Skip to main content

How communication happens across ..? (Explained from the scratch)

okay.. in this article I am going to explain how communication happens between the systems from the scratch. For this, first we need to understand the basic of network hardware in the computer system.

Network hardware is the main crucial thing that makes a computer system to communicate with the other computers. The hardware that I was talking about is nothing but an NETWORK ADAPTER.
Network adapter is also called network card or  network interface card (NIC). Network adapter is fixed to the hardware of the computer which consists of ports that makes the computer to connect to the network.
The ports in network adapter are RJ-45 ports. RJ means Registered Jack. RJ is standardized physical network interface. The standard designs are RJ-11,RJ-45..etc.
RJ-45  just looks like a port that is used by the landline telephone port. But, that is different from RJ-45 port. The port used by the telephone is RJ-11, RJ-11 is smaller than RJ-45. The cable used to connect the port is twisted pair co-axial cable.
Now, this adapter has to some device with any assumed medium with a device that helps for communication. Devices like Hub, Switch etc. are helpful for doing this job. These devices have the same RJ-45 ports to get connected to the other end of the cable. Switch is rather more useful than hub, as it avoids collision with the other devices in the network and also supports for parallel communication.
So, network adapter sets up the communication for a computer system physically. Now for understanding how to make the computer communicate logically, there is another network device called ROUTER which makes this job possible for any computer that has proper identity. The identity that which router uses is nothing but the popular IP ADDRESS. The ip address is just like a name given to your computer. Else it can also be treated as an address for your system just like street address and house numbers in your home address.
IP address consists of 4 numbers separated by 3 dots called as, 4 octets. This contains the network number and device number. To differentiate the network number and device number in the IP address, SUBNET MASK is used. Subnet mask, typically looks like an ip address for eg. 255.255.255.0 as a mask, then it says that, 3 octets in the ip address represent network number and 1 octet for device number. Assume, an ip address and subnet mask to be 192.168.10.2 and 255.255.0.0 respectively. Then, it says that 192.168.x.y as the network and x,y determine the device number in that network.
Routers perform specific efficient routing algorithms to route the data from one network to another using the ip address. Suppose, if router has to route data to another network which is not a local network, then router takes the help for default gateway. Router has 2 ip addresses, 1 that for ISP address and the other is the default gateway of the router.

Comments

Popular posts from this blog

Sexy C#

Download samples   Table of Contents   1.   Introduction  2.   Background    3.   Sexy Features 3.1.   Extension Methods   3.2.   Anonymous Type   3.3.   Delegate   3.4.   Lambda Expression 3.5.   Async-Await Pair   3.6.   Generics   4.   Conclusion   1. Introduction     C#  is a very popular programming language. It is mostly popular in the .NET arena. The main reason behind that is the C# language contains so many useful features. It is actually a multi-paradigm programming language. Q.   Why do we call C# a muti-paradigm programming language? A.  Well, C# has the following characteristics:  Strongly typed   Object Oriented  Functional  Declarative Programming  Imperative Programming   Component based Programming Dynamic Programming ...

Python Subprocess Module

Subprocess A running program is called a  process . Each process has its own system state, which includes memory, lists of open files, a program counter that keeps track of the instruction being executed, and a call stack used to hold the local variables of functions. Normally, a process executes statements one after the other in a single sequence of control flow, which is sometimes called the main thread of the process. At any given time, the program is only doing one thing. A program can create new processes using library functions such as those found in the os or subprocess modules such as  os.fork() ,  subprocess.Popen() , etc. However, these processes, known as  subprocesses , run as completely independent entities-each with their own private system state and main thread of execution. Because a subprocess is independent, it executes concurrently with the original process. That is, the process that created the subprocess can go on to work on other thing...

How To Configure a Linux Service to Start Automatically After a Crash or Reboot

Part 1: Practical Examples Tutorial Series Introduction This tutorial shows you how to configure system services to automatically restart after a crash or a server reboot. The example uses MySQL, but you can apply these principles to other services running on your server, like Nginx, Apache, or your own application. We cover the three most common init systems in this tutorial, so be sure to follow the one for your distribution. (Many distributions offer multiple options, or allow an alternate init system to be installed.) System V  is the older init system: Debian 6 and earlier Ubuntu 9.04 and earlier CentOS 5 and earlier Upstart : Ubuntu 9.10 to Ubuntu 14.10, including Ubuntu 14.04 CentOS 6 systemd  is the init system for the most recent distributions featured here: Debian 7 and Debian 8 Ubuntu 15.04 and newer CentOS 7 Background Your running Linux or Unix system will have a number of background processes executing at any time. These proc...