Premium Essay

Tcp/Ip Lan Plan

In: Computers and Technology

Submitted By JPRenolds
Words 315
Pages 2
TCP/IP LAN Plan CheckPoint
An IPv6 address is 128 bits compared to the IPv4, which is only 32 bits.

The subnet mask of an IP address, defines the network portions and which part is the host portion.

Each of the three class IP addresses have a range, which cannot be routed across the internet. Since the IP address 172.19.243.254 falls in the range of the class B 172.16 to 172.31 ranges it cannot be routed across the internet.

Computers to communicate on a TCP/IP logical network they must have an IP address. An IP address is unique to the devices on a network providing the network ID and the host ID there for, for a computer to talk to another computer within a logical network they both must have an network ID and a host ID.

Reallocating bits from the host ID to a network ID one must remember subnets take the power of 2, meaning to create 16 subnets one must reallocate 4 bits to the 2 power (2x2=4x2=8x2=16).

A class C network address is 255.255.255.0, leaving the last octet for identification of subnets. 32 subnets equals 6 bits, converted to binary provides a 11111100 binary bit pattern with the sixth 1 representing the 32nds place. The binary bit pattern 11111100 is equal to (128+64+32+16+8+4) 252, which is a subnet mask of 255.255.255.252.

To assign address to 62 hosts one must use the formula 2n-2 with n representing the number of host bits. 62 host is (2*2=4*2=8*2=16*2=32*2=64-2=62) 6 host bits.

Why subnet, the ability to break up large networks in to smaller networks, free up available IP addresses, create logical works groups, increase efficiency, reduction broadcast traffic increases...

Similar Documents

Premium Essay

Tcp Ip Lan Plan

...Axia College Material Appendix C OSI Model Key Terms Table Use the table to define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed. | | |Function | |Term |Definition |(if applicable) | |Physical layer |Is responsible for the actual transmission |Media, signal and binary transmission | | |of the bits sent across a physical medium | | |Data link layer |Is responsible for providing error-free |Physical addressing | | |data transmission and establishes local | | | |connections between two computers or host | | |Network layer |Is concerned with the addressing and |Path determination and logical addressing | | |routing processes necessary to move data | | | |from one network to another ...

Words: 549 - Pages: 3

Premium Essay

Raven Williams-1230

...layers over multiple physical tiers. This can make a very good impact on your application by Improving performance (sometimes), scalability and fault tolerance. The maintenance of your application is easier because of the low coupling between layers. Adding more functionality to your application is made easier. Layers make your application more testable. Building a well formed layers makes the orientation in your application easier. Having your application not layered means that you have to deal with all security threats in one place which is very difficult. Having your application distributed to layers makes it much easier for design and implement Without a good deployment plan it is not trivial to distribute your layers over multiple physical tiers in distributed computing. You need to plan ahead your layers when you create a distributed application. 3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society-based protocol. protocol is a set of rules in which telecommunication and end points use when communicating. There are many different protocols used and they all vary from protocol to protocol. Protocols can be...

Words: 1095 - Pages: 5

Premium Essay

Information Security

...Darrel Smith IT255 11/29/2011 Research Assignment 2 A sound security plan is the first step towards a multi-layer defense. To develop a plan, the company must access its most important assets; identify vulnerabilities as well as the infrastructure and technology most appropriate for mitigating risk, then implement a strategy for putting the plan in action. Emails are prime examples. It has become a critical business communications tool and is also a primary conduit for malicious code. Protecting emails against viruses, worms, spam, Trojan horses, phishing attacks and other threats requires a variety of security technologies. These antivirus and antispyware software, content filtering, and firewalls. Such security technologies must be installed at various levels of the infrastructure-such as the gateway, mail servers and desktop or laptop. This way, threats that may bypass one level are dealt with at another. In addition, layering security helps mitigate the risk of an employee who disables protection on his or her desktop. The gateway serves as an entry and exit point to the company network. By installing a security solution such as antivirus and content filtering at this tier, mass-mailer worms are scanned and deleted and spam is moved to quarantines. Mail servers should also be equipped with security. These systems receive, send, and store email, and an email security solution work together with the email program to provide a greater degree of protection......

Words: 1445 - Pages: 6

Free Essay

The Internet

...on the ARPANET to over 300,000 computers on many interconnected networks. As ARPANET grew to include more computers, researchers realized the need for each connected computer to conform the same set of rules. The Network Control Protocol (NCP) was developed as the first collection of rules for formatting, ordering, and error-checking data sent across a network. Vincent Cerf, who is often referred to as the Father of the Internet, along with his colleague Robert Kahn, developed the Transmission Control Protocol and the Internet Protocol (referred to by their combined acronym TCP/IP), which are still used today. The Transmission Control Protocol (TCP) includes rules that computers on a network use to establish and break connections. The Internet Protocol (IP) includes rules for routing individual data packets. The term Internet was first used in 1974 in an article written by Cerf and Kahn about the TCP protocol. The open architecture philosophy ensured that each...

Words: 763 - Pages: 4

Premium Essay

Network Administrator

...ENGLISH AND KISWAHILI AGE : 26 YEARS ID NUMBER : 23769870 CARRIER OBJECTIVES To design and plan an advanced Telecom infrastructure that services over a million subscribers with ‎Triple Play Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎ SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches • Firewalls rules implementation • VoIP servers using IP PABX • Network IP planning • Software and hardware Windows •...

Words: 1141 - Pages: 5

Free Essay

Mgmt T Information System Review

...A typical wan transmission speed is 1mbps. A business cannot use the internet unless it goes through an isp. True A device attached to a network is called a host. A host address on an internet is its ip address. A lan is a network that provides service within a site. A packet is called a packet in a routed network Different isps interconnect at network access points. For human reading ip address usually are expressed in dotted decimal notation. Multiplexing reduces the cost of trunk lines. 217.42.248 is an ip address A corporate network can use osi standards at some layers and tcp ip standards at other layers. True A network architecture is a broad plan that specifies everything necessary for two application programs on different networks on an internet to be able to work together effectively. An ip packet is encapsulated in a frame. Most protocols are connectionless. True Routers are called layer 3 devices. Tcp and udp are the only tow protocols at the transport layers. True. When routers receive a packet to pass on, they first decapsulate it. Which host decapsulates the sending host or the receiving host? The receiving. At which layer would you find standards for downloading videos from a video sharing site such as youtube? Application If your closck is 1/10000 of a second and you want a bit rate of 50 kpbs how many possible states will you need per clock cycle? 32 A length of utp wiring is a cord. A noise spike is a brief large increase or......

Words: 588 - Pages: 3

Free Essay

Case Scenario

...offices will be from 7 a.m. to 9 p.m., based on the schedule of the doctors. Since 1986, the offices located in the north and the south have been using an IBM PC/XT and a dot matrix printer with custom software to manage the patient information. These computer systems need to be upgraded, and the data needs to be typed manually into the new computer system. The office located in the city center is more modern; however, the software and hardware it uses may need to be upgraded to store the new information and meet the needs of additional network connectivity. This office will be the central office, and it will have the maximum activity. This office has a Fedora Core Linux Operating System version 8 on a Dell server and uses TCP/IP to communicate with the existing workstations that have XP sp2. This office has the Medical Manager software operating on the server. This office also has two workstations in the reception area, one workstation in the nurse’s office and one in the supervisor’s office that is shared by the office supervisor and the billing manager. The offices located in the east and the west also use the Medical Manager software installed on SCO Unix machines with directly attached terminals. These machines are outdated and need to be replaced. However, the cabling in these two offices has recently been updated for the replacement of SCO machines and terminals and the...

Words: 1477 - Pages: 6

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which......

Words: 2355 - Pages: 10

Premium Essay

Kudler Fine Foods Network Analysis

...with each other. These protocols determine how messages are sent and received, detect and recover transmission errors and determine how messages are formatted. These protocols are important because they define the guidelines which determine how computers communicate with each other in a standardized manner. The protocol identified for Kudler Fine Foods is the Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite. There are many advantages to using this protocol. It is compatible with all operating systems, hardware, software and network configurations. This protocol is routable and highly scalable which enables expansion of the network as needed. It also provides very reliable data delivery. The Suite includes protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP). HTTP transfers web pages including plain text, audio, video, images and hypertext. FTP transfers files from one computer to another. SMTP is the protocol needed to send and receive email messages. The TCP/IP network architecture provides secure reliable communication for Kudler Fine Foods. It uses...

Words: 995 - Pages: 4

Premium Essay

Final

...Final Exam Review 8 to 10 Introducing the Internet Protocol (IP)  TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP)  TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP)  Network Layer protocols  IP: Most important protocol defined by Network layer  Almost every computing device on planet communicates, and most use IP to do so  Network layer also defines other protocols 4 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 2 Name Full......

Words: 9644 - Pages: 39

Premium Essay

Nt 1210

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420......

Words: 4400 - Pages: 18

Premium Essay

Intro to Information Security

...Into To security Project Part 1: Multi-Layered Security Plan: As part of my report, below is my outline for Richman Investments Multi-Layered Security Plan: User Domains: Since Users can access systems, applications and data depending on their roles and rights, an employee must conform to the staff manual and policies also known as the Acceptable Use Policy (AUP). The department manager or human resources manager is usually in charge of making sure that employee and in certain cases third party vendors, contractors ect sign and follow the AUP. To ensure that these threats and vulnerabilities can be avoided, a good policy would be to conduct security awareness training, update the employee manual and discuss the handbook, during performance reviews, disable internal CD drives and USB ports and enable automatic antivirus scans for inserted media drives, files, and email attachments, and lastly restrict access for users to only those systems, applications, and data needed to perform their jobs. Workstation Domains: These users configuring hardware, ensuring that all computers have the latest software revisions, security patches, and system configurations. To ensure that there are no threats with our software, enforce defined standards to ensure the integrity of user workstation and data, enable password protections on workstations for access, and auto screen lockout for inactive times, use content filtering and antivirus scanning at Internet, define......

Words: 727 - Pages: 3

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420......

Words: 4400 - Pages: 18

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College......

Words: 2573 - Pages: 11

Premium Essay

Nt2580:Project Part 1

...The following is a multi-layered security plan outline for Richmond Investments that will address general security solutions for the safety of the company’s data and information. The outline will state recommended security solutions for each of the seven domains of the IT infrastructure. User Domain One of the most common vulnerabilities within the User domain is the lack of awareness or concern for employees towards the security policies of the company. To minimize this vulnerability Richmond investment is requiring that all company employees participate in a mandatory refresh security awareness training every four months. These mandatory refresh classes are aimed at educating employees regarding the best practices for opening email, password creation, reminding employees of security policies that might have been overlooked the first time they received their training, and other policies that ultimately can help prevent malicious threats. Workstation Domain The most common vulnerabilities in the workstation domain include unauthorized user access, weaknesses in the software currently installed, and possible introduction to malicious software. To help minimize the risk of unauthorized access, the company will enable password protection on all the devices and recommend that all users lock the computers every time they step of the workstation. In addition, the company’s network administrator will be responsible to keep all software and applications up to date with the......

Words: 725 - Pages: 3