Traditional Culture Encyclopedia - Traditional festivals - What does IP mean in posting?
What does IP mean in posting?
2. is the abbreviation of the English Internet Protocol, meaning "the protocol for interconnection between networks", that is, for computer networks connected to each other to communicate and design the protocol. In the Internet, it is able to connect to the network of all computer networks to achieve mutual communication of a set of rules, the rules should be observed by computers to communicate on the Internet. Any manufacturer of computer systems, as long as they comply with the IP protocol can be interconnected with the Internet. It is because of the IP protocol, the Internet can quickly develop into the world's largest, open computer communications network. Therefore, the IP protocol can also be called the "Internet Protocol".
-How does IP interconnect networks? The IP protocol is actually a set of protocol software composed of software programs, which puts the various "frames" in different formats. Different "frame" unified into "IP datagram" format, this conversion is one of the most important features of the Internet, so that all kinds of computers can be realized on the Internet interoperability, that is, with "openness
-This conversion is one of the most important features of the Internet, enabling all kinds of computers to interoperate on the Internet, which is characterized by "openness.
-What is a "datagram"? And what are its characteristics? The datagram is also a form of packet switching, in which the transmitted data is segmented into "packets" and then transmitted. However, unlike the traditional "connection type" packet switching, it is a "connectionless type", in which each "packet" (subgroup) is treated as a Each "packet" (group) is transmitted as a "separate message", so it is called a "datagram". In this way, there is no need to connect a circuit before starting communication, and each datagram is not necessarily transmitted through the same path, so it is called "connectionless". This is a very important feature that greatly improves the robustness and security of the network.
--Each datagram has a header and the text of the two parts, the header has the destination address and other necessary content, so that each datagram does not go through the same path can accurately reach the destination. At the destination reassembled to restore the original data sent. This requires IP to have the function of packet packing and collection assembly.
--In the actual transmission process, the datagram should also be able to change the length of the datagram according to the size of the packet through the network to change the length of the datagram, IP datagrams can be up to a maximum length of 65535 bytes.
--The IP protocol also has a very important content, that is, to each computer and other devices on the Internet have a unique address, called "IP address". This unique address ensures that users can efficiently and easily select the objects they need from millions of computers when operating on a networked computer.
--The telecom network is now converging with the IP network, and new IP-based technologies are popular, such as the technology of transmitting voice over IP network (i.e., VoIP) is very popular, and others, such as IP over ATM, IP over SDH, IP over WDM, etc., are the focus of research on IP technology. technology research focus. (
IPv6 stands for "Internet Protocol Version 6" and is also known as the next-generation Internet protocol, which was designed by the IETF group (Internet Engineering Task Force) to replace the current IPv4 (current IP) protocol. current IP) protocol.
We know that Internet hosts have a unique IP address, which is a 32-bit binary number that represents a host number, but 32-bit address resources are limited, and can no longer meet the needs of users, so the Internet Research Organization released a new host identification method, IPv6. in RFC1884 (RFC is the acronym for Request for Comments Document. In RFC1884 (RFC is the abbreviation of Request for Comments Document. RFC is actually some of the standards of the Internet related services), the standard syntax of the regulation suggests that the 128 bits (16 bytes) of the IPv6 address should be written as eight 16-bit unsigned integers, and each integer is represented by four hexadecimal bits, which are separated from each other by colons (:), such as :3ffe:3201:1401:1280:c8ff:fe4d:db39
IPv6 has the following features relative to today's IP (i.e., IPv4):
Extended Addressing Capabilities
IPv6 extends the length of an IP address from 32 to 128 bits, supports more levels of the address hierarchy, more addressable number of nodes, and simpler address autoconfiguration. Scalability for multipoint transport routing was improved by adding a "scope" field to multicast addresses. A new address type, called an "anycast address," was also defined for sending packets to any of a group of nodes;
Simplified Header Format
Several IPv4 header fields have been removed or made optional to reduce the consumption of routines in packet processing and limit the amount of bandwidth consumed by IPv6 headers;
The IPv6 header format has been simplified by adding a "range" field to the multicast address, and by adding a "range" field to the multicast address. bandwidth consumed in packet processing;
Improvements to Extended Header and Option Support
Changes to the way IP header options are encoded can improve forwarding efficiency, allow for looser restrictions on option lengths, and provide greater flexibility to introduce new options in the future;
Capability of Identifying Streams
A new capability has been added to make identifying streams that fall under the requirements of senders for
Authentication and encryption capabilities
Extended capabilities to support authentication, data integrity, and (optionally) data confidentiality are specified in IPv6. extended capabilities for data confidentiality.
Intellectual Property Rights (IPR) are the exclusive rights enjoyed by citizens, legal persons or other organizations in accordance with the law to the intellectual achievements accomplished by creative labor in science and technology or in culture and art.
IP (short for Intellectual Property) Intellectual Property Rights
Intellectual Property Rights include two parts: industrial property rights and copyrights (called copyrights in China). Industrial property rights include patents, trademarks, service marks, trade names, appellations of origin, and the suppression of unfair competition. Copyright is the legal provisions of a unit or individual on a work of art to enjoy the right to print and publish and sell, anyone to copy, translate, adapt or perform need to get the permission of the copyright holder, otherwise it is the infringement of the rights of others. The essence of intellectual property rights is to treat human intellectual achievements as property.
Trademark right refers to the trademark competent authority in accordance with the law to grant the trademark owner of its registered trademark by the state law protection of the exclusive right. Trademark is used to distinguish between different sources of goods and services of commercial signs, by words, graphics, letters, numbers, three-dimensional signs, color combinations or a combination of the above elements. Trademark rights in China must fulfill the trademark registration procedures, and the principle of application first.
Copyright is a civil right enjoyed by the original creator of literary, artistic, scientific and technological works, in accordance with the law.
Patent and patent protection refers to an invention and creation to the State Patent Office to file a patent application, after the examination and approval in accordance with the law, to the patent applicant to grant the exclusive right to the invention and creation within a specified period of time. After the invention is granted a patent, the patentee has the exclusive right to the invention, any unit or individual without the permission of the patentee shall not implement its patent, that is, shall not for the purpose of production and management of manufacturing, use, promise to sell, sale and import of its patented products. Without the permission of the patentee, the implementation of its patent is an infringement of its patent right, causing disputes, the parties involved in the negotiation to resolve; unwilling to negotiate or consultation fails, the patentee or the person in a strong relationship with the people's court, or request the management of the patent work of the department to deal with. Patent protection adopts the protection mode of "two ways, parallel operation and judicial guarantee" for judicial and administrative enforcement. The administrative protection of the region to adopt the patent law enforcement in the form of roving law enforcement and joint law enforcement, focusing on group infringement, repeated infringement and other serious disruptions to the patent rule of law environment to intensify efforts to combat the phenomenon.
Three characteristics of intellectual property rights
1, the proprietary nature of intellectual property rights, i.e., exclusive or monopoly;
2, the territorial nature of intellectual property rights, i.e., valid only in the territory recognized and protected;
3, the temporal nature of intellectual property rights, i.e., protected only for a specified period of time.
IP address
IP address is the basis for data transmission in an IP network, it identifies a connection in the IP network, a host can have more than one IP address. the IP address in the IP packet is kept constant in the network transmission.
1. Basic Address Format
Nowadays, IP networks use 32-bit addresses in dotted decimal notation, such as 172.16.0.0. The address format is: IP address = network address + host address or IP address = host address + subnet address + host address.
Network addresses are assigned by the Internet authority (InterNIC) to ensure that network addresses are globally unique. Host addresses are assigned by the system administrator of each network. Thus, the uniqueness of the network address and the uniqueness of the host address within the network ensure the global uniqueness of the IP address.
2. Assignment of Reserved Addresses
IP addresses can also be broadly categorized into two types, depending on their use and level of security: public **** addresses and private addresses. Public addresses are used in the Internet and can be accessed at will in the Internet. Private addresses can only be used in internal networks and can only communicate with the Internet through a proxy server.
To connect to the Internet, an organization or network must apply for a public IP address. However, in consideration of special circumstances such as network security and internal experiments, three areas are reserved exclusively for private addresses in the IP address, with the following address ranges:
10.0.0.0/8: 10.0.0.0 to 10.255.255.255
172.16.0.0/12: 172.16.0.0 to 172.31. 255.255
192.168.0.0/16: 192.168.0.0 to 192.168.255.255
Networks that use reserved addresses can only communicate internally and cannot interconnect with other networks. Because the reserved addresses in this network may also be used by other networks, interconnecting the networks can cause problems in finding routes because the addresses are not unique. However, these networks using reserved addresses can interconnect to external networks by translating the reserved addresses within the network into public *** addresses. This is one of the most important ways to ensure network security.
The general trend or is network addresses.
- Related articles
- English composition about private cars
- dnf hanfu hand tour spot map female warrior which is strong
- What colors do Jinmu Fire, Water and Earth correspond to, and how do the five elements of Jinmu Fire, Water and Earth match?
- The contents of the March week curriculum of the big class
- Why is Pu 'er tea packed in paper?
- Szechuan brine brine how to adjust
- I live in Nanjing Qinhuai District home roof has obvious cracks to find what departments
- Where are the old pillows?
- yangshan middle school
- Is the hot pot leftover from others? Do you want to continue eating?