Define the role of the network administrator

Assignment Help Computer Networking
Reference no: EM13775863

IP Subnetting

Read the following scenario and answer the questions that follow:

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and will need to support 180 network connections. The Administration Building also houses the Computer Center where the college servers and network backbone are located. The sixth building is the library, which must support 80 network connections.

You have been directed not to use a flat network of 1260 IP addresses assigned from a Class B network range. Instead, he would like to use multiple subnets.

Playing the role of the network administrator, what steps would you take to accomplish this setup using subnets instead of using a flat network of 1260 IP addresses assigned from a Class B network range? Determine and list the IP address ranges and masks associated with each building and explain the process you used to obtain the IP addresses and masks showing the obtained addresses and masks.

Reference no: EM13775863

Questions Cloud

Show how each chemical change obeys the octet rule : When an atom forms an ion, only the number of valence electrons changes; the number of protons and neutrons in the nucleus does not change.
Write letter to your past self that explain your achievement : Write a letter to your past self that explains your achievement of learning outcomes with a tone you have determined and to an audience of WRIT 200 instructors.
Approaches in normative ethics : There are three significant approaches in normative ethics such as quality ethics, deontological ethics, and utilitarianism. This paper is going to evaluate the resemblances and variations between quality concept, utilitarianism, and deontological..
Explain the structure of the appellate courts : explain in what trial court(s) in the state you would file specific types of claims. Additionally, explain the structure of the appellate courts in your state, naming each level of appeals court, if there is more than one level
Define the role of the network administrator : Playing the role of the network administrator, what steps would you take to accomplish this setup using subnets instead of using a flat network of 1260 IP addresses assigned from a Class B network range? Determine and list the IP address ranges an..
What do ethics in business means : 1. What do ethics in business means? 2. Why or why not is it ethical for executives to accept bribes and an inducement to buy another business' products?
Supreme court rules against jiffy mart : The Idaho Supreme Court rules against Jiffy Mart in a case against Kwik Stop Stores, Inc. Jiffy Mart files an appeal with the United States Supreme Court. The Court does not hear the case
Medical law, ethics, and bioethics : One organization that provides healthcare accreditation is The Joint Commission. But why is this organization important in the study of Medical Law, Ethics, and Bioethics?
Central assumptions of biological theories of crime : What are the central assumptions of biological theories of crime? How do such theories differ from other perspectives that attempt to explain the same phenomena?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd