Free Essay

Ip's

In: Computers and Technology

Submitted By Cisco15
Words 435
Pages 2
Static or Dynamic
John G. Heiden Jr.
IT/242
June 27, 2013
Edward Spear

Static or Dynamic
To know which configuration of routing is best for a particular situation, it is important to know a couple of factors that will influence the decision. The administrator needs to know what type of network it is, will the network change often, and maybe even the size of the company. There are two types of routing that can be used in these particular situations, static or dynamic routing.
Static routing is basically done by configuring the network for point to point directions, in other words one route that can be used to get to a point. Each network or subnet is assigned a static route where a router sends information to a specific router to another specific router. When the packet of information is reaches its final destination, the information is transmitted to the network host that it is connected to. This can work well if the network is small, and the administrator has complete control over all the routes that are configured. But if there is an error in the network, such as a router crash or hardware problem, this could be a disadvantage because the information that is transmitted would not be completed and never reach the intended recipient. Another disadvantage would be that each time the network layout changes the administrator would have to reconfigure the routers.
Dynamic routing is done much the same way as static but for one main difference, the routers in the network are capable of determining the most efficient route for the information to reach its final destination. This is an ideal type routing for a large network, because the administrator will not have to reconfigure the routers. This type of routing allows for errors within the network, such as router crashes or hardware failure, and can choose the efficient route for the information to reach a certain destination. Each device can learn network destinations, how to get to those destinations, and can communicate with other routers on what those destinations are.
If, as the scenario states, the company has only two routers in which to configure, static routing is the best way to go. It can be easily configured and maintained by the administrator because of its size. But in most real world scenarios with a larger company, there would be a need for routing capacity. In this situation, dynamic routing is the best course of action by the administrator because it would be less time consuming and a more efficient way of transmitting data across a network.

Similar Documents

Premium Essay

Case Study - International Paper

... when trade regulations revised to promote Canadian imports and later, in 1921, labor conflicts within IP contributed to a decline in IP’s market share. However, IP rallied by creating a Canadian subsidiary, expanding into the South by acquiring and building new mills, consolidating its northern operations, and diversifying its product line from primarily newsprint, to book and bond products, and later, corrugated containers. This diversification aided IP in surviving the Great Depression, and continued through the 1930’s. IP continued to reap profits and expand the company through the 50’s and 60’s, into North American and overseas, eventually expanding into places such as French West Indies, Mexico, and France. The 1970’s found IP divesting itself of several plants and mills, and in 1976, J. Stanford Smith, facilitated a major company reorganization revised the geographic area divisions into business units dedicated to a specific function or product. Over the next twenty years, IP proceeded to make significant capital changes and embark upon even more aggressive expansion stateside and overseas (Forest History Today 1998). Today, with their global headquarters in Memphis, Tennessee, they have other operational offices and plants distributed throughout North America, Europe, Latin America, Russia, Asia and North Africa. Specifically, IP’s...

Words: 1499 - Pages: 6

Premium Essay

Unit 3 Assignment 1 Arin

...of the free pool of IPv4 addresses to predict timelines for IPv6 transition. There are approximately four billion IPv4 addresses, however not all of these can be used openly on the internet. (computerweekly) IPv6 allows 128 bits for IP address space, allowing 340282366920938463463374607431768211456 (three hundred forty undecillion) nodes to be uniquely identified on the Internet.(netbsd) In the past, there were a little over four billion IPv4 addresses made. Most people thought that this would be enough IP’s for the world. They didn’t realize how far the internet would come. IP’s are now household items just like refrigerators and in-door plumbing. I think at the current rate the IPv4 addresses will be exhausted within the next two to three years. Though they are still in use they are a finite resource. I think that we still use these because IPv6 has been completely finished or deployed. I don’t think that IPv4 can be hoarded because ARIN keeps a listing of all IP’s in use. This will allow them to track down what is in use and get everything in...

Words: 255 - Pages: 2

Premium Essay

Ipv6

...not saying that I am smarter than they are or that a new version of the internet protocol isn’t very very needed, but why does the IPv6 format have to be hexadecimal. Numerical digits were working just fine and were pretty easy to memorize. Now network engineers have to find a way to either memorize or securely record eight four digit hexadecimal octets. I mean why not throw some wingding characters in the mix too and while you’re at, let’s throw some different colors in. Could they make it any more difficult to remember? When it comes to Secret, Top Secret, TS/SCI, and above networks how are the network engineers supposed to build, maintain, and expand their networks at the same pace as with IPv4? I mean you can’t write the Secret IP’s or subnets down, well you’re not supposed to anyway. Of course they will have classified documents and network diagrams and notebooks, but that kind of stuff would have to be kept in a safe and you would have to go through a whole process just to take a look at your books. With all that said, I will have to give them credit for developing an IP format that will have a ton more addresses and will take so much longer to exhaust and is much more secure than its predecessor. Ok, with that part out of the way let’s take a look at the history of IPv6. The need for a new version of the so widely used internet protocol came out of the explosion of internet capable devices and the growing population of consumers that have or will have home...

Words: 1846 - Pages: 8

Premium Essay

International Marketing

...stock currently sells at around $53/share. IP is currently headquartered in Memphis Tennessee, and employs over 62,000 people (Kotler & Armstrong, 607). Last year, the company sold over $26 billion worth of product, placing it 111th on the Fortune 500. From a consumer perspective, when a multi-billion dollar producer of paper and packaging products comes to mind, we automatically assume that the company produces a large amount of pollution and destroys forests all over the world. However, International Paper prides itself on being on top of Fortune Magazine’s “Most Admired Companies” (Kotler & Armstrong 607). The reason for this recognition is due to the company’s continued social responsibility efforts and initiatives. IP’s vision is “to be one of the most respected and successful companies in the world” (Internationalpaper.com). The corporation has created a strong culture of accountability that works to implement strategies surrounding...

Words: 4020 - Pages: 17

Premium Essay

Network Dessign

...Router/firewall with two 100Mbps Ethernet interfaces eth0 and eth1. Unlimited amounts of 100Mbit Manageable Fast Ethernet switches in the following sizes: 48 ports 24 ports 8 ports. Subnet/ address assignment Site A: 72.128.31.0/24 - supports 256 addresses (254 usable) 72.128.31.254 is bRouter address on this subnet ( interface fa0/0) 72.128.31.253 is Router1 address on this subnet ( interface fa0/0) 72.128.30.252 is a 8-port switch (Switch1) on this subnet 72.128.30.251 is a 48-port switch (Switch2) on this subnet 72.128.30.250 is a 48-port switch (Switch3) on this subnet 72.128.30.249 is a 48-port switch (Switch4) on this subnet 72.128.30.248 is a 48-port switch (Switch5) on this subnet All other IP’s are available for workstations Site B: 72.128.30.0/25 - supports 128 addresses (126 usable) 72.128.30.126 is Router2 address on this subnet (interface fa0/0) 72.128.30.125 is Router3 address on this subnet (interface fa0/0) 72.128.30.124 is a 8-port switch (Switch6) on this subnet...

Words: 865 - Pages: 4

Premium Essay

Ip Plan

...1. IPv6 uses d. 128 bit addresses. That equates to 2 to the 128th power addresses. The earlier IPv4 only used 32 bit addresses which was roughly only 4.3 billion addresses. IPv6 uses eight groups of hexadecimal digits of both numbers and letters separated by colons. It offers billion and billions+ more IP’s than IPv4. It would look something like this 1000:20g6:501a:6601:at6j:8236:T9D6:543ah. 2. The subnet mask of an IP b. Defines network and host portions of and IP address. IPv4 addresses have two parts to them: one part identifies the network and the other part identifies the specific machine or host within the network. Within a string an IP address the first two are the network address and the second two are the host address. 3. The private IP address of a. 192.156.90.100 cannot be routed across the internet. As the world runs out of IPv4 addresses these private IP’s were put in place for devices the do not directly access the internet meaning you would find them only on local networks because they must pass through a device using a router of sorts that is connected to the internet. There are three classes A-C. A starts with the number 10, class B addresses from 172.16 to 172.31 and class C addresses from 192.168.0 to 192.168.255. 4. When using TCP/IP on the same network computer must have a. Network ID and c. Subnet Mask in common. Routers use the network ID portion of IP addresses along with their routing tables to determine on which network a destination device can...

Words: 310 - Pages: 2

Free Essay

Integration

...Nedgty: Web Services Firewall Ramy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef Department of Computer Science American University in Cairo, Egypt {ramy1982,hesh84,sherif,youssefh,youssefy}@aucegypt.edu Abstract This paper describes the research conducted to develop Nedgty, the open source Web Services Firewall. Nedgty secures web services by applying business specific rules in a centralized manner. It has the ability to secure Web Services against Denial of Service, Buffer Overflow, and XML Denial of Service attacks; as well as having an authorization mechanism. 2. Overview of Related Work The concept of web services firewalls has been only recently developed, which accounts for the limited number of products available in the market [4]. Most of the available products are defined by a set of common features. One of those features is XML content inspection also known as deep packet inspection (DPI), which allows for the inspection of the XML content embedded in the SOAP requests coming to the web services. Another feature is webservices access control, either for a whole service or for specific operations. Moreover, some web services firewalls accept WSDL2 files or Schema for SOAPenvelope validation purposes. Two of the most successful products in the market are the ForumSystems XWALL [5] and the DataPower XS40 XML security gateway [6]. They both help the user to define his/her own policies either through a GUI as in XWALL, the definition of...

