Internet address, Computer Networking

Assignment Help:

Addresses are necessary for virtually everything we do on the Internet. In TCP/IP the IP is a mechanism for providing addresses for computers on the Internet. Internet addresses have two following forms:

  • Person understandable which is expressed as words
  • Machine understandable which is expressed as numbers

The following may be a typical person understandable address on Internet:

VVS @ expertsmind .in

VVS is username which generally is the name of the Internet account. This name is same as the one, that you may use while logging into the computer on which you have your Internet account. Logging in is the procedure of gaining access to your account on a computer, which is shared through several users. Your Internet account is made on it.

@ Connect "who" with where:

.expertsmind is a subdomain (could be many in each could be separated trhough (dot). Last one is referred to a domain).

.in is a domain top or what part in - It refers to "where" part which is a country code.


Related Discussions:- Internet address

Explain about the browser, Explain about the Browser A program that ...

Explain about the Browser A program that allows the user to access and read information on the World Wide Web. Netscape® Navigator and Microsoft Explorer® are the best known

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Name the presentation layer standards, A.) JPEG and PICT B.) MPEG and MI...

A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC For example, the Presentation layer would be liable for changing from EDCDIC to ASCII. Data compression, decompres

Describe about the server and browser software, Describe about the Server a...

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Describe the different steps in distributed problem solving, QUESTION (...

QUESTION (a) Four important benefits of Multi-Agent Systems are modularity, efficiency, reliability and flexibility. Briefly explain these benefits (b) Agents work together

Explain the term - carrier sense multiple access, What is use of Carrier se...

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

Define decoder, Define Decoder? A device or program that translates enc...

Define Decoder? A device or program that translates encoded data into its original format (e.g. it decodes the data). The term is often used in reference to MPEG-2 video and so

Shared memory programming, We know that all processors share a common memor...

We know that all processors share a common memory in shared memory model. Every processor, however, can be assigned a different part of the program stored in the memory to implemen

What is the virtual path, Along any transmission path from a given source t...

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd