How many customers can the isp serve in houston

Assignment Help Computer Engineering
Reference no: EM132134678

can someone please help me with this exam

This is consists of four questions. The questions are designed to test your understanding of certain concepts that were studied over the course of the semester. Please answer all questions on this document by typing your answer under the question. I have listed each question on a separate page for clarity.

Although you should be able to answer the question on its own page, if you have to flow over into another page that is fine. When completed post the final document to the appropriate drop box in the course shell.

Question 1

You may use any resources you want to complete each question in sufficient detail.

a.) How many customers can the ISP serve in San Antonio?

b.) How many customers can the ISP serve in Houston, combining the capacity of all the subnets?

c.) If the two /20 Houston subnets are merged together, what is the subnet address of the resulting network?

After deploying the network as shown in the case, the ISP experienced slow customer growth in Dallas and Austin, but high customer growth in San Antonio and Houston. To accommodate these growth patterns, the ISP pulled some of the /24 subnets from Dallas and Austin and allocated them to San Antonio and Houston.

d.) What are the /24 subnets that comprise the Dallas /21 subnet? (Hint: there are 224 - 221 = 23 = 8 such subnets)

e.) What are the /24 subnets that comprise the Austin /21 subnet?

Question 2

Among the processes at a retailer that can be managed by IT are merchandise planning, sourcing, distribution, and store operations. Pick one of these processes and use any information sources available to define it. Then give an example of how IT can be used to manage this process, concentrating chiefly on the role that computer networks play.

Question 3

Assume you are using the 192.168.0.0/16 address block to create subnets for a typical medium-sized business with about 2000 employees.

a.) You need to provide a subnet for each major department in the business. Assuming the business has a typical organization structure for a business this size, list the different subnets you would like to set up for the business. (Hint: you may have to go online and look at small business department structures to get an idea of the departments you need to provide for. You must have a minimum of 7 departments).

b.) How many bits would you need in the subnet ID to provide the required number of subnets?

c.) How many host IDs would be available in each subnet in your design?

d.) Present your results in the following table (See table 9.3 on Page 309 of the textbook as ab example). Note: you will have as many rows as departments you have included in your answer.

Department

Subnet Address (binary)

Subnet address (decimal)

Question 4

Briefly describe how you can use asymmetric key encryption to ensure the confidentiality of outgoing information. Clearly show the sender, receiver, and how the two keys are used to provide confidentiality.

Reference no: EM132134678

Questions Cloud

Write your own class called weatherstats to manage : Write your own class called WeatherStats to manage the ordered collection of high temperatures.
Write a function that takes as input a vector with quiz : Write a function that takes as input a vector with quiz grades and that determnes if the highest grade was obtained on the first quiz.
What is minimum sdk meaning in program : Can "Wear Minimum SDK" API version be smaller than that of "Phone and Tablet Minimum SDK" ?
Create a graphical user interface : Implement at least four classes (showing inheritance) with suitable constructors and methods to set/retrieve values of from the properties.
How many customers can the isp serve in houston : How many customers can the ISP serve in Houston, combining the capacity of all the subnets?
Discuss the abnormal return pattern of tastegood : FIN80005 Corporate Financial Management - prepare a report, to present to the CEO, based on the Excel analysis you conduct for Part 1 and Part 2
What is the best data type for student id : What is primary key called when there are tow feilds combined to create it. What is the best data type for student id.
Describe why you think this facility is not provided in java : Describe why you think this facility is not provided in Java by default? if you can use examples to support your answer it will be super helpful.
What information about the geographic locations : What information about the geographic locations of the routers can you infer from the trace? What was the longest mean delay on any one hop along the way?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify the internet browsers that you used

Identify the Internet Browser(s) that you used:[Outcome #1]. Identify a minimum of two (2) search engines that you used:[Outcome #1].

  Suspecting the icmp flooding attack

In reviewing your firewall logs, you notice a large number of the ICMP echo requests coming from external host 63.10.100.4. You suspect an attempted ICMP flooding attack. How could you respond.

  What is the role of policy in formulating the information

What is the role of policy in formulating the information assurance manual? Why is it useful to have a template for documenting the information assurance system

  Direct recursion

Procedure A calls Procedure B then, based on the result of Procedure B, may call Procedure A.  Procedure B checks to see if the specific case it is being passed has already been solved; if so, it returns with the answer.  This is most closely an e..

  List four different instructions which could be used

List four different instructions which could be used to set every bit in a GPR/DM register to if you don't know its current contents.

  Why term would be important and relevant in the design

For each of the following items, explain what the term refers to and why it would be important and relevant in the design of a practical programming language.

  Organizational information processing theory

What is organizational information processing theory, explain its concepts and what do you meant by creating the slack resource, make the lateral relationship.

  A security engineer for a hospital group based in cincinnati

a security engineer for a hospital group based in Cincinnati, OH. Your group has just acquired a small hospital in Alba

  Provide the definition of machine learning

Provide the definition of Machine learning, and give the definition for supervised and non supervised learning?

  How many bits will be dumped before other station slows down

Assume that two stations are on a typical ATM network. How many bits will be dumped before the other station slows down or stops its transmission?

  Add items to the arraylist

Add items to the ArrayList, one at a time, based on user typed input. The user will be prompted for the String to be stored in the ArrayList and then hit enter. The user would be able to continue to add items to the ArrayList until they just hit e..

  What sort of message would you have a program print

What sort of message would you have a program print to prompt a novice user to input a social security number?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd