Premium Essay

Internet Protocol Configuration

In:

Submitted By redcom73
Words 3046
Pages 13
ip route 0.0.0.0 0.0.0.0 10.255.255.1 router eigrp 100 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.1.0.0 255.255.0.0 ip dhcp pool B1_VLAN10 network 10.1.10.0 255.255.255.0 default-router 10.1.10.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN20 network 10.1.20.0 255.255.255.0 default-router 10.1.20.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN30 network 10.1.30.0 255.255.255.0 default-router 10.1.30.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN88 network 10.1.88.0 255.255.255.0 default-router 10.1.88.1 dns-server 10.0.1.4 exit ip dhcp excluded-address 10.1.10.1 10.1.10.10 ip dhcp excluded-address 10.1.20.1 10.1.20.10 ip dhcp excluded-address 10.1.30.1 10.1.30.10 ip dhcp excluded-address 10.1.88.1 10.1.88.24

B2 hostname B2 int s0/0/0 ip address 10.255.255.6 255.255.255.252 no sh encapsulation frame-relay frame-relay lmi-type q933a exit ip route 0.0.0.0 0.0.0.0 10.255.255.5 router eigrp 100 passive-interface fa0/0.10 passive-interface fa0/0.20 passive-interface fa0/0.30 passive-interface fa0/0.99 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.2.0.0 255.255.0.0 ip dhcp pool B2_VLAN10 network 10.2.10.0 255.255.255.0 default-router 10.2.10.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN20 network 10.2.20.0 255.255.255.0 default-router 10.2.20.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN30 network 10.2.30.0 255.255.255.0 default-router 10.2.30.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN88 network 10.2.88.0 255.255.255.0 default-router 10.2.88.1 dns-server 10.0.1.4 exit ip dhcp excluded-address 10.2.10.1 10.2.10.10 ip dhcp excluded-address 10.2.20.1 10.2.20.10 ip dhcp excluded-address 10.2.30.1 10.2.30.10 ip dhcp excluded-address 10.2.88.1 10.2.88.24
B3
Router>en
Router#conf t
Enter configuration commands, one

Similar Documents

Premium Essay

Dns & Dhcp

...DHCP DNS allows people to use meaningful names, such as http://www.yahoo.com.proxy.itt-tech.edu, to find Internet-based resources. In this way, DNS has allowed users from a wide range of educational backgrounds to makes use of the Internet. DNS eliminated the need to manually remember IP addresses and replaced that system with human-readable names instead; DNS was invented to solve the logistical problems that arose because too many hosts were on the Internet to be able to keep track of using a manual list of addresses. In other words DNS function is to translate names to IP addresses and vice versa, that way instead of remembering a long IP address you can just type a name that is easy to remember. http://library.books24x7.com.proxy.itt-tech.edu/assetviewer.aspx?bookid=12254&chunkid=309282908&rowid=24 With the increasing number and different types of devices attaching to the network, managing IP addresses efficiently and accurately introduces many challenges for network operators of large-scale networks, including service providers and enterprises. Both Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) are mission-critical capabilities that need to be able to scale, and many service providers have created dynamic service delivery based on DNS to achieve service quality and deliver advantages. However, if DNS fails, then the Internet fails. Assigning a unique address to every device connecting to the network has become a virtually impossible...

Words: 443 - Pages: 2

Free Essay

Huffman Trucking Service Request Sr-Ht-010

...Huffman Trucking Service Request SR-ht-010 NTC/361 Huffman Trucking Service Request SR-ht-010 Huffman Trucking is a national transportation company that provides carrier services for various vendors, including the United States Government. At present the company has a main office in Cleveland Ohio and hubs located in California, Missouri, and New Jersey (Apollo Group, Inc., 2012) . The ability to remain competitive relies on capable employees and efficient systems that operate at full capacity. The company is in the midst of developing the yearly budget and is examining all of the current systems in place. The Chief Information Officer (CIO) has requested a full review of all the current telephone and data network systems in all locations. Along with the review, recommendations for changes are also required. This document will outline Huffman Trucking’s systems and identify areas for improvement to maintain the company’s high level of service. Telephone Systems Looking at the current systems in the four plants and offices one can see that all four of the offices and plants have different telecommunication systems. Huffman Trucking has locations in four states with offices and plants located in California, Missouri, New Jersey, and Ohio. Many of the locations are using wiring that is not adequate for the system to have the capabilities to function in a business capacity. The California and New Jersey locations use a plain old telephone system (POTS), Private Branch Exchange...

Words: 3605 - Pages: 15

Premium Essay

Project Report

...Cisco Routers 3 Routing Protocols (RIPv1, RIPv2, EIGRP) 5 Servers(FTP, TFTP, Email, HTTP, DNS, DHCP, NTP, etc) 5 Cisco Switches with minimum 3 VLANs A minimum 5 Host terminals Access list 5 - 10 2 Cisco Packet Tracer Cisco Packet Tracer is a network simulation program that allows the students to experiment with network behavior and ask “what if” questions. Project Design Meeting the requirements I made a connection between four work stations and nine different servers through a switch 0. I used 8 routers which are interconnected in that router A is connected to Switch 0 and Router B is connected to Switch 1. Switch 1 is connected to two DHCP servers and 6 VLAN host terminals. Router C is connected to Switch 2 which is connected by a server and four host terminals and a printer. Router Eigrp is configured with Eigrp protocol and Router RIP version RIP protocols. 3 Configuration of Servers DHCP The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. DHCP follows the DORA process when assigning the ip address to its clients 4 DNS The most important function of DNS servers is the translation (resolution) of humanmemorable domain names and hostnames into the corresponding numeric Internet Protocol (IP) addresses, the second principal name space of the Internet which is used to identify...

Words: 1037 - Pages: 5

Premium Essay

Work

...Unit 1 discussion 1: familiar protocols Q 1) What role does TCP/IP play for internet communications? TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. Q 2) What role does IP play in data transfer over the internet? IP is a protocol. Simply said, a protocol is a set of rules governing how things work in a certain technology, so that there is some kind of standardization. When put into a network communication context, a protocol is the set of rules governing how packets are transmitted over a network. When you have a protocol, you are sure that all machines one a network (or in the world, when it comes to the Internet), however different they might be, speak the 'same language' and can integrate into the whole framework. IP is probably the most common protocol over the Internet. It is the set of rules governing how packets are transmitted over the Internet. The IP protocol standardizes the way machines over the Internet or any IP network forward or route their packets based on their IP addresses. Q 3) How does Dynamic host configuration protocol ease management of IP addresses...

Words: 573 - Pages: 3

Premium Essay

Samplefile

...stands for 1x Evolution - Data Voice, and is characterized by a maximum data rate of 5.2 Mbps and the ability to support wireless Voice over IP (VoIP) services. 1xRTT. The first phase of CDMA2000, characterized by the ability to support a maximum data rate of 1.44 Kbps. 1xRTT stands for 1x, denoting the one radio channel of 1.25 MHz in Radio Transmission Technology. 2G. The second generation of wireless technology that was characterized by its use of digital transmissions rather than analog methods. Radio bandwidth is used for data transmissions. Data transmissions are limited to a maximum rate of 1.44 Kbps for CDMA 2G services (9.6 Kbps for GSM 2G). Radio bandwidth is consumed whenever the Mobile Node (MN) is connected to the Internet, regardless of whether it is receiving or transmitting data. This is based on the IS-95A standard for CDMA. 2.5G. An evolutionary step between 2G and 3G wireless services wherein two enhancements were introduced over 2G. The first is that the MN only consumes radio bandwidth when data is being transmitted or received. The second is that the maximum data rate increased to approximately 64 Kbps. Most 2.5G services only support data rates between 1.15 Kbps and 384 Kbps. This is based on the IS-95B standard for CDMA. 3G. The third generation of wireless technology, wherein data services are packetized, with speeds up to 2 Mbps. Based on the CDMA2000 standards. 3GPP. Third Generation Partnership Project. A group of organizational...

Words: 7125 - Pages: 29

Premium Essay

Virtual Private Network

...(VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations are able to add large amounts of...

Words: 6523 - Pages: 27

Premium Essay

Course Materials

...used for converting one type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit-Terminating Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer terminal to a router's console port. This cable is typically flat (and has a light blue color) with a DB-9 Female end to RJ-45 Male end. 4. What kind of port does the console cable attach to on the computer? Serial Port (dial-up modem) 5. What kind of port does the UTP patch cable attach to on the router? The console port Lab 5.2 Configure HyperTerminal to Access a Cisco Router Review Questions 1. What program on a Windows computer is typically used for configuring a Cisco router? HyperTerminal 2. What are the important settings to configure in HyperTerminal to access a Cisco router? You must then configure how you will connect to the router and the system configuration 3. Where is the HyperTerminal program in most Windows computers? All Programs/Accessories/Communications 4. Which port on a router do you use to connect the rollover cable when configuring the router with HyperTerminal...

Words: 2124 - Pages: 9

Premium Essay

Ipv4 vs Ipv6`

...IPv4 vs. Ipv6 Internet Protocol (IP) is a set of technical rules that defines the network computer connections. There are two primary types of IP. Versions IP 4 and IP 6 IPv4 is the first version of IP to be the most used worldwide. This IP manages most of today’s internet traffic. There are over 4 billion IPv4 addresses, yet there are still not enough IP addresses for the world so something new had to be found. IPv6 is the next version of the growing and improving Internet Protocol. This was deployed in 1999. This new version meets the world’s IP addressing requirements for a very long time. The main difference between IPv4 and IPv6 are number of IP addresses each version contains. There are approximately 4,000,000,000 IP addresses in IPv4, which is 32bit. IPv6 has over 340,000,000,000,000,000,000,000,000,000,000,000,000 possible IP addresses because IPv6 is 128bit. Both versions work together with the Internet, but most all new IP addresses added to the Internet all come from IPv6 rather than IPv4 now because of the faster speeds and more options. IPv4 addresses are 32 bits long (4 bytes). The addresses are defined by host portion. The IP addresses are depended on address classes. In the 4,294,967,296 IPv4 addresses are available to the world; take the example IP address in the format 0000.0000.0000.0000 where each 0 could actually be a number from 0-9. IPv6 addresses are 128 bits long (16 bytes). Basic network architecture is defined as 64 bits and also hosts 64bits...

Words: 1604 - Pages: 7

Premium Essay

It530 Assignment Unit 1

...Running Head: DOMAIN NAME SERVERS AND INTERNET PROROCOL Domain Name Servers and Internet Protocol Awaz Barwari Kaplan University Abstract Domain Name System (DNS) is central to the Internet and networking. It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like www.google.com into a raw IP address number 173.194.40.197. DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net, .Org...

Words: 1390 - Pages: 6

Free Essay

Ccna Routing

...structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. Chapter 1 2 3 4 5 6 7 8 9 10 11 Topic Exploring the Network Configuring a Network Operating System Network Protocols and Communications Network Access Ethernet Network Layer Transport Layer IP Addressing Subnetting IP Networks Application Layer It’s a Network Students who complete Introduction to Networks will be able to perform the following functions:  Understand and describe the devices and services used to support communications in data networks and the Internet  Understand and describe the role of protocol layers in data networks  Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments  Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks  Explain fundamental Ethernet concepts such as media, services, and operations  Build a simple Ethernet network using routers and switches  Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations  Utilize common network utilities to verify small...

Words: 1022 - Pages: 5

Premium Essay

What Is the Internet?

...What is the internet?   The internet is a combination of networks and organizations, each of which is run and paid for on its own. The underpinnings of the Internet are formed by the global interconnection of hundreds of thousands of otherwise independent computers, communications entities and information systems. What makes this interconnection possible is the use of a set of communication standards, procedures and formats in common among the networks and the various devices and computational facilities connected to them. The procedures by which computers communicate with each other are called "protocols." While this infrastructure is steadily evolving to include new capabilities, the protocols initially used by the Internet are called the "TCP/IP" protocols, named after the two protocols that formed the principal basis for Internet operation. On top of this infrastructure is an emerging set of architectural concepts and data structures for heterogeneous information systems that renders the Internet a truly global information system. In essence, the Internet is an architecture, although many people confuse it with its implementation. When the Internet is looked at as an architecture, it manifests two different abstractions. One abstraction deals with communications connectivity, packet delivery and a variety of end-end communication services. The other abstraction deals with the Internet as an information system, independent of its underlying communications infrastructure...

