StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Configurations - Essay Example

Cite this document
Summary
A Virtual LANs otherwise known as a VLANs which are usually defined within switches, are broadcast domain that control broadcast, multicast, and unicast within a device in layer 2. They are placed on specific ports to restrict access. One VLAN cannot communicate with the other…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Network Configurations
Read Text Preview

Extract of sample "Network Configurations"

Standardized Configurations across the Network Replace with DeVry NETW206: Introduction to Switching Submitted Your professor’s nameDate: Current dateStandardized configurations across the networkA Virtual LANs otherwise known as a VLANs which are usually defined within switches, are broadcast domain that control broadcast, multicast, and unicast within a device in layer 2. They are placed on specific ports to restrict access. One VLAN cannot communicate with the other. For them to communicate, a router needs to be installed.

A VLAN is important in that it addresses issues of security by restricting access to the sensitive information, it eliminates the need of purchasing additional expensive network equipment, and it also increase the performance of the network by supporting multiple broadcast domain, hence reduces the issues of traffic.The VLANs are going to be defined in our Cisco catalyst 4300-X series switch in the VLAN Trunking Protocal (VTP). After the creation of the VLANs, there is the creation of ports. The VLANs are created using numbers and the numbers are in two ranges for the creation, that is:1-1000 For the Normal Range1025-4096 For the Extended Range,To configure VLAN, the following steps are to be followed:Configuration of the VTP- VTP is a procedure that enables the Cisco switches to maintain the consistency of the database for the purpose of trunking.

It facilitates easier administration of the VLANs.Then we create the VLANs- As stated earlier, VLANs are created using numbers. The extended VLANs are presently supported on the switches that run on the COS software edition 6.1 or greater.The creation of the solution template helps in the design of a standard modular network solutions. This solution template handles the issue of all non−standard, non device−specific configuration , for instance VLAN configuration, routing protocols, spanning tree parameters, among others (Lammle, 2011).

For achieveing standard hostname, a naming system should be used, e.g the Network Information Systems, Domain Name System, among others. There are three privileges levels in a router:privilege level 1 which is for the non-privileged (prompt is router>), the default level for logging inprivilege level 15 which is for the privileged (prompt is router#), the level after going into enable modeprivilege level 0 which is seldom used, but includes 5 commands: disable, enable, exit, help, and logout.

These privileges are assigned with the TACACS+ and the RADIUS servers.The Secure Shell otherwise known as SSH is a secure network protocol for the Cisco devices compared to telnet. Our Cisco switch can be setup to access the SSH by following the steps below:First we configure the hostname command,Configure the DNS domain,Generate the SSH key to be used,Enable SSH transport support for the virtual type terminal (vtys).Ideally, authentication protocols like the RADIUS, LDAP, TACACS+, among others provide a means to verify a legitimate user.

These protocols are used to prevent those that are not supposed to access the out-of-band management ports. IP address filtering and authentication can also be employed. One can also opt to use Password Manager Pro which provides a centralized repository for that stores alt of passwords securely and facilitates easy administration (Ohio, 2011). ReferencesLammle, T. (2011). CCNA: Cisco Certified Network Associate study guide (Exam 640-802). Indianapolis, Ind: Wiley Pub.Ohio. (2011). LAN/WAN access and distribution layer switches.

Columbus: Enterprise IT Architecture & Policy, Investment and Governance Division.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Configurations Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved de https://studentshare.org/design-technology/1622624-network-configurations
(Network Configurations Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/design-technology/1622624-network-configurations.
“Network Configurations Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/design-technology/1622624-network-configurations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Configurations

Computer Technology and the Networked Organization

The Network Configurations used by organizations commonly include peer-to-peer or the client/server frameworks (Bakardjieva, n.... Computer Technology And The Networked Organization (Case) Introduction Computer network is an interrelated assemblage of devices that allows storing, recovering, and sharing of data.... hellip; Conceptually, such network comprises a collection of computers, printers and other equipments that are connected together to result in smooth communication (Bakardjieva, n....
4 Pages (1000 words) Essay

Computer Center

The author presents the answers to the simulation exam questions by configuring the simulations and presenting the results herewith.... Post the simulations and results analysis, the author presents an analogy of this computer center model with the news room model with modifications recommended herewith. … The model has three inputs (Input 1, Input 2 and Input 3) connected to three job readers (CR1, CR2 and CR3) that collectively feed the job to a central print spooler (CPU) that takes the jobs from the readers and feeds into the line printers (LP1, LP2 and LP3) and the output of line printers are collated at Dispose 2. Figure 2 shows the configuration of Input 1....
16 Pages (4000 words) Case Study

WAN intranet

This paper intends to give a general narrative regarding how to design WAN or intranet for an organization that has various remote locations that have high traffic requirements, a web business, use web meetings (multicast) to cut travel costs and a centralized database that all… An intranet is an information system implemented within an organization that makes use of internet technologies to share resources (like printers) communicate, access and transfer information in a much faster and improved approach Companies with remote locations have started preferring using intranet instead of conventional Network Configurations because it is easier navigating the intranet than a Local Area Network (LAN)....
4 Pages (1000 words) Research Paper

Enterprise Resource Planning System

The main objective of ERP systems is to ensure upward and downward flow of management information within the boundaries of the organization The fascinating feature of an ERP system is that it will support a variety of hardware and Network Configurations by employing a database for effectively accessing information....
4 Pages (1000 words) Assignment

Computer Technology and the Networked Organization

The reason why I will use TCP/IP in my company because it is compatible with various types of computer hardware and Network Configurations.... Under the architecture the configurations of the company peer to peer networking architecture will be put in place.... relationship advices,… If a customer calls he is directly forwarded to the trained personnel of the intended topic for discussion My network topology will be of star topology because it enables control of This helps one monitor the network properly....
2 Pages (500 words) Essay

Current Business Process Summary

On the general idea of the logical Network Configurations, it is revealed that the hospital utilizes 1000 BaseT applying CAT6 cable to link the administrative operations such as the hospital human resource management, executive management, facilities, operations, IT, finance, and data center.... Patton-Fuller Community Hospital is a health facility that is focused on surgery, pharmacy, emergency medical care physical therapy, labor… The hospital has been in existence for more than three decades and need to enhance and incorporate the business with current network system....
2 Pages (500 words) Essay

Building Engineering Services

hellip; A radial network leaves the station and passes through the network area with no normal connection to any other supply.... An interconnected network is generally found in more urban areas and will have multiple connections to other points of supply....
5 Pages (1250 words) Assignment

Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring

… The paper “Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring” is a  meaningful variant of assignment on information technology.... Information security is the aspect of keeping and protecting information from unauthorized access, presentation, modification, and even destruction, which would attribute to huge losses mostly in organizations....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us