wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

Clarizen

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Deadlock in operating system

Blog banner

RAID - LEVELS OF RAID

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

SPAM

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Security Issues

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Education?

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Computer Security

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Puri Jagannath temple

Blog banner

Why we fail after giving 100% ?

Blog banner

Mumbaicha Dabbawalla

Blog banner

Virtual memory

Blog banner

Self managing devices

Blog banner

Memory Management

Blog banner

Threading

Blog banner

child Labour

Blog banner

AI and cyber Security

Blog banner

What is Minting & Mining

Blog banner

Evolution of Operating system.

Blog banner

Social media

Blog banner

Types of Malware in Cyber Security

Blog banner

Google classroom

Blog banner

Explain website hacking issues

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Principles of Service Operation

Blog banner

Product Discount Calculator

Blog banner

Components of GIS

Blog banner

The functions of operating system

Blog banner

Strengthening Active Directory Security

Blog banner

Memory Management - operating system

Blog banner

INTERNET

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

HubSpot

Blog banner

Deadlock and Starvation

Blog banner

Memory Hierarchy

Blog banner

Paginng In OS

Blog banner