Domains and sub domains, Computer Networking

Assignment Help:

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are grouped together in domains, which are grouped together then into one larger domain. For an analogy a host computer is refer as an apartment building in a housing complex and your account is only an apartment in it.

Domain might be an apartment complex, a town or even a country. Sub-domains might correspond to organizations like expertsmind.

"IN" Computers known as name servers have database of Internets host addresses. They translate word addresses or persons understandable in numeric equivalent.

Let us see another instance of Internet address:

https://www.xyz.in

What does it all mean? In fact, to the ISP server, very little. The server wished to see something quite distinct. It wants to view a 32-bit number as an Internet address. Something likes this equivalent decimal grouping:

198.168.45.249

The Internet addresses which is known as universal resources locators (URL), are translated from one form to the other via an address resolution protocol. The primary address is in the form we are most utilized to and that user employs to access an Internet site. In this instance, the address is for a website, recognized through the hypertext transfer protocol (http) that controls access to web pages. This http is a delimiter sequence,://, & identification for the world wide web (www).

The domain name, xyz follows www and recognizes the general site for the web.(dot) is one example of a domain top that is a broad classification of web users. Other common domain tops are following:

.com for commerce & businesses

.gov for government agencies

.mil for military sites

.org for all kinds of organizations.

Finally, in this instance is a country code, again preceded through a dot.

Addresses may be followed through sub domains separated through dots or slashes (/) as required. These addresses are translated into a 32-bit (4 decimal numeric groups) address illustrated as for https:// www xyz. in we will further discuss this topic in the next section.


Related Discussions:- Domains and sub domains

Show about alternate mark inversion, Q. Show about Alternate mark inversion...

Q. Show about Alternate mark inversion? Bipolar AMI - Neutral, zero voltage represents binary 0 - Binary 1s symbolized by alternating positive and negative voltages

Message passing programming, Message passing is probably the most extensive...

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems.

Physical configurations sonet sdh , Physical Configurations Transport ...

Physical Configurations Transport signal multiplexer de multiplexer. It either  signal from multiple   sources into a STS singles  or de multiplexes and STS signal  into diffe

What are the two broad classes of middleware, Two broad classes of middlewa...

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

Distant vector protocols, RIP and IGRP are Distance Vectoring protocols tha...

RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector

Define the term - handoff and dynamic configuration, Define the term - Hand...

Define the term - Handoff and Dynamic configuration Handoff/roaming  The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to anoth

What is meant by middleware, Middleware is distributed software required to...

Middleware is distributed software required to support interaction among clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it

Networking concepts, Networking Concepts Q1  What are the main feature...

Networking Concepts Q1  What are the main features of TCP connections? Why is it said that TCP provides full-duplex service? Q2  What are the differences between TCP conne

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd