Dynamic IP address – What is it?

Each smartphone, computer, IoT device, or any other device must have an IP address to connect to the Internet. Without it, it won’t have a universal identifier that everybody on the network can understand. The IP address that you can get can be a Dynamic IP address or Static IP address, but today we will focus our attention on the first one.

What is an IP?

IP stands for Internet Protocol, and it is a set of communication rules that devices need to use and obey to use the network of networks called the Internet. A part of its set of rules is the IP addresses, which are the identifier of the devices. One device needs to present itself with its IP address, and it requires the IP address of another so that it can send any data packet.

How do you get an IP address?

There are two types of IP addresses depending on their connectivity to external networks. A private IP address is used just inside your private network, and public IP address is used to identify the device or devices on the Internet.

Both can be assigned manually (static IP address) or dynamically with IP management like the DHCP server.

Dynamic IP address

A dynamic IP address is a temporary address that serves to identify a device on a network. The device must use it to connect, send and receive data packets with the rest of the devices on the network. It is called dynamic because there is a mechanism, usually a DHCP (Dynamic Host Configuration Protocol) server, that automatically assigns an IP address to every new connected device for some time. After a while, when the time runs out, the device needs to ask again for a new IP address to continue using the network.

The DHCP server keeps the account – lease period of IP addresses and manages the complete pool of IP addresses. The Dynamic IP address allocation saves an enormous amount of time for network administrators. This is because they don’t need to do all the work manually.

When you are getting an Internet service for your home or office, you will almost for sure get a Dynamic IP address. It will automatically change, and our device identifier will change. That is not a problem for most people, but there could be some situations when having a static IP address is better, like remote access and some service hosting.

Pros of Dynamic IP addresses

Easy to use. A DHCP server will automatically manage the IP addresses without the need for human interaction in most cases.

It could be more economical. The static IP addresses cost, and they are running out (IPv4 addresses), so the price is rising. The Dynamic IP addresses are a lot more cost-efficient.

Less risk. If you have an important device (server) that uses a Dynamic IP address, it is harder for hackers to attack it. It will change its address over time.

Cons of Dynamic IP addresses

Single point of failure. If the DHCP server is down, so is the complete network, and this will stop the communication.

Dynamic IP addresses might be a problem in the case of some services like surveillance, VoIP, or hosting websites. However, there is a solution, and it is called Dynamic DNS. It links the IP address to a domain name and creates a method of automatic IP update. That way, you can still use a server with a dynamic IP address and offer a service to external users.


Even though IPv6 might provide enough addresses for all the devices, we will still use Dynamic IP addresses because of their convenient use.

Round – Robin DNS meaning

After its launching in the 90s, load balancing becomes a game-changer in traffic distribution across networks. Round-Robin as a load balancer is significant in maintaining the flow of data moving efficiently and easily among servers and endpoints. It is also one of the most common and affordable techniques. Let’s explain a little bit more about it.

How does load balancing work?

Load balancing is a method for distributing traffic across networks. It is managing the different servers such networks include. Mainly the traffic in large networks has to be led to increasing the efficient general performance. Otherwise, you risk having weak sports in some points.

Few servers can get flooded with high traffic, and others at the same time could barely operate. This causes an incredible mess. Security threats like DDoS attacks will become less detectable and a lot more harmful.

Whit the load balancing method, you can administrate the traffic and optimize the network’s performance. The process is strongly recommended. A few more of its benefits are also faster loading time and a backup in case of an interruption.

Round – Robin DNS definition

Round-Robin DNS is a DNS load balancing technique that administrates the traffic. It depends on when a user request arrives and the number of servers you have. The concept is simple: you have various A or AAAA records that have different IP addresses. With every one of these IP addresses corresponds to a different web server. They have a duplicate of your site. When a user desires to reach your site, its browser tries to resolve your domain name. Your authoritative name server, which is responsible for the A or AAAA records, will give the next in rotation turn A or AAAA records from those you own. It is possible to have records for every one of your web servers. The visitors will be automatically redirected, when they are trying to access your site. This happens in order of the moment when they reached your DNS name server.

Let’s explain it a little bit more. 

Think a situation where you have 5 users and 3 servers:

User 1 attaches to server 1, user 2 to server 2, user 3 to server 3.

When user 4 wants to connect with the website, the circle will start again. User 4 will connect to server 1, user 5 to server 2, etc. 

DNS Round-Robin will reduce and administrate better the traffic to your site. As a result of Round-Robin, your customers will have a better user experience every time they visit your site. Also, a less saturated network and overall better performance.

The mechanism can be modified. If your web servers are not exactly the same. Let’s assume server 1 is a lot better than the other 2. It is a good idea to use it two times more. Like so, you get the best productivity. Here you could think for the Weighted Round Robin. 

Variants to the Round‑Robin algorithm

  • Weighted Round-Robin – The site administrator chooses criteria and assigns to each server the weight. The most regularly used criterion is the server’s traffic‑handling capability. The higher the weight, the more significant the proportion of user requests the server receives. 
  • Dynamic Round-Robin – A weight is allocated to every one of the servers dynamically. It is based on real‑time data about any of the servers’ load at the moment and unused potential.

TTL (Time To Live) explained

We live in an environment where time is probably one of the most critical factors in our everyday life. Computing and networking are not any different. Many of the processes frequently must happen in a specific period of time. Here comes TTL in hand. In some cases, the task should be finished in milliseconds. Can you imagine that? Let’s make things a little bit more precise and explain what TTL actually is?

What is TTL?

TTL is the short acronym for time-to-live. It refers to the value that points to the exact period of time or number of hops that the data packet is configured to be alive on a network. In some cases, also in the cache memory. When that time expires, or it hops the number of times, routers will discard it. There exist many different varieties of data chunks. Every and each of them operates with their particular TTL. That means the time such data will be held in a device to function or finish a certain task.

How does it work?

If the massive amount of packets is not controlled, they will travel around routers permanently. The way to avoid this is with a limit of time or expiration on every data packet. This allows understanding how long they have been around and track their route on the Internet.

Packets travel through network points with the purpose of reaching their final destination. There is a spot inside the data packets’ design where the TTL value is placed.

Routers receive the TTL value inside the packet. It will pass to the next network point if there is spare time or hops. But if the value of TTL shows that there is no more remaining hops/time, routers won’t pass it anymore.

Instead, routers will send an ICMP (Internet Control Message Protocol) message. This type of message is used to report IP errors or diagnoses and directs to the IP address source, which issued the packet.

It will take a specific time for every ICMP message to arrive at the source. During that time, it is likely to track the hops it made while alive on the network.

TTL and DNS 

TTL in DNS finds its place for the time that the DNS resolvers have to keep the DNS records in their cache. Every DNS record has its assigned TTL value. When it is of the record is longer, there is less chance that the value will change. Therefore other records with a lot and often changes will be with a shorter value.

And because DNS requests are also packets of data, they have their TTL value inside. It would be a very interesting case if they didn’t have such limitations. DNS queries would constantly go from server to server and never finding a destination. TTL value acts as a stop mechanism of a DNS request and prevents endless search for an answer and pointless stress on the Domain Name System. The value begins with a larger number and gets decreased until it comes to zero by the routers.

How does TCP work?

TCP definition

Transmission Control Protocol (TCP) is a communication standard that software applications are using for exchanging data. It’s planed for efficiency, not speed. Data packets, in data transport, sometimes get lost or arrive out of order. TCP helps to guarantee every packet reaches its destination and if it’s needed to be rearranged. If a packet doesn’t reach its’ end in a certain timeframe, TCP will request re-transmission of the lost data. It manages the connection between the two applications. This happens during the entire exchange. The goal is to ensure that both parties send and receive everything wanted to be transmitted and verify that it is accurate. TCP is a prevalent protocol in network communications. 

How does it work?

Transmission Control Protocol works through a process that includes several steps. 

As mentioned earlier, TCP is connection-oriented. It has to ensure that the connection between source and destination is set and endured until the sending and receiving of messages is performed.

The first step. TCP arranges the connection required by a source and its goal. During this stage, there’s a connection, but there’s not data transmission yet. 

The second step. Here communication begins. TCP receives messages from the sender (server or application) and divided them into packets. 

Third step. TCP adjusts the chopped data with numbers to regulate all the packets and protect messages’ genuineness. 

Step Four. Now chopped and numbered, messages will proceed to the IP layer for transporting. They will be sent and re-sent by the many devices connected in the network (gateways, routers, etc.) till they arrive at their destination. All packets can travel following a diverse route, but they all have the same end destination. 

Step Five. At the moment they arrive, they start rebuilding. By the numbers accredited to every message’s packet, it arranges all packets together again. 

Step Six. When messages are formed, they are transferred to their recipient. 

When networks’ performance is affected, TCP can help. For example, affected packets, which got duplicated, disordered, or lost. The protocol can recognize the specific problem, request the lost data to be transmitted again, and reorganize the misplaced packets in the proper order.

The source gets informed about a failure, if messages still don’t get delivered.

Transmission Control Protocol is a solid standard and definitely a solution for the Internet to operate better and more precisely. 

What is TCP used for?

TCP is a primary component of daily Internet usage. When you’re browsing the web and opening a web page, the webserver uses the help of HyperText Transfer Protocol (HTTP) to transfer the file for the website to your device. HTTP depends on TCP to connect the server to your computer and secure that the file gets carried correctly over IP. For example, Simple Mail Transfer Protocol (SMTP) for sending and receiving email, File Transfer Protocol (FTP) for peer-to-peer file sharing, also rely on TCP. 

When the correctness of the information transfer is more important than the speed, it is likely TCP to be in hand. It uses three-way handshakes to build the connection. It chops data to tinier packets and asks for re-transmission to secure accuracy. 

That extends the time for the data to transport from one application to another.

This prolonged latency restrains Internet usage. For example, Voice Over Internet Protocol (VoIP), video gaming, and video streaming can’t benefit TCP. In these cases, high-level protocols will use the User Datagram Protocol, which is faster but less precise.