<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Bamidele Kolawole</title>
    <description>The latest articles on DEV Community by Bamidele Kolawole (@cloudfromide).</description>
    <link>https://dev.to/cloudfromide</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2018776%2Ffde641ad-09f4-446b-afe2-d4d0ef66159f.png</url>
      <title>DEV Community: Bamidele Kolawole</title>
      <link>https://dev.to/cloudfromide</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cloudfromide"/>
    <language>en</language>
    <item>
      <title>Evolution of IP Addresses</title>
      <dc:creator>Bamidele Kolawole</dc:creator>
      <pubDate>Mon, 07 Oct 2024 09:25:30 +0000</pubDate>
      <link>https://dev.to/cloudfromide/evolution-of-ip-addresses-2o1o</link>
      <guid>https://dev.to/cloudfromide/evolution-of-ip-addresses-2o1o</guid>
      <description>&lt;p&gt;Imagine sending a letter to a friend. You need their address to ensure it reaches them. IP addresses work similarly, connecting devices on the internet.&lt;/p&gt;

&lt;p&gt;What's an IP Address?&lt;/p&gt;

&lt;p&gt;An IP address is a unique identifier helping devices communicate online. It's like a digital street address.&lt;/p&gt;

&lt;p&gt;Why Do We Need IP Addresses?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your laptop to access websites&lt;/li&gt;
&lt;li&gt;Your smartphone to stream videos&lt;/li&gt;
&lt;li&gt;Your smart home devices to connect
IP Address Structure&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An IP address has four numbers separated by dots (XXX.XXX.XXX.XXX). Think of it like a zip code, street number, building number, and apartment number.&lt;/p&gt;

&lt;p&gt;In the past, IP addresses were categorized into five classes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Class A: Large networks &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Class B: Medium networks &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Class C: Small networks &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Class D: Multicast addresses &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Class E: Reserved for future use&lt;br&gt;
The Evolution of IP Addresses: IPv4 to IPv6&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As the internet grew, IPv4 addresses became scarce. IPv6 addresses provide a much larger address space, ensuring:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;More devices can connect&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Improved security&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Demystifying Cloud networking Fundamentals</title>
      <dc:creator>Bamidele Kolawole</dc:creator>
      <pubDate>Thu, 03 Oct 2024 09:14:24 +0000</pubDate>
      <link>https://dev.to/cloudfromide/demystifying-cloud-networking-fundamentals-1g1a</link>
      <guid>https://dev.to/cloudfromide/demystifying-cloud-networking-fundamentals-1g1a</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8s561otp9abb8li8smex.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8s561otp9abb8li8smex.png" alt="Image description" width="700" height="394"&gt;&lt;/a&gt;I will be using a Coffee shop as a scenario to simplify all what Cloud networking is. Imagine you're at a coffee shop, surrounded by friends, colleagues, and strangers. You all need to communicate, share information, and access resources. That's essentially what a computer network does!&lt;/p&gt;

&lt;p&gt;What is a Computer Network?&lt;br&gt;
A computer network is a system connecting two or more computing devices to enable communication and resource sharing. Think of it like a group chat where devices exchange information seamlessly.&lt;/p&gt;

&lt;p&gt;We have the Hardware Components and the hardware components are like the coffee shop's infrastructure:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Routers (baristas) direct information to the right devices.&lt;/li&gt;
&lt;li&gt;Switches (managers) ensure efficient communication.&lt;/li&gt;
&lt;li&gt;Network Interface Cards (NICs) (your laptop's WiFi adapter) connect devices to the network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Software Components are like the coffee shop's services:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operating Systems (managers) manage device connections.&lt;/li&gt;
&lt;li&gt;Protocol Suites (communication guidelines) ensure seamless information exchange.&lt;/li&gt;
&lt;li&gt;Network Security Software (bouncers) protect the network from unauthorized access.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Middleware components are like the coffee shop's amenities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Firewalls (security cameras) monitor and control network traffic.&lt;/li&gt;
&lt;li&gt;Load Balancers (efficient staff) distribute workload for optimal performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Types of Computer Networks&lt;br&gt;
Just like different social gatherings, computer networks come in various forms:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Personal Area Network (PAN): A small network for personal devices (like your phone and laptop).&lt;/li&gt;
&lt;li&gt;Local Area Network (LAN): A network within a limited geographical area (like your home or office).&lt;/li&gt;
&lt;li&gt;Wireless Network (WLAN): A network connecting devices wirelessly (like your phone's WiFi).&lt;/li&gt;
&lt;li&gt;Metropolitan Area Network (MAN): A network covering a larger geographical area (like a city).&lt;/li&gt;
&lt;li&gt;Wide Area Network (WAN): A network spanning multiple geographical locations (like a global company).&lt;/li&gt;
&lt;li&gt;Storage Area Network (SAN): A network dedicated to storage devices (like a cloud storage system).&lt;/li&gt;
&lt;li&gt;Virtual Private Network (VPN): A secure, encrypted network within a larger network (like a secure online meeting room).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In conclusion, understanding cloud networking fundamentals is crucial for effective communication and resource sharing in the cloud. What's your favorite networking concept?&lt;/p&gt;

