How to assign ip addresses to various subnets

Assignment Help Computer Networking
Reference no: EM1359307

"Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, ?nance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet.

How would you assign the IP addresses to the various subnets?

Reference no: EM1359307

Questions Cloud

Write advantages and disadvantages does this incentive offer : Explain A publisher offers college professors one of a selection of four best selling mass market books as an incentive for filling out a ten page mail questionnaire about a new textbook and What advantages and disadvantages does this incentive of..
Diagnosis and treatment of a cannabis using client : Discuss what strategies would you use for intervention, diagnosis and treatment of a Cannabis using client?
Gains and losses on sale of assets : Which of the following statements is true? I. The entire amount of realized gains and losses from the sale of assets are recognized for tax purposes.
Which statement is true concerning magnitude of net force : Which statement is true concerning the magnitude of the net force on the plane.
How to assign ip addresses to various subnets : Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets?
Employee struggling with drug addiction : Discuss what employee assistance programs are and how they can help an employee struggling with drug addiction.
What is the size of the gravitational force : What is the size of the gravitational force that the Earth exerts on the Moon.
Question on standard deviation : Investment A has an expected return of 14 percent with a standard deviation of 4 percent, while investment B has an expected return of 20% with a standard deviation of 9 percent.
Design communication system for transmission of four sources : Design a communication system (block diagram) that will allow the transmission of these four sources over the telephone channel using FDM with SSB(single sideband) subcarriers

Reviews

Write a Review

Computer Networking Questions & Answers

  Program to accept bit string and generates unipolar encoding

Write program to accept a bit string and generates the unipolar, NRZ and Manchester encodings for the bit string. You can use any programming language/platform and generate the output in any appropriate manner.

  Explain four different types of wireless technologies

Explain four different types of wireless technologies in a 350- to 700-word paper in APA format. Describe the characteristics and properties of each signal type, and how each can be used.

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Represent the encryption of plaintext with key using des

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Prove that y' = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented).

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  Processor execute between receipt of message

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Maximum value of l-tcp sequence number are not exhausted

Consider transferring an enormous file of L bytes. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?

  Describe physical layer standard to access method

Describe its physical layer standard this access method should rely on. What types of infrastructure upgrades are necessary to implement your suggested network?

  Maturation of industry impact your business strategy

How would the maturation of the industry worldwide impact your business strategy?

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Explaining configuration of http and nntp in organization

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - Web, NNTP (Network News Transport Protocol). How do they figure into organizational security?

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd