Subnets broadcast address

Assignment Help Computer Networking
Reference no: EM13761733

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Don't select a network address that somebody else already selected.

For each of them, I need the following information:

The new subnet mask after the subnetting (10%)
The following information for the four subnets identified:
Subnet's network address (3%)
Subnet's broadcast address (3%)
Subnet's range of available IP addresses (4%)

The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

Reference no: EM13761733

Questions Cloud

Write paper on dantes inftrno and rubaiyat of omar khayyam : Write a paper on the Dante's Inftrno and the Rubaiyat of Omar Khayyam. Discuss what that particular element tells us about Dante's essential beliefs or attitudes.
Security controls that relate to these issues : Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements
Social performance of organizations : The current world economy is increasingly becoming integrated and interdependent; as a result, the relationship between business and society is becoming more complex.
Information technology security for small business : Then write an information security white paper that can be used to market your firm's security consulting services to small businesses in the Washington, DC, area. Your white paper must:
Subnets broadcast address : Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. The new subnet mask after the subnetting
Describe what hacking of memory or hacking of ram means : Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.
Chocolate raw material using a periodic review system : Christian runs a small chocolate shop. He manages his chocolate raw material using a periodic review system. Daily demand has a mean of 100 pounds and standard deviation of 10 pounds.
Create a resource sheet of the twenty individual resource : Create a Resource Sheet of the twenty (20) individual resource names using MS Project which includes the creation of profiles for each individual on the project team
Use productivity arguments to recommend whether : A fast-food restaurant has a drive-through window and during peak lunch times can handle a maximum of 60 cars per hour with one person taking orders, assembling them, and acting as cashier. The average sale per order is $7.00.

Reviews

Write a Review

Computer Networking Questions & Answers

  Formulate ip that determine a set of disks for storage

Formulate an IP that determine a set of disks requiring the minimum amount of storage such that each file is on at least one of the disks.

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

  Discuss the security of the network

Discuss the security of the network and suggest best practices for securing the business network.

  Processor execute between receipt of message

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Solving networking and security issues

Assume you have been hired through a big restaurant called Habibi's. Habibi's has a small network of 20 consumer workstations and a Windows Server 2003.

  Define switched backbone networks

You are the network administrator for a small manufacturing firm that runs Ethernet. You are currently using hubs and repeaters for connectivity but have decided to upgrade to a Layer 2 (L2) switched infrastructure.

  Your manager has assigned you and two other engineers to do

you work for a university that has over 3500 students on campus. the you supports about 600 staff and faculty that are

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Determine the queuing delay for packet

Packet switch receives a packet and determines outbound link to which packet should be forwarded. Determine the queuing delay for packet? Show work.

  Design a high-level conceptual view of a data warehouse dw

design a high-level conceptual view of a data warehouse dw for huffman trucking using microsoftreg visioreg that shows

  Find ip subnet mask and gateway-choosing unused address

After choosing unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd