International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 103 | Views: 103

Research Paper | Computer Science & Engineering | Bahrain | Volume 5 Issue 10, October 2016


Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad


Abstract: Network security has become essential for computer end user, public and private organizations and also governmental defense authority. The whole field of network security is in a transformation stage and the wide topic of network security will be analyzed in term of a brief history of networking and security issues in the current rapid developing and challenging technological changes. This study aimed to design a security mechanism that is able to minimize the level of threats and unauthorized users over the network by utilization of static internet protocol features and aspects. In addition of providing the protection against data loss and prevented access to the network resources by the authorized user and network administrations.


Keywords: Network security, IP implementation, Computer network, IP address, Threats


Edition: Volume 5 Issue 10, October 2016,


Pages: 1112 - 1116


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ahmed D. Asad, "Network Security Mechanism Based On Static Internet Protocol Addressing", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1112-1116, https://www.ijsr.net/get_abstract.php?paper_id=ART20162377

Similar Articles with Keyword 'Network security'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V | Sandhya V [4]

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra | K. Raghavendra Rao [5]

Share this Article
Top