subnetting, Computer Networking

Assignment Help:
Calculate the Network Address, the broadcast address and the host range, for the following host address
i. 192.168.180.94/27
ii. 172.23.8.19 /21
iii. 147.252.238.20 255.255.240.0
b. Consider three LANs interconnected by two routers as shown in Figure below. Assign IP addresses to all of the interfaces. For Subnet 1 use addresses of the form 192.168.1.xxx; for Subnet 2 use addresses of the form 192.168.2.xxx; and for Subnet 3 use addresses of the form 192.168.3.xxx. [use CIDR notation]

Related Discussions:- subnetting

Introduction to operations research, explain the three classification of op...

explain the three classification of operation research

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Types of redundancy checks, Types of Redundancy Checks Parity Check ...

Types of Redundancy Checks Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redundancy Check)

Define client and server, Question 1 Define client and server. Explain the...

Question 1 Define client and server. Explain the Client server model Question 2 What is a Mainframe System? Write down the features of Mainframe System Question 3

State ethernet frame format, Ethernet Frame Format Consists of sev...

Ethernet Frame Format Consists of seven fields There is No mechanism for acknowledging received frames considered an unreliable medium

Hub - network layer and routing , Hub A hub  is a  small box that  con...

Hub A hub  is a  small box that  connects  individual devices on network  so that  these devices  can  communicate  with each  other. Hub  is an inexpensive device. It is comm

Describe peer-to-peer networking, You are requested to design a secure home...

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Error control in TCP, Q. Show the Error control in TCP? Error control ...

Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec

Statements about ppp and slip for wan communications, State the statements ...

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd