CONET PROJECT
Launch CONETSilent Pass VPN
  • Welcome To CONET
    • Introduction
    • Background
      • Personal Information
        • Collection Of Personal Information
        • New Business Opportunities
          • AI
          • CLOUD COMPUTING
          • SEARCH ENGINE
          • BLOCKCHAIN
      • Decentralized Physical Infrastructure Network
    • CONET Manifesto
    • CONET Philosophy
  • Core Technology
    • How CoNET Works: Decentralized, Private, and Secure
    • Wallet-to-Wallet encrypted network communication protocol
      • Internet Protocol
        • TCP/IP Protocol
        • Internet TCP/IP Communication Privacy Threats
        • Internet Privacy Communication Solutions
      • Layer Minus Protocol
        • Layer Minus
        • Privacy Threats of the Layer Minus Protocol
    • CONET Platform
      • CONET Wallet
    • CONET Power Card
  • CoNET DePIN Blockchain
  • Staking
  • Nodes
    • Node Benefits for Guardians and CoNETian NFT
  • Silent Pass Proxy/VPN
    • B2B and B2C Solution
    • VPN vs Proxy
    • Silent Pass CDN
  • RPC
  • Tokenomics
    • Token Economic Model
    • Utilities and Economic
    • CONET Consensus Protocol
    • Token Distribution
    • Community-Driven Vision for Web3
  • Early Access Plans
    • Guardian Plan
      • Guardian Plan V2
    • The Conetian Plan
  • Community Incentive Program
    • The CoNETian Minigame
  • Road Map
  • Resource
  • CoNET DePIN Uniswap v4 Deployments
  • CoNET Decentralized Bridge
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Core Technology
  2. Wallet-to-Wallet encrypted network communication protocol
  3. Internet Protocol

TCP/IP Protocol

Computers communicate by uniquely identifying TCP/IP addresses

Last updated 1 year ago

Was this helpful?

TCP/IP provides a point-to-point connection mechanism that standardizes how data should be encapsulated, addressed, transmitted, routed, and received at the destination.

When a device is connected to the network, the device will be assigned an IP address, which is used as a unique identifier. Devices can communicate with each other through IP addresses on the Internet around the world. Without an IP address, we have no way of knowing which device is the sender and which is the receiver. An IP address has two main functions: identifying a device or network and addressing it.

IP address space allocation

IP address leasing

Virtual tunnel concept

Through the layering concept, Internet communication can be simplified into host-to-host network communication and application-to-application network communication.

In 1981, the defined IPv4 for 32-bit IP addresses. With the development of the Internet, IPv4 was gradually allocated and exhausted. Its upgraded version, , was officially announced by the in the form of Internet Standards Specification () in December 1998.

IP address space, whether IPv4 or IPv6, is allocated globally by the centralized Internet Assigned Numbers Authority () and five other regional Regional Internet Registries () are assigned to the Internet within their designated area.

When users use the Internet, they need to complete (Know Your Customer) procedures with the before they can rent a globally unique IP address from an ISP.

Due to the complex structure of the Internet, routing determines how two computers find each other and find a suitable best path. The is the key facility that determines how to forward an and connect to each other on the Internet. IP packets can pass through multiple routes, but there is no guarantee that they will arrive or that they will arrive in order.

IETF
IPv6
Internet Engineering Task Force
RFC 2460
IANA
RIR
KYC
Internet service provider
Routing
router
IP data packet
IP Address