subletting, Computer Networking

Assignment Help:
Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.
Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.
[75 x 0.333 mark for each = 25 marks. Total mark portion of less than ‘.1’ will be rounded down, e.g. 22.79 -> 22.7]
Domain
Network Mask
Network Address
A4
Host from
B4
Host to
No of IP Address
Broadcast Address
A1
C1
D1
E1
Network A
/21
B1
Network B
/21
A2
A3
B2
B3
C2
C3
D2
D3
E2
E3
Network C
/19
Network D
/24
C4
D4
E4
C5
E5
Network E
A5
B5
D5
/25
C6
E6
Network F
A6
B6
D6
/24
C7
E7
Network G
A7
B7
D7
/24
C8
E8
Network H
/21
/24
A8
A9
A10
A11
B8
B9
B10
B11
C10
D8
D9
D10
E9
Network I
C9
E10
Network J
/24
C11
D11
E11
Network K
/24
© MIT/SITE James Kang | BE 202 | 2017.1 Page 7 of 15
Network L
/20
A12
B12
C12
D12
E12
Network M
/20
A13
B13
C13
D13
E13
Network N
/12
A14
B14
C14
D14
E14
Network O

/13
A15
B15
C15
D15
E15 #Minimum 100 words accepted#

Related Discussions:- subletting

Division of the address space, The IP class procedure does not split the 32...

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne

Bluej programming, i have been given a question:- any 50 numbers are given ...

i have been given a question:- any 50 numbers are given and to find out the 1)frequency of odd and even numbers 2)frequency of positive and negative numbers

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Flow control in TCP, Q. Flow control in TCP? The amount of data a s...

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Layer responsible for putting 1s and 0s into a logical group, Name the laye...

Name the layer responsible for putting 1s and 0s into a logical group? Ans) Frames are broken down into 1s and 0s and placed onto the physical medium by the Data Lin layer.

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

TRAFFIC CONGESTION, Can I get help for data analysis on traffic congestion ...

Can I get help for data analysis on traffic congestion using GIS

Local and wide area networking, A. Current setting A new bank has its he...

A. Current setting A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities a

Program for two library methods with thread , #include void subdomain(...

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd