subletting, Computer Networking

Assignment Help:
Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.
Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.
[75 x 0.333 mark for each = 25 marks. Total mark portion of less than ‘.1’ will be rounded down, e.g. 22.79 -> 22.7]
Domain
Network Mask
Network Address
A4
Host from
B4
Host to
No of IP Address
Broadcast Address
A1
C1
D1
E1
Network A
/21
B1
Network B
/21
A2
A3
B2
B3
C2
C3
D2
D3
E2
E3
Network C
/19
Network D
/24
C4
D4
E4
C5
E5
Network E
A5
B5
D5
/25
C6
E6
Network F
A6
B6
D6
/24
C7
E7
Network G
A7
B7
D7
/24
C8
E8
Network H
/21
/24
A8
A9
A10
A11
B8
B9
B10
B11
C10
D8
D9
D10
E9
Network I
C9
E10
Network J
/24
C11
D11
E11
Network K
/24
© MIT/SITE James Kang | BE 202 | 2017.1 Page 7 of 15
Network L
/20
A12
B12
C12
D12
E12
Network M
/20
A13
B13
C13
D13
E13
Network N
/12
A14
B14
C14
D14
E14
Network O

/13
A15
B15
C15
D15
E15 #Minimum 100 words accepted#

Related Discussions:- subletting

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

Fault tree construction rules, FAULT TREE CONSTRUCTION RULES (a)  Defi...

FAULT TREE CONSTRUCTION RULES (a)  Define the  undesired  fault  condition  as the  "Top"  event. The  fault  event describes the state of either the system or a component. (b

Subtract two from number of hosts, Why do we require to subtract two from n...

Why do we require to subtract two from number of hosts?

Unused reserved - trannsport layer, Unused Reserved This  is a 6 bi...

Unused Reserved This  is a 6 bite field  reserved for future use.

Explain stop--and--wait automatic repeat request, Q. Explain Stop--and--Wai...

Q. Explain Stop--and--Wait automatic repeat request? 1. Numbering frames prevents the retaining off duplicate frames. 2. Numbered acknowledgement are needed in case of delay

Explain point-to-point protocol in ccna, An industry standard suite of prot...

An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams.

CCNA, I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE ...

I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE BASED ON COMPLETE SEVER RELATED AND MAINTENANCE OF AN ENTIRE SMALL ENTERPRISE NETWORK.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd