What is an IP address in a wireless bridge?

In the network we can see the IP address everywhere, the computer must set the IP address, the router also has an IP address. In order to access the Internet, the IP of the computer and the IP of the router must be on the same network segment to access the network. Even our most common mobile phones actually have IP addresses, so the communication between devices and devices on the network must be on the same network segment. In the wireless monitoring system using wireless bridges to transmit video signals, we will also use the IP address settings. If a network can normally access it, it must set the transmission and reception in the same network segment. What then? Is the IP protocol?

IP protocol is that the IP layer receives packets sent by lower layers (network interface layers such as Ethernet device drivers) and sends the packets to a higher layer --- TCP or UDP layer; on the contrary, the IP layer also Packets received from the TCP or UDP layer are transmitted to lower layers. IP packets are unreliable because IP does nothing to verify that the packet was sent in sequence or was broken. The IP packet contains the address of the host that sent it (the source address) and the host that received it. The address (destination address).

When the high-level TCP and UDP services receive data packets, it is usually assumed that the source address in the packet is valid. It can also be said that IP addresses form the basis of authentication for many services, and these services believe that packets are sent from a valid host. IP acknowledgment contains an option, called IP source routing, that can be used to specify a direct path between a source address and a destination address. For some TCP and UDP services, the IP packet that uses this option appears to be passed from the last system on the path, not from its real location. This option exists for testing, indicating that it can be used to spoof the system for connections that are normally forbidden. Then, many services relying on IP source addresses for authentication will cause problems and be illegally invaded.

Gate Valves

Gate Valves,Sea Water Gate Valve,Stainless Steel Gate Valve,Steel Gate Valve

ZHITONG PIPE VALVE TECHNOLOGY CO.,LTD , https://www.ztpipevalve.com

Posted on