wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

VIRTUAL MACHINES

Blog banner

What is Spyware? and examples of them.

Blog banner

ONLINE NEWSROOMS

Blog banner

Different Types of Data

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Deadlock and Starvation

Blog banner

Modern Operating System

Blog banner

Key to success in Sports

Blog banner

differentiate thinking humanly and rationally

Blog banner

Dancing Classes In Mumbai

Blog banner

Flipkart

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Trello ( management software)

Blog banner

Modern operating system

Blog banner

Operation system

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Race Conditions

Blog banner

Malicious softwares

Blog banner

The War With Cold On Earth

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Swiggi

Blog banner

Cyber Security Control

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory managment

Blog banner

Satellite Based Positioning

Blog banner

RAID

Blog banner

Tracking Emails & Email Crimes

Blog banner

EMAIL INVESTIGATION

Blog banner

virtual machines and virtualization

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Security Issues and Countermeasures

Blog banner

BITCOIN WALLET

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Digital Forensics Challenges and Tools

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

VPN

Blog banner

Decoding Confusion Matrix

Blog banner

Uniprocessor scheduling

Blog banner

Benefits and drawback of web security.

Blog banner