1 00:00:01,680 --> 00:00:02,310 Hello again. 2 00:00:02,880 --> 00:00:08,940 And now are we reached the Port of Fire Transfer Protocol, which is which is the FTB. 3 00:00:09,690 --> 00:00:17,430 And as you can see, community use application layer protocol was developed to allow file transfer between 4 00:00:17,430 --> 00:00:19,440 a client and a server. 5 00:00:20,010 --> 00:00:30,030 As you can see here in our in our image here to Joseph to transfer file correctly, we can we can see 6 00:00:30,030 --> 00:00:36,180 the FTB required that two connection be established between the client and the server. 7 00:00:36,750 --> 00:00:39,600 A control connection for command and response. 8 00:00:40,470 --> 00:00:43,770 And other for the very transfer of files. 9 00:00:46,450 --> 00:00:54,330 This is that requires all of the features of a file transfer protocol or the FTB protocol. 10 00:00:54,720 --> 00:00:57,690 Now we have the most interesting and the most 11 00:01:00,620 --> 00:01:06,150 interesting and the most, oh, I'm going to say it like essential protocol ever. 12 00:01:07,120 --> 00:01:11,950 Which is the DHC Dynamic Host Configuration Protocol. 13 00:01:12,520 --> 00:01:15,980 I mean, here we have the explanation. 14 00:01:16,540 --> 00:01:21,340 It is very detailed, but I am going to give you my explanation like. 15 00:01:22,420 --> 00:01:30,550 Sometimes some things that I'm going to see it from my heart and some things that will make you understand 16 00:01:30,550 --> 00:01:39,940 how important is the protocol basically in our our description here, they say the servers enable devices 17 00:01:39,940 --> 00:01:46,420 on a network to obtain the IP configuration, IP addresses, subnet mask, get away and other IP settings 18 00:01:46,420 --> 00:01:47,890 for defined duration. 19 00:01:47,950 --> 00:01:48,490 Please. 20 00:01:49,980 --> 00:01:56,150 After the plane disconnected, the IP address is released and it can be used by other declined. 21 00:01:56,550 --> 00:02:02,550 They simply don't pose a security risk because any device connected to the network can be received and 22 00:02:02,550 --> 00:02:04,860 address it because of this. 23 00:02:05,790 --> 00:02:13,230 In most cases, the ACP is used for any other devices and static addresses for getaways, which are 24 00:02:13,240 --> 00:02:14,670 servers and printers. 25 00:02:16,040 --> 00:02:17,570 What does it say, description? 26 00:02:18,500 --> 00:02:24,200 Simply, it says that in a network, we have multiple machines. 27 00:02:25,890 --> 00:02:34,740 And there's multiple machines could be a is a client that works from a distance. 28 00:02:34,980 --> 00:02:39,240 It's going to be a local area network like we have here at the server. 29 00:02:39,330 --> 00:02:41,430 It's going to know. 30 00:02:42,580 --> 00:02:43,750 We can as. 31 00:02:45,210 --> 00:02:50,880 I'm going to give you like myself, I'm a technician like I'm a senior technician in networking, like 32 00:02:50,880 --> 00:02:52,910 I'm going to have a LAN log in the door. 33 00:02:53,490 --> 00:02:59,130 I can apply to all these machines and static static IP addresses, but it is dangerous. 34 00:03:00,070 --> 00:03:12,400 Is strictly dangerous if a user like like, I don't know, because I'm going to go in in another way 35 00:03:12,400 --> 00:03:18,970 and I'm going to tell you something about cyber security, sometimes we have, we have employees that 36 00:03:19,360 --> 00:03:29,020 can be it can be a danger for our local area, network security or for the network security because 37 00:03:29,350 --> 00:03:33,430 they can take our IP address and they can hack it or send it to any hacker. 38 00:03:34,150 --> 00:03:34,930 We have that. 39 00:03:34,930 --> 00:03:36,880 We have that on cybersecurity. 40 00:03:38,470 --> 00:03:38,920 So. 41 00:03:40,510 --> 00:03:41,760 This is just one case. 42 00:03:41,900 --> 00:03:48,190 There's other cases, but for more security, we applied ECP protocol, the AC protocol. 43 00:03:48,310 --> 00:03:56,140 We give him, we give him a pledge of addresses or a number of addresses, IP addresses of or hosts. 44 00:03:56,980 --> 00:04:05,740 And he gives them to machines like in a in a way that's dynamic and it can change. 45 00:04:06,790 --> 00:04:13,030 When the computer turned off and then turned on, it would change automatically, or sometimes it will 46 00:04:13,030 --> 00:04:16,540 change for a duration, duration of time. 47 00:04:17,560 --> 00:04:24,670 I think in Windows servers, they give eight days and they recall you would get the IP address would 48 00:04:24,670 --> 00:04:31,930 change in the in the middle of the lease or use of that duration, which is for these. 49 00:04:32,940 --> 00:04:38,730 And Lennox, I don't I don't really remember because basically when you turn off your computer and turn 50 00:04:38,730 --> 00:04:40,290 inward, not it will change automatically. 51 00:04:40,710 --> 00:04:48,170 This is the this is the the the main purpose of dynamical configuration protocol to the ACP. 52 00:04:48,240 --> 00:04:57,240 It gives IP addresses or host machines in the network, and it would change them dynamically as soon 53 00:04:57,240 --> 00:05:02,660 as it passes the duration or the mission is turned off and turned on. 54 00:05:03,300 --> 00:05:09,510 Now we have a you can see one question well, what we can do for the server. 55 00:05:10,200 --> 00:05:13,070 The server can't be turned off or still not. 56 00:05:13,080 --> 00:05:13,830 It is not. 57 00:05:13,830 --> 00:05:14,820 It should be turned on. 58 00:05:15,090 --> 00:05:15,840 They'll always. 59 00:05:17,870 --> 00:05:22,490 Further, the server we are going to apply is said to address. 60 00:05:23,640 --> 00:05:31,530 Also for the getaways, which is which is we can we can see it is possible, but for the ever getaway 61 00:05:31,530 --> 00:05:39,150 and printers there, they should have static addresses, then that means we're not going to use the 62 00:05:39,510 --> 00:05:40,500 ACP protocol. 63 00:05:40,510 --> 00:05:43,040 By the way, this isn't information. 64 00:05:43,320 --> 00:05:48,150 Do you remember that place that is the starter with the IP address of one six nine? 65 00:05:50,420 --> 00:05:57,480 We can I mean, I mean, computers give themselves just in case that we don't have a dealership. 66 00:05:57,890 --> 00:06:05,350 Could they give themselves an IP address that is in the pledge of the one six nine address? 67 00:06:05,360 --> 00:06:12,050 I don't I don't really remember that the phone address, but we are going to search that up. 68 00:06:12,800 --> 00:06:14,870 We are going to associate IP the air. 69 00:06:19,870 --> 00:06:21,600 196 that. 70 00:06:24,140 --> 00:06:25,010 It's called Dora. 71 00:06:35,110 --> 00:06:35,530 All right. 72 00:06:35,980 --> 00:06:36,220 Hmm. 73 00:06:36,670 --> 00:06:37,300 We have that. 74 00:06:38,860 --> 00:06:47,370 This is very funny, but I think it is called Dora the O'Reilly, and you should you should have it 75 00:06:47,380 --> 00:06:48,150 in this video. 76 00:06:48,340 --> 00:06:53,920 I'm not going to go back because we already address that and see you in the next video.