...Theren Woods 9/24/2015 NT 1210 Unit 1. Exercise 1. IP Addressing Scenario A design for a 1 floor office with a single data closet serving 145 to 254 users would need a core network, networks for firewall, a switch management network, a server network, voice network, wireless network, and a network for future services to accommodate the potential 50% growth the company intends to happen. The subnet range that should be used to accommodate 145 hosts plus a potential 50% growth within the next two years should be 255.255.255.0. This subnet mask range would support 254 hosts and this particular scenario is only planning for no more than 218. The IP addresses should be statically assigned because dynamically assigned IP addresses can change each time you connect to the internet but statically assigned IP addresses are reserved for the user and don’t change over time. Statically assigned IP addresses would definitely be best for an office environment because you want the same IP addresses everyday so the computers can talk to the server and with one another daily. You should have more than one network/subnets for computers, printers, future use and other host that may be needed. If DHCP is used you should use a Windows Server because it is safer. Normally a hacker will try to penetrate your router or firewall first so if that happens they will also have your DHCP. If it is on a server that’s another added layer to try and hack...
Words: 255 - Pages: 2
...Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works ..............................................................................
Words: 7747 - Pages: 31
...Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: privacy and authentication...
Words: 9748 - Pages: 39
...IP Troubleshooting Small Group Exercise Activity Overview: This is a small group activity consisting of an IP troubleshooting exercise consisting of five scenario based questions. The exercise begins with a review of a recommend IP troubleshooting procedure and continues with five scenario based questions. Simplified IP Troubleshooting Procedures: Host: * Verify layer-1 and layer-2 * Physical connectivity to the host to connected. Ethernet connection should indicate electrical connectivity with some type of LED indicator light. * Verify OS detecting network interface correctly by verifying drivers installed correctly and OS display the interface as “connected” * If you have access to switching infrastructure ensure that host is assigned to the proper VLAN with the correct interface switching type (access or trunk) * Verify layer-3 * Verify IP address assignment configuration with “ipconfig /all” command on MS Windows OSs * IP address and mask correctly assigned? * Default gateway; is the host on the same IP subnet as the default gateway? * Attempt to ping default gateway, * If successful host has layer-3 connectivity to directly connection network * If unsuccessful attempt to ping other host on directly connected IP subnet * If host is having issues with pinging hosts on directly connected network, verify ARP resolution by using the command ”arp –a” command. This command...
Words: 1729 - Pages: 7
... * E 1. This DHCP message type is sent by a DHCP client when it no longer requires the use of an IP address that it has leased from a DHCP server. * H 2. You can configure one of these to ensure that a DHCP client always receives the same IP address from a particular DHCP server. * F 3. This is used to ensure that a particular address or block of addresses within a scope is not assigned to DHCP clients by a DHCP server. * A 4. You must do this to any DHCP server that needs to function within an Active Directory domain. * D 5. A DHCP client will send this message type if it determines that an IP address offered by a DHCP server is already in use. * B 6. This is performed by a DHCP server when corruption is detected within the DHCP database. * G 7. The DHCP database is based on this database technology. * I 8. Authorizing DHCP servers in Active Directory is designed to prevent against these. * C 9. These provide DHCP parameters to DHCP clients based on vendor or user type. * J 10. This defaults to 87.5% of the total DHCP lease. Multiple Choice Select all answers that apply for the following questions. 1. Which of the following DHCP message types is sent first in the process of obtaining an address lease? * a. DHCPOFFER * b. DHCPACK * c. DHCPDISCOVER * d. DHCPREQUEST 2. At which layer of the...
Words: 758 - Pages: 4
...NT1330 Client-Server Networking II Name: Homework 1 Ch. 1 (70-642): Introduction to Networking Concepts Fill in the Blank: 1-10 The most widely used IP addressing scheme is IPv4. The most recent and largest address space IP addressing scheme is IPv6. To distribute IP addresses automatically, a network administrator would configure the DHCP service. The first attempt at breaking up IP address space used classful addressing to provide address ranges of differing sizes. Prior to the introduction of the Domain Name System, computers used HOST files to map human-readable named to IP addresses. A(n) Subnet Mask is used to separate the host address portion of an IP address from the network address. The subnet mask within the TCP/IP configuration is used to distinguish the network address from the host address. In dotted-decimal notation, each IPv4 address is broken up into four octets. Server computers and other systems that need to be accessed reliably by network clients should be configured with a(n) static IP address. The method of breaking up IP address space into address ranges of flexible size is called CIDR . Page Break Case Scenario Case Scenario 1-1: Designing Windows Server 2008 Network Services Lucerne Publishing is a publishing company based in New York City, New York, which produces science textbooks for colleges and medical schools. In recent months, Lucerne Publishing has been planning...
Words: 574 - Pages: 3
...routing on all routers Configure OSPF router IDs Verify OSPF routing using show commands Configure a static default route Propagate default route to OSPF neighbors Configure OSPF Hello and Dead Timers Configure OSPF priority Understand the OSPF election process Document the OSPF configuration Scenarios In this lab activity, there are two separate scenarios. In the first scenario, you will learn how to configure the routing protocol OSPF using the network shown in the Topology Diagram in Scenario A. The segments of the network have been subnetted using VLSM. OSPF is a classless routing protocol that can be used to provide subnet mask information in the routing updates. This will allow VLSM subnet information to be propagated throughout the network. In the second scenario, you will learn to configure OSPF on a multi-access network. You will also learn to use the OSPF election process to determine the designated router (DR), backup designated router (BDR), and DRother states. CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.6.1: Basic OSPF Configuration Lab Topology Diagram -- Scenario A Addressing Table Device Interface IP Address Subnet Mask R1 -- Don’t forget to add your clock rates on the serial interfaces!!! Fa0/0 172.16.1.17 255.255.255.240 S0/0/0 192.168.10.1 255.255.255.252 S0/0/1 192.168.10.5 255.255.255.252 R2 Fa0/0 10.10.10.1 255.255.255.0 S0/0/0 192.168.10.2 255.255.255.252 S0/0/1 192...
Words: 3741 - Pages: 15
...Difference between static and dynamic IPs. When a device is assigned a static IP address, it does not change. The device always has the same IP address. Most devices use dynamic IP addresses, which are assigned by the network when they connect. About static IPs for small business Static IP addresses An Internet Protocol (IP) address is a unique number assigned to each computer on a network. An IP address identifies computers on the Internet. A computer on the Internet can have a static IP address, which means it stays the same over time, or a dynamic IP address, which means the address can change over time. When you might need static IPs You might need static IPs if one or more of these scenarios applies to you: • Maintain your own web server or other Internet server, such as an email server, that requires users to connect from the Internet. • Have external devices or services that must connect to your network via IP address (for example, 74.125.224.72) rather than by name (for example, google.com). • Use a VPN or other service to remotely connect to computers in your business. Well, the first thing I would ask you is what Class of address does 172 fall under? This is vital. (This would be a Class B address because their range is 128-191) Therefore, be definition, the network mask is 255.255.0.0, or /16... Now, with a given IP and mask of 172.25.102.41 /22 you can see that they are using 6 bits for subnetting. (/16 default, and now using /22). This is a mask of...
Words: 464 - Pages: 2
...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space, host...
Words: 289 - Pages: 2
...Features • Scalability—Because DNS is capable of distributing workload across several databases or computers, it can scale to handle any level of name resolution required. • Constancy—Host names remain constant even when associated IP addresses change, which makes locating network resources much easier. • Ease of Use—Users access computers using easy-to-remember names such as www. microsoft.com rather than a numerical IP address, such as 192.168.1.100. • Simplicity—Users need to learn only one naming convention to find resources on either the Internet or an intranet. 2.) DHCP stands for Dynamic Host Configuration Protocol. As the name suggests, DHCP is used to control the network configuration of a host through a remote server. DHCP functionality comes installed as a default feature in most of the contemporary operating systems. DHCP is an excellent alternative to the time-consuming manual configuration of network settings on a host or a network device. Features · DHCP client alternate configuration With DHCP client alternate configuration, you can easily move a computer between two or more networks, one configured with static IP addresses and one or more configured with DHCP, without needing to reconfigure network adapter parameters, such as IP address, subnet mask, default gateway, preferred and alternate Domain Name Service (DNS) servers, and Windows Internet...
