Structure of internet servers address, Computer Networking

Assignment Help:

In a client's software , the structure of an Internet server's address keyed is as follows:

Where:

  • http refer for the communication protocol to be used
  • www refer for the notation for World Wide Web
  • .Microsoft is the registered domain Name linked with the IP address of an Internet Server.
  • .com the server provides commercial services to clients who link to it.

 

To help to speed up access, its IP address can be represented directly in form of numbers. 127.57.13.1 rather than the domain name, microsoft.com. In this particular case no name resolution needs to occur.

An Internet address is a unique 32-bit number i.e. expressed typically as four 8-bit octets, with each octet separated through a period. Each octet can take on any number from 0 through 255.


Related Discussions:- Structure of internet servers address

Print Servers, Which of the following commands will display the current pri...

Which of the following commands will display the current print jobs on a printer named Office Printer 01?

Show example on check sum, Q. Show Example on Check Sum? Data: 10...

Q. Show Example on Check Sum? Data: 10101001 00111001 Computing Checksum: 10101001 00111001 --------------- Sum 11100010 Receiver Side: 10101

Interconnection networks and sorting, As in PRAM, there was no direct commu...

As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net

Internet architecture, Company seldom uses a single router to connect its e...

Company seldom uses a single router to connect its entire network for two purpose. Because the router must transmit every packet, the processor in a provided router is insuff

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

Determine 802.11a OFDM, 802.11a OFDM a) Orthogonal frequency-division m...

802.11a OFDM a) Orthogonal frequency-division multiplexing utilizing a 5-GHz band b) Same as FDM except all sub bands are used by only one source at a given time c)  Secu

Explain about multiplicative decrease, Q. Explain about Multiplicative Decr...

Q. Explain about Multiplicative Decrease ? Multiplicative Decrease (MD) if a time-out take places the threshold is set to one maximum segment size (TCP Tahoe, TCP Reno).

Cost involved in inter-processor communication, Cost Involved in Inter-Proc...

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd