subletting, Computer Networking

Assignment Help:
Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.
Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.
[75 x 0.333 mark for each = 25 marks. Total mark portion of less than ‘.1’ will be rounded down, e.g. 22.79 -> 22.7]
Domain
Network Mask
Network Address
A4
Host from
B4
Host to
No of IP Address
Broadcast Address
A1
C1
D1
E1
Network A
/21
B1
Network B
/21
A2
A3
B2
B3
C2
C3
D2
D3
E2
E3
Network C
/19
Network D
/24
C4
D4
E4
C5
E5
Network E
A5
B5
D5
/25
C6
E6
Network F
A6
B6
D6
/24
C7
E7
Network G
A7
B7
D7
/24
C8
E8
Network H
/21
/24
A8
A9
A10
A11
B8
B9
B10
B11
C10
D8
D9
D10
E9
Network I
C9
E10
Network J
/24
C11
D11
E11
Network K
/24
© MIT/SITE James Kang | BE 202 | 2017.1 Page 7 of 15
Network L
/20
A12
B12
C12
D12
E12
Network M
/20
A13
B13
C13
D13
E13
Network N
/12
A14
B14
C14
D14
E14
Network O

/13
A15
B15
C15
D15
E15 #Minimum 100 words accepted#

Related Discussions:- subletting

Document the switch configuration- ccna, Document the Switch Configuration ...

Document the Switch Configuration When you have done your troubleshooting, capture the output of the show run command and save it to a text document for each switch.

Network design with configuration, WHAT DOES IT COST..THIS IS OF 700 WORDS ...

WHAT DOES IT COST..THIS IS OF 700 WORDS ASSIGNMENT...

Define the term - handoff and dynamic configuration, Define the term - Hand...

Define the term - Handoff and Dynamic configuration Handoff/roaming  The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to anoth

Network Fundamentals BTech Telecommunication, Write a report on your chosen...

Write a report on your chosen topic that has been approved by your Lecturer. Your report should include appropriate figures, about 2000 words. Topics: 1 MAN- Metro Ethernet 2 Inte

Sole access protocol in parallel programming , Sole Access Protocol Th...

Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

What is a java package, What is a Java package and how is it used? A J...

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

Categories to access the intranet, Categories to access the Intranet P...

Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1.  Those who can enter the site 2.  Those who can access

Interconnection networks and sorting, As in PRAM, there was no direct commu...

As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net

How a token ring networks allows sharing of bandwidth, Question: (a) E...

Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd