What is the first address of the first subblock

Assignment Help Computer Network Security
Reference no: EM132176686

Question: Network

1. An organization is assigned the IP address 14.24.75.0/26. The organization needs two subblocks: the first subblock with 15 devices, and the second one with 10 devices. Address space of the first subblock follows the address space of the second subblock.

a) What is the first address of the first subblock?

b) What is the last address of the first subblock?

c) What is the total number of addresses in the first subblock?

d) What is the first address of the secondsubblock?

e) What is the last address of the secondsubblock?

f) What is the total number of addresses in the second subblock?

g) What is the network address of the first subblock?

h) Can we add a third subblock with 44 devices? Explain.

Show or explain how to get your answers. Final answers should be in decimal dotted notation.

*Do not provide any drawings/figures in your answers. Otherwise your work is awarded a zero mark.

2. Based on the figure below, fill out the following routing tables using OSPF routing protocol.

Destination Network

Next Router

Cost

N1

 

10

N2

 

4

N3

 

6

N4

 

9

Destination Network

Next Router

Cost

N1

R2

 

N2

R2

 

N3

----------

 

N4

----------

 

 

 

 

 

3. Reliability can be achieved by adding error control services to the transport layer. What are the responsibilities of the error control at the Transport layer? List threeresponsibilities.

4. There are different transport layer protocols including Stop-and-Wait, GBN, and SR.

1) How efficiency is improved in GBN compared to Stop-and-Wait?

2) How efficiency is improved in SR compared to GBN?

Information related to above question is enclosed below:

Attachment:- Network.rar

Reference no: EM132176686

Questions Cloud

Describe the security features-encryption-digital signatures : Describe the security features, encryption, EDI, digital signatures, etc. that you are looking for in an enterprise solution
Workplace health and safety-establish safety committee : The course is Workplace Health and Safety. Establish a Safety Committee.
What were billy beanes qualities : What were Billy Beanes’ qualities, which made him successful as a leader? And what do you think most accounts for his success in being a manager?
What are cultural norms that govern the organization : Financial performance measures are vitally important to assessing corporate performance.
What is the first address of the first subblock : An organization is assigned the IP address 14.24.75.0/26. The organization needs two subblocks: the first subblock with 15 devices, and the second.
Describe two strategies to increase employee engagement : What are potential Threats against Shands Hospital? Describe two strategies to increase employee engagement.
Examine the qfds house of quality : Examine the QFD's House of Quality and describe how the 'customer needs' and 'technical requirements' help determine the 'design targets'.
What is meant by creating shared value : What is Nestle's main guiding principle on how to do business? What is meant by creating shared value. Please explain
Discuss the use of pallets in a shipping system : What considerations must be taken when deciding whether or not a pallet is required for a specific shipment of boxes?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd