What is the first address of the first subblock

Assignment Help Computer Network Security
Reference no: EM132176686

Question: Network

1. An organization is assigned the IP address 14.24.75.0/26. The organization needs two subblocks: the first subblock with 15 devices, and the second one with 10 devices. Address space of the first subblock follows the address space of the second subblock.

a) What is the first address of the first subblock?

b) What is the last address of the first subblock?

c) What is the total number of addresses in the first subblock?

d) What is the first address of the secondsubblock?

e) What is the last address of the secondsubblock?

f) What is the total number of addresses in the second subblock?

g) What is the network address of the first subblock?

h) Can we add a third subblock with 44 devices? Explain.

Show or explain how to get your answers. Final answers should be in decimal dotted notation.

*Do not provide any drawings/figures in your answers. Otherwise your work is awarded a zero mark.

2. Based on the figure below, fill out the following routing tables using OSPF routing protocol.

Destination Network

Next Router

Cost

N1

 

10

N2

 

4

N3

 

6

N4

 

9

Destination Network

Next Router

Cost

N1

R2

 

N2

R2

 

N3

----------

 

N4

----------

 

 

 

 

 

3. Reliability can be achieved by adding error control services to the transport layer. What are the responsibilities of the error control at the Transport layer? List threeresponsibilities.

4. There are different transport layer protocols including Stop-and-Wait, GBN, and SR.

1) How efficiency is improved in GBN compared to Stop-and-Wait?

2) How efficiency is improved in SR compared to GBN?

Information related to above question is enclosed below:

Attachment:- Network.rar

Reference no: EM132176686

Questions Cloud

Describe the security features-encryption-digital signatures : Describe the security features, encryption, EDI, digital signatures, etc. that you are looking for in an enterprise solution
Workplace health and safety-establish safety committee : The course is Workplace Health and Safety. Establish a Safety Committee.
What were billy beanes qualities : What were Billy Beanes’ qualities, which made him successful as a leader? And what do you think most accounts for his success in being a manager?
What are cultural norms that govern the organization : Financial performance measures are vitally important to assessing corporate performance.
What is the first address of the first subblock : An organization is assigned the IP address 14.24.75.0/26. The organization needs two subblocks: the first subblock with 15 devices, and the second.
Describe two strategies to increase employee engagement : What are potential Threats against Shands Hospital? Describe two strategies to increase employee engagement.
Examine the qfds house of quality : Examine the QFD's House of Quality and describe how the 'customer needs' and 'technical requirements' help determine the 'design targets'.
What is meant by creating shared value : What is Nestle's main guiding principle on how to do business? What is meant by creating shared value. Please explain
Discuss the use of pallets in a shipping system : What considerations must be taken when deciding whether or not a pallet is required for a specific shipment of boxes?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Examine the current values of all environment variables

Examine the current values of all environment variables on a system you use. If possible, determine the use for some of these values.

  About inf 620

How well did the systems approach work for the initial stages of the Primis system?What could the team have done differently in the preliminary stages? How might this have affected the endresult?

  What is the actual running environment of tool

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Create a meaningful and interesting lesson on cyberwarfare

Your goal is to use concrete examples and information and create a meaningful and interesting lesson on cyberwarfare. You have to persuade me that you have indeed watched the video and understood the gravity of the situation.

  Explain the ways you can accomplish the request efficiently

Explain the ways you can accomplish the request efficiently. Do you think network administrators should have the final say with regard to security?

  Describe an ecommerce network and its application

Describe an ecommerce network and its application. Does a properly installed and maintained firewall provide adequate defense against intrusion?

  Define social engineering security threats

Select an article relevant to current social engineering threats. Topics could include, but are not limited to, phishing, quid pro quo, or diversion theft. Research and examine current information security systems designed to address social engine..

  Responsibilities of a chief information security officer

What are the responsibilities of a chief information security officer? Where and how does the person occupying this position fit into a large enterprise?

  What issues can arise during admission of digital evidence

The DQ response should be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!

  Compare two-tier client-server system configuration

Compare 2-tier and 3-tier client/server system configurations and analyze how they are different. Based on your comparison, suggest the real life scenarios which are suitable for each of them and justify your reasoning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd