This website uses cookies to ensure you have the best experience. Learn more

Configuring Network Connections Essay

652 words - 3 pages

Configuring Network Connections
Mr. Moses
14 July 2016

Lab 3 worksheet

Exercise 3.1 | Using the Network and Sharing Center |
Overview | On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 3.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network. |
Completion time | 10 minutes |

8. In Table 3-1, note the current state of the advanced Sharing and Discovery settings.
Setting | Value |
Network Discovery | Off |
File and printer sharing | Off |
Public folder sharing | Off |
Media streaming | Off |
File sharing connections | Use 128-bit encryption to help protect file sharing connections (recommended) |
Table ...view middle of the document...


Exercise 3.3 | Manually Configuring TCP/IP |
Overview | Because the lab network you are constructing for Contoso, Ltd. must be isolated from the production network, you do not want lab computers to obtain their TCP/IP settings from the DHCP servers on the production network. Therefore in Exercise 3.3 you manually configure the TCP/IP client to use static IP addresses. |
Completion time | 15 minutes |

3. Using the information in the IPconfig.exe display, note your workstations current TCP/IP configuration settings in Table 3-2.
TCP/IP Setting | Value |
IPv4 Address | |
Subnet Mask | |
Default Gateway | fe80::aeec:80ff:fe0e:2d17%11 |
DNS Servers | |
Table 3-2

Exercise 3.5 | Netwoking |
Overview | In order to better understand the layout of the Contoso, Ltd. Network, you decide to refresh your networking skills. Fill out the chart below using Rings of Saturn subnetting site: |
Completion time | 15 minutes |

IP Address | Subnet Mask | Network Address | Host Address | CIDR | | | | .1 | /24 | | | | | /8 | | | | 1.1 | /16 | | | | .35 | /24 | | | | 10.1.5 | /8 | | | | 5.6 | /16 | | | | 25.5.1 | /8 | | | | 12.3.1 | /8 | | | | .4 | /24 | | | | .5.4 | /16 | | | | .2 | /24 | | | | .63 | /24 | | | | .32.1 | /16 | | | | .4.2.1 | /8 | | | | .199.5 | /16 |

Other Papers Like Configuring Network Connections

Ntc/411 Network Management Paper

1122 words - 5 pages system isn’t present or operational. In these cases an out-of-band approach seems more feasible. Here are some out-of-band tasks that administrators can perform; powering on or off one or many computers, restarting computers, re-imaging by booting from a boot image file located on the network or a PXE server, reconfiguring BIOS settings, booting to command based operating system to run command or perform other tasks, and configuring scheduled

Unit 4 Summray Essay

1002 words - 5 pages 1. Computing Wireless / Networking ------------------------------------------------- Top of Form Search Bottom of Form * Wireless / Networking Categories * Networking Basics * Wi-Fi Wireless * TCP/IP Networking * Internet Connections * Proxy Servers / Lists * Home Networking * VPN and Virtualization * P2P File Sharing * Network Hardware * Windows Networking

Final Exam Ccna3

3625 words - 15 pages forwarding the BPDUs it receives. It is receiving BPDUs and populating the MAC address table, but not sending data. 44 . While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide? This allows the switch to host web pages for the network. This allows remote VPN connections to the switch over the Internet. This is required if a web server or web farm is

Patton-Fuller Community Hospital Network Project

1533 words - 7 pages Explorer and its company’s webpage for these layers (Patton-Fuller, 2013). Recommended Protocols For Patton-Fuller to fully utilize their potential networking power, the following protocols should be utilized. Patton-Fuller should utilize a Gigabyte Ethernet Network for all its hardwired LAN connections. Gigabyte Ethernet is part of the family of Ethernet computer networking and communication standards. The Gigabit Ethernet standard supports a

It535 Unit 1 Project

2893 words - 12 pages public network. When the unsecure network is the Internet, NAT addresses should be provided from an authorized entity in the public network which means addresses need to be allocated by the Internet Assigned Number Authority (IANA) (Balchunas, 2013). The reservation of assigned addresses is stored within a pool, to be able to use them when required. When connections are authenticated from the private network, NAT selects the next available global

Network Evaluation

2416 words - 10 pages properly, allowing only intended traffic in and out of the company network. I will look for group policies in place on the network that will control what users are allowed to do at their workstations and the access they have to the underlying OS. If remote connections to the network are being utilized, I will investigate how users log on to ensure it is secure. Users should be logging on to a VPN using a two-factor authentication method, such as

Firewalls: Guidelines and Procedures

3091 words - 13 pages of packet filters by tracking the state of connections and blocking packets that deviate from the expected state. This is accomplished by incorporating greater awareness of the transport layer. As with packet filtering, stateful inspection intercepts packets at the network layer and inspects them to see if they are permitted by an existing firewall rule, but unlike packet filtering, stateful inspection keeps track of each connection in a state

Interior Gateway Routing Protocol (Igrp)

1894 words - 8 pages services use network topology information • Provides best effort end-to-end packet delivery services to its user, the Transport layer • Sends packets from the source network to the destination network based on IP routing table • After the router determines which path to use, it can proceed with 'switching' the packet Network Layer (Communicate Path) • Addresses represent the path of media connections â

70-640 Cards

1177 words - 5 pages ) Term What is "The Rule of Three"? Definition The Rule of Three states that no Domain Controller should be more than 3 network hops away from any other Domain Controller that can originate a change to the Active Directory database Term Application Directory partitions, Schema partitions, Configuration partitions, and domain partitions are referred to as ____ ____ Definition Naming contexts Term T/F Once a manual replication connection is configured and activated, all automatic replication connections are then ignored. Definition True


1931 words - 8 pages , and is likely to be a person with a comprehensive overview of SQL Server and all its applications. Administering SQL Server typically includes such tasks as installing SQL Server; configuring servers and clients; managing and monitoring the use of disk space, memory, and connections; creating devices and databases; authorizing SQL Server users and granting them permissions; transferring data in and out of SQL Server databases; backing up

345 Lab 4

7461 words - 30 pages . Each logical section of the network received a block of addresses to be used for router-to-router connections and store LAN segments. This allowed for each region to be summarized into one route for router to router connections and one route for all store networks. Given the hardware limitation, a second slave router was added to regions 1, 2, 4, and 5. By adding the second router to each of the aforementioned regions, summarized routes were used

Related Essays

Airborne Network Essay

997 words - 4 pages attribute. The connectivity of the airborne networks also gives a diversity of links for different situations. Because these networks are used by the air force the links differ according to the environment and function (which may be to get system information or media information). The links also differ according to the kind of signal that the recipient requires. The signal can be either radio or optical. Network connections are also flexible and

Local And Wide Area Networks Essay

1273 words - 6 pages ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the

Implement A Vpn Tunnel Between A Microsoft Server And Microsoft Client

653 words - 3 pages then click the View network connections option, then click the details option and your IP address will be right next to the label IPv4. 9. How can you verify that the IPSec VPN tunnel is encrypting your IP data payload? You can verify that the data is encrypted by capturing the packets sent with Wireshark and then analyzing these captured packets. On my capture and since I was using point-to-point encryption I was able to see that the packets

Whatever Works Essay

956 words - 4 pages of corporation resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc. 2.0 Scope This policy applies to all Corporation employees, personnel, and affiliates including vendors and agents with a corporation owned or personally-owned computer or workstation used to connect to the Richmond network. This policy applies to remote access connections