Generated by GPT-5-mini| IPv4 | |
|---|---|
| Name | IPv4 |
| Introduced | 1981 |
| Designer | Vint Cerf; Bob Kahn |
| Protocol family | Internet Protocol |
| Layer | Network layer (Internet layer) |
| Header length | 20–60 bytes |
| Address length | 32 bits |
| Successor | IPv6 |
IPv4 Internet Protocol version 4 is the fourth iteration of the Internet Protocol suite that provides addressing and packet delivery for early and contemporary internetworks. It underpins fundamental operations of the ARPANET descendants, the Internet Engineering Task Force, and numerous commercial and academic networks, enabling interoperability among systems from Xerox PARC experiments to modern datacenters operated by Amazon, Google, and Microsoft. IPv4’s 32‑bit addressing, best-effort delivery model, and simple header design shaped protocols such as TCP, UDP, ICMP, DHCP, and BGP.
IPv4 defines a packet format, addressing scheme, and basic delivery semantics used across heterogeneous networks including early ARPANET links, campus networks at Stanford University, and backbone systems run by Cisco Systems and Juniper Networks. The protocol works at the Internet layer of the TCP/IP stack and interoperates with link-layer technologies such as Ethernet, Wi‑Fi, PPP, and ATM. IPv4’s adoption was driven by specifications published in Requests for Comments authored by contributors affiliated with DARPA, BBN Technologies, and research groups at MIT and UCLA.
Design and standardization occurred in the 1970s and 1980s through collaborative efforts by researchers including Vint Cerf and Bob Kahn, with formalization in a series of RFC documents shepherded by the Internet Engineering Task Force and predecessors. Deployment progressed from experimental networks like ARPANET and CSNET into commercial internet service providers such as UUNET and later global operators like AT&T and Verizon. Key milestones parallel developments in routing protocols—RIP, OSPF, and later BGP—and administrative allocations by registries including IANA and regional bodies RIPE NCC, ARIN, APNIC, LACNIC, and AfriNIC.
IPv4 uses 32‑bit numeric addresses allowing approximately 4.29 billion unique identifiers. Early classful addressing (Class A, B, C) influenced assignment practices and sparked development of CIDR in the 1990s to combat fragmentation of address space by providers like Sprint and MCI. Private addressing ranges such as those used by Cisco Systems guidelines and NAT implementations conform to allocations described by registry policies from IANA and regional bodies. Mechanisms including DHCP automate address distribution in enterprise environments operated by institutions like MIT and Stanford University, while address exhaustion prompted market dynamics involving firms such as RIPE NCC member entities and transfer policies overseen by ICANN.
The IPv4 header includes fields for version, header length, Type of Service, total length, identification, flags, fragment offset, Time to Live, protocol, header checksum, source address, and destination address—elements specified in foundational RFCs produced by contributors at DARPA and academic labs. The protocol field identifies payloads carried by TCP (as used by services like HTTP and SMTP), UDP (used by DNS and VoIP), and other protocols including ICMP used by tools developed by entities such as RFC Editor and researchers at Bell Labs. Header checksum and TTL were designed with constraints of early hardware from vendors like DEC and Intel in mind.
IPv4 relies on routing protocols such as RIP, OSPF, and BGP to propagate reachability across autonomous systems run by carriers like AT&T, content networks like Akamai, and cloud providers like Amazon Web Services. Fragmentation enables transmission across links with differing Maximum Transmission Unit sizes, interacting with link-layer technologies such as Ethernet and ATM, but introduces complexity in reassembly and security analyses performed by researchers at SRI International and CERT Coordination Center. Route aggregation and CIDR reduced global routing table size, mitigating scaling pressures first identified by operators at backbone providers including UUNET and Level 3 Communications.
Address exhaustion and limitations in features such as hierarchical addressing and built‑in security led to development and gradual deployment of IPv6 by organizations like IETF and Internet Society. Transition mechanisms—dual-stack operation, tunneling techniques (including 6to4 and ISATAP), and protocol translation—were standardized and implemented by vendors including Cisco Systems, Juniper Networks, and operating system maintainers at Microsoft and Red Hat. Coexistence strategies involve peering policies enforced at Internet exchange points such as LINX and DE-CIX and operational coordination among registries like ARIN and RIPE NCC.
IPv4’s stateless, best-effort design enabled rapid innovation but exposed vulnerabilities exploited in incidents investigated by groups such as CERT Coordination Center and law enforcement agencies including FBI and Europol. Threats include IP spoofing, denial‑of‑service attacks, routing prefix hijacks studied in research by CAIDA and mitigations like RPKI promoted by IANA and regional registries. Operational challenges—NAT traversal for peer‑to‑peer applications, address scarcity prompting markets and transfers, and the complexity of access control lists in routers from Cisco Systems—have driven protocol extensions, operational best practices endorsed by the IETF, and security standards developed by organizations such as IEEE and ISO.
Category:Internet protocols