Premium Essay

Tcp/Ip Lan Plan

In:

Submitted By JPRenolds
Words 315
Pages 2
TCP/IP LAN Plan CheckPoint
An IPv6 address is 128 bits compared to the IPv4, which is only 32 bits.

The subnet mask of an IP address, defines the network portions and which part is the host portion.

Each of the three class IP addresses have a range, which cannot be routed across the internet. Since the IP address 172.19.243.254 falls in the range of the class B 172.16 to 172.31 ranges it cannot be routed across the internet.

Computers to communicate on a TCP/IP logical network they must have an IP address. An IP address is unique to the devices on a network providing the network ID and the host ID there for, for a computer to talk to another computer within a logical network they both must have an network ID and a host ID.

Reallocating bits from the host ID to a network ID one must remember subnets take the power of 2, meaning to create 16 subnets one must reallocate 4 bits to the 2 power (2x2=4x2=8x2=16).

A class C network address is 255.255.255.0, leaving the last octet for identification of subnets. 32 subnets equals 6 bits, converted to binary provides a 11111100 binary bit pattern with the sixth 1 representing the 32nds place. The binary bit pattern 11111100 is equal to (128+64+32+16+8+4) 252, which is a subnet mask of 255.255.255.252.

To assign address to 62 hosts one must use the formula 2n-2 with n representing the number of host bits. 62 host is (2*2=4*2=8*2=16*2=32*2=64-2=62) 6 host bits.

Why subnet, the ability to break up large networks in to smaller networks, free up available IP addresses, create logical works groups, increase efficiency, reduction broadcast traffic increases

Similar Documents

Premium Essay

Tcp Ip Lan Plan

...Axia College Material Appendix C OSI Model Key Terms Table Use the table to define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed. | | |Function | |Term |Definition |(if applicable) | |Physical layer |Is responsible for the actual transmission |Media, signal and binary transmission | | |of the bits sent across a physical medium | | |Data link layer |Is responsible for providing error-free |Physical addressing | | |data transmission and establishes local | | | |connections between two computers or host | | |Network layer |Is concerned with the addressing and |Path determination and logical addressing | | |routing processes necessary to move data | | | |from one network to another ...

Words: 549 - Pages: 3

Premium Essay

Raven Williams-1230

...layers over multiple physical tiers. This can make a very good impact on your application by Improving performance (sometimes), scalability and fault tolerance. The maintenance of your application is easier because of the low coupling between layers. Adding more functionality to your application is made easier. Layers make your application more testable. Building a well formed layers makes the orientation in your application easier. Having your application not layered means that you have to deal with all security threats in one place which is very difficult. Having your application distributed to layers makes it much easier for design and implement Without a good deployment plan it is not trivial to distribute your layers over multiple physical tiers in distributed computing. You need to plan ahead your layers when you create a distributed application. 3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society-based protocol. protocol is a set of rules in which telecommunication and end points use when communicating. There are many different protocols used and they all vary from protocol to protocol. Protocols can be...

Words: 1095 - Pages: 5

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Premium Essay

Final

...Final Exam Review 8 to 10 Introducing the Internet Protocol (IP)  TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP)  TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP)  Network Layer protocols  IP: Most important protocol defined by Network layer  Almost every computing device on planet communicates, and most use IP to do so  Network layer also defines other protocols 4 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 2 Name Full Name RIP ...

Words: 9644 - Pages: 39

Premium Essay

Nt 1210

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition...

Words: 4400 - Pages: 18

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Premium Essay

Information Security

...Darrel Smith IT255 11/29/2011 Research Assignment 2 A sound security plan is the first step towards a multi-layer defense. To develop a plan, the company must access its most important assets; identify vulnerabilities as well as the infrastructure and technology most appropriate for mitigating risk, then implement a strategy for putting the plan in action. Emails are prime examples. It has become a critical business communications tool and is also a primary conduit for malicious code. Protecting emails against viruses, worms, spam, Trojan horses, phishing attacks and other threats requires a variety of security technologies. These antivirus and antispyware software, content filtering, and firewalls. Such security technologies must be installed at various levels of the infrastructure-such as the gateway, mail servers and desktop or laptop. This way, threats that may bypass one level are dealt with at another. In addition, layering security helps mitigate the risk of an employee who disables protection on his or her desktop. The gateway serves as an entry and exit point to the company network. By installing a security solution such as antivirus and content filtering at this tier, mass-mailer worms are scanned and deleted and spam is moved to quarantines. Mail servers should also be equipped with security. These systems receive, send, and store email, and an email security solution work together with the email program to provide a greater degree of protection against...

Words: 1445 - Pages: 6

Premium Essay

Ntc/362 Fundamentals of Networking Team Paper

...Individual Final Project NTC/362 Fundamentals of Networking Dean McIntyre 2 The Patton-Fuller Community Hospital looks to upgrade their Information Technology (IT) capability beginning with their networks. The characteristics, components, and topology are evaluated to properly identify the needs for the new network design. The plan includes converting to a Wireless Local Area Network otherwise known as (WLAN), installing a Voice over Internet Protocol otherwise known as (VoIP), and design a Wide Area Network (WAN). The plan also includes the hospital maintaining all Macintosh® computers. Administration/Clinical Overview * The administrative departments run off of a 1000 Base-T Ethernet provided by a CAT 6 cable which is also the entire hospital’s network backbone. Clinical department networks however are provided by a 1000 Base-F Ethernet provided by a single mode fiber. The clinics feed into a Cisco Catalyste 3560 Switch as the network bridge that links the two together. All workstations are Apple iMAC or MAC Pros with the executive management, senior managers, and the data center workstations as having a wireless communication card installed. * IT Data Center * The data center is comprised of the hospital HIS system. The mainframe of the HIS is connected by a 4 gigabit fiber link to a 10 terabyte Network Area Storage (NAS) device. The data center’s workstations are all Apple iMACs that run a MAC OS X from a remote desktop. Virtualization...

Words: 3457 - Pages: 14

Premium Essay

It245-Intro to Network Management

...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin.   Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...

Words: 5562 - Pages: 23

Premium Essay

Introduction to Networking

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Premium Essay

Video Conferencing

...Terminology Video Conferencing Standards and Terminology. There is an ever increasing number of standards, terminologies and buzz-words used within the video conferencing industry that can make understanding what is both available and compatible a minefield. We have the H.300's, the G.700's, the T.120's and the H.460's, not to mention ISDN, LAN, WAN, ADSL, VPN and POTS all mixed with NTSC, PAL and CIF. To complicate matters more, we also have to deal with the forthcoming media-enabled 3G mobile phone and how this links in with existing systems. This document explains what these standards, terminologies and buzz-words mean, how they relate to the various communications infrastructures of video conferencing and how they relate to each other. It is assumed that the reader has a general knowledge of Video Conferencing systems. However, the following technical papers are available to provide more information: * How do I choose a Video Conferencing system? * H.323 Terminals, Gatekeepers, Gateways & MCUs. * Global Dialling Scheme (GDS) for Schools VideoConferencing. * H.323 Dial Plan and Service Codes used by Gatekeepers etc. * IP Ports and Protocols used by H.323 Devices. * Cost Efficient ISDN Conferencing, including Multipoint Access. * H.221 Framing used in ISDN Conferences. International Telecommunications Union & The Internet Engineering Task Force. Telecommunications standards are set by the United Nations agency, International Telecommunications...

Words: 5144 - Pages: 21

Free Essay

The Internet

...on the ARPANET to over 300,000 computers on many interconnected networks. As ARPANET grew to include more computers, researchers realized the need for each connected computer to conform the same set of rules. The Network Control Protocol (NCP) was developed as the first collection of rules for formatting, ordering, and error-checking data sent across a network. Vincent Cerf, who is often referred to as the Father of the Internet, along with his colleague Robert Kahn, developed the Transmission Control Protocol and the Internet Protocol (referred to by their combined acronym TCP/IP), which are still used today. The Transmission Control Protocol (TCP) includes rules that computers on a network use to establish and break connections. The Internet Protocol (IP) includes rules for routing individual data packets. The term Internet was first used in 1974 in an article written by Cerf and Kahn about the TCP protocol. The open architecture philosophy ensured that each...

Words: 763 - Pages: 4