Nt 1330 Unit 1 Exercise 1

In: Computers and Technology

Submitted By clorkiss
Words 384
Pages 2
Unit 1. Exercise 1. IP Addressing Scenario

Course Objectives and Learning Outcomes
In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP.

Assignment Requirements
Respond to the following scenario with design considerations and recommendations:

You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses.
The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years.
At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations.

Submission Requirements
1-2 pages, Microsoft Word, double-spaced, 12 pt. font

In response to your question I would use a classless addressing and start at for your network address with a subnet mask of This gives you 254 hosts per subnet which will easily cover your 50% growth over the next two years. If however at some point in the future you exceed that number you can add another subnet to your network. I would then recommend setting up static ip addressing as this will work better with as many hosts as you have. I would then recommend setting up a DHCP service on a windows server 2008 r2 server. This will allow for you to manage all your host ip addresses automatically and…...

Similar Documents

Nt1230 - Unit 1. Exercise 1

...TO: Valerie Bernier, Dentist RE: Can I upgrade the office? Ms. Bernier, Assuming that each of the systems in question have 16 GB of available hard disk space, it does look like your machines may meet the minimum hardware requirements to have Windows 7 installed. The systems only have to have a processor speed of 1 GHz or faster, 1 GB of system memory, as well as a DirectX 9 graphics adapter with WDDM 1.0 or higher driver, which you’ve shared with me that each of your workstations have. Before jumping into upgrading, however, the next step is to make sure that all of your hardware is compatible with Windows 7. Coming from the Windows XP operating system, as opposed to Windows Vista, means that there is a higher probability of compatibility issues. Also, moving from Windows XP to Windows 7 means that a Clean Installation would have to be performed; meaning that aside from any settings that are able to be moved via one of the migration tools, it would be necessary to perform a backup of all of your machines in order to keep from permanently losing any important files or documents. I recommend running the Windows 7 Upgrade Advisor on any of the systems that you are interested in upgrading to Windows 7, and take note of any compatibility issues that are presented. If it looks like your hardware will function properly, and that many of your important programs are compatible with Windows 7, it might be worth it to backup all of your data and perform clean installations......

Words: 278 - Pages: 2

Unit 7 Exercise 1

...Physical Networking Unit 7 Exercise 1 Crosstalk Unwanted transfer of signals between communication channels or cabling. Waveguides A metal tube or other device confining and conveying microwaves. FTTH Fiber to the x is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. The term is a generalization for several configurations of fiber deployment, ranging from FTTN to FTTD. Simplex Composed of or characterized by a single part or structure. Half-Duplex Allows the transmission of signals in both directions but not simultaneously. Full-Duplex Refers to the transmission of data in two directions simultaneously. Photodiode A semiconductor diode that, when exposed to light, generates a potential difference or changes its electrical resistance. Amplitude Modulation The modulation of a wave by varying its amplitude, used chiefly as a means of radio broadcasting, in which an audio signal is combined with a carrier wave. Analog Transmission Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. Digital Transmission Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint......

Words: 527 - Pages: 3

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Unit 4 Exercise 1

...NT1310 Physical Networking Unit 4 Exercise 1: Cabling – Definitions Horizontal Cable- The cabling between and including the telecommunications outlet and the horizontal cross-connect. Backbone Cable- A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. Patch Cords- Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run. Connectors- With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers together to provide a means for attaching and decoupling it to a transmitter, receiver, or another fiber. Conduit- A rigid or flexible metallic or nonmetallic raceway of circular cross section in which cables are housed for protection and to prevent burning cable from spreading flames or smoke in the event of a fire. Racks- A frame-like structure where patch panels, switches, and other network equipment are installed. The typical dimension is 19 inches. Punch-Down Blocks- A generic name for any cross-connect block where the individual wires in UTP are placed into a terminal groove and “punched down” with a special tool. The groove pierces the insulation and makes contact with the inner conductor. Consolidation Points-......

Words: 799 - Pages: 4

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange......

Words: 263 - Pages: 2

Unit 1 Nt 1104

...S0/0/0 S0/0/1 R2 Fa0/0 S0/0/0 S0/0/1 R3 Fa0/0 S0/0/0 S0/0/1 PC0 NIC PC1 NIC PC2 NIC Task 1: Prepare the Network. Step 1: Cable a network that is similar to the one in the Topology Diagram. You can use any current router in your lab as long as it has the required interfaces shown in the topology. Note: If you use 1700, 2500, or 2600 routers, the router outputs and interface descriptions will appear different. Disregard, we are using 2811 or a generic router. Step 2: Clear any existing configurations on the routers. Disregard in PT! Task 2: Perform Basic Router Configurations. Perform basic configuration of the R1, R2, and R3 routers according to the following guidelines: 1. Configure the router hostname. 2. Disable DNS lookup. Type “no ip domain-lookup” w/o the italics. 3. Configure a privileged EXEC mode password. 4. Configure a message-of-the-day banner. 5. Configure a password for console connections. 6. Configure a password for VTY connections. Task 3: Configure and Activate Serial and Ethernet Addresses. Step 1: Configure interfaces on R1, R2,......

Words: 3741 - Pages: 15

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd ...

Words: 253 - Pages: 2

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Nt 1310 Unit 4 Exercise 1: Cabling – Definitions

...Ernie Castillo NT1310 Instructor: Mr. Greene Unit 4 Exercise 1: Cabling – Definitions 1. Horizontal Cabling - The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring. 2. Backbone Cable - A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. This cable can service voice communications or data communications. In star-topology data networks, the backbone cable interconnects hubs and similar devices, as opposed to cables running between hub and station. In a bus topology data network, it is the bus cable. Backbone is also called riser cable, vertical cable, or trunk cable. 3. Patch Cords - Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run; also called. Used for interconnecting circuits on a patch panel or cross-connect. Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long. 4. Connectors - With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers......

Words: 1322 - Pages: 6

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are to A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from to There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Nt 2580 Unit 1

...NT 2580 Unit 9 Assignment 1: List of a Computer Attack 5/25/15 Jeffry Rodriguez Phase 1 - Reconnaissance Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including Internet searches Social engineering Dumpster diving Domain name management/search services Non-intrusive network scanning The activities in this phase are not easy to defend against. Information about an organization finds its way to the Internet via various routes. Employees are often easily tricked into providing tidbits of information which, over time, act to complete a complete picture of processes, organizational structure, and potential soft-spots. However, there are some things you can do which make it much harder for an attacker, including Make sure your systems don't leak information to the Web, including: Software versions and patch levels Email addresses Names and positions of key personnel Ensure proper disposal of printed information Provide generic contact information for domain name registration lookups Prevent perimeter LAN/WAN devices from responding to scanning attempts Phase 2 - Scanning Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses,......

Words: 797 - Pages: 4

Nt1430 Unit 1 Exercises

...Unit 1 exercises Chapter 1 1. What is free software? List three characteristics of free software. • Software may be used for any purpose • The sources may be studied and changed • The software may be distributed arbitrarily 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? • The Free Software Foundation is the principal organization sponsored by the GNU Project. GNU developed multiple of tools, which included the C compilers that are part of the GNU/Linuc Operation System. • Linux is a name of the operating system kernel developed by Linus • Torvald’s kernel and a GNU’s tools work together as GNU/Linus Operation System Chapter 2 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? • Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USVB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible including fresh installations, upgrades from older releases of Fedora/ RHEL, and dual-boot installations. Chapter 3 1. What is a live system? What advantages does it have over an installed system? • A computer that runs the Wide Area Progressive games and displays the main system window. The advantages are Customization, cost, free market, stability,......

Words: 498 - Pages: 2

Nt 1330 Unit 3 Exercise 1

...COMPANY MERGER SCENARIO I understand that as we begin the transition of merging our two companies into one, there are many concerns. First, I need to know what operating system (OS) our new friends are using. I understand that they are using a directory service (DS), however, without knowing what type of DS they are using or what OS they are using, it is very hard to determine how to approach merging them with us. If they are using the same OS that we use, or even an older version of the Windows active directory (AD), the transition can be fairly seamless. Will the company we merge with be maintaining their existing network or will we be absorbing them into ours? If they will be maintaining their existing network, we will need to establish a trust between our DNS and theirs, to allow for the exchange of information more simply and to allow the sharing of all resources (i.e. files, printers, documents, etc.). We will also, need to know what groups and securities they have set up to allow all users to be able to access resources needed. I will need to know what members have access to certain files, because we don’t need for accounting to have access to human resources files or vice versa. If they will be merging into our network, we will need to merge their IP addresses or expand our scope of IP addresses to allow for an IP address renewal. Once I have these questions answered, I will be able to develop a much more in depth plan to account for this transition. Please,......

Words: 282 - Pages: 2

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops......

Words: 901 - Pages: 4