Preview

Unit 4 Assignment 4

Satisfactory Essays
Open Document
Open Document
122 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 4
Michael Sherman
Unit 4 Assignment 4

A private network schema is a viable choice for internal IP addressing. Each office can have its own range to avoid conflicts with other locations if subnetted correctly. Assuming that all nodes and servers have only one interface, you should only need one public address per outward interface. In the diagram provided, you would only need one public IP address for the router connection to the Internet. Everything else can be addressed privately with the correct subnetting. As for deciding on the subnet mask, the largest would be 255.255.252.0 or /23. There are a total of 365 devices, including 352 computers, 7 servers, 4 switches, and 2 routers that need IP addresses. Using a /23 subnet, that would allow for 508 devices, whereas /24 would only allow for 254.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The network design requires an IP schema that will minimize the cost of public IP addresses. Due to this requirement we will use a Class B IP address solution with a default subnet mask of 11111111.11111111.00000000.00000000 or 255.255.0.0. I am calculating the need to have 2 possibly 3 public IP addresses.…

    • 248 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    are all candidates for subnet masks. However, you need to select a mask that will support the number of…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 assignment 1

    • 347 Words
    • 2 Pages

    IP Subnetting – The process of taking a class A, B, or C IP network and subdiving it into a number of smaller groups of addresses (subnets).…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 166 Words
    • 1 Page

    Remote access can be made available to senior management and executives to help them access their work when not in the office. This can be done via VPN. VPNs can allow users needing remote access to securely access IT resources without being physically connected to the network. It is secured with encryption by tunneling through an internet connection. All that is needed is VPN software, appropriate protocols (i.e. IPSec), and encryption.…

    • 166 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 2

    • 208 Words
    • 1 Page

    All tasks should be a part of this phase. It is important to plan and have proper access controls, anti-virus, up to date patches and software, and backups of the network…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 8 Assignment 2

    • 1088 Words
    • 3 Pages

    Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains.…

    • 1088 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 352 Words
    • 2 Pages

    My name is Destiny Knott, my family and I have recently moved into a house overlooking the park in the neighborhood of Park Hall. I would like to draw your attention to some of the lewd and lascivious acts that take place daily in Park Hall. On many separate occasions up to several times a day, I have noticed from my window or front porch a crowd of undesirable individuals sitting on the benches. Numerous times these individuals have been seen drinking alcohol and carrying on very loudly, using the foulest kind of language. On another occasion my family and I have witnessed a violent fight occur right in front of the park where all of our children play. It is an outrage that our young innocent children should have to listen to and witness such inappropriate displays of behavior.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assignment 1

    • 304 Words
    • 1 Page

    As technology and the internet continue to make advancements and are more commonly available to children in school classrooms and public libraries for educational purposes, the need to protect and monitor our children online has also advanced. Congress has continued to pass such laws as COPPA, CIPA, SOX, and FERPA as an attempt to filter obscene and violent content while protecting children’s personally identifiable information. The Children’s Online Privacy Protection Act (COPPA) of 1998, 5 U.S.C. 6501-6505 imposes certain restrictions and requirements on operators of websites or any online services directed to children under 13 years old without the parents’ consent. The Children’s Internet Protection Act CIPA was enacted by congress in 2000 to formally address any concerns about children’s access to obscene or harmful content on the internet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    * To protect all information assets from unauthorized access, use, modification, disclosure, destruction or interference;…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Good Essays

    IP addressing scenario

    • 548 Words
    • 3 Pages

    According to the scenario, the company will have a single, physical location with approximately145 hosts on the network. In this case, I would suggest using a class C address such as 192.168.0.0. Reason why is because you can put all the devices on a single subnet with the subnet mask 255.255.255.0/24. This would allow for 253 usable host addresses, which is more than needed in this case.…

    • 548 Words
    • 3 Pages
    Good Essays