Verified Document

IP Address Term Paper

Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information.

The company's computer network will not connect to the internet with this local network connection. Likewise, computers out of the network will be unable to connect directly to a device with a private IP. This is will adequately solve the issue of lack of IP addresses in a public network such as the internet as well as provide the company the flexibility of creating enough IP addresses. According to Cisco Systems (2004),there are numerous networks that exist alongside public ones and it is not just practical to use any IP...

Therefore, RFC 1918 sets 3 IP addresses blocks specifically for private use: in class A range, between 10.0.0.0 to 10.255.255.255 RFC 1918 internal address range, in class B range, RFC 1918 internal address range between 172.16.0.0 to 172.31.255.255 and in class C range, RFC 1918 internal address range between 192.168.0.0 to 192.168.255.255. These are not included in the internet connectivity and are immediately discarded as private addresses by internet routers.
The company will benefit from private addressing in a number of ways including, variety of access technologies, confidentiality and security from the public network, a more cost effective than router-based VPNs, ease in addition of backup circuits and provision of quality VoIP circuits as well as fast connectivity.

IPv6 Addresses

The other solution for the company would be to adopt IPv6…

Sources used in this document:
References

Cisco Systems. (2004, August 27). CCNP 1: Advanced IP Addressing Management. Retrieved August 31, 2012, from www.ciscopress.com.

IPv6 Now Pty Ltd. . (2007 ). Fundamental Benefits of IPv6. Retrieved August 31, 2012, from www.ipv6now.com.au.

Network Working Group. (1995, December). IPv6 Address Allocation Management. Retrieved August 31, 2012, from www.ietf.org.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ip Address and Security
Words: 3513 Length: 16 Document Type: Essay

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

TCP IP Protocol
Words: 1088 Length: 3 Document Type: Term Paper

TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts

Ip Man The Grandmaster and Women in Kung Fu
Words: 4082 Length: 13 Document Type: Essay

Grandmaster and Gong Er: Wong Kar Wai's Ip Man and the Women of Kung Fu Wong Kar Wai's Grandmaster begins with a stylish kung fu action sequence set in the rain. Ip Man battles a dozen or so no-names before doing a one-on-one show with another combatant who appears to be at equal skill and strength. Ip Man handily defeats him and walks away unscathed. Thanks to fight choreography by Chinese

Voice Over IP VOIP Security
Words: 1789 Length: 4 Document Type: Term Paper

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

China IP China's Intellectual Property Rights Protections
Words: 1981 Length: 7 Document Type: Essay

China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now