CONET PROJECT
Launch CONETSilent Pass VPN
  • Welcome To CONET
    • Introduction
    • Background
      • Personal Information
        • Collection Of Personal Information
        • New Business Opportunities
          • AI
          • CLOUD COMPUTING
          • SEARCH ENGINE
          • BLOCKCHAIN
      • Decentralized Physical Infrastructure Network
    • CONET Manifesto
    • CONET Philosophy
  • Core Technology
    • How CoNET Works: Decentralized, Private, and Secure
    • Wallet-to-Wallet encrypted network communication protocol
      • Internet Protocol
        • TCP/IP Protocol
        • Internet TCP/IP Communication Privacy Threats
        • Internet Privacy Communication Solutions
      • Layer Minus Protocol
        • Layer Minus
        • Privacy Threats of the Layer Minus Protocol
    • CONET Platform
      • CONET Wallet
    • CONET Power Card
  • CoNET DePIN Blockchain
  • Staking
  • Nodes
    • Node Benefits for Guardians and CoNETian NFT
  • Silent Pass Proxy/VPN
    • B2B and B2C Solution
    • VPN vs Proxy
    • Silent Pass CDN
  • RPC
  • Tokenomics
    • Token Economic Model
    • Utilities and Economic
    • CONET Consensus Protocol
    • Token Distribution
    • Community-Driven Vision for Web3
  • Early Access Plans
    • Guardian Plan
      • Guardian Plan V2
    • The Conetian Plan
  • Community Incentive Program
    • The CoNETian Minigame
  • Road Map
  • Resource
  • CoNET DePIN Uniswap v4 Deployments
  • CoNET Decentralized Bridge
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Core Technology
  2. Wallet-to-Wallet encrypted network communication protocol

Internet Protocol

The Internet was not created with security and privacy in mind

Last updated 1 year ago

Was this helpful?

The Internet is composed of hardware infrastructure and software infrastructure. The hardware infrastructure consists of client computers, routers, and (routers, ISP access hubs, fiber optic cables, switches, satellites and submarine cables of the backbone network, etc.). Software infrastructure consists of , , login systems, , etc.

The model partitions the flow of data in a communication system into seven to describe networked communication from the physical implementation of transmitting across a to the highest-level representation of data of a . Each intermediate layer serves a class of functionality to the layer above it and is served by the layer below it. Classes of functionality are realized in all software development through all standardized .

The two major international organizations that play a major role in formulating standards are: International Telecommunication Union Telecommunication Standardization Sector () and the International Standards Organization (). These standards allow computers of different types and operating systems around the world to communicate with each other.

computer network
ITU-T
ISO
critical Internet infrastructure
communication protocols
domain name systems
data centers
OSI model
abstraction layers
bits
communications medium
distributed application
communication protocols