Avsnitt

  • What is SSH (Secure Shell), and What are its Features?

    Secure Shell (SSH) is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network.

    SSH is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network.

    SSH provides strong authentication and encrypted data communication between two computers connected over an open network such as the internet. SSH is widely used by network administrators to remotely manage systems and applications. Thus, this protocol allows users to log in to another computer over the network, execute commands, and move files from one computer to another.

    SSH refers to both the cryptographic network protocol and the suite of utilities implementing this protocol. SSH uses a client-server model that connects an SSH server where the session ends with a secure shell client application that displays the end of the session.

    The SSH protocol implementations often include support for application protocols used for terminal emulation or file transfers. SSH can also be used to create secure tunnels for other application protocols or to securely run Window System graphics sessions remotely. By default, an SSH server listens to standard Transmission Control Protocol (TCP) port 22.

    Secure Shell Features

    It allows users to remotely access SSH-enabled network systems or devices, as well as automatic operations. Initiates a secure and interactive file transfer session. Automatic and secure file transfer. It realizes the secure transmission of commands to remote devices or systems. Provides secure management of network infrastructure components.

    SSH Client

    SSH client usually refers to your own computer with which you want to connect with the server. To establish a connection to the remote server, you must install or use software that creates an SSH connection. These programs are often called SSH clients.

    SSH Server

    Most software for clients runs on servers. There is also software specially designed for SSH servers. It is common practice to initially launch SSH on servers. This ensures that the server can be accessed from outside via SSH at any time.

    More Podcasts

    The Telnet Protocol in Anchor Podcast The HTTPS in iHeart Podcast The FTP Protocol iHeart Podcast The OSI Model in Google Podcast The DNS Protcol in Google Podcast
  • What is Telnet Protocol in Networking?

    Telnet is a TCP/IP protocol developed to connect to a multi-user machine on the Internet network from another remote machine and is the general name given to programs that do this work.

    In order to enter the connected machine, you must have a user name there and a telnet access program for the connection to be made. However, some libraries and public telnet-based web services may not ask for a user name during the connection, or what you need to type a username and password will appear automatically when you connect.

    Telnet is widely used today to access BBS (Bulletin Board Systems) systems over the Internet. Telnet access programs come with the operating system in most of today's operating systems. Multi-user operating systems usually offer users a text-based interface and all operations in these systems are performed from the command prompt via the keyboard.

    When you connect to your virtual server with the Telnet program, you are connected to the remote UNIX operating system. This means you can type UNIX commands, run programs, edit your website as if you were sitting in front of the machine.

    In Telnet programs, the address to be telnet can be entered from the command line, similar to the above, as well as through the menu system of the program. Some Telnet programs, which were very popular in the 1980s such as ZMODEM and KERMIT, also support computer-to-computer file transfer protocols.

    Telnet is an insecure protocol. Telnet protocol sends your user name and password in PLAIN TEXT format, which is a format that can be easily seen on the network you are connected to. This means that your username and password can be easily seen by anyone listening to the network. If you trust everyone on your network, it is okay to use Telnet. But if you have even the slightest concern about security, it would be beneficial not to use telnet to connect to your account.

    As mentioned before, the HTTP, FTP or Telnet protocol used in the Internet environment basically enables a user to connect to another computer remotely through a computer and to benefit from the resources as permitted by the protocols and the connected computer allows.

    While there was no such progress in computer technology and the Internet environment, computers were working character-based. However, over time, character-based and cool screens left their places to graphics-based screens that emphasize visuality.

    Web-based applications have spread to almost the entire Internet environment, and the servers providing only character-based services are very few. However, there are still servers that can only receive character-based service using Telnet.

    However, the reason for using Telnet is not to be able to connect to a number of servers whose number has decreased significantly. The reason that distinguishes it from other protocols and makes it useful is that it is a protocol capable of Terminal Emulation.

    More Podcasts

    The OSI Model in Google Podcast The DNS Protocol in Google Podcast The DHCP Protocol in Google Podcast
  • Saknas det avsnitt?

    Klicka här för att uppdatera flödet manuellt.

  • What is HTTPS (Secure Hypertext Transfer Protocol)?What is HTTP?

    HTTP (Hypertext Transfer Protocol) is the processing of information shared between client and server without any encryption. In short, there is http:// at the beginning of a website address, and the information you will share and your computer, in general, are not protected by security protocols and become vulnerable to external threats.

    What is HTTPS?

    HTTPS (Secure Hypertext Transfer Protocol) adds a security measure that allows encrypted transmission of any information between client and server. This is configured with a prevented SSL certificate.

    This SSL Certificate, which should be included in banks, e-commerce sites that offer online shopping services, and similar websites, use different encryption methods for sending and storing personal information written on forms on payment pages and card information.

    Thus, it provides a safe online shopping opportunity. In other words, e-commerce sites with https:// at the beginning have SSL certificates and guarantee card security in online shopping.

    What are the Features of HTTPS?

    On websites that do not have a security certificate and specified as HTTP, all data shared between the client and the server is transmitted unencrypted. These websites, which are not protected by any security protocol, remain open to external threats and problems may occur at any time due to lack of security.

    HTTPS encrypts all data between the client and the server and provides a safe environment for both itself and its users with the security measures it takes. With the security protocol called SSL certificate, your website is protected against fiber attacks in the best way. Today, many e-commerce sites guarantee the security of their users' personal data by obtaining SSL certificates.

    What are its Advantages?

    It writes HTTPS in the URL of websites that secure its data with a security certificate, thus protecting against external threats. The advantages obtained with an SSL certificate can be briefly listed as follows:

    Information is encrypted during transmission. In this way, the data of the users cannot be obtained by third parties. This allows users to shop on the website with peace of mind. Since payment transactions are made on e-commerce sites, extra security measures must be taken. Otherwise, credit card information may be passed on to third parties. Therefore, thanks to the SSL certificate, all information provided during the payment is protected by an encryption method. Therefore, it is safe to shop from places specified as HTTPS. The data upload speed of sites with a security certificate is much higher. Sites that are meticulous about SEO have the opportunity to rank much higher in the search engine with their SSL certificate.

    More Podcasts

    The FTP Protocol in Google Podcast The Networking OSI in Google Podcast The Domain Name System in iHeart Podcast The Networking Ethernet in Listennotes
  • What is FTP (File Transfer Protocol)?

    FTP is a file transfer protocol and is the most commonly used protocol for modifying, updating, and uploading files, folders, images, or text files on your website. FTP is the simplest way to send files and folders online from your computer to the server. For example, if you want to upload WordPress on your website, you can send your files to the server via FTP.

    With the data transfer between two different computers, it becomes easier to reach the desired content. Moreover, this process, which is provided extremely quickly, creates the opportunity to use the time in the best way. The FPT server, which provides data exchange and connection between computers at the same time, thus obtains a wide range of use.

    In order to use FTP, you must have the information to connect to your FTP server. This is the name or IP address of the FTP server is your username, password, and the port number of the server to connect to. You also need a program to send your files via FTP to the server.

    There are certain FTP server programs prepared with care. These programs make it much more practical to access data via FTP server addresses. The desired file can be downloaded or uploaded within seconds. In addition, the target source can be scanned with the file explorer feature. Thus, it becomes easier to see under which file the desired data is located.

    FileZilla, WinSCP, and CyberDuck are among the most popular FTP server programs. After entering the FTP address, it is necessary to fill in the user name and password information. After the requested information is completed, the main source can be accessed and the desired file can be imported from there. Programs that display the download process offer a user-friendly experience.

    What is Anonymous FTP?

    Some FTP services accept connections over the internet with an anonymous user who is active by default. In this way, any user can download the files within his/her authority to his/her computer or send any file on his/her computer to the other computer via FTP service in line with the competence of his/her authority.

    More Podcasts

    The OSI Model in Google Podcast The DNS in Google Podcast The IP Address in iHeart Podcast The Windows 10 Operating System in Podchaser The DHCP Protocol in Listennotes
  • What is the OSI Reference Model?

    The OSI model (Open System Interconnection) defines a computer network framework for implementing protocols at seven layers. A protocol in networking terms is a form of negotiation and rule between two networking organizations. The purpose is to define how communication between the two computers will be.

    The OSI is a conceptual model that characterizes and standardizes the communication functions of a telecommunications or information processing system, regardless of its underlying internal structure and technology, and its purpose is the interoperability of various communication systems with standard protocols.

    In simpler words, the OSI model is a tool used by IT professionals to actually model or monitor the actual flow of data transfer across networks. So basically the OSI model is a logical representation of how network systems should send data to each other.

    The OSI Model divides this data communication procedure into different components. Its purpose is to guide vendors and developers so that the digital communication products and software programs they create can work together and facilitate clear comparisons between communication tools. Most vendors involved in telecommunications attempt to describe their products and services in relation to the OSI standard.

    Moreover, it is very important for an IT professional to have a clear idea of the OSI Model. This is because they can narrow down and find out what part of the problem is using OSI Layers in case of certain network issues. That's why it's very useful to have an OSI Layered approach to troubleshooting networking issues.

    Advantages of the OSI Model It creates a common platform for software developers and hardware manufacturers that encourages the creation of network products that can communicate with each other over the network. It helps network administrators by dividing the big data exchange process into smaller segments. Because the layers are independent, it prevents changes in one layer from affecting other layers. Standardization of network components allows for multiple vendor development. Very well configures functions specific to each layer. It reduces complexity and speeds up evolution.Layers of the OSI Model Physical Layer Data Link Network Layer Transport Layer Session Layer Presentation Layer Application Layer

    More Podcasts

    The Domain Name System in Google Podcast The DHCP Protocol in Google Podcast The TCP Protocol in iHeart Podcast The UDP Protocol in iHeart Podcast The Internet Port in Listennotes Podcast 
  • What is DNS (Domain Name System)?

    DNS is the system that provides the connection between domain names and IP addresses of internet sites. In short, DNS converts domain names to IP addresses so you can access any website you want without entering complex IP addresses into your internet browser.

    For example, to enter Google, one of the most visited websites in the world, you need to enter an IP address of 172.217.23.14. However, thanks to the DNS system, typing www.google.com into your internet browser will be sufficient. DNS servers connect the written domain name and IP address and open the Google website.

    How Does DNS Work?

    The DNS system works through servers located in many different parts of the world, called DNS servers. This system establishes a connection between the domain name and the IP address within seconds, without you realizing it. The DNS system basically consists of 4 sub-servers.

    1. DNS Cursor

    This sub-server is the first server you encounter in the DNS system. When you type a domain name in your internet browser, the domain name is greeted by the DNS cursor and subjected to a deep query. If the query is successful, further steps are taken.

    2. Root Server

    The domain name passing through the DNS cursor comes to the root server and begins to be resolved there. At this point, simple domain names, which we can see visually, reveal the complex IP addresses they carry. There are different types of DNS resolvers.

    3.TLD Server

    The TLD server, like the root server, is part of the parsing process. In this final resolution step, the domain name is converted to the IP address it represents. Every website is resolved by the .com TLD server at the end of the domain name.

    4. Authorized Server

    The place where everything happens is the authoritative server. The domain name was queried in the DNS cursor and resolved in the root and TLD servers reach the authorized server like the IP address. If the proxy server accesses the record of the IP address, the website opens. If there is no access, additional information is requested by the cursor.

    DNS Resolvers

    There are different types of DNS resolvers as we explained in the root server step. These; It is a recursive DNS resolver and authoritative DNS resolver. These two resolvers, which look similar, actually have quite different roles in the DNS system.

    1. Recursive DNS Resolver

    The recursive DNS resolver is the responsive resolver that can be repeatedly requested by the client. What this server does is to search the cache for the answers to the question marks in the resolution process until the domain name reaches the authorized server and reveals the necessary records.

    2. Authorized DNS Resolver

    The authoritative DNS resolver works with the authoritative server and is responsible for keeping all records. It is the last link in the long parsing chain. At the end of the process that resolves the domain name and reaches the IP address it represents, the authorized server opens the website without the need for another query thanks to the authorized DNS resolver.

    More Podcasts

    The DHCP in Google Podcast The IP Address in Google Podcast
  • What is DHCP (Dynamic Host Configuration Protocol)?

    When you connect to a network, you usually have an IP address assigned automatically by the router. This process is necessary for devices to be able to communicate with devices on other networks. The switch service that assigns IP addresses is called Dynamic Host Configuration Protocol or DHCP.

    DHCP works in a client-server model where a client broadcasts an IP address request to the local network and the DHCP server responds by assigning an IP address. Typically this happens as soon as the device connects to a network so it can start communicating as soon as possible.

    When IP addresses are given, they are leased only for a certain period of time, then the DHCP server retrieves the assigned IP address. To avoid this, hosts will start renewing their current IP address allocation halfway through the lease term. Generally, if a lease expires and a new IP address is assigned to a host, a new one is randomly assigned, not the same as the previous one.

    In-home and other small networks, the DHCP server is typically integrated into the router because this reduces the number of devices and reduces setup complexity. For large corporate networks, typically a single DHCP server will be used for multiple networks such as the entire building. In this case, DHCP relay agents are used in each interconnected network to forward DHCP traffic from the hosts to the DHCP server and forward the response back to the original host.

    Typically, a DHCP server offers connected hosts a random IP address from a configured IP address pool, but it is also possible to manually assign an IP address to specific devices if required.

    This is useful if there is some type of server on a network such as a NAS drive or a local webserver. By manually assigning an IP address to these servers, they are always in the same place and you don't have to worry about the IP addresses changing and causing problems.

    DHCP Address Lease Stages:

    The lease transaction between client and server consists of 4 steps;

    DHCP Discover DHCP Offer DHCP Request DHCP Acknowledgment

    If the client dynamically expects an IP when added to the environment, it does Discover for a DHCP server that can assign IP to it. The broadcast package that the client sends to the environment is called the DHCP Discover package. This process continues four times and if it cannot reach the server that will assign IP, it defines an address from the APIPA class.

    If there is a DHCP server in the environment, it sends an Offer to the client. During this process, the server has reserved an IP for the client.

    The client accepts the first offer returned to him and sends a Request package as feedback against this offer. At this stage, other servers sending offers to the client withdraw their offers.

    In the last stage, the server confirms the previously reserved IP address for the client and sends the Acknowledgment package. Communication is always broadcast because the client does not have an approved IP address.

    More Podcasts

    The Internet Port in Google Podcast The UDP Protocol in iHeart Podcast
  • What is an IP Address?

    All devices connected to the internet network have a specific address for data exchange. Internet Protocol Address, ie IP address, is the virtual address assigned to all computers connected to the Internet. IP addresses that provide internet network traffic are the most important part of the protocol that defines the working rules of the internet.

    Internet protocol is the set of rules that determine the working process of the internet. This protocol controls the exchange of data between devices. In a sense, this system is similar to the legal system. Just as communication and relations in society are regulated by certain laws, communication on the internet is regulated by internet protocol. 

    In order for the laws to be implemented in real life, people must have their identity information and addresses. In the virtual world, the IP address of every computer connected to the internet is defined. The internet address consists of unique numbers and is determined according to the computer coding system.

    Computer systems and internet networks are based on numbers and coding. Each port on the Internet has a unique code. This code, the IP address, is a series of numbers divided into points. You must have a unique IP address for internet searchers to point to your site. Unique identification numbers are a unique language that ports use to find and understand each other. Traffic on the Internet depends on these IP addresses.

    You can query to find out the IP address of your computer and other devices. You can see which internet service provider you are connected to and which network you are using by searching the IP address. You can use web tools designed for IP address query.

    How To Find The IP Address?

    When you connect to the Internet, a private IP address is assigned to your computer or device you use. This address determines your connection location on the internet network. The last number of your IP address assigned to you by the service provider changes with each connection. Because these codes are dynamic codes. In the internet network system, the codes work continuously.

    Dynamic coding is required for secure data exchange. Every device that connects to the Internet will have a completely unique IP address. You also have an IP address assigned to you by your service provider. You can find this address. You can change the name of the address as you wish. You can name your own link address. In the Internet access section, it is possible to change the IP address definition consisting of numbers and letters provided by your service provider. IP addresses are divided into public and private IP addresses. Even though the hidden addresses are in traffic on the internet, they cannot be detected by everyone.

    What is an IP Conflict?

    Situations, where computers connected to the same network are identified with the same IP address, are called IP conflicts. This type of situation may occur when the IP address is changed. When there is an IP conflict, the computer cannot properly connect to the internet. Network connections will fail. It is not possible for different computers to connect to the computer network with the same IP addresses. 

    More Podcasts

    The UDP in Anchor Podcast The TCP in Anchor Podcast
  • What is Port in a Computer System?

    The word port, which computer users have heard in different areas as well as in daily use, is defined as the leading actor of a great stream. The port acts as a bridge for computer networks. This port, which has two protocols, TCP and UDP, is a core member that provides data flow between computers.

    This port, which is frequently heard by users who are researched by going a little further than computer and internet use and focusing on solving the problems they encounter, is just one of the hundreds of technical computer terms.

    All computers have a variety of IP addresses so that they can communicate with each other. IP addresses are divided into ports to create virtual buses for communication. This port, which is literally a port, is known as a bridge in computer networks. Port is one of the important members of data exchange between computers.

    The port, which exchanges data over numbers, is divided into values starting from 0 up to 65535 in order to perform many operations at the same time. In this context, the port is divided into 2 types, TCP and UDP.

    What Does Port Do?

    Port, the main function of which is to exchange data, is based on a number system. Each computer has an IP address and each IP address is divided into ports separately. This helps each IP address to exchange data for multiple purposes at the same time. Each program on computers works according to a port on a certain number.

    An example of physical ports is all physical hardware inputs on the computer. Port relationships with IP are like the relationship between point A and point B to the route. Port is a gateway between IPs.

    Port Forwarding is to stop or convert data to different tasks on the IP address of any computer or device. Port Forwarding is an extremely secure way to protect the IP address.

    More Podcasts

    The Ubuntu/Linux in Overcast Podcast The Ethernet in iHeart Podcast The UDP Protocol in Google Podcast The TCP Protocol in Google Podcast The Networking Hub in Google Podcast
  • What is UDP (User Datagram Protocol)?

    UDP (User Datagram Protocol) is basically known as an alternative to TCP. UDP, which is a much faster protocol than TCP, is actively used for audio and video transmission.

    The reason it works faster than TCP is that TCP is responsible for data integrity and authentication. UDP, unlike TCP protocol, is not responsible for data integrity and security.

    It ensures fast transfer by enabling data transfer before an agreement is made with the receiving party. As a result, UDP is useful in time-sensitive communications such as voice over Internet Protocol (VoIP), domain name system (DNS) lookup, and video or audio playback. UDP is an alternative to the Transmission Control Protocol system.

    How Does UDP Protocol Work?

    The UDP protocol works similarly to TCP but discards all error checking items. All back and forth communication causes lag, which slows things down.

    When an application uses UDP, packets are sent only to the recipient. The sender does not wait to make sure that the recipient has received the package, only continues to send subsequent packets. If the recipient occasionally misses several UDP packets, they are lost - the sender does not resend them. Losing all this overhead means devices can communicate faster.

    UDP structure is used when speed is desired and error correction is not required. For example, UDP is often used for live streaming and online gaming.

    Suppose you are watching a live video stream that is usually broadcast using UDP instead of TCP. The server just sends a constant stream of UDP packets to the watching computers. If you lose your connection for a few seconds, the video may freeze or jitter for a moment and then jump to the current bit of the stream. If you experience a minor packet loss, the video or audio may be distorted momentarily as the video continues to play without missing data.

    This works similarly in online games. If you miss some UDP packets, player characters may appear to be teleported across the map while you receive new UDP packets. Since the game continues without you, there is no point in asking if you missed the old packs. The only thing that matters is what's happening on the game server right now, not a few seconds ago. Eliminating TCP's error correction helps speed up game connectivity and reduce latency.

    More Podcasts

    The Networking Ethernet in Google Podcast The Wireless Communication in Google Podcast The Networking Repeater in iHeart Podcast The Networking Switch in Listennotes Podcast The Networking Router in Himalaya Podcast
  • What is TCP (Transmission Control Protocol)?

    TCP (Transmission Control Protocol) is a protocol created and developed by the US Department of Defense. TCP, which serves for the smoothness of the basic communication between computers, also authenticates in addition to ensuring data integrity in data exchange.

    The reason for the creation of TCP also prevents the loss of communication between computers. Today, data exchange of protocols such as HTTP, HTTPS, POP3, SSH, SMTP, SNMP, TELNET, and FTP is TCP.

    How Does the TCP Protocol Work?

    TCP is a connection-oriented protocol, which means that the connection is established and maintained until the application programs at both ends have finished exchanging messages.

    It determines how the application data is divided into packets that networks can deliver, sends packets to the network layer and accepts packets from these layers, manages flow control, and manages the retransmission of dropped or corrupted ones as it is intended to provide error-free data transmission packets and acknowledges all incoming packets.

    In the Open Systems Interconnection (OSI) communication model, TCP encompasses parts of Layer 4, the transport layer, and parts of Layer 5, the session layer.

    When a web server sends an HTML file to a client or another server, it uses the hypertext transfer protocol (HTTP) to do so. The HTTP program layer asks the TCP layer to establish the connection and send the file. The TCP stack splits the file into data packets, enumerates it, and then transmits it to the individual IP layer for distribution.

    Packets can be sent over multiple routes, although each packet in the transmission has the same source and destination IP address. The TCP program layer on the client computer waits until all packets arrive, then acknowledges their received and requests retransmissions of those that do not receive due to missing packet numbers. The TCP layer then combines the packets into a file and delivers the file to the receiving application.

    More Podcasts

    The Ethernet in Anchor Podcast The Wi-Fi in Anchor Podcast The Access Point in iHeart Podcast The Networking Switch in Google Podcast The Networking Bridge in Google Podcast
  • What is Ethernet that Allows to Connect a Computer to the Internet?

    Ethernet connection can be defined as a type of connection that is used to establish a network connection between computers. The method that will support the formation of a network between two computers is called Ethernet.

    The card required to connect these computers to each other is called the Ethernet card. In order to understand better what is Ethernet, it is necessary to first learn what local area network means.

    What is a Local Area Network?

    In fact, the local area network, known as LAN, is a network of two or more computers, in the same case, devices such as printers and fax machines, in a not too distant area.

    The main purpose of using the Local Area Network is to use a fast data flow between computers in the same network frame and peripheral devices simultaneously, that is, in a binary way. One of the most used LAN technologies today is the Ethernet connection.

    Of course, there are other manufactured technologies besides Ethernet. For example; Like Token Ring and FDDI. However, Ethernet is more preferred because it is cheaper and easier in terms of the operating system.

    What Are Its Features?

    It explains how devices that you can qualify as network devices will design and transmit their data packets. Therefore, those in other network domains can recognize it.

    When you look at it, it has the ability to work in the same way on both LAN and WAN networks. Power can also be transferred over this technological development, which is very simple to assign. In this way, it becomes easier to establish a network connection between computers.

    How Does It Work?

    The Ethernet consists of two transmission units known as packets and frames. The framework does not have a packet containing only the transmitted data payload.

    Same time; the sender and receiver, the physical media access control addresses, including error correction information for determining transmission problems.

    In addition, ethernet cables connect network devices with cables that operate at different speeds to devices or modems that are appropriately called routers.

    The Ethernet card divides the data to be transmitted into packets and sends it to the network cable connected to the card output. Data packets transmitted in a local network system contain the receiver's MAC address, the sender's MAC address, the transmitted data, and the CRC code. CRC code is the code that checks whether the data sent is corrupted or not.

    Before sending the packet, the cable is checked and if the cable is empty, the data is sent. Packaged data is sent to the opposite computer, received and decoded by the ethernet card of the receiving computer, and the CRC code is checked. If the CRC code is the same, the data is accepted. Data is taken from the packet and processed by the computer. If the CRC is not the same, it is understood that the data is corrupted and the data is not accepted.

    More Podcasts

    The Wi-Fi in Anchor Podcast The Access Point in iHeart Podcast The Repeater in iHeart Podcast
  • What is Wi-Fi?

    Wi-Fi stands for wireless fidelity and means wireless connection area. As can be understood from the definition of wifi, it is a wifi signal area and you can access the internet wirelessly with tablets, phones, smartwatches, audio players, televisions, game consoles, and similar devices in this area.

    How Does Wi-Fi Work?

    Wi-Fi technology is the same as the working principle of transistor radios. In order for the Wi-Fi connection to be established, if a device that emits the signal at one end is at the other end, another device that can receive these signals and convert them to data is required.

    Let's consider how the wireless internet connection takes place in an average home: Devices such as routers, phones, or computers have hardware that can transmit the signal wirelessly.

    Router or modem creates a network by spreading the connection provided by your internet service provider at a frequency that your home devices can understand. Communication between devices that have Wi-Fi hardware such as a computer or smartphone and are allowed to access this connection is through the signal exchange, enabling wireless data exchange.

    When Was Wifi Released?

    The key invention for Wi-Fi technology is a set of local area network standards referred to as IEEE 802.11. Based in the USA, these standards announced by the Institute of Electrical and Electronics Engineers, an international non-governmental organization, in 1997, were further developed in the following years and the speed and capacity of the connection were increased.

    The standardization performed by the IECC on this issue is very important. Before 1999, when Wi-Fi technology started to be marketed, there were technologies that can provide a wireless connection between devices, but since there is no standard, incompatibility between these technologies created various difficulties in use.

    The development of a technical standard has enabled different technology manufacturers to use this technology effectively and widely, and many products with Wi-Fi capability to enter the consumer market.

    What is Wifi Bandwidth?

    Wi-Fi technology works by means of radio signals. Bandwidth refers to the range of radio frequency that enables wireless data transmission. The specified range for the wireless network connection is between 2.4 GHz and 5 GHz.

    Wi-Fi radio waves are generally at either 2.4 GHz or 5 GHz frequency. The biggest difference between the two frequencies is that a device with a frequency of 5 GHz can emit a signal to half the area of

    2.4 GHz. In addition, the 5GHz frequency signal cannot cross solid objects such as walls and the connection will be interrupted. However, data is transferred much faster at a frequency of 5 GHz.

    More Podcasts

    The Access Point in Anchor Podcast The Repeater in Anchor Podcast The Networking Bridge in iHeart Podcast The Networking Switch in Google Podcast
  • What is an Access Point in Computer Networks?

    Access Point is the common name of devices that connect multiple computers, mobile devices, smartphones, and all devices that can access the Internet.

    Access Points are generally used to convert wired connections to wireless connections. In addition to the ability of APs to convert wired internet to wireless wifi internet, it can also be used as a signal repeater.

    Repeater mode in Access Points is generally preferred indoors to provide internet access to endpoints or by users who do not want to experience cable pollution.

    APs are produced for indoor and outdoor environmental conditions. Outdoor Access Points are produced with a special working principle in order to ensure signal continuity in bad weather conditions, and their durability is higher than indoor products.

    What Does Access Point Do?

    Access Points can undertake multiple functions. They convert the wired internet connection received via modem or switch into a wireless internet connection. In short, it provides a wireless network connection in an environment where there is no wireless network connection.

    If you make the correct settings, the access points have the ability to strengthen the wireless network signal. It strengthens the current network signal and presents it to the environment. In this way, the wireless network connection is strengthened and the domain expands.

    How to Connect Access Point?

    The setup logic of the Access Point device is very similar to the ADSL modem setup. First of all, you need to establish a connection with an Ethernet cable between the ADSL modem that provides your internet connection and the access point device.

    In cases where the signal strength of the ADSL modem is weak, the access point device is activated and expands the internet connection. In environments where signal strength may be low such as factories, schools, homes, and workplaces, we connect the modem and the access point device with an ethernet cable.

    We plug the access point device into the socket. We plug the cable coming from the power adapter into the access point device and turn the device on by pressing the power button.

    When these processes are implemented completely, the signal strength starts to spread from the access point device. Encryption is extremely important to encrypt the internet network in order to control the reliability of the internet connection and to prevent easy access to the interface of the access point device.

    Security

    Just as we connect to the interface of a normal modem, we can connect to the interface of the access point. The first thing required for this is a computer. First, we connect the computer and the access point device with an ethernet cable. In order to access the interface of the access point, we use the IP number if available in the manual or any of the IP addresses such as 192.168.1.1 or 192.168.2.1.

    More Podcasts

    The Networking Repeater in Anchor The Networking Hub in Google Podcast The Networking Switch in iHeart
  • What is Repeater in Network Systems?

    The most important point to be considered when wiring is that the data reaches the destination smoothly. However, depending on the technology used, the maximum distances that the cable can transmit the data without any problem are limited. The repeater is activated at distances that the cable cannot reach.

    The repeater is used to strengthen data packets that may not reach its recipient. Data packets lose power while trying to reach remote computers.

    A repeater works in the physical layer. Its job is to recreate the signal over the same network before the signal is too weak or distorted to extend the length at which the signal can be transmitted over the same network.

    It empowers the repeater data packets to keep them on their way. When the repeater receives a signal, it returns it to its original power and state. Some hubs already act as repeaters in UTP cables.

    In token ring systems, there is no need for a repeater as each station strengthens the incoming data and leaves it on the road again. 185 meters when using thin coax in coaxial cable,

    When using thick coax can be a maximum cable length of 500 meters.

    If the target station is further than these distances, the repeater should be activated. Up to 4 repeaters can be used in a row.

    Usage Areas

    A typical router is usually strong enough to provide a Wi-Fi signal in a small house or apartment, but may not be strong enough to serve a large home. This causes dead spots in the house with no signal.

    How Is It Used?

    It is important to place a repeater in the correct location where the signal is strong. A location between the router and the weakest reception area is ideal. Then, following the instructions that came with the repeater, log into the Wi-Fi repeater on your computer and enter the login and password for your Wi-Fi network. The repeater connects to the Wi-Fi network and increases the signal strength from where it is located outwards.

    More Podcasts

    The Networking Hub in Anchor Podcast The Networking Bridge in Anchor Podcast The Networking Switch in iHeart Podcast The LAN Network in Google Podcast
  • What is Hub in Computer Networks?

    Hubs do not know which computers are connected to it and do not perform a network operation of the source or target computer. For this, they are defined as stupid devices according to Switches.

    If data is sent to a computer on the network, the Hubs send this data to all computers, and the computer that will receive the data checks whether the data was sent to it or not, if it was sent to it, it receives the data. Therefore, hubs do not send anything directly to the computer but help to send. If the target computer accepts, it is thrown into the computer. Hubs are one of the central devices in a star topology. Topology refers to the physical and logical structure of a network.

    The connection types of the components that make up the network, the devices to be used, the wiring standards, the selection of the communication protocol, and the applicability of these protocols to the network structure are also within the scope of the topology. They work with plug and play logic.

    Another difference is that it is both uncomplicated and cheap. Being cheap is one of the reasons why the hub is preferred. The hub allows computers to communicate on the network. Each computer is connected to the Hub with an Ethernet cable, and information sent from one computer to another passes through the hub. The hub cannot determine the source or destination to which the information it receives is intended to be sent, so it sends the information to all computers connected to it, including the computer that sent the information.

    What are the Differences Between Hub and Switch?

    Hub is the central coupling device that connects computers together. There are Active and Passive Hubs. Passive types connect computers but do not process signals.

    The Networking Hub sends data to all computers connected to it. If it is the only computer that needs to receive the data, it also keeps them busy as it sends data to other computers connected to it. Therefore, Hubs are weaker in performance than Switches. As many computers as the number of ports can be connected.

    Switches, on the other hand, are devices that find a separate path to each data transmission channel with the encryption method. It only sends data to the desired computers. Whichever device is connected to its ports, it prepares a separate path for all of them. It is the same as the hub as the task. but in terms of performance and speed, it is faster than a hub.

    The switch looks at which address the incoming data will go to, establishes a connection between the sender and the receiver, and transmits it without the knowledge of other computers and without engaging them.

    More Podcasts

    The Networking Bridge in Anchor Podcast The Networking Switch in iHeart Podcast The Networking Router in iHeart Podcast The WAN (Wide Area Network) in Himalaya Podcast
  • What is Bridge in Computer Networks?

    Bridges are network devices used to connect two or more independent networks using the same protocol. It examines the data that is placed between two independent networks and wanted to be transferred to both sides. If the data address matches an address on the computer network, it allows data to pass to that network; otherwise, it does not allow data to pass through the network.

    Bridges generally do what repeaters do. But their main difference is that a repeater amplifies the message coming to it and sends it directly, without looking at the destination. The networking bridges will not send this packet if the packet cannot reach its destination. In addition, bridges connect different networks from each other and allow them to communicate between them.

    We can list the properties of bridges as follows.

    The OSI model is a layer 2 device. Uses various physical layer protocols. It filters LAN traffic. Keeps local traffic locally. It enables transmission to other parts of the LAN traffic as well. It separates the collision areas connected to MAC addresses.

    Bridges need to be understood very well in order to understand the Routing and Switching processes. Usually, bridges resemble devices with two ports, but there are also bridges with three or more ports.

    More Podcasts

    The Networking Switch in Google Podcast The Networking Router in Google Podcast The WAN in iHeart Podcast The Difference LAN, WAN, and MAN in iHeart Podcast
  • What is Switch in Computer Networks?

    The switch is one of the network hardware that allows PCs and other network equipment to be integrated with each other. OSI works in layer 2 of the seven-layer model and also in layer 3, as new switches are capable of IP routing.

    Each of the network switches can exchange data independently of the others. When a data packet reaches one of the ports, the network key records the sender's Mac address and the sent port in the address table.

    It tries to detect the port to which the target MAC address is connected by examining the existing records in the MAC address table. If no record is found, the data packet is sent to all ports except the incoming port. If the mac address is known, then the data packet is only sent to the destination port. If the sender's and receiver's MAC addresses are the same, the packet is deleted.

    Managed and Unmanaged Switches

    Basic network switches, such as those used in consumer routers, do not require any special configuration beyond plugging in cables and power.

    Compared to these unmanaged switches, high-end devices used in corporate networks support a range of advanced features designed to be controlled by a professional administrator. Popular features of managed switches include SNMP monitoring, link aggregation, and QoS support.

    Traditionally managed switches are created to be controlled from Unix-style command-line interfaces. A newer category of managed switches called smart switches that target entry-level and mid-level corporate networks to support web-based interfaces similar to a home router.

    How Does Switch Work?

    Switches connect devices (such as computers, printers, wireless access points) on a network and allow them to communicate by exchanging data packets. Switches can be software-based virtual devices as well as hardware devices that manage physical networks.

    Switches make up the majority of network devices in modern data networks. They provide wired connections to desktop computers, wireless access points, industrial machines, and some IoT devices such as card entry systems.

    They connect the computers that host virtual machines (VMs) in data centers, as well as physical servers and most of the storage infrastructure. They carry large amounts of traffic on their telecommunications provider networks.

    A network switch operates on the network layer L2 of the OSI model. In a local area network (LAN) using Ethernet, a network switch determines where each incoming message frame is sent by examining the physical device address or MAC address. The switches hold tables that match each MAC address and the port from which the MAC address is obtained.

    More Podcasts

    The Router in Google Podcast The Difference LAN, WAN, and MAN in Google Podcast The Ubuntu Operating System in Google Podcast The Wide Area Network in iHeard Podcast
  • What is a Router in Computer Networks?

    The internet is one of the 20th century's greatest inventions and communication tools. It allows people around the world to email each other in a matter of seconds and allows you to read content posted on the website, among other functions.

    In fact, most people have never come face to face with or didn't want to, the technology that allows the internet to exist. We are all used to seeing the familiar parts of the internet that it brings to our homes and offices, web pages, email messages, and downloaded files that make the internet a dynamic tool. But none of this could happen without an internet device that many people have probably never seen before. Without a router, there is no virtual world we call the Internet.

    Most of the work done to send messages from one computer to another is done by the router. Because the router is an important device that enables messages to reach the correct address by traveling within the networks.

    The router is the only device that sees messages sent by any computer in one of the networks of the company in which it is installed. In other words, the router sees which computer in the company the data packet originates from and which computer it is addressed to.

    It controls the traffic of all connected computers and in this way ensures that the data reaches the correct address. The traffic line that provides data communication between computers does not interfere with each other thanks to the router. This is a different answer to the question of where to use the router.

    What is the Difference Between Router and Modem?

    Since modern modems are often equipped with a built-in router, the distinction between router and modem is often blurred in people's minds.

    However, those who remember the early days of the internet know that routers and modems have different functions. The modem expression is derived by combining the word modulator with a letter at the beginning of the word demodulator.

    It is possible for a computer to connect to the internet, that is, to the public network, that is to be online, with a modem. Also, a modem is a device that connects computers to computers in remote locations over the public network.

    Thanks to the modem, the audio signals coming from the telephone box are converted into data that the computer can understand. Likewise, it converts the data coming from the computer into audio signals and transfers it to the general network.

    The modem is a must-have device for connecting to the internet and building a large network. Router, on the other hand, is hardware for connecting multiple computers to the same network.

    The router can connect the existing internet connection to home, office, etc. It is a device that shares it with other devices in the spaces. The router creates a network by emitting a wireless signal so that devices with wireless connectivity can connect to the internet via itself. You can also connect your devices to a router with ethernet ports directly by cable.

    More Podcasts

    The LAN, WAN, and MAN in Anchor The WAN Networking in Anchor The LAN Networking in Google Podcast
  • What is the Difference Between LAN, WAN, and MAN Networks?

    Network systems is a computer technology that enables computers in a local or a wide area to communicate with each other.

    This technology is divided into some definitions according to the area it covers and the type of physical connection. These are LAN (Local Area Network), MAN (Metropolitan Area Network), and WAN (Wide Area Network).

    Local Area Network (LAN)

    It is a type of private network consisting of a group of computers and network devices within a small geographic area. Often an office is used to describe a network of computers located several buildings away from each other. The criterion here is that the computers are close to each other in general, rather than how many computers the network consists of. Home, office, school, hospital networks can be examples of local area networks.

    Twisted (ethernet) or coaxial cables are generally used in local area networks. Since the distance is short, the speed is high and the noise ratio is lower.

    Metropolitan Area Network (MAN)

    MAN is a type of network that covers more areas than LANs and less than WANs. It is a type of network that connects networks that are usually hosted in the same cities but in different geographic regions. Networks covered by Internet Service Providers (ISPs) in a city can be an example of a MAN.

    Due to their location in different geographical areas, their speed will be lower than LAN.

    Wide Area Network (WAN)

    It defines a network created by connecting many LANs to each other via the Internet over a wide geography. Internet service providers perform the task of connecting multiple Local Area Networks. The local area networks mentioned here can be in many different parts of the world. Optical cables or satellites can be used for transmission.

    To compare,

    WAN covers a much larger area than LAN and MAN. It is more difficult to design and maintain than LAN. Since it can send information to much more distant geographic locations, its speed is slower than LAN and MAN and its error probability is higher.

    LAN has exclusive use. It is faster than others and less likely to fail. It is easier to install, maintain, and manage.

    MAN sits in the middle of the LAN and the WAN in terms of coverage and speed.

    More Podcasts

    The LAN Network in Google Podcast The WAN Network in Google Podcast The Internet in Google Podcast The WAN in iHeart Podcast