EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

How do IP Addresses Work?

Home » Software Development » Software Development Tutorials » Network Security Tutorial » How do IP Addresses Work?

How do IP Addresses Work

Introduction to IP Address

In this article How do IP Addresses Work? An IP Address stands for Internet Protocol Address. It is defined as the address which uniquely identifies a device in the network using TCP/Internet Protocol to establish communication. An IP address comprises four hexadecimal numbers of 8 bits field separated by symbol dot “.” Each number varies from one to three digits and these four number ranges from 0 to 255 bits.

For Example, 198.134.45.6

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

 If we want to send a letter to anyone we need their mailing address similarly computer uses the IP address of the device to communicate to another computer within the network. Internet addresses are allocated by the InterNIC an organization that administers the Internet.

Types and Commands in IP Address

Below are the types of IP Address Version:

  • IPV4
  • IPV6

1. IPV4: Internet Protocol Version 4 having a storage capacity of a 32-bit number. Due to security concerns and the growth of technology IPV4 got depleted so IPV6 came into the picture.

2. IPV6: Internet Protocol Version 6 uses the 128-bit number to store the address.

Below is the command to know the IP address of any device/network:

  • ifconfig -a: Used to view every configuration and settings.
  • hostname -i: It displays the IP address of your machine.
  • ip addr show: It shows IPv4 or IPv6 address on a device.

Parts in IP Address

It is comprised of two parts:

  • Host: It uniquely identifies a device/machine in the network that we can assign to each host. It takes 8 bits of the address. The host part will remain the same but the network part of the IP address will change.
  • Network: It uniquely identifies the network and its class. It also takes 8 bits of the address.

Two Parts in IP Address

Classification of IP Address

It can be of types which are listed below:

1. Static

The static IP addresses usually never change but they may vary as a result of network administration. They are a permanent Internet address that provides a simple and reliable way for communication. From the static IP address, we can get any important details such as geographical information in which a computer resides. The Internet Service Provider (ISP) usages these details to communicate through the devices. The best examples of Static IP Address is DNS Server(Domain Name Service). However, Statistic IP Address is less secure in comparison to Dynamic IP Address due to its assignment.

Popular Course in this category
All in One Software Development Bundle (600+ Courses, 50+ projects)600+ Online Courses | 3000+ Hours | Verifiable Certificates | Lifetime Access
4.6 (3,144 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)

2. Dynamic

When we connect any devices like mobile, computers, etc to the internet then Internet Service Provider (ISP) provides an IP address from the range of available IP addresses to the device through which we can connect, send and receive information. Next time when we again connect the same device to internet ISP will provide different IP addresses but from the same available range of IP addresses. Since the IP address keeps on changing every time we connect to the internet so such an IP address is termed as Dynamic IP address. Example of Dynamic IP Address is DHCP server(Dynamic Host Configuration Protocol)

Uses and Classes of IP Addresses

Below are the different class in it:

  • Class A address
  • Class B address
  • Class C address
  • Class D address
  • Class E address

Before getting into the Classes we must have an idea of subnetting. Subnetting is a process of diving a bigger network (host part ) into smaller for better administration and usage.

For Example, In a corporate firm, there are four departments; sales, production, development, and management. In each department, there are 30 users. The firm used a private class C IP network. Without any concept of subletting, all computers will work in a single large network.

Uses and Classes of IP Addresses

Now let us understand the classes:

Uses and Classes of IP Addresses2

** 1 byte = 8 bits

Note: Range 127.xxx.xxx.xx are reserved for the loopback/localhost, for example, 127.0.0.1 is the loopback address. Range 255.255.255.255 broadcasts address to all hosts on the local network.
  • Class A: The IP Address in this class ranges from 0 – 126 with a subnet mask of 255.0.0.0. It supports approx.16 million hosts on each of 127 networks. Mostly used by Internet Service Providers (ISP)
  • Class B: The IP Address in Class B ranges from 128 – 191 with a subnet mask of 255.255.0.0.It supports approx. 65,000 hosts over each of 16,000 networks. Used by medium and large-sized networks in enterprises and organizations.
  • Class C: IP Address ranges from 192 – 223  with a subnet mask of 255.255.255.0. It has 254 hosts on each of the 2 million networks. This class address is most common and used in small business and home networks
  • Class D: IP Address ranges from 224 -239 with no subnet mask. It is reserved for multicast groups.
  • Class E: IP Address ranges from 240 -255 with no subnet mask. It is reserved for future use, or research and development purposes.

Uses of IP Address

  • To assign Static/Dynamic IP addresses to new devices in a network in order to have communication.
  • Different protocols like DNS, DHCP, etc work on the concept of IP Address.
  • Proper tracking, security and monitoring of millions of devices in the network.
  • Source routing features which allow the sender of a packet to specify which route the packet should take on the way to its destination.

IP Addresses Based Network

Let’s see how do IP Addresses Work, based on two types of network:

  • Public: A public IP address is an address assigned to a computing device to allow direct access over the Internet. An email server, email server and any server device directly accessible from the Internet are public IP address which is globally unique and can only be assigned to a unique device.
  • Private: Private IP address is assigned to computers within your private space without letting them directly exposed to the Internet. For example, if we have multiple computers, mobile devices within your home you may want to use private IP addresses to address each computer within your home. Private IP address starts with :

Class A:10.0.0.0
Class B: 172.16.0.0
Class C: 198.168.0

Conclusion

IP Address is used for communication between two or more different devices within/outside the network using TCP/IP protocol to locate and administrate devices using Internet Service Provider(ISP).

Recommended Articles

This is a guide to How do IP Addresses Work?. Here we discuss types, class, classification, command, IP Address based network and uses. You can also go through our other related articles to learn more –

  1. What is IPv6?
  2. Get IP Address in PHP
  3. What is a Switch?
  4. What is a Router?

All in One Software Development Bundle (600+ Courses, 50+ projects)

600+ Online Courses

3000+ Hours

Verifiable Certificates

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you