How many customers can the isp serve in houston

Assignment Help Computer Engineering
Reference no: EM132134678

can someone please help me with this exam

This is consists of four questions. The questions are designed to test your understanding of certain concepts that were studied over the course of the semester. Please answer all questions on this document by typing your answer under the question. I have listed each question on a separate page for clarity.

Although you should be able to answer the question on its own page, if you have to flow over into another page that is fine. When completed post the final document to the appropriate drop box in the course shell.

Question 1

You may use any resources you want to complete each question in sufficient detail.

a.) How many customers can the ISP serve in San Antonio?

b.) How many customers can the ISP serve in Houston, combining the capacity of all the subnets?

c.) If the two /20 Houston subnets are merged together, what is the subnet address of the resulting network?

After deploying the network as shown in the case, the ISP experienced slow customer growth in Dallas and Austin, but high customer growth in San Antonio and Houston. To accommodate these growth patterns, the ISP pulled some of the /24 subnets from Dallas and Austin and allocated them to San Antonio and Houston.

d.) What are the /24 subnets that comprise the Dallas /21 subnet? (Hint: there are 224 - 221 = 23 = 8 such subnets)

e.) What are the /24 subnets that comprise the Austin /21 subnet?

Question 2

Among the processes at a retailer that can be managed by IT are merchandise planning, sourcing, distribution, and store operations. Pick one of these processes and use any information sources available to define it. Then give an example of how IT can be used to manage this process, concentrating chiefly on the role that computer networks play.

Question 3

Assume you are using the 192.168.0.0/16 address block to create subnets for a typical medium-sized business with about 2000 employees.

a.) You need to provide a subnet for each major department in the business. Assuming the business has a typical organization structure for a business this size, list the different subnets you would like to set up for the business. (Hint: you may have to go online and look at small business department structures to get an idea of the departments you need to provide for. You must have a minimum of 7 departments).

b.) How many bits would you need in the subnet ID to provide the required number of subnets?

c.) How many host IDs would be available in each subnet in your design?

d.) Present your results in the following table (See table 9.3 on Page 309 of the textbook as ab example). Note: you will have as many rows as departments you have included in your answer.

Department

Subnet Address (binary)

Subnet address (decimal)

Question 4

Briefly describe how you can use asymmetric key encryption to ensure the confidentiality of outgoing information. Clearly show the sender, receiver, and how the two keys are used to provide confidentiality.

Reference no: EM132134678

Questions Cloud

Write your own class called weatherstats to manage : Write your own class called WeatherStats to manage the ordered collection of high temperatures.
Write a function that takes as input a vector with quiz : Write a function that takes as input a vector with quiz grades and that determnes if the highest grade was obtained on the first quiz.
What is minimum sdk meaning in program : Can "Wear Minimum SDK" API version be smaller than that of "Phone and Tablet Minimum SDK" ?
Create a graphical user interface : Implement at least four classes (showing inheritance) with suitable constructors and methods to set/retrieve values of from the properties.
How many customers can the isp serve in houston : How many customers can the ISP serve in Houston, combining the capacity of all the subnets?
Discuss the abnormal return pattern of tastegood : FIN80005 Corporate Financial Management - prepare a report, to present to the CEO, based on the Excel analysis you conduct for Part 1 and Part 2
What is the best data type for student id : What is primary key called when there are tow feilds combined to create it. What is the best data type for student id.
Describe why you think this facility is not provided in java : Describe why you think this facility is not provided in Java by default? if you can use examples to support your answer it will be super helpful.
What information about the geographic locations : What information about the geographic locations of the routers can you infer from the trace? What was the longest mean delay on any one hop along the way?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd