Domains and sub domains, Computer Networking

Assignment Help:

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are grouped together in domains, which are grouped together then into one larger domain. For an analogy a host computer is refer as an apartment building in a housing complex and your account is only an apartment in it.

Domain might be an apartment complex, a town or even a country. Sub-domains might correspond to organizations like expertsmind.

"IN" Computers known as name servers have database of Internets host addresses. They translate word addresses or persons understandable in numeric equivalent.

Let us see another instance of Internet address:

https://www.xyz.in

What does it all mean? In fact, to the ISP server, very little. The server wished to see something quite distinct. It wants to view a 32-bit number as an Internet address. Something likes this equivalent decimal grouping:

198.168.45.249

The Internet addresses which is known as universal resources locators (URL), are translated from one form to the other via an address resolution protocol. The primary address is in the form we are most utilized to and that user employs to access an Internet site. In this instance, the address is for a website, recognized through the hypertext transfer protocol (http) that controls access to web pages. This http is a delimiter sequence,://, & identification for the world wide web (www).

The domain name, xyz follows www and recognizes the general site for the web.(dot) is one example of a domain top that is a broad classification of web users. Other common domain tops are following:

.com for commerce & businesses

.gov for government agencies

.mil for military sites

.org for all kinds of organizations.

Finally, in this instance is a country code, again preceded through a dot.

Addresses may be followed through sub domains separated through dots or slashes (/) as required. These addresses are translated into a 32-bit (4 decimal numeric groups) address illustrated as for https:// www xyz. in we will further discuss this topic in the next section.


Related Discussions:- Domains and sub domains

What are the unix-based firewalls, What are the Unix-based firewalls T...

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

CCNA, I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE ...

I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE BASED ON COMPLETE SEVER RELATED AND MAINTENANCE OF AN ENTIRE SMALL ENTERPRISE NETWORK.

Odd-even transposition algorithem, Algorithm:  Odd-Even Transposition //...

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Explain dynamic key management mechanism, Question: a) Consider the f...

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

Network topology, identify different network topologies.

identify different network topologies.

State in brief about the local area network, State in brief about the Local...

State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure

Concurrently read concurrently write (crcw), It is one of the models based ...

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use

Tcp connection management , TCP Connection Management TCP connection ...

TCP Connection Management TCP connection management encompasses the procedures for establishing and  terminating connection (FTCP is  connection oriented protocols). In TCP c

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd