You are tasked with designing a network for a company that has offices in four locations: Kentucky, Ohio, Michigan, and Indiana. Each location will be represented by one router and an accompanying PC. The four routers will have point-to-point connections with one another. Design a subnetting plan for this network that meets the following requirements:   ⚫ Use the Class C private network 192.168.1.0 for your point-to-point connections. These subnets will all have the same mask. When selecting one, consider the fact that these subnets only need two usable IP addresses; find the smallest mask that will support this.   ⚫ Using the Class A private network 10.0.0.0, create a subnetting scheme that uses the least number of IP addresses possible for the following number of hosts in each location:   。 Kentucky: 500   o Ohio: 2000   o Michigan: 1000   o Indiana: 250   ⚫ When dividing the 10.0.0.0 block, please make sure you start from the location with the largest host count to the one with the smallest. For example, the mask that you use for the Ohio network should be used first, followed by Michigan and so on. This reduces the number of IP addresses you use, which is a requirement for this assignment.   Q1.1: Use the following table to create your VLSM design. Please use CIDR notation for your subnet masks. Some cells have been filled out for you, though you can start plotting the Class C subnets on any serial point-to-point connection pair you want.   LOCATION   SUBNET MASK   SUBNET ID   LOCAL AREA NETWORKS   Ohio   Michigan Kentucky   Indiana   SERIAL POINT-TO-POINT CONNECTIONS   FIRST USABLE HOST ADDR.   LAST USABLE HOST ADDR.   10.0.0.1   Kentucky to   192.168.1.0   BROADCAST ADDR.   Ohio   Ohio to   Michigan   Michigan to   Indiana   Indiana to   Kentucky   192.168.1.1

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

You are tasked with designing a network for a company that has offices in four locations: Kentucky, Ohio, Michigan, and Indiana. Each location will be represented by one router and an accompanying PC. The four routers will have point-to-point connections with one another. Design a subnetting plan for this network that meets the following requirements:

 

⚫ Use the Class C private network 192.168.1.0 for your point-to-point connections. These subnets will all have the same mask. When selecting one, consider the fact that these subnets only need two usable IP addresses; find the smallest mask that will support this.

 

⚫ Using the Class A private network 10.0.0.0, create a subnetting scheme that uses the least number of IP addresses possible for the following number of hosts in each location:

 

。 Kentucky: 500

 

o Ohio: 2000

 

o Michigan: 1000

 

o Indiana: 250

 

⚫ When dividing the 10.0.0.0 block, please make sure you start from the location with the largest host count to the one with the smallest. For example, the mask that you use for the Ohio network should be used first, followed by Michigan and so on. This reduces the number of IP addresses you use, which is a requirement for this assignment.

 

Q1.1: Use the following table to create your VLSM design. Please use CIDR notation for your subnet masks. Some cells have been filled out for you, though you can start plotting the Class C subnets on any serial point-to-point connection pair you want.

 

LOCATION

 

SUBNET MASK

 

SUBNET ID

 

LOCAL AREA NETWORKS

 

Ohio

 

Michigan Kentucky

 

Indiana

 

SERIAL POINT-TO-POINT CONNECTIONS

 

FIRST USABLE HOST ADDR.

 

LAST USABLE HOST ADDR.

 

10.0.0.1

 

Kentucky to

 

192.168.1.0

 

BROADCAST ADDR.

 

Ohio

 

Ohio to

 

Michigan

 

Michigan to

 

Indiana

 

Indiana to

 

Kentucky

 

192.168.1.1

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Types of Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education