Premium Essay

Unit 1 Ip Addressing Scenario

In: Computers and Technology

Submitted By Jahuber92
Words 289
Pages 2
UNIT 1: IP ADDRESSING SCENARIO

First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space, host or whatever it is that you need then you will be able to expand your idea and…...

Similar Documents

Premium Essay

Unit 1 Ip

...Unit 1 Individual Project Psychology Persectives Desiree DuBose American InterContinental University Author Note Desiree DuBose, Department of Information Technology, American InterContinental University Online This research was supported by Yahoo Search, AIU Library Resources Correspondence concerning this article should be addressed to Desiree DuBose, Department of Information Technology, American InterContinental University Online, Hoffman Estates, IL 60192 Contact: desiree.dubose1@aiu.edu Behaviorism is an approach with psychology that is based on the proposition that behavior in human beings as well as animals can be researched and understood without recourse to inner mental states (New World Encyclopedia, 2008). There are three major figures that led to this development they are Ivan Pavlov, John B. Watson, and B.F. Skinner. Behaviorism is developed with the order that only observations that satisfied the criteria of the scientific method were to be allowable as evidence. One of the hypotheses many behaviorists hold is that free will is an illusion. As the result of this behaviorism orders that all behavior is determined by a combination of genetic factors and the environment is either through classical or operant conditioning. Classical conditioning is a technique used in behavioral training in which a naturally occurring stimulus is paired with a response. Operant conditioning is a method of learning that occurs......

Words: 897 - Pages: 4

Premium Essay

Unit 1 Ip

...Unit 1 – Introduction to Managerial Accounting Genean Benders American InterContinental University Memo An internal managerial accounting system consists of information that management uses to make decisions about the operations of the business. As per the request of the CEO, I am writing a memo to provide information of the characteristics of managerial accounting and why it is necessary for another managing accountant within our company. The Seven Characteristics of Managerial Accounting There are seven characteristics of an managerial accounting system which is comprised of users and decision makers, purpose of information, flexibility of practice, timeliness of information, time dimension, the focus of information and the nature of information (Wild & Shaw, 2012). There is often confusion between financial and managerial accounting, therefore, the following will give detail of the explanation of the seven characteristics of managerial accounting versus financial accounting. This information should also aid with the understanding of why another managing accountant is needed. Users and decision makers. In managerial accounting, this characteristic refers to the internal management, unlike financial accounting that involves external users such as investors and creditors (Wild & Shaw, 2012). Purpose of Information. Management uses informational reports of the company’s financial activities to make important decisions about the ongoing operations of......

Words: 781 - Pages: 4

Premium Essay

Unit 1 Ip

...NYSE – Euronext and the NASDAQ Name: Robert E. Smith American Intercontinental University FINA 310 – Financial Management Unit 1 Individual Project September 1, 2013 Abstract This report, providing information by study of financial management, makes a comparison of the New York Stock Exchange and the National Association of Securities Dealers Automated Quotations. We will provide a perspective difference between NYSE and NASDAQ by information used in making comparison. We will further describe the Public Company Accounting Protection Act of 2002, and provide a description of the law. Memo: To: Brokers Association From: American Intercontinental University Subject: NYSE and NASDAQ RE: Orientation Date: 08/31/2013 Introduction: In orientating our newest brokers, we provide a detailed introduction to the New York Stock Exchange and the National Association of Securities Dealers Automated Quotations, Identified best by most by abbreviation as NYSE, and NASDAQ, a report detailing the similarities of these two organizations and their differences. We further provide discussion of the “Public Company Accounting and Investor Protection Act of 2002 in describing this law as it was established and reason. Overview NYSE-Euronext and NASDAQ similarities: We begin by providing an overview of both exchange operators in making comparison determining what similarities there are in these operators of financial markets. First, the NYSE is stated to be a global......

Words: 989 - Pages: 4

Premium Essay

Ip Addressing Scenario

...IP addressing Scenario When you design an IP addressing scheme for a medium to large scale company you need to take into account several questions about the company environment. What type of security is needed? Is the company going to grow past 145 clients? Do all the computers need to talk to one another? Can they be separated out into different departments? What types of content will be shared between users? How many content share servers are there? When setting up an IP scheme you need to take into account the growth of the company. If the company is only going to have 254 devices attached to the network. If the answer is yes then you can proceed with a statically assigned IP scheme. If you answer is no then you need to implement a scheme designed around a DHCP server. Normally when you design a scheme you want to take into account the departments in the company and if they need to be interconnected to the rest of the clients. If there are several departments that need to talk to one another, and a couple of departments that are restricted access clients. These types of question and answers would make an IT professional’s job either simple or more complex. Normally in a IP Scheme you want to choose the IP address that make sense to your network most internal networks sit in the class B or C range. If you choose a network IP of 172.16.0.1 your subnet masks would be at 255.255.0.0 for your choice. If you are going to design a IP scheme around a DHCP Server it might......

Words: 508 - Pages: 3

Premium Essay

Ip Addressing

...Unit 1 Exercise 1 IP Addressing Scenario When designing the data closet should be located in a non-centralized location but still have easy access for services and upgrades or repairs. I would consider using a class b network set up which would easily allow 145 users, computers or equipment to connect but still provide additional addresses and networks as the company expands within the next two years. As for IP address I would consider static IP address for all local computers and equipment within the company such as printers, routers user computers etc. This will be easier to use and less expensive. With over 16,000 networks and 65,000 host address available there will be plenty of room for the company to grow. I would also consider having a wireless network using dynamic ip addresses leasing addresses to the user’s devices to allow users to connect there wireless devices to the network. All the systems we use today can work well with DHCP so it shouldn’t be a problem. Also you should consider having multiple domain and DHCP servers to provide load balancing, efficiency and safety in case of server failure. DHCP should be used whenever possible DHCP is easier because there is usually not a need to manually assign and track IP addresses across a number of devices where a specific IP is not necessary, and use reservations for the static devices like Printers and A/P's. And use static addresses for Servers. For example when recovering from a full power outage DHCP WILL...

Words: 308 - Pages: 2

Premium Essay

Ip Addressing Scenario

...Unit 1 Exercise 1: IP Addressing Scenario To start with, I would use the IP Class C. The subnet range in Class C is 255.255.255.0-255.255.255.255. This would be the best one for this company because there is room to grow. I believe that the IP addresses should be statically assigned. That way, there is not a chance of it getting into any trouble by anyone. One network/subnet would do fine. You have a giant subnet range, plus you have a good size network. If DHCP is used, then yes a router, firewall, and Windows Server should be utilized. You need a firewall, so you don’t have any problems with your employees looking at non-work related websites or websites that haven’t been approved. A router, so that you can have your internet connection protected. You wouldn’t want anyone just hacking into your connection and getting their hands onto any private information that they could get their hands on and ruin your company. A Windows Server would be good as well. You could use the Windows Server so the employees could get their work done, instead of searching the web for non-work related things as well. When you consider this design as a possible outcome, just remember that this plan also involves the growth of the company. The growth of the company is the main concern here. We do not want to stunt the growth of the company. We want the company to grow as much as possible. I believe this design will prove to do that. It will be a great design and will help out very much. We do......

Words: 317 - Pages: 2

Premium Essay

Unit 1 Ip

...Criminal Justice System Idellar Camel Criminal Justice Unit 1 IP September 1, 2013 ABSTRACT Unfortunately everyone doesn’t abide by the laws that are set and rules that are made. Therefore, a mean of protecting the innocent and punishing the violators must be established to carry out the process. The structure of processes would be the Criminal Justice System. It is composed of several different components that work on different levels of duty. This paper would describe the different parts of this much needed system such as law enforcement, attorneys of prosecution duties, defense advocates or counsels, Magistrates or judges on three different levels of government, federal, state, and local. Also, this paper would confer the two different structures of the system of the criminal courts. Last, it would give the stages of interactions of the prosecutorial and investigative process with a lawbreaker defendant. Officers: Law Enforcement There are different kinds of agents of law enforcement in the federal level of government. The FBI, Federal Bureau of Investigation, United States Marshall, USSS, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Drugs Enforcement Agency are support staffs and special agents of the federal government. They protect the White House, the President and his family, Vice President, the White House. Also, there are some agencies including the IRS, Bureau of Indian Affairs that assist these law agencies on suspicious activities...

Words: 1118 - Pages: 5

Premium Essay

Unit 1 Ip

...Charity Vogue Unit 1 Individual Project March 22, 2014 CRJS205 - 1402A – 02 Abstract The U.S. Constitution protects all people, both foreign and domestic from unlawful arrest and procedures. This is to ensure equality and fairness through the legal system. Under the due process law, any evidence obtained illegally becomes inadmissible. “The fifth, sixth and fourteenth amendment of the Constitution are the basis of which the due process stands and implies that the progression of events from point of arrest to conviction will follow procedures in accordance to the rules and forms established for the protection of individual rights” (Schmalleger, 2014, p. 12). Memo: To: Mrs. Singh From: Charity Vogue AIU Law Office March 24, 2014 Dear Mrs. Singh; The charge against you is breach of the peace, also known as disorderly conduct. This being your first offense, I can understand your concerns and hope that this information will clear up any questions you have. I will inform you about the differences between a felony and a misdemeanor and the differences in consequences, in addition to explaining the possible outcome of your charges. The difference between a misdemeanor and a felony is the severity of the crime and the consequences that follows conviction. The Uniform Crime Reporting lists crimes in two categories, which are part one and part two offenses. Part one offenses are crimes that result in a felony conviction. A felony is any crime serious enough......

Words: 598 - Pages: 3

Premium Essay

Econ Unit 1 Ip

...Unit 5 Individual Project Page 1 Shuntina Heard September 28, 2014 Macroeconomics 224-1404A-02 Unit 5 Individual Project Page 2 Hong Kong and Singapore are both tremendously small, but extremely open to international trade. Both countries are also very advanced. Both countries are very parallel in many ways. Both countries at one point served as major trading ports. Hong Kong’s economy is usually the same. At one point they suffered an international economic crisis. A few years after the crisis the economic grate rate rose to 6.8 percent. Hong Kong is considered to be the Gateway for China when it comes to trading. World Bank mission is to help progress and grasp goals of its people by working with its associates to improve poverty. Some of the methods the use to help economic growth is knowledge and learning, post conflict and fragile states, global public goods, and focusing on the poorest country. Both Singapore and Hong Kong must have a market economy because they are industrialized. Knowledge and learning would be a good methods for Hong Kong. Learning what to do and what not to do when it comes to trading. Trying to stay ahead of other countries with similarities and who are considered trading ports. Singapore has a promising economic location and accomplished workforce. Singapore most fast emerging sectors of its economy is communication transport, trade and exports. Unit 5 Individual Project Page 3 References IMF. (2010). World Economic Outlook. International......

Words: 254 - Pages: 2

Free Essay

Unit 1 Ip

...Abstract This paper explains my view on the “War on Terror” and the effects that it has had on our freedoms in America and ways we can change the “War on Terror” to gain our freedom back and maybe help secure our country in a more effective way. Introduction While we have the more freedom and rights than most countries our freedoms have definitely been effective in recent years due to the September 1, 2001; with the on terror and the efforts to make our country safer, Americans have been more willing to give up many more freedoms in exchange for this safety. My Topic is: The “War on Terror” has become a war on American Freedoms, and my Thesis is: The “War on Terror” has reduced more of our freedoms in America and has done little to catch Terrorist: we should eliminate the TSA and reevaluate all the other amendments that are being infringed upon and restore our freedom. Main Point 1: The idea behind the “War on Terror” was sparked by the events of September 11, 1999 when the World Trade Center was attack by terrorist, the idea behind it was a good one but failed in many ways. The American people are really the people that are punished the most by the “War on Terror”, we can no longer travel freely without being subjected to uncomfortable pat downs or invasive scanners by the TSA. Main Point 2: Why have flight restrictions with the TSA when our boarders are wide open? This makes no since, Americans are being restricted by flight, stopped at road blocks and checked for......

Words: 442 - Pages: 2

Premium Essay

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3

Premium Essay

Ip Addressing Scenario

...IP Addressing Scenario The first thing that we must take in consideration is the number of hosts (145). For my design, I could use the 192.168.0.0 address space using /21 (192.168.0.1 - 192.168.7.254). My subnet mask on the devices will be 255.255.255.0. I will reserve the first and last 20 or so addresses in each DHCP for statically assigned addresses and network devices / gateway addresses. * 192.168.0.0 /24 for servers-all static * 192.168.1.0 /24 for pc's printers- operational for DHCP 192.681.1.21 - 192.168.1.230 * 192.168.2.0 /24 for wireless  - functional for DHCP 192.168.2.21-192.168.2.230  * 192.168.3.0 /24 for VoIP - working for DHCP 192.168.3.21 - 192.168.3.230 * 192.168.4.0 - 192.168.7.254 for future usage . We should have multiple domain servers and DHCP servers. Firewall always needs to be used even though most computers with windows 7 come with it. Firewall is very important because it block any outside intrusion. That way it can be monitored. All type of security can be implanted to assure that the servers can’t be infiltrate by intruders, like finger print recognition, password expiration…. It will be my responsibility to ensure that all policy regarding the security of each computer and server will meet the criteria. Each IP addresses should be addressed dynamically because it will be easier and it won’t take a lot of time and that way we won’t have to go to each computer and assign them statically. The only that we will have to......

Words: 510 - Pages: 3

Premium Essay

Unit 1 Ip

...Unit 1 Individual Project for ITCO299-1203A01 Comprehensive IT Project Introduction 2–6 pages | Details: | Scenario You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain its records of the professional development of its employees. The company has over 30,000 employees, who are located in four sites: Florida, Colorado, Illinois, and Texas. The system must allow employees to locate and schedule professional-development activities that are relevant to their positions. Sophisticated search capabilities are required, and the ability to add scheduled events to the employees' calendars is desired. The system needs to support social networking, which will allow employees to determine who is attending various conferences and events. This will promote the fostering of relationships and ensure that the company has representation at important conferences.Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications, which will allow managers to receive notice whenever their direct reports have submitted documentation. The system should also notify employees if their deadline to complete professional-development requirement is approaching and it has not yet been completed. * Project charter: Using the above scenario, develop a project charter. Include the problem......

Words: 257 - Pages: 2

Premium Essay

Bus105 Unit 1 Ip

...Running Head: ACADEMIC HONESTY AND PLAGIARISM 1 Running Head: ACADEMIC HONESTY AND PLAGIARISM 2 People are sometimes accused of plagiarism, and some are unaware that they are plagiarizing unintentionally. Therefore, it is important for someone to learn to use the correct citations and paraphrasing to avoid unintentional plagiarism. In a 2007 article Avoiding Unintentional Plagiarism, (Foster 2007) “Avoiding plagiarism is simple, but for most of us, writing is difficult” (page #2). According to Foster, to avoid plagiarism, you must give credit whenever you use another person’s idea, opinion, theory, facts, information and quotations of another person’s spoken words (page #1). Foster is emphasizing that we must use proper citations in order to avoid plagiarism. Therefore, addressing the key elements of writing while to ensure academic honesty. For an example, one element is using the proper citation guidelines, therefore, “if you include a statement that is identical to the original work, either quote the material exactly and use quotation marks, or if you change words to better fit your style, omit the quotation marks but add the page number in the text citation” (page #1). The other element is telling the reader where the information came from, whether it’s referencing the author and article and or where you found it. By following this method, this will emphasis the originality of your work, therefore, giving the author credit. While plagiarism is...

Words: 571 - Pages: 3

Premium Essay

Unit 1 Ip

...Abstract This paper will evaluate and demonstrate a manufacturing company options about launching a new product. This will be determined using the payback period that they plan to invest in this adventure. This will be performed by figuring out the company net present value and cash flow to determine if a project should be accepted within a three year payback period. The formula that was used to find the payback period was Payback Period = Investment (Total Cost of the Project) / Annual Cash Inflow. The formula used to calculate the net present value is as followed (1+r) ^t. Please click link to view excel spreadsheet for the assignment financial management unit 4 IP excell.xlsx. In order for a project to be accepted using the Payback rule the project according to Brooks, (2010) states that it is okay to accept a project if the payback period is less than maximum years the company is willing to accept. On that, same note if the payback period is longer than the three year that is required by the company then the project need to be rejected. For example, the payback period for this assignment is at 2.9 which mean that the project can be accepted because it is under the three years that the company requires. By the project being boarder line, I would like more clarity because if a person would round the payback period then the project would be denied. When evaluating the net present value a person has to take into considers the......

Words: 530 - Pages: 3

War of the Arrows | Lancia Aurelia Documentation on CD/DVD Choose ONE of three for this auction **** | 3x51 En el punto de mira