wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

MENDELEY

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

HUBSPOT

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Hello World

Blog banner

Multiprocessor and Multicore Organization

Blog banner

GIS info about Bermuda Triangle

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Linux Threads:

Blog banner

Virtual memory in os

Blog banner

Multiprocessor

Blog banner

Note on Process, Process creation and Process termination

Blog banner

File system

Blog banner

Operating system and overviews

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Objectives and functions of Operating System...

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Concurrency and memory

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Life of an army person

Blog banner

Mental Health

Blog banner

Uniprocessor scheduling

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

File and File System Structure

Blog banner

Vulnerability Assessment

Blog banner

Some facts about Technology

Blog banner

Understanding E-mail Servers

Blog banner

Race Condition in Operating Theatre

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Article on different management system

Blog banner

Deadlock

Blog banner

Artificial Intelligence and I

Blog banner

Interrupts in OS

Blog banner

Smartsheet

Blog banner

Loneliness

Blog banner

Fault Tolerance

Blog banner

Types of Hackers.

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner