The sales office and the printer in the business office

Assignment Help Basic Computer Science
Reference no: EM13850549

Write a 350- to 700-word paper based on your Week Three Learning Team Collaborative discussion. Discuss how to determine the number of host and subnets needed for this task and how to determine the custom subnet mask. Include the following:

  • A table identifying each subnet, the subnet address, subnet mask in dotted decimal, highest useable address, lowest useable address, and broadcast address.
  • The IP address, subnet mask, and gateway address for the printer in the Sales office and the printer in the Business office.
  • An expanded version of your network diagram from Week Two; add Layer-3 components, and indicate the IP addressing scheme in CIDR notation.

Note. Do NOT submit Visio® files. Copy and paste all diagrams into each paper in a Microsoft® Word document.

Submit your assignment using the Assignment Files tab.Learning Team Collaboration: Designing IPv4 Addressing

  • Not completed(REQUIRED)
  • Discussion

Objectives:

Discuss the following scenario:

You have been assigned an IP address and subnet mask: 192.168.111.0 /24. Develop a subnet scheme using this address that will allow you to support two subnets of up to 30 clients each, and allow for growth to as many as 6 subnets in the future.

Subnet 1 (not subnet zero) will be used to provide a range of IP addresses for the Sales office users connected to a Cisco 2960 switch. The switch will connect to FastEthernet 0/0 interface on the core router. Subnet 2 will be used to provide a range of IP addresses connected to the FastEthernet 0/1 interface of the core router for the Business office users. The router IP addresses on the Fast Ethernet ports for both networks will be the last useable IP address from the respective network. The Sales and Business office each will have one printer per network. It will be assigned the first useable IP address for the respective networks.

Reference no: EM13850549

Questions Cloud

Difference in transaction exposure and accounting exposure : What is meant by the “translation” of foreign currency financial statements? What is the cause of balance sheet exposure? What is the primary difference between transaction exposure and accounting exposure? When would the balance sheet exposure arisi..
Supply chain management chain : Particularly since 2001 the field of SCM has gotten a lot of attention, with folks saying things like "It is no longer competition between individual companies, it is competition between supply chains," yet certainly procurement has been going on ..
What is the value of the preferred stock : Stephen and Chris are also looking at issuing preferred and common stock to further expand TechU's businesses. Instead of common stock, TechU is also looking at issuing preferred stock so Stephen Jobs can retain close ownership in the company. The pr..
Members of the bpm team : Should all members of the BPM team be considered as possible mentors? Explain and justify your answer. Who within the organization would be the mentee(s) for the institutionalization of the new processes? Make sure you fully support your conclusion..
The sales office and the printer in the business office : A table identifying each subnet, the subnet address, subnet mask in dotted decimal, highest useable address, lowest useable address, and broadcast address.The IP address, subnet mask, and gateway address for the printer in the Sales office and the pr..
Individual stock or portfolio of stocks : Discuss an options strategy that you could utilize to insure the value of an individual stock or portfolio of stocks. Provide an Internet reference other than Wikipedia, Investopedia, and similar sites.
Company or the marketing situation : Reference page - include your textbook and two outside solid, dependable references, which can pertain to the company or the marketing situation.
Explain a credit default swap : Explain a credit default swap, an interest rate swap, or a currency swap. Give an example of when your choice could be used to mitigate risk. Provide an Internet reference other than Wikipedia, Investopedia, and similar sites.
Characteristics of a cylinder under cross flow conditions : Determine the heat transfer characteristics of a cylinder under cross flow conditions when the cylinder is isolated.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find and install xeyes

Find and install xeyes. Write an xeyes command to display a window that is 600 pixels wide and 400 pixels tall is located 200 pixels from the right edge of the screen and 300 pixels from the top of the screen.

  Use an open-addressed hashing table of size m

1)Suppose that we use an open-addressed hashing table of size m to store n ? m / 2 items. Assuming uniform hashing, show that for i = 1, 2, ..., n, the probability is at most 2?k that the i-th insertion requires strictly more than k probes.

  Draw a context diagram for the order system

In this Application you use a structured approach to model the data flow processes as you develop the data aspect of your design.

  Delaware department of correction starting a project

CASE:Delaware Department of Correction starting a project to train new officer to have experience working in all levels of prisons during their probation period. The following will be tracked by the Human Resources department, Cadet, contact informat..

  Under what circumstances will it fail

will the above function compile in C++? Is it correct? Under what circumstances will it fail and how should it be corrected?

  Show using a state diagram the maca protocol

Show using a state diagram the MACA Protocol

  Use of active monitoring software and ease of use

Discuss and define the use of active monitoring software and ease of use

  Textbook ordering system deployment diagram

System architects and analysts use unified modeling language (UML) deployment diagrams to model the configuration of the hardware and software components of a system and how they will be deployed in a production environment. In other words, dep..

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  Values referred to by ref-variables

Write expressions to compute the following functions of the values referred to by ref-variables x and y, which we shall assume refer to reals.

  Gantt and pert charts

Set property values to denote progress in at least fifteen (15) of the line items. Set properties so that at least one (1) of the main tasks is behind schedule.

  Consumerization of information technology

Analyze how the consumerization of Information Technology (IT) is creating challenges for both forensics departments and IT security in general. Describe some of the safeguards, both technical and administrative, that you would put in place in you..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd