Skip to main content

How communication happens across ..? (Explained from the scratch)

okay.. in this article I am going to explain how communication happens between the systems from the scratch. For this, first we need to understand the basic of network hardware in the computer system.

Network hardware is the main crucial thing that makes a computer system to communicate with the other computers. The hardware that I was talking about is nothing but an NETWORK ADAPTER.
Network adapter is also called network card or  network interface card (NIC). Network adapter is fixed to the hardware of the computer which consists of ports that makes the computer to connect to the network.
The ports in network adapter are RJ-45 ports. RJ means Registered Jack. RJ is standardized physical network interface. The standard designs are RJ-11,RJ-45..etc.
RJ-45  just looks like a port that is used by the landline telephone port. But, that is different from RJ-45 port. The port used by the telephone is RJ-11, RJ-11 is smaller than RJ-45. The cable used to connect the port is twisted pair co-axial cable.
Now, this adapter has to some device with any assumed medium with a device that helps for communication. Devices like Hub, Switch etc. are helpful for doing this job. These devices have the same RJ-45 ports to get connected to the other end of the cable. Switch is rather more useful than hub, as it avoids collision with the other devices in the network and also supports for parallel communication.
So, network adapter sets up the communication for a computer system physically. Now for understanding how to make the computer communicate logically, there is another network device called ROUTER which makes this job possible for any computer that has proper identity. The identity that which router uses is nothing but the popular IP ADDRESS. The ip address is just like a name given to your computer. Else it can also be treated as an address for your system just like street address and house numbers in your home address.
IP address consists of 4 numbers separated by 3 dots called as, 4 octets. This contains the network number and device number. To differentiate the network number and device number in the IP address, SUBNET MASK is used. Subnet mask, typically looks like an ip address for eg. 255.255.255.0 as a mask, then it says that, 3 octets in the ip address represent network number and 1 octet for device number. Assume, an ip address and subnet mask to be 192.168.10.2 and 255.255.0.0 respectively. Then, it says that 192.168.x.y as the network and x,y determine the device number in that network.
Routers perform specific efficient routing algorithms to route the data from one network to another using the ip address. Suppose, if router has to route data to another network which is not a local network, then router takes the help for default gateway. Router has 2 ip addresses, 1 that for ISP address and the other is the default gateway of the router.

Comments

Popular posts from this blog

Sexy C#

Download samples   Table of Contents   1.   Introduction  2.   Background    3.   Sexy Features 3.1.   Extension Methods   3.2.   Anonymous Type   3.3.   Delegate   3.4.   Lambda Expression 3.5.   Async-Await Pair   3.6.   Generics   4.   Conclusion   1. Introduction     C#  is a very popular programming language. It is mostly popular in the .NET arena. The main reason behind that is the C# language contains so many useful features. It is actually a multi-paradigm programming language. Q.   Why do we call C# a muti-paradigm programming language? A.  Well, C# has the following characteristics:  Strongly typed   Object Oriented  Functional  Declarative Programming  Imperative Programming   Component based Programming Dynamic Programming ...

Making Python Programs Blazingly Fast

Let’s look at the performance of our Python programs and see how to make them up to 30% faster! Python  haters always say, that one of the reasons they don’t want to use it, is that it’s  slow . Well, whether specific program — regardless of the programming language used — is fast or slow is very much dependent on the developer who wrote it and their skill and ability to write  optimized  and  fast  programs. So, let’s prove some people wrong and let’s see how we can improve performance of our  Python  programs and make them really fast! Timing and Profiling Before we start optimizing anything, we first need to find out which parts of our code actually slow down the whole program. Sometimes the bottleneck of the program might be obvious, but in case you don’t know where it is, then here are options you have for finding out: Note: This is the program I will be using for demonstration purposes, it computes  e  to pow...

Kubernetes – init containers, CNI and more

Certain questions about Kubernetes seem to come up again and again: What’s up with this init container stuff? What’s a CNI plugin? Why is Kubernetes complaining about pods not finishing initialisation? Kubernetes is a complex system with a simple overall purpose: run user  workloads  in a way that permits the authors of the workloads to not care (much) about the messy details of the hardware underneath. The workload authors are supposed to be able to just focus on Pods and Services; in turn, Kubernetes is meant to arrange things such that workloads get mapped to Pods, Pods get deployed on Nodes, and the network in between looks flat and transparent. This is simple to state, but  extremely  complex to implement in practice. (This is an area where Kubernetes is doing a great job of making things complex for the Kubernetes implementors so that they can be easier for the users – nicely done!) Under the hood, Kubernetes is leaning heavily on a number of technologies to ma...