Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Project : Calculate Subnets

1. Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the new LAN. You've determined that you need 50 subnets for the class B network beginning with the network ID 172.20.0.0. How many host bits will you need to use for network information in the new subnets?       

2. After the sub netting is complete, how many unused subnets will be waiting on hold for future expansion, and how many possible hosts can each subnet contain?

3. What is the new subnet mask?

4. Complete the following table:                                                                                                                          

Subnet number

Extended network prefix

Range of host addresses

Broadcast address

1

172.20.0.0

172.20.0.1 through 172.20.3.254


2

172.20.4.0

                 through 172.20.7.254


3


172.20.8.1 through

172.20.11.255

4




5




---




50



 

5. What is the CIDR notation for this network?

6. What is the broadcast address of the subnet for the host at 172.20.6.139?           

7. Is the host at 172.20.11.250 on the same subnet as the host at 172.20.12.3? how do you know?     

Need answer for this question

Rework the scenario in Project 10-1 using your selected subnetting calculation method. Did you come up with the same numbers? What differences do you notice in the method presented in this book as compared with the method you selected?   

5. Rework the scenario in Project 10-1 using your selected Did you come up with the same numbers? What differences do you notice in the method presented in this book as compared with the method you selected?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93096699

Have any Question?


Related Questions in Computer Engineering

Short answer1 what is the difference between a logic error

Short Answer 1. What is the difference between a logic error and a syntax error? 2. Define and discuss the difference between unary, binary and ternary operators. Give an example of each. 3. When must you use curly brace ...

Reflective journal entryneed reflective journal entry on

Reflective Journal Entry Need Reflective Journal Entry on writing a Background Assignment The Topic;: One of the most common questions that new students learning programming students ask is what programming language shou ...

Need help with a java program that takes two arrays a and b

Need help with a Java program that takes two arrays a and b of length 5 storing int values, and returns the dot product of a and b. That is, it returns an array c of length n such that c[i]=a[i]*b[i].

Simulate a dispatcher using a priority queue system in cnew

Simulate a dispatcher using a priority queue system in C. New processes are to be entered using a GUI with priority included (numbering should be automatic). Processes are also to be terminated by GUI command. Context sw ...

Identify and evaluate at least three considerations that

Identify and evaluate at least three considerations that one must plan for when designing a database. Suggest at least two types of databases that would be useful for small businesses, two types for regional level organi ...

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Discuss the importance functionality and role of a

Discuss the importance, functionality, and role of a GateKeeper or VoIP server in a VoIP -deployed network?

Discuss how a successful organization should have the

Discuss how a successful organization should have the following multiple layers of security in place for the protection of its operations: Information security management. Data security Network security

Assignment write an 8-page apa formatted paper on a

Assignment: Write an 8-page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how y ...

Risky business how can us companies protect their digital

Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the above question. Your audience will be attendees at a conference f ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As