Specification below subnet the network

Assignment Help Basic Computer Science
Reference no: EM131853038

You are given the 10.10.10.64/24 network. Using the specification below subnet the network.

  • Lab A- 50 hosts
  • Lab B -20 hosts

LAB A

Network Address

Subnet Mask

CIDR

Broadcast Address

Lab B

Network Address

Subnet Mask

CIDR

Broadcast Address

  • G0/0 Lab Router -Should be assigned the first available IP address from Lab A
  • G0/1 Lab Router- Should be assigned the first available IP address from Lab B
  • PC Lab A- Should be assigned the last available IP address from Lab A
  • PC Laptop A- Should be assigned any unused IP address from Lab A
  • PC Lab B- Should be assigned the last available IP address from Lab B
  • PC Laptop B- Should be assigned any unused IP address from Lab B

Complete the following chart with the above information

Device/Port

IP Address

Subnet Mask

CIDR

G0/0 Lab Router

G0/1 Lab Router

PC Lab A

PC Laptop A

PC Lab B

PC Laptop B

Reference no: EM131853038

Questions Cloud

Creating a quiz that tests students knowledge : Fergus is creating a quiz that tests students' knowledge on different topics*, such as:
Suppose you are on a job interview at google : Suppose you are on a job interview at Google, and you are asked to describe the FFT and why it is important. What is your answer?
Analyse the factors you believe led to the problems : To what stage in its life cycle does the assembly team seem to have regressed? Is the trouble Elizabeth Jennings' fault? If not, then whose fault is that?
Compute the scolers income tax : Mr. and Mrs. Scoler sold commercial real estate for $685,000. Their adjusted basis at date of sale was $544,700 ($596,600 cost - $51,900.
Specification below subnet the network : You are given the 10.10.10.64/24 network. Using the specification below subnet the network.
List each presenter and what transpired : Describe and Analyze what EACH of the entrepreneurs' were presenting and what kind of deal did they got from the Sharks (if they even got one).
What are the cons of re-sizing your images using html : What are the cons of re-sizing your images using HTML/CSS? How does it affects the overall performance of your web page? Explain your answer.
What is minimum required distribution of kim : Kim has worked for one employer her entire career. While she was working, she participated in the employer's defined contribution plan [traditional 401(k)].
Provide a brief summary of the company - JB-HI-FI limited : Provide a brief summary of the company. Include details JB-HI-FI such as industry sector, primary activities, recent performance (300 words maximum)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How spki be augmented to support policy

Consider a policy that, for reasons of separation of duties, does not allow an entity to exercise the rights it may grant (delegate) to others. How could SPKI be augmented to support such a policy?

  Languages are there in computer science

How many languages are there in computer science? What are the differences?

  Phone numbers of the departments for those employees

Display the list of names and phone numbers of the departments for those employees with salaries more than salary of Matt Joe. (Use SYS.EMPLOYEE).

  Use m for the number of miles driven

Hans is going to rent a truck for one day. there are two companies he can choose from, and they have the following prices.

  Function in programs to print upside down triangles

Apply function in programs to prints triangles, upside down triangles, and diamond.

  What is the purpose of using a document naming convention

What is the purpose of using a document naming convention? Describe at least three types of information that the file name could contain.

  Five core workflows of the unified process

What are activities in the five core workflows of the unified process?

  Convert the binary numbers to their decimal equivalents

Directions: Convert the following binary numbers to their decimal equivalents.

  Significance and benefit of having different classes

significance and benefit of having different classes of networks?

  Results of password cracker designed for operating system

Download a password cracker designed for your operating system. Run the cracker on your system. Explain the results from the cracker.

  Fix it to allow us to extract the text table

Consider whether you want to drop font>s or close them properly. Once you have fixed the problem so that the tag contains the text table, pass your corrected HTML to html Parse(). You may want to use a text connection to do this rather than writin..

  Contemporary enterprises have a wide array of network

Contemporary enterprises have a wide array of network and platform security tools from which to choose, and as we have seen in this course there is substantial overlap in the capabilities of different categories of tools such as firewalls, IDS, anti-..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd