What is an IP packet?
Computers are not only an integral part of today's world, but have become a passion. Hotels, cafes and even the black neighborhood made access to the Internet and responded to the demand for connection. But how does information travel across cyberspace from one computer to another? Like Trek's Transporter, the information is discussed to small data blocks, sent independently of the destination address, and then re -assembled at the reception end. Each data block is known as IP packet .
Every time you connect to the Internet, your Internet service provider assigns your computer a unique numeric address. This unique address identifies the computer in the network to request and receive information. The address is known as the internet protocol (IP) . When you start a request, such as clicking on a link in your web browser, the request travels over the Internet in the form of stamps with your IP address. Therefore, IP packets .
Due to the network structure, small IP packets work more efficiently than large packets. One large IP packet would not only take longer, but the conditions with high traffic would clog the network quickly. Sending smaller packets (up to about 1500 bytes) has the advantage of moving more traffic through the available routes at a faster pace with less chance to create narrow places. As a result, each IP packet travels independently, led by routers , which reads the target address and passes the packet along the fastest available route. Packets are re -assembled at the target address.
The protocol responsible for organizing IP packet movement through cyberspace is a transmission control protocol, better known as TCP. TCP is "layered" at the top of the address report (IP) to break the requirements for small packets, monitor the arrival of each IP packet to the destination address, invite you to transmit missing packets andRe -assemble packets to the original form. This set of protocol is known as TCP/IP, a term probably known to anyone who sets an Internet connection.
Each IP packet carries essential information that allows TCP to be manipulated properly. The "DNA" of the IP packet includes, inter alia, the size of the IP packet, the sender and the target addresses, and the useful load or the data sent. The numbering of packets, errors of errors and fragmentation, with a stamp at the end of life is also included to avoid losing lost packets infinitely in cyberspace as unhealthy operation. Packets that do not get to the finish in time are simply discarded.
Successful transmission is processed by a web server that responds by sending the desired website that is in itself divided into IP packets for a return journey to the computer screen. These rush Ing packets are "Superhighway information".
While TCP/IP may sound connected, it works faster than Trek's Transporter as normalítek. So what happens to the occasional slow aspects? Assuming your computer is able to quickly process the content of the page, the slowed load may be caused by third -party advertising servers or a busy site that processes more requirements than its hardware can conveniently juggle.
Despite the robust nature of TCP/IP, the protocol is a disadvantage. Anyone can "listen" what is transmitted between your computer and the Internet without your knowledge. How is it possible?
A typical IP packet can go through, although several routers and servers before reaching the target. Specialized software or hardware can "capture" a data packet at any moment and before handing over. The stolen copy of the interllood can be analyzed and read at will, as IP packet payloreclama, are sent as a simple text, sometimes referred to as "in clear". The tools that capture IP packets are known as "sniffers packet".
network administrators legitimately use snifflers of packets to remove problemsWith networks of local areas (LAN) and for filtering unwanted traffic coming from the Internet. The coercive bodies may impose sniffing of packets on the Internet service provider to monitor part or all its operation, if the provider agrees or is forced to comply with the law. Sniffers packets, however, can also be used virtually anyone to easily eavesdrop, or worse, stole sensitive information, such as passwords and usernames sent through unencrypted channels.
with theft of identities on the rise and concern about privacy at all times at the highest, best way to protect yourself from packet snags is to use encryption for all transmissions that contain personal data. Encrypted packets are unreadable on the route and are only decrypted at the target address.
Online retailers already provide Secure, encrypted connection to pass data between computer and web. You want to check encryption, search in the web browser's address box http with . This special "S" means security and indicates all traffic between the computer and the web server is encrypted. Your computer will still generate IP packets, but part of the payload of the IP packet will be in illegible encryption, protects credit cards, bank accounts and other highly sensitive information from curious eyes.
Since the IP package is also used for e -mail, file conversions, telnet and other network services, you can also decide to encrypt more transmissions. quite good privacy (PGP) , an encryption program of the military degree, can automatically encrypt the mail to several popular e -mail programs. Privacy GNU (GPG), based on the same source code, but part of Free Foundation, is another encryption program. The GPG used with the enigma plugin provides Mozilla ™ Thunderbird ™ with fully automated and easy -to -use encryption.
Surf on the web can be encrypted via securityH services online, although it could slow down surfing and is probably excessive for the average person. Surfing with the proxy anonymous servers that sit between your computer and the Internet is a more common alternative for those who want to surf anonymously.
Other protocols can be associated with TCP/IP to create another "apartment" that can accommodate different types of network environments and hardware. In special situations, TCP is sometimes replaced by User DataGram Protocol (UDP) , but does not provide any mechanism for losing IP packets, lacking the ability to require TCPS to require repeated transmissions. Network network hosts can use several other router information exchanges such as Internet Control Message Protocol (ICMP) , interior and exterior gates (IGP/EGP) and Border Gateway Protocol (BGP) .
Using the Internet from the well -known environment of a home or school causes many people, especially children, feelA false sense of security and privacy. The basic understanding of the "vulnerability" of the IP packet and the ubiquitous availability of sniffers packets must always be checked before sharing sensitive information online. The rule is that anything that travels should be considered public and not private.