Words: 3572 - Pages: 15

Premium Essay

Subnetting

...27. 173.193.0.0/16 subnetted to 93 subnets and provide information for subnets #1, #16, #34, and #93 First thing that have to be done is to get the IP address into binary. IP address is 32bits broken down to 8 bits per section. (128 64 32 16 8 4 2 1) use this in order to convert a number into binary or convert binary into a number. 173.193.0.0 converted to binary is 10101101.11000001.00000000.00000000 - Network in red/ Host in grey 128 64 32 16 8 4 2 1 1 0 1 0 1 1 0 1 = 173 128 64 32 16 8 4 2 1 1 1 0 0 0 0 0 1 = 193 The original subnet mask, which is 16 bits, is 11111111.11111111.00000000.00000000 – 16 bits in red. To see how many bits that need to be borrowed to get 72 subnets, the formula 2x will need to be used. (X will be the number of how many bits is borrowed from the host) 21 = 2 22 = 4 23 = 8 24 = 16 25 = 32 26 = 64 27 = 128 Since 6 bits is not enough to cover the 93 Subnets needed, 7 bits will have to be borrowed from the subnet mask. The new subnet mask is now 11111111.11111111.11111110.00000000 – green is the 7 bits that was borrowed. Converted in to decimal, the new subnet mask is 255.255.254.0 10101101.11000001.00000000.00000000- Network Address (red is network/green is bits borrowed from the host/ grey is the host) SUBNET #1 To find the information of this subnet, which is subnet one, the subnet bit that was borrowed needs to be replaced the subnet number. Since the subnet number is 1, Then...

Words: 1121 - Pages: 5

Free Essay

Usenet vs Torrents

...Download speed The first thing we’re going to take a look at when comparing Usenet vs Torrent, is the the download speed. With torrent (P2P) downloading, you need to rely on other persons to seed so you can download faster. Therefore your downloading speed will be restricted by the amount of seeders. If there are few seeders you’re going to download slower. With Usenet, your downloading speed isn’t restricted by the amount of seeders and lechers. There’s no restriction. The downloading speed in only limited by your broadband. So if you have a fast internet, you’re going to download movies and shows quick. Usenet speeds are as fast as the end users internet connection. File availability Usenet vs Torerent, which one have the best file availability? The first movies and songs appeared on Usenet even before the birth of Napster & BitTorrent. Even today, the majority of content from top site uploaders gets on Usenet first, and then spread to the P2P communities. This is the way online distribution works, and there is no indication that this will change any time soon. Content uploaded to Usenet have a close to definite lifespan. Therefore Usenet have a clear advantage over torrents in terms of file availability. Content on Usenet have a retention time of around 900 days and it’s still increasing. Files uploaded to BitTorrent relies on seeders, over time content on BitTorrent will die. Seed ratio How can we really compare Usenet vs Torrents, when Usenet don’t...

Words: 938 - Pages: 4

Premium Essay

Ip Addressing Scenario

...IP addressing Scenario When you design an IP addressing scheme for a medium to large scale company you need to take into account several questions about the company environment. What type of security is needed? Is the company going to grow past 145 clients? Do all the computers need to talk to one another? Can they be separated out into different departments? What types of content will be shared between users? How many content share servers are there? When setting up an IP scheme you need to take into account the growth of the company. If the company is only going to have 254 devices attached to the network. If the answer is yes then you can proceed with a statically assigned IP scheme. If you answer is no then you need to implement a scheme designed around a DHCP server. Normally when you design a scheme you want to take into account the departments in the company and if they need to be interconnected to the rest of the clients. If there are several departments that need to talk to one another, and a couple of departments that are restricted access clients. These types of question and answers would make an IT professional’s job either simple or more complex. Normally in a IP Scheme you want to choose the IP address that make sense to your network most internal networks sit in the class B or C range. If you choose a network IP of 172.16.0.1 your subnet masks would be at 255.255.0.0 for your choice. If you are going to design a IP scheme around a DHCP Server it might be...

Words: 508 - Pages: 3

Free Essay

Unit 9 Explore and Discuss

...mike zavala NT1430 5/24/14 Unit 9 Explore and Discuss Bind in linux- BIND (Berkeley Internet name domain ) is the most commonly used DNS (domain name system) server on the internet, and it is the defacto standard on linux and other Unix-like operating systems. Configuring BIND- the first thing to configure is /ect/bind/named.conf. The first part of this step is specifying binds root directory, the listing port with IP’s, the pid file, and line for IPv6 protocol. The second part of named.conf is the internal view used for our local network. The third part of named.conf is the external view used to resolve our domain name for the rest of the world and to resolve all other domain names for us( and anyone who wants to use our DNS server). The final part of named.conf is the logging policy. The /var/log/named/ directory mustbe exist and belong to named: BIND history – BIND was originally written at University of California at Berkeley (UCB) as a graduate student project under a grant from the U.S. Defense Advanced Research Projects Administration (DARPA). The acronym BIND originally stood for Berkeley Internet name daemon. DNS BIND Linux – BIND provides an openly redistributable reference implementation of the major components of the DNS, including a DNS server (called named), a DNS resolver library and tools for verifying the proper operation of the DNS server. The resolver library is a collection of functions witten in the C programming language that provides hostname-to-IP...

Words: 268 - Pages: 2

Premium Essay

It/241 Appendix H

...en Associate Program Material Appendix H Wireless Network Types Summary Tables Complete the Week Nine Capstone Check Point by filling in the summary tables below. These tables will help you summarize wireless network types. Wireless Personal Area Network (WPAN) |Maximum transmission distance |About 33 feet at best | |Two current applications of WPANs |Laptops | | |PDA device | |Research WPANs and list one future use of this |Identification of Radio Frequency(RFI). This technology is used to monitor devices | |technology. |at long distances. | Wireless Local Area Network (WLAN) |Maximum transmission distance |375 feet is the maximum | |Two current applications of WLANs |Networks that include laptops | | |Smartphones with wireless capability | |Research WLANs and list one future use of this |The expansion of access points will broaden the...

Words: 269 - Pages: 2

Premium Essay

Written Network Layout

...From the back yard we are having the ISP do the installation of the cabling. There will be Fiber Optics running to the server room that will be connected to the switches and router. From there we will have Cat6 connected to the Rj45’s in each area we have the wall mounts on. In port 1 we have the living room where there will be VoIP phones and an access point. The VoIP phone will have an DHCP reservation but is set to static. The Access point will have two devices connected to it which will be two tablets. The access point that is connected to the router will be assisting the router and the router is the one that will be assigning IP’s to each device. We will have another cable ran to the guest bedroom which also has an RJ45 jack there. In that room there is a game console, more precisely a PS4. That PS4 will be connected through Ethernet. Each device will have its own IP assigned. The router’s private IP address will be 172.16.0.1, the two tablets that are connected wirelessly will be 172.16.0.2 and 172.16.0.3, the phone will be 172.16.0.4, the office computer will be 172.16.0.5, the PS4 connected will be 172.16.0.6, the PC will be 172.16.0.7 and the Roku box in the master room will be 172.16.0.8. We will be making sure that our home network is secure as well; to do that we will be changing the username and password for it after the initial setup. Along with that we will also use WPA/WEP encryption for the passwords. WPA/WEP is usually on by default after the initial setup...

Words: 420 - Pages: 2

Premium Essay

Network Services

...this in the address bar the website would populate this way as well. DHCP stands for “Dynamic Host Control Protocol” and is used to automatically assign IP addresses to authorized computers attempting a connection to the network. The way this works is that a computer attempting a connection will send a request to the DHCP server. The server receives and acknowledges the request. The server then sends the acknowledgment back to the user with a leased IP address. When it’s all said and done, the computer attempting to gain access should now be able to access the network. Assigning IP addresses using DHCP is an easy thing to today. Unfortunately the more workstations you have on your computer, the more conscious you need to be about the IP’s assigned. When manually configuring these, it is possible to duplicate IP assignments, configuring the incorrect subnet mask, and incorrectly configuring other TCP/IP parameters. Small networks should have at least one DHCP server, while larger networks should have multiple implementations of DHCP. The benefit of this is that you can split the address space, while fault tolerance is provided. In conclusion, DHCP can benefit small and large networks as long as they are managed...

Words: 303 - Pages: 2

Free Essay

Patton Fuller Community Hospital Networking Project

...Networking Project Tony Sanchious University of Phoenix CMGT/554 September 10, 2012 La Shanda Perry Patton-Fuller Community Hospital is a prominent hospital that is known for specializing in radiology, physical therapy, pharmacy, and surgery. Patton-Fuller Community Hospital was founded in 1975. Patton-Fuller Community Hospital has been providing quality care to all its patients both children and adults alike. Patton-Fuller Community Hospital patients are accustomed to the quality service that the hospital provides with a focus on the different programs and services to help maintain a high degree of care for its patients. Patton-Fuller Community Hospital has an abundance of technology and can be segmented into many different areas providing an in-depth review of the advancements and shortfalls of organization. The networking department has the challenge of dissecting and breaking down the current infrastructure to ensure a comprehensive analysis is done to provide a solution that will last for the three to five years. Identifying the right solutions and architecture is key to ensuring the growth of the network infrastructure to support the demands of the current health care industry. The methods of how Information transmits within the hospital and externally are: Based on the Network Diagrams the Network has two segments; Administrative and Clinical. The backbone network structure for the entire hospital is 1000 Base T. The nodes of the administrative...

Words: 506 - Pages: 3