Computer networks
Every machine in a network has another unique identifying number,called it's IP Address.An IP address is a group of four bytes(or 32 bits) each of which can be a number from 0 to 255. A typical IP address looks like this: 59.171.132.72
An internet protocol address (IP Address) is a logical numeric address that is assigned,to every single computer,printer, switch,router or any other device that is part of a TCP/IP based network because IP address that are logical , they can change.
Address is IPV4 are 32 bits long.this allows for a maximum of 4,294,967,296.
The IP address is the core component on which the networking architecture is built; no network exists without it. An IP address is a logical address that is used to uniquely identify every node in the network.
MAC addresses are unique 48-bits hardware number of a computer,which is embedded into network card (known as network interface card) during the time of manufacturing .MAC address is also known as physical address of a computer device.
Each NIC has a universally unique address assigned to it by its manufacturer.This address is known as the MAC(Media Access Control) address of the card.It means that a machine with an NIC can be identified uniquely through its NIC's MAC address.The MAC address of an NIC is permanent and does not change.
MAC addresses are 12 -digit hexadecimal (or 48 bit) numbers.By convention,MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter manufacturer.The second half (SS:SS:SS) of a MAC address represents the serial number assigned to the adapter (NIC) by its manufacturer.
For example,in the following MAC address.
00:A0:C9 : 14:C8:35
The prefix 00:A0:C9 indicates that the manufacturer is intel corporation,and the last tree numbers 14:C8:35 are given by the manufacturer (inter in this example) to this NIC.
- Represent some else.
- Authorized to act on behalf of another.
- A proxy server verifies and forwards incoming client requests to other servers for further communication. A proxy server is located between a client and a server where it acts as an intermediary between the two,such as a web browser and web server.
- The proxy servers most important role is providing security.
- HTTP stand for Hyper text transfer protocol.
- It is a protocol used to access the data on the world wide web (WWW).
- The HTTP protocol can be used to transfer the data in the form of plain text, Hypertext ,audio,video, and so on.
- This protocol is known as hyper text transfer protocol because of its efficiency that allow us to use in a hypertext environment where there are ocupied jumps from one document to another document.
- HTTP is a similar to FTP as it also transfer the files from one host to another host.but,HTTP is similar than FTP as HTTP uses only one connection,i.e., no control connection to transfer the files.
- Signal is broadcasted through air.
- Less secure
- Used for larger distance
- Radiowaves :- there are easy to generate and can penetrate through buildings.the sending and receiving antennas need not be aligned.Frequency range: 3KHz- 1 GH AM and FM radios and cordless phones use radiowaves for transmission further categorized as i) Terrestrial and ii) Satellite
- Microwaves :- It is a line of sight transmission i.e.,the sending and receiving antennas need to be properly aligned with each other.the distance covered by the signal is directly proportional to the height of the antenna. frequency range: 1 GHz-300GHz. These are majorly used for mobile phone, communication and television distribution.
- Infrared :- infrared waves are used for very short distance communication.that cannot penetrate through obstacles.this prevents interference between system.frequency range: 300GHz-400THz. It is used in TV remotes.wireless mouse, keyboard,printer,etc.
Comments
Post a Comment