28 Sep 2022

96

Implementing and Maintaining a Network Infrastructure

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 739

Pages: 3

Downloads: 0

IP addresses have been categorized to be used differently in networks. Some IP addresses can be accessed publicly over the internet such as in classes of A, B and C. Some classes of IP addresses have been reserved by the Internet Engineering task Force and the Internet Assigned Numbers Authority for special purposes. These IP addresses are used for the multicasting of data that is identical on all the computer networks or subnets or for research purposes such as it is for the case of classes D and E. An IP address makes it possible for devices to connect to the internet and an addressing scheme is needed. Today, the world is currently experiencing a shortage in the IPv4 addresses to be used as they are just 4.3 billion with 32-bit numbers. The factors that are contributing to the exhaustion of IPv4 addresses is that they have not been put to efficient use. Large companies back in the 1980s were given millions if IP addresses that remain unused up to date and this is causing the exhaustion in 32-bit IP addresses. 

Next technologies has branches in 3 countries and its head office is based Nairobi. The best IP address scheme to deploy on the company’s network is Class A whose addressing scheme can have 126 networks which translates to 16, 777, 214 hosts. In Nairobi alone, the company is estimated to have more than 5oo people in its head office. IPv6 is the next big thing and it is going to revolutionize IP addressing schemes. Currently IPv6 improves on the inefficiencies that have been brought about by IPv4 by bringing onboard 128-bit IP addresses. IPv6 brings on board better packet handling, support for peer-to-peer networking and better routing functionalities. The network infrastructure of Next Technologies will support both IPv4 and IPv6 IP addressing schemes. This is because, not many ISPs support the IPv6 addressing scheme. This will allow a smooth transition for Next Technologies from IPv4 to IPv6 to avoid running into a number of problems such a such as loss of internet connectivity and not being able compete or communicate with organizations whose systems have been configured for IPv6. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Next Technologies aims to provide solutions and services to both large and medium enterprises. The company will provide different services to different organizations and they will require to have dedicated or shared network resources. The following resources will be of the utmost importance to the company’s customers and users: 

Proxy Servers 

Mail Servers 

Other Servers (FTP, Real-time communication, Collaboration, Print, Domain, Database, File, Telnet and Virtual Servers). 

Next Technologies will support both internal and external users on their network and they will include: 

Clients (small, medium and large enterprises) 

Database engineers 

Network engineers. 

Application / Web Developers 

Customer Service agents (Level 1/2/3) 

Normal system users such as clerks and users from different departments such as finance, HR and the top management. 

IP address range to be used on the Network by Next Technologies: 

Address Scheme: 10.50.120.7 

Netmask: 255.0.0.0 =8 

Network: 10.0.0.0/8 

Broadcast: 10.255.255.255 

The planned system will consist of several routers and a DHCP server that will be responsible for issuing out IP addresses. All IP addresses on the network are going to be leased for a period of 24 hours and the hosts on the network will be assigned new IP addresses based on their availability. To access the network, the company will encourage the use of a Virtual Private Network in order to protect all the IP addresses that are in use by the company. This is to make it possible for encryption of data and proxy tunneling thus making it safer for online purposes. Windows registry is one of the important tools in the Windows operating system and if it is not functioning properly then system performance will be affected, or one may not be able to use the computer at all. System administrators can take charge of the IP addresses by removing static addresses that are not in use by editing the windows registry. Computers on the network are to be registered by an authorized network address and a registered network card. If this does not happen, these computers will be blocked from accessing the network. The system administrator will responsible for making amendments in such cases. All unused IP addresses will be stored for future hosts that will be added on the network. Using Zabbix an open source operating system that will deployed to monitor the entire network. All blocked and unused IP addresses will be placed under will reviewed by both the network and system administrators in order to make sure that they follow the organizations policies. In addition, IP address management software will be provisioned to help in the management of IP addresses and DNS records. Functionalities will include the automatic assignment of IP addresses, IP scanning and DNS/DHCP management for both forwarding and pointing traffic, DHCP failover, the scanning an polling of multiple subnets 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Implementing and Maintaining a Network Infrastructure.
https://studybounty.com/implementing-and-maintaining-a-network-infrastructure-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration