How To Speed up An Android Phone

 TIPS TO IMPROVE YOUR MOBILE SPEED

 
GOKUL APPLESAMSUNG
 
 

1. Identify the problem

The first thing to do is find out what is causing the problem: an app, multiple apps, the system itself? Trepn Profiler by Qualcomm will show you the real-time CPU load for individual cores, an overview of network traffic for both data and Wi-Fi, GPU loads and RAM usage and more.

AndroidPIT Trepn Profiler main menu overlay
The first thing to do is identify the problem.

Trepn can also produce app-specific or system-wide profiles and contains various methods for displaying accumulated data. You can save your profiled data for offline viewing and analysis and even have performance overlays on running apps. Once you've figured out your specific issue, you can move on to the solutions below.

AndroidPIT Trepn Profiler performance graph app profiler
Real-time CPU usage for individual cores (left) and app profiling options (right).

2. Free up some space

All those photos you've taken and all of those apps you’ve installed can take their toll on your phone. It needs a little breathing room to run smoothly and if it's running low on space, it can start to slow down.

moto x pure speed up 01
Android includes ways to free up space and speed up your device.

You can check how much space you have left by heading to the Storage section of Settings. One of the easiest ways to free up space is to tap Applications and see which apps you can uninstall.

moto x pure speed up 02
If you've had your phone for a while, there are probably several apps you can remove.

Tap the entry for an app you no longer need and then tap Uninstall. You can repeat this process as many times as necessary for any apps you feel you can live without.
There are other ways you can free up space. The files you have downloaded are probably still sitting in storage wasting space and can be removed. In Storage, tap Downloads, select the files you want to remove and then tap the Bin button.

moto x pure speed up 03
Downloads and app caches occupy valuable space that could be put to better use.

Many of the apps you have installed use data caches in an attempt to speed up operations. This is effective up to a point, but if you are running short of space, it can actually be counter-productive. To free up this space, hit the Clear cached data option and then tap OK to confirm.

moto x pure speed up 04
Free up as much space as possible.

More files ripe for deletion can be found in the Miscellaneous files section. Tick the boxes next to any types of file you'd like to remove – backups, files received via Bluetooth, playlist files, and so on – and then tap the bin button. You can keep an eye on how much space you have freed up when you look at the Available space section.
You can also disable any apps that came pre-loaded on your phone but you don’t use. If you have rooted your Android, you can actually get rid of these apps, but if not, you can go to the app properties and disable it to prevent it from running and using up your phone’s resources.

3. Cut back on the widgets

All those widgets you have running on your home screen may be useful, but they also take up their fair share of resources.

moto x pure speed up 05
Widgets can be a waste of resources, so kill any you don't really need. /

If you have any widgets running that you don’t really need, consider disabling them. There's no harm in having some active, but you will notice an element of slow-down if you have too many running at the same time, so just be a little selective.

4. Disable unnecessary animations and extras

Depending on the launcher you are using, you may find that there are various animations and special effects in place. These may look great, but they can also slow things down.
Check in your launcher's settings to see if there is a way to disable any of these unnecessary extras, and you could earn yourself a speed boost.

moto x pure speed up 06
Extras offered by your launcher could be slowing down your device.

5. Close down apps and free up RAM

Multi-tasking several apps makes it easy to switch between different tools, but there can also be an impact on performance. You can quickly close down any apps you are no longer using by calling up the running apps list – press and hold the home key and then swipe away any apps you want to exit.

moto x pure speed up 08
Terminating unused apps and freeing up RAM will help the speed of your device.

While you are at this screen, tap the pie chart button to the lower right of the screen and then move to the RAM section. Tap the Clear memory button and any background processes that are running unnecessarily will be closed down.

6. Restart your device

A quick and simple fix for a slow device is to simply restart it. This can clear out the cache, stop unnecessary tasks from running, and get things running smoothly again.
Just hold down the power button, select the Restart option, and then tap OK to confirm.

moto x pure speed up 07

7. Dig deeper

You can also keep tabs on the apps that are using lots of battery by going to Settings > Battery. You can also monitor RAM usage in Settings > Apps (or App Manager, depending on your brand of phone) and there's even more nerdy goodies in Process Stats in Developer Options – if you don't have this setting enabled, go to Settings > About Phone and tap Build Number seven times until a notification pops up.



Why Android Is Better Than Apple

Why Android Is Better Than Apple Platform{iOS}

 

 

Android has more apps

The Google Play Store is where most Android apps can be found. The App Store is the app marketplace for Apple (iOS) devices. There are more apps available in the Google Play Store than in the App Store. At the moment there are a little over 2 million available for the App Store, whereas the Google Play Store has 2.5 million.
In addition to there being more apps in the Google Play Store in general, there are also more free apps. Of the 2.5 million total apps for Android, 2.3 million of these are free. That's more free apps for Android than the total number of apps you get from Apple. And while there are some quality concerns over free Android apps, there are more options to choose from and you can try more apps out without any concerns about the costs.
AndroidPIT Google play Store 8990 

Android is more customizable

While some people are quite content with the homogeneity offered by iOS, those of us who like to see a phone as an extension of ourselves want to tweak it. You can even completely replace the software on some Android devices.
Android devices let you change just about every aspect of their on-screen appearance – from the keyboard, to the homescreen launcher, to your email app. If you get CyanogenMod, you can pretty much strip away any unnecessary features that come pre-loaded on your phone.
Check out some Android customization options below:
  • Best Android launchers
  • Best custom ROMs for Android
AndroidPIT rom cyanogenmod 1311a 

There's an Android phone for everyone

Need a rugged phone that you can take mountain-biking or rock-climbingAndroid is brimming with choice – and we love it. As of last year, there were over 24,000 devices from 1,300 brands.
With each generation of Apple devices, you basically get three different options (sometimes only two): small, medium and large. The sizes are basically the biggest differences in the devices. Sure, there are also variations in display or hardware but they're all essentially the same phone.
AndroidPIT best smartphones 1309 

There is a wider array of price ranges

Let's face it, sometimes we feel like spending a ton of money on our smartphones and other times we don't. If you're upgrading to the next generation of iOS devices, then you've got just a couple of different choices – and all of them are expensive.
There's an Android phone out there for every price range. You can pick up a $20 Alcatel Pixi Glitz or jump into a $800 (starting price) Samsung Galaxy S7 Edge. The choice is yours but the point is that there is a choice. Apple won't release a phone under $500, so you're quite limited.
androidpit money cash 3 

You don't have to use iTunes

Apple is a pioneer of hardware and software design, but iTunes – which is required to transfer music between your iPhone and computer – is a bloated mess. Uninstalling it is a nightmare too, to the extent that Apple published an extensive guide for how to fully remove iTunes from your PC.
Android users don't need iTunes, and are given many more choices for music services and purchases in general. More and more services are expanding to Android and not just for music but movies, TV shows, games and many more. Heck, you can even get iTunes on Android if you want to.
AndroidPIT iTunes on Android 5 

You're integrated with Google

Android is an open source project called AOSP (Android Open Source Project) that is led by Google but not owned by it. Google uses this to make its version of Android, which is then used by the other manufacturers. That said, Google services are an integral part of Android and are a good reason to pick up one of these devices.
Google services are great and people are flocking to their convenience. How could we live without Google Maps, Gmail, Google Drive, Google Docs, Google Music or Google Chrome? When integrated, these services make our lives so much easier and Apple just isn't keeping pace.
shop condition black3 1024x1024 

Android keeps up with technology

Apple moves slowly, while Android races ahead at full speed. Individual technological innovations of Android devices are way ahead of Apple. Usually, Apple follows Android. For instance, the Huawei P9 was released with a dual rear camera system earlier this year and now the iPhone 7 Plus has it.
If there's a new innovation you're interested in then you should go with Android. Manufacturers of Android devices give you plenty of fresh choices for new technology. If you want last year's innovations jumbled into one device, then Apple is the best bet. Remember, many new features Apple touts are already in Android devices. The iPhone 7 is now water resistant, but Android did it first two years ago, and the Galaxy S7 still has a higher IP68 certification than the IP67 certification of the iPhone 7. Android started using haptic feedback two years ago as well. Apple marketing is clever. For instance, many people believe that Apple invented the smartphone.
AndroidPIT huawei p9 1414 

Android has microSD card support

If you want more internal storage on Apple devices, then you need to either erase your stuff or buy another phone. Apple devices don't give you the option to expand with a microSD card. But many Android smartphones come equipped with microSD card access.
The difference between a 32 GB iPhone 7 and the 256 GB version is $200. But the SanDisk Ultra 200 GB microSD card only costs $72. That's a huge savings. But another great thing about microSD card support is you can customize how much storage you have for your phone. For instance, SanDisk microSD cards come in 8, 16, 32, 64, 128, 200, and 256 GB. So if you just need an extra 64 GB you would only have to pay $20.
androidpit sd card 2 

Android has removable batteries

When your iPhone has aged and no longer holds a charge as well, you have no choice but to replace the phone or plug in constantly. With Android, many phones like the LG G5 have removable batteries, so you can swap them out for a spare without skipping a beat.

Android has real multitasking

Sure, you can switch between apps and call it multitasking on iOS, but real multitasking is available on Android. Samsung for example, has had the Multi-Window feature for some time now. It allows you to display two apps on the screen simultaneously so you can do more than one thing at a time.

Android offers more cloud storage

Google Drive offers a full 15 GB of cloud storage, while iCloud only gives 5 GB, which is not nearly enough for all of a person's documents or photos. If you want to upgrade your iCloud storage, again Apple is less generous than Google. It'll cost you $100 per year for an extra 50 GB with iCloud, and only $24 per year (at $2 per month) from Google for twice as much storage.

Android doesn't limit NFC

Apple brought NFC to the iPhone 6, but they only allow you to use it with Apple Pay. Since there's a lot of money to be made with mobile payments systems, this is likely Apple's attempt to hold off competition on that front. But, with Android, NFC chips been available in devices for years, and they work with everything they're meant to, including NFC tags and file sharing.
AndroidPIT best ways to use nfc 2 
 
 
 
 
 
 
 
support me 

How To Be Safe On Facebook

How to stay safe on Facebook

 

 

 


Facebook, like any online or offline meeting place, carries with it some risks. Remember that you should apply the same common sense and safety rules as you do when you’re away from your computer. Don’t post your address, phone number or credit card details or any information that you wouldn’t share with a stranger on the street.
But Facebook itself has some structured safety procedures that all users should spend a bit of time getting to know.
Follow these step-by-step instructions to manage your Facebook security and privacy settings
Step 1: Go to Facebook and log in using your registered email address and password.
Step 2: Click the 'padlock' icon in the top right-hand corner of your Facebook page. This will open a dropdown menu containing privacy shortcuts. 
Facebook right hand padlock
Step 3: Click Who can see my stuff? 
Privacy shortcut menu on Facebook
You will be shown a list of options, including the ability to select whether anyone (public), friends or specific groups of friends can see your posts. You can also view your Timeline as another person (View As) to see how much they can see of your activity. 
Privacy shortcuts on Facebook
Step 4: Click Who can contact me? and you can filter which messages are sent through to your message inbox. For example, you could let anyone send you messages or you could set it so only friends can get in touch. You can also control who can send you a friend request, the default here is 'everyone'. 
Who can contact me? menu on Facebook
Step 5: If you ever receive unwanted messages or feel someone is bothering you through Facebook, you can select How do I stop someone from bothering me? and add the name or email address of the bothersome person. 
Blocking options on Facebook
Step 6: To control the privacy settings on your Timeline, first go to your own Timeline. Click next to Activity Log and choosing Timeline Settings.
Identity theft is always an issue on the internet. The more information you make available to everyone, the more possibilities there are for scammers to use it to defraud you. Allowing your full date of birth, maiden name or similar to show on public pages could give someone enough data to access your bank account.
Facebook takes safety seriously too, and runs a Family Safety Centre where you can read educational resources written specifically for parents, teachers and teens.


MSG MW

Security On Your Android Device

Security On Your Android Device

 

 

 

Smartphones have come to define us by being the portal to our online identity and as such should be treated with care and secured against any wrongdoing online (hacking) or offline (stolen). If you are not careful, losing your smartphone may mean more than just a loss in contacts and phone numbers. We’re talking about your social media accounts, your synced files, important documents, your emails, photos and messages.
Your entire information is traceable and downloadable and may be shared all over the World Wide Web if you are not careful enough.
While we’d love it if people don’t mess around with other people’s personal information, putting morale aside, this is the virtual world where thieves and hackers hide behind anonymity and are hard to trace. There is no one better to protect your own data, than you. We hope these tips and tricks will be of help in that endeavor.

1. Do Not Save All Of Your Passwords

Many users tend to save their passwords to online services and sites on their device, never once thinking about what it would mean to a person who got their hands on the phone. Avoid having all important passwords saved in your device particularly when it comes to banking or payment apps.

2. Use Android In-built Security

If you are running on Jelly Bean, you can have a screen lock and encryption enabled to further enhance your security. There are many types of screen locks available for you to choose from such as password, pin, pattern and face unlock, available in your Android settings. Even when setting pins or pattern locks, try not to make it easy for hackers to guess your password.

3. Lock Your Apps

It is necessary to lock your apps, especially the ones holding private information that you wish nobody but you could see. This is a second layer of security to prevent anyone from using your lost device particularly if they have managed to bypass your locked Android.
You can use a free app like App Lock for this exact purpose. The idea here is not to lock every single app in your device, just really data-laden ones like your email apps or file managers.
While you at it, avoid using a combination of a pin or pattern lock that can be traceable from the smudges of your screen (Yes, it is traceable)

4. The importance of app permissions

Before you begin installing an app from Google Play, a list of requested permissions will pop up to show you what permission the app requires. Apps require permissions to do things but not all of them are necessary.
Always read through the permissions to make sure they make sense and correspond to what the app actually does eg. an alarm app does not require a permission to access your text messages. This is a real important step because not all apps in the Play Store are safe.
While you’re at it, make it a habit to read the comments as well as the rating of the app that you are going to download. This helps you understand more about what the app really does without trying it out firsthand.

5. Securing Your Network

One of the most important thing in protecting your Android is to secure your network. Try to avoid using public WiFi whenever you want to do something important like doing your banking online. As long you are sharing the same network with the public, they can easily sniff out your packets and translate it into actual data of your private information i.e. your passwords.
You can protect your information by using apps like Hideninja VPN so that your outgoing connection is always encrypted, making it harder for anyone to sabotage your data. If you suspect that your device is being attacked, WiFi Protector can help fend off these attackers. To further enhance your network security you can apply settings from SecDroid but note that this app is only for rooted phones.

6. Use Mobile Security App
It will make your job easier to have an app that handles most of your security issue. Find a mobile security app that you are comfortable using, for example: Lookout Security & Antivirus and avast! Mobile Security. Even with a security app, you shouldn’t let your guard down as Android malware is getting stronger and more rampant, which brings us to the next tip.

7. Create Multiple User Account To Protect Privacy

If you own an Android tablet and have to share it with a sibling, a spouse, or your kids, having multiple user accounts will help each of you protect your privacy. In Jelly Bean for tablet, there is an option for you to create multiple user accounts. You can create another general account for anyone who wants to use your device. The option is under the Settings > Users section

8. Prepare A Backup Of Your Data

A backup of your precious data is a must-have in the day and age of smartphones. Picture the worst case scenario where your Android device has been stolen or hacked. The last thing you can do is perform a remote wipe (see #10). Without a backup, you will lose all your information in your device.
Even if you could retrieve your stolen phone, chances are that hackers that have managed to access your device will render it useless. If you have a backup however, you can still restore your Android device back to its original state. You can choose to backup important information to the Cloud, your desktop or even to a flash drive, for insurance.

9. Track Your Lost Device

So you have a backup already but you really want to get your lost device back. Well, as the smartphone industry would have it, your phone is built to be trackable, via GPS. The catch is, you have to enable GPS on your phone for it to be tracked. Fret not because, there are plenty of device-tracking apps for Android that can help you locate your lost or stolen device, some can even turn on the GPS on your phone remotely.


10. Enable Remote Wipe

So you are at the point where you have everything installed and ready to go. But, you still need one last feature – the ability for you to wipe your device remotely. This is necessary, especially when you are sure that your Android is lost (forever). There’s no crying over spilt milk now – we can only prevent them from turning it into cheese.





msg me

Be Careful While using PUBLIC WIFI

 How To be Safe On Public Wifi Networks






Stuck without a data connection on the road? Free public Wi-Fi is one of those little luxuries that can make travelling easier, but you do need to exercise caution in how you use it.
Here are some tips on what to look out for when using public Wi-Fi, whether you use a laptop, smartphone or tablet.

Choose your network wisely



Tempted to connect to that elusive "Free Wi-Fi" hotspot? It's worth doing your homework before selecting any network that's open or not familiar to you. For example, if you're in a coffee shop or public library, make sure to verify the name of the network with staff or on signage before connecting.
It's pretty easy for someone who wants to intercept your data in a man-in-the-middle attack to set up a network called "Free Wi-Fi" or any other variation that includes a nearby venue name, to make you think it's a legitimate source.
If you are connecting via Windows, make sure to turn off file sharing and mark the Wi-Fi connection as a public network. You can find this option in the Control Panel > Network and Sharing Center > Change Advanced Sharing Settings. Under the Public heading, turn off the file sharing toggle. You may also want to turn on the Windows Firewall when connecting to a public network if it's not already activated. These settings are also found in Control Panel > Windows Firewall.

windows-sharing.jpg
On Mac, open up System Preferences and navigate to the Sharing icon. Then, untick the checkbox next to File Sharing. and removing public home folder sharing options in OS X.
You can also turn on the firewall within OS X by heading to System Preferences, Security & Privacy and click the Firewall tab.

Use a VPN

Creating a virtual private network (VPN) is one of the best ways to keep your browsing session under wraps. A VPN client encrypts traffic between your device and the VPN server, which means it's much more difficult for a would-be intruder to sniff your data.

android-vpn.jpg
If you don't already have a VPN set up through your employer or workplace, there are other options available. One free implementation is SecurityKISS which offers ad-free VPN access with data limited to 300MB/day. That's plenty of scope for checking email, looking at maps and other casual Wi-Fi uses.
CyberGhost is another option that offers a free tier, but also has a paid version that boosts speed.
For detailed instructions, here's how to set up a VPN on an iOS device and on Android.
There are many other VPN services available, including paid and free options. It's worth doing your research to work out which is best for your needs, especially if you are a heavy-duty user.
Disconnect.me helps to protect against session hijacking via browser extensions for Chrome, Opera and Safari, but on the VPN front it also offers a standalone Android app called Secure Wireless that automatically detects unsecured Wi-Fi and activates a VPN where needed.

Check for HTTPS

Like the old saying goes, check for the lock in your browser to make sure it's secure. One way you can force your browser to use HTTPS is through an extension, such as HTTPS Everywhere. This is available for Chrome, Firefox, Firefox for Android, and Opera.
It's important to note that HTTPS Everywhere works by activating encryption on all supported parts of the website. As outlined in its FAQ:
"HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site."

Patch it up, check your apps

It's time to start forming some good patching habits. Keep your browser and internet-connected devices up to date with the latest versions, but make sure to do this on a trusted home or work network -- not on public Wi-Fi.
There have been instances of travelers being caught off guard when connecting to public or hotel Wi-Fi networks when their device prompts them to update a software package. If accepted by the user, malware was installed on the machine.
Also, if you're on a mobile device, don't assume that your apps are automatically secure or using HTTPS. Unless outlined by the app developer, it's safest to presume that the app is not conducting a secure transaction. In this case, you should use your browser to log on to the service, and check for a HTTPS connection in the status bar.

Enable two-factor authentication

It's good practice to enable two-factor authentication on services that support it, such as Gmail, Twitter and Facebook. This way, even if someone does manage to sniff out your password when on public Wi-Fi, you have an added layer of protection.
On the topic of passwords, try not to use the same password across multiple services. There are plenty of password managers available to make your life easier

Forget the network

Once you are all done with your Web browsing, make sure to log off any services you were signed into. Then, tell your device to forget the network. This means that your phone or PC won't automatically connect again to the network if you're in range.
In Windows, you can uncheck the "Connect Automatically" checkbox next to the network name before you connect, or head to Control Panel > Network and Sharing Center and click on the network name. Click on "Wireless Properties" and then uncheck "Connect automatically when this network is in range."

network-mac-names.jpg
Screenshot by Lexy Savvides/CNET
On Mac, head to System Preferences, go to Network, and under the Wi-Fi section click Advanced. Then uncheck "Remember networks this computer has joined." You can also individually remove networks by selecting the name and pressing the minus button underneath.
In Android, you can do this by entering into your Wi-Fi network list, long press the network name and select "Forget Network." On iOS, head to Settings, select Wi-Fi networks, click the "i" icon next to the network name and choose "Forget This Network." As an extra precaution, you should also turn on "Ask To Join Networks" which is also found in the Wi-Fi networks menu.
Finally, be very careful with what you do on public unsecured Wi-Fi. It's best to save that Internet banking session for when you're able to connect via cellular data, or on a secure network.


 Click Here to message me





What's An IP?

IP address


An IP address ( Internet Protocol address) is an identifier assigned to each computer and other device connected to a TCP/IP network that is used to locate and identify the node in communications with other nodes on the network. IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.
Version 4 of the Internet Protocol (IPv4) defines an IP address as a 32-bit number.[1] However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was developed in 1995,[2] and standardized as  in 1998.[3] Its deployment commenced in the mid-2000s and is ongoing.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIR) responsible in their designated territories for assignment to end users and local Internet registries, such as Internet service providers. Addresses have been distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator assigns an IP address to each device connected to its network. Such assignments may be on a static (fixed or permanent) or dynamic basis, depending on its software and practices.

Role in Internet scheme

An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[4]
The header of each IP packet sent over the Internet must contain the IP address of both the destination server or website and of the sender (the client). The Domain Name System (DNS) translates domain names to the corresponding destination IP address, identifying the computer or device where the services or resources requested by a client are located. Both the source address and the destination address may be changed in transit by a network address translation device.
The sender's IP address is available to the server (which may log it or block it) and becomes the destination address when the server responds to a client request. Geolocation software can use a device's IP address to deduce its geolocation to determine the country[5] and even the city and post/ZIP code,[6] organization, or user the IP address has been assigned to, and then to determine a device's actual location. A sender wanting to remain anonymous to the server may use a proxy server, which substitutes that server's IP address, as far as the destination server is aware, in place of the true source address. When the destination server responds to the proxy server, it would forward it on to the true client—ie., change the IP address to that of the originator of the request. A reverse DNS lookup involves the querying of DNS to determine the domain name associated with an IP address.

IP blocking and firewalls

The sender's IP address is available to the server which can use it in a variety of ways, such as IP address blocking using a firewall to control access to a website or network, or to selectively tailor the response to the client's request depending on criteria such as their location, besides other strategies. Whether using a blacklist or a whitelist, the IP address that is blocked is the perceived IP address of the client, meaning that if the client is using a proxy server or network address translation, blocking one IP address may block other, innocent clients.

IP address translation

Multiple client devices can appear to share an IP address, either because they are part of a shared hosting web server environment or because an IPv4 network address translator (NAT) or proxy server acts as an intermediary agent on behalf of the client, in which case the real originating IP address might be masked from the server receiving a request. A common practice is to have a NAT mask a large number of devices in a private network. Only the "outside" interface(s) of the NAT needs to have an Internet-routable address.[7]
Most commonly, the NAT device maps TCP or UDP port numbers on the side of the larger, public network to individual private addresses on the masqueraded network.
In small home networks, NAT functions are usually implemented in a residential gateway device, typically one marketed as a "router". In this scenario, the computers connected to the router would have private IP addresses and the router would have a public address to communicate on the Internet. This type of router allows several computers to share one public IP address.

IP versions

There are two versions of the Internet Protocol (IP): IP version 4 and IP version 6. Each version defines an IP address differently. Because of its prevalence, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in version sequence between IPv4 and IPv6 resulted from the assignment of number 5 to the experimental Internet Stream Protocol in 1979, which was never referred to as IPv5.

IPv4 addresses



Decomposition of an IPv4 address from dot-decimal notation to its binary value.
An IP address in IPv4 is 32-bits in size, which limits the address space to 4294967296 (232) IP addresses. Of this number, IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses).
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.

Subnetting

In the early stages of development of the Internet Protocol,[1] network administrators interpreted an IP address in two parts: network number portion and host number portion. The highest order octet (most significant eight bits) in an address was designated as the network number and the remaining bits were called the rest field or host identifier and were used for host numbering within a network.
This early method soon proved inadequate as additional networks developed that were independent of the existing networks already designated by a network number. In 1981, the Internet addressing specification was revised with the introduction of classful network architecture.[4]
Classful network design allowed for a larger number of individual network assignments and fine-grained subnetwork design. The first three bits of the most significant octet of an IP address were defined as the class of the address. Three classes (A, B, and C) were defined for universal unicast addressing. Depending on the class derived, the network identification was based on octet boundary segments of the entire address. Each class used successively additional octets in the network identifier, thus reducing the possible number of hosts in the higher order classes (B and C). The following table gives an overview of this now obsolete system.
Historical classful network architecture
ClassLeading
bits
Size of network
number
 bit field
Size of rest
bit field
Number
of networks
Addresses
per network
Start addressEnd address
A0824128 (27)16,777,216 (224)0.0.0.0127.255.255.255
B10161616,384 (214)65,536 (216)128.0.0.0191.255.255.255
C1102482,097,152 (221)256 (28)192.0.0.0223.255.255.255
Classful network design served its purpose in the startup stage of the Internet, but it lacked scalability in the face of the rapid expansion of the network in the 1990s. The class system of the address space was replaced with Classless Inter-Domain Routing (CIDR) in 1993. CIDR is based on variable-length subnet masking (VLSM) to allow allocation and routing based on arbitrary-length prefixes.
Today, remnants of classful network concepts function only in a limited scope as the default configuration parameters of some network software and hardware components (e.g. netmask), and in the technical jargon used in network administrators' discussions.

Private addresses

Early network design, when global end-to-end connectivity was envisioned for communications with all Internet hosts, intended that IP addresses be uniquely assigned to a particular computer or device. However, it was found that this was not always necessary as private networks developed and public address space needed to be conserved.
Computers not connected to the Internet, such as factory machines that communicate only with each other via TCP/IP, need not have globally unique IP addresses. Three non-overlapping ranges of IPv4 addresses for private networks were reserved in These addresses are not routed on the Internet and thus their use need not be coordinated with an IP address registry.
Today, when needed, such private networks typically connect to the Internet through network address translation (NAT).
IANA-reserved private IPv4 network ranges

StartEndNo. of addresses
24-bit block (/8 prefix, 1 × A)10.0.0.010.255.255.25516777216
20-bit block (/12 prefix, 16 × B)172.16.0.0172.31.255.2551048576
16-bit block (/16 prefix, 256 × C)192.168.0.0192.168.255.25565536
Any user may use any of the reserved blocks. Typically, a network administrator will divide a block into subnets; for example, many home routers automatically use a default address range of 192.168.0.0 through 192.168.0.255 (192.168.0.0/24).

IPv4 address exhaustion

There has been a higher than originally anticipated demand for IP addresses available for assignment to Internet service providers and end user organizations since the 1980s, leading to attempts to mitigate the effects of the shortage. IANA's primary address pool was exhausted on 3 February 2011, when the last five blocks were allocated to the five RIRs.APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the transition to IPv6, intended to be allocated in a restricted process. individual ISPs still had unassigned pools of IP addresses, and could recycle addresses no longer needed by their subscribers.

