Question - subnettingconsider the following scenarios -a

Assignment Help Computer Networking
Reference no: EM13380324

Question - Subnetting

Consider the following scenarios -

A) You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

B) You are a medium-sized company assigned a class B network 156.26.0.0. You have seven divisions and want to assign each of them their own subnet.

C) You are a small company, of around 100 employees, assigned a class C network. You need to provide three LANs to each of the administration, marketing, and development departments.

For each of these cases answer the following questions:

How would you divide up your network to satisfy the requirements? Up to how many hosts can there be in each subnet? Show the slash notation for the subnets and the subnet mask. Is the subnet mask the same for each subnet? For a few of the subnets, show the network address and the broadcast address for the subnet. Are these resulting subnets class C networks?

Reference no: EM13380324

Questions Cloud

Decision tree learninga describe the main steps in the : decision tree learninga describe the main steps in the basic decision tree learning algorithm. the table below contains
Concept learninga write an algorithm called find-g to nd a : concept learninga write an algorithm called find-g to nd a maximally-general consistent hypothesis. you can assume the
Well-posed machine learning problemsa what is required to : well-posed machine learning problemsa what is required to dene a well-posed learning problem ?b here are two potential
Message forwarding a computer in the computing department : message forwarding a computer in the computing department has just been turned on. the user starts up their web browser
Question - subnettingconsider the following scenarios -a : question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with
Bull an application on computer a in network 1 is sending a : bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp
1 list the three fundamental security properties and for : 1. list the three fundamental security properties and for each give an example of failure. justify your answer based on
You are working on a new web site for cruzes inc the web : you are working on a new web site for cruzes inc. the web site is aimed at providing travel information to consumers
The aim of this project is to design developand evaluate a : the aim of this project is to design developand evaluate a 2d game for pc. you can choose any type of game you like

Reviews

Write a Review

Computer Networking Questions & Answers

  Consider the following udp header dumpbb400045003aff10a

consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port

  How many trace elements are shown

What objects and counters are displayed in the right pane by default and what are the first five counters listed? What instances are listed?

  Peak network utilization occurs causing the speak activity

You note that peak network utilization occurse at approximately noon, when most of your employees are on lunch break. What could be causing the speak activity?

  Brief description of rfc and its importance to internet

Choose an existing RFC and share it with the class by providing a brief description of the RFC and its importance to the Internet.

  Explain four different kinds of wireless technologies

Explain four different kinds of wireless technologies in a 350- to 700-word paper in APA format. Explain the characteristics and properties of each signal type, and how each can be utilized.

  Describe advantages of having a componentized system

Describe some of the advantages of having a componentized system. For example, what happens if the microwave breaks?

  Benefits and drawbacks of using social networking

What are some benefits and drawbacks of using social networking?

  Question security infrastructure and protocols a pki and

question security infrastructure and protocols a. pki and pgp are two methods for generating and managing public keys

  What is the number of triangles in a complete graph

What is the number of triangles in a complete graph with vertices and what is the expected number of triangles in an Erdos-Rényi graph , a graph on vertices where each edge appears with a probability independently?

  Explaining bayesian belief networks

A quality control manager has used algorithm C4.5 to come up with rules that classify items based on several input factors. The output has two classes -- Accept and Reject. An item classified as Reject is actually good?

  Describe effects of spyware and adware-security of internet

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Insert and remove dns messages into the network

Suppose that an intruder could both insert and remove DNS messages into the network. Give three scenarios showing the problems that such an intruder could cause.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd