Procedure How did you go about implementing the lab activity? Describe the steps you took to ensure that the final implementation meets the original business goal. For example, did you design a new IP scheme and assign IP addresses to devices based on a given range of IP addresses? Did you assign IP addresses manually, dynamically, or both? Did you name devices based on location? Did you or would you connect switches first or routers first, why? Did you configure the end devices or the infrastructure
Words: 671 - Pages: 3
is used mostly for identifying and sending information to hosts that are on the same network, or Ethernet. If you need to connect to a device on a network outside of your home or business network, however, you will need the logical address (or TCP/IP address). The example that was given in a book excerpt on informit.com was extremely helpful for me to understand the concept of network addressing. In Barry Press’ book, “Networking by Example”, he uses the example of finding a specific house or
Words: 622 - Pages: 3
UMUC Frederick MD Network Proposal UMUC Frederick MD Network Proposal 1 UMUC Frederick MD Network Proposal 2 The network IP addressing scheme for the Frederick MD building should be designed to ease network management. A well thought out network subnet design enables administrators to quickly locate computers by IP address by building floor and room, and whether the computer is a server, a student computer, staff computer or instructor’s computer. A proper subnet design will also
Words: 1311 - Pages: 6
design work, the aspect of sub-netting would be a significant consideration during g the design process in order to ensure that the entire IP network is subdivided in a logically visible manner. In such a design with 156 computers, it would be advisable to address all of these computers with some common and identical most significant bit group within the assigned IP address. This would effectively assist in the division of two fields that could include the routing or network prefix, as well as the rest
Words: 836 - Pages: 4
in Tutorial class). Topology is as shown below: The requirements are as follows: 1. CSU network has only 10 networking devices (including printers, scanners and PCs etc.) 2. CSU network require only 5 dynamically assigned IP addresses, so PC1-PC5 will get IP address from DHCP Server, these address must be starting from 210.15.5.113 3. Configure DHCP Server for CSU network 4. Configure MAIL server for CSU.com, create two email user IDs as follows: a. jatinder@csu.com user
Words: 498 - Pages: 2
CHAPTER I Project Title Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network Project Description NEUST-Gabaldon Campus (Formerly Sabani Estate Agricultural College) established their computer laboratory on 2011 which help the students of College and High School for their computer subjects (Office Productivity). Since then, the computer laboratory has its computer administrator in presence of Mr. Jefrain M. Padre, although there was computer
Words: 8853 - Pages: 36
or disabling this service may cause already installed Bluetooth devices to fail to operate properly and prevent new devices from being discovered or associated. Dhcp Registers and updates IP addresses and DNS records for this computer. If this service is stopped, this computer will not receive dynamic IP addresses and DNS updates. If this service is disabled, any services that explicitly depend on it will fail to start. Dnscache The DNS Client service (dnscache) caches Domain Name System (DNS)
Words: 658 - Pages: 3
Running head: SECURITY ASSESSMENT AND RECOMMENDATIONS Security Assessment and Recommendations for Quality Web Design Mike Mateja October 9, 2011 Submitted to: Dean Farwood SE571 Principles of Information Security and Privacy Keller Graduate School of Management 1 SECURITY ASSESSMENT AND RECOMMENDATIONS 2 Table of Contents Executive Summary ............................................................................................ 3 Company Overview.......................
Words: 2829 - Pages: 12
IP Addressing Scenario The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0. I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for
Words: 510 - Pages: 3
Step 2 d: Examine the characteristics of the SVI for VLAN 1. Is there an IP address assigned to VLAN 1? No What is the MAC address of this SVI? 0022.569b.4540 Is this interface up? Vlan1 is up, line protocol is down Step 2 e: Examine the IP properties of the SVI VLAN 1. What output do you see? Internet protocol processing disabled Step 2 f: Connect PC-A Ethernet cable to port 24 on the switch and examine the IP properties of the SVI VLAN 1. What output do you see? Vlan1 is up, line protocol
Words: 1124 - Pages: 5