Free Essay

Ip Configuration

In: Computers and Technology

Submitted By fmcintosh12
Words 321
Pages 2
For the network configuration, we decided to go with a partial mesh configuration to save on cost and time. With the amount of staff members and estimate growth on a annual basis. For Ip address that’s needed to allow enough for employees and guest for the business the sufficient. ip address 10.0.0.0.0 with 255.255.255.255 subnet with 256 usable ip address with a /25 allow guest to use the network .
The configuration of the wireless network would allow the management workgroup to connect wireless on the third floor were the upper management staff. Basement level to the second/ first floor with run unshielded paired Ethernet cabling only to the telemarketers, which is about 85 feet. 15 ft for the security desk and 20 feet to training room. Sales agents will run off the wireless with workgroup allowing minimal access to display product to customers with restricted access to the outside internet with the configurations to allow monitor and packet captures as well as the management group .wireless system will support IEEE 802.11g ,IEEE 802.11b, IEEE 802.11a. Cisco wireless access point will be mounted on the ceiling with a hexagon formation to allow maximum coverage within the infrastructure. Basic information relating to the communication of the wireless network in figure 1.1 and the layout of the cisco wireless access points figure 1.2. each workstation not part of the training or security will be equipped with 150Mbps 2.4GHz Wireless PCI LAN Adapter Card with Antenna which will connect with access point located around the building.
Base of the network will run a partial mesh topology for the sales for and the telemarketers on the second floor
For the wireless set up a guest network would need to establish internet access and reference point complexly different from the sales floor access.
Basic network configurations for cisco wireless access point. Figure 1.1

Similar Documents

Free Essay

Test

...Basic Configuration Exercise 1-12 pg. 56-58 1. Austin’s router# configure terminal Austin’s router(config)#hostname AUS AUS(config)#end AUS# 2 .AUS > enable AUS # configure terminal AUS (config )# enable password class AUS > enable AUS # configure terminal AUS(config)# enable secret class 3. The enable secret password . you do not need to configure both. 4. AUS# conf t AUS (config) # line con 0 AUS(config-line) # login AUS (config-line) # password cisco AUS (config-line) # ^Z 5. AUS# conf t AUS (config) # line aux 0 AUS(config-line) #password cisco AUS(config-line) # login AUS (config-line) # ^Z 6. AUS(config)#service password-encryption 7. The enable secret command is used to provide an additional security over the enable password command. 8. AUS(config)#interface serial 0 AUS(config-if)#ip address (IP/Subnet) AUS(config-if)# no shutdown AUS(config-if)#exit 9. AUS(config)#interface fastethernet 0 Router(config-if)#ip address AUS(config-if)no shutdown 10. AUS(config)#Router rip AUS(config-router)#network 10.0.0.0 11. NVRAM AUS# copy running-config startup-config 12. AUS#show startup-config Exercise 1-2 pg. 59 1. Show interfaces 2. how ip interfaces brief 3. Show ip route 4. Router#show running-config 5. Router#show startup-config 6. Configuration in NVRAM will remain even when powered off, and RAM will hold a running configuration, which will be lost if powered off. 7. Press backspace until erase what need...

Words: 655 - Pages: 3

Free Essay

To Thine Own Self Be True"

...QualNet 5.0.2 User’s Guide March 2010 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com Copyright Information © 2010 Scalable Network Technologies, Inc. All rights reserved. QualNet is a registered trademark of Scalable Network Technologies, Inc. All other trademarks and trade names used are property of their respective companies. Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com ii QualNet 5.0.2 User’s Guide Table of Contents Preface................................................................................. xiii Chapter 1 Introduction to QualNet .......................................................... 1 1.1 Overview .................................................................................................................. 1 1.2 QualNet Architecture .............................................................................................. 2 1.3 Scenario-based Network Simulation..................................................................... 4 1.3.1 General Approach .............................................................................................. 4 1.3.2 Creating Scenarios............................................................................................. 4 1.3.3 Files...

