LLMpediaThe first transparent, open encyclopedia generated by LLMs

Internet Protocol address

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Expansion Funnel Raw 95 → Dedup 9 → NER 9 → Enqueued 7
1. Extracted95
2. After dedup9 (None)
3. After NER9 (None)
4. Enqueued7 (None)
Similarity rejected: 2
Internet Protocol address
NameInternet Protocol address
Introduced1981
VersionIPv4, IPv6
RegistryInternet Assigned Numbers Authority
Format32-bit, 128-bit

Internet Protocol address An Internet Protocol address is a numeric label assigned to devices participating in packet-switched networks that use the Internet Protocol. It enables identification and location of interfaces for communication among hosts, routers, and services across interconnected systems governed by standards bodies and operational registries. Implementations and management involve coordination among organizations, engineering groups, and regional authorities in global infrastructure.

Overview

An Internet Protocol address functions as an identifier for endpoints within the Transmission Control Protocol/IP suite, used by software stacks maintained by groups such as the Internet Engineering Task Force, the Internet Corporation for Assigned Names and Numbers, and the Internet Assigned Numbers Authority. Addressing concepts appear in protocol specifications like Request for Comments 791 and Request for Comments 8200, and implementations exist in operating systems including Unix, Linux, Windows NT, and macOS. Network operators in regions managed by American Registry for Internet Numbers, RIPE NCC, Asia-Pacific Network Information Centre, Latin America and Caribbean Network Information Centre, and African Network Information Centre maintain allocation records and policies. Research projects at institutions such as MIT, Stanford University, University of Cambridge, and Carnegie Mellon University study addressing scalability, mobility, and measurement.

Address Formats and Notation

Address formats include the 32-bit binary representation standardized for early deployments and the 128-bit hexadecimal representation adopted for expanded address space. The 32-bit type was defined in documents like Request for Comments 791 and commonly expressed in dotted-decimal notation used by utilities in Microsoft Windows, BSD, and Cisco Systems equipment. The 128-bit type is presented in hexadecimal colon-separated groups, with shortening rules specified by IETF drafts and used in implementations such as Apple networking stacks and Juniper Networks routers. Notation conventions appear in configuration guides from vendors like Netgear and D-Link and in textbooks by authors affiliated with Princeton University and Harvard University. Subnetting practices relate to concepts in publications linked to Stanford Computer Science Department and standards debated at meetings of the Internet Engineering Steering Group.

Allocation and Assignment

Global allocation follows policies coordinated by the Internet Assigned Numbers Authority and implemented through the five Regional Internet Registries: ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC. Assignments to end users are mediated by Internet service providers including AT&T, Verizon Communications, Deutsche Telekom, NTT Communications, and China Telecom under national regulations influenced by ministries and agencies such as Federal Communications Commission and Ministry of Industry and Information Technology (China). Address planning interacts with legacy registries, address transfers, and market activities examined by researchers at Oxford University and University of California, Berkeley. Commercial services like Cloudflare, Amazon Web Services, Google Cloud, Microsoft Azure, and Akamai manage large pools of addresses for infrastructure, content delivery, and virtual networking. Governance disputes and policy evolution have been discussed at international fora including ICANN Public Meetings and IETF Plenary sessions.

Routing and Addressing Architecture

Routing protocols operate on address prefixes exchanged by routers running software from vendors like Cisco Systems, Juniper Networks, Huawei, and Arista Networks using protocols such as Border Gateway Protocol and Open Shortest Path First. Address aggregation and hierarchical assignment are design principles taught in courses at Massachusetts Institute of Technology and applied in backbone networks operated by Level 3 Communications, NTT Communications, and CenturyLink. Mobile addressing and tunneling mechanisms are implemented in standards from 3GPP and IETF Mobile Ad hoc Networks working groups, while virtualization and container networking rely on projects like Kubernetes, Docker, and OpenStack to manage ephemeral address assignment. Measurement and mapping efforts by Team Cymru, CAIDA, and research labs at ETH Zurich and Tsinghua University analyze prefix visibility, routing anomalies, and convergence behavior.

Security and Privacy Considerations

Addressing interacts with security disciplines explored by researchers at SRI International, RAND Corporation, and National Institute of Standards and Technology; issues include spoofing, hijacking, and enumeration exploited in incidents involving threat actors cataloged by Europol and Interpol. Mitigation techniques involve cryptographic and operational controls described in IETF documents and deployed in products from Palo Alto Networks, Fortinet, and Check Point Software Technologies. Privacy concerns, including correlation and geolocation of addresses, are addressed by regulators such as the European Commission and advocacy groups like Electronic Frontier Foundation and Privacy International. Legal cases and policy debates that implicate address logging and retention have been heard in courts such as the European Court of Human Rights and considered by legislative bodies including the United States Congress.

Transition and Future Developments

Transition from legacy formats to expanded address architectures has been a long-term engineering and policy effort coordinated by the IETF, adopted in infrastructure projects by operators like Google, Facebook, and Akamai Technologies, and supported by hardware vendors including Intel and Broadcom. Research initiatives at National Science Foundation, European Commission Horizon 2020, and university labs focus on name-independent routing, identity-based networking, and quantum-resilient control planes. Future developments involve convergence with initiatives such as Software-Defined Networking, Network Function Virtualization, and proposals from working groups at IETF QUIC and IETF SPRING to improve scalability, security, and mobility for interconnected systems used by platforms like Spotify, Netflix, and YouTube.

Category:Internet