Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Internet Protocols (IP)

By Exforsys | on March 5, 2008 |
Networking

Internet Protocols (IP)

For the internet to work every computer and every system connecting to the internet must has an Internet Protocol. The internet protocol is a library of communication protocols which talk to networks and enable data transfers. The Internet Protocol is an open source protocol and is well suited for LAN and WAN networks. The internet communication protocols are of two kinds and the computers need both of them to communicate over the internet. They are called the TCP or the Transmission Control Protocol and the IP or the Internet Protocol.

The common applications like E-mail, file transfers take place using the TCP/IP. The application of the Internet Protocols is not limited to e-mails and data transfers; there are many facets in which TCP/IP is used and it is branched out in many directions.

IP Addresses

The Internet Protocol address is an individual address allocated by the server to the computer that is trying to establish a connection with it. The server identifies the computer using this IP Address which is a number on the network. The IP Address is stored in the Transmission control protocol. The IP address is made up of various components and it follows a specific format.

The IP Address is a 32 bit logical address and the number signifies the network number and the host number. The number is divided using decimals and these IP addresses can be used to sub network.

The Internet Protocol

The architecture of the Internet Protocol is based on 3 layers and these 3 layers contain information about network addresses and the data packets. The primary network layer among the 3 layers will hold the IP address. The other crucial part of the Internet Protocol is the Internet packets which carries data in them. These packets are transmitted using the IP and TCP to and fro on the internet. The IP packets follow a specific format so that they can be identified by the computers and they are directed to the right location.

IP Packet Format

• The IP Packet contains the version of the Internet Protocol that is being used. This information helps to establish compatibility with various protocols.

• The IP Header length contains information about the length of the datagram and each header is about 32 bits long.

• The type of service is also specified by the datagram and the upper layer of the Internet Protocol also specifies how the datagram should be handled by other services.

• The total length is a specification that contains the length of the message in bytes and it also includes the information about the data and the header.

• The Identification part of the IP Packet contains an integer that actually represents the datagram and when the different datagram’s are being put together these integers come in handy.

• The flags within the IP Packets have three fragments which contains information about how the packet has to be distributed.

• Time to live or TTL is a pre determined amount of time that lets the packet last for the pre determined time. Every Internet Protocol packet can only live for sometime and before that if it doesn’t reach the destination or if it is idling for along time then the packet becomes invalid and loses the information within it.


Conclusion

Without the Internet Protocols nothing can work on the internet. Internet Protocols have to be updated on a frequent basis and the versions have to be update so that they can communicate efficiently on the internet. IP addressing system and the transmission control systems together handle the entire data transfers. Complicated networks and simple networks need the basic TCP/IP to function on the internet.

« « Tree Topology
Point to Point Protocol (PPP) » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 394 Followers
  • Popular
  • Recent
  • Home Networking

    February 25, 2008 - 0 Comment
  • Subnetting

    March 17, 2008 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Web Server

    February 26, 2008 - 0 Comment
  • Frame Relay

    March 17, 2008 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Print Servers

    February 26, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Virtual Private Network (VPN)

    February 28, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT