What is the subnet address used by the company

Assignment Help Computer Networking
Reference no: EM13190687

1) With what kind of network device (Router or Switch) do you replace Device 1, Device 2 and Device 3? And Why? Note:  Answer should be either Router or Switch.

2) Choose appropriate IP address from the six address given above  for the interfaces and write explanation

a. Device1 Fa0/0

b. Device1 Fa0/1

c. Device2 Fa0/0

d. Device2 S0/0

3) Write appropriate connections between the devices?

4) Open website in your browser, how different networking protocols involved for successfully displaying the webpage?

Hint: DNS, ARP, HTTP, NAT, TCP/IP

5) Host A is exchanging TCP packets with Host B.  Host B has the TCP buffer size of 1500 bytes and 750 bytes of received and unprocessed data. Host A has a congestion window size of 2000 bytes.

How many bytes host A can send to host B?

6) Five hosts  A, B, C, D, E are connected  in a network. Host A and B are in the same collision domains. Host C and D are in different collision domains but Hosts A, B, C and D are in the same broadcast domain. Host E is in different broadcast domain.

Create network topology using Cisco packet tracer for the above given specification, assign appropriate IP addresses to each host and ping Host E from Host A.

Submit screen shots for the topology, successful ICMP request and response messages.

7) IP address 10.11.111.11 with a subnet mask of 255.255.0.0. Convert to binary

Row1: IP Address,     Row2: Subnet Mask Address,      Row3: Subnet Address

8) Choose all that applies.  Find the one that use the different frequency schemes and indicate the frequencies.

a) 802.11a

b) 802.11b

c) 802.11N

d) Bluetooth

e) WiMAX

9) Write major difference between TDMA and FDMA with less than three sentences.

10) What are the frequency band and bit rates for 802.11n?

11) A company has Class B address with network ID of 149.151.0.0.  And it wants to create subnets with 1502 hosts each.  Apply subnet mask to IP address of 149.151.99.121 to find corresponding subnet

IP Address in Binary

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Mask

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

AND

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

What is the subnet address used by the company in decimal numbers?

Reference no: EM13190687

Questions Cloud

House and the senate coordinate two versions of same bill : When the House and the Senate coordinate two versions of the same bill, they often use a _________ to obtain a single unified bill.
Write paper describing xml and json : Write two page paper describing XML and JSON. What are they? Why do we need them? Are there certain applications that favor one of the these over the other? Explain. What is SOAP?
Data security and dealing with workplace bullying : Dealing with Workplace Bullying and Data Security
Calculate the contractors profit-maximizing choice of effort : A contractor has been chosen to perform a government project. To avert the moral-hazard risk that the contractor will behave inefficiently, government is considering how to use contractual incentives to avoid cost overruns. Government has a target..
What is the subnet address used by the company : What is the subnet address used by the company in decimal numbers and write major difference between TDMA and FDMA with less than three sentences
Explain how cultural affect elements in the marketing mix : The world is shrinking rapidly with the advent of faster communication, transportation, and financial flows. the terms global industry and global firm are becoming more common. Explain how cultural differences
Anthropological research facility : The Anthropological Research Facility allows donated bodies to decompose in an indoor setting to study postmortem changes
Find data on gdp and its components : Find data on GDP and its components, and compute the percentage of GDP for the follow-ing components for 1950, 1980, and the most recent year available. a. Personal consumption expenditures b. Gross private domestic investment
Define thin layer chromotography it would be caffeine : Thin layer chromotography it would be caffeine, but why? both have amide functional groups making them very polar, so why is caffeine more polar?

Reviews

Write a Review

Computer Networking Questions & Answers

  Maturation of industry impact your business strategy

How would the maturation of the industry worldwide impact your business strategy?

  Determine nr count back from secondary after last frame

If poll bits are in the sixth frame, determine the N(R) count back from secondary after last frame? Suppose error-free operation.

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  Address type certification certification issue with company

Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system

  Explain synchronous time division multiplexing

Synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?

  Provide a document that addresses all issues

XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco).

  Describe cdma used in gps-qualcomm satellite phone network

Describe CDMA (code division multiple access), that is used in GPS and Qualcomm satellite phone network, also other communication standards.

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Reliable deal with supplier and client reluctance

How might reliable deal with supplier and client reluctance to provide detailed information about their internal operation?

  What are the major business objectives and processes

What are the major business objectives and processes (operations) that the hotel company carries out and list the information systems that are used to support their portal and describe how they are related to the overall business objectives and pro..

  Show rewsult of inserting these keys using double hashing

Show the result of inserting these keys using linear probing, using quadratic probing with c1 = 1and c2 = 3, and by using double hashing with h2(k) = 1 + (k mod (m-1)).

  Possible ieee amendments could be used for new system

What possible IEEE 802.11 amendments could be used for the new system? What are the pros and cons of each amendment? Choose an amendment to implement and explain your choice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd