Premium Essay

Unit 1 Exercise 1 Ip Addressing Scenario

In: Computers and Technology

Submitted By marwan19812003
Words 541
Pages 3
ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 |

|

Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.
In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space, host or whatever it is that you need then you will be able to expand your idea and design. Most systems we use today work real well with DHCP so it shouldn’t be a problem, although some system will need hosts files. I think the first thing you need to take into consideration is the number of hosts. My design would look something like this: I could use the…...

Similar Documents

Premium Essay

Unit 1 Ip

...Unit 1 Individual Project Psychology Persectives Desiree DuBose American InterContinental University Author Note Desiree DuBose, Department of Information Technology, American InterContinental University Online This research was supported by Yahoo Search, AIU Library Resources Correspondence concerning this article should be addressed to Desiree DuBose, Department of Information Technology, American InterContinental University Online, Hoffman Estates, IL 60192 Contact: desiree.dubose1@aiu.edu Behaviorism is an approach with psychology that is based on the proposition that behavior in human beings as well as animals can be researched and understood without recourse to inner mental states (New World Encyclopedia, 2008). There are three major figures that led to this development they are Ivan Pavlov, John B. Watson, and B.F. Skinner. Behaviorism is developed with the order that only observations that satisfied the criteria of the scientific method were to be allowable as evidence. One of the hypotheses many behaviorists hold is that free will is an illusion. As the result of this behaviorism orders that all behavior is determined by a combination of genetic factors and the environment is either through classical or operant conditioning. Classical conditioning is a technique used in behavioral training in which a naturally occurring stimulus is paired with a response. Operant conditioning is a method of learning that occurs......

Words: 897 - Pages: 4

Premium Essay

Ip Addressing Scenario

...Unit 1 Exercise 1: IP Addressing Scenario To start with, I would use the IP Class C. The subnet range in Class C is 255.255.255.0-255.255.255.255. This would be the best one for this company because there is room to grow. I believe that the IP addresses should be statically assigned. That way, there is not a chance of it getting into any trouble by anyone. One network/subnet would do fine. You have a giant subnet range, plus you have a good size network. If DHCP is used, then yes a router, firewall, and Windows Server should be utilized. You need a firewall, so you don’t have any problems with your employees looking at non-work related websites or websites that haven’t been approved. A router, so that you can have your internet connection protected. You wouldn’t want anyone just hacking into your connection and getting their hands onto any private information that they could get their hands on and ruin your company. A Windows Server would be good as well. You could use the Windows Server so the employees could get their work done, instead of searching the web for non-work related things as well. When you consider this design as a possible outcome, just remember that this plan also involves the growth of the company. The growth of the company is the main concern here. We do not want to stunt the growth of the company. We want the company to grow as much as possible. I believe this design will prove to do that. It will be a great design and will help out very much. We do......

Words: 317 - Pages: 2

Premium Essay

Unit 1 Ip

...Criminal Justice System Idellar Camel Criminal Justice Unit 1 IP September 1, 2013 ABSTRACT Unfortunately everyone doesn’t abide by the laws that are set and rules that are made. Therefore, a mean of protecting the innocent and punishing the violators must be established to carry out the process. The structure of processes would be the Criminal Justice System. It is composed of several different components that work on different levels of duty. This paper would describe the different parts of this much needed system such as law enforcement, attorneys of prosecution duties, defense advocates or counsels, Magistrates or judges on three different levels of government, federal, state, and local. Also, this paper would confer the two different structures of the system of the criminal courts. Last, it would give the stages of interactions of the prosecutorial and investigative process with a lawbreaker defendant. Officers: Law Enforcement There are different kinds of agents of law enforcement in the federal level of government. The FBI, Federal Bureau of Investigation, United States Marshall, USSS, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Drugs Enforcement Agency are support staffs and special agents of the federal government. They protect the White House, the President and his family, Vice President, the White House. Also, there are some agencies including the IRS, Bureau of Indian Affairs that assist these law agencies on suspicious activities...

Words: 1118 - Pages: 5

Free Essay

Nt1330 Unit 2. Exercise 1. Dns Scenario

...Aaron Battaglia NT1330 UNIT 2. EXERCISE 1. DNS SCENARIO It is not required to put a DNS server in such a small location for only five users and snail like network connectivity doesn’t justify the amount of money it would cost to install a server(s) in that area. One exception would be if there is a great amount of file sharing, or other information that would need to be accessed daily by other spots on the network. This sometimes but rarely happens but we could have a situation where we put it in the in the server but we set it up as a secondary or Active Directory Integrated zone type. I recommend installing the servers in the location where you have 30 users and fast internet connection. You could do this also, try storing all the files from either location in the bigger office, and in the smaller location you could remote connect through Virtual Private Network. When we do this all the information from the smaller sight is stored off site. The sight with five users can be run with a cheap router and the server that has thirty users at the office will be set up as the primary zone; since this is utilizing the fast internet connection and has more users this is our MAIN BASE which you can call home. =) If you were to run Domain Name System on domain controllers there are Active Directory Integrated zones and Active Directory Integrated zones. In classical Domain Name Systems the zone data is stored in text files which sit on the Hard Drive; which of course is......

Words: 428 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Premium Essay

Unit 1 Ip Addressing Scenario

...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space,......

Words: 289 - Pages: 2

Premium Essay

Econ Unit 1 Ip

...Unit 5 Individual Project Page 1 Shuntina Heard September 28, 2014 Macroeconomics 224-1404A-02 Unit 5 Individual Project Page 2 Hong Kong and Singapore are both tremendously small, but extremely open to international trade. Both countries are also very advanced. Both countries are very parallel in many ways. Both countries at one point served as major trading ports. Hong Kong’s economy is usually the same. At one point they suffered an international economic crisis. A few years after the crisis the economic grate rate rose to 6.8 percent. Hong Kong is considered to be the Gateway for China when it comes to trading. World Bank mission is to help progress and grasp goals of its people by working with its associates to improve poverty. Some of the methods the use to help economic growth is knowledge and learning, post conflict and fragile states, global public goods, and focusing on the poorest country. Both Singapore and Hong Kong must have a market economy because they are industrialized. Knowledge and learning would be a good methods for Hong Kong. Learning what to do and what not to do when it comes to trading. Trying to stay ahead of other countries with similarities and who are considered trading ports. Singapore has a promising economic location and accomplished workforce. Singapore most fast emerging sectors of its economy is communication transport, trade and exports. Unit 5 Individual Project Page 3 References IMF. (2010). World Economic Outlook. International......

Words: 254 - Pages: 2

Free Essay

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd ...

Words: 253 - Pages: 2

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at 172.16.0.0 for your network address with a subnet mask of 255.255.255.0. This gives you 254 hosts per subnet which will easily cover your 50% growth over the......

Words: 384 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Free Essay

Nt1330 Unit 7. Exercise 1. Ad Ou Planning Scenario

...NT1330 Unit 7. Exercise 1. AD OU Planning Scenario Review the following scenario: As an IT Administrator, you have been tasked with designing an Active Directory Domain Organizational Unit Structure for a new AD implementation at an existing organization. You are scheduled to meet with the management team and need to formulate a list of questions you will need answered in order to recommend an OU Structure appropriate to the organization. Develop a list of 5-10 questions to guide your design plan. 1.) How is the existing structure of the organization? 2.) How many departments will there be? 3.) How many sub-departments will be needed? These questions will help in documenting the existing structure of the organization so as to divide the administrative tasks into categories and document the administrators who are responsible for each category. Also, these will define the hierarchy of authority in the directory as well as what departments the company will have. 4.) What are the company’s physical/geographical sites? This will address the issue of different geographical divisions which will probably have different computer management needs. The design will be based on management of resources, users and geographical boundaries. This will make the administration easier. 5.) How many OUs will be needed within each Parent OU? 6.) Will departments need to share resources? 7.) What resources are required by each department? 8.) What group policies to be implemented and......

Words: 331 - Pages: 2

Premium Essay

Unit 1 Ip

...Unit 1 Individual Project for ITCO299-1203A01 Comprehensive IT Project Introduction 2–6 pages | Details: | Scenario You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain its records of the professional development of its employees. The company has over 30,000 employees, who are located in four sites: Florida, Colorado, Illinois, and Texas. The system must allow employees to locate and schedule professional-development activities that are relevant to their positions. Sophisticated search capabilities are required, and the ability to add scheduled events to the employees' calendars is desired. The system needs to support social networking, which will allow employees to determine who is attending various conferences and events. This will promote the fostering of relationships and ensure that the company has representation at important conferences.Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications, which will allow managers to receive notice whenever their direct reports have submitted documentation. The system should also notify employees if their deadline to complete professional-development requirement is approaching and it has not yet been completed. * Project charter: Using the above scenario, develop a project charter. Include the problem......

Words: 257 - Pages: 2

Premium Essay

Bus105 Unit 1 Ip

...Running Head: ACADEMIC HONESTY AND PLAGIARISM 1 Running Head: ACADEMIC HONESTY AND PLAGIARISM 2 People are sometimes accused of plagiarism, and some are unaware that they are plagiarizing unintentionally. Therefore, it is important for someone to learn to use the correct citations and paraphrasing to avoid unintentional plagiarism. In a 2007 article Avoiding Unintentional Plagiarism, (Foster 2007) “Avoiding plagiarism is simple, but for most of us, writing is difficult” (page #2). According to Foster, to avoid plagiarism, you must give credit whenever you use another person’s idea, opinion, theory, facts, information and quotations of another person’s spoken words (page #1). Foster is emphasizing that we must use proper citations in order to avoid plagiarism. Therefore, addressing the key elements of writing while to ensure academic honesty. For an example, one element is using the proper citation guidelines, therefore, “if you include a statement that is identical to the original work, either quote the material exactly and use quotation marks, or if you change words to better fit your style, omit the quotation marks but add the page number in the text citation” (page #1). The other element is telling the reader where the information came from, whether it’s referencing the author and article and or where you found it. By following this method, this will emphasis the originality of your work, therefore, giving the author credit. While plagiarism is...

Words: 571 - Pages: 3

Premium Essay

Unit 1 Ip

...Abstract This paper will evaluate and demonstrate a manufacturing company options about launching a new product. This will be determined using the payback period that they plan to invest in this adventure. This will be performed by figuring out the company net present value and cash flow to determine if a project should be accepted within a three year payback period. The formula that was used to find the payback period was Payback Period = Investment (Total Cost of the Project) / Annual Cash Inflow. The formula used to calculate the net present value is as followed (1+r) ^t. Please click link to view excel spreadsheet for the assignment financial management unit 4 IP excell.xlsx. In order for a project to be accepted using the Payback rule the project according to Brooks, (2010) states that it is okay to accept a project if the payback period is less than maximum years the company is willing to accept. On that, same note if the payback period is longer than the three year that is required by the company then the project need to be rejected. For example, the payback period for this assignment is at 2.9 which mean that the project can be accepted because it is under the three years that the company requires. By the project being boarder line, I would like more clarity because if a person would round the payback period then the project would be denied. When evaluating the net present value a person has to take into considers the......

Words: 530 - Pages: 3