PM & AI Chronicles

From Product Thinking to Prompt Engineering – One Tool at a Time

Network Connectivity 🖧🖇️: Understanding the TCP/IP Language 💻↔️💻

In the previous article, we explored the key networking devices—such as routers, switches, and access points—and the basic rules (protocols) that enable devices to communicate across a network. Those concepts set the stage for understanding how TCP/IP actually works behind the scenes. 👉 Devices & Rules Behind Communication

Every computer protocol created over the years has one common purpose: ➡️ to ensure successful communication between two devices. But communication requires structure. In the 1970s, theoretical networking models were introduced to bring order to these tasks.

One of the most important among them was created by the U.S. Department of Defense (DoD) — and it became the foundation for modern networking.

TCP/IP (Transmission Control Protocol / Internet Protocol) is the main protocol suite used on the Internet today. Although it is named after its two most famous protocols (TCP and IP), the suite actually contains dozens of protocols working together. TCP/IP is structured using the four layers of the DoD model:

  • Process / Application Layer
  • Host-to-Host Layer
  • Internet Layer
  • Network Access Layer

You can think of TCP/IP like a puzzle—you need one piece from each layer for communication to work. Most TCP/IP protocols sit in the Process/Application layer, because that’s where everyday software communicates.

This is where the apps you use every day live — websites, email software, file transfer tools, etc. Some common examples:

  • HTTP — HyperText Transfer Protocol. Used for browsing websites.
  • HTTPS — HyperText Transfer Protocol Secure. Secure version of HTTP; encrypts data so your passwords and card numbers stay safe.
  • FTP — File Transfer Protocol. Used for downloading/uploading files.
    • Example: When a website sends you to a link starting with ftp:// to download drivers or software.
  • POP3 — Post Office Protocol version 3. Used to receive email (downloads emails to your device).
  • IMAP — Internet Message Access Protocol. Also used to receive email, but keeps mail synced across devices (Gmail, Outlook app, phone, etc.).
  • SMTP — Simple Mail Transfer Protocol. Used to send email.
  • When you check Gmail on your phone → it uses IMAP.
  • When you send an email → your email app uses SMTP.
  • When you open amazon.com → the browser uses HTTPS behind the scenes.

This layer has only two protocols:

  • TCP — Transmission Control Protocol. Reliable, connection-oriented. Ensures all data is delivered correctly. Example: Watching Netflix, transferring money online, sending an email.
  • UDP — User Datagram Protocol. Fast but not guaranteed. Example: Zoom calls, online gaming, live sports streaming — speed matters more than perfection.

Most applications use one of these two depending on the task.

The most important protocol here:

  • IP — Internet Protocol. The backbone of everything. It defines how devices address and route information.

Other helpers:

  • ICMP — Internet Control Message Protocol. Used for diagnostics. Example: When you use ping, you’re actually using ICMP.
  • ARP — Address Resolution Protocol. Helps match IP addresses to MAC addresses inside a local network.

This layer does not have specific protocols. Instead, it describes how your device physically accesses the network. Examples include:

  • Ethernet
  • Wi-Fi
  • Cellular data
  • Fiber
  • DSL

This is the “cables and signals” part of networking.

If you have used the internet even once, you have already used many of these protocols — without even noticing. Here’s how:

Websites using HTTPS have addresses starting with: https://

Modern browsers hide this for simplicity, but it’s still there. HTTP, the older version, did not encrypt data, so HTTPS replaced it for safety.

Real-World Example. When you enter your password or credit card on Amazon, HTTPS encrypts it during transmission so attackers cannot see it.

Some websites redirect you to a download server that starts with: ftp://

That’s because FTP is explicitly designed for transferring files.

  • You might install an FTP client (like FileZilla).
  • The software uses the FTP protocol to communicate with FTP servers.

There are three major players:

  • POP3 – Receives email (downloads it). Older email apps use POP3 to download messages onto the device.
  • IMAP – Receives email (keeps everything synced). Gmail, Outlook, iCloud, and most modern providers use IMAP.
  • SMTP – Sends email. Any email you send uses SMTP behind the scenes.

Example. Your email app might say:

  • Incoming mail server: imap.gmail.com
  • Outgoing mail server: smtp.gmail.com

These are literally the protocols being used.

Most basic network services use a protocol with the same name:

  • “FTP software” → uses FTP protocol
  • “POP3 mail server” → uses POP3 protocol
  • “SMTP server” → uses SMTP protocol

The service name equals the protocol name.

To communicate on a TCP/IP network, every device needs its own unique address, called an IP address. Any device with an IP address is called a host. This includes:

  • desktops
  • laptops
  • smartphones
  • printers
  • servers
  • routers

➡️ If it has an IP address, it’s a host.

📌 Note: When People Say “IP Address,” They Usually Mean IPv4. Unless someone specifically says IPv6, always assume they are talking about IPv4.

An IP address is:

  • a 32-bit hierarchical address
  • used to identify a device on a network uniquely
  • usually written in dotted decimal format, such as: 192.168.10.55

Each number (192, 168, 10, 55) is:

  • 8 bits
  • 1 byte
  • also called an octet

The Binary Version of 192.168.10.55

  • 192 → 11000000
  • 168 → 10101000
  • 10 → 00001010
  • 55 → 00110111

So the full binary IP address is: 11000000.10101000.00001010.00110111

As you can see, dotted decimal is much easier for humans to read and write.

IP addresses are not flat—they have structure. This structure allows:

  • Organizing networks.
  • grouping devices.
  • Routing traffic across different networks (including the internet)

Here’s a random example address: 1451 Random example Road, Apt 3B, Charlotte, NC 91201, USA

The postal system uses a hierarchy:

  • USA → narrows down the country
  • North Carolina → narrows down the state
  • Charlotte → city
  • Random example Road → street
  • 1451, Apt 3B → exact destination

If addresses were “flat” (e.g., every house in the country was just numbered randomly), the postal service would break down. There would be no logical grouping, and finding anything would be nearly impossible.

The first part of the IP address identifies the network, and the second part identifies the specific host within that network.

Without this structure:

  • Routers couldn’t forward packets
  • The internet couldn’t scale
  • Communication across millions of networks would be chaotic

Each IP address contains:

  • Network ID → identifies the network
  • Host ID → identifies the device on that network

Example: For the IP 192.168.10.55 with subnet mask 255.255.255.0:

  • Network ID: 192.168.10
  • Host ID: 55

The Network ID always comes first, but the number of bits used for Network vs Host can vary, depending on the subnet mask.

Why is this confusing? Because the split between Network and Host is not fixed. It depends on the subnet mask, not just the IP address.

Let’s break it down: Think of the IP Address as a Full Phone Number

For example: 📞 +1 (700) 555-1234

Breakdown:

  • +1 → Country
  • 700 → Area code
  • 555 → Exchange
  • 1234 → Line number (unique phone)

In IP addressing:

  • Network ID = area code + exchange (group)
  • Host ID = line number (unique device)
  • The subnet mask tells the computer where to split the number.

A subnet mask looks like an IP address: 255.255.255.0

  • Each 255 means all bits are 1this portion belongs to the Network ID.
  • Binary of 255: 11111111

So:

Subnet MaskMeaning
255All 8 bits belong to Network ID
0All 8 bits belong to Host ID

Subnet mask:

  • 255 → Network
  • 255 → Network
  • 255 → Network
  • 0 → Host

So:

  • Network portion: 192.168.10
  • Host portion: 55

This means:

  • All devices on the 192.168.10.x network belongs together
  • Each device must have a unique host ID (1–254)
  • ✔ All host addresses on a network must be unique
  • ✔ All network addresses must also be unique in a routed environment
  • ✔ The Network ID cannot be all 0s
  • ✔ The Host ID cannot be all 0s (“this network”)
  • ✔ The Host ID cannot be all 1s (“broadcast”)
  • ✔ The broadcast address means: send this to every device on the network

If Computer A wants to message Computer B on 192.168.10.x, and both have the same Network ID, it simply sends the message directly on the wire or Wi-Fi. No router needed.

If Computer A wants to reach

  • a device on 192.168.20.x,
  • or anything on the internet

It sees the Network ID is different, so it sends the packet to the Default gateway (your router)

Your router is the door from your local network to the outside world.

  • IP addresses uniquely identify devices
  • They have a network part and a host part
  • The subnet mask decides where the split occurs
  • Computers use this split to determine whether to send data:
    • directly to another device, or
    • to the router (default gateway)

Knowing the correct IP address helps a device identify which host it needs to communicate with. But that’s only half of the story.

To communicate with the correct application or service on that host, TCP/IP needs something more: Ports (or port numbers)

A port is an additional identifier that tells the operating system which application the incoming data belongs to.

A device uses:

  • The IP address to find the correct host
  • The port number to find the correct service or application inside that host

Think of your IP address as your home address. The cable company needs your home address to send TV signals to you.

But inside your home, which channel do you want to watch?

