Create three subnets for organisation

Assignment Help Computer Networking
Reference no: EM13190581

An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

a) Create three subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

b) How many addresses are left?

Reference no: EM13190581

Questions Cloud

Identify the source port number : Identify the source port number and identify the destination port number and what is the length of the data?
Assume you are interested in going into business : "Assume you are interested in going into business and wish to secure a franchise. Research a franchise that interests you (one place to start is Franchise Direct). Why did you choose this franchise?
The standard heat of formation of standard molar entropy : The standard heat of formation of WO3(s) is -843 KJ/mol, and its standard molar entropy
How to install enough capacity to produce : Firm A has developed a new product and must now decide whether to install enough capacity to produce either one or two units of the product. It expects production costs (including capacity building) to be C(q) = 8q + q2 and it estimates demand for..
Create three subnets for organisation : Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.
Consider civilization broadcasting signal with power : Consider a civilization broadcasting a signal with a power of 1.6*10^4 watts. The Arecibo radio telescope, which is about 300 meters in diameter, could detect this signal if it is coming from as far away as 126 light-years.
Expiration and garbage collection timersare : Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?
Identify a vulnerable population within your community : Utilizing data obtained from the county or state health department, or other government agency, provide some statistical information about your selected population (e.g. size, dollar figures, geographics, age breakdown, length of service provision, e..
State reaction rate laws are frequently used to investigate : Reaction rate laws are frequently used to investigate reaction mechanisms. Would your results to this experiment be consistent with either or both of the following mechanisms?

Reviews

Write a Review

Computer Networking Questions & Answers

  How can these be used to compare

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used? How can these be used to compare the features and components of each IDPS? Breifly compare the different classifications of systems you ..

  Find finish actual packet completion-order of transmission

Arrival at time t = 1, length 3; arrival at t = 2, length 1. Buffer 3: arrival at time t = 3, length 5. You need to find out the finish tag, order of transmission and actual packet completion times for each packet arrival.

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Factors for moving wireless nics into more dominant role

Explain whether this is still true today, and write down factors are moving wireless NICs into more dominant role, if any.

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to comapny users.

  Security in bluetooth and other mobile devices

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

  Describe what is meant by cybersecurity architecture

Describe what is meant by Cybersecurity Architecture. List and describe the principles that must be supported.

  Cnt-books wants an affordable

CNT-Books wants an affordable way to establish remote connections for its salespeople, who log on from customer sites all over the country, and its three branch offices.

  Does node refrain from transmitting its scheduled time

Assume nodes A and B are on same 10 Mbps Ethernet bus, and propagation delay between two nodes is 245 bit times. Does B refrain from transmitting at its scheduled time?

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd