Unlocking the Cloud: A Glimpse into Computer Network Essentials for Seamless Cloud Computing
Jeevitha M
AWS Cloud Captain'24 ??| AWS Cloud Club Certified Instructor | Software Engineer @ Blackstraw.AI | AI & Cloud Enthusiast ?? | SIH'23 Finalist | Public Speaker ??| Azure x 3??
Why Computer Networks are Important ?
History of Networks
1960's - ARPANET - Researchers developed the first host-to-host protocols, which eventually evolved into the Transmission Control Protocol (TCP) and Internet Protocol (IP) stack.
1970's - Ethernet and LAN [Local Area Network]
1980's - WAN [Wide Area Network]
1990's - Internet Revolution [ World Wide Web ]
2000's - Wireless Network and Mobile Connectivity
2010's - Cloud Computing and Virtualization
2020's - 5G & IoT and Network Expansion
What is Computer Network ?
A computer network is a collection of interconnected devices, such as computers, servers, routers, switches, and other hardware, that are linked together to enable communication and resource sharing.
The main reason to create a Network is to share Data so loss of data don't occur and also the resources used would be less. Resource Sharing, Communication , Data Transfer and Storage, Remote Access and Mobility, Centralized Management and Control, Cost Efficiency, Internet Access and Connectivity, Entertainment and Media Sharing, Research and Innovation are the key features.
Network Components and Terminologies
Some of the network-related terminologies you will have to encounter is as follows:
Types of Networks
Based on Geographical Area
Networks can be named and classified into following types :
Based on the host role
Network can be classified into 2 types namely,
2. Peer-to-Peer (P2P) Network:
3. Workgroup Network:
4. Domain Network:
5. Clientless Network:
6. Hybrid Network:
7. Centralized Network:
8. Decentralized Network:
Network Topology and Types
Network topology refers to the way devices are connected in a computer network. The choice of topology depends on factors like the size of the network, the reliability needed, and the cost involved. Network topology can be classified into two main categories: physical topology and logical topology. They are as follows :
Physical topology refers to the actual physical layout or arrangement of devices and cables in a network. It describes how devices are physically connected to each other and how data flows between them.Common types of physical topologies include:
The physical topology determines factors such as the length of cables, the number of connections, and the overall layout of the network.
2. Logical Topology:
Logical topology refers to how data flows in a network from one device to another, regardless of the physical layout. It focuses on the path that data takes as it travels between devices.Common types of logical topologies include:
Logical topology determines how devices communicate and share data. It may involve protocols and rules that dictate how data is transmitted and received.
Server and its various types
A server is like a central hub that serves information or resources to other devices in a network. It responds to requests from clients, which can be computers, smartphones, or other devices, by providing them with the data or services they need. It's like a waiter at a restaurant taking orders from customers and bringing them the food they asked for.
领英推荐
Different Types of Servers:
There are several types of servers, each designed to perform specific tasks or provide particular services. Here are a few common types:
Address and its various types
In a computer network, an address is a unique identifier assigned to a device or resource to enable proper communication and data exchange. Addresses play a crucial role in ensuring that data reaches the intended destination within the network. There are different types of addresses used in networking, each serving a specific purpose :
1. MAC Address (Media Access Control Address) :
A MAC address is a hardware address assigned to a network interface card (NIC) of a device. It is a globally unique identifier that identifies the device's physical connection on a local network. MAC addresses are used at the data link layer of the OSI model and are primarily associated with Ethernet networks.
Example: Suppose you have a laptop with a MAC address like "00:1A:2B:3C:4D:5E." This address uniquely identifies your laptop's network adapter on the local network.
2. IP Address (Internet Protocol Address) :
An IP address is a numerical label assigned to each device connected to a network that uses the Internet Protocol for communication. IP addresses allow devices to be located and identified on a network or the internet. There are two main types of IP addresses: IPv4 (32-bit) and IPv6 (128-bit).
Example: An IPv4 address like "192.168.1.10" identifies a device within a local network, while an IPv6 address like "2001:0db8:85a3:0000:0000:8a2e:0370:7334" provides a more extensive addressing space for the internet.
3. Domain Name :
A domain name is a human-readable address used to identify resources on the internet. Domain names are used to translate user-friendly names (like www.example.com) into IP addresses, allowing users to access websites and services.
Example: The domain name "www.google.com" is used to access Google's search engine. When you enter this domain name in a web browser, it is translated to the corresponding IP address to reach the Google server.
4. Port Number :
A port number is a 16-bit address used to identify specific processes or services running on a device within a network. Port numbers allow data to be directed to the appropriate application or service on a device.
Example: In a web browser, when you enter "https://www.example.com:80," the ":80" part refers to the port number. Port 80 is commonly used for HTTP (Hypertext Transfer Protocol) traffic, which is used for web communication.
5. URL (Uniform Resource Locator) :
A URL is a web address used to identify and access resources on the internet. It typically includes the protocol (such as "http" or "https"), the domain name, and often a path to a specific resource.
Example: The URL "https://www.openai.com/blog/introducing-gpt-3-5-turbo/" points to a specific blog post on OpenAI's website.
6. E-mail Address :
An e-mail address is used to identify a recipient's mailbox within an email system. It consists of a user name and a domain name.
Example: "[email protected]" is an e-mail address where "jeevi.m" is the user name, and "example.com" is the domain.
These various types of addresses help devices and services communicate effectively within a network and across the internet, ensuring that data is correctly routed to its intended destination.
More about OSI Model Layers , DoD Model and TCP/IP Address
Certainly, let's delve into these networking concepts: the OSI model layers, the DoD model, and TCP/IP addresses.
1. OSI Model Layers :
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes networking functions and divides them into seven layers. Each layer has a specific role and interacts with adjacent layers to facilitate communication between devices in a network. The layers, from bottom to top, are:
Physical Layer : Deals with the physical medium of transmission, such as cables and connectors. It handles electrical signals and their physical characteristics.
Data Link Layer : Focuses on data framing, error detection, and MAC (Media Access Control) addressing. Ethernet switches operate at this layer.
Network Layer : Provides routing and logical addressing (IP addresses). Routers operate at this layer to forward packets between different networks.
Transport Layer : Ensures end-to-end communication, flow control, and error checking. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate here.
Session Layer : Manages sessions and dialog control between applications, establishing, maintaining, and terminating connections.
Presentation Layer : Deals with data translation, compression, and encryption to ensure compatibility between different systems.
Application Layer : Provides network services directly to end-users and applications, like web browsing, email, and file transfer.
2. DoD Model :
The DoD (Department of Defense) model, also known as the Internet protocol suite, is a four-layer networking model used in the early days of the ARPANET (precursor to the internet). The layers are:
Network Interface Layer : Similar to the OSI's Physical and Data Link layers, this layer handles hardware addressing and framing.
Internet Layer : Corresponds to the OSI's Network layer and focuses on routing and logical addressing (IP addresses).
Transport Layer : Equivalent to the OSI's Transport layer, this layer ensures reliable communication and data flow control.
Application Layer : This layer covers everything from session to application in the OSI model, handling user-level applications and services.
3. TCP/IP Address :
TCP/IP (Transmission Control Protocol/Internet Protocol) is the foundational suite of protocols that powers the internet. It uses IP addresses to identify devices and facilitate data exchange. IP addresses come in two main versions: IPv4 and IPv6.
IPv4 Address : An IPv4 address consists of four groups of numbers separated by periods, like "192.168.0.1." Each group represents an 8-bit segment, resulting in a total of 32 bits. IPv4 addresses were the initial standard and are still widely used, but they are becoming scarce due to the growth of devices on the internet.
IPv6 Address : With the exhaustion of IPv4 addresses, IPv6 was introduced. IPv6 addresses are 128 bits long, represented as eight groups of hexadecimal digits separated by colons, such as "2001:0db8:85a3:0000:0000:8a2e:0370:7334." IPv6 provides a significantly larger address space to accommodate the expanding number of devices connected to the internet.
TCP/IP addressing allows devices to locate and communicate with each other across networks and the internet. IP addresses, along with other TCP/IP protocols, form the backbone of modern networking.
In conclusion, this article has provided you with a comprehensive understanding of computer networks. Armed with this knowledge, you are well-equipped to explore further and delve into more specialized aspects of computer networking. Happy networking!