How would you divide up your network to satisfy requirements

Assignment Help Computer Network Security
Reference no: EM13192183

Question - Subnetting

Consider the following scenarios -

A) You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

B) You are a medium-sized company assigned a class B network 156.26.0.0. You have seven divisions and want to assign each of them their own subnet.

C) You are a small company, of around 100 employees, assigned a class C network. You need to provide three LANs to each of the administration, marketing, and development departments.

For each of these cases answer the following questions:

How would you divide up your network to satisfy the requirements? Up to how many hosts can there be in each subnet? Show the slash notation for the subnets and the subnet mask. Is the subnet mask the same for each subnet? For a few of the subnets, show the network address and the broadcast address for the subnet. Are these resulting subnets class C networks?

Reference no: EM13192183

Questions Cloud

Describe what happens in getting this request message : Describe what happens in getting this request message to the server and how the server gets the response message back to the client.
Define what was the mass percentage of the table salt : A 4.50-g sample is burned, and 2.70 g of CO2(g) is produced. What was the mass percentage of the table salt in the mixture?
Define two solution are mixed to the instant mixing : Two solution are mixed, Zn(NO3)2 and Na2CO3. If at the instant of mixing the [Zn(NO3)2]=3.7x10^-5M and [Na2co3]=1.5x10^-6M will a precipitate form?
Explain three tools of monetary policy-open market operation : It goes on to say that using these three tools, the Federal Reserve influences the demand for and supply of balances that depository institutions hold at the Federal Reserve Banks, and in this way, it alters the federal funds rate. The federal fun..
How would you divide up your network to satisfy requirements : You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.
Define what color is the acetic acid plus methyl orange : What color is the acetic acid plus methyl orange after addition of sodium acetate solution and what does this tell you about
Define components of the sample and solvent : involves an analyte which is physically separated from all other components of the sample and solvent?
Determine what is consumption per worker : Assume that the country possesses 50,000 units of capital and 25,000 units of labor. What is Y What is labor productivity computed from the per-worker production function Is this value the same as labor productivity computed from the original prod..
State what is the percent chloromycetin in the solution : If it took 8.54 mL of .150 M lead (ii) nitrate what is the mass of chloride in the ointment? What is the mass of Chloromycetin? What is the percent chloromycetin in the solution?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd