subletting, Computer Networking

Assignment Help:
Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.
Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.
[75 x 0.333 mark for each = 25 marks. Total mark portion of less than ‘.1’ will be rounded down, e.g. 22.79 -> 22.7]
Domain
Network Mask
Network Address
A4
Host from
B4
Host to
No of IP Address
Broadcast Address
A1
C1
D1
E1
Network A
/21
B1
Network B
/21
A2
A3
B2
B3
C2
C3
D2
D3
E2
E3
Network C
/19
Network D
/24
C4
D4
E4
C5
E5
Network E
A5
B5
D5
/25
C6
E6
Network F
A6
B6
D6
/24
C7
E7
Network G
A7
B7
D7
/24
C8
E8
Network H
/21
/24
A8
A9
A10
A11
B8
B9
B10
B11
C10
D8
D9
D10
E9
Network I
C9
E10
Network J
/24
C11
D11
E11
Network K
/24
© MIT/SITE James Kang | BE 202 | 2017.1 Page 7 of 15
Network L
/20
A12
B12
C12
D12
E12
Network M
/20
A13
B13
C13
D13
E13
Network N
/12
A14
B14
C14
D14
E14
Network O

/13
A15
B15
C15
D15
E15 #Minimum 100 words accepted#

Related Discussions:- subletting

Determine teh term - selection of computing infrastructure, Selection of co...

Selection of computing infrastructure The computing equipment on an Intranet must be selected in such a manner that they do not get obsolete very quickly or become too costly f

Tcp, how tcp is redefined for wireless network

how tcp is redefined for wireless network

State the difference between byte streams and message, State the difference...

State the difference between Byte streams and message Byte streams and message are different. In a message stream, network keeps track of the message boundaries. In a byte stre

Determine about the tree topology, Determine about the Tree Topology A ...

Determine about the Tree Topology A generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point kno

Implement a web server on personal computer, Question: a) The Systems ...

Question: a) The Systems Administrator of Acme Company performs the backup of the website database file every day at 15:50. The original file location is database.sql. The Ad

What is the difference among tftp and ftp application, What is the differen...

What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n

TRAFFIC CONGESTION ASSESSMENT, Can I get help for traffic congestion anlysi...

Can I get help for traffic congestion anlysis using GIS

Introduction to performance evaluations, INTRODUCTION In this part, th...

INTRODUCTION In this part, the topic of performance evaluation shows those parameters that are devised to calculate the performances of various parallel systems. Achieving the

Shortest path tree and minimum-spanning tree, We studied Dijkstra's link-st...

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd