Premium Essay

Ip Addreesing

In:

Submitted By kad624
Words 299
Pages 2
DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) are both servers that work best together and when clients need multiple systems synchronized to one central location. DNS servers provide domain names and network resources. It associates TCP/IP addresses assigned to clients with domain names. It is designed for query lookups and hold distributive zones. This means that all computers may operate and share address pools in the event one fails. Another benefit of using DHCP servers with DNS servers is loadsharing. The DNS server can rotate the order of distribution of multiple addresses. Although there are benefits to using DHCP and DNS servers as a pair, there are downfalls as well. In order for the clients systems to maintain up-to-date databases, the IT tech must set the systems to synchronize updates and mapping of IP addresses automatically. While one may program the system to manually update, automatic dynamic updates would better serve the clients needing to operate several computers using one server. DHCP requires the use of DNS to keep names and address mapping information synchronized. Without synchronization, the DHCP doesn’t update or communicate changes with DNS changes. The IT technician must assist clients in registering the DHCP server with the DNS server. Another pitfall to using DHCP and DNS servers together is the OS. Older OS may delay synchronization. For example, The servers cannot interact dynamically when the DCHP client configures change. This can be easily rectified with the assistance of a knowledgeable IT technician. The mapping of an IP address to a domain name necessitates changes and updates of the information within the DNS server. Is the time and effort to setup a centrally managed solution for names resolution and recursion worth it? Yes It saves the client time, and

Similar Documents

Premium Essay

Networkd and Webdesign

... 1. Networks 1.1. The Ethernet and PPP in data transfer. 1.2. Media Accessed Control address 1.3. IPv4 address 1.4. Public and private address 1.5. NAT server/service 1.6. IPv6 1.7. Private addresses in IPv6 2. Web Design 2.1. Static and dynamic pages 2.2. CSS (Cascading Style Sheets) 2.3. URL and Link 2.4. HTML links 2.5. Absolute and relative path links  1. Networks 1.1. The Ethernet and PPP in data transfer. There are different methods for the effective transfer of data between different nodes. Ethernet and Point-to-point protocol are two of them. Ether net can be defined as a family of computer networking technology used for local area networks (LAN). The functioning of Ethernet is based on a set of coding system which allows the coding violations to mark the frame boundaries. It also defines the network layer interfaces to the physical interconnects. There are several important features and advantages for the Ethernet; but there are some disadvantages too. One of the disadvantages is - it will not operate on wide variety of media, which includes the async serial ports which are usually used with the dial up modems and synchronous telecom services. Using Ethernet, only on synchronous links, it will be able to use 100BASE-TX 4B/5B or 1000BASE- X 8B/10B encoding for making an Ethernet-like serial implication. And the result of this will be less efficient too. Point-to point protocol is a commonly used data link protocol for establishing direct connection...

Words: 2617 - Pages: 11

Free Essay

Tcp/Ip Security Concerns

...on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm. To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully. When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data. One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I will...

Words: 373 - Pages: 2

Premium Essay

Microsoft

...Microsoft Age of Empires III Readme File September 2005 Welcome to Microsoft® Age of Empires® III! This file contains information to help you install Age of Empires III. It also includes late-breaking information not included in the manual or in-game Help. CONTENTS A. Installing Age of Empires III B. Starting Age of Empires III C. Getting Help D. What's on the Disc? E. Multiplayer Guide F. Shortcut Keys G. Manual Corrections H. Gameplay Troubleshooting I. DirectX Troubleshooting J. Video Troubleshooting K. CD-ROM Drive Troubleshooting L. Audio Troubleshooting M. Processor Troubleshooting N. Performance Troubleshooting O. Multiplayer Troubleshooting P. Age of Empires III Information A. Installing Age of Empires III To install Age of Empires III, you must have administrator rights on your computer and your computer must be running Microsoft Windows® XP. To install Age of Empires III · Insert the Age of Empires III disc into the disc drive. If AutoPlay is enabled, the installation menu will appear; click Install, and then follow the on-screen prompts. —or— · If AutoPlay is disabled, on the Start menu, click My Computer. In the My Computer window, double-click the disc drive icon, and then double-click Setup.exe. On the Setup screen, click Install, and then follow the on-screen prompts. B. Starting Age of Empires III You must have the Age of Empires III disc 1 in your disc drive to play. To start Age of Empires III · Insert the...

Words: 4090 - Pages: 17

Premium Essay

Face Detetction

...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...

Words: 1023 - Pages: 5

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Free Essay

Test

...subnet mask is not included in the routing updates.  It utilizes load-balancing (equal-cost load balancing) if there are several paths with the same metric. Lastly, RIPv1 summarizes to IP network values at network boundaries, which occurs at a router that has one of more interfaces that do not participate in the specified IP network. | | The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. | | These are some of the steps I would take to start troubleshooting a problem in a Cisco network: First, I would make sure all the cables are the correct ones, not damaged, and are well connected to the corresponding ports. Then, making sure all the appropriate routers and switches' interfaces are configured with the correct parameters, IP Addresses, Subnet Masks, Encapsulation's parameters, Transmission Speeds, and Clock Rates, etc. After that, I would check the configuration of the routers by using commands such as show ip route, show ip protocols, debug ip rip, show ip interface brief. These command can definitely show me what can be missing or misconfigured. Then, I would test connectivity between neighboring routers using commands such as ping and...

Words: 421 - Pages: 2

Free Essay

Ip Networking

... 2. Connect the other end of your network cable to the hub provided by the instructor. Answer the following questions: a. What is the purpose of the hub? b. What is the topology you are creating? 3. Turn on the hub and verify that a link light is illuminated both on the computer’s network interface card (NIC) and the network hub. If not, check with the instructor. Answer the question: a. What does the link light indicate? 4. On the workstation, open a command prompt by clicking START> RUN and type CMD. 5. Next, type the IPCONFIG/ALL command to determine current TCP/IP settings for clients on a network. Record the following: a. Your computer’s IP address b. Classmate’s IP address connected with your hub 6. Next, use the PING command to verify network connectivity between clients. Type PING XX.XX.XX.XX at the command prompt where XX.XX.XX.XX is the IP address that you recorded in Step 5b. 7. You will receive ICMP replies from your classmate’s computer illustrating that your computers are connected and communicating. If not, you can check with your instructor. 8. Now, unplug your network cable from the hub and repeat Step 6. What was the result? 9. Unplug your cable from the ITT computer. Replace the ITT UTP cable to the ITT computer to restore the connection with the ITT network. Verify that the link light is active on the ITT computer. On the ITT computer, verify that you can connect to the Internet. If not, restart the system...

Words: 401 - Pages: 2

Premium Essay

Static Ip and Connected Routes

...12 makeup IP routing, Static and connected routes IP routing defines how an IP packet can be delivered from the host at which the packet is created to the destination host. Hosts and routers participate in the IP routing process. The list summarizes a host’s logic when forwarding a packet, assuming that the host is on an Ethernet / wireless LAN. When sending a packet, compare the destination IP address of the packet to the sending host’s perception of the range of addresses in the connected subnet, based on the host’s IP address and subnet mask. If the destination is in the same subnet as the host, send the packet directly to the destination host. ARP is needed to find the destination host’s MAC address. If the destination host is not in the same subnet as the host, send the packet directly to the host’s default gateway. ARP is needed to find the default gateway’s MAC address. Routers use the following steps: the packet must first be received, whereas the sending host begins with the IP packet in memory. For each received frame, use the data-link trailer frame check sequence (FCS) field to ensure that the frame had no errors; if errors occurred, discard the frame and don’t continue to the next step. Check the frame’s destination data link layer address, and process only if addressed to this router or to a broadcast/multicast address. Discard the incoming frame’s old data-link header and trailer, leaving the IP packet. Compare the packet’s destination IP address to the...

Words: 756 - Pages: 4

Free Essay

Cnt 4513 Study Guild

...CNT 4513 Study Guild Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5 Chapter 1 1. Internet: largest system of interconnected computer networks a) Network edge: end system and access network b) Network core: packet switching(vs. circuit switching) 2. Network Performance a) Delay: Processing delay, queuing delay, transmission delay, propagation delay b) Throughput: bottleneck link 3. Protocol layers a) application (message), transport (segment), network (datagram), link (frame), physical layer b) Layer implementation, data encapsulation Chapter 2 1. Architecture a) client-server: dedicated servers, fixed IP, not scalable, single-point-of-failure. (E.g., Web, FTP, Telnet, and e-mail) b) p2p: direct communication between peers, self-scalability. (E.g., BitTorrent, Skype, PPstream) 2. Process communication Socket: interface between application process and underlying transport layer infrastructure Datagram socket (connectionless socket for UDP) Stream socket (connection-oriented socket for TCP) 3. Web and HTTP Web page: base HTML file + referenced objects URL: hostname + object’s path name HTTP: request-response protocol , TCP, , stateless, message format, non-persistent vs. persistent connections Cookie: back-end database at web site, cookie file in client site, cookie header line in response and request message Web caching: proxy server, conditional get 4. FTP Control connection...

Words: 578 - Pages: 3

Free Essay

Firewall Security Project

...Allen & Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing...

Words: 1848 - Pages: 8

Free Essay

Is3220 Week 7

...access file servers If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names. When using DNS to resolve internal network host names for VPN clients, make sure that these clients are able to correctly resolve unqualified fully qualified domain names used on the corporate network. This problem is seen most often when non-domain computers attempt to use DNS to resolve server names on the internal network behind the VPN server. 2. Users can't access anything on the corporate network Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network. The most common reason for this problem is that users are connected to a network on the same network ID as the corporate network located behind the VPN server. For example, the user is connected to a hotel broadband network and is assigned a private IP address on network ID 10.0.0.0/24. If the corporate network is also on...

Words: 1569 - Pages: 7

Free Essay

Lab7

...packaged with Microsoft® Windows. You also researched public domain sites such as IANA’s WHOIS tool to obtain public domain information about the targeted website. Finally, you performed Google hacking research on the targeted organization’s e-commerce website to identify other shared information. Lab Assessment Questions & Answers 1. Which reconnaissance tool comes with Microsoft® Windows that can provide reconnaissance-gathering data and can be initiated from the DOS command prompt? What useful information does this query provide? name and the IP address associated with the source you are targeting. 2. What is the difference between ARIN, RIPE, and IANA? What regions of the world do these domain name registry organizations cover? The internet assigned numbers authority (IANA) delegates internet resources to the regional internet registries which are what ARIN (American Registry for Internet Numbers) and RIPE (Reseaux IP Europeens Network Coordination Centre) ARIN covers the United States, Canada, several parts of the Carribean and Antartica. RIPE covers Europe, Russia, the MIddle East, and central Asia. Assessment Worksheet 3. What other functions can be completed using the Sam Spade utility? 39 You can do Zone Transfers,...

Words: 918 - Pages: 4

Premium Essay

Network Dessign

...Problem Description: You are have been assigned the net block 72.128.30.0/23 by your ISP; to design a network for a small business wich consists on three sites: Site A 6 offices which need to support up to 30 hosts each. Site B 3 research labs with 25 hosts each. Site C 1 support office with 10 workstations. At site C you also have 14 servers behind a router/firewall. These servers are to be firewalled from internal as well as external hosts. Site A links to the ISP via a dedicated Serial Interface. Site A links to site B via a dedicated Serial Interface. Site B links to site C via a dedicated Serial Interface. 5 Routers with 8 100Mbps Ethernet interfaces Fa0/0 Fa0/1 Fa0/2 Fa0/3 Fa0/4 Fa0/5 Fa0/6 Fa0/7 and one serial interface Se0. 1 (and only one) Router/firewall with two 100Mbps Ethernet interfaces eth0 and eth1. Unlimited amounts of 100Mbit Manageable Fast Ethernet switches in the following sizes: 48 ports 24 ports 8 ports. Subnet/ address assignment Site A: 72.128.31.0/24 - supports 256 addresses (254 usable) 72.128.31.254 is bRouter address on this subnet ( interface fa0/0) 72.128.31.253 is Router1 address on this subnet ( interface fa0/0) 72.128.30.252 is a 8-port switch (Switch1) on this subnet 72.128.30.251 is a 48-port switch (Switch2) on this subnet 72.128.30.250 is a 48-port switch (Switch3) on this subnet 72.128.30.249 is a 48-port switch (Switch4) on this subnet 72.128.30...

Words: 865 - Pages: 4

Premium Essay

Network Design for Acme Manufacturing

...Running head: NETWORK DESIGN FOR ACME Network Design for Acme Manufacturing Learning Team A: [your team members] University of Phoenix Intro To WAN Technologies NTC/242 Acme Manufacturing Network Design Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for their expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters...

Words: 1444 - Pages: 6

Free Essay

Student

...Lab 5.2 5.2.1 Its used to distinguish one device from another. Just like people have names, NICs have mac addresses. If you have the same address most cases, both computers will connect to the network and think they are working fine... however, you will see random failures and most likely not see the reason why. 5.2.2 The support tab gives you your computer connection ip address, subnet mask, and default gateway. 5.2.3 00-0C-29-87-20-EB 5.2.4 VMware, INC. It is located in 3401 Hillview Avenue Palo Alto CA 94304 5.2.5 Ip address- 10.17.109.149 Default Gateway-10.17.110.1 5.2.6 Open Command Prompt and type command "arp a”. The source machine will generate an Address Resolution Protocol (ARP) request message. The source broadcast the ARP request message to the local network. The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address with its own Protocol Address. When the targeted device checks the Target Protocol Address, it will find a match and will generate an ARP reply message. Destination device send the ARP reply message and it will not be a broadcast, but a unicast. The source machine will update its Address Resolution Protocol (ARP) cache with the Sender Hardware Address and Sender Protocol Address it received from the ARP reply message. 5.2.7 You see Interface:10.17.109.149 Internet address 10.17.110.1/10.17.110.11 Physical...

Words: 264 - Pages: 2