TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN
Contents What is the TCP/IP model? History Layers of TCP/IP Internet Layer Way to browse the internet anonymously What are the drawbacks?
TCP/IP Model TCP/IP stands for Transmission Control Protocol and Internet Protocol. Transmission Control Protocol and Internet Protocol (TCP/IP) is a collection of protocols designed to facilitate how data and communication are handled over a large network.
History It was developed in 1969 by the U.S. Department of Defense (DoD) Defense Advanced Research Projects Agency (DARPA). TCP/IP was born from a resource-sharing experiment called Advanced Research Projects Agency Network (ARPANET) which later evolved into what we now know as the internet. TCP/IP is maintained by the Internet Engineering Task Force (IETF) which operates under the Internet Society – an international non-profit organization, is dedicated to providing “relevant technical documents that influences the way people design, use, and manage the internet.”
Layers of TCP/IP Model The TCP/IP model can be broken down into four major layers: Application layer Transport layer Internet layer Network interface layer / Network access layer
Layers of TCP/IP Model Application layer - defines how programs run by the host interacts with transport layer services to access the network Transport layer - provides the communication session management between host computers. This layer defines the level of service and status of the connection used when transporting data. Internet layer - responsible for packaging data into IP datagrams (packets). IP datagrams contain the source and destination address as information used to forward the datagram across the network. The internet layer is comprised of many protocols such as: IP (Internet Protocol) Network interface layer - responsible for detailing how data is physically sent through the network, i.e. it details how bits are electrically signaled by devices that interface with the network e.g. coaxial cables.
TCP/IP Model
IP – Internet Protocol Internet Protocol (IP), a internet layer protocol, defines the format of datagrams (or packets), and the addressing scheme. Every computer on the network has an IP address that identifies it. IP is an connectionless protocol, i.e. there is no connection between the source and destination. Packets are treated as independent data and is reorganized correctly due to TCP.
Public IP Address Public IP address – used by internet servers, network routers, or any computer connected directly to the Internet via a modem. Can be accessed over the internet like a postal address. How to figure out your public IP address? Google search “IP” In some s, you can find the IP address of the sender.
What can someone do with your public IP address? Get your location. Using geolocation to get the router or the ISP location. It’s possible to obtain a person’s exact location (however, it may be difficult). Attack your computer/network. DDOS. Malicious users may scan your network for open ports or simply break into your router and act as a computer on the network, etc.
IP Geolocation Websites These IP Geolocation websites typically show the location of the ISP (internet service provider) providing the connection.
IP Geolocation:
Ways to Mask Your IP Address Proxy Servers VPN (virtual private network) software/services
Proxy Servers A proxy server functions as an intermediary between your computer and the Internet. Traffic from your browser is re-routed and made to appear to come from the proxy server's IP address. Ex. Tor Browser - Internet traffic is routed through Tor’s network. Disadvantage: The proxy server owner can may view information saved on their cache such as passwords, usernames, browsing history.
VPN (Virtual Private Network) VPN mask your IP address and also encrypt all the traffic from your computer to the desired destination by using encryption protocols and secure tunneling techniques. VPNs also secure your data when using public Wi-Fi networks. Ex. Foxyproxy – offers both VPN and proxy. Disadvantage: The VPN provider may have security vulnerabilities.
References (1 of 3)
References (2 of 3)
References (3 of 3)