&lt;p&gt;Photo Credit JAVATPOINT JAVATPOINT&lt;/p&gt;

</description>
      <category>cloudcomputing</category>
      <category>cloud</category>
      <category>cloudnetworking</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Navigating Azure Hierarchy</title>
      <dc:creator>Bamidele Kolawole</dc:creator>
      <pubDate>Sat, 28 Sep 2024 17:20:47 +0000</pubDate>
      <link>https://dev.to/cloudfromide/navigating-azure-hierarchy-3ojm</link>
      <guid>https://dev.to/cloudfromide/navigating-azure-hierarchy-3ojm</guid>
      <description>&lt;p&gt;As part of my cloud engineering journey, I've been diving deep into Azure architecture, and I'd love to share my experience with you.&lt;/p&gt;

&lt;p&gt;Recently, I worked on designing an Azure hierarchy for Beysville, and I'm excited to walk you through it.&lt;/p&gt;

&lt;p&gt;Let's break it down:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Root (Tenant): The foundation of our Azure setup is the tenant, which represents Beysville's unique identity - beysville.online.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Management Groups: These groups help organize subscriptions and resource groups, enabling efficient management and governance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Subscriptions: We created separate subscriptions for different departments, ensuring isolated environments for development, testing, and production.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Resource Groups: Each subscription contains resource groups, which hold related resources (e.g., VMs, storage, networks).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Resources: Finally, we have individual resources, such as virtual machines, databases, and storage containers&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Designing this hierarchy for Beysville taught me:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The importance of scalable architecture&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Effective resource organization and governance&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Seamless collaboration between departments&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>cloudcomputing</category>
      <category>hierarchy</category>
      <category>azure</category>
    </item>
    <item>
      <title>Identity Management Lifecycle</title>
      <dc:creator>Bamidele Kolawole</dc:creator>
      <pubDate>Wed, 25 Sep 2024 14:37:18 +0000</pubDate>
      <link>https://dev.to/cloudfromide/identity-management-lifecycle-1n79</link>
      <guid>https://dev.to/cloudfromide/identity-management-lifecycle-1n79</guid>
      <description>&lt;p&gt;Managing identities in the cloud is crucial.....&lt;/p&gt;

&lt;p&gt;Think of it as a key to your home. You need to ensure that only the right people have access. This journey begins with Provisioning, where users are granted access based on their roles. Next comes Authentication, verifying who they are, much like showing an ID at the door. Then we have Authorization, determining what they can do inside, similar to having different keys for different rooms. Self-Services empower users to manage their own credentials, akin to changing your locks when you lose a key. Password Management ensures these keys are strong and secure, preventing unauthorized entry. Governance oversees compliance and policies, ensuring everyone plays by the rules. Finally, Deprovisioning is like reclaiming keys when someone leaves, safeguarding your space from potential threats.&lt;/p&gt;

</description>
      <category>cloudcomputing</category>
      <category>idm</category>
      <category>idms</category>
      <category>iam</category>
    </item>
    <item>
      <title>Unlocking the Internet's Address Book: DNS Roots Explained!</title>
      <dc:creator>Bamidele Kolawole</dc:creator>
      <pubDate>Tue, 24 Sep 2024 08:34:33 +0000</pubDate>
      <link>https://dev.to/cloudfromide/unlocking-the-internets-address-book-dns-roots-explained-46cd</link>
      <guid>https://dev.to/cloudfromide/unlocking-the-internets-address-book-dns-roots-explained-46cd</guid>
      <description>&lt;p&gt;Have you ever wondered how your browser finds websites? It's like magic, right?&lt;/p&gt;

&lt;p&gt;Well, today I'll demystify the magic behind DNS roots!&lt;/p&gt;

&lt;p&gt;What are DNS Roots?&lt;/p&gt;

&lt;p&gt;Imagine the internet as a massive phonebook. DNS (Domain Name System) roots are like the master directories that help your browser find websites. They're the starting point for every online search.&lt;/p&gt;

&lt;p&gt;How DNS Roots Work&lt;/p&gt;

&lt;p&gt;When you type a website's address, your browser sends a request to the DNS root servers. These roots direct your browser to the next level of DNS servers, repeating the process until your browser reaches the website's hosting server.&lt;/p&gt;

&lt;p&gt;Why DNS Roots Matter&lt;/p&gt;

&lt;p&gt;DNS roots ensure website accessibility, enable online communication, and protect against cyber threats. They're the internet's GPS, helping your browser navigate to websites quickly and securely.&lt;/p&gt;

&lt;p&gt;Hope this explanation helped! Share your thoughts on DNS roots in the comments below!&lt;/p&gt;

&lt;p&gt;Photo Credit Cloudflare&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>dns</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
