wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

IOT- Internet Of Things

Blog banner

Ethical Hacking

Blog banner

Why we should do reading

Blog banner

Microsoft Word

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

IoT Architecture Based Security

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Proof-of-Stake (PoS)

Blog banner

Wrike

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Meshoo

Blog banner

Water Resources are about to exhaust...

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

OS Assignment 3

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

DATA VAULT

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

ASANA- A Management System.

Blog banner

Deadlocks

Blog banner

Beatbox

Blog banner

virtual memory

Blog banner

Operating system evolution

Blog banner

Dr. Venkadavarahan

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

Memory

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Network Forensics Tools and Techniques

Blog banner

Install Ubuntu Easily

Blog banner

Junk food vs healthy food

Blog banner

Pink sauce pasta

Blog banner

Memory input output management

Blog banner

Understanding Regression Analysis

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Types of email

Blog banner

Uber

Blog banner

Evolution of Operating System

Blog banner

Policies for Service Transition

Blog banner

Virtual memory in Operating System

Blog banner