HOME
*





IPv9 (China)
In 2004, news reports emerged that China was developing a new "IPv9" technology to replace the existing Internet Protocol. This appears to have been a proposal to link Internet addressing with Chinese 10-digit telephone numbers. The protocol was a research project of the Institute of Chemical Engineering (Shanghai), and there was little evidence that it gained any real-world adoption. A small number of papers and patents have been published which refer to IPv9 addressing. Proponents of the scheme say that it promotes digital sovereignty, and is superior to IPv6 in that it will allow every living cell to be assigned its own IPv9 address. The Chinese IPv9 proposal is distinct from , "TCP and UDP with Bigger Addresses (TUBA)", a proposal for network address extension using CLNP which was provisionally assigned the Internet Protocol version number 9, and , an April Fools' Day Request for Comments that describes a fictional IPv9 protocol that featured a vast addressing space and a hu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as ''TCP/IP''. The first major version of IP, Internet Protocol Version 4 (IPv4), is the do ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

University Of Zhejiang
Zhejiang University, abbreviated as ZJU or Zheda and formerly romanized as Chekiang University, is a national public research university based in Hangzhou, Zhejiang, China. It is a member of the prestigious C9 League and is selected into the national higher education plans including Double First Class University Plan, Project 985, and Project 211; ZJU is consistently ranked among the top 5 academic institutions in mainland China. Founded as Qiushi Academy in 1897, it is the oldest university in Zhejiang and one of the oldest in China. After the 1911 Revolution, the university was shut down by the government in 1914 and was re-established as National Third Chungshan University in 1927 and renamed as National Chekiang University (NCKU) in 1928. During the presidency of Chu Kochen from 1936 to 1949, despite relocation due to World War II, the university became one of the famous four universities in China. British biochemist Joseph Needham hailed the university as "Cambridge o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Digital Sovereignty
In internet governance, network sovereignty, also called 'digital sovereignty' or 'cyber sovereignty', is the effort of a governing entity, such as a state, to create boundaries on a network and then exert a form of control, often in the form of law enforcement over such boundaries. Much like states invoke sole power over their physical territorial boundaries, state sovereignty, such governing bodies also invoke sole power within the network boundaries they set and claim network sovereignty. In the context of the Internet, the intention is to govern the web and control it within the borders of the state. Often, that is witnessed as states seeking to control all information flowing into and within their borders. The concept stems from questions of how states can maintain law over an entity such like the Internet, whose infrastructure exists in real space, but its entity itself exists in the intangible cyberspace. According to Joel Reidenberg, "Networks have key attributes of sove ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion, and is intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, which subsequently ratified it as an Internet Standard on 14 July 2017. Devices on the Internet are assigned a unique IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses 128-bit addresses, theoretically allowing 2128, or approximatel ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CLNP
Connectionless-mode Network Service (CLNS) or simply Connectionless Network Service is an OSI network layer datagram service that does not require a circuit to be established before data is transmitted, and routes messages to their destinations independently of any other messages."Section 3: Definition of the Connectionless-Mode Service"
''ITU-T Recommendation X.213: Open Systems Interconnection – Network service definition'', International Telecommunication Union, October 2001

, Chapter 2, Section 1 in ''IS-IS Network Design Solutions'', Cisco Press, 7 February 2002,
As such it is a "

April Fools' Day Request For Comments
A Request for Comments (RFC), in the context of Internet governance, is a type of publication from the Internet Engineering Task Force (IETF) and the Internet Society (ISOC), usually describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. Almost every April Fools' Day (1 April) since 1989, the Internet RFC Editor has published one or more humorous Request for Comments (RFC) documents, following in the path blazed by the June 1973 RFC 527 called ARPAWOCKY, a parody of Lewis Carroll's nonsense poem "Jabberwocky". The following list also includes humorous RFCs published on other dates. List of April Fools' RFCs ; : :: A parody of the TCP/IP documentation style. For a long time it was specially marked in the RFC index with "note date of issue". ; : ; : (see IP over Avian Carriers) :: Updated by RFC 2549; see below. Describes protocol for transmitting IP packets by homing pigeon. :: In 2001, RFC 114 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Telephone Numbers In China
Telephone numbers in China are organized according to the Chinese Telephone Code Plan. The numerical formats of landlines and mobile phones are different: landlines have area codes, whereas mobile phones do not. In major cities, landline numbers consist of a two-digit area code followed by an eight-digit inner number. In other places, landline numbers consist of a three-digit area code followed by a seven- or eight-digit internal number. The numbers of mobile phones consist of eleven digits. When one landline is used to dial another landline within the same area, it is not necessary to specify the area code. The target number must be prepended between different regions with the trunk prefix, which is 0. Calling a mobile phone from a landline requires the addition of the "0" in front of the mobile phone number if they are not in the same area. Mobile to landline calls requires the "0" and the area code if the landline is not within the same place. Mobile to mobile calls does not ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


New IP
New IP refers to a set of proposals for a novel framework for a future Internet Protocol backed by Huawei and its subsidiary Futurewei which have notably been introduced to the ITU and the IETF and presented at various IEEE conferences between 2018 and 2020. The proposals have received severe criticism, being labeled as "dystopian" and "authoritarian" by the international press while the ICANN noted that, if implemented, they could "make pervasive monitoring much easier". Huawei subsequently tried to address some of these criticisms in an online article. There have further been arguments that later proposals including ''Future IP Evolution'' and ''Future Vertical Communication Networks'' were simply a rebranding of the New IP proposals. See also * IPv9 (China) In 2004, news reports emerged that China was developing a new "IPv9" technology to replace the existing Internet Protocol. This appears to have been a proposal to link Internet addressing with Chinese 10-digit telepho ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Protocols
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). In the development of this networking model, early versions of it were known as the Department of Defense (DoD) model because the research and development were funded by the United States Department of Defense through DARPA. The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking. An implementation of the layers for a particular application forms a protocol stack. From lowest to high ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]