  • If you want National Geographic, you might tune to Channel 200.
  • If you want sports, you tune to another channel.
  • If you want news, yet another.

These channels = ports.

If a computer wants to ask something through HTTPS, it must talk to: Port 443, because that is the port reserved for secure web communication.

If it tried to use port 80, the server would treat it as regular HTTP instead.

TCP/IP applications combine:

  • IP address
  • Port number

This combination is called a socket. – Example socket: 192.168.10.55:443

This means: “Talk to the device at 192.168.10.55 on port 443.”

There are 65,536 ports, numbered: 0 — 65,535. They fall into three categories:

  • Well-Known Ports (0–1023). Assigned to commonly used services. Examples:
    • 80 – HTTP
    • 443 – HTTPS
    • 25 – SMTP
  • Registered Ports (1024–49151). Used by vendors or software developers for their applications.
  • Dynamic / Private Ports (49152–65535). Available for temporary or custom use
ServiceProtocolPort Number
Web browsing (not secure)HTTP80
Secure web browsingHTTPS443
File transferFTP21
Email (sending)SMTP25
Email (receiving – POP3)POP3110
Email (receiving – IMAP4)IMAP4143

This table helps beginners clearly connect each service to its port.

These three terms often get mixed up, so here’s a simple explanation:

  • Logical address
  • Can be changed
  • Identifies a device on the network
  • Physical address burned into the network card
  • Cannot be changed
  • Identifies the hardware itself
  • Like TV channels
  • Identify specific services on a device

Together, these three help computers know:

  • which device to talk to
  • Which hardware card to send through
  • which application/service should receive the data

IPv4 (Internet Protocol version 4) was developed in 1973, long before the modern Internet even existed. Despite being over 50 years old, it still remains the most widely used addressing system today. But as the world changed and billions of devices went online, IPv4 began showing its age. Two major issues forced the world to look for a new version:

  • We ran out of IPv4 addresses
  • IPv4 configuration can be difficult and limiting

Let’s break this down in a way that finally makes sense—even for someone completely new to networking.

Why Did We Run Out of IPv4 Addresses ❗ ? IPv4 uses a 32-bit address, which means the maximum number of addresses is: 2³² = 4,294,967,296 (about 4.3 billion)

At first, this seems like an impossibly large number. How could the world ever use 4.3 billion addresses? But here’s the catch:

A large portion of the IPv4 address space is reserved, meaning it cannot be assigned to devices on the public internet. Think of it like a house with 10 rooms:

  • 3 rooms are permanently locked
  • 2 rooms are for storage only
  • 1 must remain empty
  • 1 is only for guests

Suddenly, you have only three usable rooms. IPv4 works the same way.

Large portions of IPv4 are reserved for internal, special, or experimental use.

These addresses NEVER go onto the internet:

  • 10.0.0.0 – 10.255.255.255
  • 172.16.0.0 – 172.31.255.255
  • 192.168.0.0 – 192.168.255.255

Every home in the world uses 192.168.x.x behind their router. These DO NOT count toward the public pool.

  • 127.0.0.0 – 127.255.255.255

This block is used for internal testing (like pinging 127.0.0.1).

  • 224.0.0.0 – 239.255.255.255

Used for group traffic—not public hosts.

  • 240.0.0.0 – 255.255.255.254

Reserved for future use, not assigned to devices.

In the 1980s and 1990s, big organizations received enormous IPv4 blocks:

  • universities
  • government agencies.
  • tech giants in the early internet years
  • telecom companies

Some received millions of addresses each. These blocks are still in use and cannot simply be reclaimed.

Even though 4.3 billion addresses exist, after removing all the reserved blocks, only ~250 million IPv4 addresses were available for worldwide public use.

250 million may sound like a lot, until you realize how many devices exist today.

These 250 million usable addresses had to be shared among:

  • computers
  • smartphones
  • tablets
  • smart TVs
  • printers
  • routers
  • cars
  • security cameras
  • smart bulbs
  • Alexa and Google Home devices
  • gaming consoles
  • data centers
  • cloud servers
  • entire companies
  • entire countries

Today, the world has 25+ billion connected devices—and billions more coming every year. IPv4 could not keep up.

When IPv4 was created:

  • There was no World Wide Web
  • no mobile phones
  • no smart devices
  • no home Wi-Fi
  • No cloud computing
  • Only universities and government labs were online

No one imagined a world where:

  • Every person owns 3–10 internet-connected devices
  • Every home has a Wi-Fi router
  • Every car, camera, TV, watch, speaker, appliance, and even doorbell needs an IP address

IPv4 was never designed for the modern world.

How Did the Internet Survive So Long Then?

  • NAT (Network Address Translation)

Your home likely has one public IP, but inside you have:

  • phones
  • laptops
  • smart TVs
  • tablets
  • IoT devices

NAT allows all of them to share one public address.

  • Private IP ranges. Private ranges like 192.168.x.x let billions of devices coexist internally.

Without NAT and private IPs, IPv4 would have collapsed before 2005

To fix IPv4’s limitations, the industry created IPv6, a new version of TCP/IP. Unlike IPv4’s 32-bit addresses, IPv6 uses 128-bit addresses.

So how many addresses is that? 3.4 × 10³⁸ addresses. That’s 340 undecillion.

To put this in perspective:

  • enough to give billions of IP addresses to every human
  • enough to give hundreds of IPs to every grain of sand on Earth
  • enough to support future technology for centuries

IPv6 will never run out, even if every device and object becomes internet-connected.

IPv6 also includes many features that were optional in IPv4:

  • automatic configuration (plug-and-play)
  • more efficient routing
  • better performance for modern networks
  • cleaner address hierarchy
  • security improvements

Even though IPv6 addresses look long and intimidating, the way they work under the hood is actually simpler and often easier to manage than IPv4.

One of the biggest concerns about introducing a new protocol was compatibility. ➡️ IPv6 is backward compatible.

It can run:

  • on the same computer
  • on the same network
  • at the same time as IPv4

This means:

  • You don’t need to remove IPv4
  • You don’t need to rebuild your network
  • You don’t need to change all devices at once
  • Both protocols coexist until full migration is complete.
  • IPv4 was created in 1973 and uses 32-bit addresses
  • Although it has 4.3 billion possible addresses, most are reserved
  • Only ~250 million public addresses were usable
  • The modern world has billions of devices → IPv4 ran out
  • IPv6 uses 128 bits, offering 3.4 × 10³⁸ addresses
  • IPv6 includes built-in improvements and easier configuration
  • IPv4 and IPv6 can run together during migration

Two of the most important services in TCP/IP networking are:

  • DHCP — Dynamic Host Configuration Protocol
  • DNS — Domain Name System

Both services usually run on a server, though DHCP is also commonly built into home routers. Both provide essential functionality that makes modern networking easy and user-friendly.

Let’s break them down with simple examples.

DHCP’s job is simple but powerful: It automatically gives network configuration to devices.

Whenever a computer or phone joins a network, it needs important information:

  • IP address
  • Subnet mask
  • Default gateway
  • DNS server address

Instead of entering all these settings manually, DHCP gives them automatically.

Imagine moving into a fully furnished apartment where:

  • The furniture is already arranged
  • The water and electricity are already connected
  • The Wi-Fi password is already provided
  • Everything is ready the moment you enter

This is DHCP. The moment your device joins the network:

  • It automatically receives an IP address
  • It knows where the router is
  • It knows which DNS server to contact
  • It’s instantly able to communicate

No manual setup. No typing. No hassle.

If DHCP didn’t exist, an administrator would have to configure manually:

  • the IP address
  • subnet mask
  • default gateway
  • DNS server

for every single device. Imagine manually setting IP settings for:

  • 200 office PCs
  • 75 printers
  • 80 phones
  • laptops that employees bring in
  • guest devices
  • IoT devices

That would be painful and prone to mistakes. DHCP solves this by making IP addressing automatic and dynamic.

DNS has one significant job: DNS converts hostnames (like google.com) into IP addresses.

Computers understand IP addresses, but humans prefer names.

You don’t memorize people’s phone numbers anymore. Instead, you tap “Mom”, “John”, or “Doctor ABC.” Your phone looks up the saved number and calls it.

DNS works the same way.

  • You type google.com
  • Your computer asks DNS: “What is the IP address of google.com?”
  • DNS replies with something like 142.250.191.14
  • Your computer then uses that IP to connect to Google’s servers

Without DNS, you would have to memorize IP addresses for:

  • Google
  • YouTube
  • Facebook
  • Amazon
  • Netflix
  • ChatGPT
  • Every website you ever visit

Imagine typing: 142.250.191.14, instead of google.com. No one would browse the internet!

When you type a website name in your browser:

  • You enter https://google.com
  • Your computer asks your DNS server: “Who is google.com?”
  • DNS replies with an IP address (for example, 142.250.191.14)
  • Your computer uses that IP to reach Google
  • The webpage loads

This entire process happens in milliseconds.

DNS is not just for the internet. Inside a company network (an intranet), DNS might help you find:

  • liz-printer01.company.local
  • Joe-fileserver
  • hr-portal.company.local

The process is identical: You type a name → DNS gives the IP → Your computer connects.

All your device needs is one thing: The address of a valid DNS server.

Once DNS is configured (and DHCP usually provides that automatically), your device can resolve:

  • websites
  • internal servers
  • printers
  • apps
  • cloud services

DNS quietly powers almost every action on your network.

ServiceFull FormWhat It DoesReal-World Analogy
DHCPDynamic Host Configuration ProtocolAutomatically gives devices IP settingsMoving into a fully set-up apartment
DNSDomain Name SystemConverts names (google.com) into IP addressesContact list converting names into phone numbers

Together, DHCP and DNS make networking:

  • automatic
  • simple
  • user-friendly
  • scalable

Without them, every device would need manual configuration, and the internet would be impossible for humans to use.

Let’s imagine something extremely common: A laptop user connected to the internet just clicked Send on an email to a friend.

Simple action for us. But under the hood? A lot happens.

Let’s walk through the journey — step by step — in a way a beginner can truly understand.

Based on the software you use (Outlook, Apple Mail, Thunderbird, Gmail app), your laptop already knows the name of the email server it needs to send your outgoing mail to. For Gmail, the outgoing mail server is: smtp.gmail.com

But your computer cannot work with names. It needs an IP address

Your laptop looks at its TCP/IP settings (usually provided automatically by DHCP) to find the DNS server address.

  • It then asks the DNS server: “What is the IP address of smtp.gmail.com?”
  • The DNS server replies with something like: 142.250.153.109
  • Now, your laptop knows precisely where to send your email.

Before sending the packet, your laptop must decide whether the email server is:

  • on the same network, OR
  • on a different network somewhere on the internet

To do this, your laptop:

  • Looks at its own IP address
  • Looks at its subnet mask
  • Calculates its network address
  • Then calculates the server’s network address using the same mask
  • If both network addresses match → The destination is local. Send directly.
  • If they do NOT match → Send the packet to the default gateway (your router). This is the door from your home or office to the rest of the internet.

For Gmail, the server is definitely NOT on your local network. So the laptop sends the packet to your router.

Your message does not travel as one big piece. Instead, TCP/IP breaks it into small, manageable chunks called packets.

Each packet contains:

  • Packet Header
  • Source IP address
  • Destination IP address
  • Protocol used (TCP/UDP)
  • Other control information

Packet Data

  • A portion of the message you’re sending

Each packet is numbered so the receiving server can put them back in order.

Your router receives the packet, checks the destination IP address, and forwards it to the next router. From there, the packet:

  • hops from router to router
  • across ISPs
  • across backbone networks
  • across data centers
  • until it reaches Google’s mail servers

This is called routing, and each router in this chain is a hop.

Your packet may pass through:

  • local ISP routers
  • regional routers
  • country-level internet exchange points
  • Google’s own infrastructure

It’s incredible how much coordination happens behind the scenes in a matter of milliseconds.

Once all the packets arrive at the mail server:

  • It verifies the packet numbers
  • Reassembles them into the original email
  • Stores the message
  • Sends it to your friend’s mailbox

This entire process happens faster than a blink.

Technically:

  • Packets are broken into frames
  • Frames are broken into bits
  • Bits travel electrically (copper), through light pulses (fiber), or radio waves (Wi-Fi)

At the destination:

  • Bits → reassembled into frames
  • Frames → reassembled into packets
  • Packets → reassembled into your email message

It’s honestly amazing that the internet works as smoothly as it does — every second of every day.

Every operating system has a command to show how many routers (hops) your packet passes through on its way to a destination.

  • The command in Windows: tracert google.com
  • The command in macOS / Linux: traceroute google.com

This will show you every hop from your device → your router → ISP → backbone → Google.

In this section, we explored how devices communicate on a network — from IP addresses and subnet masks to ports, IPv6, DHCP, DNS, and the real journey a packet takes across the internet.

What feels like a simple click or “Send” button actually triggers a complex series of steps involving name resolution, addressing, routing, and packet transmission. Yet it all happens so quickly and smoothly that we barely notice it.

The key takeaway? Modern networking works because many technologies operate together behind the scenes, each handling one small but essential part of the communication process.

This article is part of the Networking Concepts & Technologies series, where we break down how devices connect, communicate, and share information. For the complete overview of wired vs. wireless connections, essential networking devices, and how data travels across networks, 👉 Networking Concepts