wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

Uniprocessor and Types

Blog banner

Virtual Memory

Blog banner

File Organization and Access

Blog banner

Memory management

Blog banner

Dr. Venkadavarahan

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

E-learning

Blog banner

Virtual memory

Blog banner

Threat management

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Zomato (Income Sources)

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

I/O Management and Disk Scheduling

Blog banner

Types of threads

Blog banner

Virtual memory

Blog banner

FILE SHARING

Blog banner

Starvation

Blog banner

Benefits and drawback of web security.

Blog banner

Deadlock

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Big Data Architecture

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

How to use open SSL for web server - browser communication

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

How Men and Women Process Pain Differently

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

File Systems in OS.

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Introduction to GIS

Blog banner

Deming’s Process

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

What is semaphore in operating system?

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Explain Kernel in OS

Blog banner

Google App Engine

Blog banner

Deadlocks in Operating System

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner