SlideShare a Scribd company logo
1 of 21
IP ADDRESSING
LUCKY CHAUHAN
BCA
ROLL NO: 26
WHAT IS AN IP ADDRESS?
• “Internet protocol”
• Unique no to an Internet connected
• Links all internet activity back to the device/user
WHY DO WE NEED AN IP ADDRESS?
• Uniquely identifies your device in a network
• Send information from one network to another
• Security reasons
TYPE OF IP ADDRESSES
• Ipv4
• IPv6
HOW IS A IPV4 ADDRESS GENERATED?
• 32-bit numbers
• Using binary
• Decimal system
• Divided into four 8-bit values
• First part identifies the network
• Last part identifies the device in the network
• Supports up to 4.7 billion addresses
HOW MANY PEOPLES USE INTERNET ENABLE
DEVICES?
• About 7 million peoples
• 63.1% of population uses internet
• Each person by have many devices
• Ipv4 supports 4,294,967,296 addresses
There are not
enough
addresses!!!!!
USING NAT
• deficit of ipv4 address
• Limited IP addresses
• NAT(that work address translation) is used
• Translate the address of all devices in a private network
• Convert into one single public address
• Returns back to private network into its original IP address
NAT CONTINUED…
IPV6
• 128-bit address
• Using binary
• Hexadecimal system (0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,andf)
• Divided into parts of 4
• Supports up to 304,
282,366,920,938,463,463,374,607,431,768,211,456 Devices
IPV6 EXAMPLE
DIFFERENT BETWEEN IPV6 AND
IPV4
IP USAGE
• IPv6 was deployed in 2012
• Not every device use IPv6
• Ipv4 and IPv6 are not compatible
• Must be converted to one another
TUNNELING / CONVERSION TOOLS
• Toredo tunneling (IPv6-over-ipv4)
• IPv6-over-ipv4 tunneling
TOREDO TUNNELING
• Solve the problem of trying to use an IPv6 host
• Sending message through the requirement of ipv4 address
• Also solve the problem of getting int NAT Routers
• Use a platform in dendent tunneling protocol
• Encapsulates IPv6 data packet within the ipv4 data protocol
TUNNELING CONTINUED…
• Meant to be “temporary”
• As more device transition into IPv6
• IPv6 uses continues to grow
• Ipv4 and NAT have began to reach their limits
DANGERS WITH IP ADDRESS
• Using IP track someone can get your personal info
• Can locate you geographically
• You can be ddos’d
• All device are not protected
• Heavy cannot with another Person who has an IP tracking
software is all it take to get a hold of your IP address
PROTECTING YOUR IP ADDRESS
• Using VPN
• Proxy server
• Direct tracking software to another IP address/location
• Prevent tracking of your location and giving your personal
information
VPN
• Virtual private network
• Masks your IP as if it where a private network when in a public
network
• Allows remote user and office to securely access corporate
applications
• Can access secure information safely
PROXY SERVER
• Redirects the IP address location to another parts of the world
• Using a proxy server in Laredo,tx mite se you are in Russia
• Some sides block unsecure IP addresses
• Useful for keeping your location safe when tracking
CONCLUSION
• IP addressing in essential
• Helps to communicate between networks
• Ipv4
• IPv6
• Tunneling
• Protecting your IP address
THANK YOU

More Related Content

What's hot

IP Address
IP AddressIP Address
IP AddressRahul P
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classesmail2rajeev10
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to routerFarhan Galib
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 

What's hot (20)

IP Address
IP AddressIP Address
IP Address
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Subnetting
SubnettingSubnetting
Subnetting
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
I pv4 address classes
I pv4 address classesI pv4 address classes
I pv4 address classes
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 

Similar to IP address

CONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxCONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxangelito tomas
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6Syed Arshad
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6Olle E Johansson
 
Network address translation
Network address translationNetwork address translation
Network address translationMohak Kaushik
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoTOliver Müller
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?APNIC
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptxCherryLim21
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation Alee Hassan
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn FortinetDigicomp Academy AG
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoDigicomp Academy AG
 
Watch out - The Norwegian Version
Watch out - The Norwegian VersionWatch out - The Norwegian Version
Watch out - The Norwegian VersionOlle E Johansson
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...Nebraska Library Commission
 

Similar to IP address (20)

Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
 
CONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptxCONFIGURING NETWORK CONNECTIVITY.pptx
CONFIGURING NETWORK CONNECTIVITY.pptx
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6TCP/IP Geeks Stockholm :: Introduction to IPv6
TCP/IP Geeks Stockholm :: Introduction to IPv6
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Ip address.
Ip address.Ip address.
Ip address.
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 
ipv4 to 6
ipv4 to 6ipv4 to 6
ipv4 to 6
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
IPv6
IPv6IPv6
IPv6
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptx
 
Rethinking the PBX
Rethinking the PBXRethinking the PBX
Rethinking the PBX
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
ipv4ppt.pptx
ipv4ppt.pptxipv4ppt.pptx
ipv4ppt.pptx
 
Watch out - The Norwegian Version
Watch out - The Norwegian VersionWatch out - The Norwegian Version
Watch out - The Norwegian Version
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

IP address

  • 2. WHAT IS AN IP ADDRESS? • “Internet protocol” • Unique no to an Internet connected • Links all internet activity back to the device/user
  • 3. WHY DO WE NEED AN IP ADDRESS? • Uniquely identifies your device in a network • Send information from one network to another • Security reasons
  • 4. TYPE OF IP ADDRESSES • Ipv4 • IPv6
  • 5. HOW IS A IPV4 ADDRESS GENERATED? • 32-bit numbers • Using binary • Decimal system • Divided into four 8-bit values • First part identifies the network • Last part identifies the device in the network • Supports up to 4.7 billion addresses
  • 6. HOW MANY PEOPLES USE INTERNET ENABLE DEVICES? • About 7 million peoples • 63.1% of population uses internet • Each person by have many devices • Ipv4 supports 4,294,967,296 addresses There are not enough addresses!!!!!
  • 7. USING NAT • deficit of ipv4 address • Limited IP addresses • NAT(that work address translation) is used • Translate the address of all devices in a private network • Convert into one single public address • Returns back to private network into its original IP address
  • 9. IPV6 • 128-bit address • Using binary • Hexadecimal system (0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,andf) • Divided into parts of 4 • Supports up to 304, 282,366,920,938,463,463,374,607,431,768,211,456 Devices
  • 12. IP USAGE • IPv6 was deployed in 2012 • Not every device use IPv6 • Ipv4 and IPv6 are not compatible • Must be converted to one another
  • 13. TUNNELING / CONVERSION TOOLS • Toredo tunneling (IPv6-over-ipv4) • IPv6-over-ipv4 tunneling
  • 14. TOREDO TUNNELING • Solve the problem of trying to use an IPv6 host • Sending message through the requirement of ipv4 address • Also solve the problem of getting int NAT Routers • Use a platform in dendent tunneling protocol • Encapsulates IPv6 data packet within the ipv4 data protocol
  • 15. TUNNELING CONTINUED… • Meant to be “temporary” • As more device transition into IPv6 • IPv6 uses continues to grow • Ipv4 and NAT have began to reach their limits
  • 16. DANGERS WITH IP ADDRESS • Using IP track someone can get your personal info • Can locate you geographically • You can be ddos’d • All device are not protected • Heavy cannot with another Person who has an IP tracking software is all it take to get a hold of your IP address
  • 17. PROTECTING YOUR IP ADDRESS • Using VPN • Proxy server • Direct tracking software to another IP address/location • Prevent tracking of your location and giving your personal information
  • 18. VPN • Virtual private network • Masks your IP as if it where a private network when in a public network • Allows remote user and office to securely access corporate applications • Can access secure information safely
  • 19. PROXY SERVER • Redirects the IP address location to another parts of the world • Using a proxy server in Laredo,tx mite se you are in Russia • Some sides block unsecure IP addresses • Useful for keeping your location safe when tracking
  • 20. CONCLUSION • IP addressing in essential • Helps to communicate between networks • Ipv4 • IPv6 • Tunneling • Protecting your IP address