I have to admit to haven't really understood what you means
.
Anyway the IP address is your Id code on the net, to change it is like to change identity. This means that a change of IP will reset any connection created with the previous one.
About IP banning there are actually 2 types: the light one is actuated just removing the name address resolution (known as DNS resolution) so you are unable to get the IP address from a domain name. The strongest one requires the programming of a black list IP's in the state or region network backbone routers. The last is typically used in nations with limited freedom to avoid free exchange of ideas.
While the second is really hard to hack, the firs one is simply bypassed using a different global DNS provider as the
google public DNS service or the
free DNS or other similar service. Consider anyway that if the black list protection is on you'll never get out of the wall, and maybe even the free DNS address are blacked out.
Anyway even in that cases there are systems to jump over the wall, one example of such systems you cal look at the
tor network.. The TOR network, as the other anonymizer software, works using a galaxy of servers that forward you data, after encryption, between multiple hops up to the final destination. The servers are anonymous too and can change their IP if blacklisted. Some data is spread using broadcast or general protocols that can confuse the sniffing software running on the routers. Tor technology, specifically, use a multiple addressing path sending the message to multiple servers, but only one will forward the message toward the destination while the others will get lost. This makes very difficult and traffic expansive to try to follow packets to destination that remains anonymous
.
You can read
here how Tor deploy this process.
That could seem very nice and helpful for those that lives restricted freedom, but as a knife can be used to eat or to kill.
Even if:
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
The system can be used by completely different people, malicious individual can use the system in a free country to get advantage of the anonymity to exchange info (i.e. for terrorist scopes
see and
see or this and many others).