Words: 86998 - Pages: 348

Premium Essay

Crafting

...| | |3G PREPAID BROADBAND | | | |  | |  | | | |SPEED UPTO | |DATA VOLUME | |SUBSCRIPTION FEE | |USAGE VALIDITY | |SUBSCRIPTION CODE | | | |256 kbps ...

Words: 696 - Pages: 3

Free Essay

Joel Hills Paper

...Wilson Electronics Cellular Booster Database Requirements For Cellular Booster O-14828 Version 1.06 Presented to: Wilson Electronics Approval Name Title Signature Date Confidential Wilson Electronics Cellular Booster Database Requirements - v1.06 O-14828 Change History Version # 1.00 1.01 1.02 1.03 Reason Author Date 2014/04/11 2014/04/16 2014/04/21 2014/04/22 Initial Release Condensed parameters Consensus reached on majority of parameters Added specifics about DB connection, changed AGC Test Parameters Moved some configuration items to test limit sections Al Braga Al Braga Al Braga Al Braga Al Braga 1.04 2014/04/30 1.05 1.06 Merged RF Test Sections, added error, clarified Al Braga some parameter types. Removed all Station Name inputs Al Braga 2014/05/14 2014/05/15 Page 2 of 14 Project File: Cellular Booster Database Requirements.docx ©Averna - Confidential Wilson Electronics Cellular Booster Database Requirements - v1.06 O-14828 Table of content Purpose and Scope ....................................................................................................................................... 4 Considerations .............................................................................................................................................. 4 Database Connectivity .................................................................................................................................. 5 Database...

Words: 2582 - Pages: 11

Free Essay

Linux2Finalexamnotes

...path? Answer: /etc/ssh/sshd_config 9. What option do you pass to the OPENSSH client to tunnel x11 Windows protocol? Answer: -x 10. What is the file and path that contains all of the directories available by NFS? Answer: /etc/exports 11. What command line utility would you use to change the Samba password? Answer: smbpasswd 12. Which operating mode do you need to use and configure to have FTP run behind a Firewall? Answer: passive 13. How do you tell VSFTP to run in standalone mode? (it’s an option within the config file) Answer: Enable the listen directive in the vfstpd configuration file. 14. What is it called when you configure a web server to act as multiple servers or pages? Answer: Virtual Hosting 15. Which of the Apache directives is actually a container? Answer: VirtualHost 16. You should know the basic configuration of a DHCP configuration file. Question will be which of these isn’t in config file. Answer: The DHCP...

Words: 1147 - Pages: 5

Free Essay

Managerial Issues

...illustrate the above mentioned difficulties and provide insight into how these areas can be maintained. Configuration Management and Maintenance “Configuration management is a collection of processes and tools that promote network consistency, track network change, and provide up to date network documentation and visibility.” (Cisco, 2006, p. 1) Configuration can either help or hinder a system. Cisco offers a white paper that specifically outlines best practices for configuration management. The paper outlines the following: “Software Version Control Management, IP Addressing Standards and Management, Naming Conventions and DNS/DHCP Assignments, Standard Configuration and Descriptors, and Configuration Upgrade Procedures.” (Cisco, 2006, p. 1) Software Version Control Management is achieved by using the same software version on devices that are similar. This eases the issues of defects and inoperability. IP Addressing management is the process of assigning and or reusing and documenting IP addresses. Naming conventions can be a big part of keeping a network running. Knowing how the naming conventions were set up will help aid with future naming. This consistency lessens the duplication of IP Addresses, easier identification and “a consistent access point to routers for all network management information related to a device.” (Cisco, 2006, p. 2) Standard configuration and descriptors can be achieved by...

Words: 1160 - Pages: 5

Free Essay

Study Guide

...1. Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM? Swap ( Backing Store, virtual memory) 2. Fedora supports i386, ppc, and x86_64 architectures. True 3. What represents the root partition in Linux? / 4. The utility that can be used to copy a file, including text and executable program (binary) files is _cp_. 5. Which Linux utility is used to rename a file? mv 6. Which command displays the last 10 lines of the file abc? tail 7. Which Linux utility is used to view a file one screen at a time? Less 8. Which Linux utility is used to move a file from one directory to another? mv 9. Which Linux utility is used to search for a particular string within a file or a group of files? grap 10. Which Linux utility lists the names of files in a single directory? LS 11. Which Linux utility do you use to make your home directory the working directory? CD 12. An absolute path name always starts with a /, which is the home directory of the user. False 13. Which of the following commands do you use to ensure that all the users on a computer can execute a particular script? Chmod 14. Which Linux utility is used to display the pathname of a current working directory? PWD 15. Which symbol instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file? > Greater than 16. Which Linux utility do you use...

Words: 865 - Pages: 4

Premium Essay

Ios Commands

...|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router#...

Words: 2715 - Pages: 11

Premium Essay

Unix Administration Chapter 2

...Network Terms Set Up Network Devices with the ip Tools Save Device Settings to a Configuration File Set Up Routing with the ip Tool Advanced SUSE Linux Enterprise Server Administration (Course 3038) 2 Objectives (continued) • Save Routing Settings to a Configuration File • Configure Host Name and Name Resolution • Test the Network Connection with Command-Line Tools Advanced SUSE Linux Enterprise Server Administration (Course 3038) 3 Understand Linux Network Terms • Device – Network adapter built into the system • Link – Used by command-line tool ip to refer to the connection of a device to the network • Address – IP address assigned to a device • Broadcast – Refers to the broadcast address of a network • Route – Path IP packet takes from source to destination host Advanced SUSE Linux Enterprise Server Administration (Course 3038) 4 Set Up Network Devices with the ip Tool • Command-line ip tool – Changes the network card configuration • Used to perform the following tasks – Display the Current Network Configuration – Change the Current Network Configuration Advanced SUSE Linux Enterprise Server Administration (Course 3038) 5 Display the Current Network Configuration • IP address setup – Syntax • ip address show Advanced SUSE Linux Enterprise Server Administration (Course 3038) 6 Display the Current Network Configuration (continued) • Device attributes – Syntax • ip link show – Possible attributes • UP,...

Words: 1162 - Pages: 5

Free Essay

Term

...THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with...

Words: 26881 - Pages: 108

Premium Essay

Sop for Ix380

...& Scope 5 3.0 General Information 7 Safety Precautions 7 Cleaning and Maintaining 7 4.0 Device Physical Appearance 8 Appearance 8 Parts Supplied 8 LED Indicator 8 Working Condition 9 Technical Parameters 9 Ports 10 5.0 Physical Connectivity of IX380 11 Application Structure 11 Hardware Installation 11 Connect to LAN 11 Connect to Phone 12 Connect Power Adapter 12 Power on MODEM 12 6.0 Configuration of IX380 13 TCP IP Installation 13 TCP IP Configuration 13 Checking 14 Check LAN Connection 14 Cancel Proxy Server in Browser 15 Others 15 7.0 Preliminary Actions 16 Login 16 Status 18 Connection Status 18 WiMAX Information 20 About My Modem 22 Setup 23 IP Configuration 23 DHCP Clients 23 DHCP Binding 24 WLAN 24 Basic Settings 24 Security 25 MAC Filter 27 Advanced Settings 28 Advanced 28 Routing Setup 28 SNTP Client Configuration 29 DDNS Setup 29 DNS Configuration 30 IGMP Configuration 31 Security 32 Port Forwarding 32 Port Trigger 33 DMZ 35 ACL 36 VPN Client 38 Tools 39 System Commands 39 Ping 40 User Management 40 System Log 41 VAS Code 42 Troubleshooting Steps 44 In case of VPN? 46 LAYER 2 VPN: 46 LAYER 3 VPN: 46 Appendix Glossary 48 1.0 Document Control Information 1.1 Document Approvals |Date |Name ...

Words: 5052 - Pages: 21

Premium Essay

Network

...1. User EXEC * Router> Privileged EXEC * Router# Global Configuration Router (config) # Line Configuration Interface Configuration Router Configuration Router (config-line) # Router (config-if) # Router (config-router) # 2. Document the router prompt and full command to change the name of Austin’s router to AUS. * Router(config)#hostname AUS 2. Document the router prompt and full commands to configure AUS with the two global passwords that can be used to enter privileged EXEC mode. Use class as the password. AUS(config)#enable password class AUS(config)#enable secret class 3. If both are configured, which can serve as the password, and do you need to configure both? If both are configured, the enable secret password can be used. The enable password command is ignored. Therefore, you do not need to configure both. The enable password is still supported by the IOS for legacy purposes. Document the router prompt and full commands to configure the console port on AUS. Use the password cisco. * AUS(config)#line console 0 * AUS(config-line)#password cisco * AUS(config-line)#login * AUS(config-line)#exec-timeout 30 0 <--Optional * AUS(config-line)#logging synchronous <--Optional 5. Document the router prompt and full commands to configure the Telnet lines on AUS. Use the password cisco. AUS(config)#line vty 0 4 AUS(config-line)#password cisco AUS(config-line)#login AUS(config-line)#exec-timeout 30 0 <--Optional ...

Words: 2593 - Pages: 11

Premium Essay

Student

...Building configuration... Current configuration : 1252 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R1 ! boot-start-marker boot-end-marker ! ! no aaa new-model memory-size iomem 15 ! ! ip cef ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! interface Loopback0 ip address 1.1.1.1 255.255.255.0 ! interface Serial0/0 no ip address shutdown serial restart-delay 0 no fair-queue ! interface Serial0/1 no ip address shutdown serial restart-delay 0 ! interface Serial0/2 no ip address shutdown serial restart-delay 0 ! interface Serial0/3 no ip address shutdown serial restart-delay 0 ! interface FastEthernet1/0 ip address 10.0.1.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet2/0 ip address 10.0.4.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet3/0 no ip address shutdown duplex auto speed auto ! router bgp 10 no synchronization bgp router-id 1.1.1.1 bgp log-neighbor-changes network 10.0.1.0 mask 255.255.255.0 network 10.0.4.0 mask 255.255.255.0 neighbor 10.0.1.2 remote-as 10 neighbor 10.0.4.2 remote-as 5 no auto-summary ! ip http server no ip http secure-server ! ! ! ! ! ! control-plane ! ! ! ! ! ! ! ! ! ! line con 0 line aux 0 line vty 0 4 ! ! End R2 R2#sh run Building configuration... Current configuration : 1197...

Words: 4788 - Pages: 20

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Premium Essay

70-640 Lab 1

...LAB 1 EXPLORING THE WINDOWS SERVER 2008 INTERFACE THIS LAB CONTAINS THE FOLLOWING PROJECTS AND ACTIVITIES: |PROJECT 1.1 |Modifying Basic Server Settings | |Project 1.2 |Configuring TCP/IP Settings | |Project 1.3 |Configuring a Second Windows Server 2008 Computer (optional) | |Project 1.4 |Configuring a Windows Server 2008 Server Core Computer (optional) | |Lab Review Questions | | |Lab Challenge 1.1 |Verifying Active Directory SRV Records | Before You Begin Lab 1 assumes that setup has been completed as specified in the setup document and that your computer has connectivity to other lab computers and the Internet. To perform all projects in Lab 1, you will need: • Two (2) full installations of Windows Server 2008 • One (1) Server Core installation of Windows Server 2008 For subsequent labs, optional projects are provided that involve a second server running the full GUI version of Windows Server 2008 to be configured as a Read-Only Domain Controller and a third...

Words: 3284 - Pages: 14