SlideShare une entreprise Scribd logo
1  sur  4
INTERNET PROTOCOL (IP)
 The Internet Protocol (IP)- is the principal communications protocol used for
relaying datagrams (also known as network packets) across aninternetwork using
the Internet Protocol Suite.
-responsible for routing packets across network boundaries, it is the primary protocol that
establishes the Internet.
-is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of
delivering datagrams from the source host to the destination host solely based on the addresses.
-for this purpose, IP defines datagram structures that encapsulate the data to be delivered.
-it also defines addressing methods that are used to label the datagram source and destination.
Historically, IP was the connectionless datagram service in the original Transmission Control
Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connectionoriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred
to as TCP/IP.
Function
The Internet Protocol is responsible for addressing hosts and routing datagrams (packets) from a
source host to the
destination host across one or more IP networks.
The Internet Protocol
-is one of the elements that define the Internet. The dominant internetworking protocol in
the Internet Layer in use today is IPv4; the number 4 is the protocol version number carried in
every IP datagram. IPv4 is described in RFC 791 (1981).

 IP VERSION
1. Internet Protocol Version 4 (IPv4)
-first major version of IP, is the dominant protocol of
the internet.
-is the fourth revision in the development of the Internet Protocol (IP) and the first version of
the protocol to be widely deployed.
- together with IPv6, it is at the core of standards-based internetworking methods of
the Internet. As of 2012 IPv4 is still the most widely deployed Internet Layer protocol.
-is described in IETF publication RFC 791 (September 1981), replacing an earlier definition
(RFC 760, January 1980).
- IPv4 is a connectionless protocol for use on packet-switched Link Layer networks
(e.g., Ethernet). It operates on a best effort delivery model, in that it does not guarantee delivery, nor
does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data
integrity, are addressed by an upper layer transport protocol, such as the Transmission Control
Protocol (TCP).
- Its most prominent modification from version 4 is the addressing system. IPv4 uses 32bit addresses (c. 4 billion, or 4.3×109, addresses) while IPv6 uses 128-bitaddresses (c.
340 undecillion, or 3.4×1038 addresses).
- IPv4 uses 32-bit addresses, allowing for only 4,294,967,296 unique addresses worldwide.
2. Internet Protocol Version 6(IPv6)
- Its successor of IPv4
-which is increasing in use.
-) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task
Force (IETF).
-is intended to succeed IPv4, which is the dominant communications protocol for most Internet
traffic as of 2012.
- use 128 bits for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in
1998, and its deployment has been on-going since the mid-2000s.
- is the new version of the Internet Protocol. The addresses used by the current version of the
Internet Protocol, IPv4, are nearly all used.
- was developed to deal with the long-anticipated problem of IPv4 running out of addresses.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than
with IPv4.
-Each device on the Internet, such as a computer or mobile telephone, must be assigned an IP
address in order to communicate with other devices. With the ever-increasing number of new devices
being connected to the Internet, there is a need for more addresses than IPv4 can accommodate.
IPv6 uses 128-bit addresses, allowing for 2128, or approximately 3.4×1038 addresses.
IPv6 addresses, as commonly displayed to users, consist of eight groups of
four hexadecimal digits
separated
by
colons,
for
example2001:0db8:85a3:0042:0000:8a2e:0370:7334.
The deployment of IPv6 is accelerating, with a World IPv6 Launch having taken place on 6
June 2012, in which major internet service providers, especially in countries that had been lagging in
IPv6 adoption, deployed IPv6 addresses to portions of their users. Data from Arbor Networks showed
a peak of 0.2% of Internet traffic on IPv6 during the launch
 IP addresses are binary numbers, but they are usually stored in text files and displayed
in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1
(for IPv6).
 The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations
globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks
to local Internet registries (Internet service providers) and other entities.
IPv6 Summary
128-bit address space
revised header format
new options
allowance for extension
support for special handling of packet flows
increased security measures
IPv6 uses hexadecimal colon notation with abbreviation
methods
IPv6 has 3 types of addresses: unicast, anycast, and
multicast
IPv4, ICMPv4, ARP, RARP, and IGMP replaced with IPv6
and ICMPv6
IPv4 to IPv6 transition strategies are dual stack,
tunnelling, and header translation

IP Addressing and Routing
- addressing refers to how end hosts are assigned IP addresses and how subnetworks of IP
host addresses are divided and grouped.
-IP routing is performed by all hosts, but most importantly by routers, which typically use
either interior gateway protocols (IGPs) or external gateway protocols (EGPs) to decide how to move
datagrams among networks.
-IP routing is also common in local networks. For example, Ethernet switches sold today
support IP multicast.These switches use IP addresses and Internet Group Management Protocol for
control of the multicast routing but use MAC addresses for the actual routing.
IP versions 0 to 3 were development versions of IPv4 and were used between 1977 and 1979.
Version 5 was used by the Internet Stream Protocol, an experimental streaming protocol.
Version numbers 6 through 9 were proposed for various protocol models designed to replace
IPv4: SIPP (Simple Internet Protocol Plus, known now as IPv6), TP/IX (RFC 1475), PIP (RFC 1621)
and TUBA (TCP and UDP with Bigger Addresses, RFC 1347).
Other protocol proposals named IPv9 and IPv8 briefly surfaced, but have no support.
On April 1, 1994, the IETF published an April Fool's Day joke about IPv9.

 Transmission Control Protocol (TCP)

-is an example of a protocol that will adjust its segment size to be smaller than the MTU. User
Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) disregard MTU size,
thereby forcing IP to fragment oversized datagrams.
Transmission Control Protocol (TCP)
The TCP provides reliable transmission of data in an IP environment. TCP corresponds to
thetransport layer (Layer 4) of the OSI reference model. Among the services TCP provides are
streamdata transfer, reliability, efficient flow control, full-duplex operation, and multiplexing.
With stream data transfer, TCP delivers an unstructured stream of bytes identified by
sequencenumbers. This service benefits applications because they do not have to chop data into
blocks beforehanding it off to TCP. Instead, TCP groups bytes into segments and passes them to IP
for delivery.
TCP offers reliability by providing connection-oriented, end-to-end reliable packet delivery
throughan internetwork. It does this by sequencing bytes with a forwarding acknowledgment number
thatindicates to the destination the next byte the source expects to receive. Bytes not
acknowledgedwithin a specified time period are retransmitted. The reliability mechanism of TCP
allows devicesto deal with lost, delayed, duplicate, or misread packets. A time-out mechanism allows
devices to
detect lost packets and request retransmission.
TCP offers efficient flow control, which means that, when sending acknowledgments back to
the
source, the receiving TCP process indicates the highest sequence number it can receive without
overflowing its internal buffers.
Full-duplex operation means that TCP processes can both send and receive at the same time.
Finally, TCP’s multiplexing means that numerous simultaneous upper-layer conversations can be
multiplexed over a single connection.

User Datagram Protocol (UDP)
- is one of the core members of the Internet protocol suite, the set of network protocols
used for the Internet. With UDP, computer applications can send messages, in this case
referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring
prior communications to set up special transmission channels or data paths. The protocol was
designed by David P. Reed in 1980 and formally defined in RFC 768.

UDP uses a simple transmission model without implicit handshaking dialogues for providing
reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may
arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking
and correction is either not necessary or performed in the application, avoiding the overhead of such
processing at the network interface level. Time-sensitive applications often use UDP because
dropping packets is preferable to waiting for delayed packets, which may not be an option in a realtime system.If error correction facilities are needed at the network interface level, an application may
use the Transmission Control Protocol (TCP) orStream Control Transmission Protocol (SCTP) which
are designed for this purpose.

Contenu connexe

Tendances

Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
AGhaKhan01
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
irenazd
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
rajesh531
 

Tendances (20)

Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux. Comparative study of IPv4 and IPv6 on Windows and Linux.
Comparative study of IPv4 and IPv6 on Windows and Linux.
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
IPv6
IPv6IPv6
IPv6
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 

En vedette

Impact of technology on learning
Impact of technology on learningImpact of technology on learning
Impact of technology on learning
Mohamed Faizudeen
 
The importance of technology in education
The importance of technology in educationThe importance of technology in education
The importance of technology in education
Catherine Casper
 
Questionnaire on the use of technology in the classroom
Questionnaire on the use of technology in the classroomQuestionnaire on the use of technology in the classroom
Questionnaire on the use of technology in the classroom
angiegum
 
Impact Of Technology In Education Final Draft
Impact Of Technology In Education Final DraftImpact Of Technology In Education Final Draft
Impact Of Technology In Education Final Draft
loraevanouski
 
Introduction to tourism for grade 10 learners.
Introduction to tourism for grade 10 learners.Introduction to tourism for grade 10 learners.
Introduction to tourism for grade 10 learners.
University of Johannesburg
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
Kasthuripriya Nanda Kumar
 

En vedette (19)

Effects of Technological Device to Students
Effects of Technological Device to StudentsEffects of Technological Device to Students
Effects of Technological Device to Students
 
Impact of technology on learning
Impact of technology on learningImpact of technology on learning
Impact of technology on learning
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
 
The importance of technology in education
The importance of technology in educationThe importance of technology in education
The importance of technology in education
 
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
 
Multimedia
MultimediaMultimedia
Multimedia
 
ICT G.C.E O/L 2016 Model Paper
ICT G.C.E O/L 2016 Model PaperICT G.C.E O/L 2016 Model Paper
ICT G.C.E O/L 2016 Model Paper
 
Bad impact using gadget to body
Bad impact using gadget to bodyBad impact using gadget to body
Bad impact using gadget to body
 
Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)
 
Questionnaire on the use of technology in the classroom
Questionnaire on the use of technology in the classroomQuestionnaire on the use of technology in the classroom
Questionnaire on the use of technology in the classroom
 
Impact Of Technology In Education Final Draft
Impact Of Technology In Education Final DraftImpact Of Technology In Education Final Draft
Impact Of Technology In Education Final Draft
 
Related Literature and Related Studies
Related Literature and Related StudiesRelated Literature and Related Studies
Related Literature and Related Studies
 
Group 7 thesis
Group 7 thesisGroup 7 thesis
Group 7 thesis
 
Introduction to tourism for grade 10 learners.
Introduction to tourism for grade 10 learners.Introduction to tourism for grade 10 learners.
Introduction to tourism for grade 10 learners.
 
Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)Literature Review (Review of Related Literature - Research Methodology)
Literature Review (Review of Related Literature - Research Methodology)
 
Research Paper on Social Media
Research Paper on Social MediaResearch Paper on Social Media
Research Paper on Social Media
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
 
Impact of technology on education
Impact of technology on educationImpact of technology on education
Impact of technology on education
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à Internet protocol

Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
Amandeep Kaur
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Vanitha Joshi
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
anjaniar7gallery
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Saumendra Pradhan
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 

Similaire à Internet protocol (20)

Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IP Address
IP AddressIP Address
IP Address
 
Ipv6
Ipv6Ipv6
Ipv6
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
 
14 564
14 56414 564
14 564
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Hardware9
Hardware9Hardware9
Hardware9
 
TCP/IP Protocal Suite
TCP/IP Protocal SuiteTCP/IP Protocal Suite
TCP/IP Protocal Suite
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Ch 2
Ch 2Ch 2
Ch 2
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Internet protocol

  • 1. INTERNET PROTOCOL (IP)  The Internet Protocol (IP)- is the principal communications protocol used for relaying datagrams (also known as network packets) across aninternetwork using the Internet Protocol Suite. -responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. -is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. -for this purpose, IP defines datagram structures that encapsulate the data to be delivered. -it also defines addressing methods that are used to label the datagram source and destination. Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connectionoriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP. Function The Internet Protocol is responsible for addressing hosts and routing datagrams (packets) from a source host to the destination host across one or more IP networks. The Internet Protocol -is one of the elements that define the Internet. The dominant internetworking protocol in the Internet Layer in use today is IPv4; the number 4 is the protocol version number carried in every IP datagram. IPv4 is described in RFC 791 (1981).  IP VERSION 1. Internet Protocol Version 4 (IPv4) -first major version of IP, is the dominant protocol of the internet. -is the fourth revision in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. - together with IPv6, it is at the core of standards-based internetworking methods of the Internet. As of 2012 IPv4 is still the most widely deployed Internet Layer protocol. -is described in IETF publication RFC 791 (September 1981), replacing an earlier definition (RFC 760, January 1980). - IPv4 is a connectionless protocol for use on packet-switched Link Layer networks (e.g., Ethernet). It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP). - Its most prominent modification from version 4 is the addressing system. IPv4 uses 32bit addresses (c. 4 billion, or 4.3×109, addresses) while IPv6 uses 128-bitaddresses (c. 340 undecillion, or 3.4×1038 addresses). - IPv4 uses 32-bit addresses, allowing for only 4,294,967,296 unique addresses worldwide.
  • 2. 2. Internet Protocol Version 6(IPv6) - Its successor of IPv4 -which is increasing in use. -) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). -is intended to succeed IPv4, which is the dominant communications protocol for most Internet traffic as of 2012. - use 128 bits for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in 1998, and its deployment has been on-going since the mid-2000s. - is the new version of the Internet Protocol. The addresses used by the current version of the Internet Protocol, IPv4, are nearly all used. - was developed to deal with the long-anticipated problem of IPv4 running out of addresses. IPv6 implements a new addressing system that allows for far more addresses to be assigned than with IPv4. -Each device on the Internet, such as a computer or mobile telephone, must be assigned an IP address in order to communicate with other devices. With the ever-increasing number of new devices being connected to the Internet, there is a need for more addresses than IPv4 can accommodate. IPv6 uses 128-bit addresses, allowing for 2128, or approximately 3.4×1038 addresses. IPv6 addresses, as commonly displayed to users, consist of eight groups of four hexadecimal digits separated by colons, for example2001:0db8:85a3:0042:0000:8a2e:0370:7334. The deployment of IPv6 is accelerating, with a World IPv6 Launch having taken place on 6 June 2012, in which major internet service providers, especially in countries that had been lagging in IPv6 adoption, deployed IPv6 addresses to portions of their users. Data from Arbor Networks showed a peak of 0.2% of Internet traffic on IPv6 during the launch  IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).  The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. IPv6 Summary 128-bit address space revised header format new options allowance for extension support for special handling of packet flows increased security measures IPv6 uses hexadecimal colon notation with abbreviation methods IPv6 has 3 types of addresses: unicast, anycast, and multicast IPv4, ICMPv4, ARP, RARP, and IGMP replaced with IPv6 and ICMPv6 IPv4 to IPv6 transition strategies are dual stack,
  • 3. tunnelling, and header translation IP Addressing and Routing - addressing refers to how end hosts are assigned IP addresses and how subnetworks of IP host addresses are divided and grouped. -IP routing is performed by all hosts, but most importantly by routers, which typically use either interior gateway protocols (IGPs) or external gateway protocols (EGPs) to decide how to move datagrams among networks. -IP routing is also common in local networks. For example, Ethernet switches sold today support IP multicast.These switches use IP addresses and Internet Group Management Protocol for control of the multicast routing but use MAC addresses for the actual routing. IP versions 0 to 3 were development versions of IPv4 and were used between 1977 and 1979. Version 5 was used by the Internet Stream Protocol, an experimental streaming protocol. Version numbers 6 through 9 were proposed for various protocol models designed to replace IPv4: SIPP (Simple Internet Protocol Plus, known now as IPv6), TP/IX (RFC 1475), PIP (RFC 1621) and TUBA (TCP and UDP with Bigger Addresses, RFC 1347). Other protocol proposals named IPv9 and IPv8 briefly surfaced, but have no support. On April 1, 1994, the IETF published an April Fool's Day joke about IPv9.  Transmission Control Protocol (TCP) -is an example of a protocol that will adjust its segment size to be smaller than the MTU. User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) disregard MTU size, thereby forcing IP to fragment oversized datagrams. Transmission Control Protocol (TCP) The TCP provides reliable transmission of data in an IP environment. TCP corresponds to thetransport layer (Layer 4) of the OSI reference model. Among the services TCP provides are streamdata transfer, reliability, efficient flow control, full-duplex operation, and multiplexing. With stream data transfer, TCP delivers an unstructured stream of bytes identified by sequencenumbers. This service benefits applications because they do not have to chop data into blocks beforehanding it off to TCP. Instead, TCP groups bytes into segments and passes them to IP for delivery. TCP offers reliability by providing connection-oriented, end-to-end reliable packet delivery throughan internetwork. It does this by sequencing bytes with a forwarding acknowledgment number thatindicates to the destination the next byte the source expects to receive. Bytes not acknowledgedwithin a specified time period are retransmitted. The reliability mechanism of TCP allows devicesto deal with lost, delayed, duplicate, or misread packets. A time-out mechanism allows devices to detect lost packets and request retransmission.
  • 4. TCP offers efficient flow control, which means that, when sending acknowledgments back to the source, the receiving TCP process indicates the highest sequence number it can receive without overflowing its internal buffers. Full-duplex operation means that TCP processes can both send and receive at the same time. Finally, TCP’s multiplexing means that numerous simultaneous upper-layer conversations can be multiplexed over a single connection. User Datagram Protocol (UDP) - is one of the core members of the Internet protocol suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple transmission model without implicit handshaking dialogues for providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for delayed packets, which may not be an option in a realtime system.If error correction facilities are needed at the network interface level, an application may use the Transmission Control Protocol (TCP) orStream Control Transmission Protocol (SCTP) which are designed for this purpose.