Preview

CSN2 Unit 1 Exercise 1 IP Addressing Scenario

Satisfactory Essays
Open Document
Open Document
530 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CSN2 Unit 1 Exercise 1 IP Addressing Scenario
Unit 1 Exercise 1 IP Addressing Scenario
The scenario is I am an IT Administrator for a newly founded company and have been tasked with designing am IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth in the next 2 years.
A simple design you can consider is 1 floor with a single data closet serving 150 users. You need a core network, networks for your firewall, DMZ, remote VPN clients, switch MGMT network, server network, voice network, wireless network and networks for other services you have not yet identified, like security, cameras, fire, door and video. You should have multiple domain servers and DHCP servers. While you can get away with using high end switches for DHCP, a couple windows servers will do the trick and give more insight when you are troubleshooting. Most systems can get along with DHCP, so that is fine, (some older systems still need host files) but there are support benefits to statically assigned addresses. In any case, you will want reserved space in these networks for your network devices, in exception to VLANs, redundant or clustered systems. For design, you could use the 10.1.0.0 address space using /21 (10.1.0.1 - 10.1.7.254) and for your subnet masking on the devices will naturally be 255.255.255. Reserve the first and last 20 or so addresses in each DHCP scope for statically assigned addresses and network devices / gateway addresses. Some examples would be, 10.1.0.0/24 for servers-all static, 10.1.1.0/24 for pc's printers usable for DHCP 10.1.1.21 - 10.1.1.230, 10.1.2.0/24 for wireless usable for DHCP 10.1.2.21-10.1.2.230, 10.1.3.0/24 for VoIP usable for DHCP 10.1.3.21 - 10.1.3.230 and 10.1.4.0 - 10.1.7.254 for future use. While you can cut back each network to a /25 giving 126 hosts per network, you may find yourself changing this sooner than expected.

You May Also Find These Documents Helpful

  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    5. Does this network require a distribution layer? What devices would operate at the distribution layer? What would these devices be responsible for? Could the access and distribution layer be combined into a single layer? Draw a diagram of these devices at the distribution layer. Label all of the devices.…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Microsoft. (2012, April 26). Window Server Creating A Site Link Design. Retrieved from Tech Net.Microsoft.com: http://technet.microsoft.com/en-us/library/cc732837(v=ws.10).aspx…

    • 670 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Thank you for contacting me regarding your questions, and that you trust I will do my best to assist you with your issue. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated (ADI) Domain Name System (DNS) server. You also have some questions on what type of DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting five users and or workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but if you actually need a DNS server at all. If there is a very high level of file and or data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI there is not enough file and or data sharing to really warrant the presence of the server. An ADI server could potentially slow down an already sluggish system.…

    • 322 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 3 Ilab

    • 827 Words
    • 3 Pages

    2. Will the current horizontal cabling suffice for the new network? If it will not, what type of cable should be used for the horizontal cabling? Provide detailed specifications for this cable. (10 points) I believe that it works with the current cabling, but if we wanted the network smoothly, I would use a Category 6 network cable. The DHCP, or a Dynamic Host Configuration Protocol cable, is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. It assigns an IP address whenever a system is started.…

    • 827 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    For this network, I initially projected that one server would be sufficient to perform all the tasks, however, in order to make the network work more efficiently and reduce occasions for system downtime it would be more conducive to use multiple servers. I recommend that we use 3 servers. The main server would be the DHCP server. The second would be the email server, and the third for file sharing and printing.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    nt1330 unit 1

    • 565 Words
    • 3 Pages

    A simple design you can consider is 1 floor with a single data closet serving 150 users. You need:…

    • 565 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    I would say that the amount of users we have is about 200. And we will have plenty of room to expand in case we ever need to expand up to another 300 Users if we need to. And we will only have 5 departments (IT, H.R, Distribution, Maintenance, and Staff). As far as what departments permissions go we will have to sit with all department heads and come up with a valuable plan to benefit everyone. And since we are in a trucking distribution company named Spike’s Distro. We will only have one site for our infrastructure. The reason being is because we only have one building that everyone works out of. Our budget for creating this new infrastructure is going to be $35,000 to buy all the servers and switches needed including the computers to hold the active directory and domain servers. And we should buy physical servers as they are more efficient than virtual servers are. We should only create one domain per department. The only time we will need to create more is if we expand to more than one…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 2062 Words
    • 9 Pages

    An enterprise level company wishes to set up a network to support several hundred business users as well as manufacturing equipment in a new building. Describe what network device or devices you would recommend they purchase and explain why. Note, you are not required to detail the media or topology utilized, but thinking about these will help you to choose and justify your device choices. I would suggest the purchase of a rack system with two servers on large server to handle the few hundred computers and users and the other to handle the manufacturing equipment. This would give them choices for backups and file sharing between one another. The servers…

    • 2062 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    It282 Week 6 Checkpoint

    • 724 Words
    • 3 Pages

    Hardware: To link all of the computer systems you will first have to determine if the connection will be wired or wireless. If wired, Ethernet cabling is best. If going wireless because of convenience note it is slower than 100 Mbps Ethernet and can be subject to interference.…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Online resources MySpanishLab Access Kit 0-13-159045-6 can be purchased at bookstore or online at www.myspanishlab.com. If purchased on-line all you need is a credit card number and your access number is given to you immediately.…

    • 1167 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will be configured with VLans. This will depend on the amount of VLANS needed. For example, if a wireless hotspot is required in the conference room for visiting clients or suppliers, we will supply a wireless connection through a VLan that will enable them to access the internet without access to our operations network. This can also be implemented for scenarios like students vs operations. This will isolate traffic allowing for internal security.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    CMNS Assignment 1

    • 2863 Words
    • 12 Pages

    The three ethical paths include amoral, which can be defined as not questioning what is…

    • 2863 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Management of a 7,000 strong organization strung across 35 locations is an enormous undertaking. The possibility of abuse of company 's resources is a real risk "that can lead to regulatory noncompliance" (Johnson, 2011). To ensure the company 's profitability and survivability would need strict enforcement of security policies. The two most monitoring and enforcement policies I would be most concerned about is, Access Control, and virus protection. The monitoring regulations I would rely on for this activity are audit trails provided by logs, and ISO 27001/27002 (formerly ISO 17799:2005), ITIL and NIST SP-800 53 " Recommended Security Controls for Federal Information Systems" standards.…

    • 577 Words
    • 2 Pages
    Good Essays