However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…
The scenario is I am an IT Administrator for a newly founded company and have been tasked with designing am IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth in the next 2 years.…
Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions.…
The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…
The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…
One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…
IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS © ITT Educational Services, Inc. All rights reserved. Learning Objective …
Ou, G. (2006, June 28). IP subnetting made easy. Retrieved August 2, 2010, from TechRepublic: http://articles.techrepublic.com.com/5100-10878_11-6089187.html…
Which IEEE wireless networking protocol was ratified in 2009 and has a maximum defined data rate of 600 Mb/sec?…
Ex 1.4.1- 0 or just a space in between numbers. It is necessary to use a blank space because it also serves a number.…
2. How would you control the process by which IP addresses are assigned to individual computers?…
d. True or False: A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system.…
The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…
1. An enterprise campus LAN uses wired UTP Ethernet and wireless 802.11 LANs at the edge of the LAN. Looking at a particular floor in a particular building, all the devices connect to either a single Ethernet switch or single wireless access point, both of which sit in a wiring closet in the middle of the space. Which of the following is true about the distance limitations in this LAN?…
Also, after completing the lab, you must show your work by copying and pasting a screenshot of the following configurations/verification:…