U1 Discussion - Coursework Example

Comments (0) Cite this document
As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
U1 Discussion
Read TextPreview

Extract of sample "U1 Discussion"

Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its Resolution
As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010). The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from a certain network. The DCHP allows the network administrator to supervise and distribute IP addresses from a central point (Morimoto, Noel, Droubi, Mistry, & Amaris, 2009).
The DHCP server manages a pool of IP addresses about client configuration. The server assigned IP addresses that conflicted with other addresses because, first, in a busy network environment, an offline computer might have been brought online with a lease that it believes has not expired. On the other hand, the DHCP server believes the lease has expired. The server only checks the list of current leases to establish if an address is available and does not question the network to determine if an address is being used by default. As cited by Morimoto et al. (2009), the other cause of the IP addresses conflict may be malfunctioning of the internal components of the DCHP server. This causes them to lose track of which systems are utilizing which addresses. Another cause may be a similarly configured DCHP server is handing out overlapping addresses. Lastly, the two systems might have been assigned identical static address.
Fixing the problem
From the command prompt, enter IPCONFIG /RELEASE and IPCONFIG /RENEW.
The DCHP server needs to check the IP addresses by sending a ping request over the network
The conflict detection is to be set to a value greater than 0.
Since a every device with a static address can cause conflict if that address is already given out by the DCHP, this can be fixed by reducing the number of addresses in the DCHP pool.
Making sure that only one server is running while all others are switched off.
Some of the questions I will ask my coworkers who are familiar with network configuration include
Can the DHCP servers be used in larger networks?
How does the DHCP server check the IP addresses?
What is an IP address conflict?
When does the IP address conflict occur?
How can you resolve the IP address conflict?
Bautts, T., Dawson, T., & Purdy, G. (2010). Linux Network Administrators Guide. New York: OReilly.
Morimoto, R., Noel, M., Droubi, O., Mistry, R., & Amaris, C. (2009). Windows Server 2008 Unleashed. New York: Sams Publishing. Read More
Cite this document
  • APA
  • MLA
(“U1 Discussion Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
U1 Discussion Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from
(U1 Discussion Coursework Example | Topics and Well Written Essays - 250 Words)
U1 Discussion Coursework Example | Topics and Well Written Essays - 250 Words.
“U1 Discussion Coursework Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Northrop Grumman U1

...UNIT BUSINESS APPLICATION ASSIGNMENT goes here] [Your goes here] [Due the paper] Northrop Grumman Corporation Introduction The name of the company that we have selected for review is Northrop Grumman Corporation. Northrop Grumman is an American company that offers defense technologies and cyber security systems to meet the demands of emerging security challenges of the world. “Cyberattacks have become a big concern for companies, and the US and foreign governments” (Maurer, 2012). Northrop Grumman deals with cyber attacks, as well as with four other business sectors that include aerospace systems, electronic systems, information systems, and technical services. I was interested in knowing different defense systems and technologies...
2 Pages(500 words)Essay


...Running Head: MGMT444 U1 IP MGMT444 U1 IP Teacher’s ID Since it is a senior level position, the candi is expected to have an ability of taking initiatives and taking charge of projects and day-to-day tasks. Please tell us how you were performing these tasks in your current job. Also what kind of projects and ideas you have introduced yourself during your career. This question is expected to indicate if the candidate is creative enough to introduce new ideas and take control of situations like a business leader. 2) We need someone who has 360 degree vision of everything going around them as leaving out necessary information means losing productivity and foresight for potential opportunities. Please tell us...
2 Pages(500 words)Research Paper


...Running Head: MGMT442 U1 IP MGMT442 U1 IP Teacher’s ID Q1. During your career, what are your most successful initiatives? Something that you are proud of or can quote as your achievement? The candidate should have experience of setting up a new service department in similar industry. If not, he should exhibit that he has entrepreneurial qualities and can take initiatives. Q2. While taking such initiatives, did you ever-encountered resistance (related to both material and human) and how did you managed it? This question should elaborate the interpersonal skills along with controlling and management skills of the candidate. Q3. Can you give some examples of your achievements as a team player or while...
2 Pages(500 words)Research Paper

MGMT455 U1 IP Theory X & Y

...Research Paper [Pick the Theory X and Theory Y The concept of Theory X and Theory Y was introduced by a Social Psychologist Douglas McGregor and it was published in 1960 in his book “The Human Side of Enterprise. The fundamental idea of McGregor was to explain the behaviors of the individuals and the applied management styles. He introduced two expounded theories, “Theory X and Theory Y”. The Theory X assumes that individuals does not like working, they tend to avoid responsibilities and for that purpose they need to be controlled and supervised on each step of their work otherwise they will not be able to produce the beneficial results. This theory tends to adopt the authoritarian style of management. Whereas, Theory Y assumes... Paper [Pick ...
2 Pages(500 words)Research Paper


...AVON Mission ment Question Avon’s vision and mission is “To be the company that understands and satisfies the products, services and self-fulfillment needs of women-globally” (Avon, 2014). They represent empowering women by offering job opportunities; fighting breast cancer and domestic violence. To achieve a healthy balance between employees’ personal and work life, Avon offers benefits such as service rewards, health care, employee assistant programs, child care vouchers, annual leave entitlement, and flexible work hours to name a few (Avon, 2014). "Avons mission is centered on six-center yearnings the organization consistently strives to attain," starts Avons Mission statement. At that point, it goes on. It weighs in at 249... Mission...
2 Pages(500 words)Research Paper

CIS 206 U1 Discussion

...Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux. Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available...
1 Pages(250 words)Essay

CIS 206 U1 Review Assigment

...Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features. It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and applications (Sobell, 2012). Linux is popular in academia as students can easily understand it. It supports several codes and a rich software development environment. The development of Linux from the time it was UNIX took the effort of universities took the efforts of university and college students to publicize it. Linux also offers more flexible and configuration options... Sciences and...
1 Pages(250 words)Coursework

CIS212 U1 Discussion

...Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts. Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding... Management...
1 Pages(250 words)Essay

CIS212 U1 Review

...Nuclear Plant Password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?(Select all that apply.) The goals are detection, prevention, and recovery 2) What are applicable forms of vulnerabilities? (select all that apply) They include improperly configured software, misuse of communication protocols and damage to Hardware 3) Detail the difference between a threat, vulnerability, and a risk. A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system. Atheotherhandlikelihoodloss... Plant Password Policy...
1 Pages(250 words)Essay

CIS126 U1 Discussion 2 - 1

...The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80’s but became established in other languages like Java and UML in the 90s. The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The progress and acceptability of Object Technology have been growing significantly in the market. In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology. Despite the many benefits that object technology poses, its weaknesses include them being complex legacies that scare its owners. The latter has made timely delivery a complicated process. TDD... Dark Side of Object...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic U1 Discussion for FREE!

Contact Us