Nt1330 Unit 1 Assignment 1

In: Computers and Technology

Submitted By efarnstrom
Words 486
Pages 2
Unit 1 Assignment 1
DNS servers provide domain name resolution for network resources. They associate the TCP/IP address assigned by DHCP to a client with its fully qualified domain name. The association of an IP address to a domain name requires that a change in either the address or the name requires an update of the information in DNS. The DHCP protocol does not do this automatically. To make this more seamless, servers running Windows Server® 2008 and DHCP and clients running DHCP can register with DNS, allowing the two to cooperate (TechNet)
Dynamic Host Configuration Protocol (DHCP) is a protocol that assists in configuring IP addresses, subnet masks, default routers, and other IP parameters to client PCs that don't have a static IP address. These computers locate a DHCP server in their local network that gives them an IP address so they can connect to the internet or other computers within the local network. (dhcp server) There are four way to allocate dynamic IP addresses: automatic, dynamic, roaming, and manual. Three of these (dynamic, roaming, and manual) use DHCP to assign the IP addresses. (DHCP Servers)
There are a number of downsides to administering IP addresses statically. Foremost is human error. If the administrator mistypes the IP address or subnet mask, the workstation may not have connectivity to the resources it requires. If the DNS or WINS server IP addresses are mistyped, the workstation will not be able to perform name resolution. If the default gateway is incorrect, the workstation will not be able to connect to remote subnets and resources. (DHCP Servers) All of the aforementioned problems of statically maintaining IP addresses lend credence to the argument of using a DHCP server regardless of the number of hosts that are supported on the LAN.
In my opinion, it would be preferable to use DHCP for all client devices and maintain static…...

Similar Documents

Unit 1 Assignment 1

...Unit 1 Assignment 1 1. Describe the role of software for computers: Computer software tells the hardware what to do. Without any software, the hardware would be worthless. Think of the software as a subject in school, and the hardware as you or your brain. Without any learning, you can't do anything. One you have learned some math, and then you are able to solve math problems. This learning is usually accomplished through downloads or CD's that are loaded into the computer. At the very basic level, computer software contains specific instructions for how to accomplish a specific task. These instructions tell the hardware exactly what to do, and how to do it 2. Identify the hardware associate with a computer: the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. Here are some common individual computer hardware components that you'll often find inside a modern computer case: Motherboard, Central Processing Unit (CPU), Random Access Memory (RAM), Power Supply Video Card, Hard Drive (HDD), Solid-State Drive (SSD), Optical Drive (e.g. BD/DVD/CD drive) Card Reader (SD/SDHC, CF), etc. Here is some common hardware that you might find connected to the outside of a computer: Monitor, Keyboard, and Mouse 3. Describe how computer store data: it converts the request into binary digits and its stores the data in a database. As a table format. The binary data can......

Words: 324 - Pages: 2

Unit 1 Assignment 1

...Unit 1: Assignment 1 1) At its simplest, a database can be seen as a collection of related data. 2) A delimited file is a file where the length of the file is limited. 3) A delimited file is one in which the data is separated by a character such as a comma. 4) All fixed length files are of the same length. 5) In relational databases, logical design is kept separate from physical design. 6) A hierarchical database is designed with a tree-like structure that resembles a file system. 7) Codd defined the core principles of a relational database in 1970. 8) Data redundancy improves the integrity of a database. 9) In a diagram, crows feet notation conveys more information about the relationships. 10) A primary key uniquely identifies each row in a database table. 11) In a relational database, all data is kept in tables, even the information about the tables. 12) SQL is the language used by relational databases to create objects and to manipulate and retrieve data. 13) An entity is someone who is interested in the database. 14) In a statement of scope, a constraint is a limit on what the database will do. 15) Oracle is a popular relational database management system. 16) A relational database management system does not include tools for backing up and restoring databases. 17) Documentation is not an important part of database development. 18) In a statement of work, the......

Words: 363 - Pages: 2

Nt1330 Unit 1 Assignment 1

...would likely become unrealistic to resolve names and IP addresses manually because of the fact that it would take far too much time. You should also keep in mind that if you have a DHCP or DNS server or any servers in general then you are going to have to keep it on at all times otherwise your users will be unable to connect to the internet because they will not have an IP address. Or if they are able connect to the internet then they will have errors when they type in the web address then they will not be able to fix them. As far as the IT-management overhead when referring to DHCP or DNS you should also keep in mind the facts stated previously. First of all it can be very cost ineffective if you try to run a DNS or DHCP server for just 1 or 2 PC’s. The reason for this is that servers require much more to operate and maintain than your standard PC also you will have to train somebody within the company to understand how servers work and operate or hire someone new who knows possess these skills....

Words: 334 - Pages: 2

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | ......

Words: 427 - Pages: 2

Nt1330 Unit 1 Assignment 1

...EN1330 Client-Server Networking 2 Unit 1. Assignment 1 9/25/2014 A Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resources connected to the internet or a private network. It associates various information with domain names assigned to each of the participating entitles. It translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The best way that I have been able to explain it, it works like a phone book for the internet by translating hostnames into IP addresses. But unlike a phone book, the DNS can easily be updated and quickly. The internet maintains two principal namespaces, the domain name hierarchy and the Internet Protocol address spaces. A DNS name server is a server that stores the DNS records for a domain name, such as (A or AAA) records, name server records, and mail exchanger records. A DNS name server responds with answers to queries against its database. The Dynamic Host Configuration Protocol is a Standardized networking protocol used in Internet Protocol networks for dynamically distributing network configuration parameters, such as IP addresses for interface and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually. DHCP is used by computers for requesting......

Words: 323 - Pages: 2

Nt1330-Unit 2 Exercise 1

...NT1330-Unit 2 Exercise 1 DNS Scenario Dear junior IT, Thank you for contacting me regarding your questions, and trust that I will do my best to help you. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated DNS server. You also have some question of what type DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting perhaps five user/workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but do you need a DNS server at all. If there is a very high level of file/data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI. However, if there is not enough file/data sharing to really warrant the presence of the server, an ADI server could potentially slow down an already sluggish system. Now let’s move on to the second, much larger branch supporting around thirty users. You stated that this branch has a much better network connectivity than its smaller counterpart. In this case, I would recommend a DNS server set up in the primary zone. The primary zone is the primary source of information within this zone. I would also further suggest moving your servers from the smaller branch to your larger branch. All files from the smaller branch could be accessed via a “VPN” remote link. This would......

Words: 287 - Pages: 2

Nt1330 Unit 4 Assignment 1

...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and......

Words: 580 - Pages: 3

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a......

Words: 532 - Pages: 3

Nt1330 Unit 1 Assignment 1

...NT1330 Mr. Ajero Assignment 1 September 14, 2015 DNS – Domain Name System DNS is a hierarchical representation of all the IT devices and their sub-domains in a (company) network. So, in case you see an address like mail.subdomain.company.com, you can easily recognize the name of the system (mail), name of the sub-domain (sub-domain), name of the company (company) and the name of the primary domain (.com). DHCP – Dynamic Host Control Protocol A DHCP server automatically assigns the IP addresses for a device. Any device, before communicating with any other device in the network needs an IP address. These IP addresses are given to the network devices dynamically by a DHCP server (IP addresses ought to be within a certain range and the range is already specified). The IP addresses assigned this way are not permanent – they are actually leased for a certain amount of time to the devices (till they log-out of the network, for example). I believe that two hosts should be sufficient. Using a DHCP Relay Agent would greatly reduce the time necessary for me to set up the name allocation and resolution. If I were to do this manually on a static IP Address, I would have to put a stop to it at 25 machines as it would waste valuable time with trying to get to the other pieces of equipment my client owns. Regardless of if I was getting paid by the hour, I would need extra time for future maintenance and upgrades References DNS and DCHP......

Words: 276 - Pages: 2

Nt1330 Unit 4 Assignment 1 Windows Network Services

...NT1330: Assignment 1: Windows 2008 Network Services In order for computers, printers, etc. to communicate with each other on a network, each must have a different IP address. To make remembering these easier, the Domain Name System (DNS) translates these numeric IP addresses into names and web addresses that humans can actually decipher and remember. Instead of remembering one of the five numeric IP addresses to find facebook.com, you type in the address as facebook.com and DNS will go find the page you are looking for. DNS is most commonly used for internet purposes, but private networks use DNS for other reasons as well. It works throughout multiple computers or databases. It can handle many types of name resolution requirements. With DNS the host name will stay the same even though the numerical IP address may be changing. With all of the ways that DNS makes our lives easier in regards to networking, be that private networking or the internet, the overhead and IT management aspect of DNS are well worth it. I can’t imagine the headache of not having it in place. DHCP (Dynamic Host Configuration Protocol) assigns IP addresses on the network. It provides the default gateway, subnet mask, and the DNS. Instead of IT administrators having to manually hand out static IP addresses and keeping track of all of them, DHCP takes care of it for them. Along with assigning them, DHCP will take back the IP address when it is no longer in use and reassign it when it is available. With......

Words: 314 - Pages: 2

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 1 DHCP troubleshooting Hello Junior Administrator, Let me clarify your parameters and intent… You have stated that you were tasked with changing the DHCP scope to match you IP addressing scheme. The IP address range you are using is 192.168.0.200 through 192.168.0.225. I have come up with a couple solutions and approaches to help you with your problem. First of all make sure you have typed all your numbers correctly. At times, a simple number incorrectly typed can throw the entire scheme off. Perform the same check for your subnet inputs as any slight number mistype will negate everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there is connectivity between your user machines and the network. Make sure your network interface cards are all up to date and functioning. The other approach I will suggest can be involved if you’re not used to working with your command prompt however it’s doable with a detailed memo to your employees. I would have them release their IP addresses and renew them to through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If you still encounter issues, please feel free to contact me and we can walk......

Words: 265 - Pages: 2

Nt1330 Assignment 1

... NT1330 Assignment 1: Introduction to Windows 2008 Network Services 1.) The Domain Name System consists of a hierarchical set of DNS servers. Each domain or subdomain has one or more authoritative DNS servers that publish information about that domain and the nameservers of any domains "beneath" it. The hierarchy of authoritative DNS servers matches the hierarchy of domains. At the top of the hierarchy stand the root nameservers: the servers to query when looking up (resolving) a top-level domain name (TLD) Features • Scalability—Because DNS is capable of distributing workload across several databases or computers, it can scale to handle any level of name resolution required. • Constancy—Host names remain constant even when associated IP addresses change, which makes locating network resources much easier. • Ease of Use—Users access computers using easy-to-remember names such as www. microsoft.com rather than a numerical IP address, such as 192.168.1.100. • Simplicity—Users need to learn only one naming convention to find resources on either the Internet or an intranet. 2.) DHCP stands for Dynamic Host Configuration Protocol. As the name suggests, DHCP is used to control the network configuration of a host through a remote server. DHCP functionality comes installed as a default feature in most of the contemporary operating systems. DHCP is an excellent alternative to the time-consuming manual configuration of network settings on a host or a network device. Features · DHCP......

Words: 1542 - Pages: 7

Moto Accessori & Ricambi | Kurogane Communication | Watch movie