What ipv-six addresses should you assign to each location

Assignment Help Computer Networking
Reference no: EM131513867

Question: You're the head network administrator for a large manufacturing enterprise that's completing its support for IPv6. The company has six major locations with network administrators and several thousand users in each location. You're using a base IPv6 address of 2001:DB8:FAB/48 and want network administrators to be able to subnet their networks however they see fit. You also want to maintain a reserve of address spaces for a possible 6 to 10 additional locations in the future. Each network administrator should be able to construct at least 200 subnets from the addresses you supply, and each location should have the same amount of available address space. What IPv6 addresses should you assign to each location? When constructing your answer, list each location as Location 1, Location 2, and so forth.

Reference no: EM131513867

Questions Cloud

Total quality management : Imagine your company is being considered for subcontracting the management of a project because of your firm's excellent human resource and quality management.
Define the osi model : Matching OSI Model Descriptions to Layer Numbers Time Required: 10 minutes Objective: Match the OSI model layer descriptions to the correct layer numbers.
Evaluate how a business operates : Evaluate how a business operates and make recommendations for improvement. As a consultant you will analyze how and why a business is struggling.
What must do to allow these computers to access internet : You must install 125 computers for a new business that wants to run TCP/IP and have access to the Internet. The ISP in town will assign you only four public IP.
What ipv-six addresses should you assign to each location : You're the head network administrator for a large manufacturing enterprise that's completing its support for IPv6.
Develop a customer service training implementation plan : Develop a customer service training implementation plan and determine the method of training.Develop a survey to collect feedback from the employees.
List the subnet mask and the first four subnet addresses : As the network administrator for a growing ISP, you want to make efficient use of your network addresses.
Define the properties of ipconfig and ping : Working with IPv6 Time Required: 15 minutes Objective: Use ipconfig and ping with IPv6 and change an IPv6 interface address.
Define the properties of ipv-six : Setting IPv6 Static Addresses Time Required: 10 minutes Objective: Set IPv6 static addresses.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain a multi-layer feed forward neural network

Explain why a multi-layer feed forward neural network with sigmoidal output units cannot learn the simple function y = 1/x, with x ? (0,1).

  Write a report on the network management tools associated

In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management.

  1 identify and discuss at least three major evolutionary

1. identify and discuss at least three major evolutionary steps in digital computingnetworking experienced in major

  You are to design a network

You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, and assign IP addresses to the appropriate devices. You will also be required to implement security..

  Summarize pros of using either a purely cellular network

Summarize the pros and cons of using either a purely cellular network or a purely fixed line network in a 2-4 page paper. At the end of your paper, write 1-2 paragraphs making a recommendation for a new company.

  Advantages and disadvantages of deploying a wlan

discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and risks of three security methods, then identify and justify the best approach for securing a WLAN

  Run the algorithm developed for a difs

Run the algorithm developed in the previous exercise for a DIFS whose attractor is the Sierpinski gasket. The code is presented in Table.

  What ip address will be the destination on a broadcast

What IP address will be the destination on a broadcast message sent to your subnet?

  Analyze the performance of the http and ethernet protocols

For this assignment you will analyze the performance of the HTTP and Ethernet protocols with Riverbed Modeler in a LAN depending on the number of client nodes.

  Create acl to meet the requirements of the security demands

Create ACL to meet the requirements of the security demands and Modify existing ACL to meet additional security requirements

  Convert hand-drawn diagram to a fully labeled visio diagram

Convert the hand-drawn diagram to a fully labeled Visio diagram. Using the IP addresses provided by your instructor, hand-draw a network diagram of your network configuration.

  Write a pseudocode for an algorithm to run the mlp

Algorithm presents the algorithm to run the single-layer perceptron network. Write a pseudocode for an algorithm to run the multi-layer perceptron (MLP) network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd