Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

IP addressing and SubnettingQuestion 1 - You have been assigned the 154.182.11.0/24 network address block. (10Marks)

Define an extended network prefix that allows the creation of 44 Hosts on each subnet.

a) List the network prefix and the equivalent Subnet Mask 

b) What is the maximum number of valid Hosts that can be assigned to each subnet AND the maximum number of subnets that can be defined?

c) List the subnets with their prefix and subnet mask below

d) List the first and last usable IP address in the second subnet. 

e) What is the broadcast address of the first and second subnet? 

Question 2 - You have been assigned the 12.0.0.0/8 class A network address block to deploy a Large Corporate network  Subnet this network to be able to support approximately 242 networks (Subnets),

a) List the network, prefix and equivalent subnet mask.

b) What is the maximum number of valid Hosts that can be assigned to each subnet AND the maximum number of subnets that can be defined?

c) List the first 4 subnets with their prefix and subnet mask below 

d) List the first and last usable IP address in the second subnet. 

e) What is the broadcast address of the first and second subnet? 

Question 3 (VLSM) - You have been assigned the 141.132.48.0/22 network address block to deploy a network, using VLSM, subnet the above range to fulfill the following concurrent (All requirements must be met with no address re-use) requirements

2 networks that can support at least 182 devices/users
2 networks that can support at least 113 devices/users
2 networks that can support at least 55 devices/users
4 networks with 25 devices/users.

a) What is the network prefix used to support the first requirement, 2 networks with 182 devices / users? List the networks with their prefix and subnet mask 

b) What network prefix is used to support the second requirement, 2 networks with 113 devices/users? List the networks with their prefix and subnet mask 

c) What is the prefix used to support the last requirement, 2 networks with 55 devices/users? List the networks with their prefix and subnet mask 

d) What is the prefix used to support the last requirement, 4 networks with 25 devices/users? List the networks with their prefix and subnet mask 

e) What is the supernet (Summary Route) that can be used to represent each of the above subnet groups? (One supernet/route with prefix/Mask for each requirement group a, b, c and d) 

Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network that can support up to 100 users, a wireless network that can support up to 50 users, a network to support servers and printers that can support up to 30 devices. In addition to these requirements, they also have a large data centre that requires at least 75 networks that can support 200 Devices per subnet. Your design should also take into account addressing for the point to point links between the datacentre and the remote offices.

Using the 132.136.0.0 /16 Network address block, design a structured addressing plan that addresses these requirements, take into account summarization of networks for each location and identify how much address space remains for future expansion in each block of addresses.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91867493
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Consider the following series of paymentsyear 0 20year 1

Consider the following series of payments: Year 0: 20 Year 1: 30 Year 2: 40 Year 3: 10 Year 4: 5 Using an interest rate of 10%: a. What is the present value of this series of payments? b. What is the future value of this ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As