Premium Essay

Ip Rights

In: Other Topics

Submitted By chandikaw
Words 727
Pages 3
INTELLECTUAL PROPERTY RIGHTS

What is an Intellectual Property?

With compared to real property, Intellectual Property is NOT tangible because it is not a product of human skill but of human intellect. Therefore it is said that “it is a fruit of human intellect”.

Why Intellectual Property Rights are important?

Although it is a fact that the power of thinking or the Power of mind cannot be stolen by a powerful third party, it is equally true that “ Intellectual Property Rights “ are being violated all over the globe. Intellectual Property Law is the branch of Law that provides protection for this valuable result of human endeavor. In the process of the development of the world as it stands today, the human mind: the intellect played the major role which nobody can deny. Therefore every country has given a prominent place to this special branch of Law for the sake of economic development.

What are the governing bodies and Acts of Intellectual Property Rights?

Intellectual Property Act No.36 of 2003 is the frame work within which the Intellectual Property Rights are currently protected within SRI LANKA which is a member state of World Intellectual Property organization (WIPO) and a party for the International Treaties/Agreements such as (PCT) Patent Co-operation Treaty, TRIPS Agreement and Berne convention.

The National Intellectual Property Office of Sri Lanka is the ONLY Government body established for the full control of IP related matters including Registration and Administration of IP rights in the country.

Classifications of Intellectual Property Rights

According to the Act, IP can be classified under several headings. Such as, Copy right and related rights, Industrial Designs, Patents, Marks & Trade Marks, Collective marks, Certification Marks, Trade Names and Layout Designs of Integrated Circuits.

What is

Similar Documents

Premium Essay

Virtual Private Network

...legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations are able to add large amounts of capacit without capacity adding significant infrastructure.  Prepared by: Md. Azaj Ikbal (RHCE, CCNA, CEH). CSL Training. All rights are reserved. Page 407  Compatibility with broadband technology - VPN technology is supported by broadband service providers such as DSL and cable, so mobile workers and telecommuters can take advantage...

Words: 6523 - Pages: 27

Premium Essay

Network Infrastructure

...Table of Contents INTRODUCTION 2 DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3 AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3 INSTALLING AND AUTHORIZING A DHCP SERVER 4 CREATING AND CONFIGURATION OF DHCP SCOPES 8 CREATING AND TESTING DHCP CLIENT RESERVATIONS 10 IMPLEMENTING DHCP RELAY AGENTS 12 DOMAIN NAMING STRATEGY 16 DOMAIN NAME SERVICE INSTALLATION 17 DOMAIN NAME SERVICE LOOK UP ZONES 18 ZONE AUTHORITY DELEGATION 23 DNS DYNAMIC UPDATES 25 DNS RESOURCE RECORDS 25 NETBIOS NAME RESOLUTION 27 INSTALLATION OF WINS 27 STATIC WINS RECORD 28 CONFIGURING REPLICATION PARTNERS 30 ALTERNATIVE IP ADDRESSING STRATEGY 31 ALTERNATE NAME RESOLUTION TECHNIQUES 32 NETWORK PLAN FOR THE UWS GLASGOW SITE 32 NETWORK PLAN FOR THE UWS CLYDE SITE 33 NETWORK PLAN FOR THE UWS HEAD OFFICE SITE 33 OVERVIEW OF THE UWS NETWORK INFRASTRUCTURE AS A WHOLE 34 TROUBLESHOOTING STRATEGY FOR UWS NETWORK 34 BACK UP AND FAULT TOLERANCE STRATEGY FOR NETWORK SERVICES 38 NETWORK HEALTH MONITORING AND ANALYSES 38 CONNECTIVITY SOLUTIONS FOR MULTI-VENDOR -ENVIRONMENT 40 REMOTE CONNECTIVITY TO UWS NETWORK USING VPN 41 CONFIGURING INBOUND VPN CONNECTION 41 CONFIGURING REMOTE ACCESS POLICIES 45 CONFIGURING OUTBOUND VPN CONNECTION 48 NETWORK COUNTERACTIVE APPROACHES WITH REGARDS TO SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company...

Words: 5792 - Pages: 24

Premium Essay

Nt2640 Lab 4.1

...ICND1 Skill Builders Part 3: IP Addressing, Routing, and WANs Lab 5: Connected Routes Overview In this lab, you’ll learn how to use and interpret the show ip route connected command. You’ll begin with R1’s interfaces fully configured. R2’s interfaces are partially configured and both are shut down. You’ll bring them up and see the effects. Topology S0/0/0 R1 Fa0/0 S0/0/1 R2 Fa0/0 Fa0/11 SW1 Fa0/1 Fa0/1 SW2 Fa0/2 PC1 PC2 Figure 1 Network Topology for This Lab Detailed Lab Steps Step 1. Step 2. Connect to R1 from the simulator user interface; use password ciscopress. Enter privileged exec mode by issuing the enable command; use password ciscopress. page 1 © 2009 Pearson Education, Inc. All rights reserved. This publication is protected by copyright. Step 3. Issue the show ip route connected command and view the output. How many connected routes do you see? Which ones are they? 0 Step 4. Connect to R2 from the simulator user interface and enter privileged exec mode using the enable command. All passwords are ciscopress. Repeat Step 3 on R2. How many connected routes do you see? Which ones are they? 0 Step 5. Step 6. Use the show ip interface brief command. Is there an IP address listed for interface S0/0/1? Interface Fa0/0? yes no Routers cannot add a connected route to the routing table unless the interface is in an “up and up” state. The following steps enable R2’s two interfaces: Step 7. Move into interface...

Words: 647 - Pages: 3

Premium Essay

Ccna 3 Pt Lab Manual

...exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access layer. Remember you can use press Ctrl-click to add multiple devices of the same type. Step 3. Change the display name for each new device. • • • Click a...

Words: 48601 - Pages: 195

Premium Essay

Packet Tracer

...Packet T P Tracer - Connec a Router to a LAN ct Topology T Addressing Table A g Device Interface G0 0/0 R1 R G0 0/1 S0 0/0/0 (DCE) G0 0/0 R2 R G0 0/1 S0 0/0/0 PC1 P PC2 P PC3 P PC4 P NIC NIC NIC NIC IP Addr ress 192.168.10 0.1 192.168.11 1.1 209.165.20 00.225 10.1.1.1 10.1.2.1 209.165.20 00.226 192.168.10 0.10 192.168.11 1.10 10.1.1.10 10.1.2.10 Subnet Mask S 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 Default G Gateway N/A N/A N/A N/A N/A N/A 192.168.10.1 192.168.11.1 10.1.1.1 10.1.2.1 Objectives O Part 1: Di isplay Route Information er Part 2: Co onfigure Rou uter Interface es Part 3: Ve erify the Con nfiguration © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Public. d/or ed. ent Page 1 of 5 Packet Tracer - Connect a Router to a LAN Background In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands. Part 1: Display Router Information Step 1: Display interface information on R1. Note: Click a device and then click the CLI tab to access the...

Words: 1346 - Pages: 6

Premium Essay

Nt2640

... | |1 and 192.168.16.01/24 | | | | | Step 5. |Show IP route connected command/ see no connection routes | | | | | | | Step 6: |172.30.10.2 / has no IP address admin down | | | | | | ...

Words: 1716 - Pages: 7

Premium Essay

Yealink Phone Installation

...YeaLink IP Desktop Phone Installation For an IT Support Technician a task that would occur on a regular basis would be to set up a desktop IP phone. The following steps should be used to complete the process of setting up a YeaLink IP desktop phone: Step 1: Plug YeaLink phone into power source as well as internet access. Step 2: Find open IP address on SharePoint and assign new user an open IP. Step 3: Type 192.168.X.X into URL and login with username and password: admin Step 4: Go to Network tab and assign static IP address and then press confirm. Step 5: Type in IP address assigned to YeaLink phone in URL after phone reboot. Step 6: Then go to the PBX website. Step 7: Find open extension and then add ext to user. Fill out in under General tab Step 8: Go to voice mail tab and change PIN Number to (XXXX) and change email option to Send as ATT and delete from mailbox. Step 9: Phone Provisioning tab enter in MAC address, model and change the phone Web Page Password. Step 10: 3CXPhone tab no changes. Step 11: Other tab only check PBX Delivers Audio Step 12: Options Tab check send email notification on missed call and allow 3cx management concole access. Then change Access password for 3cx Web Services to aaaaaaaaaaa. Step 13: Rights Tab varies for each new hire. Step 14: Next step go to setting and then Phone Provisioning. Step 15: Depending on whether the setup is for External/Public IP Address or Internal/Local IP Address. Copy the provisioning URL is and then...

Words: 354 - Pages: 2

Premium Essay

Subnetting Made Simple

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

It Technology

...When your company has been growing from 5 employees to 200 employees and excepted to have 350 employees by the end of year. Your company will need more offices for more employees. Before that can happen, the department’s budgets must be adjusted and new hardware needs to be purchased for new employees. ABC will required to choose the type network they will use and what kind network devices it will need. Each internal and external networking component will you give information on what needs to be connected from inside and outside from your computer. Security must be carefully handle firewalls and vpns must be secured for your network to be secured from hackers and that your data protectect from any kind attack. When it comes choosing which network you will need, local area network (LAN) is office environment network. LAN network consists sharing resources, for your company files and printers. Usually LAN network not expensive and can be build with not expensive components.LAN network has big adavantage to hold thousands users with wired connection which can also include wireless connection for users who travel and need wireless connection. The internal and external networking components are important, so company computers can work properly on the network. Internal components can include Intel wireless LAN card which gives you ability getting connected to network wirelessly and PCI Ethernet card gives you ability getting to internet through network cable. External components...

Words: 1618 - Pages: 7

Free Essay

Nt2670 - Installation and Configuration of Ms

...64 bit versions of Windows Server 2008; therefore only a computer capable of running the 64 bit version of 2008. Once that is done named the server (mailitsupport.com), set the clock and it’s configured to be a stand alone with default settings. Configure Your Static IP Address The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP.  Since we will be configuring this computer to be a domain controller, you must change the IP address of the computer to be a static IP address which should be done via View Network Connections" in the Server Manager screen.  This will display the list of active network interfaces. a. Double click on your network adaptor to display the adaptors status. b. Press the Properties button. c. Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties button. d. Change the radio button to "Use the following IP address" and enter an IP address you want to use for this server. I chose to assign this server the internal IP address "192.168.1.25". The firewall appliance is set as a gateway at the IP address "192.168.1.1".  e. Press OK to save your changes. If IP v6 is needed, follow the same process as in IP v4 or else IP v6 set to...

Words: 2240 - Pages: 9

Free Essay

Ccnp Route Ccnp Nstructor Lab Menual V6.0

...commands from the Cisco IOS command-line interface (CLI). Tcl scripts can be created to accomplish routine and repetitive functions with Cisco IOS-based networking devices. In this lab, you create and execute a Tcl script that sends pings to multiple IP addresses in the network to test overall network connectivity. Note: Cisco IOS Release 12.3(2)T and later supports Tcl scripting. Required Resources • • 2 routers (Cisco 1841 with Cisco IOS Release 12.4(24)T1 Advanced IP Service or comparable) Serial and console cables Note: This lab uses Cisco 1841 routers with Cisco IOS Release 12.4(24)T1 and the advanced IP image c1841-advipservicesk9-mz.124-24.T1.bin. Other routers (such as a 2801 or 2811) and Cisco IOS Software versions can be used if they have comparable capabilities and features. Depending on the router model and Cisco IOS Software version, the commands available and output produced might vary from what is shown in this lab. All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 CCNPv6 ROUTE Step 1: Configure initial settings. Copy and paste the following initial configurations for R1 and R2. Router R1 hostname R1 ! interface loopback 1 ip address 10.1.1.1...

Words: 171031 - Pages: 685

Free Essay

Mr Godwin

...How To Configure TCPIP http://www.free-online-training-courses.com/configuring-tcpip/ The Place For Free Online Training Courses Improve Your Career Prospects Configuring TCP/IP This free lesson will teach you how to configure TCP/IP in windows and how to use the ipconfig command. Use the buttons below to navigate through the lesson To configure TCP/IP click on Start. Right-click on My Network Places. Select Properties. 1 of 5 Please purchase 'docPrint PDF Driver' on http://www.verypdf.com/artprint/index.html to remove this message. PM 29-Apr-14 12:28 How To Configure TCPIP http://www.free-online-training-courses.com/configuring-tcpip/ Right-click on the connection you want to configure and select Properties. Highlight Internet Protocol (TCP/IP). Select Properties. This machine is currently configured to obtain an IP address automatically. Select Use the following IP address and fill out the relevant details. Additional gateways and IP addresses can be added by clicking the Advanced Button… ..and configuring the appropriate options. Using the ipconfig command The ipconfig command can be used to display IP address information from a command prompt Running ipconfig with /all switch produces a much more verbose display. Comments Configuring TCP/IP — 18 Comments Twaahir on April 27, 2014 at 8:32 pm said: Thank you. WILFRED on April 22, 2014 at 6:37 pm said: I LIKE THIS CONFIGURATION PROTOCOL naseema aziz on April 19, 2014 at 9:10...

Words: 682 - Pages: 3

Premium Essay

Checkpoint Tcp/Ip

...Checkpoint: TCP/IP LAN Plan 1. An IPv6 address is made up of how many bits? a. 32 b. 48 c. 64 d. 128 e. 256 The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab The first 3 16 bit sections 2001:DB8:0: represent...

Words: 1749 - Pages: 7

Free Essay

Redes

...dirección IP de las redes que se muestran en el Diagrama de topología. Para que se puedan cumplir los requisitos de direccionamiento utilizando la red 172.16.0.0/16 se utilizará la dirección IP de la LAN. La red posee los siguientes requisitos de direccionamiento: • Sección de red East • La LAN1 N-EAST (Northeast) necesitará 4000 direcciones IP de host. • La LAN2 N-EAST (Northeast) necesitará 4000 direcciones IP de host. • La LAN1 SE-BR1 (Southeast Branch1) necesitará 1000 direcciones IP de host. • La LAN2 SE-BR1 (Southeast Branch1) necesitará 1000 direcciones IP de host. • La LAN1 SE-BR2 (Southeast Branch2) necesitará 500 direcciones IP de host. • La LAN2 SE-BR2 (Southeast Branch2) necesitará 500 direcciones IP de host. • La LAN1 SE-ST1 (Southeast satélite1) necesitará 250 direcciones IP de host. • La LAN2 SE-ST1 (Southeast satélite1) necesitará 250 direcciones IP de host. • La LAN1 SE-ST2 (Southeast satélite1) necesitará 125 direcciones IP de host. • La LAN2 SE-ST2 (Southeast satélite2) necesitará 125 direcciones IP de host. • Sección de red West • La LAN1 S-WEST (Southwest) necesitará 4000 direcciones IP de host. • La LAN2 S-WEST (Southwest) necesitará 4000 direcciones IP de host. • La LAN1 NW-BR1 (Northwest Branch1) necesitará 2000 direcciones IP de host. • La LAN2 NW-BR1 (Northwest Branch1) necesitará 2000 direcciones IP de host. • La LAN1 NW-BR2 (Northwest Branch2) necesitará 1000 direcciones IP de host...

Words: 3116 - Pages: 13

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...

Words: 13687 - Pages: 55