Networking Command
1. Ping
Ping is used to testing a network host capacity to interact with another host. Just enter the command
Ping, followed by the target host’s name or IP address. The ping utilities seem to be the most
common network tool. This is performed by using the Internet Control Message Protocol, which
allows the echo packet to be sent to the destination host and a listening mechanism. If the destination
host reply to the requesting host, that means the host is reachable. This utility usually gives a basic
image of where there may be a specific networking issue,
For Example: If an Internet connection is not in the office, for instance, the ping utility is used to
determine if the problem exists in the office or the Internet provider’s network. The following shows
2.
NetStat
Netstat is a Common TCP – IP networking command-line method present in most Windows,
Linux, UNIX, and other operating systems. The netstat provides the statistics and information
in the use of the current TCP-IP Connection network about the protocol.
Ip Config
The command IP config will display basic details about the device’s IP address configuration.
Just type IP config in the Windows prompt and the IP, subnet mask and default gateway that
the current device will be presented. If you have to see full information, then type on
command prompt config-all and then you will see full information. There are also choices to
assist you in resolving DNS and DHCP issues.
4. Hostname
To communicate with each and other, the computer needs a unique address. A hostname
can be alphabetic or alphanumeric and contain specific symbols used specifically to define a
specific node or device in the network. For example, a hostname should have a domain name
(TLD) of the top-level and a distance between one and 63 characters when used in a domain
name system (DNS) or on the Internet.
5. Tracert
The tracert command is a Command Prompt command which is used to get the network
packet being sent and received and the number of hops required for that packet to reach to
target. This command can also be referred to as a traceroute. It provides several details
about the path that a packet takes from the source to the specified destination .
6. Nslookup
The Nslookup, which stands for name server lookup command, is a network utility command
used to obtain information about internet servers. It provides name server information for
the DNS (Domain Name System), i.e. the default DNS server’s name and IP Address.
7. Route
In IP networks, routing tables are used to direct packets from one subnet to another. The
Route command provides the device’s routing tables. To get this result, just type route print.
The Route command returns the routing table, and the user can make changes by
Commands such as Route Add, Route Delete, and Route Change, which allows modifying the
routing table as a requirement.
8. ARP
ARP stands for Address Resolution Protocol. Although network communications can readily
be thought of as an IP address, the packet delivery depends ultimately on the media access
control (MAC). This is where the protocol for address resolution comes into effect. You can
add the remote host IP address, which is an arp -a command, in case you have issues to
communicate with a given host. The ARP command provides information like Address, Flags,
Mask, IFace, Hardware Type, Hardware Address, etc.
9. Path Ping
We discussed the Ping command and the Tracert command. There are similarities between
these commands. The pathping command which provides a combination of the best aspects
of Tracert and Ping.
This command takes 300 seconds to gather statistics and then returns reports on latency and
packet loss statistics at intermediate hops between the source and the target in more detail
than those reports provided by Ping or Tracert commands.
Difference between http:// and https://
In address bar of a browser, have you noticed either http:// or https:// at the time of
browsing a website? If neither of these are present then most likely, it’s http:// Let’s find out
the difference…
In short, both of these are protocols using which the information of a particular website is
exchanged between Web Server and Web Browser. But what’s difference between these
two? Well, extra s is present in https and that makes it secure! What a difference A
very short and concise difference between http and https is that https is much more secure
compared to http.
HyperText Transfer Protocol (HTTP is a protocol using which hypertext is transferred over
the Web. Due to its simplicity, http has been the most widely used protocol for data transfer
over the Web but the data (i.e. hypertext) exchanged using http isn’t as secure as we would
like it to be. In fact, hyper-text exchanged using http goes as plain text i.e. anyone between
the browser and server can read it relatively easy if one intercepts this exchange of data.
But why do we need this security over the Web? Think of ‘Online shopping’ at Amazon or
Flipkart. You might have noticed that as soon as we click on the Check-out on these online
shopping portals, the address bar gets changed to use https. This is done so that the
subsequent data transfer (i.e. financial transaction etc.) is made secure. And that’s
why https was introduced so that a secure session is setup first between Server and
Browser. In fact, cryptographic protocols such as SSL and/or TLS
turn http into https i.e. https = http + cryptographic protocols. Also, to achieve this security
in https, Public Key Infrastructure (PKI) is used because public keys can be used by several
Web Browsers while private key can be used by the Web Server of that particular website.
The distribution of these public keys is done via Certificates which are maintained by the
Browser. You can check these certificates in your Browser settings. We’ll detail out this
setting up secure session procedure in another post.
Also, another syntactic difference between http and https is that http uses default port 80
while https uses default port 443. But it should be noted that this security in https is
achieved at the cost of processing time because Web Server and Web Browser needs to
exchange encryption keys using Certificates before actual data can be transferred. Basically,
setting up of a secure session is done before the actual hypertext exchange between server
and browser.
Differences between HTTP and HTTPS
In HTTP, URL begins with “http://” whereas URL starts with “https://”
HTTP uses port number 80 for communication and HTTPS uses 443
HTTP is considered to be unsecure and HTTPS is secure
HTTP Works at Application Layer and HTTPS works at Transport Layer
In HTTP, Encryption is absent and Encryption is present in HTTPS as discussed
above
HTTP does not require any certificates and HTTPS needs SSL Certificates
What is an API Gateway?:
What is SSL?