Skip to main content

How communication happens across ..? (Explained from the scratch)

okay.. in this article I am going to explain how communication happens between the systems from the scratch. For this, first we need to understand the basic of network hardware in the computer system.

Network hardware is the main crucial thing that makes a computer system to communicate with the other computers. The hardware that I was talking about is nothing but an NETWORK ADAPTER.
Network adapter is also called network card or  network interface card (NIC). Network adapter is fixed to the hardware of the computer which consists of ports that makes the computer to connect to the network.
The ports in network adapter are RJ-45 ports. RJ means Registered Jack. RJ is standardized physical network interface. The standard designs are RJ-11,RJ-45..etc.
RJ-45  just looks like a port that is used by the landline telephone port. But, that is different from RJ-45 port. The port used by the telephone is RJ-11, RJ-11 is smaller than RJ-45. The cable used to connect the port is twisted pair co-axial cable.
Now, this adapter has to some device with any assumed medium with a device that helps for communication. Devices like Hub, Switch etc. are helpful for doing this job. These devices have the same RJ-45 ports to get connected to the other end of the cable. Switch is rather more useful than hub, as it avoids collision with the other devices in the network and also supports for parallel communication.
So, network adapter sets up the communication for a computer system physically. Now for understanding how to make the computer communicate logically, there is another network device called ROUTER which makes this job possible for any computer that has proper identity. The identity that which router uses is nothing but the popular IP ADDRESS. The ip address is just like a name given to your computer. Else it can also be treated as an address for your system just like street address and house numbers in your home address.
IP address consists of 4 numbers separated by 3 dots called as, 4 octets. This contains the network number and device number. To differentiate the network number and device number in the IP address, SUBNET MASK is used. Subnet mask, typically looks like an ip address for eg. 255.255.255.0 as a mask, then it says that, 3 octets in the ip address represent network number and 1 octet for device number. Assume, an ip address and subnet mask to be 192.168.10.2 and 255.255.0.0 respectively. Then, it says that 192.168.x.y as the network and x,y determine the device number in that network.
Routers perform specific efficient routing algorithms to route the data from one network to another using the ip address. Suppose, if router has to route data to another network which is not a local network, then router takes the help for default gateway. Router has 2 ip addresses, 1 that for ISP address and the other is the default gateway of the router.

Comments

Popular posts from this blog

Sexy C#

Download samples   Table of Contents   1.   Introduction  2.   Background    3.   Sexy Features 3.1.   Extension Methods   3.2.   Anonymous Type   3.3.   Delegate   3.4.   Lambda Expression 3.5.   Async-Await Pair   3.6.   Generics   4.   Conclusion   1. Introduction     C#  is a very popular programming language. It is mostly popular in the .NET arena. The main reason behind that is the C# language contains so many useful features. It is actually a multi-paradigm programming language. Q.   Why do we call C# a muti-paradigm programming language? A.  Well, C# has the following characteristics:  Strongly typed   Object Oriented  Functional  Declarative Programming  Imperative Programming   Component based Programming Dynamic Programming ...

Kubernetes – init containers, CNI and more

Certain questions about Kubernetes seem to come up again and again: What’s up with this init container stuff? What’s a CNI plugin? Why is Kubernetes complaining about pods not finishing initialisation? Kubernetes is a complex system with a simple overall purpose: run user  workloads  in a way that permits the authors of the workloads to not care (much) about the messy details of the hardware underneath. The workload authors are supposed to be able to just focus on Pods and Services; in turn, Kubernetes is meant to arrange things such that workloads get mapped to Pods, Pods get deployed on Nodes, and the network in between looks flat and transparent. This is simple to state, but  extremely  complex to implement in practice. (This is an area where Kubernetes is doing a great job of making things complex for the Kubernetes implementors so that they can be easier for the users – nicely done!) Under the hood, Kubernetes is leaning heavily on a number of technologies to ma...

What happens from Keyboard to Kernel ?

Brief introduction to Linux kernel and shell Users new to Linux will want to familiarise themselves with the following: terminal  is a program that opens a window and lets you interact with the shell shell  is a program that takes commands from the keyboard and gives them to the operating system to perform. Bourne-Again shell, usually referred to as bash, which is the default shell for most Linux distributions. When you first login to a server, you will be dropped into the command prompt, or shell prompt, which is where you can issue commands to the server. The shell will forward its input (usually, from your own key presses) to the running program’s stdin, and it will forward the program’s output (stdout and stderr) to its own output (usually displayed on your screen). The shell is an interface that translates commands into some low-level calls to the kernel. kernel  is the essential center of a computer operating system, the core that provides basic services f...