Domains and sub domains, Computer Networking

Assignment Help:

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are grouped together in domains, which are grouped together then into one larger domain. For an analogy a host computer is refer as an apartment building in a housing complex and your account is only an apartment in it.

Domain might be an apartment complex, a town or even a country. Sub-domains might correspond to organizations like expertsmind.

"IN" Computers known as name servers have database of Internets host addresses. They translate word addresses or persons understandable in numeric equivalent.

Let us see another instance of Internet address:

https://www.xyz.in

What does it all mean? In fact, to the ISP server, very little. The server wished to see something quite distinct. It wants to view a 32-bit number as an Internet address. Something likes this equivalent decimal grouping:

198.168.45.249

The Internet addresses which is known as universal resources locators (URL), are translated from one form to the other via an address resolution protocol. The primary address is in the form we are most utilized to and that user employs to access an Internet site. In this instance, the address is for a website, recognized through the hypertext transfer protocol (http) that controls access to web pages. This http is a delimiter sequence,://, & identification for the world wide web (www).

The domain name, xyz follows www and recognizes the general site for the web.(dot) is one example of a domain top that is a broad classification of web users. Other common domain tops are following:

.com for commerce & businesses

.gov for government agencies

.mil for military sites

.org for all kinds of organizations.

Finally, in this instance is a country code, again preceded through a dot.

Addresses may be followed through sub domains separated through dots or slashes (/) as required. These addresses are translated into a 32-bit (4 decimal numeric groups) address illustrated as for https:// www xyz. in we will further discuss this topic in the next section.


Related Discussions:- Domains and sub domains

Selective repeat ARQ, Selective Repeat ARQ - Processing at the receive...

Selective Repeat ARQ - Processing at the receiver additionally complex - The window size is reduced to 2(m-1) (2m/2 at most) - Both the transmitter as well as the receiv

Parallel construct in openmp, Parallel Construct The syntax of the para...

Parallel Construct The syntax of the parallel construct is as follows: #pragma omp parallel [set of clauses]  where clause is one of the following:  structured-block if(sca

Design a network security policy, SSK Software Corporation has opened an of...

SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as

Explain the architecture and usage of isdn, Computer Networks 1. Write ...

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

Cidr presentation, Inside a device, every address mask is stored as a 32-bi...

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addres

Example of parallel sections construct, This example demonstrates the use o...

This example demonstrates the use of parallel sections construct. The three functions, fun1, fun2, and fun3, all can be executed concurrently.  Note that all the section directives

Explain the meaning and use of the z-index property in dhtml, QUESTION ...

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

Enable wireless security - ccna, Enable Wireless Security Step : Confi...

Enable Wireless Security Step : Configure Windows to use WEP authentication.  Navigate to the Network Connections page again and right-click the Wireless Network Connection

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd