Monday 24 December 2018

Protocol-What Is Protocol

Protocol

A protocol is a set of rules which determines how the data will be transmitted over in the network. Protocol are stored in binary information. It is a mixture of bits, characters, and integers.

Suppose there are 2 machines and we need to transfer some data to another machine. In this case of data transfer, there are some rules, which are known to us as Protocol. So, we can say that in networking protocol is a set of instructions that define how data will be transferred and how devices will communicate with each other. It is a communication standard which helps to communicate two devices. There are 3 levels in a protocol. These are:

1.  Hardware Device Level
2.  Software Level
3.  Application Level

And there are 2 types of protocol:

1. Standard Protocol:
Standard protocol helps to communicate multi winder means products of a different company.FTP,DNS,DHCP,SMTP,Telnet,TFTP are the standard protocol which are available for public users.

2.  Proprietary Protocol:
A proprietary protocol cannot support multi winder. It can support only company own devices. This is not available publicly. If anyone wishes to use that proprietary protocol, then he/she have to take permission of that protocol company means by which the protocol was created. Let's talk about IMessage which has made by Apple. If there are two Apple devices then by the proprietary protocol the communication could be possible. But in the case of other company devices, it will not be possible.

What Is Encryption

Encryption

what-is-encryption
Encryption

The internet is an open public system. We send and receive information over the internet connection. But even we know it is an open public system, we still exchange a lot of private data through the internet. We send very sensitive things like bank information, credit card number,cvv, password, emails, and others. So now, here it is a big question that, how do we keep this private stuff safe.

Encryption is a process to keep any kind of data safe. Scrambling a message to hide the original is encryption. And decryption is the process to unscrambling the message to make that readable.

This is a very simple idea in encryption and decryption and we have been doing it for a very long time. One of the first well-known methods of encryption was CAESAR'S CIPHER which was made after Julius Caesar. Julius Caesar was a Roman general who keeps encrypted his military commands by his enemies.

Caesar Cipher was an algorithm, that subtracts each letter from the original message with a letter of a certain number of steps down to the alphabet. In this case, when sender and receiver know that number then it called a key. To decrypt the message it will do to reverse the number.

what is encryption


But there was a big problem with Caesar Cipher. As Caesar Cipher was a method of number increase and decrease that is why it was very easy to crack the encrypted message by trying every possible letter and there, in the English alphabet, there are 26 letters which means you only need to try almost 26 keys to decrypt the encrypted message. Therefore a new method came. In Caesar Cipher we tried to encrypt the message by using only a fix number. Let imagine the encrypt message is "Hello".So here by using a key of 5, the message will be "Mjqqt".Now to make this difficult we will add a different amount of number key to decrypt. If we consider using 10 digit encryption, there could be 10 billion possible key solutions. That will be very difficult for us even it could take many centuries. But with a computer, it will take only a few seconds to decrypt the encrypted message. Thereafter encryption with 128/192 and 256-bit encryption came in market. Today's secure communications are encrypted with 256-bit encryption, which is very difficult to crack with so many supercomputers.

There are two types of key encryption.
                                                             1.  Symmetric
                                                             2.  Asymmetric
When the sender and the receiver share the same key to encrypt and decrypt a message then it is called as symmetric encryption. It will not available except the sender and receiver. But a public key which can be exchanged with anybody called asymmetrically. So, we can say that encryption is the most secure process for transferring data. When we send a message using an encrypted messaging service like facebook, WhatsApp.That time the service wraps takes our message in code and make an encryption key regarding that message which only the reciever of the message could decrypt.

what-is-encryption
Encryption



Sunday 23 December 2018

What Is Download-Download

Download

We are very familiar with this word "Download".On the internet, a download is a process to receive data from another remote system, which can also say as a server. Server is the storage point where every related data are stored. When we click to download any files, photos or videos or any other thing on the internet, then the data file from the server comes to us as a remote server. This same concept applies to upload. When we upload something on the internet, then from our source the data goes to the server through the internet. We cannot say download as data transfer, because the download is the process between source and server. It is just a process of receiving data from the server through the internet.
From the internet user's point of view, a download is a request from a user to the server to send data through the internet. Basically, this "Download" term is associated with videos, songs, games, pictures and other programs. In any smart device when we click on any download option the file destination opens, where the downloaded file will store.
                                                       

what is download

What Is Domain

Domain

In this universe every object, every person has its own name with which we can identify one thing from another. This same concept applies here in the name Domain.

A Domain name is nothing but website name. Basically, domain is the address where anybody in this earth can access our website using internet connection.
We everyone heard about IP address which stands for Internet Protocol address. An IP address is the series of numbers for a particular website or mobile phone or any network connection. As IP address is a bunch of numbers, so it's become very difficult for us to remember this number to access. To avoid this type of problem in the year 1985 on 15th of March a Massachusetts computer company, Symbolics first launched their domain name "symbolics.com".It can say that domain name is the alternate remembering process of an IP address.

There are two types of domain. The first one is SLP which stands for second level domain and the next one is TLD which stands for top-level domain. The domain name can be a maximum of 63 characters. It is basically an URL or address of a website. When we are talking about an URL, it is also important to say, there are 5 parts of a full URL. These parts are:
1.  Protocol:
                   This is hypertext transfer protocol("https://").
2.  Subdomain:
                  "www. " is the subdomain of every website.
3.  Domain:
                   This is one's actual website name.
4.  Directories
5.  Webpage:
                   It usually is written in hypertext markup language.

Any domain name is a combination of some letters and numbers. The extension makes a major role while choosing a domain name. It is to be noted that domain name must be registered before use it. If anyone searches by typing our web domain name "motech360.blogspot.com" they will go only on our website not others.