subnet to connect Server Router and Melbourne Router f. Next subnet to Melbourne Router and CSU Router 7. All Servers and Printer should be configured with static IP addresses, all PCs should be configured with Dynamic IP address 8. Use RIP Version2 as routing protocol Fill the table below with information: 18 marks Device | IP Address/ Subnet mask | Marks | DHCP Server IP address | | 2 | DHCP Server Gateway IP address | | 2 | DNS/MAIL Server IP address | | 2 |
Words: 498 - Pages: 2
IP Addressing Scenario The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0. I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for
Words: 510 - Pages: 3
Open Command Prompt and type command "arp a”. The source machine will generate an Address Resolution Protocol (ARP) request message. The source broadcast the ARP request message to the local network. The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address with its own Protocol Address. When the targeted device checks the Target Protocol Address, it will find a match and will generate an ARP reply message. Destination device send the
Words: 264 - Pages: 2
Topic 1: The Input/Output Process 1) Definition Motherboard, CPU, RAM, Hard drive, Graphics Card, NIC Card, Power Supply, and ROM Drive 2) Application I/O processes is basically how the devices communicate so they can work together. For example when you plug in a USB device the computer has to find a driver. That driver is like a translator for the USB device so the computer understands what the USB device is doing. 3) Troubleshooting The most common issue is that either the driver is corrupted
Words: 992 - Pages: 4
The use of DHCP is highly recommended and there are a number of obvious reasons why you should use it. As mentioned before, there are two ways you can configure client addresses on a computer network, either manually or automatically. Manual configuration requires the careful input of a unique IP address, subnet mask, default router address and a Domain Name Server address. In an ideal world, manually assigning client addresses should be relatively straight forward and error free. Unfortunately,
Words: 388 - Pages: 2
Anna Monreal NT1330 WEEK 2 ASSIGNMENTS Unit 2 Assignment 1 DHCP Trouble Shooting Dear Jr. Admin, One of the first reason that some of the computers may not have not picked up the new leases could be that those computers were not rebooted. This would be the first thing I would do. If for some reason this does not work try disabling and enabling the NIC. Once the computer comes back up it should ask for the new DHCP. One other step to try is to force the address to renew. Go to your
Words: 262 - Pages: 2
Week 1 Boss, Regarding your recent inquiry regarding ping sweeps and port scans, I wanted to provide some information to assuage any apprehension you may have had regarding the subject. Port scans and ping sweeps are common networking tools used by admins to perform common functions, such as checking to see if a server is running a particular service or if a desktop is on to receive an important update. It is also true that this same functionality can provide information to hackers who may use
Words: 406 - Pages: 2
address of 172.16.8.1 use the guide to get 30 hosts on each of your 2000 networks: 1. What Class is this IP address? B 2. How many bits would you borrow or take? 11 3. What subnet mask would you generate? 255.255.255.224 4. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.30 5. What is the last subnetwork range created? 172.16.255.225 to 172.16.255.254 Given an IP address of 172.16.4.1 use the guide to get 62 hosts on each of your 1000 networks: 6. What Class
Words: 274 - Pages: 2
Network Design Proposal Paper By: David Bales 3/18/13 UMUC’s new network lab will consist of servers, hubs, routers, computers, an IDS (Snort), and Norton Firewall and Virus Scan software. The safety and security of the network is of the utmost importance. In surveying the site, a number of limiting factors were identified, most notably, the absence of locations for hub to serve as repeaters for locations in far corners of the building. It is for this reason I have decided to use Fiber Optic
Words: 578 - Pages: 3
1. The part of the computer that stores data and program instructions that need to be instantly accessible to the CPU is the: a. Microprocessor b. RAM c. Hard Disk d. Peripheral 2. How many values can be represented by a single byte? a. 2 b. 8 c. 16 d. 64 e. 256 3. Which of the following statements is TRUE: a. Software is written to be compatible with different processor instruction sets
Words: 885 - Pages: 4