Give a possible arrangement of subnet masks

Assignment Help Basic Computer Science
Reference no: EM131046036

An organization has a class C network 200.1.1 and wants to form subnets for four departments, with hosts as follows

A 72 hosts

B 35 hosts

C 20 hosts

D 18 hosts

There are 145 hosts in all.

(a) Give a possible arrangement of subnet masks to make this possible.

(b) Suggest what the organization might do if department D grows to 34 hosts.

Reference no: EM131046036

Questions Cloud

How many routers do you traverse : How many routers do you traverse just to get out of your local site? Read the man page or other documentation for trace route and explain how it is implemented.
Write a paper that talks about environmental laws : Write a paper that talks about environmental laws (CERCLA, RCRA, CWA, SDWA, TSCA). The paper should consist of one or two pages explain what are these regulation (date of establishment), the purpose of each one, objectives and goals.
Value of the deadweight loss : Suppose the monopolist faces the following demand curve: P = 180 - 4q. Marginal cost of production is constant and equal to $20, and there are no fixed costs. What is the value of the deadweight loss created by this monopoly?
Summarize role that the atmosphere conditions of wind speed : Summarize the role that the atmosphere conditions of wind speed, temperature, and stability potentially impact plume modeling activities with a Gaussian model.
Give a possible arrangement of subnet masks : Give a possible arrangement of subnet masks to make this possible.
Discuss the contractual liability of the principal : Discuss the contractual liability of the principal, agent, and third party when the principal is (a) disclosed, (b) partially disclosed, and (c) undisclosed.
Describe and demonstrate calculations for nitrous oxides : Describe and demonstrate (illustrate) the calculations for the following for this section of your project: (a) nitrous oxides (NOx), (b) carbon monoxide (CO), (c) particulate matter (PM).
What does this do to the size of the ethernet lan : Explain how to do this with subnets; give sample subnet assignments. Assume that an additional network address is not available. What does this do to the size of the Ethernet LAN?
Quantity theory of money : What three motives for holding money did Keynes consider in his liquidity preference theory of the demand for real money balances? Briefly explain. On the basis of these motives, what variables did he think determined the demand for money?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What will the worst-case runningtime be in asymptotic terms

What will the worst-case runningtime be in asymptotic terms? If the difference is only a constanttime factor, how much slower or faster will the modified program becompared to the original version of binary?

  Forced decryption ruled unconstitutional

Analyze the decision by the 11th U.S. Circuit of Appeals to determine whether you believe the decision rendered was correct or incorrect based on the evidence suspected by the government.

  How many memory banks are needed

How many memory banks are needed so that a stream of loads can, on average, require only one cycle per load?

  Difference between data block-extent-segment and tablespace

Allocation in Oracle can aid recognize problems more easily. In your own words, give the description of difference between data block, extent, a segment, and a tablespace.

  Write a brief summary of each class

Suppose that the ArrayStack resized (grew) by creating a new array of size l each time. The value of l is arbitrary but finite (and fixed). Show that the worst case of adding an element is no longer O(1). In particular, show that the cost of resi..

  To encrypt a workbook with a password

Which of the following will produce the same result as the CONCATENATE function?

  Write a double precision function

Write a double precision function (result returned in $f0) with one double precision parameter (in $f12), along with a little driver program for testing your function.

  What do you mean by c++ access specifiers

What do you mean by C++ access specifiers ?

  What is the output of the following oddstuff method

What is the output of the following oddStuff method?

  Evaluate student ability to research and evaluate security

Evaluate the student  ability to research and evaluate security testing software and present a proposal for review by executive team members

  Create a data dictionary for the database you just created

Build a simple database based on the following instructions and the information covered in module 5. The database should include at least 3 tables that are related, and each of which must have at least 8 attributes

  Is it possible for an instruction to be receiving forwarding

Is it possible for an instruction to be receiving forwarding information and simultaneously being flushed?If possible, can you provide an example sequence of instructions?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd