This website uses cookies to ensure you have the best experience. Learn more

Network Infrastructure Essay

5792 words - 24 pages

Table of Contents
INTRODUCTION 2
DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3
AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3
INSTALLING AND AUTHORIZING A DHCP SERVER 4
CREATING AND CONFIGURATION OF DHCP SCOPES 8
CREATING AND TESTING DHCP CLIENT RESERVATIONS 10
IMPLEMENTING DHCP RELAY AGENTS 12
DOMAIN NAMING STRATEGY 16
DOMAIN NAME SERVICE INSTALLATION 17
DOMAIN NAME SERVICE LOOK UP ZONES 18
ZONE AUTHORITY DELEGATION 23
DNS DYNAMIC UPDATES 25
DNS RESOURCE RECORDS 25
NETBIOS NAME RESOLUTION 27
INSTALLATION OF WINS 27
STATIC WINS RECORD 28
CONFIGURING REPLICATION PARTNERS 30
ALTERNATIVE IP ADDRESSING STRATEGY 31
ALTERNATE NAME ...view middle of the document...

DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM
AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK
With consideration to the different sizes in departments for the three sites, using Variable length subnet mask the below addressing scheme has been developed.
* Glasgow site=G
* Clyde site=C
* Edinburgh (Head office)=E
VLAN No | VLAN NAME | SUBNET MASK | SUBNET ADDRESS | HOST RANGE | BROADCAST ID |
1 | E-Servers | 255.255.255.240 | 192.168.0.0/28 | 192.168.0.1 To192.168.0.14 | 192.168.0.15 |
2 | E-CorpIT | 255.255.255.248 | 192.168.0.16/29 | 192.168.0.17 To192.168.0.22 | 192.168.0.23 |
3 | E-Management | 255.255.255.248 | 192.168.0.24/29 | 192.168.0.25 To192.168.0.30 | 192.168.0.31 |
4 | G-sales | 255.255.255.224 | 192.168.0.32/27 | 192.168.0.33 To192.168.0.62 | 192.168.0.63 |
5 | G-Marketing | 255.255.255.224 | 192.168.0.64/27 | 192.168.0.65 To192.168.0.94 | 192.168.0.95 |
6 | G-Credit control | 255.255.255.224 | 192.168.0.96/27 | 192.168.0.97 To192.168.0.126 | 192.168.0.127 |
7 | G-IT | 255.255.255.240 | 192.168.0.128/28 | 192.168.0.129 To192.168.0.142 | 192.168.0.143 |
8 | G-Servers | 255.255.255.240 | 192.168.0.144/28 | 192.168.0.145 To192.168.0.158 | 192.168.0.159 |
9 | C-Sales | 255.255.255.224 | 192.168.0.160/27 | 192.168.0.161 To192.168.0.190 | 192.168.0.191 |
10 | C-Marketing | 255.255.255.224 | 192.168.0.192/27 | 192.168.0.193 To192.168.0.222 | 192.168.0.223 |
11 | C-Credit control | 255.255.255.240 | 192.168.0.224/28 | 192.168.0.225 To192.168.0.238 | 192.168.0.239 |
12 | C-Servers | 255.255.255.240 | 192.168.0.240/28 | 192.168.0.241 To192.168.0.254 | 192.168.0.255 |
13 | E to G link | 255.255.255.252 | 192.168.1.0/30 | 192.168.1.1 To192.168.1.2 | 192.168.1.3 |
14 | E to C link | 255.255.255.252 | 192.168.1.4/30 | 192.168.1.5 To192.168.1.6 | 192.168.1.7 |

INSTALLING AND AUTHORIZING A DHCP SERVER
Dynamic Host Configuration Protocol (DHCP) is the role that has to be installed to allow automatic assignment of IP addresses to client computers. Therefore, a DHCP server has to be installed for this UWS network and used in the automatic assignment of the above designed addressing plan.
1. To install DHCP, from server manager, add roles then select DHCP server

2. Enter parent domain name and DNS server IP address

3. Select WINS is required and enter the IP address of the WINS server

4. DHCP scopes can be created now or after installation of the DHCP server, scopes will be created after the completion of this installation

5. Confirm then select Install to complete installation

After installation of the DHCP server, the next thing is to authorize the server.
1. In the DHCP console, right click on DHCP and select manage authorized servers

2. Click Authorize then enter the name or IP address of the DHCP server to be...

Other assignments on Network Infrastructure

Is3230 Unit 2 Assignment 1

307 words - 2 pages Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is

Patton Fuller Networking Project Essay

1602 words - 7 pages , 2011). PFCH uses several network systems, including wireless technology. Multiple technologies are necessary to be used and combined to create a healthcare network infrastructure. Ideally, each of these technologies should integrate into a cohesive network platform capable of delivering network services that are protected, resilient, responsive, and interactive. It is the interconnection and combination of these technologies that

Selecting Security Countermeasures

374 words - 2 pages IS3220 Assignment 2: Selecting Security Countermeasures As a Technology Associate in the Information System Department at Corporation Tech, I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the Internet without proper security can be harmful in many ways. The first thing that should be added is firewalls. Firewalls can prevent unwanted traffic from infiltrating the

Assignment 2: Critical Infrastructure Protection

1124 words - 5 pages Assignment 2: Critical Infrastructure Protection Benard Braxton, Jr. Dr. Bouaffo Kouame CIS 502 – Theories of Security Management May 17, 2015 The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security

Cloee

332 words - 2 pages Case Study 1: Harriet’s Fruit and Chocolate Company Read the Harriet’s Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitted in MS Word and the submission is not to exceed two (2) pages .(book class: Oppenheimer, P. (2011). Top-down network design (3rd ed.). Indianapolis, IN: Pearson Education, Cisco Press.) Write a one

Starwood Hotel And Resorts Call Center Networking

1097 words - 5 pages medium for the network was explained. The Starwood Lancaster call center location is only a portion of the network in which Starwood uses in order to maintain communication with all buildings under its brand, and I hope that I gave an accurate view of how extensive the call center network could be. References Tutorial-Reports.com. (2007). Call Center Infrastructure. Retrieved from http://www.tutorial-reports.com/business/outsourcing/cso/infrastructure.php Voxeo. (2009). What is IVR?. Retrieved from http://www.voxeo.com/library/ivr.jsp

Cyber Security

317 words - 2 pages Maroc (Oujda) Responsibilities Penetration tester /01/2014 - /12/2014 Perform penetration testing on web application, infrastructure, network and writing reports. Control and Audit for network devices, operating systems, and database. Manage access identity and users privileges. Alliances Group (Casablanca) Responsibilities Security Engineer /05/2013 - /11/2013 Used a variety of network security testing tools and exploits to identify

Roles Involved In Network Security

430 words - 2 pages of defense in depth such as layers of security and detection, detecting flaws in each layer of security, and even if suspicion is detected find out where it found its vulnerability and make a careful planning to ensure its eradication by a number of defenses, application, operating system, network infrastructure, implementation of effective software practices.

Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email

Accounting

579 words - 3 pages (1)Revenue Recognition Telus has three major revenue source: (1)wireless; (2)wireline; (3)voice local and voice long distance For “Voice and data” recognition of revenue: * based upon access to, and usage of telecommunications infrastructure and upon contract fees (note a) * Advance billings/activation, deferred recognized when services are provided (note b) For “Other and wireless equipment “: * Recognized when products are

Integrative Network Design

2910 words - 12 pages easier to find a misplaced package. Riordan will have to build an infrastructure to withstand the quantity of received data. This data needs to be stored somewhere, so next their database will be upgraded to hold more data. Then hardware components like scanners, routers, computers, servers, etc. will be upgraded. Finally a software to run the new system, so the data is protected and managed properly. This design will use a Wide Area Network (WAN

Similar Documents

Cool Essay

847 words - 4 pages Network Design Proposal Prepared for: University of Maryland University College Prepared by: Student Name I. Physical Network Design A. Network Topology Business Needs In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If

It Infrastructure Essay

310 words - 2 pages is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon.3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for this operation. While you can find network vulnerabilities with Nmap, it is not used as such.4. How many total scripts (i.e., test

Whats Up Essay

292 words - 2 pages 7-1 -The principal components of telecommunications networks and networking technologies are? -Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large

Airasia Essay

866 words - 4 pages Chief Commercial Officer, Darren Wright. “We found that our global communications network was not only a business system of growing importance to Air Asia, but one of escalating cost as well” he says. What we ideally wanted in place was a single global IP based network which would not only greatly reduce our communications costs, but would deliver us a single, centrally managed infrastructure with full redundancy solutions built in.” The