benefit of the ethical hacking be sure to involve what is the role of an ethical hacker.

  Create program that displays a student id number

Write a program that shows a student ID number and asks the user to enter a numeric test score for the student. Create a ScoreException class.

  Explain the number of nodes and workstation types

The office has four separate rooms, each one with its own set up of dental equipment and 1 X-ray room.

  Using the models in system design

In the System Analysis and Design: Models are used extensively in the wide variety of the technical occupations beyond the information technology.

  Are there any other examples of famous projects

Are LANs a stable technology or are they changing just as fastly as other forms of communication technologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd