subletting, Computer Networking

Assignment Help:
Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.
Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.
[75 x 0.333 mark for each = 25 marks. Total mark portion of less than ‘.1’ will be rounded down, e.g. 22.79 -> 22.7]
Domain
Network Mask
Network Address
A4
Host from
B4
Host to
No of IP Address
Broadcast Address
A1
C1
D1
E1
Network A
/21
B1
Network B
/21
A2
A3
B2
B3
C2
C3
D2
D3
E2
E3
Network C
/19
Network D
/24
C4
D4
E4
C5
E5
Network E
A5
B5
D5
/25
C6
E6
Network F
A6
B6
D6
/24
C7
E7
Network G
A7
B7
D7
/24
C8
E8
Network H
/21
/24
A8
A9
A10
A11
B8
B9
B10
B11
C10
D8
D9
D10
E9
Network I
C9
E10
Network J
/24
C11
D11
E11
Network K
/24
© MIT/SITE James Kang | BE 202 | 2017.1 Page 7 of 15
Network L
/20
A12
B12
C12
D12
E12
Network M
/20
A13
B13
C13
D13
E13
Network N
/12
A14
B14
C14
D14
E14
Network O

/13
A15
B15
C15
D15
E15 #Minimum 100 words accepted#

Related Discussions:- subletting

What is forward error correction and data words, What is Forward Error Corr...

What is Forward Error Correction and data words Forward error correction It is the process in which the receiver tries to guess the message by using redundant bits. Da

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Explain communications channels, A communications channel is pathways over ...

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or

Explain the public-key cryptography, Q. Explain the Public-Key Cryptography...

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

How an ethernet worked, How an Ethernet Worked? The operation of Ethern...

How an Ethernet Worked? The operation of Ethernet can be explained in simple terms as follows: Each computer on the Ethernet Network, also called as a node, operates indepen

Job of designing the new network layout, You have been tasked with the job ...

You have been tasked with the job of designing the new network layout for R2I's new location. R2I has a fractional T1 line that enters the premises at Site B. You can use: 1

Difference among flow control and error control, What is the difference am...

What is the difference among  flow control and error control?    Ans) Flow control: adjust and confirm data flow rate for successful transmission. Error Control: a method to

Determine about the tree topology, Determine about the Tree Topology A ...

Determine about the Tree Topology A generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point kno

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd