Local area networks

Assignment Help Operating System
Reference no: EM1379507

Question: Assume you are the network manager for Central University, a medium size university with 13,000 students. The university has ten separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. BRIEFLY describe how would you assign the IP addresses the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions.

Reference no: EM1379507

Questions Cloud

Explain current technologies and issues : Assume you work for a cosmetics corporation and have been asked to manage a project team that will investigate whether or not your company should start to sell its products directly to customers through the internet.
Determine values of it industry certifications : Discuss briefly how IT certification works. What business arenas are IT certifications needed, security, or what technical problem is IT certification designed to solve?
Benefits and drawbacks of networked computers : Discuss the benefits of networked computers? What are the drawbacks? Describe similar characteristics between the internet and a group of networked computers.
Database statistics : In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.
Local area networks : Assume you are the network manager for Central University, a average size university with 13,000 students. The university has ten separate colleges
Questions about on ssl : Provide a table showing the Caesar cipher with a key five, and then provide the result of applying this cipher to the text 'I came I saw I conquered'.
Internal application server for application systems : Classic Catalog Corporation runs a small but rapidly increasing catalog sales business. It outsourced its Web operations to a local ISP for many years but as Web have become a larger portion of its business,
Question about lan operating systems : Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.
Programming language machine independence : Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.

Reviews

Write a Review

Operating System Questions & Answers

  Page fault with lru page replacement policy

Computer has 16 pages of virtual address space but only three physical pages frames. Initially physical memory is empty. Program references virtual pages in order 1,2,3,4,5,3,4,1,6,7,8,7,8,9,7,8,9,5,4,5,4,2 Which references a page fault with LRU ..

  Question about backbone structure

Suppose you have been hired by a mail order firm to install a backbone structure that will connect four LANs and provide a connection to the Internet.

  Question about information security

Discover an article about information security. Give an introduction, and select various aspects of the article or Web site.

  Illustrate how many entries are there in logical address

Consider a computer system with 48-bit logical address and 4-KB page size. System supports up to 1 GB of physical memory. Illustrate how many entries are there in each of the following?

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  What is cpu utilization for round-robin scheduler

when a process requests for I/O operations, it will suspend and another process will need to be selected for execution. What is the CPU utilization for a round-robin scheduler.

  Fragmented mean in reference to hard drives

What does fragmented mean in reference to hard drives, and what, if anything, should be done to prevent it. Describe the general path data takes in an application from user input to the computer hardware.

  Deadlock avoidance and scheduling

Deadlock Avoidance and Scheduling

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  Challenges os faces-passing parameter among user-kernel mode

Write two challenges an OS faces when passing parameters between user and kernel mode. Describe how an OS can overcome them

  Determine major computer components

Suppose you have decided to buy a personal computer system for personal use and wish to be able to do the following tasks on the computer,

  Optimal page replacement strategy

What is minimum number of page faults for the optimal page replacement strategy? Please show how the page is placed and how page faults occur.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd