<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>devkuma – Network</title>
    <link>https://www.devkuma.com/en/tags/network/</link>
    <image>
      <url>https://www.devkuma.com/en/tags/network/logo/180x180.jpg</url>
      <title>Network</title>
      <link>https://www.devkuma.com/en/tags/network/</link>
    </image>
    <description>Recent content in Network on devkuma</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>kc@example.com (kc kim)</managingEditor>
    <webMaster>kc@example.com (kc kim)</webMaster>
    <copyright>The devkuma</copyright>
    
	  <atom:link href="https://www.devkuma.com/en/tags/network/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Network Overview</title>
      <link>https://www.devkuma.com/en/docs/network/overview/</link>
      <pubDate>Sat, 26 Nov 2022 08:24:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/network/overview/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-a-network&#34;&gt;What Is a Network?&lt;/h2&gt;
&lt;p&gt;A network generally means &amp;ldquo;connecting people or things like a net.&amp;rdquo; In the world of IT systems, it means &amp;ldquo;interconnecting computers.&amp;rdquo; It may also be described as &amp;ldquo;a path through which information flows.&amp;rdquo; By connecting computers through communication circuits, cables, and similar media, it becomes possible to share information, distribute processing, and exchange messages.&lt;/p&gt;
&lt;p&gt;The word network is a compound of Net + Work. If translated literally, it means &amp;ldquo;net work,&amp;rdquo; and in a more understandable way, it can be described as &amp;ldquo;work performed cooperatively while being connected to one another like a net.&amp;rdquo; Going further, it can be described as &amp;ldquo;work in which computers share resources while connected to one another.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Then what is the Internet? It is a huge integrated communication network that connects networks around the world through a set of communication rules, the TCP/IP protocol.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/linkeddata.jpg&#34; alt=&#34;Network&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;components-of-a-network&#34;&gt;Components of a Network&lt;/h2&gt;
&lt;p&gt;A network consists of &amp;ldquo;computers,&amp;rdquo; &amp;ldquo;network devices,&amp;rdquo; &amp;ldquo;transport media,&amp;rdquo; and similar elements. Computers are PCs, servers, and other machines that provide or use applications (services). Network devices, such as switches and routers, transport application data. Transport media, such as cables and wireless radio waves, connect computers and network devices.&lt;/p&gt;
&lt;h2 id=&#34;network-topology&#34;&gt;Network Topology&lt;/h2&gt;
&lt;p&gt;Network topology refers to the physical connection form of various networks. It describes the overall shape of computers connected by cables in a network.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Physical structure: the actual connection shape of hosts connected by media.&lt;/li&gt;
&lt;li&gt;Logical structure: the network shape based on how hosts access the media.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are six forms of physical topology.&lt;br&gt;
&lt;img src=&#34;https://www.devkuma.com/docs/network/network-topology.gif&#34; alt=&#34;Network topology&#34;&gt;&lt;/p&gt;
&lt;h3 id=&#34;bus-topology&#34;&gt;Bus Topology&lt;/h3&gt;
&lt;p&gt;Bus topology is a form in which each node is connected to a common line called a bus. All devices are connected to a central cable called a backbone.
The Ethernet protocol also uses this form.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advantages
&lt;ul&gt;
&lt;li&gt;Nodes can be added and removed easily, and a failure in a specific node does not affect other nodes.&lt;/li&gt;
&lt;li&gt;It is inexpensive.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Disadvantages
&lt;ul&gt;
&lt;li&gt;Because the bandwidth of the common line is shared, as the number of nodes increases, traffic on the line increases and network performance decreases.&lt;/li&gt;
&lt;li&gt;To expand it, the entire network must be stopped, and if a cable problem occurs, it is difficult to find.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;star-topology&#34;&gt;Star Topology&lt;/h3&gt;
&lt;p&gt;As it looks, this topology is shaped like a star. Each node is connected to the center within 100 meters.
Each node has input and output through only one link.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advantages
&lt;ul&gt;
&lt;li&gt;Failures are easy to find, and management is easy.&lt;/li&gt;
&lt;li&gt;Even if a node has a problem, the entire network is not affected.&lt;/li&gt;
&lt;li&gt;Expansion is very easy because you only need to connect to the center.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Disadvantages
&lt;ul&gt;
&lt;li&gt;If the main node fails, the entire network becomes unavailable.&lt;/li&gt;
&lt;li&gt;Although management is easy, all transmission must pass through the center, so bottlenecks may occur.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;ring-topology&#34;&gt;Ring Topology&lt;/h3&gt;
&lt;p&gt;Ring topology is a circular topology in which each node is connected to its neighboring nodes on the left and right. Each node is directly connected to the device next to it.
Data can be transmitted in only one direction. Token Ring also uses this form.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advantages
&lt;ul&gt;
&lt;li&gt;Because communication is one-way, signal amplification is possible and there are fewer distance limitations.&lt;/li&gt;
&lt;li&gt;It is easy to install over a wide area and has the advantage of being able to use wide bandwidth.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Disadvantages
&lt;ul&gt;
&lt;li&gt;Adding and removing nodes is not easy.&lt;/li&gt;
&lt;li&gt;Installation cost is high. (It decreases if the space is small.)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;mesh-topology&#34;&gt;Mesh Topology&lt;/h3&gt;
&lt;p&gt;Mesh topology is a form in which everything is connected to everything else. It is a net-like form where all nodes are connected one-to-one, allowing multiple pairs of nodes to communicate at the same time.&lt;/p&gt;
&lt;p&gt;There are fully connected and partially connected forms. A fully connected network does not require switching or broadcasting, but the number of connections increases rapidly each time a node is added.&lt;/p&gt;
&lt;p&gt;The number of connections required for n nodes is &lt;code&gt;n(n-1)/2&lt;/code&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Advantages&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A failure in a specific node does not affect other nodes, and line failures can be handled flexibly.&lt;/li&gt;
&lt;li&gt;It also provides the strongest security.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Disadvantages&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Line construction costs are high, and adding a new node creates an additional cost burden.&lt;/li&gt;
&lt;li&gt;Installation and readjustment are difficult.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;communication-methods&#34;&gt;Communication Methods&lt;/h2&gt;
&lt;p&gt;Broadcast, unicast, and multicast are all communication methods.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Broadcast: sends a transmission message to an entire network.&lt;/li&gt;
&lt;li&gt;Unicast: a one-to-one communication method.&lt;/li&gt;
&lt;li&gt;Multicast: sends data only to selected recipients.&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;isp-internet-service-provider&#34;&gt;ISP (Internet Service Provider)&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;An Internet service provider.&lt;/li&gt;
&lt;li&gt;For example, providers such as KT, U+, and SK Broadband.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Internet Overview</title>
      <link>https://www.devkuma.com/en/docs/internet/intro/</link>
      <pubDate>Sun, 03 Apr 2022 17:26:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/internet/intro/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-the-internet&#34;&gt;What Is the Internet?&lt;/h2&gt;
&lt;p&gt;The Internet is a compound of Interconnect Network and means interconnected networks. It refers to a collection of networks in which countless computers around the world are connected. Computers connected to the Internet are linked using a communication protocol called TCP/IP (Transmission Control Protocol/Internet Protocol). Each computer that makes up the Internet has a unique computer address called an IP address, and they are connected to one another through communication methods such as cables or satellites.&lt;/p&gt;
&lt;p&gt;Because of this, computer users around the world can easily obtain the information they need anytime and anywhere through the Internet.&lt;/p&gt;
&lt;h2 id=&#34;history-of-the-internet&#34;&gt;History of the Internet&lt;/h2&gt;
&lt;p&gt;The beginning of the Internet goes back to 1969, when ARPANet (Advanced Research Project Agency Network) from the U.S. Department of Defense first appeared. Early ARPANet began as a network that connected the computer systems of four U.S. universities (Stanford, UCLA, UC Santa Barbara, and Utah State University), designed so that even if one system was destroyed during a nuclear war, the remaining systems could still connect and compensate perfectly. After that, it gradually expanded by connecting major U.S. government and educational institutions. In 1983, ARPANet was divided into MILNet, the part used for military purposes, and the Internet, the part used for civilian purposes.&lt;/p&gt;
&lt;h2 id=&#34;internet-addressing-system&#34;&gt;Internet Addressing System&lt;/h2&gt;
&lt;p&gt;To exchange information on the Internet, each computer needs to be distinguished by assigning an address or name. The addressing systems provided by the Internet include IP addresses and domain names.&lt;/p&gt;
&lt;p&gt;To maintain the Internet, Internet addresses must be managed, and an organization responsible for new Internet technologies and standardization is needed. NIC (Network Information Center) is an international organization that registers and manages network and computer addresses such as IP addresses and domain names. In Korea, KRNIC, an affiliated organization of NIC, is responsible for Internet address management.&lt;/p&gt;
&lt;h3 id=&#34;ip-address&#34;&gt;IP Address&lt;/h3&gt;
&lt;p&gt;An IP address is a method of representing a computer&amp;rsquo;s address with numbers. It is structured by listing four areas in order, separated by dots (&lt;code&gt;.&lt;/code&gt;), from the highest-level address. For example, Google&amp;rsquo;s IP address is represented as &lt;code&gt;172.217.174.100&lt;/code&gt;. However, this method is inconvenient to memorize or use, so domain names are commonly used.&lt;/p&gt;
&lt;h2 id=&#34;understanding-urls&#34;&gt;Understanding URLs&lt;/h2&gt;
&lt;p&gt;All web documents on the Internet have a URL (Uniform Resource Locator), which is their own address and unique storage method. Just as each person has a unique fingerprint, every homepage has a unique URL. In other words, to retrieve data on the Internet, there must be a way to indicate where certain data is located. Therefore, a URL is a method for representing the location of information on the Internet. It has been used since 1990 and has now become the standard.&lt;/p&gt;
&lt;p&gt;URLs are written using characters to identify items and specify addresses within a computer network. In other words, a URL provides location information for a document, and an Internet web browser opens the URL at that location and displays the document. Because most location information is written in highlighted links, users do not need to remember the URLs of each document or homepage.&lt;/p&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
    </item>
    
    <item>
      <title>LAN (Local Area Network) and WAN (Wide Area Network)</title>
      <link>https://www.devkuma.com/en/docs/lan-wan/</link>
      <pubDate>Fri, 18 Nov 2022 11:01:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/lan-wan/</guid>
      <description>
        
        
        &lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/lan-wan.png&#34; alt=&#34;LAN,WAN&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;lan-local-area-network&#34;&gt;LAN (Local Area Network)&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;LAN stands for Local Area Network.&lt;/li&gt;
&lt;li&gt;It refers to building a network by connecting computers with dedicated cables within a relatively small area, such as an office or building.&lt;/li&gt;
&lt;li&gt;This type of network can also be built at home, where it is called a home LAN or home network.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;types-of-lan&#34;&gt;Types of LAN&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;By connection topology, LANs include star, bus, and ring types.&lt;/li&gt;
&lt;li&gt;By communication control method, examples include Ethernet, FDDI, and Token Ring.&lt;/li&gt;
&lt;li&gt;Today, star LANs based on Ethernet are the most commonly used.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;wan-wide-area-network&#34;&gt;WAN (Wide Area Network)&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;A WAN (Wide Area Network) is a network over a broad area. A network that connects LANs within an organization or across buildings is called a WAN.&lt;/li&gt;
&lt;li&gt;It is managed by an Internet service provider.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;intranet&#34;&gt;Intranet&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;An intranet can be thought of as an internal company network. It is roughly a network made up of multiple LANs.&lt;/li&gt;
&lt;li&gt;Only members inside the intranet can communicate and share information with each other.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;extranet&#34;&gt;Extranet&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;An extranet is a network that extends an intranet, where only internal members can communicate, to allow communication with approved external users.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>LAN</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Telnet</title>
      <link>https://www.devkuma.com/en/docs/telnet/</link>
      <pubDate>Sun, 03 Apr 2022 18:02:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/telnet/</guid>
      <description>
        
        
        &lt;h2 id=&#34;telnet&#34;&gt;Telnet&lt;/h2&gt;
&lt;p&gt;The Telnet service on the Internet is a service that lets you connect to another computer, especially one using the UNIX operating system, and use it as if a keyboard and monitor were connected directly to that computer.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It is an Internet standard protocol supported when connecting to a remote host computer through the Internet.&lt;/li&gt;
&lt;li&gt;It is a TCP/IP-based protocol.&lt;/li&gt;
&lt;li&gt;It is a remote terminal connection service.&lt;/li&gt;
&lt;li&gt;TCP port number 23 is used by default.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It can display only a text screen rather than a graphical screen, but it is still widely used because it is simple, fast, and allows direct use of UNIX. However, to use Telnet well, you need to learn UNIX commands, and because only a text screen can be used, it is difficult to use without special knowledge.&lt;/p&gt;
&lt;h2 id=&#34;telnet-characteristics&#34;&gt;Telnet Characteristics&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Telnet is a kind of terminal emulation protocol and uses the concept of a virtual terminal called NVT (Network Virtual Terminal).&lt;/li&gt;
&lt;li&gt;It has a one-to-one symmetric relationship between the terminal and the host.&lt;/li&gt;
&lt;li&gt;Additional option negotiation is possible.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;what-is-nvt-network-virtual-terminal&#34;&gt;What Is NVT (Network Virtual Terminal)?&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;NVT is the most basic part of the Telnet protocol. When the remote system to connect to and the local system have different versions and therefore different data formats, it is a virtual device that converts data for smooth communication.&lt;/li&gt;
&lt;li&gt;NVT defines basic terminal control characters.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/internet/telnet_nvt.jpeg&#34; alt=&#34;NVT(Network Virtual Terminal)&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;how-telnet-works&#34;&gt;How Telnet Works&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/internet/telnet_flow.jpeg&#34; alt=&#34;How Telnet works&#34;&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The client establishes a TCP connection to the remote system (server) through remote login. (Default port 23)&lt;/li&gt;
&lt;li&gt;The remote system provides a virtual terminal to the connected client.&lt;/li&gt;
&lt;li&gt;The client executes commands on the remote system as if it were an actual terminal.&lt;/li&gt;
&lt;li&gt;The remote system executes the client&amp;rsquo;s command and sends the result back to the client.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;telnet-connection-clients&#34;&gt;Telnet Connection Clients&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Server and client built into Windows by default
&lt;ul&gt;
&lt;li&gt;For security reasons, the feature is disabled by default. To use it, it must be enabled in settings.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Putty, SecureCRT, Xshell, and similar tools can be used conveniently.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://egloos.zum.com/guswl47/v/6481497&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Telnet protocol analysis and packet analysis (1)&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
      <category>Telnet</category>
      
    </item>
    
    <item>
      <title>Web</title>
      <link>https://www.devkuma.com/en/docs/web/</link>
      <pubDate>Sun, 03 Apr 2022 18:02:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/web/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-the-web&#34;&gt;What Is the Web?&lt;/h2&gt;
&lt;p&gt;The term most often encountered when using the Internet is probably the World Wide Web (WWW). The web is also called WWW, using only the first letters of the English words, or simply Web. The web symbolizes a web, meaning a spider web.&lt;/p&gt;
&lt;p&gt;Because the web is implemented graphically, one of its greatest advantages is convenient information search. It can display text and graphics on the screen at the same time, and thanks to its excellent user interface, text, graphics, sound, video, and similar content can be handled easily in a browser.&lt;/p&gt;
&lt;h2 id=&#34;web-browser&#34;&gt;Web Browser&lt;/h2&gt;
&lt;p&gt;A web browser is a client program that allows users to view hypertext documents on a web server using the Internet. It can process not only text but also multimedia data through hypermedia functions. When users want audio or video information, it can load and execute the required programs to handle various resources on the web.&lt;/p&gt;
&lt;p&gt;Basic functions provided by a web browser include opening web pages, providing a list of recently visited URLs (Uniform Resource Locators), remembering and managing frequently visited URLs, and saving and printing web pages. Without a web browser, even if you are connected to the Internet, you cannot view homepages on the Internet.&lt;/p&gt;
&lt;h3 id=&#34;types-of-web-browsers&#34;&gt;Types of Web Browsers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Google Chrome.&lt;/li&gt;
&lt;li&gt;Mozilla Firefox.&lt;/li&gt;
&lt;li&gt;Chromium Microsoft Edge.&lt;/li&gt;
&lt;li&gt;Opera browser&lt;/li&gt;
&lt;li&gt;Vivaldi browser&lt;/li&gt;
&lt;li&gt;Naver Whale&lt;/li&gt;
&lt;li&gt;Brave browser&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;how-the-web-works&#34;&gt;How the Web Works&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/internet/web_flow.png&#34; alt=&#34;How the web works&#34;&gt;&lt;br&gt;
Image source: &lt;a href=&#34;http://tcpschool.com/webbasic/works&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;http://tcpschool.com/webbasic/works&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The user enters a URL in the browser.&lt;/li&gt;
&lt;li&gt;The browser finds the server&amp;rsquo;s IP address through DNS.&lt;/li&gt;
&lt;li&gt;It creates an HTTP request message using the HTTP protocol.&lt;/li&gt;
&lt;li&gt;It sends the HTTP request message through a TCP/IP connection.&lt;/li&gt;
&lt;li&gt;The server creates an HTTP response message using the HTTP protocol.&lt;/li&gt;
&lt;li&gt;It sends the response to the requesting computer through a TCP/IP connection.&lt;/li&gt;
&lt;li&gt;The arrived HTTP response message is returned as web page data and rendered by the web browser so the user can view it.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;international-standards-for-web-accessibility&#34;&gt;International Standards for Web Accessibility&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Web standards designed to improve web accessibility refer to commonly used technologies and rules.&lt;/li&gt;
&lt;li&gt;The W3C (World Wide Web Consortium) was established to define web standards.&lt;/li&gt;
&lt;li&gt;Web standards define HTML as the structure language, CSS as the presentation language, and Script as the behavior language.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
      <category>Web</category>
      
    </item>
    
    <item>
      <title>FTP (File Transfer Protocol)</title>
      <link>https://www.devkuma.com/en/docs/ftp/</link>
      <pubDate>Sun, 03 Apr 2022 18:02:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/ftp/</guid>
      <description>
        
        
        &lt;h2 id=&#34;ftp&#34;&gt;FTP&lt;/h2&gt;
&lt;p&gt;FTP stands for File Transfer Protocol and is a communication protocol first released in 1971 so computers could exchange files over TCP/IP networks.&lt;br&gt;
It is a service used to transfer files on the Internet. While Telnet is a service used to connect to and use another computer, FTP is used to transfer files to a server computer or to receive files from a server computer onto your own computer.&lt;/p&gt;
&lt;p&gt;FTP is still widely used because it can transfer files quickly and reliably. To overcome the disadvantage of having to learn all commands, as with Telnet, dedicated FTP programs appeared and made it convenient to use.&lt;/p&gt;
&lt;h2 id=&#34;how-ftp-works&#34;&gt;How FTP Works&lt;/h2&gt;
&lt;p&gt;FTP is a client-server protocol. When the client requests a file, the server provides the requested file. Therefore, two basic channels are required to establish an FTP connection.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;One channel is the command channel, which sends commands and basic information such as which files can be accessed.&lt;/li&gt;
&lt;li&gt;The other channel is the data channel, which transfers file data between two devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To establish a connection, the user must provide login information for the FTP server, and FTP generally uses port 21 as its default communication mode.&lt;/p&gt;
&lt;h3 id=&#34;ftp-connection-modes&#34;&gt;FTP Connection Modes&lt;/h3&gt;
&lt;p&gt;There are two FTP connection modes: active mode and passive mode.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Active mode
&lt;ul&gt;
&lt;li&gt;The server takes an active role in approving data requests.&lt;/li&gt;
&lt;li&gt;In active mode, problems caused by firewalls often occur. If a third party attempts to access an unauthorized session, that session is blocked.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Passive mode
&lt;ul&gt;
&lt;li&gt;In passive mode, if a third party attempts to access an unauthorized session, the server does not actively maintain the connection.&lt;/li&gt;
&lt;li&gt;In other words, the user sets up both the data channel and the command channel. The server basically only &amp;ldquo;listens&amp;rdquo; and does not actively participate, allowing another device to handle most of the work.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;ftp-connection-clients&#34;&gt;FTP Connection Clients&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;FileZilla: the most widely used free program, available for Windows and macOS.&lt;/li&gt;
&lt;li&gt;WinSCP: a free program developed for Windows.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;advantages-and-disadvantages-of-ftp&#34;&gt;Advantages and Disadvantages of FTP&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Advantages
&lt;ul&gt;
&lt;li&gt;Multiple files can be transferred at the same time.&lt;/li&gt;
&lt;li&gt;If the connection is lost, the transfer can be restarted.&lt;/li&gt;
&lt;li&gt;Transfer schedules can be reserved.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Disadvantages
&lt;ul&gt;
&lt;li&gt;It is vulnerable in terms of security.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;what-is-sftp&#34;&gt;What Is SFTP?&lt;/h3&gt;
&lt;p&gt;FTP was developed in the 1970s, before most of the cybersecurity measures we use today were developed. Because it was not designed as a security protocol, FTP transfers do not encrypt files. As a result, passwords, usernames, and other sensitive data can be read relatively easily through packet capture attacks on data packets.&lt;/p&gt;
&lt;p&gt;SFTP (SSH File Transfer Protocol) is a separate protocol that provides highly secure file transfer through a Secure Shell (SSH) data stream. Unlike FTP clients that use port 21, SFTP uses port 22. Because of FTP&amp;rsquo;s weak security, many people prefer SFTP, which provides security features by default and uses SSH connections.&lt;/p&gt;
&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://namu.wiki/w/FTP&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Namu Wiki: FTP&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ko.wikipedia.org/wiki/%ED%8C%8C%EC%9D%BC_%EC%A0%84%EC%86%A1_%ED%94%84%EB%A1%9C%ED%86%A0%EC%BD%9C&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Wikipedia: File Transfer Protocol&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://experience.dropbox.com/ko-kr/resources/what-is-ftp&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Dropbox: Meaning of FTP&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
      <category>FTP</category>
      
    </item>
    
    <item>
      <title>OSI 7 Layers</title>
      <link>https://www.devkuma.com/en/docs/osi7-layer/</link>
      <pubDate>Sun, 31 Dec 2017 02:30:37 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/osi7-layer/</guid>
      <description>
        
        
        &lt;h2 id=&#34;osi-reference-model-osi-7-layer&#34;&gt;OSI Reference Model (OSI 7 Layer)&lt;/h2&gt;
&lt;p&gt;One term that cannot be left out when discussing standardization in networking is &amp;ldquo;Open Systems Interconnection&amp;rdquo; (OSI). OSI is a network model established by the International Organization for Standardization (ISO) in 1977 as part of developing an architecture for communication between heterogeneous computer systems. It shows through what paths and methods data is transmitted and received. By understanding it, you can see how devices such as routers, bridges, switches, and network cards handle data. For people working in networking, OSI can be considered a kind of bible. OSI is called a collection of protocols because each layer that makes up the OSI model plays the role of a protocol. The OSI model consists of seven layers in total.&lt;/p&gt;
&lt;p&gt;The fourth layer, the transport layer, through the seventh layer, the application layer, are generally called the upper layers. They are more closely related to application software than to network equipment.&lt;/p&gt;
&lt;h3 id=&#34;physical-layer&#34;&gt;Physical Layer&lt;/h3&gt;
&lt;p&gt;Defines the physical connection between computers and networks from both mechanical aspects, such as cables and connectors, and electrical aspects, such as voltage and signal modulation.
Defines the network topology.
Defines the signaling methods used on network media.&lt;/p&gt;
&lt;h3 id=&#34;data-link-layer&#34;&gt;Data Link Layer&lt;/h3&gt;
&lt;p&gt;Defines the protocols that allow computers to exchange messages.&lt;/p&gt;
&lt;p&gt;Provides reliable information transmission between two devices through a physical connection.&lt;/p&gt;
&lt;h3 id=&#34;network-layer&#34;&gt;Network Layer&lt;/h3&gt;
&lt;p&gt;Defines the path through which packets are transmitted (routing).&lt;/p&gt;
&lt;p&gt;Controls the flow of packets sent to nodes on the network and defines how status messages are delivered to network nodes.&lt;/p&gt;
&lt;h3 id=&#34;transport-layer&#34;&gt;Transport Layer&lt;/h3&gt;
&lt;p&gt;Defines how to locate physical positions on the network, establish connections between nodes, authenticate them, and arrange packets.&lt;/p&gt;
&lt;p&gt;It is responsible for collecting packets in the proper order, checking for errors, and sending packets to the session layer.&lt;/p&gt;
&lt;h3 id=&#34;session-layer&#34;&gt;Session Layer&lt;/h3&gt;
&lt;p&gt;Provides a conceptual interface to the transport layer for applications.&lt;/p&gt;
&lt;p&gt;Allows devices to be identified by name instead of by network address.&lt;/p&gt;
&lt;p&gt;Maintains sessions, or connections, between two nodes on the network.&lt;/p&gt;
&lt;h3 id=&#34;presentation-layer&#34;&gt;Presentation Layer&lt;/h3&gt;
&lt;p&gt;Defines how applications enter the network and how data is translated into the form in which it is transmitted and consumed on the network.&lt;/p&gt;
&lt;p&gt;If compression and encryption are used, they are also handled by the presentation layer.&lt;/p&gt;
&lt;h3 id=&#34;application-layer&#34;&gt;Application Layer&lt;/h3&gt;
&lt;p&gt;The interface used by network-enabled applications to access the network.&lt;/p&gt;
&lt;p&gt;Defines network applications.&lt;/p&gt;
&lt;p&gt;This is the layer where email and network utilities exist.&lt;/p&gt;
&lt;p&gt;It controls application access to the network and notifies applications when network errors occur.&lt;/p&gt;
&lt;h3 id=&#34;reasons-for-developing-layered-protocols&#34;&gt;Reasons for Developing Layered Protocols&lt;/h3&gt;
&lt;p&gt;Layered protocols were developed to separate complex networks by role area so they can be understood logically and more easily. They also provide standardized interfaces between network functions, ensure symmetry among functions performed at each node in the network, and clarify the language used when network designers, administrators, vendors, and users discuss network functions.&lt;/p&gt;
&lt;h2 id=&#34;osi-7-layers&#34;&gt;OSI 7 Layers&lt;/h2&gt;
&lt;h3 id=&#34;application-layer-top-layer&#34;&gt;Application Layer (Top Layer)&lt;/h3&gt;
&lt;p&gt;This layer defines services that support users and application tasks. It manages FTP, databases, remote access (TELNET), email, and similar services.&lt;/p&gt;
&lt;h3 id=&#34;presentation-layer-1&#34;&gt;Presentation Layer&lt;/h3&gt;
&lt;p&gt;This layer formats data sent from the application layer above it into basic codes such as ASCII or EBCDIC.&lt;/p&gt;
&lt;h3 id=&#34;session-layer-1&#34;&gt;Session Layer&lt;/h3&gt;
&lt;p&gt;This layer manages LAN users when they connect to a server, including connection setup, maintenance, and termination.&lt;/p&gt;
&lt;h3 id=&#34;transport-layer-1&#34;&gt;Transport Layer&lt;/h3&gt;
&lt;p&gt;This layer is related to protocols such as TCP and SPX, and is associated with data transmission, error recovery, flow control, and network addressing.&lt;/p&gt;
&lt;h3 id=&#34;network-layer-1&#34;&gt;Network Layer&lt;/h3&gt;
&lt;p&gt;This layer contains the conditions needed to assign destination addresses to data and determine transmission paths. It is the area where various transport protocols such as IP and IPX operate. It manages system connection devices and packets.&lt;/p&gt;
&lt;h3 id=&#34;data-link-layer-1&#34;&gt;Data Link Layer&lt;/h3&gt;
&lt;p&gt;This layer defines how data packets are formed and transmitted. For example, it plays the role of loading letters onto delivery trucks, sending each truck onto the highway, and ensuring that they arrive safely.&lt;/p&gt;
&lt;h3 id=&#34;physical-layer-1&#34;&gt;Physical Layer&lt;/h3&gt;
&lt;p&gt;This layer converts data packets formed by the upper data link layer into electrical or optical signals and transmits and receives them. It can be compared to the trucks and highways needed to deliver letters to different locations.&lt;/p&gt;

      </description>
      
      <category>OSI</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>VPN (Virtual Private Network)</title>
      <link>https://www.devkuma.com/en/docs/vpn/</link>
      <pubDate>Mon, 11 Jul 2022 09:48:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/vpn/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-a-vpn-virtual-private-network&#34;&gt;What Is a VPN (Virtual Private Network)?&lt;/h2&gt;
&lt;p&gt;A VPN (Virtual Private Network) is a technology that extends a virtual private network so that private networks, which cannot be accessed by third parties, can communicate securely with one another.&lt;/p&gt;
&lt;p&gt;As in the following examples, VPNs are used to communicate securely between geographically remote networks.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securely access a company&amp;rsquo;s private network from a home private network&lt;/li&gt;
&lt;li&gt;Securely access the private network of a Busan branch office from the private network of a Seoul branch office&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;VPNs are used for the following reasons.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The common way to communicate between geographically separated networks is the internet&lt;/li&gt;
&lt;li&gt;However, the internet, which anyone can access, is insecure from a security perspective&lt;/li&gt;
&lt;li&gt;Therefore, using a VPN, which extends a virtual private network over the internet, increases communication security&lt;/li&gt;
&lt;li&gt;Although the above says that the common way to communicate between geographically separated networks is the internet, there are also several other methods&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;communication-methods-between-private-networks&#34;&gt;Communication Methods Between Private Networks&lt;/h2&gt;
&lt;p&gt;There are three typical methods for communication between private networks.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provider dedicated line (a dedicated optical cable, exclusively used by the subscriber)&lt;/li&gt;
&lt;li&gt;Provider closed network + VPN (a closed network owned by a single provider)&lt;/li&gt;
&lt;li&gt;Internet + VPN (a collection of routers from multiple providers, accessible by anyone)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;provider-dedicated-line&#34;&gt;Provider Dedicated Line&lt;/h3&gt;
&lt;p&gt;A provider dedicated line is a line used exclusively by the subscriber, allowing secure communication between private networks. However, the circuit cost is high.&lt;/p&gt;
&lt;h3 id=&#34;provider-closed-network--vpn&#34;&gt;Provider Closed Network + VPN&lt;/h3&gt;
&lt;p&gt;A &amp;ldquo;provider closed network&amp;rdquo; shares the line among multiple subscribers, so public IP addresses are required to distinguish subscribers, and private networks cannot communicate with one another as they are.&lt;/p&gt;
&lt;h3 id=&#34;internet--vpn&#34;&gt;Internet + VPN&lt;/h3&gt;
&lt;p&gt;Because anyone can use the &amp;ldquo;internet&amp;rdquo; line, it has the following two issues.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Public IP addresses are required to distinguish users, and private networks cannot communicate with one another as they are.&lt;/li&gt;
&lt;li&gt;Because anyone can use the line, there is a possibility of attack by malicious third parties.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;VPN extends private networks over a provider closed network or the internet to provide the functionality of a provider dedicated line while reducing costs.&lt;/p&gt;

      </description>
      
      <category>VPN</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>TCP/UDP (Socket Communication)</title>
      <link>https://www.devkuma.com/en/docs/tcp-udp/</link>
      <pubDate>Fri, 08 Jul 2022 18:59:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/tcp-udp/</guid>
      <description>
        
        
        &lt;h2 id=&#34;tcp-transmission-control-protocol&#34;&gt;TCP (Transmission Control Protocol)&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Provides a connection-oriented service.&lt;/li&gt;
&lt;li&gt;Guarantees high reliability.&lt;/li&gt;
&lt;li&gt;Establishes connections with 3-way handshaking.&lt;/li&gt;
&lt;li&gt;Terminates connections with 4-way handshaking.&lt;/li&gt;
&lt;li&gt;Provides data flow control and congestion control.
&lt;ul&gt;
&lt;li&gt;Flow control: prevents receiver buffer overflow.&lt;/li&gt;
&lt;li&gt;Congestion control: prevents an excessive increase in the number of packets in the network.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Provides full-duplex, point-to-point service (bidirectional transmission and reception).&lt;/li&gt;
&lt;li&gt;Used for cases where reliability is important, such as file exchange.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;udp-user-datagram-protocol&#34;&gt;UDP (User Datagram Protocol)&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Provides a connectionless service.&lt;/li&gt;
&lt;li&gt;Has low reliability.&lt;/li&gt;
&lt;li&gt;The order of data transmission can change.&lt;/li&gt;
&lt;li&gt;Does not confirm whether data was received; there is no process like 3-way handshaking.&lt;/li&gt;
&lt;li&gt;Has a faster transmission speed than TCP.&lt;/li&gt;
&lt;li&gt;Mainly used for streaming, where real-time delivery is important.&lt;/li&gt;
&lt;li&gt;Supports 1:1, 1:N, and N:M communication.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>TCP</category>
      
      <category>UDP</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>E-Mail</title>
      <link>https://www.devkuma.com/en/docs/e-mail/</link>
      <pubDate>Sun, 03 Apr 2022 18:02:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/e-mail/</guid>
      <description>
        
        
        &lt;h2 id=&#34;e-mail&#34;&gt;E-Mail&lt;/h2&gt;
&lt;p&gt;E-mail is a service that lets users send and receive letters using the Internet. It can be divided into web-based e-mail and e-mail that uses POP3.&lt;/p&gt;
&lt;h2 id=&#34;web-based-e-mail&#34;&gt;Web-Based E-Mail&lt;/h2&gt;
&lt;p&gt;Web-based e-mail includes services such as Gmail and Naver. With this type of mail, users can access the corresponding site on the Internet without a separate program, then manage and receive mail there.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advantage: Because no separate program is used, it can be used easily when several people share one computer or in places where installing a separate program is difficult.&lt;/li&gt;
&lt;li&gt;Disadvantage: Users must use the interface provided by the company and must access that website.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;pop3&#34;&gt;POP3&lt;/h2&gt;
&lt;p&gt;With a POP3 server, users can send and receive mail using a POP3-supported e-mail client such as Outlook Express.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Advantage: Because it simply delivers letters, any program that supports POP3 can be used, so users can choose a program that is convenient for them.&lt;/li&gt;
&lt;li&gt;Disadvantage: A program must be installed to check e-mail contents.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
      <category>E-Mail</category>
      
    </item>
    
    <item>
      <title>What Is Network TCP/IP?</title>
      <link>https://www.devkuma.com/en/docs/tcp-ip/</link>
      <pubDate>Tue, 10 Jan 2023 11:21:21 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/tcp-ip/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-tcpip&#34;&gt;What Is TCP/IP?&lt;/h2&gt;
&lt;p&gt;TCP/IP is a combination of TCP (Transmission Control Protocol) and IP (Internet Protocol), and it can be considered one of the most important technical elements for supporting computer networks.&lt;/p&gt;
&lt;p&gt;In general, &amp;ldquo;TCP/IP&amp;rdquo; is used as a collective term for the communication technologies that operate computer networks and the internet. It includes not only TCP and IP, but also various protocols such as ICMP, TCP, and HTTP. In any case, you can think of it as the set of protocols needed to send something over a network.&lt;/p&gt;
&lt;h3 id=&#34;what-is-a-protocol&#34;&gt;What Is a Protocol?&lt;/h3&gt;
&lt;p&gt;Here, a protocol means a &amp;ldquo;communication rule.&amp;rdquo; Data is transmitted together with various elements.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/network-protocol.png&#34; alt=&#34;Protocol&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Data A: the data that starts first&lt;/li&gt;
&lt;li&gt;Data B: the next data&lt;/li&gt;
&lt;li&gt;Data C: the data after that&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If the order in which data is sent is not determined in this way, it becomes impossible to know what was actually sent.&lt;/p&gt;
&lt;p&gt;For example, if you know that data such as &amp;ldquo;recipient,&amp;rdquo; &amp;ldquo;where it came from (your own address),&amp;rdquo; and &amp;ldquo;data contents&amp;rdquo; is sent in order, the receiving side can also identify the data by recognizing it as &amp;ldquo;recipient,&amp;rdquo; &amp;ldquo;where it came from (your own address),&amp;rdquo; and &amp;ldquo;data contents.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;That is why protocols are essential.&lt;/p&gt;
&lt;p&gt;In short, you can think of TCP/IP as the communication rules for a network.&lt;/p&gt;
&lt;h2 id=&#34;through-what-interaction-is-data-transmitted&#34;&gt;Through What Interaction Is Data Transmitted?&lt;/h2&gt;
&lt;p&gt;For example, suppose you are viewing a site on the internet. A request like the following is sent through the network.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The browser creates a request message.&lt;/li&gt;
&lt;li&gt;The operating system&amp;rsquo;s TCP/IP processing software passes the data to a place called the transport layer.&lt;/li&gt;
&lt;li&gt;The TCP protocol in the transport layer attaches a TCP header, meaning that this kind of data is added to the beginning of the data.&lt;/li&gt;
&lt;li&gt;Next, the data is sent to a place called the network layer, where an IP header, containing data such as the destination, is attached.&lt;/li&gt;
&lt;li&gt;Then header information such as a MAC header is added on top of that, and the data is sent from the LAN adapter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This is difficult. It may be a little hard to understand, but you can think of it as sending data after attaching various pieces of information to the beginning of the data as needed.&lt;/p&gt;

      </description>
      
      <category>TCP</category>
      
      <category>IP</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>IP (Internet Protocol)</title>
      <link>https://www.devkuma.com/en/docs/ip/</link>
      <pubDate>Fri, 08 Jul 2022 18:48:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/ip/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-ip&#34;&gt;What Is IP?&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Internet Protocol&lt;/li&gt;
&lt;li&gt;A protocol for delivering data on the Internet.&lt;/li&gt;
&lt;li&gt;It is a protocol that delivers packets through the Internet network.&lt;/li&gt;
&lt;li&gt;It has the characteristics of being connectionless and unreliable.
&lt;ul&gt;
&lt;li&gt;Connectionless means it does not predetermine the path for sending packets.&lt;/li&gt;
&lt;li&gt;Unreliable means it does not guarantee complete packet delivery.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;difference-between-public-ip-and-private-ip&#34;&gt;Difference Between Public IP and Private IP&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Public IP
&lt;ul&gt;
&lt;li&gt;A globally unique IP address provided by an ISP (Internet service provider).&lt;/li&gt;
&lt;li&gt;Because it is exposed externally, it can be accessed by other devices connected to the Internet.&lt;/li&gt;
&lt;li&gt;Therefore, security settings such as a firewall must be configured.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Private IP
&lt;ul&gt;
&lt;li&gt;An IP address used inside a specific network.&lt;/li&gt;
&lt;li&gt;Because the shortage of IPv4 addresses makes it impossible for every network to use public IP addresses, it is a virtual address assigned through a router inside a network.&lt;/li&gt;
&lt;li&gt;It cannot be accessed from outside without separate configuration.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>IP</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>IP Address</title>
      <link>https://www.devkuma.com/en/docs/ip-address/</link>
      <pubDate>Tue, 20 Dec 2022 11:41:27 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/ip-address/</guid>
      <description>
        
        
        &lt;h2 id=&#34;ip-address&#34;&gt;IP Address&lt;/h2&gt;
&lt;p&gt;An IP address is the address of a computer on the Internet. Every device connected to the Internet must be assigned an IP address.&lt;/p&gt;
&lt;h3 id=&#34;how-is-data-transmitted-on-the-internet&#34;&gt;How Is Data Transmitted on the Internet?&lt;/h3&gt;
&lt;p&gt;For example, when you &amp;ldquo;send mail,&amp;rdquo; &amp;ldquo;send a message through a messenger,&amp;rdquo; or &amp;ldquo;buy a product from an online store,&amp;rdquo; how is data sent and received?&lt;/p&gt;
&lt;p&gt;In fact, it is similar to sending a parcel.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-1.png&#34; alt=&#34;Parcel delivery&#34;&gt;&lt;/p&gt;
&lt;p&gt;For a parcel to arrive safely, information about the &amp;ldquo;sender address&amp;rdquo; and &amp;ldquo;recipient address&amp;rdquo; is required.&lt;/p&gt;
&lt;p&gt;Flow of parcel delivery:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;First, it is gathered at the office closest to the &amp;ldquo;sender address.&amp;rdquo; (In the figure above, the Seoul office)&lt;/li&gt;
&lt;li&gt;Next, the &amp;ldquo;recipient address&amp;rdquo; is checked, and the parcel is sent to the office closest to that address. (In the figure above, the Busan office)&lt;/li&gt;
&lt;li&gt;Finally, it arrives at the &amp;ldquo;recipient address&amp;rdquo; from the office.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Now let&amp;rsquo;s look at how data is sent and received on the Internet.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-2.png&#34; alt=&#34;How IP addresses work&#34;&gt;&lt;/p&gt;
&lt;p&gt;To deliver a parcel to another person, the &amp;ldquo;sender address&amp;rdquo; and the &amp;ldquo;destination address&amp;rdquo; were required.&lt;/p&gt;
&lt;p&gt;In a network, these addresses correspond to &amp;ldquo;IP addresses.&amp;rdquo; For a computer (network device) to connect to a network, it must be assigned a unique IP address that does not overlap with others.&lt;/p&gt;
&lt;p&gt;The flow of data transmission and reception by a computer (network device) is as follows.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;First, data is sent to a network device called a router near the &amp;ldquo;source IP address&amp;rdquo; (a role similar to a parcel office).&lt;/li&gt;
&lt;li&gt;Then the router checks the &amp;ldquo;destination IP address&amp;rdquo; and sends the data to a router near the &amp;ldquo;destination IP address.&amp;rdquo;&lt;/li&gt;
&lt;li&gt;Finally, the data is delivered from the router to the computer (network device) assigned the &amp;ldquo;source IP address.&amp;rdquo;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;In this way, the structure of data transmission and reception on the Internet is almost the same as parcel delivery. Work that people perform is automatically performed by using network devices (routers).&lt;/p&gt;
&lt;h2 id=&#34;how-ip-addresses-work&#34;&gt;How IP Addresses Work&lt;/h2&gt;
&lt;h3 id=&#34;who-manages-ip-addresses&#34;&gt;Who Manages IP Addresses?&lt;/h3&gt;
&lt;p&gt;An IP address is the address of a computer (network device) on the Internet. Therefore, IP addresses are assigned so that they do not overlap.&lt;/p&gt;
&lt;p&gt;The organization that manages &amp;ldquo;IP addresses,&amp;rdquo; which are indispensable for communication on the Internet, is a nonprofit corporation called ICANN (The Internet Corporation for Assigned Names and Numbers).&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-3.png&#34; alt=&#34;ICANN&#34;&gt;&lt;/p&gt;
&lt;p&gt;However, ICANN does not manage all information in the world directly. Under ICANN are RIRs (Regional Internet Registries) that manage resources by region such as North America, Asia, and Europe. Under them are NIRs (National Internet Registries) that manage resources by country, and finally LIRs (Local Internet Registries) such as Internet service providers (ISPs).&lt;/p&gt;
&lt;h2 id=&#34;difference-between-private-ip-addresses-and-public-ip-addresses&#34;&gt;Difference Between Private IP Addresses and Public IP Addresses&lt;/h2&gt;
&lt;p&gt;There are two types of IP addresses: &amp;ldquo;private IP addresses&amp;rdquo; and &amp;ldquo;public IP addresses.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;A public IP address is an IP address required to connect to the Internet, while a private IP address is used only inside an organization&amp;rsquo;s network (private network), such as a home or company.&lt;/p&gt;
&lt;h3 id=&#34;private-ip-address&#34;&gt;Private IP Address&lt;/h3&gt;
&lt;p&gt;A private IP address is an IP address used in an organization&amp;rsquo;s network (private network), such as a home or company. Addresses are assigned so they do not overlap within the organization.&lt;/p&gt;
&lt;p&gt;The following is an example of private IP addresses.&lt;br&gt;
&lt;img src=&#34;https://www.devkuma.com/docs/network/private-ip-address-1.png&#34; alt=&#34;Private IP address&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the figure above, the left side is the &amp;ldquo;private network,&amp;rdquo; the right side is the &amp;ldquo;Internet,&amp;rdquo; and there is a broadband router between the &amp;ldquo;private network&amp;rdquo; and the &amp;ldquo;Internet.&amp;rdquo; This is a common configuration when using an Internet service provider (ISP).&lt;/p&gt;
&lt;p&gt;Computers in the private network are assigned private IP addresses.&lt;/p&gt;
&lt;p&gt;Using private IP addresses, computers can communicate with other computers inside the private network.&lt;/p&gt;
&lt;p&gt;However, to communicate with computers outside the private network, a public IP address is required.&lt;/p&gt;
&lt;p&gt;Private IP addresses cannot communicate on the Internet.&lt;/p&gt;
&lt;h3 id=&#34;public-ip-address&#34;&gt;Public IP Address&lt;/h3&gt;
&lt;p&gt;A public IP address is an Internet address required for computers and communication devices to communicate over the Internet.&lt;/p&gt;
&lt;p&gt;Therefore, a router (broadband router) connects to the Internet by converting private IP addresses into public IP addresses. The method of converting between private IP addresses and public IP addresses is called NAT (Network Address Translation).&lt;/p&gt;
&lt;h3 id=&#34;why-are-private-ip-addresses-necessary&#34;&gt;Why Are Private IP Addresses Necessary?&lt;/h3&gt;
&lt;p&gt;Private IP addresses appeared because of the IPv4 &amp;ldquo;&lt;strong&gt;IP address exhaustion problem&lt;/strong&gt;.&amp;rdquo; IP address exhaustion is the problem of not having enough IP addresses.&lt;/p&gt;
&lt;p&gt;An IP address is an address for communicating on the Internet. Therefore, an IP address must be unique and must not overlap.&lt;/p&gt;
&lt;p&gt;Based on the idea that not every computer needs to access the Internet, a mechanism was created to assign a specific range of IP addresses inside an organization as private IP addresses.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/private-ip-address-2.png&#34; alt=&#34;Private IP address&#34;&gt;&lt;/p&gt;
&lt;p&gt;Unlike global IP addresses, which must be assigned so they do not overlap anywhere in the world, private IP addresses only need to be unique within an organization (private network).&lt;/p&gt;
&lt;p&gt;In the figure above, computers in &amp;ldquo;private network A&amp;rdquo; and &amp;ldquo;private network B&amp;rdquo; are assigned the same private IP address, but this is not a problem because the organizations (private networks) are different.&lt;/p&gt;
&lt;p&gt;Therefore, private IP addresses are a mechanism for conserving IP addresses.&lt;/p&gt;
&lt;p&gt;Private IP addresses also have security advantages. To communicate on the Internet, traffic must pass through a router (broadband router, default gateway). Because this router has security functions, security can be strengthened through the router.&lt;/p&gt;
&lt;h2 id=&#34;ip-address-definition&#34;&gt;IP Address Definition&lt;/h2&gt;
&lt;h3 id=&#34;classful-method&#34;&gt;Classful Method&lt;/h3&gt;
&lt;p&gt;An IP address consists of two parts: a &lt;strong&gt;network part&lt;/strong&gt; and a &lt;strong&gt;host part&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The network part indicates which network it belongs to, and the host part is the address assigned to a host in that network.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-4-1.png&#34; alt=&#34;Network and host parts of an IP address&#34;&gt;&lt;/p&gt;
&lt;p&gt;Traditional IP addresses used the &amp;ldquo;classful method,&amp;rdquo; so the network part and host part were fixed.&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Class&lt;/th&gt;
          &lt;th style=&#34;text-align: right&#34;&gt;Address range&lt;/th&gt;
          &lt;th style=&#34;text-align: right&#34;&gt;Network part range&lt;/th&gt;
          &lt;th style=&#34;text-align: right&#34;&gt;Host part range&lt;/th&gt;
          &lt;th style=&#34;text-align: right&#34;&gt;Number of assignable hosts&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Class A&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;0.0.0.0 ~ 127.255.255.255&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;First 8 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;24 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;16,777,214&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Class B&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;128.0.0.0 ~ 191.255.255.255&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;First 16 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;16 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;65,534&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Class C&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;192.0.0.0 ~ 223.255.255.255&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;First 24 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;8 bits&lt;/td&gt;
          &lt;td style=&#34;text-align: right&#34;&gt;254&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Because of this structure, for example, if a company that needs 100 IP addresses uses &amp;ldquo;Class C,&amp;rdquo; Class C provides 254 assignable hosts, so 154 IP addresses are wasted after excluding the required 100 addresses (254 - 100 = 154).&lt;/p&gt;
&lt;p&gt;This led to the &amp;ldquo;classless method.&amp;rdquo; In the classless method, a subnet mask is used to make it possible to freely change the boundary between the &amp;ldquo;network part&amp;rdquo; and the &amp;ldquo;host part.&amp;rdquo;&lt;/p&gt;
&lt;h3 id=&#34;classless-method&#34;&gt;Classless Method&lt;/h3&gt;
&lt;p&gt;The classless method is a method that uses a subnet mask to make it possible to freely change the boundary between the &amp;ldquo;network part&amp;rdquo; and the &amp;ldquo;host part.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-4-2.png&#34; alt=&#34;Subnet mask&#34;&gt;&lt;/p&gt;
&lt;p&gt;A subnet mask is written in decimal as &amp;ldquo;255.255.255.0,&amp;rdquo; as in the example above, and in binary as &amp;ldquo;1&amp;rdquo; and &amp;ldquo;0.&amp;rdquo;&lt;br&gt;
The parts of the subnet mask that are &amp;ldquo;1&amp;rdquo; are the &amp;ldquo;network part,&amp;rdquo; and the parts that are &amp;ldquo;0&amp;rdquo; are the host part.&lt;/p&gt;
&lt;p&gt;For example, suppose a company that needs 100 IP addresses is assigned the Class C network &amp;ldquo;192.168.1.0,&amp;rdquo; as before. (The subnet mask is 255.255.255.0.)&lt;br&gt;
In this case, 254 IP addresses can be used by computers (192.168.1.1 ~ 192.168.1.254).&lt;br&gt;
As a result, 154 IP addresses are wasted (254 - 100 = 154).&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-4-3.png&#34; alt=&#34;Subnet mask&#34;&gt;&lt;/p&gt;
&lt;p&gt;Now move the boundary between the &amp;ldquo;network part&amp;rdquo; and the &amp;ldquo;host part&amp;rdquo; one position to the right.&lt;/p&gt;
&lt;p&gt;Then the subnet mask changes from &amp;ldquo;255.255.255.0&amp;rdquo; to &amp;ldquo;255.255.255.128.&amp;rdquo; In this case, 126 IP addresses can be used by computers (192.168.1.1 ~ 192.168.1.126).&lt;br&gt;
As a result, only 26 IP addresses are wasted (126 - 100 = 26). If you consider them spare addresses, this is not really waste.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/ip-address-4-4.png&#34; alt=&#34;Moving the subnet mask position&#34;&gt;&lt;/p&gt;
&lt;p&gt;In this way, the &amp;ldquo;classless method&amp;rdquo; uses a subnet mask to freely change the boundary between the &amp;ldquo;network part&amp;rdquo; and the &amp;ldquo;host part&amp;rdquo; and adjust the number of IP addresses assigned to hosts.&lt;/p&gt;
&lt;h2 id=&#34;difference-between-ipv4-and-ipv6&#34;&gt;Difference Between IPv4 and IPv6&lt;/h2&gt;
&lt;p&gt;The major versions of IP addresses are IPv4 and IPv6. IPv6 appeared because IPv4, the major IP address version, has an &amp;ldquo;IP address exhaustion problem.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;IPv4 provides about 2 to the 32nd power usable IP addresses (about 4.3 billion = 4.3 x 10^9), while IPv6 provides about 2 to the 128th power usable IP addresses (about 340 undecillion = 3.4 x 10^38).&lt;/p&gt;
&lt;p&gt;IPv6 addresses are expressed in 128 bits, separated by colons (:) every 16 bits, and written in hexadecimal.&lt;/p&gt;
&lt;p&gt;An example IPv6 notation is as follows.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-text&#34; data-lang=&#34;text&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;201a:30b8:cd01:0132:2f8a:1f30:1c02:10aa
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;how-to-check-an-ip-address&#34;&gt;How to Check an IP Address&lt;/h2&gt;
&lt;h3 id=&#34;checking-an-ip-address-on-windows&#34;&gt;Checking an IP Address on Windows&lt;/h3&gt;
&lt;p&gt;To check your IP address on Windows, start Command Prompt and use the &lt;code&gt;ipconfig&lt;/code&gt; command.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-cmd&#34; data-lang=&#34;cmd&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;C&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;:&lt;/span&gt;&lt;span style=&#34;color:#f57900&#34;&gt;\&lt;/span&gt;&lt;span style=&#34;color:#8f5902;font-style:italic&#34;&gt;&amp;gt;ipconfig&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Windows IP Configuration
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Ethernet adapter vEthernet (Default Switch):
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Connection-specific DNS Suffix  . :
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Link-local IPv6 Address . . . . . : fe80::1a8:2f:14f:e65b&lt;span style=&#34;color:#000&#34;&gt;%4&lt;/span&gt;2
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   IPv4 Address. . . . . . . . . . . : 172.25.32.1
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Subnet Mask . . . . . . . . . . . : 255.255.240.0
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Default Gateway . . . . . . . . . :
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Wireless LAN adapter Local Area Connection* 9:
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Media State . . . . . . . . . . . : Media disconnected
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Connection-specific DNS Suffix  . :
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Wireless LAN adapter Local Area Connection* 10:
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Media State . . . . . . . . . . . : Media disconnected
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Connection-specific DNS Suffix  . :
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Wireless LAN adapter Wi-Fi:
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Connection-specific DNS Suffix  . :
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Link-local IPv6 Address . . . . . : fe80::6107:be9e:21cc:5dd8&lt;span style=&#34;color:#000&#34;&gt;%1&lt;/span&gt;4
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   IPv4 Address. . . . . . . . . . . : 192.168.0.11 ----------&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;&amp;gt;&lt;/span&gt; &lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;192.168.0.11&amp;#34;&lt;/span&gt; is the IP address.
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Subnet Mask . . . . . . . . . . . : 255.255.255.0
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Default Gateway . . . . . . . . . : 192.168.0.1
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Ethernet adapter Bluetooth Network Connection:
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Media State . . . . . . . . . . . : Media disconnected
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   Connection-specific DNS Suffix  . :
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When connecting to the Internet through a broadband router or similar device, most IP addresses displayed by the &lt;code&gt;ipconfig&lt;/code&gt; command are &amp;ldquo;private IP addresses.&amp;rdquo;&lt;br&gt;
If you are not using a broadband router or similar device, a &amp;ldquo;public IP address&amp;rdquo; is displayed.&lt;/p&gt;
&lt;h3 id=&#34;checking-an-ip-address-on-macos&#34;&gt;Checking an IP Address on macOS&lt;/h3&gt;
&lt;p&gt;On macOS, you can check it with the terminal command &lt;code&gt;ifconfig | grep inet&lt;/code&gt;.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-zsh&#34; data-lang=&#34;zsh&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;% ifconfig &lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;|&lt;/span&gt; grep inet
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet 127.0.0.1 netmask 0xff000000
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 ::1 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;128&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::1%lo0 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x1
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::a08e:1eff:fe6e:5cd7%anpi1 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x4
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::a08e:1eff:fe6e:5cd9%anpi3 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x5
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::a08e:1eff:fe6e:5cd8%anpi2 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x6
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::a08e:1eff:fe6e:5cd6%anpi0 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x7
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::bc76:eff:fe35:99b8%ap1 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x10
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet 192.168.0.3 netmask 0xffffff00 broadcast 192.168.0.255 ----------&amp;gt; &lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;192.168.0.3&amp;#34;&lt;/span&gt; is the IP address.
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::c4a:ec1f:c825:f3ff%en1 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; secured scopeid 0x11
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::349c:a6ff:fe51:afdd%awdl0 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x14
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::349c:a6ff:fe51:afdd%llw0 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x15
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::9e50:c1a4:1b3c:b91%utun0 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x16
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::1d5b:41a9:12e2:c38e%utun1 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x17
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;	inet6 fe80::ce81:b1c:bd2c:69e%utun2 prefixlen &lt;span style=&#34;color:#0000cf;font-weight:bold&#34;&gt;64&lt;/span&gt; scopeid 0x18
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;
      </description>
      
      <category>Network</category>
      
      <category>IP</category>
      
    </item>
    
    <item>
      <title>What Is a Network Port?</title>
      <link>https://www.devkuma.com/en/docs/port/</link>
      <pubDate>Tue, 10 Jan 2023 11:40:06 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/port/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-a-port&#34;&gt;What Is a Port?&lt;/h2&gt;
&lt;h3 id=&#34;a-port-is-a-harbor&#34;&gt;A Port Is a Harbor&lt;/h3&gt;
&lt;p&gt;A port originally means a harbor. A harbor is the space ships need to enter a town, so it acts as the entrance between the sea and the town.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/port.jpg&#34; alt=&#34;Port&#34;&gt;&lt;/p&gt;
&lt;p&gt;Ports used in IT are similar. At a harbor, it is decided where each item of cargo will be unloaded. Numbering those places makes the process clearer.
In the same way, if the entire Internet is the sea and a computer is a town, the place where data arriving from the Internet is unloaded is defined.
Data for viewing web pages goes to one harbor number, mail goes to another harbor number, and so on.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/linkeddata.jpg&#34; alt=&#34;Network&#34;&gt;&lt;/p&gt;
&lt;p&gt;This corresponds to a &amp;ldquo;port.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;When communication is actually performed with TCP or UDP, communication is not handled per computer, but per &amp;ldquo;program,&amp;rdquo; that is, per process or thread. Therefore, data must be delivered correctly between processes.
At this time, a &amp;ldquo;port number&amp;rdquo; is assigned to the communicating process. Processes and threads use this port number to determine which application should communicate with which application.&lt;/p&gt;
&lt;h3 id=&#34;building-analogy&#34;&gt;Building Analogy&lt;/h3&gt;
&lt;p&gt;Ports are easier to understand if you compare them to a building.&lt;/p&gt;
&lt;p&gt;Network communication requires a protocol, an IP address, and a port number.&lt;/p&gt;
&lt;p&gt;If an IP address is like the address of a building, a port number is like a &amp;ldquo;room number.&amp;rdquo;
In a computer network, protocol, IP address, and port number can be rephrased as: &amp;ldquo;By what method (protocol), to which building (computer, IP), and to which room (port number) should communication be sent?&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Because port numbers are important for communication, opening a port is like opening the door to a specific room. Unless the machine is a server providing a service, unnecessary ports should generally be configured so they remain closed.&lt;/p&gt;
&lt;h2 id=&#34;more-precisely-a-port-is-a-service-window&#34;&gt;More Precisely, a Port Is a Service Window&lt;/h2&gt;
&lt;p&gt;A port is &amp;ldquo;a number used to identify a server application&amp;rdquo; and &amp;ldquo;a service window provided by a server.&amp;rdquo;
For example, the HTTP protocol commonly uses port 80.&lt;/p&gt;
&lt;p&gt;When a port is open, the service window is available. From the server&amp;rsquo;s point of view, it must keep the window open to provide a service to others.
For example, to provide a typical web service over HTTP, port 80 must be opened. This is the work of opening the window required for HTTP communication.&lt;/p&gt;
&lt;p&gt;Then what happens if the port remains closed? The server&amp;rsquo;s window is abandoned. In other words, the service is closed for business and cannot be provided. Therefore, port opening means &amp;ldquo;opening the window required for each service.&amp;rdquo;&lt;/p&gt;
&lt;h2 id=&#34;common-port-numbers-and-protocols&#34;&gt;Common Port Numbers and Protocols&lt;/h2&gt;
&lt;p&gt;Representative examples of &amp;ldquo;which protocol operates on which port number&amp;rdquo; are as follows.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;TCP 20: FTP (data)&lt;/li&gt;
&lt;li&gt;TCP 21: FTP (control)&lt;/li&gt;
&lt;li&gt;TCP 22: SSH&lt;/li&gt;
&lt;li&gt;TCP 23: Telnet&lt;/li&gt;
&lt;li&gt;TCP 25: SMTP&lt;/li&gt;
&lt;li&gt;UDP 53: DNS&lt;/li&gt;
&lt;li&gt;UDP 67: DHCP (server)&lt;/li&gt;
&lt;li&gt;UDP 68: DHCP (client)&lt;/li&gt;
&lt;li&gt;TCP 80: HTTP&lt;/li&gt;
&lt;li&gt;TCP 110: POP3&lt;/li&gt;
&lt;li&gt;UDP 123: NTP&lt;/li&gt;
&lt;li&gt;TCP 443: HTTPS&lt;/li&gt;
&lt;li&gt;Well-known port numbers: 0-1023&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An example involving ports, IP addresses, and protocols is a web server.&lt;/p&gt;
&lt;p&gt;On a server published at a specific IP address, an application that follows the HTTP protocol, such as Apache, waits for communication from clients on port 80 and sends web page information in response to requests.&lt;/p&gt;
&lt;p&gt;Other services similarly provide services by opening an arbitrary port or a well-known port for an application that implements a protocol on a specific server.&lt;/p&gt;
&lt;h3 id=&#34;well-known-port-numbers&#34;&gt;Well-Known Port Numbers&lt;/h3&gt;
&lt;p&gt;Port numbers actually range from 0 to 65535, but 0 to 1023 are called &amp;ldquo;well-known port numbers.&amp;rdquo; As the name suggests, they are well-known port numbers.
These numbers are managed by an organization called IANA.&lt;/p&gt;
&lt;p&gt;They are reserved port numbers used by major services and protocols in TCP/IP and UDP communication.&lt;/p&gt;
&lt;p&gt;Just as 80 is HTTP and 22 is SSH, major services generally have standard port numbers.&lt;/p&gt;
&lt;p&gt;It is possible to edit the configuration file for each service and change the listening port number. In some cases, the port number is intentionally changed for security reasons, but in general, use the well-known port numbers.&lt;/p&gt;
&lt;h3 id=&#34;registered-port-numbers&#34;&gt;Registered Port Numbers&lt;/h3&gt;
&lt;p&gt;Port numbers 1024 to 49151 are also managed by IANA.&lt;/p&gt;
&lt;p&gt;They are a group of ports intended for use by specific applications and similar software. IANA accepts registrations and publishes them.&lt;/p&gt;
&lt;h3 id=&#34;other-port-numbers&#34;&gt;Other Port Numbers&lt;/h3&gt;
&lt;p&gt;Port numbers 49152 to 65535 can be used freely by users. They do not need to be registered with IANA.&lt;/p&gt;
&lt;p&gt;For port numbers, there is no absolute rule for &amp;ldquo;which service should run on which port,&amp;rdquo; so they can also be managed, compared, and used arbitrarily.&lt;/p&gt;
&lt;h2 id=&#34;port-opening-and-security&#34;&gt;Port Opening and Security&lt;/h2&gt;
&lt;p&gt;Leaving a service window open is like leaving a window unlocked.
Naturally, this makes the system more likely to be targeted by thieves trying to steal information, that is, crackers.&lt;/p&gt;
&lt;p&gt;Because this state is very undesirable, ports must not be opened carelessly. Security measures should be established properly, and only the minimum necessary ports should be opened.&lt;/p&gt;
&lt;p&gt;Modern computers have very high processing power, and more applications can remain resident as servers even on personal machines.
Applications that function as servers often respond not only to local information but also to information from outside. These server applications inevitably open ports in order to provide services.&lt;/p&gt;
&lt;p&gt;However, if a server application has a security vulnerability, in the worst case the server may be taken over or become unable to provide services. Applications that function as servers must be reviewed carefully.
In addition, for computers operating as servers, it is necessary to check &amp;ldquo;which ports are open&amp;rdquo; and &amp;ldquo;whether any unintended ports are open.&amp;rdquo; Before actual operation, it is important to perform a penetration test, actually run a port scan, and understand the current state.&lt;/p&gt;

      </description>
      
      <category>Port</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>DNS Server</title>
      <link>https://www.devkuma.com/en/docs/dns/</link>
      <pubDate>Fri, 30 Dec 2022 20:21:01 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/dns/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-dns-domain-name-system&#34;&gt;What Is DNS (Domain Name System)?&lt;/h2&gt;
&lt;p&gt;DNS stands for Domain Name System. It is a system that manages a mapping table between &amp;ldquo;IP addresses,&amp;rdquo; which are Internet addresses that computers can easily understand, and &amp;ldquo;domains,&amp;rdquo; which are Internet addresses that people can easily understand.&lt;br&gt;
For example, DNS converts a human-readable domain name such as &lt;a href=&#34;https://www.devkuma.com&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;www.devkuma.com&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt; into a computer-readable IP address such as 185.199.109.153.&lt;/p&gt;
&lt;h2 id=&#34;dns-server&#34;&gt;DNS Server&lt;/h2&gt;
&lt;p&gt;A DNS server is a server that implements name resolution. Domain name resolution is a system that manages and converts the mapping table between &amp;ldquo;IP addresses&amp;rdquo; and &amp;ldquo;domains,&amp;rdquo; which are addresses on the Internet.&lt;/p&gt;
&lt;p&gt;A computer that provides a service or function is called a &amp;ldquo;server,&amp;rdquo; and a computer that uses that service or function is called a &amp;ldquo;client.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/dns-1.png&#34; alt=&#34;What is a DNS server?&#34;&gt;&lt;/p&gt;
&lt;p&gt;A DNS server is a server that implements the function of converting a &amp;ldquo;domain&amp;rdquo; into an &amp;ldquo;IP address&amp;rdquo; or an &amp;ldquo;IP address&amp;rdquo; into a &amp;ldquo;domain&amp;rdquo; (name resolution).&lt;/p&gt;
&lt;h2 id=&#34;why-is-a-dns-server-necessary&#34;&gt;Why Is a DNS Server Necessary?&lt;/h2&gt;
&lt;p&gt;To communicate on the Internet, an Internet address called an &amp;ldquo;IP address&amp;rdquo; is required.&lt;/p&gt;
&lt;p&gt;Therefore, when browsing a website or sending email, something easy for people to understand, called a &amp;ldquo;domain,&amp;rdquo; must be converted into an &amp;ldquo;IP address.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;For example, the URL of this site is &amp;ldquo;&lt;a href=&#34;https://devkuma.com&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://devkuma.com&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;.&amp;rdquo; The domain name is &amp;ldquo;devkuma.com.&amp;rdquo; To view this site, communication is performed by converting the domain &amp;ldquo;devkuma.com&amp;rdquo; into an &amp;ldquo;IP address.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/dns-2.png&#34; alt=&#34;DNS website browsing&#34;&gt;&lt;/p&gt;
&lt;p&gt;The same applies when you want to send mail to the destination mail address &amp;ldquo;&lt;a href=&#34;mailto:kimkc@devkuma.com&#34;&gt;kimkc@devkuma.com&lt;/a&gt;.&amp;rdquo; The part after &amp;ldquo;@&amp;rdquo; is the domain &amp;ldquo;devkuma.com,&amp;rdquo; and communication is performed by converting that domain into an &amp;ldquo;IP address.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;If the value is converted anyway, you might think that &amp;ldquo;domains&amp;rdquo; are unnecessary from the beginning. However, without domains, addresses would be written as below, making it difficult to understand what site they refer to.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-text&#34; data-lang=&#34;text&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://185.199.109.153.com
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://127.0.0.1.net
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;https://192.168.10.1.co.kr
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The purpose of DNS is to make addresses easier to read by representing them with characters instead of IP address numbers.&lt;/p&gt;
&lt;h2 id=&#34;how-dns-servers-work&#34;&gt;How DNS Servers Work&lt;/h2&gt;
&lt;p&gt;There are many kinds of DNS servers. The first server a user&amp;rsquo;s computer queries is a &amp;ldquo;DNS cache server.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;A &amp;ldquo;DNS cache server&amp;rdquo; stores query results for a certain period. If the same request arrives within that period, it responds by itself without newly requesting an external DNS server.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/network/dns-3.png&#34; alt=&#34;DNS server&#34;&gt;&lt;/p&gt;
&lt;p&gt;At the top of the hierarchical DNS servers (three layers in this example) is the &amp;ldquo;root server.&amp;rdquo; The &amp;ldquo;root server&amp;rdquo; manages the IP addresses of DNS servers for top-level domains such as &amp;ldquo;kr,&amp;rdquo; &amp;ldquo;com,&amp;rdquo; and &amp;ldquo;net.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Below the top-level domain DNS servers, it manages the IP addresses of DNS servers that manage domains such as &amp;ldquo;xx.com.&amp;rdquo; Finally, the flow is to obtain the IP address from the DNS server for &amp;ldquo;xx.com&amp;rdquo; that manages the IP address of &amp;ldquo;devkuma.com.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;In this way, DNS does not manage everything with a single server. Instead, it distributes management by arranging servers hierarchically and managing the mapping between &amp;ldquo;domain names&amp;rdquo; and &amp;ldquo;IP addresses.&amp;rdquo;&lt;/p&gt;
&lt;h2 id=&#34;domain-name-system-organizations&#34;&gt;Domain Name System Organizations&lt;/h2&gt;
&lt;p&gt;Domain names are usually written in the order &amp;ldquo;host.server domain (organization name).subdomain (organization type).top-level domain.&amp;rdquo; For example, the Blue House domain is &amp;ldquo;&lt;a href=&#34;https://www.president.go.kr&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;www.president.go.kr&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Top-level domains represent organizations or countries by abbreviation. In the case of the United States, the country name is often omitted and domains frequently end with one of the domains in the left side of the table below. For example, the White House domain name is &amp;ldquo;&lt;a href=&#34;https://www.whitehouse.gov&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;www.whitehouse.gov&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Types of Top-Level Domains&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Domain&lt;/th&gt;
          &lt;th&gt;Organization&lt;/th&gt;
          &lt;th&gt;Domain&lt;/th&gt;
          &lt;th&gt;Country&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;edu&lt;/td&gt;
          &lt;td&gt;Educational institution&lt;/td&gt;
          &lt;td&gt;kr&lt;/td&gt;
          &lt;td&gt;Korea, South&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;com&lt;/td&gt;
          &lt;td&gt;Company/business&lt;/td&gt;
          &lt;td&gt;jp&lt;/td&gt;
          &lt;td&gt;Japan&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gov&lt;/td&gt;
          &lt;td&gt;Government agency&lt;/td&gt;
          &lt;td&gt;cn&lt;/td&gt;
          &lt;td&gt;China&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;int&lt;/td&gt;
          &lt;td&gt;International organization&lt;/td&gt;
          &lt;td&gt;ca&lt;/td&gt;
          &lt;td&gt;Canada&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;org&lt;/td&gt;
          &lt;td&gt;Nonprofit public organization&lt;/td&gt;
          &lt;td&gt;de&lt;/td&gt;
          &lt;td&gt;Germany&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;net&lt;/td&gt;
          &lt;td&gt;Network-related organization&lt;/td&gt;
          &lt;td&gt;uk&lt;/td&gt;
          &lt;td&gt;United Kingdom&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;mil&lt;/td&gt;
          &lt;td&gt;U.S. Department of Defense-related organization&lt;/td&gt;
          &lt;td&gt;fr&lt;/td&gt;
          &lt;td&gt;France&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a href=&#34;https://ko.wikipedia.org/wiki/%EA%B5%AD%EA%B0%80_%EC%BD%94%EB%93%9C_%EC%B5%9C%EC%83%81%EC%9C%84_%EB%8F%84%EB%A9%94%EC%9D%B8&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Learn more about country code top-level domains&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A subdomain is the area between the top-level domain and the host name. As shown in the table below, it represents the organization&amp;rsquo;s name and type. Subdomains that indicate the organization&amp;rsquo;s type include ac, re, co, go, and ne, representing schools, research institutes, companies, government agencies, and network-related organizations, respectively.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Types of Subdomains&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Subdomain&lt;/th&gt;
          &lt;th&gt;Organization&lt;/th&gt;
          &lt;th&gt;Domain&lt;/th&gt;
          &lt;th&gt;Example&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;ac&lt;/td&gt;
          &lt;td&gt;Academy&lt;/td&gt;
          &lt;td&gt;Educational/academic institution&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.snu.ac.kr&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.snu.ac.kr&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;re&lt;/td&gt;
          &lt;td&gt;Research&lt;/td&gt;
          &lt;td&gt;Research institute&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://etri.re.kr&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://etri.re.kr&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;co&lt;/td&gt;
          &lt;td&gt;Company&lt;/td&gt;
          &lt;td&gt;Company&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://samsung.co.kr/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://samsung.co.kr/&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;go&lt;/td&gt;
          &lt;td&gt;Government&lt;/td&gt;
          &lt;td&gt;Government agency&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;http://www.president.go.kr/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;http://www.president.go.kr/&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;ne&lt;/td&gt;
          &lt;td&gt;Nonprofit public organization&lt;/td&gt;
          &lt;td&gt;Network or gateway&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a href=&#34;https://ko.wikipedia.org/wiki/.kr&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Learn more about .kr&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;dns-records&#34;&gt;DNS Records&lt;/h2&gt;
&lt;p&gt;A DNS record (or zone file) is an instruction on an authoritative DNS server that provides information about the IP address associated with a domain and how requests for that domain should be handled. These records consist of a set of text files called DNS syntax. DNS syntax is a string used as a command that tells the DNS server what work to perform. Also, every DNS record has a &amp;ldquo;TTL,&amp;rdquo; which stands for time-to-live and indicates how often DNS servers refresh that record.&lt;/p&gt;
&lt;h3 id=&#34;a&#34;&gt;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;An IPv4 address record is used to map a host name to an IPv4 address.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;aaaa&#34;&gt;AAAA&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;An IPv6 address record is used to map a host name to an IPv6 address.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;cname&#34;&gt;CNAME&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A canonical name record is an alias that points to another DNS record.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;ns&#34;&gt;NS&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A name server record points to an authoritative name server.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;soa&#34;&gt;SOA&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A start of authority record contains authoritative information about a DNS zone.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;mx&#34;&gt;MX&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Sends email to an email server.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;txt&#34;&gt;TXT&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A text record contains arbitrary text.&lt;/li&gt;
&lt;li&gt;Administrators can store text notes in the record.&lt;/li&gt;
&lt;li&gt;This record is often used for email security.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>DNS</category>
      
    </item>
    
    <item>
      <title>RSS</title>
      <link>https://www.devkuma.com/en/docs/rss/</link>
      <pubDate>Sun, 27 Nov 2022 17:59:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/rss/</guid>
      <description>
        
        
        &lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;RSS is a format for distributing a brief summary of a website&amp;rsquo;s title or contents. It is mainly used to publish update information.&lt;/p&gt;
&lt;p&gt;It is generally used to distribute blog update information, but it is also often used by news sites and TV schedule sites to distribute new article or program information, and by companies to distribute product information.&lt;/p&gt;
&lt;p&gt;The term RSS is also referred to by the following names.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;RDF Site Summary
&lt;ul&gt;
&lt;li&gt;RDF stands for Resource Description Framework, meaning a tool for writing metadata.&lt;/li&gt;
&lt;li&gt;In other words, it is an agreement to &amp;ldquo;write this kind of information in this kind of form.&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Really Simple Syndication
&lt;ul&gt;
&lt;li&gt;Very simple distribution&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Rich Site Summary
&lt;ul&gt;
&lt;li&gt;Rich site summary information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;emergence-and-growth-of-rss&#34;&gt;Emergence and Growth of RSS&lt;/h2&gt;
&lt;p&gt;The first development of RSS began from a concept at NetCenter, Netscape&amp;rsquo;s Internet portal site. Netscape was famous for its browser, and RSS was devised to provide articles from well-known newspapers easily.&lt;/p&gt;
&lt;p&gt;Looking briefly at Netscape&amp;rsquo;s development history, the RSS format started from MCF (Meta Content Framework) in 1995, passed through the development of RDF (Resource Description Framework) and CDF (Channel Definition Format), and appeared as RSS (RDF Site Summary). However, Netscape abandoned further development after RSS 0.9. After that, two development groups formed and continued development, which is why RSS came to have two names.&lt;/p&gt;
&lt;h2 id=&#34;rss-standards&#34;&gt;RSS Standards&lt;/h2&gt;
&lt;p&gt;RSS (RDF Site Summary) 1.0 from the RSS-DEV Working Group and RSS (Really Simple Syndication) 2.0 from UserLand are industry standards.&lt;br&gt;
The two specifications have slight functional differences, but UserLand&amp;rsquo;s 2.0 provides more detailed functions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;RSS 1.*: specifications based on RDF
&lt;ul&gt;
&lt;li&gt;RSS 0.9&lt;/li&gt;
&lt;li&gt;RSS 1.0&lt;/li&gt;
&lt;li&gt;RSS 1.1 (January 2005)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;RSS 2.0: specifications not based on RDF
&lt;ul&gt;
&lt;li&gt;RSS 0.91&lt;/li&gt;
&lt;li&gt;RSS 0.92&lt;/li&gt;
&lt;li&gt;RSS 0.93&lt;/li&gt;
&lt;li&gt;RSS 0.94&lt;/li&gt;
&lt;li&gt;RSS 2.01&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Other formats also appeared, such as Media RSS announced by Yahoo in December 2004, and around the end of 2004, methods of extending RSS formats and applying them to podcasting also appeared.&lt;/p&gt;
&lt;p&gt;With the spread of RSS, recognition of the importance of content syndication, new functions, and the need for standardization grew. Many discussions and efforts for content syndication standardization took place, but it became difficult to unify and standardize RSS specifications, and this led to a new standardization project named Atom.&lt;/p&gt;
&lt;p&gt;RSS continues to evolve. Although there are slight differences in methods, RSS is becoming established on the Internet because it develops based on the basic philosophy of being &amp;ldquo;open.&amp;rdquo;&lt;/p&gt;
&lt;h2 id=&#34;benefits-of-rss-services&#34;&gt;Benefits of RSS Services&lt;/h2&gt;
&lt;p&gt;RSS has the following advantages.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Selective subscription
&lt;ul&gt;
&lt;li&gt;Users can choose channels that exactly match the topics they want.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Fast subscription
&lt;ul&gt;
&lt;li&gt;Multiple channel sources can be accessed at the same time.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;History management
&lt;ul&gt;
&lt;li&gt;Past records from various channels can be stored.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Easy automated content integration
&lt;ul&gt;
&lt;li&gt;syndication / aggregation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Content reusability
&lt;ul&gt;
&lt;li&gt;Structured XML data can be easily transformed and processed.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Change in communication method
&lt;ul&gt;
&lt;li&gt;From one-to-one to one-to-many simultaneous access&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;rss-20-specification&#34;&gt;RSS 2.0 Specification&lt;/h2&gt;
&lt;h3 id=&#34;0-rss-element&#34;&gt;0. &lt;code&gt;&amp;lt;rss&amp;gt;&lt;/code&gt; Element&lt;/h3&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-xml&#34; data-lang=&#34;xml&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;rss&lt;/span&gt; &lt;span style=&#34;color:#c4a000&#34;&gt;version=&lt;/span&gt;&lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;2.0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/rss&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;ul&gt;
&lt;li&gt;A document complying with RSS 2.0 must have an element named &lt;code&gt;rss&lt;/code&gt; as the document element.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;&amp;lt;rss&amp;gt;&lt;/code&gt; element must have the &lt;code&gt;version&lt;/code&gt; attribute, and its value is always &lt;code&gt;&amp;quot;2.0&amp;quot;&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;&amp;lt;rss&amp;gt;&lt;/code&gt; element has the &lt;code&gt;&amp;lt;channel&amp;gt;&lt;/code&gt; element as a child.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;1-channel-element&#34;&gt;1. &lt;code&gt;&amp;lt;channel&amp;gt;&lt;/code&gt; Element&lt;/h3&gt;
&lt;p&gt;The channel corresponds to a website. It has three required child elements and fifteen optional child elements.&lt;/p&gt;
&lt;h3 id=&#34;required-channel-elements&#34;&gt;Required Channel Elements&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;title&amp;gt;&lt;/code&gt;: the name of the channel. Usually the same as the website name.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;link&amp;gt;&lt;/code&gt;: the address of the website that supplies this RSS.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;description&amp;gt;&lt;/code&gt;: promotional text that introduces or describes this channel (website).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;optional-channel-elements&#34;&gt;Optional Channel Elements&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;language&amp;gt;&lt;/code&gt;: specifies the main language of the channel according to ISO 639.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;copyright&amp;gt;&lt;/code&gt;: contains copyright text.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;managingEditor&amp;gt;&lt;/code&gt;: e-mail address of the post editor.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;webMaster&amp;gt;&lt;/code&gt;: e-mail address of the site administrator.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;pubDate&amp;gt;&lt;/code&gt;: publication date and time of this RSS, in RFC 822 format.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;lastBuildDate&amp;gt;&lt;/code&gt;: last modification time of posts in this channel, also in RFC 822 format.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;category&amp;gt;&lt;/code&gt;: topic or category of the channel.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;generator&amp;gt;&lt;/code&gt;: software used to publish this RSS.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;docs&amp;gt;&lt;/code&gt;: address where this RSS can be received.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;cloud&amp;gt;&lt;/code&gt;: node specifying RSS Cloud features such as real-time notification and opinion exchange.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;ttl&amp;gt;&lt;/code&gt;: limits how long the feed can be cached before it is fetched again.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;image&amp;gt;&lt;/code&gt;: specifies an image such as a logo representing the channel.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;textInput&amp;gt;&lt;/code&gt;: specifies a text box that can be displayed in the channel, often for search or feedback.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;skipHours&amp;gt;&lt;/code&gt;: specifies hours from 0 to 23 when RSS collectors should not fetch.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;skipDays&amp;gt;&lt;/code&gt;: specifies days when RSS collectors should not fetch.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;item-element&#34;&gt;&lt;code&gt;&amp;lt;item&amp;gt;&lt;/code&gt; Element&lt;/h3&gt;
&lt;p&gt;The &lt;code&gt;&amp;lt;item&amp;gt;&lt;/code&gt; element represents a post in the channel. It has required elements and optional elements.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;title&amp;gt;&lt;/code&gt;: title of the post.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;link&amp;gt;&lt;/code&gt;: URL of the post.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;description&amp;gt;&lt;/code&gt;: body of the post or part of the body.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;author&amp;gt;&lt;/code&gt;: e-mail address of the post author.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;category&amp;gt;&lt;/code&gt;: category to which the post belongs.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;comments&amp;gt;&lt;/code&gt;: address where comments for the post can be read.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;enclosure&amp;gt;&lt;/code&gt;: node for attached files, with &lt;code&gt;url&lt;/code&gt;, &lt;code&gt;length&lt;/code&gt;, and &lt;code&gt;type&lt;/code&gt; attributes.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;guid&amp;gt;&lt;/code&gt;: a unique string that can programmatically identify only this post.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;pubDate&amp;gt;&lt;/code&gt;: date when the post was registered.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;&amp;lt;source&amp;gt;&lt;/code&gt;: if the post came from another RSS feed, indicates that feed&amp;rsquo;s name and address.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;example-rss-written-in-rss-20&#34;&gt;Example RSS Written in RSS 2.0&lt;/h3&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-xml&#34; data-lang=&#34;xml&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#8f5902;font-style:italic&#34;&gt;&amp;lt;?xml version=&amp;#34;1.0&amp;#34; encoding=&amp;#34;utf-8&amp;#34;?&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;rss&lt;/span&gt; &lt;span style=&#34;color:#c4a000&#34;&gt;version=&lt;/span&gt;&lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;2.0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;channel&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;title&amp;gt;&lt;/span&gt;Liftoff News&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/title&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;link&amp;gt;&lt;/span&gt;http://liftoff.msfc.nasa.gov/&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/link&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;description&amp;gt;&lt;/span&gt;Liftoff to Space Exploration.&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/description&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;language&amp;gt;&lt;/span&gt;en-us&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/language&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;pubDate&amp;gt;&lt;/span&gt;Tue, 10 Jun 2003 04:00:00 GMT&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/pubDate&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;lastBuildDate&amp;gt;&lt;/span&gt;Tue, 10 Jun 2003 09:41:01 GMT&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/lastBuildDate&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;docs&amp;gt;&lt;/span&gt;http://blogs.law.harvard.edu/tech/rss&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/docs&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;generator&amp;gt;&lt;/span&gt;Weblog Editor 2.0&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/generator&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;managingEditor&amp;gt;&lt;/span&gt;editor@example.com&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/managingEditor&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;webMaster&amp;gt;&lt;/span&gt;webmaster@example.com&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/webMaster&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;item&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;         &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;title&amp;gt;&lt;/span&gt;Star City&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/title&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;         &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;link&amp;gt;&lt;/span&gt;http://liftoff.msfc.nasa.gov/news/2003/news-starcity.asp&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/link&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;         &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;description&amp;gt;&lt;/span&gt;How do Americans get ready to work with Russians aboard the International Space Station?&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/description&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;         &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;pubDate&amp;gt;&lt;/span&gt;Tue, 03 Jun 2003 09:39:21 GMT&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/pubDate&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;         &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;guid&amp;gt;&lt;/span&gt;http://liftoff.msfc.nasa.gov/2003/06/03.html#item573&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/guid&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;      &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/item&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;   &lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/channel&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#204a87;font-weight:bold&#34;&gt;&amp;lt;/rss&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://search.shopping.naver.com/book/catalog/32483278307&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Understanding Network Terms with Pictures&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ko.wikipedia.org/wiki/RSS&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;RSS | Wiki&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://validator.w3.org/feed/docs/rss1.html&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;RDF Site Summary (RSS) 1.0&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://m.cafe.daum.net/jp01/5DXK/41&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;[Glossary] RSS(RDF Site Summary)&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://tapito.tistory.com/444?category=398467&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Explanation of the RSS 2.0 XML format&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>CDN (Content Delivery Network)</title>
      <link>https://www.devkuma.com/en/docs/cdn/</link>
      <pubDate>Wed, 30 Mar 2022 08:52:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/cdn/</guid>
      <description>
        
        
        &lt;h2 id=&#34;cdn&#34;&gt;CDN&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Content Delivery Network or Content Distribution Network.&lt;/li&gt;
&lt;li&gt;A CDN (Content Delivery Network) is a platform made up of densely distributed servers that minimizes delays in loading web page content by reducing the physical distance between servers and users.&lt;/li&gt;
&lt;li&gt;It is a technology that provides content more quickly and reliably to users who are geographically and physically distant.&lt;/li&gt;
&lt;li&gt;It is a service for improving slow response speeds and download times for users.&lt;/li&gt;
&lt;li&gt;It provides content by caching content from a remote origin server through caching servers inside the CDN.&lt;/li&gt;
&lt;li&gt;This allows users around the world to view the same high-quality content without slowing loading times.&lt;/li&gt;
&lt;li&gt;When a request for content occurs, a CDN maps the request to the server closest to the user and handles it with a cached (previously stored) version of the requested file. If the server cannot find the file, it searches for the content on another server in the CDN platform and then sends the response to the end user.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/cdn/NCDN_-_CDN.png&#34; alt=&#34;Content Delivery Network&#34;&gt;&lt;/p&gt;
&lt;p&gt;Image source: &lt;a href=&#34;https://en.wikipedia.org/wiki/Content_delivery_network&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://en.wikipedia.org/wiki/Content_delivery_network&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;

      </description>
      
      <category>CDN</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Homepage</title>
      <link>https://www.devkuma.com/en/docs/homepage/</link>
      <pubDate>Wed, 30 Nov 2022 21:08:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/homepage/</guid>
      <description>
        
        
        &lt;p&gt;It is often used with the same meaning as a website. In other words, it is used as a term that indicates a place where data or files are gathered in one place on the WWW (World Wide Web), and it has abbreviations such as HP and homepi.
However, this is incorrect usage. Originally, a homepage referred to the start screen (website) displayed first when a web browser is launched.
In Korea, website and homepage are often used interchangeably with the same meaning, but the two are actually different.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Website&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;A collection of web pages for content or services stored on a web server to be provided on the Internet.&lt;/li&gt;
&lt;li&gt;It means a collection of web pages belonging to one domain.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homepage&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;The page shown first on every website, or the first page.&lt;/li&gt;
&lt;li&gt;The page connected first when visiting the website above is the homepage.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Most web browsers have a &amp;ldquo;Home&amp;rdquo; button, and clicking that button performs the action of returning to the start screen. In other words, homepage originally meant &amp;ldquo;the page displayed as the home screen (start screen).&amp;rdquo;&lt;/p&gt;
&lt;p&gt;In the early days of the Internet, many websites used a Home button as the button for returning to the start page, so the meaning changed to &amp;ldquo;website start page = homepage.&amp;rdquo; In addition, beginner books for studying HTML often used homepage creation examples with titles such as &amp;ldquo;Welcome to OO&amp;rsquo;s homepage!&amp;rdquo; This spread widely. Web pages produced everywhere like mushrooms after rain all used the word &amp;ldquo;homepage,&amp;rdquo; and magazines and media also continued to use the word incorrectly. As a result, among the general public, &amp;ldquo;homepage&amp;rdquo; became a more familiar term than &amp;ldquo;website.&amp;rdquo;&lt;/p&gt;
&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://search.shopping.naver.com/book/catalog/32483278307&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Understanding Network Terms with Pictures&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Proxy</title>
      <link>https://www.devkuma.com/en/docs/proxy/</link>
      <pubDate>Fri, 08 Jul 2022 18:56:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/proxy/</guid>
      <description>
        
        
        &lt;h2 id=&#34;proxy-server&#34;&gt;Proxy Server&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;A proxy is a computer system or application that allows a client to connect indirectly to another network service through it.&lt;/li&gt;
&lt;li&gt;Communication performed on behalf of another party as an intermediary between a server and a client is called a &amp;ldquo;proxy,&amp;rdquo; and the component that performs this intermediary function is called a proxy server.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;types-of-proxies&#34;&gt;Types of Proxies&lt;/h2&gt;
&lt;h3 id=&#34;forward-proxy&#34;&gt;Forward Proxy&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;In general, when people say proxy, they usually mean a forward proxy.&lt;/li&gt;
&lt;li&gt;It is a method where a client does not request a server directly, but first sends the request through a proxy server.
&lt;ul&gt;
&lt;li&gt;To make it easier to understand, when a company intranet makes a request to a server on the Internet, it first calls a proxy server. This method is called a forward proxy.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;It hides who the client is from the server.
&lt;ul&gt;
&lt;li&gt;Because the IP address received by the server is the IP address of the forward proxy server, the server cannot know who the client is.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;In the diagram below, if the proxy server is called first, it is a forward proxy.&lt;/li&gt;
&lt;li&gt;Example: VPN&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;reverse-proxy&#34;&gt;Reverse Proxy&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A reverse proxy can be understood as the opposite direction from a forward proxy.&lt;/li&gt;
&lt;li&gt;When a client calls a server, it calls the reverse proxy, and the proxy server sends the request and delivers the received response to the client.&lt;/li&gt;
&lt;li&gt;In an internal intranet, this is a method where a client on the Internet requests the reverse proxy server in order to call a server and receives the response.&lt;/li&gt;
&lt;li&gt;A reverse proxy hides who the server is.
&lt;ul&gt;
&lt;li&gt;Because the client calls the reverse proxy server first, it cannot know the IP address of the actual server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;In the diagram below, the method where a client on the Internet calls a proxy server and then calls a server in the internal network is a reverse proxy.&lt;/li&gt;
&lt;li&gt;Example: Gateway&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;benefits-of-proxies&#34;&gt;Benefits of Proxies&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;By using a proxy server, which is an intermediary server, instead of direct communication between client and server, you can gain several advantages such as security, performance, and traffic distribution.&lt;/li&gt;
&lt;li&gt;A proxy can cache content requested from a server and return an immediate response for the same request, which can save time and resource usage.&lt;/li&gt;
&lt;li&gt;Security
&lt;ul&gt;
&lt;li&gt;Using a proxy server makes it possible to hide the IP address of the client or server. By hiding the actual server or client IP address and exposing only the proxy server&amp;rsquo;s IP address, it can help prepare against hacking.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Performance
&lt;ul&gt;
&lt;li&gt;Using a proxy server can improve performance through caching and distribution.&lt;/li&gt;
&lt;li&gt;Caching reuses frequently used identical requests by storing them.&lt;/li&gt;
&lt;li&gt;The proxy server responds instead of calling the actual server again, reducing server resource usage.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Traffic distribution
&lt;ul&gt;
&lt;li&gt;Some proxy servers also provide load balancing, so if there are multiple distributed servers, server traffic can be distributed.&lt;/li&gt;
&lt;li&gt;It is also possible to configure which server is called for each endpoint (URL), distributing server traffic by role.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Others
&lt;ul&gt;
&lt;li&gt;A single proxy server can handle HTTPS certificate management, while the servers running behind it provide service over HTTP. This has the advantage that certificates do not need to be managed on every server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Proxy</category>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Difference Between Forward and Redirect</title>
      <link>https://www.devkuma.com/en/docs/forward-and-redirect/</link>
      <pubDate>Thu, 07 Apr 2022 01:19:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/forward-and-redirect/</guid>
      <description>
        
        
        &lt;h2 id=&#34;forward-method&#34;&gt;Forward Method&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Forward only moves pages at the Web Container level. In practice, the web browser cannot tell that it has moved to another page. Therefore, the web browser displays the URL that was first called, and the URL information of the page that was moved to cannot be checked.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The currently running page and the page called by forward share the Request object and Response object.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/web/web_forward.png&#34; alt=&#34;Forward method&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Statement used when moving from a Servlet to a JSP page&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-java&#34; data-lang=&#34;java&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#000&#34;&gt;RequestDispatcher&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt; &lt;/span&gt;&lt;span style=&#34;color:#000&#34;&gt;rd&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt; &lt;/span&gt;&lt;span style=&#34;color:#ce5c00;font-weight:bold&#34;&gt;=&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt; &lt;/span&gt;&lt;span style=&#34;color:#000&#34;&gt;request&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#c4a000&#34;&gt;getRequestDispatcher&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;test01.jsp&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;);&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#000&#34;&gt;rd&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#c4a000&#34;&gt;forward&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#000&#34;&gt;request&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;,&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt; &lt;/span&gt;&lt;span style=&#34;color:#000&#34;&gt;response&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;);&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;redirect-method&#34;&gt;Redirect Method&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;When a Redirect command enters the Web Container, it instructs the web browser to move to another page. Then the web browser changes the URL to the instructed address and moves to that address. It moves to an address in another web container.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On the new page, new Request and Response objects are created.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&#34;https://www.devkuma.com/docs/web/web_redirect.png&#34; alt=&#34;Redirect method&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Statement used when moving from a Servlet to a JSP page&lt;/strong&gt;&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-java&#34; data-lang=&#34;java&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#000&#34;&gt;response&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;.&lt;/span&gt;&lt;span style=&#34;color:#c4a000&#34;&gt;sendRedirect&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;(&lt;/span&gt;&lt;span style=&#34;color:#4e9a06&#34;&gt;&amp;#34;test02.jsp&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#000;font-weight:bold&#34;&gt;);&lt;/span&gt;&lt;span style=&#34;color:#f8f8f8&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;source&#34;&gt;Source&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.naver.com/saintw/100165339381&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Difference between redirect and forward&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
      <category>Internet</category>
      
      <category>Web</category>
      
    </item>
    
    <item>
      <title>Port Forwarding</title>
      <link>https://www.devkuma.com/en/docs/network/port-forwarding/</link>
      <pubDate>Thu, 08 Sep 2022 08:16:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/network/port-forwarding/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-port-forwarding&#34;&gt;What Is Port Forwarding?&lt;/h2&gt;
&lt;p&gt;Port forwarding is a feature that allows traffic entering through a router&amp;rsquo;s port to reach a specific port on a device connected to that router.&lt;/p&gt;
&lt;p&gt;For example, if a computer and a phone are connected to a router and you simply enter the router address plus a port number, the router does not know which device&amp;rsquo;s port the request should go to. Port forwarding can therefore be understood as forwarding a router&amp;rsquo;s port to the port of a device connected to it. It can also be described as assigning a port number on the router to a specific device and that device&amp;rsquo;s port. For example, connecting to port 180 on the router can lead to port 5000 on the phone, while connecting to port 280 can lead to port 5000 on the computer. The work of assigning values such as 180 and 280 is port forwarding.&lt;/p&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Concept and Features of a Load Balancer</title>
      <link>https://www.devkuma.com/en/docs/load-balancer/</link>
      <pubDate>Thu, 08 Sep 2022 08:16:00 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/load-balancer/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-a-load-balancer&#34;&gt;What Is a Load Balancer?&lt;/h2&gt;
&lt;p&gt;A load balancer is a system that distributes server load.&lt;/p&gt;
&lt;h2 id=&#34;types-of-load-balancers&#34;&gt;Types of Load Balancers&lt;/h2&gt;
&lt;h3 id=&#34;l4-port-based&#34;&gt;L4: Port-Based&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Distributes load using information from layer 4 and below.&lt;/li&gt;
&lt;li&gt;In particular, it distributes traffic using MAC (layer 2), IP (layer 3), and port (layer 4) information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;l7-url-based&#34;&gt;L7: URL-Based&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Distributes load using application layer information.&lt;/li&gt;
&lt;li&gt;It can inspect packet contents, distribute traffic, and filter abnormal traffic such as DDoS attacks.&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Infrastructure</title>
      <link>https://www.devkuma.com/en/docs/infra/</link>
      <pubDate>Tue, 20 Dec 2022 17:28:16 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/infra/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-infrastructure&#34;&gt;What Is Infrastructure?&lt;/h2&gt;
&lt;p&gt;Infra is an abbreviation of Infrastructure and refers to the foundational or base part of something. It is an English word that means &amp;ldquo;foundation&amp;rdquo; or &amp;ldquo;underlying structure.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;In general, infrastructure refers to &amp;ldquo;the foundation of industry and social life.&amp;rdquo; Facilities that serve as the basis for industrial activities and social life are called &amp;ldquo;infrastructure.&amp;rdquo; Specifically, it refers to things that form the foundation of daily life, such as roads, railways, water and sewage systems, power plants, power grids, and communication facilities.&lt;/p&gt;
&lt;p&gt;Public facilities that form the foundation of everyday life are called &amp;ldquo;infrastructure.&amp;rdquo;&lt;/p&gt;
&lt;h2 id=&#34;what-is-infrastructure-in-it&#34;&gt;What Is Infrastructure in IT?&lt;/h2&gt;
&lt;p&gt;In the IT field, &amp;ldquo;infrastructure&amp;rdquo; refers to building the foundation for safely operating systems, such as designing, building, and operating servers and networks that run applications.&lt;/p&gt;
&lt;h2 id=&#34;infrastructure-engineer&#34;&gt;Infrastructure Engineer&lt;/h2&gt;
&lt;p&gt;An engineer who builds infrastructure environments is called an infrastructure engineer. Infrastructure engineers build the foundation needed to run applications created by programmers or system engineers, such as server construction and network construction.&lt;/p&gt;
&lt;p&gt;In contrast to handling the visible front side such as apps, web pages, and other front-end areas, they handle back-end work behind servers and operating systems.&lt;/p&gt;
&lt;p&gt;People who work on infrastructure foundations are called infrastructure engineers. Types of infrastructure engineers include the following.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network engineer&lt;/li&gt;
&lt;li&gt;Security engineer&lt;/li&gt;
&lt;li&gt;Server engineer&lt;/li&gt;
&lt;li&gt;Database engineer&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;work-of-an-infrastructure-engineer&#34;&gt;Work of an Infrastructure Engineer&lt;/h2&gt;
&lt;p&gt;Infrastructure engineers design and build IT infrastructure, and perform operations and maintenance so it works without problems.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Requirements definition
&lt;ul&gt;
&lt;li&gt;Listen to the customer&amp;rsquo;s requests and decide what kind of IT infrastructure to create.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Design
&lt;ul&gt;
&lt;li&gt;Decide what devices to use and what configuration and setting values to set.&lt;/li&gt;
&lt;li&gt;Also consider what rules will be used to operate it after it starts running.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Construction
&lt;ul&gt;
&lt;li&gt;Procure equipment and actually perform construction tasks such as connecting devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Testing
&lt;ul&gt;
&lt;li&gt;Check whether it operates without problems according to the design document.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Maintenance
&lt;ul&gt;
&lt;li&gt;Monitor whether it is operating normally and resolve problems when errors occur.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
    <item>
      <title>Server</title>
      <link>https://www.devkuma.com/en/docs/server/</link>
      <pubDate>Sat, 31 Dec 2022 02:18:16 +0900</pubDate>
      <author>kc@example.com (kc kim)</author>
      <guid>https://www.devkuma.com/en/docs/server/</guid>
      <description>
        
        
        &lt;h2 id=&#34;what-is-a-server&#34;&gt;What Is a Server?&lt;/h2&gt;
&lt;p&gt;Simply put, a server is a data storage location on a network.&lt;br&gt;
The word server has the meaning of &amp;ldquo;a place that provides.&amp;rdquo; A computer that provides corresponding data in response to user demands (requests) through a network such as the Internet is called a &amp;ldquo;server.&amp;rdquo;&lt;br&gt;
Servers are used for all Internet-related services, such as browsing web pages, mail, SNS, and online shopping.&lt;/p&gt;
&lt;h3 id=&#34;server-and-client&#34;&gt;Server and Client&lt;/h3&gt;
&lt;p&gt;In a network, the side that provides data is called the server, and the side that uses data is called the client.&lt;br&gt;
When browsing a website or sending mail, data files such as video files or HTML files are returned from the server in response to requests from the client.&lt;br&gt;
The main role of a server is to send processed files or store data according to client requests.&lt;/p&gt;
&lt;h3 id=&#34;upload-and-download&#34;&gt;Upload and Download&lt;/h3&gt;
&lt;p&gt;Providing information from a client to a server is called &amp;ldquo;upload.&amp;rdquo;&lt;br&gt;
(Example) Posting a video to a video sharing site, uploading a photo to SNS&lt;/p&gt;
&lt;p&gt;On the other hand, receiving a file from the server that provides it is called &amp;ldquo;download.&amp;rdquo;&lt;br&gt;
(Example) Bringing images and videos published on the Internet into a computer&lt;/p&gt;
&lt;h2 id=&#34;how-servers-and-networks-work&#34;&gt;How Servers and Networks Work&lt;/h2&gt;
&lt;p&gt;To help visualize the role of a server, let&amp;rsquo;s use the flow from creating a homepage to having visitors view it as an example.&lt;/p&gt;
&lt;h3 id=&#34;upload-homepage-data-to-a-server&#34;&gt;Upload Homepage Data to a Server&lt;/h3&gt;
&lt;p&gt;Simply having homepage data on your own PC is not enough to show it to Internet users.&lt;br&gt;
To make the homepage viewable, the homepage data must be stored on a server.&lt;/p&gt;
&lt;h3 id=&#34;when-a-user-enters-a-url-in-a-browser-a-request-reaches-the-server&#34;&gt;When a User Enters a URL in a Browser, a Request Reaches the Server&lt;/h3&gt;
&lt;p&gt;When an Internet user enters the homepage URL into a browser such as Google Chrome and presses Enter, a request is sent to the server.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;URL&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A string that indicates the location of a web page; it is also called an address.&lt;/li&gt;
&lt;li&gt;The URL of the top page of the current site is &amp;ldquo;&lt;a href=&#34;https://www.devkuma.com&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.devkuma.com&lt;i class=&#34;fas fa-external-link-alt&#34;&gt;&lt;/i&gt;&lt;/a&gt;.&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Browser&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Software for viewing homepages (websites) on a PC or smartphone through the Internet.&lt;/li&gt;
&lt;li&gt;Google Chrome, Safari, and Internet Explorer are well-known examples.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-server-provides-data-to-the-users-pc-or-smartphone-according-to-the-request&#34;&gt;The Server Provides Data to the User&amp;rsquo;s PC or Smartphone According to the Request&lt;/h3&gt;
&lt;p&gt;The server retrieves the page data that corresponds to the URL and provides files such as HTML and images to the user&amp;rsquo;s PC, smartphone, or other device.&lt;/p&gt;
&lt;p&gt;In addition, to make the site accessible through search engines such as Google or Naver, it is necessary not only to upload homepage data to the server, but also to index (register) it.&lt;br&gt;
Simply uploading homepage data to the server does not make the site appear in searches on Google, Naver, and similar services.&lt;br&gt;
To allow users to access the site through search engines instead of directly entering the URL in the browser, it is essential to index the homepage data in the search engine&amp;rsquo;s database.&lt;/p&gt;
&lt;h2 id=&#34;server-types&#34;&gt;Server Types&lt;/h2&gt;
&lt;p&gt;Servers as computers can be broadly divided into two types: &amp;ldquo;physical servers&amp;rdquo; and &amp;ldquo;virtual servers.&amp;rdquo;&lt;/p&gt;
&lt;h3 id=&#34;physical-server&#34;&gt;Physical Server&lt;/h3&gt;
&lt;p&gt;A physically existing single server can be divided into two types: &amp;ldquo;shared server&amp;rdquo; and &amp;ldquo;dedicated server.&amp;rdquo;&lt;/p&gt;
&lt;h4 id=&#34;dedicated-server&#34;&gt;Dedicated Server&lt;/h4&gt;
&lt;p&gt;A dedicated server is a server used exclusively by one user. It has the advantage of a high degree of freedom, such as not being affected by other users and being able to customize the OS, but operating it with proper customization requires a certain level of expertise.&lt;/p&gt;
&lt;h4 id=&#34;shared-server&#34;&gt;Shared Server&lt;/h4&gt;
&lt;p&gt;This is a rental server where multiple users share and use a single physical server.
It has the advantages of lower cost and less maintenance effort, but because multiple users share it, customization is not easy. Processing can be affected by other users&amp;rsquo; usage, and if the server fails, many users can be affected.&lt;/p&gt;
&lt;h3 id=&#34;virtual-server&#34;&gt;Virtual Server&lt;/h3&gt;
&lt;p&gt;A virtual server is a server that runs multiple operating systems on one physical server and operates them as multiple servers. It can be divided into two types: &amp;ldquo;VPS&amp;rdquo; and &amp;ldquo;cloud server.&amp;rdquo;&lt;/p&gt;
&lt;h4 id=&#34;vps-server&#34;&gt;VPS Server&lt;/h4&gt;
&lt;p&gt;VPS stands for Virtual Private Server and is also called a virtual dedicated server.&lt;br&gt;
Like a shared server, it shares one physical server, but because each environment is built virtually and separately, it has the advantage of being less affected by other users and offers high customizability.&lt;/p&gt;
&lt;h4 id=&#34;cloud-server&#34;&gt;Cloud Server&lt;/h4&gt;
&lt;p&gt;A cloud server is a server created in a cloud environment.
Like a VPS, it builds a virtual dedicated server, but compared with a VPS, where resources such as server capacity and processing performance are fixed by plan, a cloud server has the characteristic of high flexibility because resources are not fixed and can be increased quickly when access unexpectedly surges. Representative examples include AWS and GCP.&lt;/p&gt;
&lt;h2 id=&#34;server-uses&#34;&gt;Server Uses&lt;/h2&gt;
&lt;p&gt;The four types of servers introduced above are servers as computers.&lt;br&gt;
By contrast, servers as software provide various functions depending on their purpose.&lt;/p&gt;
&lt;h3 id=&#34;web-server&#34;&gt;Web Server&lt;/h3&gt;
&lt;p&gt;A web server returns data on the web to clients according to requests from clients. It includes HTML files that make up a website (homepage), CSS files that adjust the page structure and design, image files, and similar resources.
When a client requests stored web page information, the server returns and sends the corresponding data.&lt;/p&gt;
&lt;h3 id=&#34;mail-server&#34;&gt;Mail Server&lt;/h3&gt;
&lt;p&gt;A mail server is used when sending and receiving mail.&lt;br&gt;
Servers are divided into sending and receiving roles. SMTP servers are used as sending servers, and IMAP or POP3 servers are used as receiving servers.
The reason mail can be received without problems after turning the power back on, even if mail was sent while the power was off, is that the incoming mail data is stored inside the mail server.&lt;/p&gt;
&lt;div class=&#34;alert alert-primary&#34; role=&#34;alert&#34;&gt;&lt;div class=&#34;h4 alert-heading&#34; role=&#34;heading&#34;&gt;Difference Between POP3 Servers and IMAP Servers&lt;/div&gt;


The major difference between POP3 servers and IMAP servers is whether mail data continues to be stored on the server.  

With a POP3 server, mail data is stored on the server at first, but when it is received by mail software, the data is downloaded to the PC or smartphone and then deleted from the server.
The reason you can read mail received in the past even when not connected to the network is that the mail data is stored on the device.

On the other hand, an IMAP server leaves data on the server.
Therefore, when using multiple devices such as PCs and smartphones, the same mail can be read.
In Gmail or Naver Mail, the reason you can read the same mail from any device after logging in is that an IMAP server is used.
&lt;/div&gt;

&lt;h3 id=&#34;dns-server&#34;&gt;DNS Server&lt;/h3&gt;
&lt;p&gt;A DNS (Domain Name System) server is used to connect IP addresses and domains.&lt;br&gt;
An IP address is a unique number assigned to a device connected to a network and is like an address on the web. However, because a string of numbers is difficult for people to remember, a domain is the name attached to that string of numbers.&lt;/p&gt;
&lt;p&gt;For domains and DNS servers, the explanatory manga distributed by JPRS (Japan Registry Services Co., Ltd.), a company that manages jp domains nationwide, is easy to understand.&lt;/p&gt;
&lt;h3 id=&#34;file-server&#34;&gt;File Server&lt;/h3&gt;
&lt;p&gt;A file server is used to share and use data on a network.&lt;br&gt;
Through a file server, data sharing can be performed smoothly across multiple servers and various operating systems.&lt;/p&gt;
&lt;h3 id=&#34;database-server&#34;&gt;Database Server&lt;/h3&gt;
&lt;p&gt;A database server is a server equipped with a database and running a database management system. It receives requests from clients, searches organized information in the database, and sends processing results back.&lt;/p&gt;
&lt;h3 id=&#34;ftp-server&#34;&gt;FTP Server&lt;/h3&gt;
&lt;p&gt;An FTP (File Transfer Protocol) server is also called a &amp;ldquo;file transfer protocol&amp;rdquo; server and is used to send and receive files to and from a web server.&lt;br&gt;
Unlike a web server that sends files only when there is a request, an FTP server allows uploads from a client to a server and downloads from a server.
When creating a website, an FTP server is used to upload new files to a web server.&lt;/p&gt;
&lt;h3 id=&#34;ssh-server&#34;&gt;SSH Server&lt;/h3&gt;
&lt;p&gt;An SSH (Secure Shell) server is a server that encrypts client information.&lt;br&gt;
In early remote communication methods, personal information was not encrypted, so information could sometimes leak. When sending personal information such as passwords or passcodes, SSH servers made it possible to encrypt the information first and then send it remotely and safely.&lt;/p&gt;

      </description>
      
      <category>Network</category>
      
    </item>
    
  </channel>
</rss>
