The _____ ip address is the ip address of the system that originated the ip packet.

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

Key Takeaways

  • An internet protocol (IP) address allows computers to send and receive information.
  • There are four types of IP addresses: public, private, static, and dynamic.
  • An IP address allows information to be sent and received by the correct parties, which means it can also be used to track down a user's physical location in some instances.

How an IP Address Works

An IP address allows computers to send and receive data over the internet. Most IP addresses are purely numerical, but as internet usage grows, letters have been added to some addresses.

There are four different types of IP addresses: public, private, static, and dynamic. While the public and private are indicative of the location of the network—private being used inside a network while the public is used outside of a network—static and dynamic indicate permanency.

A static IP address is one that was manually created, as opposed to having been assigned. A static address also does not change, whereas a dynamic IP address has been assigned by a Dynamic Host Configuration Protocol (DHCP) server and is subject to change. Dynamic IP addresses are the most common type of internet protocol addresses. Dynamic IP addresses are only active for a certain amount of time, after which they expire. The computer will either automatically request a new lease, or the computer may receive a new IP address.

An IP address can be compared to a Social Security Number (SSN) since each one is completely unique to the computer or user it is assigned to. The creation of these numbers allows routers to identify where they are sending information on the internet. They also make sure that the correct devices are receiving what is being sent. Much like the post office needs a mailing address to deliver a package, a router needs an IP address to deliver to the web address requested.

Example of an IP Address

The dark web refers to encrypted online content that is not indexed by conventional search engines. The dark web has an illegal online market where criminals can deal in illegal and illicit goods. Many of these exchanges take place using the online cryptocurrency bitcoin, which makes it harder for the authorities to track and capture people participating in these transactions.

In 2018, after a yearlong government operation, agents working with the Department of Homeland Security posed as weapons dealers in order to gain access to the computers of suspects who were trying to purchase weapons illegally. This allowed them to gain access to IP addresses, which they used to track down the geographical locations of additional suspects who were using the dark web.

This isn’t the first time IP addresses have led to arrests. In 2012, police used IP addresses to track down and arrest members of the hacking group Lulzsec. Using warrants to obtain information from the Internet Service Provider (ISP), law enforcement personnel were able to track down the physical addresses of the hackers and arrest them for their illegal internet activity.   

How Do I Find Out My IP Address?

There are several ways to determine your IP address. Perhaps the simplest is typing "what is my ip address" into an internet search engine like Google. For Windows users, you can find your IP by opening [Start > Settings > Network & internet] and then select the Wi-Fi network you're connected to. Under Properties, find your IP address listed next to "IPv4 address".

How Can Someone "Spoof" Their IP Address?

You can make your IP address look like it comes from somewhere else via a virtual private network (VPN). These services essentially mask your computer's internet address by virtually joining the network that they establish. Therefore, your IP address will appear as theirs. Hackers may also spoof IP addresses using more sophisticated techniques that modify the source address in a malicious data packet header to mimic a trusted source and accept it.

What Is an IPv6 Address?

IPv4 addresses consist of four one- to three-digit numerals separated by a dot. IPv6 is the newer version of internet addressing that uses a 128-bit alphanumeric value to identify an endpoint device online.

An Ipv4 address may look something like 208.80. 154.224, and an Ipv6 address may look like: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

IPv6 allows for far more connected devices to exist on the internet without duplicating addresses, which can cause issues.

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP is also used as a communications protocol in a private computer network (an intranet or extranet).

The entire IP suite -- a set of rules and procedures -- is commonly referred to as TCP/IP. TCP and IP are the two main protocols, though others are included in the suite. The TCP/IP protocol suite functions as an abstraction layer between internet applications and the routing and switching fabric.

TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination. TCP/IP requires little central management and is designed to make networks reliable with the ability to recover automatically from the failure of any device on the network.

The two main protocols in the IP suite serve specific functions. TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway computer on the network checks this IP address to determine where to forward the message.

A subnet mask tells a computer, or other network device, what portion of the IP address is used to represent the network and what part is used to represent hosts, or other computers, on the network.

Network address translation (NAT) is the virtualization of IP addresses. NAT helps improve security and decrease the number of IP addresses an organization needs.

Common TCP/IP protocols include the following:

  • Hypertext Transfer Protocol (HTTP) handles the communication between a web server and a web browser.
  • HTTP Secure handles secure communication between a web server and a web browser.
  • File Transfer Protocol handles transmission of files between computers.

How does TCP/IP work?

TCP/IP uses the client-server model of communication in which a user or machine (a client) is provided a service, like sending a webpage, by another computer (a server) in the network.

Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously.

The transport layer itself, however, is stateful. It transmits a single message, and its connection remains in place until all the packets in a message have been received and reassembled at the destination.

The TCP/IP model differs slightly from the seven-layer Open Systems Interconnection (OSI) networking model designed after it. The OSI reference model defines how applications can communicate over a network.

Why is TCP/IP important?

TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the IP suite can be modified easily. It is compatible with all operating systems (OSes), so it can communicate with any other system. The IP suite is also compatible with all types of computer hardware and networks.

TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient path through the network. It is widely used in current internet architecture.

The 4 layers of the TCP/IP model

TCP/IP functionality is divided into four layers, each of which includes specific protocols:

  1. The application layer provides applications with standardized data exchange. Its protocols include HTTP, FTP, Post Office Protocol 3, Simple Mail Transfer Protocol and Simple Network Management Protocol. At the application layer, the payload is the actual application data.
  2. The transport layer is responsible for maintaining end-to-end communications across the network. TCP handles communications between hosts and provides flow control, multiplexing and reliability. The transport protocols include TCP and User Datagram Protocol, which is sometimes used instead of TCP for special purposes.
  3. The network layer, also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are IP and Internet Control Message Protocol, which is used for error reporting.
  4. The physical layer, also known as the network interface layer or data link layer, consists of protocols that operate only on a link -- the network component that interconnects nodes or hosts in the network. The protocols in this lowest layer include Ethernet for local area networks and Address Resolution Protocol.

Uses of TCP/IP

TCP/IP can be used to provide remote login over the network for interactive file transfer to deliver email, to deliver webpages over the network and to remotely access a server host's file system. Most broadly, it is used to represent how information changes form as it travels over a network from the concrete physical layer to the abstract application layer. It details the basic protocols, or methods of communication, at each layer as information passes through.

Pros and cons of TCP/IP

The advantages of using the TCP/IP model include the following:

  • helps establish a connection between different types of computers;
  • works independently of the OS;
  • supports many routing protocols;
  • uses client-server architecture that is highly scalable;
  • can be operated independently;
  • supports several routing protocols; and
  • is lightweight and doesn't place unnecessary strain on a network or computer.

The disadvantages of TCP/IP include the following:

  • is complicated to set up and manage;
  • transport layer does not guarantee delivery of packets;
  • is not easy to replace protocols in TCP/IP;
  • does not clearly separate the concepts of services, interfaces and protocols, so it is not suitable for describing new technologies in new networks; and
  • is especially vulnerable to a synchronization attack, which is a type of denial-of-service attack in which a bad actor uses TCP/IP.

How are TCP/IP and IP different?

There are numerous differences between TCP/IP and IP. For example, IP is a low-level internet protocol that facilitates data communications over the internet. Its purpose is to deliver packets of data that consist of a header, which contains routing information, such as source and destination of the data, and the data payload itself.

IP is limited by the amount of data that it can send. The maximum size of a single IP data packet, which contains both the header and the data, is between 20 and 24 bytes long. This means that longer strings of data must be broken into multiple data packets that must be independently sent and then reorganized into the correct order after they are sent.

Since IP is strictly a data send/receive protocol, there is no built-in checking that verifies whether the data packets sent were actually received.

In contrast to IP, TCP/IP is a higher-level smart communications protocol that can do more things. TCP/IP still uses IP as a means of transporting data packets, but it also connects computers, applications, webpages and web servers. TCP understands holistically the entire streams of data that these assets require in order to operate, and it makes sure the entire volume of data needed is sent the first time. TCP also runs checks that ensure the data is delivered.

As it does its work, TCP can also control the size and flow rate of data. It ensures that networks are free of any congestion that could block the receipt of data.

