The new subnet mask after the subnetting

Assignment Help Computer Networking
Reference no: EM13761000

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Don't select a network address that somebody else already selected.

For each of them, I need the following information:

The new subnet mask after the subnetting (10%)

The following information for the four subnets identified:

Subnet's network address (3%)

Subnet's broadcast address (3%)

Subnet's range of available IP addresses (4%)

The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

Reference no: EM13761000

Questions Cloud

Subject of a merger or joint venture between two companies : Discuss the subject of a merger or joint venture between two companies. Explain the reason for the success or failures of companies association with each other.
Advantages and disadvantages of restricting user interfaces : Explain the advantages and disadvantages of restricting user interfaces. (User interfaces can often be restricted, limiting the user's ability to navigate to other areas of the system, or out of the system.
Explain how organizational culture could affect the failure : Explain how organizational culture could affect the failure or success of a joint venture or strategic alliance between two companies.
What is the economic order quantity for stein beer : The manager of the Quick Stop Corner Convenience Store (which never closes) sells four cases of Stein beer each day. Order costs are $8.00 per order, and Stein beer costs $.80 per six-pack (each case of Stein beer contains four six-packs). Orders arr..
The new subnet mask after the subnetting : Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Don't select a network address that somebody else already selected. For each of them, I need the following information: The new subnet ma..
Suppose china begins in steady state : Suppose China begins in steady state. To keep the model simple, let us assume the sole result of these technology transfer policies is to increase the productivity factor by a large and permanent amount, one time. Answer the following questions:
Determine the number of b machines to produce parts : Among many operations, Choco, Co. must produce 100,000 parts X and 200,000 parts Y per year. The standard time for parts X and Parts Y on machine A is 6 min., respectively. The standard time to process part X and to process part Y on machine B are 6 ..
Research at least two major fraud cases : Using the Internet or Strayer databases, research at least two major fraud cases that were a result of financial statement fraud.
What is the function of the terrorist threat integration : What is the function of the Terrorist Threat Integration Center? Explain and what are the capabilities and importance of the DHS Counterterrorism Center? Explain in detail.

Reviews

Write a Review

Computer Networking Questions & Answers

  Adding four servers to network to share file

Manager would like to add four servers to network so employees can share files. Manager would also like to permit VPN access for her employees so they can work remotely.

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem -

  Describe what is meant by cybersecurity architecture

Describe what is meant by Cybersecurity Architecture. List and describe the principles that must be supported.

  Adoption of an enterprise security framework

How is the adoption of an enterprise security framework helpful for developing an enterprise security policy and how does Donn Parker's model compare with the X.805 framework?

  Creating a domain model

Creating a Domain Model, Company Beta has two main locations that contain IT support. Their Boston, MA location contains the executive management team, and the CIO is at this location. Their second main location is in Toronto, Canada

  Why is it critical to label patch cables-ports and data jack

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  Application at work transmits data records

Contrast synchronous and asynchronous connection. Is it more efficient to use synchronous connection or an asynchronous connection? What speed transmission line is necessary to support either type of connection? Show all your work.

  How many subnets are created

What are the current advantages and disadvantages of packet-switching compared to circuit switching?

  Computer games

Use the Internet to locate a current list of the top PC video games. Research a game that you would like to run on your computer. What are the system requirements for the game?

  Program to compute employee-s weekly pay

Write down the program which reads the employee's number from keyboard, number of hours worked and the hourly rate of pay.

  Discuss functionality of component of network

Discuss the functionality of each component and the role the components play in the operation of the network and the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd