PC Networking

PC Networking

  • Overview
  • Episodes
Overview
himalaya
24 Episodes
What is a Computer Network?Connecting at least two computers and exchanging information is called a computer network. Computer networks provide users with an environment where they can share information between computers.Visit Us!: SYSNETTECH Solutions
see more
Episodes
24 Episodes

What is SSH (Secure Shell), and What are its Features? Secure Shell (SSH) is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network. SSH is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network. SSH provides strong authentication and encrypted data communication between two computers connected over an open network such as the internet. SSH is widely used by network administrators to remotely manage systems and applications. Thus, this protocol allows users to log in to another computer over the network, execute commands, and move files from one computer to another. SSH refers to both the cryptographic network protocol and the suite of utilities implementing this protocol. SSH uses a client-server model that connects an SSH server where the session ends with a secure shell client application that displays the end of the session. The SSH protocol implementations often include support for application protocols used for terminal emulation or file transfers. SSH can also be used to create secure tunnels for other application protocols or to securely run Window System graphics sessions remotely. By default, an SSH server listens to standard Transmission Control Protocol (TCP) port 22. Secure Shell Features It allows users to remotely access SSH-enabled network systems or devices, as well as automatic operations. Initiates a secure and interactive file transfer session. Automatic and secure file transfer. It realizes the secure transmission of commands to remote devices or systems. Provides secure management of network infrastructure components. SSH Client SSH client usually refers to your own computer with which you want to connect with the server. To establish a connection to the remote server, you must install or use software that creates an SSH connection. These programs are often called SSH clients. SSH Server Most software for clients runs on servers. There is also software specially designed for SSH servers. It is common practice to initially launch SSH on servers. This ensures that the server can be accessed from outside via SSH at any time. More Podcasts The Telnet Protocol in Anchor Podcast The HTTPS in iHeart Podcast The FTP Protocol iHeart Podcast The OSI Model in Google Podcast The DNS Protcol in Google Podcast

What is Telnet Protocol in Networking? Telnet is a TCP/IP protocol developed to connect to a multi-user machine on the Internet network from another remote machine and is the general name given to programs that do this work. In order to enter the connected machine, you must have a user name there and a telnet access program for the connection to be made. However, some libraries and public telnet-based web services may not ask for a user name during the connection, or what you need to type a username and password will appear automatically when you connect. Telnet is widely used today to access BBS (Bulletin Board Systems) systems over the Internet. Telnet access programs come with the operating system in most of today's operating systems. Multi-user operating systems usually offer users a text-based interface and all operations in these systems are performed from the command prompt via the keyboard. When you connect to your virtual server with the Telnet program, you are connected to the remote UNIX operating system. This means you can type UNIX commands, run programs, edit your website as if you were sitting in front of the machine. In Telnet programs, the address to be telnet can be entered from the command line, similar to the above, as well as through the menu system of the program. Some Telnet programs, which were very popular in the 1980s such as ZMODEM and KERMIT, also support computer-to-computer file transfer protocols. Telnet is an insecure protocol. Telnet protocol sends your user name and password in PLAIN TEXT format, which is a format that can be easily seen on the network you are connected to. This means that your username and password can be easily seen by anyone listening to the network. If you trust everyone on your network, it is okay to use Telnet. But if you have even the slightest concern about security, it would be beneficial not to use telnet to connect to your account. As mentioned before, the HTTP, FTP or Telnet protocol used in the Internet environment basically enables a user to connect to another computer remotely through a computer and to benefit from the resources as permitted by the protocols and the connected computer allows. While there was no such progress in computer technology and the Internet environment, computers were working character-based. However, over time, character-based and cool screens left their places to graphics-based screens that emphasize visuality. Web-based applications have spread to almost the entire Internet environment, and the servers providing only character-based services are very few. However, there are still servers that can only receive character-based service using Telnet. However, the reason for using Telnet is not to be able to connect to a number of servers whose number has decreased significantly. The reason that distinguishes it from other protocols and makes it useful is that it is a protocol capable of Terminal Emulation. More Podcasts The OSI Model in Google Podcast The DNS Protocol in Google Podcast The DHCP Protocol in Google Podcast

What is HTTPS (Secure Hypertext Transfer Protocol)? What is HTTP? HTTP (Hypertext Transfer Protocol) is the processing of information shared between client and server without any encryption. In short, there is http:// at the beginning of a website address, and the information you will share and your computer, in general, are not protected by security protocols and become vulnerable to external threats. What is HTTPS? HTTPS (Secure Hypertext Transfer Protocol) adds a security measure that allows encrypted transmission of any information between client and server. This is configured with a prevented SSL certificate. This SSL Certificate, which should be included in banks, e-commerce sites that offer online shopping services, and similar websites, use different encryption methods for sending and storing personal information written on forms on payment pages and card information. Thus, it provides a safe online shopping opportunity. In other words, e-commerce sites with https:// at the ...

What is FTP (File Transfer Protocol)? FTP is a file transfer protocol and is the most commonly used protocol for modifying, updating, and uploading files, folders, images, or text files on your website. FTP is the simplest way to send files and folders online from your computer to the server. For example, if you want to upload WordPress on your website, you can send your files to the server via FTP. With the data transfer between two different computers, it becomes easier to reach the desired content. Moreover, this process, which is provided extremely quickly, creates the opportunity to use the time in the best way. The FPT server, which provides data exchange and connection between computers at the same time, thus obtains a wide range of use. In order to use FTP, you must have the information to connect to your FTP server. This is the name or IP address of the FTP server is your username, password, and the port number of the server to connect to. You also need a program to send yo...

What is the OSI Reference Model? The OSI model (Open System Interconnection) defines a computer network framework for implementing protocols at seven layers. A protocol in networking terms is a form of negotiation and rule between two networking organizations. The purpose is to define how communication between the two computers will be. The OSI is a conceptual model that characterizes and standardizes the communication functions of a telecommunications or information processing system, regardless of its underlying internal structure and technology, and its purpose is the interoperability of various communication systems with standard protocols. In simpler words, the OSI model is a tool used by IT professionals to actually model or monitor the actual flow of data transfer across networks. So basically the OSI model is a logical representation of how network systems should send data to each other. The OSI Model divides this data communication procedure into different components. Its p...

What is DNS (Domain Name System)? DNS is the system that provides the connection between domain names and IP addresses of internet sites. In short, DNS converts domain names to IP addresses so you can access any website you want without entering complex IP addresses into your internet browser. For example, to enter Google, one of the most visited websites in the world, you need to enter an IP address of 172.217.23.14. However, thanks to the DNS system, typing www.google.com into your internet browser will be sufficient. DNS servers connect the written domain name and IP address and open the Google website. How Does DNS Work? The DNS system works through servers located in many different parts of the world, called DNS servers. This system establishes a connection between the domain name and the IP address within seconds, without you realizing it. The DNS system basically consists of 4 sub-servers. 1. DNS Cursor This sub-server is the first server you encounter in the DNS system. When...

What is DHCP (Dynamic Host Configuration Protocol)? When you connect to a network, you usually have an IP address assigned automatically by the router. This process is necessary for devices to be able to communicate with devices on other networks. The switch service that assigns IP addresses is called Dynamic Host Configuration Protocol or DHCP. DHCP works in a client-server model where a client broadcasts an IP address request to the local network and the DHCP server responds by assigning an IP address. Typically this happens as soon as the device connects to a network so it can start communicating as soon as possible. When IP addresses are given, they are leased only for a certain period of time, then the DHCP server retrieves the assigned IP address. To avoid this, hosts will start renewing their current IP address allocation halfway through the lease term. Generally, if a lease expires and a new IP address is assigned to a host, a new one is randomly assigned, not the same as th...

What is an IP Address? All devices connected to the internet network have a specific address for data exchange. Internet Protocol Address, ie IP address, is the virtual address assigned to all computers connected to the Internet. IP addresses that provide internet network traffic are the most important part of the protocol that defines the working rules of the internet. Internet protocol is the set of rules that determine the working process of the internet. This protocol controls the exchange of data between devices. In a sense, this system is similar to the legal system. Just as communication and relations in society are regulated by certain laws, communication on the internet is regulated by internet protocol. In order for the laws to be implemented in real life, people must have their identity information and addresses. In the virtual world, the IP address of every computer connected to the internet is defined. The internet address consists of unique numbers and is determined ac...

What is Port in a Computer System? The word port, which computer users have heard in different areas as well as in daily use, is defined as the leading actor of a great stream. The port acts as a bridge for computer networks. This port, which has two protocols, TCP and UDP, is a core member that provides data flow between computers. This port, which is frequently heard by users who are researched by going a little further than computer and internet use and focusing on solving the problems they encounter, is just one of the hundreds of technical computer terms. All computers have a variety of IP addresses so that they can communicate with each other. IP addresses are divided into ports to create virtual buses for communication. This port, which is literally a port, is known as a bridge in computer networks. Port is one of the important members of data exchange between computers. The port, which exchanges data over numbers, is divided into values starting from 0 up to 65535 in order t...

What is UDP (User Datagram Protocol)? UDP (User Datagram Protocol) is basically known as an alternative to TCP. UDP, which is a much faster protocol than TCP, is actively used for audio and video transmission. The reason it works faster than TCP is that TCP is responsible for data integrity and authentication. UDP, unlike TCP protocol, is not responsible for data integrity and security. It ensures fast transfer by enabling data transfer before an agreement is made with the receiving party. As a result, UDP is useful in time-sensitive communications such as voice over Internet Protocol (VoIP), domain name system (DNS) lookup, and video or audio playback. UDP is an alternative to the Transmission Control Protocol system. How Does UDP Protocol Work? The UDP protocol works similarly to TCP but discards all error checking items. All back and forth communication causes lag, which slows things down. When an application uses UDP, packets are sent only to the recipient. The sender does not w...

123
Got questions? We've got the answers
  • What is Himalaya?
    Himalaya is an audio platform that delivers the inspiration and knowledge you need to achieve your most ambitious goals. In just 10 minutes a day, you’ll learn the secrets of happiness, success, and more from some of the world's highest achievers and thought leaders. From our powerful life stories to high-impact courses, you'll find what you need to get inspired and get ahead.
  • Is there a free version that I can try out?
    By default, you’ll have 7 days after signing up before you are charged. You may also be given some promo codes with a longer free trial period. During the free trial period (7 days or longer), you will have full access to all paid content in Himalaya Learning.
  • How can I redeem a promo code?
    You can edit your promo code on the checkout page. Go to https://www.himalaya.com/premium/us and select "Start 7-day free trial". You need to register your account or log in to your account before you go to the checkout page. Click “Have a promo code to apply?” and replace the default promo code with the code you have.
  • Why do you need my credit card?
    In order to verify your identity, we require credit card validation upfront. We'll never charge your card until the free trial period is over. And unless you'd like to cancel, no further action will be needed on your part to begin recurring monthly payments as an official Himalaya listener! If you ever have any questions about payments or charges, please don’t hesitate to contact us at support@himalaya.com. We’ll help you solve your problem as fast as we can.
  • How do I cancel my free trial?
    1. On desktop: Go to https://www.himalaya.com; click your username on the upper right corner, and select “Membership” from the drop-down list; Click your active membership, then click on "Next Billing Date >" and "Cancel Subscription" 2. On Android mobile: In the app, go to "account" and choose the “member details” page, then choose to unsubscribe; 3. On iOS mobile: If you initially subscribe on the web, you cannot cancel it on the iOS mobile app. You need to follow the instructions for cancellation on desktop; if you subscribe via the iOS mobile, you can also turn off the automatic renewal via the iTunes/Apple ID settings.
  • How do I cancel my subscription?
    Subscribed from the Website?
    You can click here to unsubscribe. If you cancel the subscription during the trial period, it will not automatically renew; if you cancel the subscription after successful renewal, the next deduction cycle will not automatically renew.
    Subscribed from IOS or Android apps?
    You can cancel the subscription through Apple or Google Play settings. If you cancel the subscription 48 hours before the expiration of the trial period, the subscription will not be automatically renewed; if you cancel the subscription after successful renewal, the next deduction cycle will not be automatically renewed. You can find detailed information on how to unsubscribe from the link below:Cancel a subscription from Apple  Cancel a subscription from Google Play

With Himalaya APP

Listen On-The-Go
Audio courses turn your chore time into productive learning moments. No need to sit down and get locked in front of a screen
Short & Sweet
Each course is composed of lessons about 5 mins long and designed to be bite-sized to make the learning schedule flexible for you
Accomplish More
Get ahead by learning first-hand insights and knowledge from some of the world's sharpest minds and industry leaders.
app store
google play