Question - subnettingconsider the following scenarios -a

Assignment Help Computer Networking
Reference no: EM13380324

Question - Subnetting

Consider the following scenarios -

A) You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

B) You are a medium-sized company assigned a class B network 156.26.0.0. You have seven divisions and want to assign each of them their own subnet.

C) You are a small company, of around 100 employees, assigned a class C network. You need to provide three LANs to each of the administration, marketing, and development departments.

For each of these cases answer the following questions:

How would you divide up your network to satisfy the requirements? Up to how many hosts can there be in each subnet? Show the slash notation for the subnets and the subnet mask. Is the subnet mask the same for each subnet? For a few of the subnets, show the network address and the broadcast address for the subnet. Are these resulting subnets class C networks?

Reference no: EM13380324

Questions Cloud

Decision tree learninga describe the main steps in the : decision tree learninga describe the main steps in the basic decision tree learning algorithm. the table below contains
Concept learninga write an algorithm called find-g to nd a : concept learninga write an algorithm called find-g to nd a maximally-general consistent hypothesis. you can assume the
Well-posed machine learning problemsa what is required to : well-posed machine learning problemsa what is required to dene a well-posed learning problem ?b here are two potential
Message forwarding a computer in the computing department : message forwarding a computer in the computing department has just been turned on. the user starts up their web browser
Question - subnettingconsider the following scenarios -a : question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with
Bull an application on computer a in network 1 is sending a : bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp
1 list the three fundamental security properties and for : 1. list the three fundamental security properties and for each give an example of failure. justify your answer based on
You are working on a new web site for cruzes inc the web : you are working on a new web site for cruzes inc. the web site is aimed at providing travel information to consumers
The aim of this project is to design developand evaluate a : the aim of this project is to design developand evaluate a 2d game for pc. you can choose any type of game you like

Reviews

Write a Review

Computer Networking Questions & Answers

  Compute maximum throughput rate-host can achieve in network

Consider a 100mbps token ring network with 10 stations having a ring latency of 50¹s. Calculate the maximum throughput rate that one host can achieve in the network.

  Explain transit systems for both avl and tsp

Outcome of this process must then be incorporated into ITS regional architecture. Are there plans to give ems vehicles with signal priority/pre-emption?

  Find an internet address for domain name

Your browser asks your Domain Name System (DNS) name server, M, to find an Internet address for this domain name. Under what conditions is each of the following statements true of the name resolution process?

  Examine the features of the mobile handsets

Use the Web to evaluate wireless service providers that provide nationwide service as well as good service in your home area. You must evaluate at least three providers.

  What is network infrastructure management

You have been tasked by your company to lead your team to plan, deploy and manage the computer / IT network for a large financial company "First Finance" who are shifting their head office to a new building. The whole project has to be completed i..

  What resources are available on the internet

What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation? (List at least three resources in your response.)

  Phising email it is multipart what are the two parts the

phising email it is multipart what are the two parts? the html part is it inviting the recepient to click somewhere?

  How to select peer-to-peer-server-based or hybrid network

Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?

  Study carefully the following network topology it is

study carefully the following network topology. it is required that the small business smart office services pty ltd

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Explain four different kinds of wireless technologies

Explain four different kinds of wireless technologies in a 350- to 700-word paper in APA format. Explain the characteristics and properties of each signal type, and how each can be utilized.

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd