Skip to main content

Networking: DevOps pre-state learning


TCP

Internet Protocol (IP) is the address system of the internet that basically deliver packets of information from source to destination device. Every device has an IP address that uniquely identifies it and enables it to communicate with and exchange data with other devices connected to the internet.

IP

Transmission Control Protocol handles packet ordering or error checking when information deliver information from source to destination device. TCP establishes and maintains a connection between applications or devices until they finish exchanging data. 

DNS

Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names. DNS translates domain names to IP addresses so browsers can load Internet resources. It contains the public IP addresses associated with the names of the websites an IP address brings a user to.

HTTP/HTTPS

HTTP stands for Hypertext Transfer Protocol, and it is a protocol – or a prescribed order and syntax for presenting information – used for transferring data over a network.  There are two main kinds of HTTP messages: requests and responses.

HTTPS is basically Secured Hypertext Transfer Protocol, uses TLS (or SSL) to encrypt HTTP requests and responses.

VPN

A VPN, or Virtual Private Network, is a tool that encrypts your internet traffic and hides your IP (Internet Protocol) address to ensure a secure and private connection to the internet. This hides your online activities from third parties snooping around and collecting data.

Load Balancers

Load balancing is the practice of distributing computational workloads between two or more computers. It reduces the strain on each server and makes the servers more efficient, speeding up performance and reducing latency.

Firewalls

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. It is wall between a private internal network and the public Internet.

Network Protocols

In networking, a protocol is a set of rules for formatting and processing data. This is basically rules and standards that enable computers to communicate with each other and share data. 

Subnetting

A subnet, or subnetwork, is a network inside a network. Through subnetting, network traffic can travel a shorter distance without passing through unnecessary routers to reach its destination.  Subnets provides each group of devices have their own space to communicate, that ultimately helps network to work easily.

Comments

Popular posts from this blog

Poridhi: Stacks & Queues

  Stacks & Queues related problems: This collection of solutions tackles three classic problems often encountered in technical interviews and competitive programming. The Valid Parentheses problem checks whether a string has properly matched and ordered brackets using a stack. The Sliding Window Maximum efficiently finds the maximum value in every window of size k across an array using a deque, a popular sliding window pattern that ensures optimal performance. The Stock Span Problem simulates a real-world stock analysis scenario and calculates the number of consecutive days before today for which the stock price was less than or equal to today's, also utilizing a stack for efficient computation. These problems test understanding of stacks, queues, and sliding window techniques. ✅ Valid Parentheses def isValid ( s: str ) -> bool : stack = [] mapping = { ')' : '(' , '}' : '{' , ']' : '[' } for char in s: ...

Data Recovery: DevOps pre-state learning

  Data Backup Data backup is the practice of copying data from a primary to a secondary location, to protect it in case of equipment failure, cyberattack, natural disaster or other data loss events. This can include documents, media files, configuration files, machine images, operating systems, and registry files. Essentially, any data that we want to preserve can be stored as backup data. Data Restore Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location. A restore is performed to return data that has been lost, stolen or damaged to its original condition or to move data to a new location. Pilot Light A pilot light approach minimizes the ongoing cost of disaster recovery by minimizing the active resources, and simplifies recovery at the time of a disaster because the core infrastructure requirements are all in place. Warm Standby The warm standby approach involves ensuring that there is a scaled down, ...

Poridhi: Basic Programming & Math

Basic Programming and math related problems: Extracting digits means breaking a number like 1234 into [1, 2, 3, 4], often using string conversion or modulo/division. Counting digits involves finding how many digits are in a number using length of a string or repeated division. Reversing an integer flips its digits (e.g., 123 becomes 321), with care for signs and 32-bit limits. A palindrome number reads the same forward and backward, often checked by comparing the original and reversed number. Armstrong numbers are those equal to the sum of their digits each raised to the number of digits, like 153 = 1³ + 5³ + 3³. To find the sum of all divisors of a number, loop through integers and check which divide the number without a remainder. Prime numbers are only divisible by 1 and themselves, and checking up to the square root is efficient. GCD, the greatest common divisor of two numbers, can be found using a simple loop or more efficiently with the Euclidean algorithm, which uses repeated mo...