What ip range would an isp provide to a customer

Assignment Help Computer Networking
Reference no: EM13166595

Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a) What IP range would an ISP provide to a customer, if the customer wanted a range of Public IP's for use on the Internet? Explain your choice and why you feel the other choices are not adequate? b) Using the Range you selected in '4a' above - subnet the range into as many /28 networks as possible - show your work and each /28 range of addresses.

Reference no: EM13166595

Questions Cloud

Use a loop to allow a user to enter a series of numbers : Use a loop to allow a user to enter a series of numbers and then print out the series of numbers when the user is done. The user stops the lseries program by entering -1 (or any negative number).
Prints out a summary for a list of prescriptions : Create a class that prints out a summary for a list of prescriptions. Using your Prescription class and some if statements you will read in 3 prescriptions and print out an appropriate summary with a list of the prescriptions
Has this network been sub-netted : Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?
Extended grep for regular expressions : That contain the word "as" exactly onceb) that contain the word "sa" more than once
What ip range would an isp provide to a customer : Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a)
Program that evaluates a infix expression : Program that evaluates a infix expression using stacks terminated by an equal sign. for example: (4-2)-5)/(2+1)-2))=the expression will contain single digit and the operators +, -, *,/. Make sure to consider the operator precedence.
Life with plaster cast-painting-within-a-painting : Explain why you think an artist might choose to re-paint a painting into his or her work. In what ways is it the same painting? In what ways does it become different?
Develop the pseudo code need : Develop the pseudo code needed to find the average of ten 8-bit numbers. Use a loop.
Marie program that will input a variable number : Develop a MARIE program that will input a variable number of user entered DECimal whole number grades, validating each one (0-100) in a subroutine

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain sliding window error control system

In a sliding window error control system in which each byte is numbered, Station A sends a packet with bytes numbered 801 to 900. If the packet arrives with no errors, how does Station B respond?

  Authentication factor utilized by authentication server

which authentication factor is being utilized by authentication server which respond to login request by creating a random number or code.

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Determine alice-s secret random number

Alice and Bob utilize Diffie-Hellman key exchange protocol with common prime modulus p = 11 and common base a = 2. Determine Alice's secret random number xA?

  Encapsulation for information given by wireshark protocols

Identify and link both Protocols represented and protocol layer and encapsulation types of models with information given by Wireshark relate the protocols?

  How company can handle snmp from corporate location

How this company can handle SNMP from corporate location. Write details on versions, basic operations, and MIBs. Describe the advantages of this kind of centralized monitoring.

  What are the requirements regarding plaintext and ciphertext

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext?

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Find the required bit rate if sampling rate is given

Find out the required bit rate. Suppose that the sampling rate is 8000 samples per second and that one framing bit is added to each frame.

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  Determine the bandwidth-delay product r tprop

Assume two hosts, A and B, are separated by 20,000 kilometers and are connected by direct link of R = 1 Mbps. Determine the bandwidth-delay product, R * Tprop?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd