Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

You will be given an IP address block 183.200.100.0/24. Your task is to devise a feasible network addressing scheme for a large company with a number of geographically distributed offices around the country. There are five locations, with the number of computers at each site 47, 9, 25, 15 and 30 respectively. The location with 47 hosts is the head office, to which every other branch has a wide area network connection through a serial link.

Your solution should cover the following major technical aspects.

- Firstly, you should show the detailed design procedure of the subnetting scheme.

- Secondly, for each subnet you need to identify and present the subnet details: network address, subnet mask, number of host and network bits, broadcast address, and range of usable addresses.

- Thirdly, you should illustrate the network interconnection topology on a diagram, including the network devices required, a number of hosts in each of the five locations, and the network address on each subnet.

Furthermore, the report should follow formal academic style as described in Appendix 1 Report Format, where additional requirements are also listed.

Appendix 1 - Report Format

- Each small group should write their own report. "Plagiarism is considered to be an act of fraudulence and an offence against University discipline. Alleged plagiarism will be investigated and dealt with appropriately by the University." Each group member should actively contribute to the work.

- The report should be handed in by Friday 22nd April 2016. Any report submitted late will be penalised under the usual rules.

- The assignment is to be submitted electronically via the Moodle TurnItIn link. You should also send an electronic copy to the module coordinator. The above submission deadline applies to both electronic copies.

- A minimum length for the report would be five (5) A4 pages of text (single line spacing, 12 point text, reasonable margins).

- The overall report should be typed and contain

1. Summary (or Abstract)
- Should show at a glance what is in the report.

2. Introduction
- What the report is about.
- Why subnetting is required, especially in the given context?
- What are the major steps in designing a subnetting scheme?

3. A well ordered series of sections relating to the three major technical aspects required for your solution.

4. Discussion and conclusion
- Can both fixed and variable length subnet mask schemes be applicable in the given scenario? Why?
- Any reflection on subnetting in this assignment and beyond. Bind the sections together in a good overview.

5. Referencing
To support your writing or to avoid plagiarism, you may need to place a list of numbered references, if any, at the end of your report. Remember to explicitly refer to all references using the Harvard system in your main text.

6. Only include your Banner numbers in the file you submit; not your actual names as marking is intended to be anonymous.

7. Each group should submit only ONE file in the upload link provided.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91955089

Have any Question?


Related Questions in Computer Network & Security

Question a signal travels through an amplifier and its

Question : A signal travels through an amplifier, and its power increased and becomes doubled. Then calculate amplification for this condition 2 Discuss about the TCP/IP PROTOCOL SUITE and Principles of Protocol Layering ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Suppose there is no inflation and an insurance company

Suppose there is no inflation and an insurance company offers a contract that would pay $500,000 with certainty 50 years from now. What is the most that this contract would be worth today if: 1. The rate of interest is 7 ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As