IPv6 addresses


Decomposition of an IPv6 address from hexadecimal representation to its binary value.
The rapid exhaustion of IPv4 address space prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the addressing capability in the Internet. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This new generation of the Internet Protocol was eventually named Internet Protocol Version 6 (IPv6) in 1995.[2][3] The address size was increased from 32 to 128 bits (16 octets), thus providing up to 2128 (approximately 3.403×1038) addresses. This is deemed sufficient for the foreseeable future.
The intent of the new design was not to provide just a sufficient quantity of addresses, but also redesign routing in the Internet by more efficient aggregation of subnetwork routing prefixes. This resulted in slower growth of routing tables in routers. The smallest possible individual allocation is a subnet for 264 hosts, which is the square of the size of the entire IPv4 Internet. At these levels, actual address utilization rates will be small on any IPv6 network segment. The new design also provides the opportunity to separate the addressing infrastructure of a network segment, i.e. the local administration of the segment's available space, from the addressing prefix used to route traffic to and from external networks. IPv6 has facilities that automatically change the routing prefix of entire networks, should the global connectivity or the routing policy change, without requiring internal redesign or manual renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have complex address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native support for the IPv6 protocol, but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.

Private addresses

Just as IPv4 reserves addresses for private networks, blocks of addresses are set aside in IPv6. In IPv6, these are referred to as unique local addresses (ULA). reserves the routing prefix fc00::/7 for this block which is divided into two /8 blocks with different implied policies. The addresses include a 40-bit pseudorandom number that minimizes the risk of address collisions if sites merge or packets are misrouted.
Early practices used a different block for this purpose (fec0::), dubbed site-local addresses. However, the definition of what constituted sites remained unclear and the poorly defined addressing policy created ambiguities for routing. This address type was abandoned and must not be used in new systems.
Addresses starting with fe80:, called link-local addresses, are assigned to interfaces for communication on the attached link. The addresses are automatically generated by the operating system for each network interface. This provides instant and automatic communication between all IPv6 host on a link. This feature is required in the lower layers of IPv6 network administration, such as for the Neighbor Discovery Protocol.
Private address prefixes may not be routed on the public Internet.

IP subnetworks

IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is logically recognized as consisting of two parts: the network prefix and the host identifier, or interface identifier (IPv6). The subnet mask or the CIDR prefix determines how the IP address is divided into network and host parts.
The term subnet mask is only used within IPv4. Both IP versions however use the CIDR concept and notation. In this, the IP address is followed by a slash and the number (in decimal) of bits used for the network part, also called the routing prefix. For example, an IPv4 address and its subnet mask may be 192.0.2.1 and 255.255.255.0, respectively. The CIDR notation for the same IP address and subnet is 192.0.2.1/24, because the first 24 bits of the IP address indicate the network and subnet.

IP address assignment

IP addresses are assigned to a host by the controlling Internet service provider or network administrator. IP addresses may be assigned either permanently by a fixed configuration of the hardware or software or it may take place anew at the time of booting. Persistent configuration is also known as a static IP address. In contrast, when a computer's IP address is assigned newly each time a reboot takes place, it is known as a dynamic IP address.

Methods

Static IP addresses are manually assigned to a computer or other device by an administrator. The exact procedure varies according to platform. This contrasts with dynamic IP addresses, which are assigned either by the computer interface or host software itself, as in Zeroconf, or assigned by a server using Dynamic Host Configuration Protocol (DHCP). Even though IP addresses assigned using DHCP may stay the same for long periods of time, they can generally change. In some cases, a network administrator may implement dynamically assigned static IP addresses. In this case, a DHCP server is used, but it is specifically configured to always assign the same IP address to a particular computer. This allows static IP addresses to be configured centrally, without having to specifically configure each computer on the network in a manual procedure.
In the absence or failure of static or stateful (DHCP) address configurations, an operating system may assign an IP address to a network interface using state-less auto-configuration methods, such as Zeroconf.

Uses of dynamic address assignment

IP addresses are most frequently assigned dynamically on LANs and broadband networks by DHCP. They are used because it avoids the administrative burden of assigning specific static addresses to each device on a network. It also allows devices to share the limited address space on a network if only some of them will be online at a particular time. In most current desktop operating systems, dynamic IP configuration is enabled by default so that a user does not need to manually enter any settings to connect to a network with a DHCP server. DHCP is not the only technology used to assign IP addresses dynamically. Dialup and some broadband networks use dynamic address features of the Point-to-Point Protocol.

