What plan will you follow to assign printers to all the user

Assignment Help Computer Network Security
Reference no: EM13528141

You are a Network Administrator in Net Ambit Inc. The company has one External IP, five servers (Static). One of them handles DHCP (2k3), 12 printers (Static), 175 wired personal computers (PCs) or users (DHCP). This is a new facility or set up and no IPs have been assigned to you.

You''re logged on locally to a user's computer and your mapping batch file didn''t run and you need to get a file from one of your servers. You have been told that your Internet connection has been set-up and ready for use. You already know how many devices will be connected to your network in the beginning so it''s now time to lay out a plan.

Based on your understanding of the above scenario, create a report in a Microsoft Word document answering the following:

- What plan will you layout in terms of your proposal for listing IP addresses if your first IP is 192.167.1.0 and your last is 192.167.1.255?

You have ten printers that will be used by multiple users.

- What plan will you follow to assign printers to all the users in the organization?

While learning how to read a DHCP Log File, there are various event IDs which detail events.

- Discuss a minimum of five event types found in a DHCP log and describe what they refer to.

Finally, you have 175 PCs that will all be hardwired to the LAN and will each need an IP.

- How will you use your network administrator skills and knowledge in assigning IPs to each user?

Reference no: EM13528141

Questions Cloud

How many grams of ticl4 are required for complete reaction : How many grams of TiCl4 are needed for complete reaction with 125L of H2 at 440Celsius and 800 mm Hg pressure. 2TiCl4+H2=2TiCl3+2HCl
Obtain the charge on the outer surface of the conductor : An isolated conductor of arbitrary shape has a net charge of +1.10×10-5 C. Inside the conductor is a cavity within which is a point charge q = +4.40×10-6 C. obtain the charge on the outer surface of the conductor
The expectations hypothesis : (a) According to the Expectations Hypothesis, what is the expected one-year rate in the marketplace for year 2?
Homotypic fusion of yeast vacuolar vesicles : In the assay for the homotypic fusion of yeast vacuolar vesicles it was necessary to incubate the vesicles from two strains with NSF and ATP before they were mixed together. If they were not pre-treated in this way, the vesicles would not fuse
What plan will you follow to assign printers to all the user : What plan will you follow to assign printers to all the users in the organization and how will you use your network administrator skills and knowledge in assigning IPs to each user?
How to calculate the ph of the solution for acetic acid : A flask containing 36.8 mL of 0.138 M sodium acetate (NaC2H3O2) is titrated with 24.9 mL of 0.128 M HNO3. Calculate the pH of the solution. pKa for acetic acid = 4.757.
New system for merchants to accept electronic payments : Recently Apple Inc. announced a new system for merchants to accept electronic payments (credit and debit cards). Almost immediately several large corporations announced that they would not accept the Apple system. Please give us an update on t..
Obtain the charge on the outer surface of the outer shell : A thin, metallic, spherical shell of radius a = 7.0 cm has a charge qa = 2.00×10-6 C. What is the charge on the outer surface of the outer shell
Mitosis are able to shrink or eliminate tumors : In any given time the amount of cells undergoing mitosis, even in the cancer cells, are not more than 5% of the total cells. Why do you think that drugs that interferes with mitosis are able to shrink or eliminate tumors?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Virtualization software and operating systems

Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.

  Your company has assigned you the task

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Summarize the primary vulnerabilities and potential threats

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Build on the systems development selected in week 2 and

build on the systems development selected in week 2 and design 1 to 2 user interfaces. explain how the user interface

  Outline a plan for the growth of an addressing and naming

outline a plan for the development of an addressing and naming model in an environment of the following scenarioten 10

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd