Premium Essay

About Ip

In:

Submitted By danteeju
Words 2562
Pages 11
Executive summary

According to assignment brief, I have to do a case study about intellectual property. So in this assignment, first I will through the definition of intellectual property to talk about what it is; after this I will discuss about what are the purpose why some countries have to protect its intellectual property; and then, I will through a recent litigation between Huawei and Cisco to show how important is the intellectual property for a companies. After that, I will analyses the current situation of intellectual property protection in China; and then, I will list some recommendations for China, in order to improve the intellectual property protection. At last, I will take my conclusion of the intellectual property protection.

About intellectual Property

“Intellectual property”, this term was first proposed by the French scholar Karp Niyazov in the mid-17th century; after that it develop by the famous Belgian jurist Picardy, and Picardy defined it as “the right of every intellectual activity”. Until after the “world intellectual property organization” convention in 1967, this term became gradually use in the whole world.
The intellectual property basically means that people has the exclusive rights on their intellectual labor by law. Usually, the intellectual property can be divided into two types of industrial property and copyright. The industrial property includes inventions (patents), logo, industrial designs and trademarks; copyright includes artistic works literary.
Actually, intellectual property is an intangible property; its object is the product of intellectual or knowledge. Its value is same as houses, cars, jewelry and other tangible property, and it also protected by governmental laws; for some well-know patents, logo and trademark have more value than other tangible property.

The reasons for protect intellectual property of

Similar Documents

Premium Essay

About Ip Address

...twenty-first Century, the society presented a number of important features of digital, network and information technology, it is a network as the core of the information age. To realize the information, we must rely on the perfect network, because the network will be very rapid transmission of information, and to improve the network will have to improve the construction of the network Ip address database. Because the Internet is based on the Ip address, each Ip has its physical location in theory. In the IP address of the library to do better with sina, Taobao, Tencent, pure, and 17MON and foreign IP library very much, but most famous is maxmind, they are the IP data were good collection management. This paper designed to achieve the independent Ip address library construction, through their own design procedures for the Ip address of the grab, parse, and will meet the requirements of the Ip data saved to the Mysql database. The system data sources are divided into two parts, one part is to grab the spider to grab the data through the program operation, there is a part of the artificial way to collect Ip data. In order to ensure the data coverage and accuracy for the system is operated for a long time, the spiders crawl data capture enough data, and some redundant data from databases are merged in order to improve the query efficiency of the database. This design is based on the use of Maven management projects through the background to build the springmvc framework to achieve the...

Words: 336 - Pages: 2

Free Essay

About a Boy

...Jenny Smith November 28, 2011 Dr. Min Young Lee English 121 sec 28 The Coming of Age of the Male Characters in About a Boy About a boy is a contemporary novel written by the British author Nick Hornby. It incorporates constructs of post-modern writing by bringing into focus the artists, and styles, and prose of the vernacular. The setting of the novel takes place in London in the mid 1990s. About a boy gives a unique perspective of a coming of age story. It follows the coming of age of two boys of two very different ages; Will Freeman 36 years old and Marcus 12. This novel shows the contrast between consumerism and materialism with real interpersonal connections. Will Freeman made the decision to pursue materialism rather than personal friendships, and to live in self-imposed isolation. Will had the ability to buy “cool” clothes, and sunglasses and sneakers, and so was never at a loss for acquaintances. Marcus, on the other hand, felt isolation due to a lack of materialism. Marcus was an outsider in his school in London since he could not have the best “coolest” clothes, shoes, and haircuts and thus was always the target of bullying. However, as the plot progresses, Marcus and Will undergo transformational experiences together to become more connected to the people around them. The transformational experiences of Fiona’s suicide, falling in love, and Marcus’ arrest all culminate in the maturation of Will and Marcus’ and the genesis of interpersonal connections between...

Words: 1488 - Pages: 6

Free Essay

Film Review of About a Boy

...Film Review of ”About a Boy” Cast: Hugh Grant, Rachel Weisz, Toni Collette and Nicholas Hoult Director: Chris and Paul Weitz Novel written by: Nick Hornby Script writer: Peter Hedges, Chris and Paul Weitz Rating: PG-13 Genre: Romance, Comedy and Drama Running time: 105min. Review: The movie is mainly about 36 year old Will Freeman and 12 year old Marcus Brewer. Will is a so called island which means that he wants nothing to do with family related things; all he really wants is relationships without any form of commitment, he therefore goes to a club for single parents called S.P.A.T. There he meets a woman that he likes, but to be with her he makes up that he has a two-year old son named Ted. When he revels that it was a lie to get close to her, she immediately breaks up with him. Will's keeps on courting and the woman (Suzie) takes him to one of the group's picnics where he meets Marcus the son of Suzie's friend, Fiona. At the picnic, Marcus accidentally kills a duck with piece of bread while he is trying to feed it. When a park ranger asks him about it, Will defends Marcus by saying that the bird was already dead. Afterward, when Will and Suzie take Marcus home, they find Fiona, his mother, in the living room, on a pill-overdose trying to commit suicide. Marcus gets uncomfortable with being at home with his mother; therefore he tries to get Will to date her. After only one date this plan fails so Marcus starts following Will around and discovers that Will...

Words: 714 - Pages: 3

Premium Essay

Ip Spoffing

...IP Spoofing by Farha Ali, Lander University The Internet Protocol, or IP, is the main protocol used to route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP depends on upper-level TCP/IP suite layers to provide accountability and reliability. The heart of IP is the IP datagram, a packet sent over the Internet in a connectionless manner. An IP datagram carries enough information about the network to get forwarded to its destination; it consists of a header followed by bytes of data . The header contains information about the type of IP datagram, how long the datagram should stay on the network (or how many hops it should be forwarded to), special flags indicating any special purpose the datagram is supposed to serve, the destination and source addresses, and several other fields, as shown in Figure 1. Figure 1: The IP Header Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets...

Words: 3368 - Pages: 14

Free Essay

Mobile Ip in Source Routing Systems

...Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works ..............................................................................

Words: 7747 - Pages: 31

Premium Essay

Ip Spoofing

...12/7/2014 IP Spoofing ­ Cisco Systems The Internet Protocol Journal, Volume 10, No. 4 IP Spoofing HOME ABOUT CISCO PUBLICATIONS AND MERCHANDISE THE INTERNET PROTOCOL JOURNAL ISSUES VOLUME 10, NUMBER 4, DECEMBER 2007 Book Review Call for Papers Download PDF Fragments From the Editor IP Spoofing Looking Toward the Future Remembering Itojun Security Standards Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets you prepare spoofed IP datagrams with just a one­line command, and you can send them to almost anybody in the world. You can spoof at various network layers; for example, you can use Address Resolution Protocol (ARP) spoofing to divert the traffic intended for one station to someone else. The Simple Mail Transfer Protocol (SMTP) is also a target for spoofing; because SMTP does not verify the sender's address, you can send any e­mail to anybody pretending to be someone else. This article focuses on the various types of attacks that involve IP spoofing on networks...

Words: 3181 - Pages: 13

Premium Essay

Routing the Telephone to a Ne Neighborhood

...655356 b) 128 c) 512 d) 254 2. Which of the following describes a collision domain? a) The process of a bridge learning MAC addresses to be able to filter instead of flooding b) The separation of two IP subnets by a router c) Devices connected to an Ethernet hub d) Devices connected to an Ethernet switch operating in full duplex mode 3. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of 202.8.40.254? Address/Mask Next hop 202.8.0.0/16 Interface 0 202.8.40.0/24 Interface 1 202.8.40.128/25 Router 1 default Router 2 a) Router 1 b) Router 2 c) Interface 0 d) Interface 1 4. Which of the following two protocols operate at the OSI Transport layer? a) IP and ARP b) TCP and UDP c) UDP and IP d) ARP and ICMP 5. The process of a DNS server adding a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? a) Adjacent layer interface b) Data encapsulation c) Same layer interaction d) Packet reordering 6. The term autonomous system (AS) defines the collection of metrics for routes to a particular network. a) True b) False 7. Given 5 bits of mask for the host portion of an IP address, how may usable host addresses are available? a) 62 b) 22 c) 14 d) 30 8. When a Telco provides a circuit handoff for a TDM circuit such as a DS1/T1 at the demark, the interface type is _________...

Words: 1737 - Pages: 7

Premium Essay

What

...Network Documentation LAB 2 Introduction In this lab, you will learn how to use several different applications and interfaces to identify and document an IP network design and schema. Chief among these is PuTTY, which you used in Lab #1. The primary use of PuTTY is to establish Telnet and SSH sessions to remote servers. You will use PuTTY to collect information about those resources. You will also use Wireshark to capture packet data from the sessions you establish with PuTTY. Learning Objectives Upon completing this lab, you will be able to: • Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1 • Use PuTTY to establish Telnet and SSH to the IP addresses of the identified interfaces on Cisco routers, switches, and firewalls • Use Cisco show commands to display the MAC-layer addresses of Ethernet ports, IP addressing schema, and subnet mask addressing used throughout the IP networking infrastructure • Document the MAC addresses and IP addresses of the IP networking infrastructure • Document the IP host addresses of the VM server farm hosts TOOLS AND SOFTWARE USED NAME Wireshark PuTTY Cisco IOS MORE INFORMATION http://www.wireshark.org/ http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://www.cisco.com/warp/cpropub/45/tutorial.htm 17 38504_LMxx_Lab02.indd 17 8/30/12 7:51 PM 18 LAB #2 | Network Documentation Deliverables Upon completion of this lab, you...

Words: 1982 - Pages: 8

Premium Essay

Static Ip and Connected Routes

...12 makeup IP routing, Static and connected routes IP routing defines how an IP packet can be delivered from the host at which the packet is created to the destination host. Hosts and routers participate in the IP routing process. The list summarizes a host’s logic when forwarding a packet, assuming that the host is on an Ethernet / wireless LAN. When sending a packet, compare the destination IP address of the packet to the sending host’s perception of the range of addresses in the connected subnet, based on the host’s IP address and subnet mask. If the destination is in the same subnet as the host, send the packet directly to the destination host. ARP is needed to find the destination host’s MAC address. If the destination host is not in the same subnet as the host, send the packet directly to the host’s default gateway. ARP is needed to find the default gateway’s MAC address. Routers use the following steps: the packet must first be received, whereas the sending host begins with the IP packet in memory. For each received frame, use the data-link trailer frame check sequence (FCS) field to ensure that the frame had no errors; if errors occurred, discard the frame and don’t continue to the next step. Check the frame’s destination data link layer address, and process only if addressed to this router or to a broadcast/multicast address. Discard the incoming frame’s old data-link header and trailer, leaving the IP packet. Compare the packet’s destination IP address to the...

Words: 756 - Pages: 4

Premium Essay

Personal Statement

...Difference between static and dynamic IPs. When a device is assigned a static IP address, it does not change. The device always has the same IP address. Most devices use dynamic IP addresses, which are assigned by the network when they connect. About static IPs for small business Static IP addresses An Internet Protocol (IP) address is a unique number assigned to each computer on a network. An IP address identifies computers on the Internet. A computer on the Internet can have a static IP address, which means it stays the same over time, or a dynamic IP address, which means the address can change over time. When you might need static IPs You might need static IPs if one or more of these scenarios applies to you: • Maintain your own web server or other Internet server, such as an email server, that requires users to connect from the Internet. • Have external devices or services that must connect to your network via IP address (for example, 74.125.224.72) rather than by name (for example, google.com). • Use a VPN or other service to remotely connect to computers in your business. Well, the first thing I would ask you is what Class of address does 172 fall under? This is vital. (This would be a Class B address because their range is 128-191) Therefore, be definition, the network mask is 255.255.0.0, or /16... Now, with a given IP and mask of 172.25.102.41 /22 you can see that they are using 6 bits for subnetting. (/16 default, and now using /22). This is a mask of...

Words: 464 - Pages: 2

Premium Essay

Ip Addressing

...IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[ and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995, standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s. In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the other...

Words: 1361 - Pages: 6

Premium Essay

Nt2640 Midterm

...NTNT2640 IP Networking Midterm Люда Григорашенко Fri Apr 25 17:29:25 CDT 2014 Which two of the following are Layer 2 protocols commonly used in WANs? PPP and HDLC Which of the following describes a collision domain? Devices connected to an Ethernet hub Which of the following protocol operates at the OSI model Transport Layer?  UDP What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what? Data Encapsulation  The term autonomous system (AS) refers to the collection of metrics for routes to a particular network. False Given the 5 bits of a subnet mask for the host portion of an IP addresses are available? 30 The interface type at the demark for a DS1/T1 circuit at is ____. RJ-48 Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of: 19.48.254.3 Router 2 Which address below belongs to the Class A network range? 126.254.1.45 Which of the following dynamic routing protocols is an exterior gateway protocol? BGP Out of the following which does a router normally use when making a decision about routing an IP packet? Destination IP Adress How many bits comprise the network portion of a Class C address? 24 A broadcast address is an address that only a single host listens to on the network. False How many usable host addresses are available...

Words: 791 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...1) Host A opens a command prompt and enters >Ping 200.200.200.5. 2) IP works with the Address Resolution Protocol (ARP) to determine which network this packet is destined for by looking at the IP address and the subnet mask of Host A. Since this is a request for a remote host, which means it is not destined to be sent to a host on the local network, the packet must be sent to the router (the gateway for Network A) so that it can be routed to the correct remote network (which is Network B). 3) Now, for Host A to send the packet to the router, it needs to know the hardware address of the router's interface which is connected to its network (Network A), in case you didn't realise, we are talking about the MAC (Media Access Control) address of...

Words: 1022 - Pages: 5

Premium Essay

Sop for Ix380

...WT-Engg.-CPE-IX380 Contents Contents 2 1.0 Document Control Information 4 2.0 Purpose & Scope 5 3.0 General Information 7 Safety Precautions 7 Cleaning and Maintaining 7 4.0 Device Physical Appearance 8 Appearance 8 Parts Supplied 8 LED Indicator 8 Working Condition 9 Technical Parameters 9 Ports 10 5.0 Physical Connectivity of IX380 11 Application Structure 11 Hardware Installation 11 Connect to LAN 11 Connect to Phone 12 Connect Power Adapter 12 Power on MODEM 12 6.0 Configuration of IX380 13 TCP IP Installation 13 TCP IP Configuration 13 Checking 14 Check LAN Connection 14 Cancel Proxy Server in Browser 15 Others 15 7.0 Preliminary Actions 16 Login 16 Status 18 Connection Status 18 WiMAX Information 20 About My Modem 22 Setup 23 IP Configuration 23 DHCP Clients 23 DHCP Binding 24 WLAN 24 Basic Settings 24 Security 25 MAC Filter 27 Advanced Settings 28 Advanced 28 Routing Setup 28 SNTP Client Configuration 29 DDNS Setup 29 DNS Configuration 30 IGMP Configuration 31 Security 32 Port Forwarding 32 Port Trigger 33 DMZ 35 ACL 36 VPN Client 38 Tools 39 System Commands 39 Ping 40 User Management 40 System Log 41 VAS Code 42 Troubleshooting Steps 44 In case of VPN? 46 LAYER 2 VPN: 46 LAYER 3 VPN: 46 Appendix...

Words: 5052 - Pages: 21

Premium Essay

Nt2640 Project Paper

...lookup: a. Routing Table Format- A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept. Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP) gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands. b. Routing Lookup Mechanism- c. Classful vs. Classless Routing- Classful Routing, which is sometimes called a classful network. If you are using a classful routing protocol then all of your networks are in different classes and are separated by a router. Remember that the useable IPv4 address ranges are divided into classes. Class A 1-126, Class B 128-191, and Class C 192-223. So when we talk about a classful routing protocol, it will only look at the IP address class and not the subnet mask. This is the problem;...

Words: 3788 - Pages: 16