Premium Essay

Ip Addressing Scenario

In:

Submitted By kany1990
Words 510
Pages 3
IP Addressing Scenario
The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0.
I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for DHCP 192.681.1.21 - 192.168.1.230 * 192.168.2.0 /24 for wireless - functional for DHCP 192.168.2.21-192.168.2.230 * 192.168.3.0 /24 for VoIP - working for DHCP 192.168.3.21 - 192.168.3.230 * 192.168.4.0 - 192.168.7.254 for future usage .

We should have multiple domain servers and DHCP servers. Firewall always needs to be used even though most computers with windows 7 come with it. Firewall is very important because it block any outside intrusion. That way it can be monitored. All type of security can be implanted to assure that the servers can’t be infiltrate by intruders, like finger print recognition, password expiration…. It will be my responsibility to ensure that all policy regarding the security of each computer and server will meet the criteria.
Each IP addresses should be addressed dynamically because it will be easier and it won’t take a lot of time and that way we won’t have to go to each computer and assign them statically. The only that we will have to assign is the servers, printers, faxes, etc. Since we have a single physical location we should have at least two to three networks. I would put 50 computers per networks. We reserve the first and last 20 or so addresses in each dhcp scope for statically assigned addresses and network devices / gateway addresses. If one network goes down, we would have the second one to back it up. In any case I

Similar Documents

Premium Essay

Ip Addressing Scenario

...IP addressing Scenario When you design an IP addressing scheme for a medium to large scale company you need to take into account several questions about the company environment. What type of security is needed? Is the company going to grow past 145 clients? Do all the computers need to talk to one another? Can they be separated out into different departments? What types of content will be shared between users? How many content share servers are there? When setting up an IP scheme you need to take into account the growth of the company. If the company is only going to have 254 devices attached to the network. If the answer is yes then you can proceed with a statically assigned IP scheme. If you answer is no then you need to implement a scheme designed around a DHCP server. Normally when you design a scheme you want to take into account the departments in the company and if they need to be interconnected to the rest of the clients. If there are several departments that need to talk to one another, and a couple of departments that are restricted access clients. These types of question and answers would make an IT professional’s job either simple or more complex. Normally in a IP Scheme you want to choose the IP address that make sense to your network most internal networks sit in the class B or C range. If you choose a network IP of 172.16.0.1 your subnet masks would be at 255.255.0.0 for your choice. If you are going to design a IP scheme around a DHCP Server it might be...

Words: 508 - Pages: 3

Premium Essay

Ip Addressing Scenario

...Unit 1 Exercise 1: IP Addressing Scenario To start with, I would use the IP Class C. The subnet range in Class C is 255.255.255.0-255.255.255.255. This would be the best one for this company because there is room to grow. I believe that the IP addresses should be statically assigned. That way, there is not a chance of it getting into any trouble by anyone. One network/subnet would do fine. You have a giant subnet range, plus you have a good size network. If DHCP is used, then yes a router, firewall, and Windows Server should be utilized. You need a firewall, so you don’t have any problems with your employees looking at non-work related websites or websites that haven’t been approved. A router, so that you can have your internet connection protected. You wouldn’t want anyone just hacking into your connection and getting their hands onto any private information that they could get their hands on and ruin your company. A Windows Server would be good as well. You could use the Windows Server so the employees could get their work done, instead of searching the web for non-work related things as well. When you consider this design as a possible outcome, just remember that this plan also involves the growth of the company. The growth of the company is the main concern here. We do not want to stunt the growth of the company. We want the company to grow as much as possible. I believe this design will prove to do that. It will be a great design and will help out very much. We do not...

Words: 317 - Pages: 2

Premium Essay

Unit 1 Ip Addressing Scenario

...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space, host...

Words: 289 - Pages: 2

Premium Essay

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at 172.16.0.0 for your network address with a subnet mask of 255.255.255.0. This gives you 254 hosts per subnet which will easily cover your 50% growth over the next...

Words: 384 - Pages: 2

Premium Essay

Computer

...Concepts (21 percent) Compare the layers of the OSI and TCP/IP models: OSI model (Layer 1 – Physical, Layer 2 – Data link, Layer 3 – Network, Layer 4 – Transport, Layer 5 – Session, Layer 6 – Presentation, Layer 7 – Application); TCP/IP model (Network Interface Layer, Internet Layer, Transport Layer, Application Layer [Also described as: Link Layer, Internet Layer, Transport Layer, Application Layer]) Classify how applications, devices, and protocols relate to the OSI model layers: MAC address; IP address; EUI-64; Frames; Packets; Switch; Router; Multilayer switch; Hub; Encryption devices; Cable; NIC; Bridge Explain the purpose and properties of IP addressing: Classes of addresses (A, B, C and D, Public vs. Private); Classless (CIDR); IPv4 vs. IPv6 (formatting); MAC address format; Subnetting; Multicast vs. unicast vs. broadcast; APIPA Explain the purpose and properties of routing and switching: EIGRP; OSPF; RIP; Link state vs. distance vector vs. hybrid; Static vs. dynamic; Routing metrics (Hop counts, MTU, bandwidth, Costs, Latency); Next hop; Spanning-Tree Protocol; VLAN (802.1q); Port mirroring; Broadcast domain vs. collision domain; IGP vs. EGP; Routing tables; Convergence (steady state) Identify common TCP and UDP default ports: SMTP – 25; HTTP – 80; HTTPS – 443; FTP – 20, 21; TELNET – 23; IMAP – 143; RDP – 3389; SSH – 22; DNS – 53; DHCP – 67, 68 Explain the function of common networking protocols: TCP; FTP; UDP; TCP/IP suite; DHCP; TFTP; DNS; HTTPS; HTTP; ARP; SIP (VoIP); RTP...

Words: 680 - Pages: 3

Premium Essay

Nt1330 Homework Week 1

...NT1330 Client-Server Networking II Name: Homework 1 Ch. 1 (70-642): Introduction to Networking Concepts Fill in the Blank: 1-10 The most widely used IP addressing scheme is IPv4. The most recent and largest address space IP addressing scheme is IPv6. To distribute IP addresses automatically, a network administrator would configure the DHCP service. The first attempt at breaking up IP address space used classful addressing to provide address ranges of differing sizes. Prior to the introduction of the Domain Name System, computers used HOST files to map human-readable named to IP addresses. A(n) Subnet Mask is used to separate the host address portion of an IP address from the network address. The subnet mask within the TCP/IP configuration is used to distinguish the network address from the host address. In dotted-decimal notation, each IPv4 address is broken up into four octets. Server computers and other systems that need to be accessed reliably by network clients should be configured with a(n) static IP address. The method of breaking up IP address space into address ranges of flexible size is called CIDR . Page Break Case Scenario Case Scenario 1-1: Designing Windows Server 2008 Network Services Lucerne Publishing is a publishing company based in New York City, New York, which produces science textbooks for colleges and medical schools. In recent months, Lucerne Publishing has been planning...

Words: 574 - Pages: 3

Free Essay

Mobile Ip in Source Routing Systems

...Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works ..............................................................................

Words: 7747 - Pages: 31

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

70-642

... Answers for Knowledge Assessment Matching 1. e 2. h 3. f 4. a 5. d 6. b 7. g 8. i 9. c 10. j Multiple Choice 1. c When a DHCP-configured computer boots up, it will broadcast a DHCPDISCOVER packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes or child...

Words: 1569 - Pages: 7

Premium Essay

Addressing Scenario

...In this Exercise, you will explain IP addres components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are a IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.) IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations. 1. What subnet range/s should be used 2. Should IP addresses be dynamically or statically assigned. 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router,firewall or Windows Server be utilized and why? Respond in detail. justifying your recommendations. 1-2 pages I find that the IP address components as being the “core” of the IP addresses. Nothing would work without them. They are like the postal address of a home or office building. Every page you see on the internet has a (postal) IP address consisting of numbers such as 255.25.1.200.0. Each number is a component of that IP address. When IPv4 was introduced, only the first octet was used for the network number and the remaining three octets were used for the host number. This limited the...

Words: 763 - Pages: 4

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network number...

Words: 756 - Pages: 4

Premium Essay

Ip Address Scenario

...Theren Woods 9/24/2015 NT 1210 Unit 1. Exercise 1. IP Addressing Scenario A design for a 1 floor office with a single data closet serving 145 to 254 users would need a core network, networks for firewall, a switch management network, a server network, voice network, wireless network, and a network for future services to accommodate the potential 50% growth the company intends to happen. The subnet range that should be used to accommodate 145 hosts plus a potential 50% growth within the next two years should be 255.255.255.0. This subnet mask range would support 254 hosts and this particular scenario is only planning for no more than 218. The IP addresses should be statically assigned because dynamically assigned IP addresses can change each time you connect to the internet but statically assigned IP addresses are reserved for the user and don’t change over time. Statically assigned IP addresses would definitely be best for an office environment because you want the same IP addresses everyday so the computers can talk to the server and with one another daily. You should have more than one network/subnets for computers, printers, future use and other host that may be needed. If DHCP is used you should use a Windows Server because it is safer. Normally a hacker will try to penetrate your router or firewall first so if that happens they will also have your DHCP. If it is on a server that’s another added layer to try and hack...

Words: 255 - Pages: 2

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...Graded Assignments The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 11/04/2011 | All | New Curriculum | | December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning...

Words: 3601 - Pages: 15

Premium Essay

Ad Design

...AD Design Replication Scenario To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use intersite replication. Intersite replication is needed when adding domain controllers located in different sites. We will also need a site link in order for replication to take place between the various locations. A site link is a logical, transitive connection between two sites that allows replication to occur. We will need to take into consider the cost, schedule, and frequency. It’s best to set the schedule for the site link during off-peak business hours. This will ensure the bandwidth is not bogged down on the WAN, due to replication traffic. Frequency will determine how often information is replicated over the site link. Before installing the new domain controllers and before we begin the replication process, we will need to setup the IP addressing or sub netting for the new locations. We will want to use subnets that reflect our current IP addressing scheme. This will be important to make sure there are connections between hosts and domain controllers as needed. Remote Procedure Calls over Internet Protocol (RPC over IP) is the preferred choice for the replication process. This allows you to communicate with network services on various computers. This will also keep data secure when in transit by using both encryption and authentication. In conclusion this will be a process needing to...

Words: 255 - Pages: 2