Domains and sub domains, Computer Networking

Assignment Help:

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are grouped together in domains, which are grouped together then into one larger domain. For an analogy a host computer is refer as an apartment building in a housing complex and your account is only an apartment in it.

Domain might be an apartment complex, a town or even a country. Sub-domains might correspond to organizations like expertsmind.

"IN" Computers known as name servers have database of Internets host addresses. They translate word addresses or persons understandable in numeric equivalent.

Let us see another instance of Internet address:

https://www.xyz.in

What does it all mean? In fact, to the ISP server, very little. The server wished to see something quite distinct. It wants to view a 32-bit number as an Internet address. Something likes this equivalent decimal grouping:

198.168.45.249

The Internet addresses which is known as universal resources locators (URL), are translated from one form to the other via an address resolution protocol. The primary address is in the form we are most utilized to and that user employs to access an Internet site. In this instance, the address is for a website, recognized through the hypertext transfer protocol (http) that controls access to web pages. This http is a delimiter sequence,://, & identification for the world wide web (www).

The domain name, xyz follows www and recognizes the general site for the web.(dot) is one example of a domain top that is a broad classification of web users. Other common domain tops are following:

.com for commerce & businesses

.gov for government agencies

.mil for military sites

.org for all kinds of organizations.

Finally, in this instance is a country code, again preceded through a dot.

Addresses may be followed through sub domains separated through dots or slashes (/) as required. These addresses are translated into a 32-bit (4 decimal numeric groups) address illustrated as for https:// www xyz. in we will further discuss this topic in the next section.


Related Discussions:- Domains and sub domains

eigrp protocol update route information, How does EIGRP protocol update ro...

How does EIGRP protocol update route information to its neighbors

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Calculate the efficiency of stop-and-wait ARQ, Suppose that frames are 1250...

Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. Calculate the efficiency of stop-and-wait ARQ (a) Transmits a

Operating system for clients, Operating system for Clients All of the ...

Operating system for Clients All of the clients running popular operating systems such as Microsoft Windows, Mac OS, UNIX, etc., could be used to function as backbone software

Electrical characteristics of 9-pin RS232 connector, Q. Electrical Characte...

Q. Electrical Characteristics of 9-Pin RS232 Connector? Electrical Characteristics - Single-ended One wire per signal and voltage levels are with respect to s

Layers, Layers, Massages, Segments, Datagram's and Frames Figure 2.15 ...

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

Show the error detection- check sum, Error Detection- Check Sum Th...

Error Detection- Check Sum The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16) These segments are added utilizing one's c

How many cycles are lost for instruction accessing memory, 1.  A computer s...

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd