Posts

Showing posts from November, 2019

Task 7

TASK 7 1) Why we write any website name in place of its IP address? URLs  (Uniform Resource Locators) and  IP addresses are  just identifiers  used  for this purpose. ... Because majority of  URL use  have the domain name  instead  of the  IP address , it  is  necessary to process the request through a Domain Name Server (DNS) in order to convert the domain name into an  IP address . Domain Names  and  IP Addresses It communicates exact information about the  address  in a way that is useful to the computer but makes no sense to humans. The  domain name  functions as a link to the  IP address . Links do not contain actual information, but they do point to the  place  where the  IP address  information resides. In order to find what you want on the internet, you need to have a pointer of where to find it. URLs (Uniform Resource Locators) and IP addresses are just identifiers used for this purpose. The main difference between URL and IP address is what they point to. An IP

Cryptography

Image
TASK 6  1) What do you mean by cryptography? Explain its real time applications. Answer:-  Cryptography  involves creating written or generated codes that allow information to be kept secret.  Cryptography  converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format, thus compromising the data. Symmetric  cryptography (secret key encryption) is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. ...  Examples  of methods that use symmetric encryption include: Advanced Encryption Standard (AES) Cryptography  is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Three  types  of  cryptography : secret-key, public key, and hash function.  Types  of stream ci

What happens when any link enters

Image
TASK 5 Q-1 When I enter www.google.com in browser what happens in background? The operation of Hypertext Transfer Protocol (HTTP) involves the communication between a Hypertext Transfer Protocol (HTTP) client application (Usually web browser) and a Hypertext Transfer Protocol (HTTP) server servers like IIS).   Hypertext Transfer Protocol (HTTP) uses Transmission Control Protocol (TCP) as the Transport Layer Protocol at Well Known port number 80. Once the TCP connection is established, the two steps in Hypertext Transfer Protocol (HTTP) communication are 1) HTTP Client Request: Hypertext Transfer Protocol (application (Web HTTP) client sends an Hypertext Transfer Protocol (HTTP) Request to the Hypertext Transfer Protocol (HTTP) Server according to the HTTP standard, specifying the information the client like to retrieve from the Hypertext Transfer Protocol (HTTP) Server. )  HTTP Server Response: Once the Hypertext Transfer Protocol (HTTP) Request arrived at the Hypertext Tra