Unique network address and number of subnet

Assignment Help Computer Networking
Reference no: EM13914657

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Please reply to the Subnetting Discussion Topic under Week 3 Discussions with your selection. Don't select a network address that somebody else already selected.

For each of them, I need the following information:

· The new subnet mask after the subnetting (10%)
· The following information for the four subnets identified:
· Subnet's network address (3%)
· Subnet's broadcast address (3%)
· Subnet's range of available IP addresses (4%)
· The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

Your goal is to subnet them with as little subnet as possible but still meeting the requirement. In other word, maximize the number of hosts that is available for each subnet.

Pick one from the following:

1. 101.0.0.0/8 subnetted to 3135 subnets and provide information for subnets #1, #2161, #2440, and #3135
2. 61.0.0.0/8 subnetted to 6604 subnets and provide information for subnets #1, #623, #3078, and #6604
3. 97.0.0.0/8 subnetted to 8128 subnets and provide information for subnets #1, #596, #1023, and #8128
4. 58.0.0.0/8 subnetted to 8908 subnets and provide information for subnets #1, #5399, #6025, and #8908
5. 15.0.0.0/8 subnetted to 3364 subnets and provide information for subnets #1, #530, #2926, and #3364
6. 102.0.0.0/8 subnetted to 6804 subnets and provide information for subnets #1, #732, #3858, and #6804
7. 84.0.0.0/8 subnetted to 4940 subnets and provide information for subnets #1, #86, #2344, and #4940
8. 116.0.0.0/8 subnetted to 8964 subnets and provide information for subnets #1, #3171, #8600, and #8964
9. 95.0.0.0/8 subnetted to 5764 subnets and provide information for subnets #1, #1181, #1444, and #5764
10. 35.0.0.0/8 subnetted to 5427 subnets and provide information for subnets #1, #2904, #4024, and #5427
11. 11.0.0.0/8 subnetted to 6457 subnets and provide information for subnets #1, #4127, #5857, and #6457
12. 120.0.0.0/8 subnetted to 8219 subnets and provide information for subnets #1, #651, #6177, and #8219
13. 38.0.0.0/8 subnetted to 3553 subnets and provide information for subnets #1, #654, #2403, and #3553
14. 114.0.0.0/8 subnetted to 9644 subnets and provide information for subnets #1, #2223, #7007, and #9644
15. 73.0.0.0/8 subnetted to 4975 subnets and provide information for subnets #1, #1084, #4759, and #4975
16. 26.0.0.0/8 subnetted to 3964 subnets and provide information for subnets #1, #123, #2059, and #3964
17. 40.0.0.0/8 subnetted to 11174 subnets and provide information for subnets #1, #7300, #10930, and #11174
18. 64.0.0.0/8 subnetted to 5261 subnets and provide information for subnets #1, #1459, #1768, and #5261
19. 85.0.0.0/8 subnetted to 5875 subnets and provide information for subnets #1, #187, #3841, and #5875
20. 83.0.0.0/8 subnetted to 8997 subnets and provide information for subnets #1, #5956, #8658, and #8997
21. 149.145.0.0/16 subnetted to 72 subnets and provide information for subnets #1, #3, #32, and #72
22. 156.123.0.0/16 subnetted to 103 subnets and provide information for subnets #1, #52, #78, and #103
23. 163.252.0.0/16 subnetted to 90 subnets and provide information for subnets #1, #4, #89, and #90
24. 135.143.0.0/16 subnetted to 108 subnets and provide information for subnets #1, #27, #47, and #108
25. 184.213.0.0/16 subnetted to 50 subnets and provide information for subnets #1, #12, #47, and #50
26. 134.84.0.0/16 subnetted to 97 subnets and provide information for subnets #1, #8, #65, and #97
27. 154.171.0.0/16 subnetted to 76 subnets and provide information for subnets #1, #61, #71, and #76
28. 148.28.0.0/16 subnetted to 102 subnets and provide information for subnets #1, #12, #18, and #102
29. 144.199.0.0/16 subnetted to 108 subnets and provide information for subnets #1, #13, #75, and #108
30. 147.128.0.0/16 subnetted to 75 subnets and provide information for subnets #1, #70, #73, and #75
31. 215.251.145.0/24 subnetted to 46 subnets and provide information for subnets #1, #4, #5, and #46
32. 218.61.123.0/24 subnetted to 27 subnets and provide information for subnets #1, #4, #5, and #27
33. 195.86.82.0/24 subnetted to 31 subnets and provide information for subnets #1, #4, #5, and #31
34. 213.83.77.0/24 subnetted to 35 subnets and provide information for subnets #1, #4, #5, and #35
35. 210.134.165.0/24 subnetted to 10 subnets and provide information for subnets #1, #4, #5, and #10

