Many people use their computers, both at home and at work, without paying much attention to the technological terminology. For these folks, all that matters is that the internet service provider does its job of providing web access any time someone logs on. But behind the simple act of clicking a button on a mouse to immediately check email or go shopping online or research an important topic for an assignment is an entire technological hive of activity. For example, each hardware device is assigned a server IP address. For internet purposes, the initials IP stand for internet protocol. This address is actually a set of four octets; in other words, four eight-bit number segments create a thirty-two-bit binary number which is the fixed hardware address. Even small companies often create a local area network, or LAN, when setting up their computer equipment. A LAN is simply a network that connects two or more computers so that certain applications, files, and resources can be shared. For example, the office of a real estate agent may contain only two computers, one for the agent and one for the assistant. By networking the two workstations, appointments entered on a shared calendar by the assistant can be accessed by the agent. Other documents may also be stored in a directory that both the agent and the assistant can access. One computer is designated as the server and any other computers in the LAN are often referred to as clients.
When companies set up a network, they are allocated a set of internet protocol addresses. However, the business may not receive enough addresses for each piece of hardware that requires one. When this occurs, the company's IP address management administrator and staff need to come up with a workable and cost-effective solution so that each workstation can be utilized. One solution is to create a centralized management and storage system. Another possibility is to set up a type of server IP address gateway that allows address pooling and sharing. A centralized management system allows the IP address management administrator to assign and change internet protocol addresses as needed. This can be a time-consuming endeavor if several hardware devices need to be reconfigured. In addition, any changes can require a reconfiguration of the DNS (Domain Name System) so that applications will continue to function properly with the server. Such changes can also affect the routing software and the security precautions that have been put in place.
An IP address management gateway system may utilize a dynamic allocation process. Several users can share a limited number of internet protocol addresses as long as they don't try to do so at the same time. Administrators differentiate between server IP address pooling and sharing. They are not the same. In pooling, users log in to a workstation that pulls an internet protocol address from a pool of addresses. Each time the user logs in to the workstation, a different binary number may be assigned. With sharing, several workstations can use the same identification number, but separate port numbers allow the server to separate information and route it to the correct workstation. This can be likened to a college dormitory. All incoming mail lists the dormitory street address and the bags of correspondence are dropped off at the building's front desk. But then a student on the work-study program sorts the bag of letters into the individual mailboxes of the dorm's residents. This is a simplistic explanation of sharing.
The gateway system provides more flexibility for administrators and simplifies the task of assigning and changing internet protocol addresses since all the configuration information is on the main file server. With a gateway solution, the user maintains the same identification, in the form of a log-in name and password, no matter which workstation is being used. This allows the IP address management administrator to track the usage, including what websites were accessed, for each user. This can be an important feature for companies that have strict policies against accessing certain prohibited sites on a company computer. Law enforcement officials particularly appreciate this type of tracking when investigating cases involving fraudulent activities and child pornography. Naturally, the tracking also raises privacy concerns. Such issues are often discussed both in Congress and in state legislatures across the country.
Ten years and counting | Happy BirthDay Google | What would you ask Senators McCain and Obama? | Announcing the Android 1.0 SDK, release 1