Network and create a total of subnets

Assignment Help Basic Computer Science
Reference no: EM131339252

COMPLETE THE SUBNET CHART

We are going to use the 199.1.2.0 network and create a total of 8 subnets, with 25 hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.

Subnet

Network Address

Host Address Range

Broadcast Address

Subnet Mask: 255.255.255._____




Classroom 1

199.1.2.0

199.1.2.1 - 199.1.2.30

199.1.2.31

Classroom 2

199.1.2._

199.1.2._ - 199.1.2._

199.1.2._

Classroom 3

199.1.2._

199.1.2._ - 199.1.2._

199.1.2._

Classroom 4

199.1.2.96

199.1.2.97 - 199.1.2.126

199.1.2.127

Classroom 5

199.1.2.128

199.1.2.129 - 199.1.2.158

199.1.2.159

Classroom 6

199.1.2._

199.1.2._ - 199.1.2._

199.1.2._

Library Lab

199.1.2._

199.1.2._ - 199.1.2._

199.1.2._

Office Network

199.1.2._

199.1.2._ - 199.1.2._

199.1.2._

Reference no: EM131339252

Questions Cloud

What you learned about information security : Review all the critical thinking assignments you have completed in this course. Prepare a critical review of what you learned about information security and how it will help you in your career.
Write a response about the given post : As time goes on, it appears that there are more juveniles committing crimes or being associated with criminal activity in some form or fashion. Some of the evident characteristics of the juveniles involved with criminal activity are low self-estee..
Construct a technology roadmap for moving employer : Construct a Technology Roadmap for moving your employer, or a firm with which you are familiar, from its current IT environment to the firm's vision of where it wants to be.
How are you adjusting to your role as observer : In what ways does your actual observation experience compare to your expectations? How are you adjusting to your role as observer? Were there times when it was difficult for you to remain objective?
Network and create a total of subnets : We are going to use the 199.1.2.0 network and create a total of 8 subnets, with 25 hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.
Discuss about the case given below : The value of the criminal justice system is to deliver justice for all, by convicting and punishing the guilty and helping them to stop offending, while protecting the innocent. I feel the criminal justice system is supposed to keep balance within..
Identify teresa main problem in this scenario : Using the guidelines that you developed for making and evaluating referrals: Identify Teresa's main problem in this scenario. Identify the barriers that will keep her from resolving the main problem
Show me the first three normal forms : Show me the first three normal forms. Only do what the step requires even if you can see what the end result should be.
Explain the issues that exist between 3nf and bcnf : Explain the issues that exist between 3NF and BCNF.  Now normalize through BCNF.  Show the relations at each step even if there is no change so I can see the process.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Example of economics and politics being tied together

What is a recent IMF example of economics and politics being tied together?

  Id for the time-volume record

The application is ~ 80 % done. Please see attached the Project file. Need to implement a few features: Change the view records page to be a list- Ordered by Date Be able to Export this list as a PDF and save on the SD CARD Generate a CSV file of ..

  Importance of application maintenance in organizations

Explain the importance of application maintenance in organizations and assess the need for robust patch and update management programs and procedures. From the e-Activity, compare and contrast the update styles of Microsoft's Internet Explorer and Go..

  Developing a strong scm process to match is system

Developing a strong SCM process to match IS system upgrades would provide what advantage(s)? What would such a process look like

  What is the difference between a function and a formula

What is the difference between a function and a formula

  What is the frame format of a ttp/c frame on the network

What is the frame format of a TTP/C frame on the network? What are the contents of the header byte? Explain the principle of operation of the TTP/A protocol. Describe the concept of a "round".

  Verify that the adjusted prices display on the screen

Verify that the logic captures the discount coupon and the list of items from the user.

  Framing rules work if stuffing rule to stuff zero changes

Will framing rules work if we change stuffing rule to stuff a zero only after 6 consecutive ones? Describe. Will protocol work if we change stuffing rule to stuff 0 only after a zero followed by 5 consecutive ones? Describe.

  What are the four different result types

What are the four different result types that can be returned from a subquery? For each type, explain what it is and when it is used.

  Experiment with the privacy settings in facebook

Carefully experiment with the Privacy settings in Facebook. Describe how you would use the privacy settings in Facebook to protect your privacy and safety.

  Suggest a way to find web servers for the department

Can you suggest a way to roughly find out the web servers (outside your department) which are not popular among the users in the department? Describe.

  What is the protocol overhead

a) What is the protocol overhead (stated as a percentage)? b) Perform the same calculation, this time assuming that both clients are using IPv6.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd