Ip Addressing Scenario

In: Computers and Technology

Submitted By slvrnapalm
Words 508
Pages 3
IP addressing Scenario When you design an IP addressing scheme for a medium to large scale company you need to take into account several questions about the company environment. What type of security is needed? Is the company going to grow past 145 clients? Do all the computers need to talk to one another? Can they be separated out into different departments? What types of content will be shared between users? How many content share servers are there? When setting up an IP scheme you need to take into account the growth of the company. If the company is only going to have 254 devices attached to the network. If the answer is yes then you can proceed with a statically assigned IP scheme. If you answer is no then you need to implement a scheme designed around a DHCP server. Normally when you design a scheme you want to take into account the departments in the company and if they need to be interconnected to the rest of the clients. If there are several departments that need to talk to one another, and a couple of departments that are restricted access clients. These types of question and answers would make an IT professional’s job either simple or more complex. Normally in a IP Scheme you want to choose the IP address that make sense to your network most internal networks sit in the class B or C range. If you choose a network IP of 172.16.0.1 your subnet masks would be at 255.255.0.0 for your choice. If you are going to design a IP scheme around a DHCP Server it might be easier on you or more difficult based on your views. The DHCP server would take the work out of guessing if every IP address is in use all the time. It will auto assign IP address based on the number of licensed days. But the set up process may be longer for the initial setup. When you set up the DHCP server most of the time you need to have the firewall that comes with Windows to be turned…...

Similar Documents

Ip Addressing

...12.5% (or 1/8th) of the total IPv4 unicast address space. Class D Class D addresses have their leading four-bits set to 1-1-1-0 and are used to support IP Multicasting (IP Address, 2010). RFC 1918 IP address ranges There are 3 IP ranges that are not routed across the Internet and can only be used on local networks. These are RFC 1918 IP addresses. You will sometimes see these used on ISP networks, where the devices can only be accessed from within the ISP's network, not from the rest of the Internet. There are 3 IP ranges defined in RFC 1918: 10.0.0.0/8 (10.0.0.0-10.255.255.255), 172.16.0.0/12 (172.16.0.0-172.31.255.255), 192.168.0.0/16 (192.168.0.0-192.168.255.255) (havoc, 2012) Sampling of Martian/ Bogon address ranges A bogon list is a compilation of address ranges that are used on private networks and should not be visible on the public Internet under normal operation. Some bogons do appear on the public Internet for various reasons, including the (legitimate) use of non-globally unique addresses for router interfaces, source address spoofing in DDoS attacks and the use of unallocated address blocks for malicious or fraudulent purposes (Hyan, 2004) Martians A Martian packet is a packet that is reserved for special use by (IANA) and can’t actually be used or delivered. They arise in denial of service attacks from ip spoofing (Baker, 1995)....

Words: 598 - Pages: 3

Ip Address Scenario

...Unit 1 Exercise 1 IP address scenario There are many factors involved in this scenario. For example, the building may lend itself to certain network designs. You may have multiple floors or a single floor. Multiple data closets or just one. You may have virtualized servers or desktops. You will want to accommodate all these into your design. 50% may seem like too much now, but realistically, 200 or 300% might be more acurate. A simple design you can consider is 1 floor with a single data closet serving 150 users. You need: A core network Networks for your firewall, dmz, remote vpn clients, etc switch mgmt network server network voice network wireless network networks for other services you have not yet identified, like security, cameras, fire, door, video, etc You should have multiple domain servers and dhcp servers While you can get away with using high end switches for dhcp, a couple windows servers will do the trick and give more insight when you are troubleshooting Most systems can get along with dhcp, so that is fine, (some older systems still need host files) but there are support benefits to statically assigned addresses. In any case, you will want reserved space in these networks for your network devices, ie. vlans, redundant or clustered systems, etc. For you design, you could use the 10.1.0.0 address space using /21 (10.1.0.1 - 10.1.7.254) Your netmask on the devices will be 255.255.255.0 Reserve the first and last 20 or so addresses in each......

Words: 694 - Pages: 3

Ip Addressing Scenario

...September 18, 2013 NT 1330 Unit 1 Exercise IP Addressing Scenario First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class b. Honestly I would say because of the number of hosts. In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. When it comes to maintaining and obtaining their easier to have as well. In answering the question about having one or more network/subnets to be used. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into......

Words: 412 - Pages: 2

Ip Addressing

...Unit 1 Exercise 1 IP Addressing Scenario When designing the data closet should be located in a non-centralized location but still have easy access for services and upgrades or repairs. I would consider using a class b network set up which would easily allow 145 users, computers or equipment to connect but still provide additional addresses and networks as the company expands within the next two years. As for IP address I would consider static IP address for all local computers and equipment within the company such as printers, routers user computers etc. This will be easier to use and less expensive. With over 16,000 networks and 65,000 host address available there will be plenty of room for the company to grow. I would also consider having a wireless network using dynamic ip addresses leasing addresses to the user’s devices to allow users to connect there wireless devices to the network. All the systems we use today can work well with DHCP so it shouldn’t be a problem. Also you should consider having multiple domain and DHCP servers to provide load balancing, efficiency and safety in case of server failure. DHCP should be used whenever possible DHCP is easier because there is usually not a need to manually assign and track IP addresses across a number of devices where a specific IP is not necessary, and use reservations for the static devices like Printers and A/P's. And use static addresses for Servers. For example when recovering from a full power outage DHCP WILL...

Words: 308 - Pages: 2

Computer Networks and Ip Addressing

...Understanding IP Addressing: Everything You Ever Wanted To Know Introduction In the mid-1990's, the Internet is a dramatically different network than when it was first established in the early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data network, doubling in size every nine months. This is reflected in the tremendous popularity of the World Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts, and the emergence of new types and methods of doing business. It is clear that expanding business and social awareness will continue to increase public demand for access to resources on the Internet. There is a direct relationship between the value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with......

Words: 7368 - Pages: 30

Ip Addressing Scenario

...Unit 1 Exercise 1: IP Addressing Scenario To start with, I would use the IP Class C. The subnet range in Class C is 255.255.255.0-255.255.255.255. This would be the best one for this company because there is room to grow. I believe that the IP addresses should be statically assigned. That way, there is not a chance of it getting into any trouble by anyone. One network/subnet would do fine. You have a giant subnet range, plus you have a good size network. If DHCP is used, then yes a router, firewall, and Windows Server should be utilized. You need a firewall, so you don’t have any problems with your employees looking at non-work related websites or websites that haven’t been approved. A router, so that you can have your internet connection protected. You wouldn’t want anyone just hacking into your connection and getting their hands onto any private information that they could get their hands on and ruin your company. A Windows Server would be good as well. You could use the Windows Server so the employees could get their work done, instead of searching the web for non-work related things as well. When you consider this design as a possible outcome, just remember that this plan also involves the growth of the company. The growth of the company is the main concern here. We do not want to stunt the growth of the company. We want the company to grow as much as possible. I believe this design will prove to do that. It will be a great design and will help out very much. We do......

Words: 317 - Pages: 2

Ip Addressing Subnetting

...1010101000110010 010101001011000 110101100011010 11010100001011 001010100110 1001010010 11010011 10011000 IP Addressing and Subnetting Workbook Version 2.0 Instructor’s Edition 11111110 10010101 00011011 10000110 IP Address Classes Class A Class B Class C Class D Class E 1 – 127 128 – 191 192 – 223 224 – 239 240 – 255 (Network 127 is reserved for loopback and internal testing) 00000000.00000000.00000000.00000000 Leading bit pattern 0 Network . Host . Host . Host Leading bit pattern Leading bit pattern 10 110 10000000.00000000.00000000.00000000 Network . Network . Host . Host 11000000.00000000.00000000.00000000 Network . Network . Network . Host (Reserved for multicast) (Reserved for experimental, used for research) Private Address Space Class A Class B Class C 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Default Subnet Masks Class A Class B Class C 255.0.0.0 255.255.0.0 255.255.255.0 Produced by: Robb Jones jonesr@careertech.net and/or Robert.Jones@fcps.org Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors, and to everyone who has sent in suggestions to improve the series. Workbooks included in the series: IP Addressing and Subnetting Workbooks ACLs - Access Lists Workbooks VLSM Variable-Length Subnet Mask......

Words: 18750 - Pages: 75

Ip Addressing

...IP Addressing: Who’s Got Class and Who’s Special Chelley Cline NT2640 We live in a time of marvel and discovery. We have phones and computers in our pockets and in our cars. Our workplaces expect us to use equipment that literally can talk to the world. These things are so much a part of our lives that we forget they are the result of years of development and standardizing. The wonders of that result are far overshadowed by the systems that enable them to work. At the most basic level the internet is like a huge mail delivery system. While that is a vast simplification, it gives a framework to understand why and how some of the fundamental rules came into play. Originally there were just 32-bit numbers as IP addresses – no classes or obvious distinction between network and host bits. It was assumed that the first eight bits were the network. This only offered 254 networks. Many organizations didn’t need 16,777,214 host addresses, and over time it was obvious that we needed not only different sizes of networks, but more of them. In 1981 a new way to partition the bits of an IP address was put into use. In order to be able to easily see which bits were network and which were host, a class system was defined. (Sharma, 2011) The IANA has set rules that are followed worldwide to allow international use of the internet and intranets. Using the knowledge that an octet can only show numbers between zero and 255, classes were developed for the numbers that......

Words: 954 - Pages: 4

Unit 1 Ip Addressing Scenario

...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space,......

Words: 289 - Pages: 2

Ip Version 6 Addressing Architecture

...IP version 6 As you study this section, answer the following questions: * What is the primary reason for developing IPv6? * How many hexadecimal numbers are in an IPv6 address? How does this compare to a MAC address? * What do you add to an IPv6 address when you remove one or more quartets with all 0's? * What information is included within the IPv6 address prefix? * How many numbers are used for the interface ID? How can the interface ID be related to the MAC address? * What is the difference between ISATAP and 6-to-4 tunneling? * What is the difference between tunneling and NAT-PT? This section covers the following exam objectives: * 1.3 Identify the following address formats * IPv6 IPv6 Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. The IPv6 address is a 128-bit binary number. A sample IPv6 IP address looks like: 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973. The following list describes the features of an IPv6 address: * The address is made up of 32 hexadecimal numbers, organized into 8 quartets. * The quartets are separated by colons. * Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16-bits of data (FFFF = 1111 1111 1111 1111). * Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented by 284.......

Words: 979 - Pages: 4

Addressing Scenario

... In this Exercise, you will explain IP addres components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are a IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.) IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations. 1. What subnet range/s should be used 2. Should IP addresses be dynamically or statically assigned. 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router,firewall or Windows Server be utilized and why? Respond in detail. justifying your recommendations. 1-2 pages I find that the IP address components as being the “core” of the IP addresses. Nothing would work without them. They are like the postal address of a home or office building. Every page you see on the internet has a (postal) IP address consisting of numbers such as 255.25.1.200.0. Each number is a component of that IP address. When IPv4 was introduced, only the first octet was used for the network number and the remaining three octets were used for the host number. This limited......

Words: 763 - Pages: 4

Ip Address Scenario

...Theren Woods 9/24/2015 NT 1210 Unit 1. Exercise 1. IP Addressing Scenario A design for a 1 floor office with a single data closet serving 145 to 254 users would need a core network, networks for firewall, a switch management network, a server network, voice network, wireless network, and a network for future services to accommodate the potential 50% growth the company intends to happen. The subnet range that should be used to accommodate 145 hosts plus a potential 50% growth within the next two years should be 255.255.255.0. This subnet mask range would support 254 hosts and this particular scenario is only planning for no more than 218. The IP addresses should be statically assigned because dynamically assigned IP addresses can change each time you connect to the internet but statically assigned IP addresses are reserved for the user and don’t change over time. Statically assigned IP addresses would definitely be best for an office environment because you want the same IP addresses everyday so the computers can talk to the server and with one another daily. You should have more than one network/subnets for computers, printers, future use and other host that may be needed. If DHCP is used you should use a Windows Server because it is safer. Normally a hacker will try to penetrate your router or firewall first so if that happens they will also have your DHCP. If it is on a server that’s another added layer to try and hack into....

Words: 255 - Pages: 2

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3

Ip Addressing Scenario

...IP Addressing Scenario The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0. I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for DHCP 192.681.1.21 - 192.168.1.230 * 192.168.2.0 /24 for wireless  - functional for DHCP 192.168.2.21-192.168.2.230  * 192.168.3.0 /24 for VoIP - working for DHCP 192.168.3.21 - 192.168.3.230 * 192.168.4.0 - 192.168.7.254 for future usage . We should have multiple domain servers and DHCP servers. Firewall always needs to be used even though most computers with windows 7 come with it. Firewall is very important because it block any outside intrusion. That way it can be monitored. All type of security can be implanted to assure that the servers can’t be infiltrate by intruders, like finger print recognition, password expiration…. It will be my responsibility to ensure that all policy regarding the security of each computer and server will meet the criteria. Each IP addresses should be addressed dynamically because it will be easier and it won’t take a lot of time and that way we won’t have to go to each computer and assign them statically. The only that we will have to......

Words: 510 - Pages: 3

Ip Addressing

...IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[ and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995, standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s. In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the......

Words: 1361 - Pages: 6