An example is an application that wants to send a large amount of data over the internet. If the application only used IP, the data would have to be broken into multiple IP packets. This would require multiple requests to send and receive data, since IP requests are issued per packet.

With TCP, only a single request to send an entire data stream is needed; TCP handles the rest. Unlike IP, TCP can detect problems that arise in IP and request retransmission of any data packets that were lost. TCP can also reorganize packets so they get transmitted in the proper order -- and it can minimize network congestion. TCP/IP makes data transfers over the internet easier.

TCP/IP model vs. OSI model

TCP/IP and OSI are the most widely used communication networking protocols. The main difference is that OSI is a conceptual model that is not practically used for communication. Rather, it defines how applications can communicate over a network. TCP/IP, on the other hand, is widely used to establish links and network interaction.

The TCP/IP protocols lay out standards on which the internet was created, while the OSI model provides guidelines on how communication has to be done. Therefore, TCP/IP is a more practical model.

The TCP/IP and OSI models have similarities and differences. The main similarity is in the way they are constructed as both use layers, although TCP/IP consists of just four layers, while the OSI model consists of the following seven layers:

  • Layer 7, the application layer, enables the user -- software or human -- to interact with the application or network when the user wants to read messages, transfer files or engage in other network-related activities.
  • Layer 6, the presentation layer, translates or formats data for the application layer based on the semantics or syntax that the app accepts.
  • Layer 5, the session layer, sets up, coordinates and terminates conversations between apps.
  • Layer 4, the transport layer, handles transferring data across a network and providing error-checking mechanisms and data flow controls.
  • Layer 3, the network layer, moves data into and through other networks.
  • Layer 2, the data link layer, handles problems that occur as a result of bit transmission errors.
  • Layer 1, the physical layer, transports data using electrical, mechanical or procedural interfaces.

The upper layer for both the TCP/IP model and the OSI model is the application layer. Although this layer performs the same tasks in each model, those tasks may vary depending on the data each receives.

The _____ ip address is the ip address of the system that originated the ip packet.

The functions performed in each model are also similar because each uses a network layer and transport layer to operate. The TCP/IP and OSI models are each mostly used to transmit data packets. Although they will do so by different means and by different paths, they will still reach their destinations.

The similarities between the TCP/IP model and the OSI model include the following:

  • They are both logical models.
  • They define networking standards.
  • They divide the network communication process in layers.
  • They provide frameworks for creating and implementing networking standards and devices.
  • They enable one manufacturer to make devices and network components that can coexist and work with the devices and components made by other manufacturers.

The differences between the TCP/IP model and the OSI model include the following:

  • TCP/IP uses just one layer (application) to define the functionalities of the upper layers, while OSI uses three layers (application, presentation and session).
  • TCP/IP uses one layer (physical) to define the functionalities of the bottom layers, while OSI uses two layers (physical and data link).
  • The TCP/IP header size is 20 bytes, while the OSI header is 5 bytes.
  • TCP/IP is a protocol-oriented standard, whereas OSI is a generic model based on the functionalities of each layer.
  • TCP/IP follows a horizontal approach, while OSI follows a vertical approach.
  • In TCP/IP, the protocols were developed first, and then the model was developed. In OSI, the model was developed first, and then the protocols in each layer were developed.
  • TCP/IP helps establish a connection between different types of computers, whereas OSI helps standardize routers, switches, motherboards and other hardware.

The history of TCP/IP

The Defense Advanced Research Projects Agency, the research branch of the U.S. Department of Defense, created the TCP/IP model in the 1970s for use in ARPANET, a wide area network that preceded the internet. TCP/IP was originally designed for the Unix OS, and it has been built into all of the OSes that came after it.

The TCP/IP model and its related protocols are now maintained by the Internet Engineering Task Force.

Which of the following applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet?

Packet Filters – It applies a set of rules (based on the contents of IP and transport header fields) on each packet and based on the outcome, decides to either forward or discard the packet.

Which firewall is a software module used to secure an individual host?

4) Available in many operating systems or provided as an add-on package, a DMZ is a software module used to secure an individual host and also filters and restricts the flow of packets.