IP Address Term Paper

Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information.

The company's computer network will not connect to the internet with this local network connection. Likewise, computers out of the network will be unable to connect directly to a device with a private IP. This is will adequately solve the issue of lack of IP addresses in a public network such as the internet as well as provide the company the flexibility of creating enough IP addresses. According to Cisco Systems (2004),there are numerous networks that exist alongside public ones and it is not just practical to use any IP...

...

Therefore, RFC 1918 sets 3 IP addresses blocks specifically for private use: in class A range, between 10.0.0.0 to 10.255.255.255 RFC 1918 internal address range, in class B range, RFC 1918 internal address range between 172.16.0.0 to 172.31.255.255 and in class C range, RFC 1918 internal address range between 192.168.0.0 to 192.168.255.255. These are not included in the internet connectivity and are immediately discarded as private addresses by internet routers.
The company will benefit from private addressing in a number of ways including, variety of access technologies, confidentiality and security from the public network, a more cost effective than router-based VPNs, ease in addition of backup circuits and provision of quality VoIP circuits as well as fast connectivity.

IPv6 Addresses

The other solution for the company would be to adopt IPv6…

Sources Used in Documents:

References

Cisco Systems. (2004, August 27). CCNP 1: Advanced IP Addressing Management. Retrieved August 31, 2012, from www.ciscopress.com.

IPv6 Now Pty Ltd. . (2007 ). Fundamental Benefits of IPv6. Retrieved August 31, 2012, from www.ipv6now.com.au.

Network Working Group. (1995, December). IPv6 Address Allocation Management. Retrieved August 31, 2012, from www.ietf.org.


Cite this Document:

"IP Address" (2012, August 31) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/ip-address-109238

"IP Address" 31 August 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/ip-address-109238>

"IP Address", 31 August 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/ip-address-109238

Related Documents
Ip Address and Security
PAGES 16 WORDS 3513

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

TCP IP Protocol
PAGES 3 WORDS 1088

TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts

Grandmaster and Gong Er: Wong Kar Wai's Ip Man and the Women of Kung Fu Wong Kar Wai's Grandmaster begins with a stylish kung fu action sequence set in the rain. Ip Man battles a dozen or so no-names before doing a one-on-one show with another combatant who appears to be at equal skill and strength. Ip Man handily defeats him and walks away unscathed. Thanks to fight choreography by Chinese

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with