This website uses cookies to ensure you have the best experience. Learn more

Network Implementation Essay

2004 words - 9 pages

| | | | |

| | | | |

Network Implementation Plan
Network Implementation Plan

Table of Contents
Implementing IPv6 3
Great Clips: Implementing a Network Plan
Configuring IPv6 on a Juniper Router
Network Infrastructure Design 6
Installing Ubuntu on Virtual Box
Linux Networking 9
Linux Network Commands
Analyzing Network Traffic 14
Network Sniffer Applications: Compare and Contrast
Installing Wireshark: Running a TCP Packet Trace
Network Security 16
Access Control Lists (ACL)
ACL Command Examples
To configure an ACL on a router
To configure an ACL on a switch
References 18

Implementing IPv6
Great Clips: Implementing a Network Plan

Great ...view middle of the document...

Link-State routing protocols govern how information is passed between routers by determining the best paths of available connections. Routing protocols in this category include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). OSPF will govern that data will follow the shortest, the most cost-effective and reliable path. This protocol is typically used on large networks and can be grouped logically into areas. ISIS is not as popular as OSPF but is typically implemented in large scale networks such as ISPs.

Configuring IPv6 on a Juniper Router

You configure IPv6 on a Juniper Network router much like you do with IPv4. For router interfaces to support IPv6, they must be configured to specific properties, types and addresses. Interface family type inet6 and logical interface protocol families must be configured as well. Below is an example of the steps to configure IPv6 on a Juniper Network.

2001:db8::1/128 2001:db8::5/128

A E
2001:db8:0:1::/64

Log into your device running Junos OS and the CLI

Step 1: Enter configuration mode
Upon logging in, you will be in operation mode: “user@host>”
You must get into configuration mode by enter “configure”  “user@host> configure”
This changes to “user@host#” when place in configuration mode.

Step 2: Edit interfaces
“[edit interfaces ]
Fe-1/2/0 unit 1 description to –E
Fe1/2/0 unit 1 family inet6 address
2001:db8:0:1:2a0:a502:0:1da/64
Unit 1 family inet6 address 2001:db8::1/128 primary
2001:db7::2/128
2001:db87::3/128
Device A
[edit routing-options]
Set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces]
user@host# commit
Device E
Fe-1/2/0 unit 25 description to –A
Fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
2001:db8::5/128
[edit routing-options]
Set routing-options rib inet6.0 static route ::/0 next-hop
2001:db8:0:1:2a0:a502:0:1da
[edit]
user@host# commit” (Configuring IPv6 Static Routes, 2012)

Network Infrastructure Design
Installing Ubuntu on Virtual Box

Linux Networking
Linux Network Commands

The ifconfig command is a system admin tool used for network interface configuration. Using this command, a report is generated listing all running and recognized network interfaces on the system. Also listed are configurations such as IP addresses, net masks, broadcast addresses, gateway and the status of the loopback.
The ifconfig command can be used to troubleshoot networking issues by allowing a view of all network settings, all network interfaces, enabling and disabling network interfaces, assigning IP addresses and net masks among other capabilities.
Examples:
ifconfig –a: displays all information for active and inactive interfaces on the network
ifconfig eth0 netmask : allows admin to define a net mask for a specific interface
ifconfig eth0 broadcast: allows admin to set certain broadcast address for a specific...

Other Papers Like Network Implementation

History Of Ipv4 Essay

518 words - 3 pages network layer. IPv4 is the most widely used protocol right now. The first IPv6 related network code was added to the Linux kernel 2.1.8 in November 1996 by Pedro Roque. Because of lack of manpower, the IPv6 implementation in the kernel was unable to follow the discussed drafts or newly released RFCs. In October 2000, a project was started in Japan, called USAGI, whose aim was to implement all missing or outdated IPv6 support in Linux. IPv4 has

Integrated Distribuitors Integrated Essay

3341 words - 14 pages infrastructure components have to be identified, replaced, and upgraded, and network reliability improved through the implementation of greater redundancy •Digital modems should replace the analog modems, improving reliability and connection speed •Wireless network standards need to be developed and implemented, and wireless access needs to be provided to several other locations •A new central directory needs to be created and developed as the

Paper

632 words - 3 pages it needs to dramatically enhance its accounting function so that it can continue to function effectively. This correspondence outlines the complete scope of work you requested, including objectives, procedures, identification of responsibilities, and estimated fees. OBJECTIVE Implement the Model 60 accounting system on the network. Install the Model 60 software, including implementation and setup, training, conversion assistance, and post

Management Information System

2473 words - 10 pages Ch.6 Telecommunications, the internet and wireless technologies Components of a simple network: • NIC (Network Interface Card): to incorporate any laptop to an existing network. • NOS (Network Operating System): to share network resources & route communications on a LAN. • Hubs & switches help route traffic on a network to the right computing device. • Router: when 2 or more networks are connected to each other, it sends data transmissions

Computer Security

1909 words - 8 pages of this process is not to place the hardware issues above the logical design structure; instead, the physical design should seek to work within the parameters established by the logical design whenever possible. Both the logical and physical design processes are critical to successful network implementation and should be considered when designing a home network which will save significant time and money in the long run. Now that we have

Disaster Recovery Management Com-540-Mbol1

2456 words - 10 pages network traffic to detect events 2. Wireless – Monitors wireless traffic for suspicious activity 3. Network Behavior Analysis (NBA) – Monitors network traffic looking for unusual traffic patterns 4. Host-Based – monitors host looking for unusual host files or activity Following the NIST 800-94 headings order, this report will examine and discuss each section as it relates to IDPS solution selection and implementation. Intrusion

Health Care Information

9718 words - 39 pages team will likely need at least one IT professional with technical database and network administration expertise. This person may have had some role in the selection process but is now being called on to assume a larger role in installing the software, setting up the data tables, and customizing the network infrastructure to adequately support the system and the organization’s needs. The implementation team should also include at least one system

Tran America

1077 words - 5 pages management and IT staff need b to understand the importance of establishing their requirements prior to system development. Once the design process begins, no changes can be made. Development Implementation Maintenance and Support The new network is now complete and is fully functional. At this point it is important to ensure the new system is working the way it was designed and needs are being met. Routine maintenance will be

Is3230

1016 words - 5 pages information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators. Scenario You are provided with

Automate Inventory System

1331 words - 6 pages confirming the store inventory and for correcting stock quantities. 2. System Requirements The Inventory Management System uses a web-based interface to display inventory data to the stock manager client. The product will use of open-source software primarily due to cost of implementation. A JSP (JavaServer Pages) servlet will be hosted by an Apache Tomcat web server (on top of any choice of operating system, although a flavor of Unix

Icp Dss

524 words - 3 pages : firewall: this provide a layer of security between my network environment and the internet by managing the flow of inbound and outbound flow of information to the host , uses different security postures based on the requirements of the business , unwanted traffic is eliminated also mention a web application firewall that inspect the web traffic in real time and blocks many attacks Antivirus: its critical necessary to have an antivirus that

Related Essays

Electronics Essay

406 words - 2 pages info (user naming schemes, groups, OU’s, policies , profiles, data storage, network usage, quotas, etc.) 4. Software implementation methods (how are systems installed and updated?) 5. Finally I want you to ask what works well and what does not and then contemplated the network design. If you were to be hired as a consultant for the school and could suggest possible improvements (not going to crazy) what would they be and why. Support

New Job Rmon Research Essay

1242 words - 5 pages information from network devices, which can be used for fault diagnosis, performance tuning, and network planning One disadvantage of this system is that remote devices shoulder more of the management burden, and require more resources to do so. Some devices balance this trade-off by implementing only a subset of the RMON MIB groups (see below). A minimal RMON agent implementation could support only statistics, history, alarm, and event.

Ntc/362 Fundamentals Of Networking Team Paper

3457 words - 14 pages devices it supports. * WAN The RAS will allow for the implementation of connecting the three local hospitals to Patton- Fuller. The desired speed for two-way communication is 20 Mbps. The Synchronous Optical NETwork (SONET) is a fiber optic network technology that meets this desire. This configuration will also allow radiologists and doctors to communicate from their homes. The RAS server is currently connected to the backbone Base-T

Information Technology Acts Essay

438 words - 2 pages be lawfully sued by consumers as well as the State being able to initiate a civil action lawsuit against any companies that break these laws. The TCPA in conjunction with the Do-Not-Call Implementation Act are greatly beneficial and necessary for consumers because if it were not for them each one of we would be littered with solicitation calls day in and day out. References Do not call implementation act law and legal definition. (2013). Retrieved from http://definitions.uslegal.com/d/do-not-call-implementation-act/ Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.