Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

You have been allocated a class A network address of 29.0.0.0. You need to create at least 20 networks and each network will support a maximum of 160 hosts. Would the following two subnet masks Work?
255.255.0.0 and or 255.255.255.0
You are given the position as Network Administrator at Richfield Institute of Technology and using Windows server 2012. Explain how you would assign a static IP address to a computer.
Create a worksheet that compares the type, specifications, and the price for each
laptop, as well as the cost to add an extended warranty. Use the concepts and
techniques learned to calculate the average price of a laptop and the average cost of an
extended warranty and to format the worksheet. Include a chart to compare the
different laptop costs.
1. Monitoring an unsecure web server connection
1. Create a custom web page showing your full name and
student id
2. Start Wireshark
3. Open a browser and connect to the web site (not from a file
manager, you should connect it like
http://localhost/mywebpage.htm etc)
4. Stop Wireshark, find the related Http traffic, do “follow TCP
stream”
5. Take a full of screenshot (task1-SS) containing (mark) “your
full name and student id” on the screen output
2. Monitoring a secure web server connection
1. Create a certificate on your Operating System
2. Install the certificate onto your Web Server
3. Take a full of screenshot (task1-SS) containing the certificate
installed onto your Web Server
4. Start Wireshark
5. Open a browser and connect to the web site (not from file
manager, you should connect like
https://localhost/mywebpage.htm etc) via secure connection
6. Stop Wireshark, find the related Https traffic, do “follow TCP
stream”
You had been appointed as Chief Technology Officer to a local financial firm. Your first
assignment is to design a network for your company. The firm’s hired 150 full-time and 18
part-time employees in 5 divisions. The LAN consists of 68 desktop PCs, 100 laptops and
some peripheral such as printers. At the firm, a router connects the LAN to a local ISP
through T1 link. Connected to the routers is five switches positioned at different locations
around the building. Each network client connects to the nearest switch. Every client is
assigned a static IP address based on the of addresses the firm leases from the ISP. You will
need to table your network design to the company board of director that already mentioned
their concern about the design will allow this company to increase the size of the network.

1. Propose the network structure of the firm. Please propose the firm’s business structure
according to your imagination. [20 marks]

2. Propose the firm’s client IP assignment. [10 marks]
Google chrome is a search again .true or false
You work for a small company that wants to separate the Human Resource, Finance and Administrative staff departments into different networks. Your supervisor has tasked you with designing a network and private addressing scheme to support both IPv4 and IPv6. The Human Resource department needs at least 75 devices and the Finance department at least 10 and the Administrative Staff needs addresses for 52 devices. Configure addressing to reflect this need and conserve addresses (Use VLSM for the IPv4 networks). Subnet the following.
192.55.16.0/22
2001:db8:cafe:a9::/64
The four pillars of integrating ict in teaching and learning
The question arises as to whether it is possible to develop a program that can analyze a piece of software to determine if it is a virus. Consider that we have a program D that is supposed to be able to do that. That is, for any program P, if we run D(P), the result returned is TRUE (P is a virus) or FALSE (P is not a virus). Now consider the following program:

Program CV :=
{. . .
main-program :=
{if D(CV) then goto next:
else infect-executable;
}
next:
}
In the preceding program, infect-executable is a module that scans memory for executable programs and replicates itself in those programs. Determine if D can correctly decide whether CV is a virus.
company in the Netherlands that makes navigation devices collects location data from the devices to provide real-time services to its customers. It also provides anonymous statistical data to government agencies to improve roads and traffic flow. Unknown to the company and its customers, the police used the data to choose sites for traffic cameras to catch speeders. Was this a privacy violation? Why or why not
LATEST TUTORIALS
APPROVED BY CLIENTS