Skip to main content

How communication happens across ..? (Explained from the scratch)

okay.. in this article I am going to explain how communication happens between the systems from the scratch. For this, first we need to understand the basic of network hardware in the computer system.

Network hardware is the main crucial thing that makes a computer system to communicate with the other computers. The hardware that I was talking about is nothing but an NETWORK ADAPTER.
Network adapter is also called network card or  network interface card (NIC). Network adapter is fixed to the hardware of the computer which consists of ports that makes the computer to connect to the network.
The ports in network adapter are RJ-45 ports. RJ means Registered Jack. RJ is standardized physical network interface. The standard designs are RJ-11,RJ-45..etc.
RJ-45  just looks like a port that is used by the landline telephone port. But, that is different from RJ-45 port. The port used by the telephone is RJ-11, RJ-11 is smaller than RJ-45. The cable used to connect the port is twisted pair co-axial cable.
Now, this adapter has to some device with any assumed medium with a device that helps for communication. Devices like Hub, Switch etc. are helpful for doing this job. These devices have the same RJ-45 ports to get connected to the other end of the cable. Switch is rather more useful than hub, as it avoids collision with the other devices in the network and also supports for parallel communication.
So, network adapter sets up the communication for a computer system physically. Now for understanding how to make the computer communicate logically, there is another network device called ROUTER which makes this job possible for any computer that has proper identity. The identity that which router uses is nothing but the popular IP ADDRESS. The ip address is just like a name given to your computer. Else it can also be treated as an address for your system just like street address and house numbers in your home address.
IP address consists of 4 numbers separated by 3 dots called as, 4 octets. This contains the network number and device number. To differentiate the network number and device number in the IP address, SUBNET MASK is used. Subnet mask, typically looks like an ip address for eg. 255.255.255.0 as a mask, then it says that, 3 octets in the ip address represent network number and 1 octet for device number. Assume, an ip address and subnet mask to be 192.168.10.2 and 255.255.0.0 respectively. Then, it says that 192.168.x.y as the network and x,y determine the device number in that network.
Routers perform specific efficient routing algorithms to route the data from one network to another using the ip address. Suppose, if router has to route data to another network which is not a local network, then router takes the help for default gateway. Router has 2 ip addresses, 1 that for ISP address and the other is the default gateway of the router.

Comments

Popular posts from this blog

Sexy C#

Download samples   Table of Contents   1.   Introduction  2.   Background    3.   Sexy Features 3.1.   Extension Methods   3.2.   Anonymous Type   3.3.   Delegate   3.4.   Lambda Expression 3.5.   Async-Await Pair   3.6.   Generics   4.   Conclusion   1. Introduction     C#  is a very popular programming language. It is mostly popular in the .NET arena. The main reason behind that is the C# language contains so many useful features. It is actually a multi-paradigm programming language. Q.   Why do we call C# a muti-paradigm programming language? A.  Well, C# has the following characteristics:  Strongly typed   Object Oriented  Functional  Declarative Programming  Imperative Programming   Component based Programming Dynamic Programming ...

Banyan VINES

Banyan VINES Banyan Virtual Integrated Network Service (VINES) implements a distributed network operating system based on a proprietary protocol family derived from the Xerox Corporation's Xerox Network Systems (XNS) protocols. VINES uses a client/server architecture in which clients request certain services, such as file and printer access, from servers. This article provides a summary of VINES communications protocols. The VINES protocol stack is illustrated in  Figure: The VINES Protocol Stack Consists of Five Separate Levels . Guide Contents Internetworking Basics LAN Technologies WAN Technologies Internet Protocols Bridging and Switching Routing Network Management Voice/Data Integration Technologies Wireless Technologies Cable Access Technologies Dial-up Technology Security Technologies Quality of Service Networking Network Caching Technologies IBM Network Management Multiservice Access Technologies Contents   [ hide ] 1   Figure:...

Running Openstack into Linux Containers (LXC on Debian)

The devstack project is an interesting tool to deploy a complete OpenStack development environment from source code. I’ve been using it from one year in my development activities on Neutron. For that, I set up an isolated VM (libvirt or VirtalBox through Vagrant), but I found that environment isn’t very efficient (too slow and uses lot of memory). Furthermore, when you developing network stack, you need to set up more than one node (three is a good number to test network virtualization). This is why I try to set up that environment into containers (LXC). Setup LXC environment I work on Debian testing release (Jessie) which uses the kernel 3.11 release. devstack supports Debian distribution thanks to the  Emilien Macchi’s commit . I use LXC experimental Debian package to be able to use the new template ‘lxc-debconfig’ which is more efficient when deploying a Debian container and; it can use preseed config file to set up the container: $ sudo 'deb http://ftp.debian.org/debian ...