wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

Clustering Techniques

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Mumbai Metro 3

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Security Breaches in Stock market trading

Blog banner

Process Creation

Blog banner

Virtual Memory

Blog banner

Memory Management in Operating System

Blog banner

Man VS Nature

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Supervised and unsupervised learning

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Types of Threads

Blog banner

Network Forensics Tools and Techniques

Blog banner

10 Reasons to date your best friend

Blog banner

Study of Sniffing Tools

Blog banner

Hello World

Blog banner

Deadlocks in Operating System

Blog banner

Data Warehouse Bus Matrix

Blog banner

WORKFRONT SOFTWARE

Blog banner

MYNTRA

Blog banner

Memory management

Blog banner

Malware Defense

Blog banner

memory cache

Blog banner

Processing Crime and Incident Scenes

Blog banner

Evolution of the Microprocesor

Blog banner

Race Conditions

Blog banner

PHISHING

Blog banner

Modern operating system

Blog banner

Europe Through My Lens

Blog banner

Technological Advancement

Blog banner

Bots and Cyber Security

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Health and fitness in technology

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner