wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IP Address

profile
Sneha Mehetre
Aug 24, 2022
0 Likes
0 Discussions
126 Reads

The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you might guess from its name. It's used in all Internet communication to handle both addressing and routing.

The protocol describes the use of IP addresses to uniquely identify Internet-connected devices. Just like homes need mailing addresses to receive mail, Internet-connected devices need an IP address to receive messages.

When a computer sends a message to another computer, it must specify the recipient's IP address and also include its own IP address so that the second computer can reply.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet and allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, and exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.These of IP addresses typically happens behind the scenes. The process works like this:

Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.

When you are at home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.YourP address is assigned to your device by your ISP.Your internet activity goes through the ISP, and they route it back to you, using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.

However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, and they can change it for you.

When you are out and about – for example, traveling – and you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet and will be using a different (and temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.As the process implies, there are different types of IP addresses


Comments ()


Sign in

Read Next

Man is free by the birth .

Blog banner

File management

Blog banner

Latest Email Marketing Techniques

Blog banner

FILE SHARING

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Facebook marketing

Blog banner

Life

Blog banner

INTERNET SECURITY

Blog banner

Dangers of Using Public WiFis

Blog banner

"Games and the future"

Blog banner

The most common internet security threats

Blog banner

Lucidchart

Blog banner

DURGA POOJA

Blog banner

Cyber Forensics

Blog banner

Is Your Password Complex Enough?

Blog banner

Information Technology In E- Commerce

Blog banner

Direct Memory Access

Blog banner

Random Forests

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

IT Service Continuity Management

Blog banner

Modern Operating System

Blog banner

Interrupts - Types, Working & Importance

Blog banner

OPERATING SYSTEM

Blog banner

RAID_142

Blog banner

Computer Security

Blog banner

Odoo

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Operating system evolution

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

SECURITY TOOLS

Blog banner

Deadlock

Blog banner

Culture Of Ladakh

Blog banner

I/O Buffering

Blog banner

E-Governance

Blog banner

USES OF WHATSAPP

Blog banner

E-mail security

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Virtual Memory

Blog banner

EdTech (Education Technology)

Blog banner

What is time ? The term which has astonished Scientists

Blog banner