Skip to content

Putting Names on IP Addresses. You should be glad there’s DNS to help.

When it comes to IP addressing, networking and just about everything else related to computing, it’s important to remember that everything that works behind the scenes is created for computers first, people second.

For example, an IP address, which points to a designated computer or even a website, is designed to help computers—not computer users— network with each other.

We would surely have a hard time remembering a friend’s “computer address” of Imagine if we had to remember hundreds of them. (It would be just like having to remember 1,000 people in our phone lists by their phone numbers, not their names.)

For example, here are three IP addresses connected to websites for well-know organizations. Do you recognize any of them?


Well, here’s where those IP addresses would take you:


TCP/IP (Transmission Control Protocol/Internet Protocol) has built into it a parallel structure of user-based, ordinary, relevant and logical names, called the Domain Name System or DNS (it’s also referred to as the Domain Name Service). In short, when a request for information or a file is sent out on the Internet, the destination address and “sender” address are IP addresses.

The process of tagging or mapping a domain name, such as “” or “,” to the IP address is called name resolution.

On the Internet, there are special computers called name servers whose job it is to help translate domain names to and from IP addresses. The computer addresses that we recognize and associate with email—such as “”—or with websites—such as “”—are expressed as DNS names.

Automatic: numbers to names.

The vast Domain Name System delivers domain mapping for all DNS-registered computers on a network. That’s why we—along with all of the ordinary Internet users in the world—don’t have to type in IP addresses to send email or visit a website. And isn’t that a good thing?

Related Articles

  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety

IoT: How to Deal with the Internet of Threats

The Internet of Things, or IoT, has become one of the most convenient—and dangerous—ways for consumers to…

[Read More]

What to Do if You’re Being Catfished

You meet someone online, but something doesn’t seem quite right. They seem to lead an abnormal lavish…

[Read More]

Everything You Need to Know About VoIP Phishing and How to Prevent These Attacks

VoIP (Voice over Internet Protocol) exists to help people with their voice-based communication using the Internet –…

[Read More]
The Amazing VPN

The Amazing VPN Is the Swiss Army Knife of Apps

If everyone knew how incredibly versatile a VPN is at protecting us online, nobody would go online...

[Read More]
Charles Ponzi

Ponzi Schemes: What Should You Know About These Investments Traps?

A Ponzi scheme in investment fraud characterized by using money from new "investors" to pay off original...

[Read More]

Security Conspiracy Theories That Might Actually Be Right

In today’s age of disinformation and fake news, conspiracy theories are running rampant. Some are small and…

[Read More]