Words: 1542 - Pages: 7
...1. Enable routing on the switch by using the ip routing command. Even if IP routing was previously enabled, this step ensures that it is activated. 2. Make note of the VLANs that you want to route between. In this example, you want to route traffic between VLANs 2, 3 and 10 3. Use the show vlan command to verify that the VLANs exist in the VLAN database. If they do not exist, add them on the switch. This is an example of adding VLANs 2, 3, and 10 to the switch VLAN database 4. Determine the IP addresses you want to assign to the VLAN interface on the switch. For the switch to be able to route between the VLANs, the VLAN interfaces must be configured with an IP address. When the switch receives a packet destined for another subnet/VLAN, the switch looks at the routing table to determine where to forward the packet. The packet is then passed to the VLAN interface of the destination. It is in turn sent to the port where the end device is attached. 5. Configure the VLAN interfaces with the IP address identified in step 4. Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#interface Vlan2 Switch(config-if)#ip address 10.1.2.1 255.255.255.0 Switch(config-if)#no shutdown 6. Configure the interface to the default router. In this scenario you have a Layer 3 FastEthernet port. Switch(config)#interface FastEthernet 0/1 Switch(config-if)#no...
Words: 410 - Pages: 2
...THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with...
Words: 26881 - Pages: 108
...Concepts (21 percent) Compare the layers of the OSI and TCP/IP models: OSI model (Layer 1 – Physical, Layer 2 – Data link, Layer 3 – Network, Layer 4 – Transport, Layer 5 – Session, Layer 6 – Presentation, Layer 7 – Application); TCP/IP model (Network Interface Layer, Internet Layer, Transport Layer, Application Layer [Also described as: Link Layer, Internet Layer, Transport Layer, Application Layer]) Classify how applications, devices, and protocols relate to the OSI model layers: MAC address; IP address; EUI-64; Frames; Packets; Switch; Router; Multilayer switch; Hub; Encryption devices; Cable; NIC; Bridge Explain the purpose and properties of IP addressing: Classes of addresses (A, B, C and D, Public vs. Private); Classless (CIDR); IPv4 vs. IPv6 (formatting); MAC address format; Subnetting; Multicast vs. unicast vs. broadcast; APIPA Explain the purpose and properties of routing and switching: EIGRP; OSPF; RIP; Link state vs. distance vector vs. hybrid; Static vs. dynamic; Routing metrics (Hop counts, MTU, bandwidth, Costs, Latency); Next hop; Spanning-Tree Protocol; VLAN (802.1q); Port mirroring; Broadcast domain vs. collision domain; IGP vs. EGP; Routing tables; Convergence (steady state) Identify common TCP and UDP default ports: SMTP – 25; HTTP – 80; HTTPS – 443; FTP – 20, 21; TELNET – 23; IMAP – 143; RDP – 3389; SSH – 22; DNS – 53; DHCP – 67, 68 Explain the function of common networking protocols: TCP; FTP; UDP; TCP/IP suite; DHCP; TFTP; DNS; HTTPS; HTTP; ARP; SIP (VoIP); RTP...
Words: 680 - Pages: 3
...3 Answers for Knowledge Assessment Matching 1. e 2. h 3. f 4. a 5. d 6. b 7. g 8. i 9. c 10. j Multiple Choice 1. c When a DHCP-configured computer boots up, it will broadcast a DHCPDISCOVER packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes or child...
Words: 1569 - Pages: 7
...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...
Words: 4941 - Pages: 20