Preview

Static vs Dynamic It/242

Satisfactory Essays
Open Document
Open Document
299 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Static vs Dynamic It/242
As a network administrator for a company, you want to configure an IP route between two routers. Of static and dynamic routing, which is more appropriate?  Explain your answer in 200 to 300 words. I think that the best routing choice for this would be a static IP; this is because for a company you may want to have the ability to check the log for problems. Using a dynamic IP would mean that the people that logged on to their device would be almost invisible because they could simply log off and log back on to get a new IP address thus making it much harder to find someone on the network doing something wrong. When using a dynamic routing it would be much easier since you could change the subnet and it would be as if nothing ever changed the computer would still be able to access everything. But in the long run a static IP is much more ideal for a company, dynamic is more along the lines of a 56k dial-up connection. Static is also much more reliable for voice over the internet as well as the ideal choice for any server because of the speed it gives for uploading files. The other great thing is you could hid your IP (since it does not change) you may not want people to know the address, you could easily hide it from people who send out emails that you do not want, also known as spam. It could be an issue if your IP was ever discovered, since it does not change but all in all I think that it would be an ideal choice from the many other features that it can offer the company this my reasoning in choosing static over

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. Administrative distance has only local significance, and is not advertised in routing updates.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1230 Chapter 7 Questions

    • 1164 Words
    • 5 Pages

    A. Routers have much faster CPUs and can do the hard work to translate the incoming datalink header into the outgoing data-link format…

    • 1164 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    It/242 Week 4 Chekpoint

    • 379 Words
    • 2 Pages

    I believe that an Ethernet should be used. When a company which is spread out between multiple floors, such as XYZ Technology Consultants, a Token Ring Architecture is not the correct choice for this type of building. Token Ring Architecture, by design is a way to set up multiple computers together, enabling each PC to pass along information without data collision. However, Token Ring Networks, can also process data remarkably slower than Ethernet Architecture (sometimes as slow as 4 or 16 Mbps). Ethernet, by design are typically used in office buildings that are wired with twisted pair CAT-5 cables, or fiber optic cables for fast transmission of data, with each employee location fitted with an Ethernet jack to connect to the network. Utilizing this type of Architecture, if a problem arises in network…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    1. How does the practice of assigning static IP addresses on a home or small office network make troubleshooting problems on the network easier?…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    10. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 242 Final Project

    • 1213 Words
    • 5 Pages

    ACME Manufacturing will best benefit from a Wide Area Network by the use of a VOIP. ACME currently has a headquarter in Atlanta that has a corporate operation, accounting, marketing, and an administrative staff. They also have a sales office and engineering office in Atlanta as well. In Chicago, New York, and Phoenix they have their distribution office. I find that ACME will benefit from subnets, routers, packaging, and VLAN’s and security to make sure that the WAN network is successful for WAN network…

    • 1213 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    2. The routing service included with Windows Server 2008 is better suited for ___________. Smaller network…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    The routing service included with Windows Server 2008 is better suited for a smaller network or one with a small amount of network traffic that needs to pass between subnets.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    In your own words, summarize what you have learned about Configuring Static and Default Routes.…

    • 436 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays