1. is the abbreviation of intellectual property, which means intellectual property.
2. It is the abbreviation of English Internet Protocol, which means "protocol for interconnection between networks", that is, a protocol designed for computer networks to communicate with each other. In the internet, it is a set of rules that can make all computer networks connected with the internet communicate with each other, and stipulates the rules that computers should abide by when communicating on the internet. As long as it conforms to the IP protocol, any computer system produced by any manufacturer can be interconnected with the Internet. It is precisely because of the IP protocol that the Internet has rapidly developed into the largest and most open computer communication network in the world. Therefore, IP protocol can also be called "Internet protocol".
IP-used by young people in the new district to be criticized and educated by their elders or teachers, meaning "criticized"!
-How does IP realize network interconnection? Network systems and devices produced by different manufacturers (such as Ethernet and packet-switched networks) cannot communicate with each other. The main reason why they can't communicate with each other is that the formats of the basic units (technically called "frames") of the data they transmit are different. IP protocol is actually a set of protocol software composed of software programs, which converts various "frames" into "IP datagram" format. This transformation is one of the most important features of the Internet, which enables all kinds of computers to communicate with each other on the Internet, that is, it has the characteristics of "openness".
-So, what is a datagram? What are its characteristics? Datagram is also a form of packet switching, that is, the transmitted data is segmented into "packets" before transmission. But unlike the traditional "connected" packet switching, it belongs to the "connectionless" type, and each typed "packet" is sent as an independent message, so it is called "datagram". In this way, there is no need to connect the circuit before starting communication, and all datagrams may not be transmitted through the same path, so it is called "connectionless". This feature is very important, which greatly improves the robustness and security of the network.
-Each datagram has two parts, a header and a message. The header contains necessary contents, such as the destination address, so that each datagram can reach the destination accurately without going through the same path. Recombined and restored to the original data at the destination. This requires IP to have the function of package encapsulation and assembly.
-In the actual transmission process, the length of datagram can be changed according to the packet size specified through the network, and the maximum length of IP datagram can reach 65535 bytes.
Another important content in the IP protocol is to give every computer and other equipment on the Internet a unique address, which is called "IP address". Because of this unique address, when users operate on networked computers, they can effectively and conveniently select the objects they want from thousands of computers in Qian Qian.
-At present, telecommunication networks are merging with IP networks, and new technologies based on IP are hot technologies, such as VoIP. Others, such as IP over ATM, IPover SDH and IP over WDM, are hot topics in IP technology research. (IP global network)
IPv6 is the abbreviation of "Internet Protocol Version 6", also known as the next generation Internet protocol. It is a new IP protocol designed by IETF (Internet Engineering Task Force) to replace the current IPv4 (current IP) protocol.
As we know, all Internet hosts have a unique IP address, and the IP address represents a host number with a 32-bit binary number. However, 32-bit address resources are limited, which can no longer meet the needs of users. Therefore, some Internet research organizations have released a new host identification method, namely IPv6. In RFC 1884 (RFC is the abbreviation of document for soliciting opinions. RFC is actually some Internet standards about services), and the stipulated standard syntax suggests that the 128 bits (16 bytes) of IPv6 address be written as an unsigned integer with 8 bits 16, each integer is represented by 4 hexadecimal bits, and these numbers are separated by a colon (:), for example: 3ffe: 320/.
Compared with the current IP (namely IPv4), IPv6 has the following characteristics:
Extended addressing capability
IPv6 extends the length of IP address from 32 bits to 128 bits, supporting more levels of address hierarchy, more addressable nodes and simpler address automatic configuration. By adding a "range" domain to the multicast address, the scalability of multicast routing is improved. A new address type called "anycast address" is also defined to send packets to any node in the group.
Simplified title format
Some IPv4 header fields have been deleted or become optional fields to reduce the consumption of routine processing in packet processing and limit the bandwidth consumed by IPv6 headers.
Improvements to Extended Title and Option Support
The change of IP header option coding method can improve forwarding efficiency, make the restriction of option length more relaxed, and provide greater flexibility for introducing new options in the future;
Ability to identify streams
A new capability is added, which makes it possible to identify packets belonging to a specific communication "stream" that the sender needs special treatment (such as "real-time" service for non-default quality of service);
Authentication and encryption functions
IPv6 specifies extended functions to support authentication, data integrity and (optionally) data confidentiality.
Intellectual property refers to the exclusive rights enjoyed by citizens, legal persons or other organizations in science and technology or culture and art for the intellectual achievements obtained by creative labor.
Ip (short for intellectual property) intellectual property.
Intellectual property rights include industrial property rights and copyrights (called copyrights in China). Industrial property rights include patents, trademarks, service marks, names of manufacturers, names of countries of origin and prevention of unfair competition. Copyright refers to the right of a unit or individual to print, publish and sell a work according to law. Anyone who wants to copy, translate, adapt or perform needs permission from the copyright owner, otherwise it will infringe on the rights of others. The essence of intellectual property rights is to treat human intellectual achievements as property.
Trademark right refers to the exclusive right given by national laws to trademark owners to protect their registered trademarks. A trademark is a commercial symbol used to distinguish goods and services from different sources. It consists of words, graphics, letters, numbers, three-dimensional symbols, color combinations or combinations of the above elements. The acquisition of trademark rights in China must fulfill the trademark registration procedure and implement the principle of first application.
Copyright is the creator and creator of literary, artistic and scientific works, and it is a civil right enjoyed by their works according to law.
Patent right and patent protection refer to the patent application filed with the State Patent Office, and after passing the examination according to law, the patent applicant is granted the exclusive right to enjoy the invention and creation within a specified time. After an invention-creation is granted a patent right, the patentee enjoys exclusive rights to his invention-creation. No unit or individual may exploit its patent without the permission of the patentee, that is, it may not manufacture, use, promise to sell, sell or import its patented products for production and business purposes. Without the permission of the patentee, the implementation of his patent will infringe his patent right and cause disputes, which shall be settled by the parties through consultation; Unwilling to negotiate or if negotiation fails, the patentee or interested party may bring a lawsuit to the people's court or request the administrative department for patent affairs to handle it. Patent protection adopts the protection mode of "two-way parallel and judicial guarantee" between judicial and administrative law enforcement. The administrative protection in this area takes the form of patrol law enforcement and joint law enforcement, focusing on cracking down on group infringement, repeated infringement and other phenomena that seriously disturb the patent legal environment.
Three characteristics of intellectual property rights
1, exclusivity of intellectual property, that is, exclusivity or monopoly;
2. The regionality of intellectual property, that is, it is only valid in the confirmed and protected areas;
3, the timeliness of intellectual property rights, that is, only within the prescribed protection period.
IP address; network address
IP address is the basis of data transmission in IP network. It identifies a connection in an IP network, and a host can have multiple IP addresses. The IP address in the IP packet remains unchanged in the network transmission.
1. Basic address format
The current IP network uses 32-bit addresses, which are expressed in dotted decimal system, such as 172 438+06.0.0. Address format: IP address = network address+host address or IP address = host address+subnet address+host address.
Network addresses are uniformly assigned by Internet Administration (InterNIC) to ensure the global uniqueness of network addresses. The host address is assigned by the system administrator of each network. Therefore, the uniqueness of network address and the uniqueness of host address in the network ensure the global uniqueness of IP address.
2. Allocation of reserved addresses
According to different purposes and security levels, IP addresses can also be roughly divided into two categories: public addresses and private addresses. Public addresses are used on the Internet and can be accessed at will. Private addresses can only be used in internal networks, and only through proxy servers can they communicate with the Internet.
Organizations or networks must apply for a public IP address to connect to the Internet. However, considering the special circumstances such as network security and internal experiments, three areas are reserved as private addresses in the IP address, and their address ranges are as follows:
10.0.0.0/8: 10.0.0.0~ 10.255.255.255
172. 16.0.0/ 12: 172. 16.0.0~ 172.3 1.255.255
192. 168.0.0/ 16: 192. 168.0.0~ 192. 168.255.255
Networks using reserved addresses can only communicate internally and cannot be interconnected with other networks. Because the address reserved in this network may also be used by other networks, if the network is interconnected, there will be problems in finding routes because the addresses are not unique. However, these networks using reserved addresses can be interconnected with external networks by converting the reserved addresses in their own networks into public addresses. This is also one of the important methods to ensure network security.
The concept of IP is very broad, including brand, trademark, copyright, and most importantly, business secrets, business models, business standards and so on.
The amount of intellectual property ownership is the most important symbol to distinguish manufacturing from creation. If a country has too little IP, its industry or enterprise can only play the role of primary processor in the international division of labor.
mac address
MAC (Media Access Control) MAC address is a MAC address burned in a network interface card (NIC), also known as a hardware address. It consists of 48 bits (6 bytes) and 16 bits. 0-23 digits are assigned by the manufacturer, which is called organization unique. The 40th bit is the multicast address flag bit. The physical address of the network card is usually the EPROM (a flash memory chip that can be erased by program) burned into the network card by the network card manufacturer, which stores the address that truly identifies the computer that sent the data and the host that received the data when transmitting the data.
In other words, in the process of physical transmission at the bottom of the network, the host is identified by its physical address, which is generally unique in the world. For example, the physical address of a famous Ethernet card is a 48-bit integer, such as 44-45-53-54-00-00, which is stored in the host interface in a machine-readable manner. Ethernet Address Management Organization (IEEE) divides Ethernet addresses, that is, different combinations of 48 bits, into several independent and continuous address groups, and the manufacturer of Ethernet cards buys one of them, and gives the Ethernet cards unique addresses one by one during the specific production.
Vividly speaking, the MAC address is just like the ID number on our ID card, which is unique in the world.
How to get the MAC of this machine?
For a few machines, we can get the MAC address as follows: In Windows 98/Me, click Start → Run → Enter winipcfg"→ Enter. You can see the MAC address.
In Windows 2000/XP, click Start → Run → Enter CMD"→ Enter → Enter ipconfig /all"→ Enter. You can see the MAC address. Or click Start → Run → Enter CMD"→ Enter → Enter → Enter getmac"→ Enter to get the mac address quickly.
Method of modifying MAC address of network card
In fact, the function of changing the MAC address of the network card, whether it is 98, 2000 or XP, has been provided, but everyone usually doesn't notice it. Let me tell you how to change it. It's simple. . .
Ok, now let's look at WIN2000. Right-click the icon of My Network Places on the desktop, and then select Properties. There are generally two icons in the Network and Dial-up Connections window, one is the New Connection icon, and the other is the My Connection icon. If you have two network cards on your machine, there are three icons. If you only have a network card, right-click the My Connection icon and select Properties to open the My Connection Properties window. At the top of the diagram, there is a sign "Use when connecting". This is the model of the network card on your machine. There is a "Configure" button below. Click this button to enter the network card properties dialog box. There are five property pages in this dialog box. Click the second "Advanced" page, and there are two items under the "Properties" label: one is "Link speed/duplex mode", which is to set the working speed of the network card. What we need to change is the following "network address". Click this item. There are two radio options under the "Value" logo on the right side of the dialog box, and the default value is "Does not exist". We just need to select the radio above, then enter the MAC address of the network card you want to change in the box on the right, and click OK. After a while, the network card address will be changed, and you don't even have to stop using the network card!
In addition, you can also open the property page of the network card in "Settings Manager" to modify it, and the effect is the same. WINXP is modified in the same way as WIN2000.
The modification under 98 is similar to that under WIN2000 and XP. Right-click the Network Places icon and select Properties to open the Network dialog box. In the Configuration box, double-click the network card you want to modify to open the network card properties dialog box. In the "Advanced" option, click the "Network Address" item under the "Properties" label, select one of the two items on the right, and then enter the MAC address of the network card you want to modify in the box. After clicking OK, you will be prompted to restart. After restarting, your network card address will be successfully modified! !
If you want to restore the MAC address of the network card to its original state, just select the radio on the right side of the "network address" item as "Don't show" below and restart. Under WIN2000 and XP, you can choose "does not exist", and of course you don't need to restart.