SlideShare a Scribd company logo
1 of 10
 The IP or Internet Protocol is the
fundamental protocol for communications on
the Internet.
It specifies the way information is packetized,
addressed, transferred, routed, and received
by networked devices.
Its development began in 1947, led by computer scientists
Bob Kahn and Vint Cerf. It is frequently used in conjunction
with the Transmission Control Protocol or TCP. Together
they are referred to as TCP/IP.
The first major version of the Internet Protocol was version 4
or IPv4. In 1981, it was formally defined in RFC 791 by the
Internet Engineering Task Force or IETF.
The successor to IPv4 is IPv6, which was formalized by the
IETF in 1998. It was designed to eventually replace IPv4. As of
2018, IPv6 governs approximately 20% of all Internet traffic.
It is a number identification of a computer or
another device on the Internet. It is similar to a
mailing address which identifies where postal
mail comes from and where it should be
delivered.
IP addresses uniquely identify the source and
destination of data transmitted with the Internet
Protocol.
 With an IPv4 IP address, there are five classes of available IP ranges: Class A,
Class B, Class C, Class D and Class E.
 The table below shows the summary of the IP classes.
NOTE: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and
is reserved for loopback testing.
 IP addresses are assigned in two different ways.
They may be dynamically assigned or statically assigned.
Dynamically assigned means the IP address can change automatically and
statically assigned means they are intended not to change automatically and
must be changed manually.
 Most home networks use dynamic allocation including our laptops, mobile
devices and tablets. Your router uses DHCP to temporarily assign or lease an IP
address to your device. After a period of time, this lease expires and the router
renews your old address or assigns you a new one depending on the needs of
the network and configuration of the router.
 The following diagram
illustrates how your
home computer might
obtain IP address and
send data to an IP
address on another
network.

More Related Content

Similar to Introduction-to-Internet-Protocol.pptxnc2

As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxcargillfilberto
 
computer-networking-project-proposal.pptx
computer-networking-project-proposal.pptxcomputer-networking-project-proposal.pptx
computer-networking-project-proposal.pptxkabna10paul
 
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdf
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdfIPV6 is the replacement for IPV4. This shows a lack of vision when t.pdf
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdfarumugambags
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 
Ipv4 To Ipv6 Transition
Ipv4 To Ipv6 TransitionIpv4 To Ipv6 Transition
Ipv4 To Ipv6 TransitionHeidi Owens
 
Tcp ip protocol
Tcp ip protocol Tcp ip protocol
Tcp ip protocol saurav-IT
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6alibefkani
 
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfIPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfformicreation
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar pptSmriti Rastogi
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6Manesh Sharma
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsrajshreemuthiah
 

Similar to Introduction-to-Internet-Protocol.pptxnc2 (20)

Internet protocol
Internet protocolInternet protocol
Internet protocol
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docx
 
computer-networking-project-proposal.pptx
computer-networking-project-proposal.pptxcomputer-networking-project-proposal.pptx
computer-networking-project-proposal.pptx
 
Unit III
Unit IIIUnit III
Unit III
 
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdf
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdfIPV6 is the replacement for IPV4. This shows a lack of vision when t.pdf
IPV6 is the replacement for IPV4. This shows a lack of vision when t.pdf
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
Ipv4 To Ipv6 Transition
Ipv4 To Ipv6 TransitionIpv4 To Ipv6 Transition
Ipv4 To Ipv6 Transition
 
Hardware9
Hardware9Hardware9
Hardware9
 
Ccna1v3 mod09
Ccna1v3 mod09Ccna1v3 mod09
Ccna1v3 mod09
 
Tcp ip protocol
Tcp ip protocol Tcp ip protocol
Tcp ip protocol
 
Week 6 osi-tcp
Week 6    osi-tcpWeek 6    osi-tcp
Week 6 osi-tcp
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfIPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
 

Recently uploaded

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 

Introduction-to-Internet-Protocol.pptxnc2

  • 1.
  • 2.
  • 3.
  • 4.  The IP or Internet Protocol is the fundamental protocol for communications on the Internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices.
  • 5. Its development began in 1947, led by computer scientists Bob Kahn and Vint Cerf. It is frequently used in conjunction with the Transmission Control Protocol or TCP. Together they are referred to as TCP/IP. The first major version of the Internet Protocol was version 4 or IPv4. In 1981, it was formally defined in RFC 791 by the Internet Engineering Task Force or IETF. The successor to IPv4 is IPv6, which was formalized by the IETF in 1998. It was designed to eventually replace IPv4. As of 2018, IPv6 governs approximately 20% of all Internet traffic.
  • 6. It is a number identification of a computer or another device on the Internet. It is similar to a mailing address which identifies where postal mail comes from and where it should be delivered. IP addresses uniquely identify the source and destination of data transmitted with the Internet Protocol.
  • 7.
  • 8.  With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E.  The table below shows the summary of the IP classes. NOTE: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback testing.
  • 9.  IP addresses are assigned in two different ways. They may be dynamically assigned or statically assigned. Dynamically assigned means the IP address can change automatically and statically assigned means they are intended not to change automatically and must be changed manually.  Most home networks use dynamic allocation including our laptops, mobile devices and tablets. Your router uses DHCP to temporarily assign or lease an IP address to your device. After a period of time, this lease expires and the router renews your old address or assigns you a new one depending on the needs of the network and configuration of the router.
  • 10.  The following diagram illustrates how your home computer might obtain IP address and send data to an IP address on another network.