THEBOEGIS: Networking


Full Tutorial - Information - Trik &Tips and Download Software

Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Tuesday, June 2, 2020

Understanding FTP Server along with functions, how to work and sample FTP Server applications

Before discussing about FTP Server We must first understand what is meant by FTP or that has the length of File Transfer Protocol. File Transfer Protocol (FTP) is the definition of a network protocol usually used for exchanging data or files interchangeably using an intermediary TCP connection.

Data exchange activities can be done in two directions, so that all connected can do the upload and download likewise otherwise. The process of exchanging data on FTP also involves two services namely FTP Server and FTP Client.

In this occasion the authors will focus more on the discussion on FTP Server only, covering the understanding, function and how the FTP Server works itself. As the name implies FTP Server is the definition of a Server or a parent device that is running an FTP service (data exchange or file). The existence of this FTP Server has a very vital position and should exist as a condition of FTP service occurrence.

FTP Server functions

Identify Routing types based on multiple aspects

The term "routing" is known in the World Networking world. Routing is a process of sending data using a router tool that is capable of sending data packets over the Internet or network to its destination.

The routing process occurs on the third layer (i.e. the network layer, e.g. Internet Protocol) of the seven-layer OSI stack protocol.

In order to run the routing process, things to be aware of in the router are its destination address, the various routers involved in order to learn a network remote that was created, and the best router on each network.

Information about the router is stored in the routing table, which tells you how to find the network remote.

Types of Routing
The types of routing can be differentiated based on the nature of routing, routed and routing protocols and class in routing protocols. For more details below, it will be explained about the sharing of routing types:

A. Based on Nature Routing

Know the characteristics of Firewall and its artist in computer network

Have you ever heard the term firewall? What kind of firewall character do you know? A Firewall is a combination of hardware and software.

Firewalls are useful for splitting a computer network into two or more parts so that the data contained therein remains safe. There is also a defining firewall as a security system that is on a network that is useful to protect the computer from various outside attacks that can come at any time.

Another use of firewalls is to restrict or control the person who is about to enter and access the data contained within a computer network. The Firewall also refers to a communication organizer that is performed by two networks that have the same character or type. Firewalls have their own features or characteristics. Then what kind of firewall characteristics? Here's the answer for you.

Firewall characteristics

Know the definition of Telnet and its history, functions and how it works

Know the definition of Telnet and its history, functions and how it works
For some people may have never heard this term, a technology on the network that is commonly referred to as Telnet. The definition of Telnet or Telecommunication Network is a client-server protocol that can provide access to the computer remotely (Remote).

This Telnet device is commonly abbreviated to TN and can also be interpreted as a virtual or terminal emulation utilizing that protocol with the same purpose of accessing a remote computer.

In addition to login or access other computers Telnet is also commonly used to access various public services such as catalogs, libraries or other types of databases. In other words we can connect to each other and access between computers over the network. It is believed to be easier than giving the application to all users who want to access.

It is now a lot of emerging software-special software Remote such as Team Viewer and other-others. But still for its use requires an Internet connection and because it has a special function for the Remote from a further distance Team Viewer also requires the ID and Password of the target computer. In Telnet usage is more or less the same but without involving outside software (using the Command Line on the computer) as well as a smaller distance.

History of Telnet

5 Computer network components you should know

If you are talking about the components of a computer network, then we will discuss what components are used to form a computer network.

A computer network is a set of computers interconnected between one and another through a network. There are many types of networks that we know of which each of these networks have their own functions and usability.

The purpose of this computer network to make it easier to do data transfer transaction where we only need to send through the network so that later can get to the computer that we are aiming.

Computer network components
In creating a computer network, you need some of the components we'll describe below.

1. PC or Personal components

Right and standard compliant Straight and Crossover cable (UTP cable)

In building a computer network, you will know the term UTP cable. Then, what is the UTP cable? UTP or Unshielded Twisted Pair is a type of data cable that is often used to connect between the same device or different devices, such as computers with computers, computers with other devices (routers, switches, printers, servers, access points and hubs).

Most people use UTP cables only to limit building a LAN (Local Area Network) network. The price is relatively cheap and easy to obtain, making this UTP cable often used. However, according to the name of the UTP cable is not equipped with a protective (Unshielded) so that the cable is not resistant to the presence of electromagnetic interference.

UTP cables consist of cables that are arranged in between. Basically, the cables that will be compiled in number 8 with different color arrangement, where the cable is wrapped into 4 pairs. There are two models that are making UTP cable, straight and crossover. Do you know what is a straight or crossover model in the preparation of UTP cables?

In this article, it will be explained and discussed in detail about the understanding of straight cables and straight wiring arrangement. Discussed also about the understanding of crossover cables and crossover cable arrangement. Immediately, you can read more about this.

Standard UTP Cable
In general, there is an international standard used in the color sequence of UTP cable is TIA/EIA 568A and TIA/EIA 568B.

Thursday, May 21, 2020

Understanding IP Address and function and class IP Address on computer network

For those who are concentrating on the field of computer networks or the Internet world will surely often hear and interact with the name IP Address. Computer network is a form of telecommunications network connected to several computers with the purpose of interacting and mutual exchange – exchanging data.

Generally all computer networks are designed with a client-server model. There are computers that serve as servers and some computers that act as clients or members. The use of IP Address in this case is as the identity of each-each computer that acts as a server or as a client. Similarly, in Internet activity, the use of IP Address is also the naming or identity of each – the host computer.

At the base of his IP Address is a combination of numbers in certain digits and separated by dots. To be able to determine the use of IP Address on each computer, of course also need the fundamentals of knowledge and deep understanding.

Although it reads the guidelines but without any understanding of course everyone will have trouble implementing IP Address. Therefore we will describe and explain in detail the understanding of IP Address and its functions to you. In addition, you will also know the classes in the IP Address.

Understanding IP Address
Essentially the Internet Protocol Address or commonly called IP Address is a binary line of numbers compiled with a range between 32 bits and 128 bits and is used as the identification address on each computer. In computer network science the use of numbers with 32 bits is used in the IP Address specific version of IPv4 while for numbers 128 bits for which the IPv6 version.

Proxy definition and function and how Proxy works in computer network

When someone through their personal computer using a proxy Internet network is trying to surf the internet, the user's computer identity (IP address) will be visible to the website requested.

Sometimes, if you are not careful, this IP address can be misused by others, such as to spread viruses, malware, or even retrieve personal user data such as email passwords, bank passwords, and so on.

To prevent the user's IP address from being clearly visible, we can use a proxy that bridges the personal computer with the Internet network. The following will be explained in more detail regarding proxy definitions, proxy functions, proxy types, and how it works.

Proxy definitions
Simply put, a proxy is a computer server that serves to forward user requests to other servers on the Internet. In the same time, this proxy server is a connection between personal computer and Internet network. Proxy itself has several kinds of usability, among others:

  1. To hide the IP address of the client/user's computer, so anyone can surf anonymously without leaving a trace of the IP address on the Web page visited. For example, if a client visits Google through a proxy server, then Google will see that visiting it is a proxy server, not the client, so that Google can also not track the user's client position.
  2. Surf faster on the Internet. All requests from client computers will reach the proxy server first. Then the proxy will check if the Web page that the user visited already has caching stored or not. If there is, then the client will get feedback from the data caching, so that the client can surf faster on the Internet.
  3. To block an unwanted site. Suppose for the Internet network in offices, so that workers in the Office do not utilize the Internet to play social media and watch, then some sites can be included in the blacklist proxy so that it is not accessible through the office network.

Proxy function

Understanding VPN along with the functions and workways of VPN on computer network

One of the things that Internet users need to note is security when surfing the Internet, how to make it when the computer is connected to a wide network, stay on the safe path so that it is not utilized by irresponsible parties. To overcome this, one way is to utilize a VPN.

This VPN is very useful for those of you who do not want to geo-location or your identity tracked by other parties while being surfing the internet, also to avoid hackers attacks when there is in public places.

More about VPN will be discussed in this article, from the understanding of VPN, VPN function, and how VPN works.

Understanding VPN

Understanding Modem and Modem functions and modem types on the computer network

One of the hardware required to connect a computer with the Internet is a modem. Not many people understand that the name of the modem itself stands for the process of how it works.

The Modem also has many types with advantages and disadvantages respectively. In this article, it will be discussed about the understanding of modems, modem functions, modem types, and how the modem works.

Definition of Modem

The MODEM itself is an acronym of the Demodulator Modulator. This means that the device can function as a modulator and also a demodulator. The modulator itself means that the information signal modifier becomes the signal of the carrier to send.

Meanwhile, the demodulator is a separator between the information signal and the carrier signal, so that a data can be received perfectly. Broadly, the modem can be divided into two types, the internal modem and the external modem. The explanation of the two is shown in the following points:

1. Internal Modem

Healthy Eyes


Dental health