Basic Network Tools
PING
It is a command which determines the connectivity between two hosts. (i.e. whether the remote machine can receive the test packet and reply. It is determined by finding how much time it takes to get response from the remote machine(website, server etc).
TRACEROUTE
This command is used to trace the path , a signal takes from your computer to the destination computer.
NSLOOKUP
This command is used to resolve DNS name resolution problems. It displays the name and IP address of your computer’s default DNS server. It also displays a small prompt where you ca type the domain name or IP address and find out whether DNS server can identify the given domain or IP address.
IPCONFIG Command
It displays the detailed information about the network you are connected to. Information such as DNS servers, MAC address along with other helpful information is displayed.
WHOIS
It is used to get information on a specific domain name such as who registered it, when was it registered, and when the domain will expire etc.
Speed Test
It is a utility used to determine the download and upload speed of your network connection. This is done through speedtest.net’s site utility.
Working of Email
What happens after you click on send button of your email? Lets have a look
You compose and send email from your email client. Your email has a recipient’s email address along the email message.
Now your email client connects to the Outgoing SMTP server and hands over the email message in the required format.
The Outgoing SMTP first validates the sender details and if valid processes the message for sending and places it in outgoing queue.
Next DNS look up takes place. The SMTP server based on the domain details in the recipient address, looks up the DNS server of the domain and retrieves the Recipient server information(MX records) of the recipient domain.( MX (mail exchange) records are DNS records that are necessary for delivering email to the recipient’s address.
Then the SMTP server connects with the Recipient email server and sends the email through SMTP protocol.
The recipient server in turn validates the recipient account and delivers the email to the users email account.
The user logs into own email account and views the received email using email client that will use POP3/IMAP protocols.
Secure Communication
Every day people share lots of private information such as banking information, credit/debit card details for online payments, login ids, passwords for various types of account such as social media accounts, email accounts and so on. This information is so important and private that this must be securely exchanged over the web and it must not fall into hands of people with malicious intentions. To ensure the safety many internet security measures are employed. Some of them are :
Encryption
It is a technique that translates the original data into a form which is not a usable form of data. The encrypted data must be decoded or decrypted to bring it back to the original form. To decrypt the data a specific code called the decryption key is required
HTTPS( Hypertext transfer protocol secure)
It is a combination of HTTP and SSL/TSL protocols. HTTPS encrypts your data and establishes a secure channel over a non secure network to ensure protected data transfer. Thus the data is protected from the hackers and eavesdroppers who wants to intercept and access your data. SSL stands for Secure Socket Layer protocol. It encrypts the data so that a third party cannot eavesdrop on the transmission and view the data being transmitted. It requires that the website has SSL certificate installed which ensures its authenticity. Once installed, the sensitive information is obtained from the user through a secure connection over internet.
Network Applications
To work on the distant computers over the internet, there are two common network applications :
Remote Desktop
The remote desktop is a type of network application through which a person can work on the desktop of another computer ( which is at different location) in the same manner as if that computer is right in front of the person. The person connects to the remote computer( host computer) via own computer(client Computer) on which he/she is working. The remote desktop application displays the desktop of the host computer on the screen of the client computer , and the user can work on it as if it is his/her computer.
Remote Login
The remote login is a network application that permits a user sitting at a different location to work on a specific program on another computer. The work access to a program is granted by login concept wherein users having authorized login and password to work on that program are allowed access. TELNET and SSH are two programs that facilitate remote login on the internet. These programs help you to connect to the remote machine. Remote login is different from accessing information over the internet. It is an interactive data transfer where the user is interacting with remote program