What is an IP for?
As the IP addresses are something like the identification number of a device accessing the Internet, then they become something like a system to rule the world wide web (www). Among the actions that you can do with the IPs are: To link computers or find people that you may need to contact. In the next section we will explain with some examples of the IP usability and their importance.
To begin with, with an IP address the user of a network can be identified, it does not matter whether it is dynamic or not because in the case of a static one it can be traced from where the user is connected and if it is dynamic the supplier can track the specific user due to the companies allocate these kind of IPs, then they know how to identify their users. That is enough to make a myriad of things; For example, if you need to contact a user from another computer then the IP address assures to get the precise machine and not any other. In the case of gamer world, it is a very common practice, cutting-edge video games are built to allow online teamwork then contacting friends and colleagues to do missions is very common, this can be done either from the computer or directly from the video game console, which also has an IP address. Gamers are well known for this kind of practice.
Another practice related to the use of IPs is to block websites, something that has been widely criticized around the world. It always depends on the region where the user is and the restrictions in the area as there are no absolute and universal rules on Internet use but this is something that depends on the government. Depending on the region where you are, a user can access (or not) certain content; you may have faced any situation when you want to see a video but suddenly there is a message explaining that the content is forbidden or block in the country that is why users cannot enjoy their favorite songs or series spcially when they have been recently aired.
if it is the account holder or not is not important in this example) accessed to a bank account that belongs to an "X" country and the user is in a "Y" country, the bank might consider that someone in that region is trying to Hack the account. So both banks and governments identify the area from where their users access via IP addresses. While this may cause unrest in some users, it is a very valid strategy to combat piracy and access to sensitive material that denigrates human beings, whereby a radical position on this dilemma is not very common.
It is also very common that you have access to your computer via remote access. It is not something simple but to do so knowing the IP is a step in the process. This allows you to access almost everything you have on your desktop computer, in fact in some countrys many providers of Internet, software and technical service teams use remote access to make repairs, replacements or provide online support their customers and users.
How can my computer be identified through the IP?
Basically, the IP addresses consist of two parts. The first one stands for the the network and the second one represents the node or host. In turn, the class of the address determines which part belongs to the network address and which part belongs to the node address. All nodes in a particular network share the same network prefix but they must have a unique host number.
Una redes de clase A: en está red la dirección binaria comienza con 0, por lo tanto, el número decimal puede ser desde 1 a 126. Los primeros 8 bits (el primer octeto) identifican la red y los 24 bits restantes indican el host dentro de la red. Un ejemplo de una dirección IP de clase A es 220.127.116.117, donde "102" identifica la red y "168.212.987" identifica el host en esa red.
A Class A networks: This binary network address begins with 0, therefore the decimal number can be from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102 168 212 987, where "102" identifies the network and "168 212 987" identifies the host on that network.
Class B networks: In this case the binary addresses start with 10, therefore the decimal number can be anywhere from 128 to 191. The number 127 is reserved for loopback and it is used for internal tests on the local team. The first 16 bits (first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168 685 226 204 where "168 685" identifies the network and "226 204" identifies the host on that network.
Class C networks: Here the binary addresses start with 110, therefore the decimal number can be anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 220 168 212 226 where "220 168 212" identifies the network and "226" identifies the host on that network.
Class D networks: in such networks, binary addresses start with 1110, therefore the decimal number can be used from 224 to 239. Class D networks are used to support multicast.
As you can see, the IP address contains quite important information, that is why it is also very common for hackers to enter in a computer if someone gets access to a particular IP address, so it is sometimes better to have a dynamic IP to a static IP . Although it is not easy to access it does not mean that it is impossible because an IP is something akin to a home address, so it is a big step ôf location. Therefore it is not advisable to reveal this number to anyone unless you are sure what they will do. Surely you have heard that hackers can hack your computer via your IP address. This is one reason why there are proxy servers as well as anonimity services to protect people that someone can get unwanted access. But how hackers can use only one address to access a machine and make a whole mess?
One option is by "open ports." Your equipment performs actions such as sharing files in so-called ports. A port is just an output for service that is used as an endpoint of communication. There are a total of 65,535 ports assigned TCP / UDP. Hackers can exploit a service in a port and then^^ find the information they need; afterwards, they use programs such as "Packet Storm" to reach your location.
Despite this, it is not something that anyone can do. There is specialized equipment and computer software needed not to mention the knowledge and experience required. Just as they can trace your computer they can be tracked. In European countries the government has enough technology to keep this under control not only for the state but for all citizens; They also use this to prevent piracy and access to sensitive or illegal material.