Sticky dynamic IP address

A sticky dynamic IP address is an informal term used by cable and DSL Internet access subscribers to describe a dynamically assigned IP address which seldom changes. The addresses are usually assigned with DHCP. Since the modems are usually powered on for extended periods of time, the address leases are usually set to long periods and simply renewed. If a modem is turned off and powered up again before the next expiration of the address lease, it will most likely receive the same IP address.

Address autoconfiguration

defines an address block, 169.254.0.0/16, for the special use in link-local addressing for IPv4 networks. In IPv6, every interface, whether using static or dynamic address assignments, also receives a local-link address automatically in the block fe80::/10.
These addresses are only valid on the link, such as a local network segment or point-to-point connection, that a host is connected to. These addresses are not routable and like private addresses cannot be the source or destination of packets traversing the Internet.
When the link-local IPv4 address block was reserved, no standards existed for mechanisms of address autoconfiguration. Filling the void, Microsoft created an implementation that is called Automatic Private IP Addressing (APIPA). APIPA has been deployed on millions of machines and has, thus, become a de facto standard in the industry. In  the IETF defined a formal standard for this functionality, entitled Dynamic Configuration of IPv4 Link-Local Addresses.

Uses of static addressing

Some infrastructure situations have to use static addressing, such as when finding the Domain Name System (DNS) host that will translate domain names to IP addresses. Static addresses are also convenient, but not absolutely necessary, to locate servers inside an enterprise. An address obtained from a DNS server comes with a time to live, or caching time, after which it should be looked up to confirm that it has not changed. Even static IP addresses may change as a result of network administration

Conflict

An IP address conflict occurs when two devices on the same local physical or wireless network claim to have the same IP address – that is, they conflict with each other. Since only one of the devices is supposed to be on the network at a time, the second one to arrive will generally stop the IP functionality of one or both of the devices. In many cases with modern Operating Systems, the Operating System will notify the user of one of the devices that there is an IP address conflict (displaying the symptom error messageand then either stop functioning on the network or function very poorly on the network. If one of the devices is the gateway, the network will be crippled. Since IP addresses are assigned by multiple people and systems in multiple ways, any of them can be at fault.

Routing

IP addresses are classified into several classes of operational characteristics: unicast, multicast, anycast and broadcast addressing.

Unicast addressing

The most common concept of an IP address is in unicast addressing, available in both IPv4 and IPv6. It normally refers to a single sender or a single receiver, and can be used for both sending and receiving. Usually, a unicast address is associated with a single device or host, but a device or host may have more than one unicast address. Some individual PCs have several distinct unicast addresses, each for its own distinct purpose. Sending the same data to multiple unicast addresses requires the sender to send all the data many times over, once for each recipient.

Broadcast addressing

In IPv4 it is possible to send data to all possible destinations ("all-hosts broadcast"), which permits the sender to send the data only once, and all receivers receive a copy of it. In the IPv4 protocol, the address 255.255.255.255 is used for local broadcast. In addition, a directed (limited) broadcast can be made by combining the network prefix with a host suffix composed entirely of binary 1s. For example, the destination address used for a directed broadcast to devices on the 192.0.2.0/24 network is 192.0.2.255. IPv6 does not implement broadcast addressing and replaces it with multicast to the specially-defined all-nodes multicast address.

Multicast addressing

A multicast address is associated with a group of interested receivers. In IPv4, addresses 224.0.0.0 through 239.255.255.255 (the former Class D addresses) are designated as multicast addresses.[21] IPv6 uses the address block with the prefix ff00::/8 for multicast applications. In either case, the sender sends a single datagram from its unicast address to the multicast group address and the intermediary routers take care of making copies and sending them to all receivers that have joined the corresponding multicast group.

Anycast addressing

Like broadcast and multicast, anycast is a one-to-many routing topology. However, the data stream is not transmitted to all receivers, just the one which the router decides is logically closest in the network. Anycast address is an inherent feature of only IPv6. In IPv4, anycast addressing implementations typically operate using the shortest-path metric of BGP routing and do not take into account congestion or other attributes of the path. Anycast methods are useful for global load balancing and are commonly used in distributed DNS systems.

Public address

A public IP address, in common parlance, is a globally routable unicast IP address, meaning that the address is not an address reserved for use in private networks, such as those reserved by RFC 1918, or the various IPv6 address formats of local scope or site-local scope, for example for link-local addressing. Public IP addresses may be used for communication between hosts on the global Internet.

Diagnostic tools

Computer operating systems provide various diagnostic tools to examine their network interface and address configuration. Windows provides the command-line interface tools ipconfig and netsh and users of Unix-like systems can use ifconfig, netstat, route, lanstat, fstat, or iproute2 utilities to accomplish the task.


SOURCE: WIKIPEDIA