This website uses cookies to ensure you have the best experience. Learn more

Network Planning Table Essay

573 words - 3 pages

Associate Level Material
Appendix E

TCP/IP Network Planning Table

Refer to appendix E1.
Identify the problems with the TCP/IP network and complete the table.
Problem | Explanation of Proposed Solution |
Scenario: Two of the network segments pictured will not communicate with each other or any other network segments.The two network segments in question will not communicate because the gateway address assigned to the workstations in each segment are incorrect. | The easiest and quickest solution is to reconfigure the router that connects the two segments and make the router's interfaces match the gateway addresses assigned to the computers in each segment. The other solution would be to change the gateway addresses on the computers to match the existing interface configurations on the router. This could be ...view middle of the document...

  | The easiest and quickest solution is to reconfigure the router that connects the two segments and make the router's interfaces match the gateway addresses assigned to the computers in each segment.  The other solution would be to change the gateway addresses on the computers to match the existing interface configurations on the router.  This could be accomplished through the use of a DHCP server or through manual configuration.Resource Needed: No resources are needed for this resolution unless DHCP is requested/required.  In such a case a DHCP server would need to be installed and properly configured. |
| |
| |
Explain your answer for each problem.

Computer A- Subnet mask needs to be 255.255.0.0 this places the computer on the correct subnet as the rest in the segment

Computer B- Default Gateway needs to be 135.135.1.1 to correspond to it's router's interface address for data to leave the subnet

Computer I- Default Gateway needs to be 135.137.0.1 to correspond to it's router's interface address for data to leave the subnet

Computer I- IP address needs to be 135.137.0.11 so that it is in the correct subnet and can communicate with the rest of the PC's in this segment

Computer F- IP address needs to be 135.137.0.11 so that it is in the correct subnet and can communicate with the rest of the PC's in this segment

Router 1 (interface to token ring)- IP address needs to be 135.139.0.1 so that it is in the correct subnet with token ring and can communicate with the rest of the PC's in this segment

Router 2 (interface to token ring)- IP address needs to be 135.139.0.2 so that it is in the correct subnet with token ring and can communicate with the rest of the PC's in this segment

Computer N, M, L- Subnet mask needs to be 255.255.0.0 this places the computer on the correct subnet as the rest in the segment

Computer N- Default Gateway needs to be 135.139.0.2 to correspond to it's router's interface address for data to leave the subnet

Other Papers Like Network Planning Table

Cis: Network Design Paper

1188 words - 5 pages Network Consultation Introduction to Networking June 19, 2016 Network Design DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance. I recommend using a Local Area Network (LAN) design to efficiently fulfill this request. According to Agarwal & Tayal (2009), “The main reason for designing a LAN is to share resources such as disks, printers, programs, and data. It also

Is3120 Final Review

1063 words - 5 pages ------------------------------------------------- When planning a WLAN design, Remote Authentication Dial-In User Service (RADIUS) is usually addressed when considering potential network performance issues. Is this statement? False ------------------------------------------------- A single connection between critical nodes is a common Layer 2 network resiliency method. Is this statement False

Client And Server Security

5360 words - 22 pages access control system, and uses a single key to encrypt all the columns in a table. A master key that is stored in a dictionary table, and only accessible to the System Administrator, is used for all the encrypted tables in the database ("Transparent Data Encryption", 2012). Architecture and database placement must also be considered when securing a database. The network webserver must be kept separate from the database. Using a DMZ to subnet

NT2799 Presentation

1047 words - 5 pages here at USD are hereby tasked with establishing a network suitable for Greenway Bank’s use with a central location, as well as 4 other locations. The network is to be fully capable of handling any and all business needs of any of the 5 designated sites in St. Louis, Los Angeles, Seattle, Orlando and New York. A timeframe for completion will be established in this charter, as well as a means of communication, planning, and cost of

Firewalls: Guidelines and Procedures

3091 words - 13 pages Firewalls: Guidelines and Procedures Introduction Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal

Wireless on the Move

2311 words - 10 pages 2/6/2011 Wireless on the Move | Thomas Byrd | Warriors Solutions | Wireless on the Move | Warriors Solutions | Wireless on the Move | Table of Contents Executive Summary 2 Introduction 3 Company 3 Industry 3 Assessment 4 Need for WLAN 4 Business Entity 4 Mission of the organization 4 Growth potential 4 Current Network 5 Applications 5 Number of Users 5 Strengths and Weaknesses 6 Anticipated Growth 7

Intrusion Detection System

3698 words - 15 pages to detect weather the intrusion has taken place. The information is obtained from different levels of system such as network ,host, monitoring devices Analysis: in this step the intrusion detection system makes the decision on the action to be taken from the obtained information. (The planning is done)The most common analysis approaches are misuse detection and anomaly detection. Response: in this stage the set of action that the system

Network Design Proposal for Retail Technologies Corporation

5496 words - 22 pages Network Design Proposal for Retail Technologies Corporation NETW410, Enterprise Network Design Team Leader: Juba Cochran Team Members: Brian Perez, Matthew Smith November 18, 2010 Table of Contents Executive Summary………………………………………………………………………….........2 Introduction……………………………………………………………….....................................3 Customer Introduction……………………………………………………………………….........4 Organizational Goals …………......5

Remote Access Devices

1990 words - 8 pages Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. Functionality of Routers A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it

Business Research

6070 words - 25 pages started a social franchising network with more than 300 clinics that ensures access to high-quality and affordable reproductive health products, services and information to nearly 50,000 couples in 2011.  POPSHOP franchises set up family planning “corners” in government clinics that are seeking a sustainable way of offering products. Trust Quality Choices is DKT Philippines’ umbrella campaign that is aimed at providing Filipinos with the right

Huffman Fleet Truck Database

2900 words - 12 pages Planning and Creation of a Fleet Truck Maintenance Database for Huffman Trucking In creating a database, the most vital steps are identifying the table elements. Upon analysis of the Entities and Attributes for Fleet Truck Maintenance form, the elements of the database tables can be identified. In a table, or relation, the entities and attributes of a table define the structure of a database. An entity is an object of importance about which

Related Essays

Implementing Wireless Network Essay

5379 words - 22 pages IMPLEMENTING WIRELESS NETWORK AT KOLEJ TEKNOLOGI ISLAM ANTARABANGSA MELAKA AZRIL NAIM BIN AHMAD ZAJNUDIN This report is submitted in partial hlfillment of the requirements for the Bachelor of Computer Science (Computer Networking) FACULTY OF 31NFORMATION AND COMMUNICATION TECHNOLOGY UNNERSITI TEKNIKAL MALAYSIA MELAKA 2007 ABSTRACT This project paper is a about Implementation Wireless Network at Kolej Teknologi Islam Antarabangsa

Cis 175 Assignment

1597 words - 7 pages in this calculation which is a much more precise metric than Hop count. The routers are locatedin the core layer of the network and provide a gateway to the WAN. Application of routing protocols Function of routing protocols The routing protocol main functions are: • Discovers directly connected neighbors • Propagates routing information/ advertising known routes • Update routing table • Prevention of routing loops The router establishes a

Business Case Essay

4121 words - 17 pages Business Case THE A-TEAM IIS Network & Communications Infrastructure Plan March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett | Table of Contents | | | Executive Summary 2

Photography Networks Essay

2636 words - 11 pages for RDI. “A project, technically, is a temporary endeavor to create a unique product or service. Projects are an undertaking outside of the normal operations of an entity” (mhprofessional, 2013). TABLE OF CONTENTS | I. Feasibility Study | II. Network Analysis | III. Network Design | IV. Design Information | V. Cost Analysis |       Feasibility Study Project Situation: Currently RDI has two data