A+ Guide To It Technical Support
10th Edition
ISBN: 9780357108291
Author: ANDREWS, Jean.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 7, Problem 6TC
Explanation of Solution
Given:
Trouble in getting good Internet services at a distant place which has a bad satellite service.
To find: The Internet service that should be used for the home network...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Scenario 1:
As a network engineer, you are hired to design a local area network for a small business called TND which is a Sydney-based company and has about 30 employees. For security reasons, private IP addresses will be used for TND’s LAN. An IP address should be assigned automatically when a user plugs a workstation/laptop into the network. Email and Internet access must be provided so users can use Google and download files from the Internet. Answer following questions:
1. Use a diagram to show your network design. Show all network devices that are needed to support TND’s networking requirements.
You can hand-draw, then take a photo and insert it into your answer sheet.
Company XYZ is planning to build a new branch as a part of its expansion plan. The network department is responsible of designing and implementing the
network that will fulfill the new branch requirements. The new branch is currently having 3 departments
1- Finance department, with 70 employees.
2- Management department, with only 15 employees.
3- Purchasing department with 50 employees.
Part 1: The internet service provider allows you to use (202.10.0.0\24) as an address range for your network.
1- To which IP class dose that IP address range belongs to?
Class C
2-
Calculate the maximum number of IP addresses that can be used from the given IP address range.
232-24 = 256-2=254 IP address
Your IT manager has assigned the network subnetting task to you. You are required to do the network subnetting and fill the table below:
Subnet number
Subnet Address
Subnet mask
Bread cast address
Last usable host
address
First usable host
address
202.10.0.1
202.10.0.129
255.255.255.128
255.255.255.192…
Scenario 1:
As a network engineer, you are hired to design a local area network for a small business called TND which is a Sydney-based company and has about 30 employees. For security reasons, private IP addresses will be used for TND’s LAN. An IP address should be assigned automatically when a user plugs a workstation/laptop into the network. Email and Internet access must be provided so users can use Google and download files from the Internet. Answer following questions:
1. Mention all protocols (e.g., application protocols, network protocols, etc.) that are supported in TND’s LAN.
Chapter 7 Solutions
A+ Guide To It Technical Support
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Your computer has the following IPv4 address at dotted decimal form:10.A. A. A / Bwhere A is your birth date + 200 (between 201 and 231) and B = 10 + your birth month. (B = 11 if you areborn in January, and B = 22 if you are born in December.) What is the network address and the broadcast address of your network? How many host computers can you have in this network?arrow_forwardYou need to send a document from one computer to another, and you want it to be encrypted. Because the target computer is on a different network, data must pass via one or more routers. Ethernet is the network technology on your network, while Wi-Fi is the network technology on the target network. Should this document transfer function based on what you've learnt about networking? Why do you think that is? In the italicized sections of this description, which levels of the OSI model are involved?arrow_forwardSay it's Monday morning and you're the first person at BMCC to check their email. BMCC's website probably doesn't know your MAC address since it can't tell which computer you're using to view your emails. Show me how the ARP protocol finds out which computer on the LAN will be receiving data from the Internet and how it does it. The transition to IPv6 addresses for around 30 percent of Internet traffic is now complete, after 22 years. If you examine the TCP and IP headers for IPv4 to IPv6 addressing, you will see that the Maximum Transmission Unit (MTU) of Ethernet packets is an issue for the migration.arrow_forward
- One evening when Ahmed started work, Bill was talking about the many ways to download pirated music, movies, and books from the library’s system. “It is very easy and untraceable. I just route my requests to a professor’s IP address, then send it to several other faculty IP addresses so it is difficult to trace. I then go to one of the library computers, log in as someone else, put in a CD or Blu-Ray DVD, and burn what I want. The people’s computers I route through get a message that someone logged into their account, but the IT guys just tell them it’s no big deal and it happens all the time. IT never really looks into it because of the many systems and IP addresses on campus. Are Bill’s actions an ethical issue, a legal issue, or both? Explain your reasoning.arrow_forwardQuestion: Answer the following questions: The IP address is based on your student number SN as follow: The first byte is 198. The second byte is the 6th and 7th numbers of your SN, for example, if your SN is 438051221, the second byte is 12. The third byte is the 8th and 9th numbers of your SN, for example, if your SN is 438051221, the third byte is 21. • The forth byte is 0. 1. Consider a company which owns a license of this IP address. a. Write this IP address, for example 198.12.21.0 b. How many hosts at the maximum can be in this network? c. What are the first and the last addresses given to hosts? 2. The company likes to divide its network into 10 subnets. a. Determine the necessary number of bits borrowed. b. Determine the new subnet mask. c. Determine the maximum number of hosts in each subnet. d. Fill the following table Subnet Subnet First host Last host Broadcast address address address address 2 3 4 5 6. 7 8 9 10arrow_forwardAsked this before but the Marketing Department Requires 61 hosts. Dont understand why all the answers I've seen keep saying it requires 28 hosts. Addressing Schemes – SubnettingThe Iconic Production is a company newly established in the vicinity of Midrand in the city of Tshwane.The company has just hired you as their network engineer. You are told that the company currently hasthree departments: HR, Marketing and Operations. You are given the IP address: 192.168.5.0/24. Youare required to subnet it as efficiently as possible in order to meet the requirements for the followingnumber of hosts in the company’s network:• HR department: 13 hosts• Marketing department: 61 hosts not 28 • Operations department: 28 hosts• Link HR-M: 2 addresses• Link HR-O: 2 addresses• Link M-O: 2 addresses For each of the subnets, determine:• The Network ID• The subnet mask• The total number of hosts addresses• The number of usable host addresses• The range of usable host addresses• The broadcast addressShow…arrow_forward
- Three students, including A, B, and C, share the same apartment. They have been assigned with 3 IP addresses, respectively. However, there is only one Ethernet cable outlet in the apartment. Therefore, they decided to buy a device to connect three computers to the outlet. Suppose none of them can use port mirroring if the device is a switch, please identify all statements that are true below. Question 11 options: If the device is a hub, A can sniff B's and C's packets since the hub will broadcast all packets to all ports. If the device is a switch, A cannot sniff B's and C's packets without launching any attack. If the device is a switch, A can sniff B's and C's packets if A can launch ARP spoofing attacks against B and C successfully. None of above is correct.arrow_forward[Estimated time to solve this question is 5 minutes] Your PC UOB LAN 74-29-90-E8-FF-86 DN8 8erver As shown in the figure above, assume that you computer is connected to the University local LAN. In order for you to navigate the Internet, you need to get some services from the DNS server. Answer the following two parts: (a) From where your computer will get the IP address of the DNS servre? Explain. (b) How your device will find the MAC address of the DNS server? Explain. For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).arrow_forwardWhich method do you prefer? CLI or GUI? Most people prefer the GUI, but it's important to learn both. Why would it be a good idea to learn how to do VPN on the ASA when the GUI tool is available. Do you think Cisco should develop a similar GUI tool for routers? Do a search in Google (or your favorite search engine) and find at least 5 other vendors that support IKEv2. (this took me 30 seconds, but it wasn't the first link so keep digging if you don't find it right away. Do another search and fine 2 more advantages IKEv2 has over IKEv1 that I didn't give you in the notes. There are severaarrow_forward
- As a network engineer, you are hired to design a local area network for a small business called TND which is a Sydney-based company and has about 30 employees. For security reasons, private IP addresses will be used for TND’s LAN. An IP address should be assigned automatically when a user plugs a workstation/laptop into the network. Email and Internet access must be provided so users can use Google and download files from the Internet. Answer following questions: Assume TND wants to open a new branch in Melbourne. A similar LAN is deployed for Melbourne branch. Propose a networking solution for TND to connect its branch LANs (one in Sydney and one in Melbourne) together.arrow_forwardYou're called in to consult for a company that's issuing about 100 new wireless mobile devices to selected employees. There are two subnets, each with a DHCP scope that has about 150 unused addresses and an access point that relays DHCP requests from wireless clients to the DHCP server. The mobile devices will be equally distributed between the subnets. Both scopes are served by a dual-homed server. You want these mobile devices to be issued IP addresses, using the last 75 addresses of both scopes, and have a shorter lease time for addresses. What do you propose? What information do you need to carry out the proposal?arrow_forwardGiven a laser color printer whose IP address is 192.135.250.180/24, the network administrator of the company wants you to divide the printer's network into 30 subnets to support 30 project teams such that each team has its own separate network. After re-configuration, the printer will be hosted by a smaller and different subnet. For this particular subnet, what is its possible IP range, from its network IP to broadcasting IP? *Note that these are two special and reserved IPs of the network, they are not a valid host IP and cannot be used by for any hosts of the network. (1) What is the new IP of the printer in CIDR form? (2) How many hosts can connect in each new subnet?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education