Free

Wk 5d1 - Essay Example

Comments (0) Cite this document
Summary
IP addressing design is important in assigning of addresses. Both private and public networks are considered in the design of IP addresses and are an integral part. Both…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Wk 5d1
Read TextPreview

Extract of sample "Wk 5d1"

Private and public addresses in IP addressing design IP (Internet Protocol) addresses are majorly ified into two, ly private and public addresses. IP addressing design is important in assigning of addresses. Both private and public networks are considered in the design of IP addresses and are an integral part. Both private and public addresses are unique in their application in IP addressing and have their ideal spaces in which they may be used.
An IP address is termed as private if its IP number is in the range of IP addresses which are reserved for private networks like LAN - local area network. Private IP addressing helps improve the networks security, besides conserving public address space. Private IP addressing is used for connecting client computers on a private network, for example in institutions. This addressing method allows for easier communication between network computers. Private networks allow the network administrator to arbitrary assign a local machine an IP address of his choice, if it falls within the range of private networks shown above. This is quite different from public networks. The nature of private networks restricts access to the private network. However, it is possible to connect two private networks by use of a device which allows Network Address Translation (NAT), for instance a router.
A public IP address, on the other hand is allocated to each machine which connects to the internet where all IPs are unique. Therefore, it is not possible to have two computers sharing a public IP address on the internet. Public addressing enables multiple computers to connect over the internet and share information. Public IPs is assigned to each computer by the ISP when a computer connects to the gateway and so the user of the computer cannot change the public IP address assigned to his computer. A computer accessing the internet from a private network has both private and public IP addresses. In essence, it can be said that private IP is for communicating within the network while public IP is applied for internet communication.
References:
Feilner, M. (2006). Open VPN building and operating virtual private networks. Birmingham, U.K.: Packt.
Minoli, D. (2003). Hotspot networks Wi-Fi for public access locations. New York: McGraw-Hill.
Olifer, N., & Olifer, V. (2010). Computer networks: principles, technologies, and protocols for network design (3rd ed.). Chichester, England: John Wiley & Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wk 5d1 Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Wk 5d1 Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1658883-wk-5d1
(Wk 5d1 Essay Example | Topics and Well Written Essays - 250 Words)
Wk 5d1 Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1658883-wk-5d1.
“Wk 5d1 Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1658883-wk-5d1.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Wk 5d1

Cog wk 8

...?Assignment 4 The example of a child playing house displaying private speech and hence the programming of verbal command into cognition depending on action reminds me of another example of my own. There are numerous times that I can recall my siblings having tea parties with dolls and carrying out actions along with verbally commands. Like “pour the tea, put cookies on the table, get sugar from the pot” etc. Hence I can understand the strong relationship between language and cognition that private speech creates. As for the example for social and cultural factors contributing towards errors in communication I could not help but agree more when you look at the differences in the way people are addressed in different cultures. When... 4 The...
4 Pages(1000 words)Essay

Res wk 8

...?Assignment 3 Write a of what you believe to be the heart of the debate regarding the paradigms (the use of quantitative vs. qualitative research). Then state on which side of the debate you stand, and support your position. The heart of the debate regarding the use of quantitative and qualitative research was to distinguish between the different forms of research and to take a detailed look at what each of them entails. After viewing the video program "Roundtable: Research Design” I realized that each form of research is flexible and there are no stringent rules that restrict the researchers from going with a certain type of research. Depending on the study being conducted and the other situational elements a researcher can pick... 3 Write a ...
4 Pages(1000 words)Essay

Wk 10 (61)

...Week 10 (61) The Council for Accreditation of Counseling and Related Education Programs (CACREP) is the national credentialing body for several typesof counseling programs including Masters and doctoral degreed programs regardless of the "type" of counseling program. They are the program that creates the credentialing for these programs which means they have specific standards that they must meet (CACREP Website). Another part of their mission is to make sure that counselors have professional competence in what they do and they want to advance the profession. The National Board for Certified Counselors is the body that certifies individual counselors according to certain standards. This is an additional certification... 10 (61) The Council...
2 Pages(500 words)Essay

DX wk 8

...450077DX-8 Assignment Bulimia Nervosa (BN) is characterized by binge eating and by the use of inappropriate methods to prevent weight gain (American Psychiatric Association, 2000). Also, those who suffer form BN are "excessively influenced by body shape and weight" (American Psychiatric Association, 2000, p. 589). The DSM-IV-TR defines a binge as eating large quantities of food in one sitting that is more than most people would eat in the same amount of time. The clinician working with the client must be sure that the bingeing happens outside of a holiday because a single episode of binge eating does not mean the individual is bulimic. Also, the episode of bulimia does not have to be done in one place. As an example... Assignment Bulimia...
5 Pages(1250 words)Essay

Wk 5

...Exercise 8.2: Developing Your Own Change Management Model Compare and contrast the various steps in these models. What is left out of different models? After enumerating and tabulating all the elements noted from the ten planned change management models, the commonly incorporated elements in order of frequency are as follows: (1) implement the change plan - 10; (2) need for change – 7; (3) provide a leader to manage and oversee the change process; (4) communicate – 7; (5) institutionalize change – 7; (6) develop structures for change – 6; (7) create a vision and (8) establish urgency, separate from the past and analyze the impact – 4 each. From among the models, elements that are left out or were seen as distinct by different... 8.2:...
2 Pages(500 words)Essay

Wk $ Assignment

...Learning Styles Learning Styles After taking the Index of Learning Styles Questionnaire developed by Soloman and Felder, the results indicated that I am fairly well balanced as a reflective learner, with moderate preference as a sensing learner; fairly well balanced as a visual learner and moderate preference as a sequential learner, as shown below: ACT X REF 11 9 7 5 3 1 1 3 5 7 9 11 <-- --> SEN X INT 11 9 7 5 3 1 1 3 5 7 9 11 <-- --> VIS X VRB 11 9 7 5 3 1 1 3 5 7 9 11 <-- --> SEQ X... Styles Learning Styles After taking the Index of Learning...
1 Pages(250 words)Assignment

Criminal Investigation Wk 3

...Criminal Investigation Wk 3 Criminal Investigation Wk 3 The use of biological evidence has become the most extensively used form of evidence in the criminal court proceedings all over the world. The DNA evidence in the courts has assumed the outstanding proficiency in the recent years among the law enforcement agencies. Moreover, the advancement in technology has increased the efficiency, reliability, and acceptance of the uses of the DNA (Ashcroft, Daniels, and Hart, 2002). Notably, the use of DNA evidences has proven as an essential tool that is adequate to reveal the guilt, acquit innocence, or exonerate the convicts. The application of the forensic DNA Technology has revolutionized investigation of...
2 Pages(500 words)Essay

Journal - wk 4

...Yours Journal - wk 4 Introduction: Tests, quizzes and exams in the rooms are the ways of the educational assessment. It is right to say that every activity in the classroom is related with an assessment, and feedback is also an assessment. The process of feedback is complex to be acted upon on receiving its details. The Assessment planning requires the continuous respond and monitoring of students in order to check their engagement in learning as assessors. Students’ learning is analyzed by the teachers’ observation, response, and record that also improves the learning of the students. Student learning is positively impacted by the detailed feedback. A responsive teacher uses a significant and crucial way for the determination... Journal - wk ...
1 Pages(250 words)Essay

Wk 5d2

...IPv6 of IPv6 IPv6 is known as the next generation IP address standard envisioned to supplement, and ultimately replace, the IPv4 protocol which is being used by the huge number of internet services for communication today. During the last few years, IPv6 has been moving toward becoming a mainstream technology. Still most network professional dont know where to start when it comes to the adaptation of IPv6 because of its huge difference from IPv4. Both IPv6 and IPv4 can be used in the same network. A general practice is, start by enabling both versions of Internet Protocols on the wide area network (WAN) routers, then border routers and firewall devices, trailed by routers in data-centers and in last the desktop accessing routers... of IPv6...
1 Pages(250 words)Essay

Wk 3

...PRODUCT RECALLS AND BANS Introduction The quality of a product will largely affect a company in variety of ways. Low quality ofproducts is likely to cause bans and recall of such products upon the intervention of the government in its bid to protect the consumers. Such cases are likely to impact on the company’s profitability, consumer satisfaction, productivity, public image and possible closure. Increased cases of product recalls and bans have been witnessed in the recent past especially in the motor industry. Fiat Chrysler has had to recall Jeeps with gas tanks that can catch fire in a high-speed collision. Toyota overhauled its safety practices a few years ago after a spate of recalls for unintended acceleration resulted... RECALLS AND...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Wk 5d1 for FREE!

Contact Us