Words: 2075 - Pages: 9

Free Essay

Network Plus Study

...Protocol ARP Port Description Address Resolution Protocol Resolves IP addresses to MAC addresses. FTP SSH Telnet SMTP 20/21 22 23 25 File Transfer Protocol: 20 is for data/21 is for control. Secure Shell – Encrypts traffic on the wire, used for telnet and FTP. Remote connection using the command line, data sent in clear text, secured using SSH. Virtual terminal. Simple Mail Transport Protocol, used for transferring email between clients and SMTP servers. “Sends mail to the post office!” TACACS+ Interacts with Kerberos 49 Terminal Access Controller Access-Control System+ Encrypts entire authentication process and is the preferred alternative to RADIUS. DNS DHCP TFTP HTTP Kerberos POP3 53 67 69 80 Domain Name System, Resolves Host names to IP addresses Dynamic Host Configuration Protocol Trivial File Transfer Protocol (transfers small data) Hypertext Transfer Protocol – delivers HTML traffic 88/749 Authentication protocol, uses a KDC to issue timestamped tickets with 5 min expiry 110 119 123 Post Office Protocol version 3 “Pat the post man!!” Transfers email from email server to client NNTP NTP Network News Transfer Protocol – news groups/forums Network Time Protocol - time synchronisation IMAP4 143 Internet Message Access Protocol Stores and organizes email on an email or SMTP server “organize mail at the post office” HTTPS 443 Hypertext Transfer Protocol Secure *Hypertext transfer protocol over secure socket...

Words: 408 - Pages: 2

Premium Essay

Ipv4 vs Ipv6

...IPv4 VS IPv6 IP (short for Internet Protocol) specifies the technical format of packets and the addressing scheme for computers to communicate over a network. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself can be compared to something like the postal system. It allows you to address a package and drop it in the system, but there's no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time. There are currently two version of Internet Protocol (IP): IPv4 and a new version called IPv6. IPv6 is an evolutionary upgrade to the Internet Protocol. IPv6 will coexist with the older IPv4 for some time. IPv4 (Internet Protocol Version 4) is the fourth generation of the Internet Protocol (IP) used to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks. IPv4 is the most widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses). With the growth of the Internet it is expected that the number of unused IPv4 addresses will eventually run out because every device including computers, smartphones...

Words: 616 - Pages: 3

Premium Essay

Expected Us Gdp Growth Rate Going Forward

...Project: TCP/IP Instructor: Michael Pry Robert Long American Intercontinental University Abstract In this brief I will attempt to explain the usage of the TCP/IP protocol so that the user may better understand the functions of this protocol. I will also provide the pertainate information for the configuration of the TCP/IP protocol to you system this will include the setting for this configuration. One of the most popular network protocols in use today is TCP/IP, (Transmission Control Protocol / Internet Protocol) which is the basic transmission language or protocol of the internet. This may also be utilized as a communications protocol in a private network as well, such as intranet or extranet. If you utilize a set up with direct access to the internet your computer is given a copy of the TCP / IP program as well as every other computer that you deal with (messages for example) or for information they to have a copy of TCP / IP. So let us address TCP/IP for a minute, TCP/IP is a two layer program, the higher of the two layers is the Transmission Control Protocol which manages the assembling of the message or file into a smaller packet. These are transmitted over the internet and received by a TCP layer which reconstructs the packet into the original message. The lower layer IP (Internet Protocol) deals with the address part of each packet so that it is routed to the proper destination. Every gateway computer on this network will check the address to see where...

Words: 1097 - Pages: 5

Free Essay

Paper

...or preventing the deployment of new services as they do not secure new processes and protocols. At the same time, organizations are facing a host of new threats that target many of these new services and impact network and service availability (Lippis, 2012). With SAFE, you can analyze the functional, logical, and physical components of a network and thus simplify the process of designing an overall enterprise network, but CISCO SAFE architecture is especially concerned with security. SAFE takes a defense in-depth-approach in which multiple layers of protection are strategically located throughout the network and the layers are under unified strategy for protecting the entire network and the various components of the network, including individual network segments, infrastructure devices, network services, endpoints, and applications (Oppenheimer, 2011). SAFE architecture is comprised of the following major modules: core, data center, campus, management, WAN Edge, Internet Edge, branches, extranet, partner site, E-Commerce, teleworkers, and Cisco SensorBase. Each module is discussed as it stands alone and how it integrates with other modules which allows you to pick the module that best apply to your environment. Unlike most security whitepapers, SAFE provides a step-by-step instructions, screenshots, and configuration examples throughout. In fact, it includes just about every configuration...

Words: 974 - Pages: 4