Reference no: EM13914657

Questions Cloud

Determine the magnitudes of the effective vertical : Structure 1 (5 m x 5 m) has a bearing pressure of 36.5 kN/m2, and structure 2 (10 m x 10 m) has a bearing pressure of 80 kN/m2. Determine the MAGNITUDES of the effective vertical (z) and the shear stress in the x-z plane at point A
Compute balance of the estimated product warranty liability : Compute the balance of the Estimated Product Warranty Liability account at the end of the month. If the company's product warranty liability is overestimated, what are the effects on current and future years' income?
Identify each event as asset source : Identify each event as asset source (AS), asset use (AU), asset exchange (AE), or claims exchange (CE). Also identify the account that is to be debited and the account that is to be credited when the transaction is recorded.
How joint application design is a better technique : Describe how joint application design (JAD) might be considered a better information-gathering technique than the traditional method of requirements gathering? What are its shortcomings?
Unique network address and number of subnet : Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Please reply to the Subnetting Discussion Topic under Week 3 Discussions with your selection. Don't select a network address that som..
Manufacturing overhead is fixed and unaffected : Most of the manufacturing overhead is fixed and unaffected by variations in how much jewelry is produced in any given period. However, $13 of the overhead is variable with respect to the number of bracelets produced. The customer who is interested in..
What is the appropriate rate to use to estimate free miles : What is the appropriate rate to use to estimate free miles? What effect would the estimated liability for free travel by frequent flyers have on 2014 net income?
Calculate the average rate of return and payback period : Junky Co. are considering a new project. Total revenue for the initial phase and the termination phase are expected to be 120K$ and 0K$ respectively. The operational phase will last five year and CFAT, and PAT for each year are expected to be 50K$ an..
How much would it be willing to lend the business owner : A small business owner visits his bank to ask for a loan. The owner states that he can repay a loan at $1,500 per month for the next three years and then $500 per month for two years after that. If the bank is charging customers 8.5 percent APR, how ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Research on wireless standards

Research the 802.11 wireless standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, etc.), and describe each of them in 1-2 paragraphs.

  1 identify the operating system and note whether you are

1 identify the operating system and note whether you are andor have been running your operating system updates

  Crack encryption key using brute force attack

Was Charlie exaggerating when he gave Peter an estimate for the time that would be required to crack the encryption key using a brute force attack?

  Write a review for the efficient delivery of it networking

Write a Literature Review for theEfficient delivery of IT Networking, below following a set structure. The Literature Review is a critical examination of the most relevant, recent and scholarly research on the topic

  1nbspnbspnbsp find the solution of the

1.nbspnbspnbsp find the solution of the systemxnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbsp 1 mod

  Evaluate two network monitoring technologies

As a network manager in a medium-size corporation, it is your responsibility to use a proactive approach to providing security to your network. Evaluate 2 network monitoring technologies. These should be able to provide you with a graphical look at..

  Long-distance communication in a wan infrastructure

How can cables like coaxial and UTP cable be used for long-distance communication in a WAN infrastructure?

  The cio asks you to describe why you believe it is

you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you

  Explain four periodic events for real-time system

Assume that four events need 35,20,10, and x me=sec of CPU time, respectively. Dtermine the largest value of x for which system is schedulable?

  Pros and cons of long distances agreements

The telephone communication systems and long distances agreements are managed by a telecommunications department in the headquarters that reports to the vice president of finance. Outline pros and cons of both alternatives.

  Describe components, devices involved in each topology

Outline the three general network topologies (bus, ring, and star). Describe the components, devices, and arrangement of components and devices involved in each topology, as well as some of the pros and cons of each configuration.

  Multi-step protocols

Often a multi-step protocols the pipeline concept is applied. What does this mean? give an example, Explain it pictorially.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd