<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sahithya Priya</title>
    <description>The latest articles on DEV Community by Sahithya Priya (@iamsahithya).</description>
    <link>https://dev.to/iamsahithya</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2896584%2Faf732527-5b63-4bce-a017-83f549ccea0f.png</url>
      <title>DEV Community: Sahithya Priya</title>
      <link>https://dev.to/iamsahithya</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/iamsahithya"/>
    <language>en</language>
    <item>
      <title>Periodic table of DevSecOps</title>
      <dc:creator>Sahithya Priya</dc:creator>
      <pubDate>Sat, 22 Mar 2025 03:38:44 +0000</pubDate>
      <link>https://dev.to/iamsahithya/periodic-table-of-devsecops-cak</link>
      <guid>https://dev.to/iamsahithya/periodic-table-of-devsecops-cak</guid>
      <description>&lt;p&gt;Periodic table of DevSecOps provides you with the clear understanding and categorization of tools for DevOps practitioners. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fda5853ep0zijf5qiyvxh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fda5853ep0zijf5qiyvxh.png" alt="Image description" width="800" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These are the list of tools which are a must for DevOps Practitioners to begin with.&lt;br&gt;
&lt;strong&gt;Public Cloud&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS&lt;/li&gt;
&lt;li&gt;Azure&lt;/li&gt;
&lt;li&gt;Google&lt;/li&gt;
&lt;li&gt;Open Stack&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Source code management&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Git&lt;/li&gt;
&lt;li&gt;Github&lt;/li&gt;
&lt;li&gt;BitBucket&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Configuration Automation&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;RedHat Ansible/ Chef/ Puppet&lt;/li&gt;
&lt;li&gt;Terraform/ AWS CloudFormation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Container Orchestration&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Docker&lt;/li&gt;
&lt;li&gt;Kubernetes&lt;/li&gt;
&lt;li&gt;Amazon ECS&lt;/li&gt;
&lt;li&gt;Amazon EKS/Azure AKS/Google GKE&lt;/li&gt;
&lt;li&gt;Helm&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Continous Integration&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Jenkins&lt;/li&gt;
&lt;li&gt;Github Actions&lt;/li&gt;
&lt;li&gt;Gitlab CI/ Travis CI/ Circle CI&lt;/li&gt;
&lt;li&gt;AWS CodeBuild/ Azure DevOps Code&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Deployment&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS CodeDeploy&lt;/li&gt;
&lt;li&gt;Azure DevOps Pipelines&lt;/li&gt;
&lt;li&gt;Flux CD/ Argo CD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Container Service&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure functions&lt;/li&gt;
&lt;li&gt;AWS Lambda&lt;/li&gt;
&lt;li&gt;Google Firebase&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Release Management&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS CodePipeline&lt;/li&gt;
&lt;li&gt;UrbanCode Release&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Observability&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Prometheus, Grafana&lt;/li&gt;
&lt;li&gt;ELK/ EFK&lt;/li&gt;
&lt;li&gt;OpenTelemetry&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Security&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hashicorp Vault&lt;/li&gt;
&lt;li&gt;SonarQube&lt;/li&gt;
&lt;li&gt;Aqua Security&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Scripting&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shell Scripting&lt;/li&gt;
&lt;li&gt;Python&lt;/li&gt;
&lt;li&gt;Go&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are few tools to be highlighted among many. Along with these we need clear understanding of concepts on OS, Networking to better implement the DevOps practices. &lt;/p&gt;

</description>
    </item>
    <item>
      <title>Computer Networking Concepts for Devops</title>
      <dc:creator>Sahithya Priya</dc:creator>
      <pubDate>Tue, 25 Feb 2025 15:20:50 +0000</pubDate>
      <link>https://dev.to/iamsahithya/computer-networking-concepts-for-devops-5514</link>
      <guid>https://dev.to/iamsahithya/computer-networking-concepts-for-devops-5514</guid>
      <description>&lt;p&gt;Why does devops engineer need computer networking concepts?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;To ensure effective network configurations in cloud and on-premise environments.&lt;/li&gt;
&lt;li&gt;Troubleshoot network outages and latency issues effectively.&lt;/li&gt;
&lt;li&gt;Secure network traffic and configure access control.&lt;/li&gt;
&lt;li&gt;Automate network management as part of IaC.&lt;/li&gt;
&lt;li&gt;Support the scaling and performance of distributed systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here are few concepts to give a brief understanding of computer networks:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Network Types&lt;/li&gt;
&lt;li&gt;Network Devices&lt;/li&gt;
&lt;li&gt;OSI Model&lt;/li&gt;
&lt;li&gt;TCP/IP Model&lt;/li&gt;
&lt;li&gt;Network Protocols&lt;/li&gt;
&lt;li&gt;Ports&lt;/li&gt;
&lt;li&gt;Subnetting, CIDR&lt;/li&gt;
&lt;li&gt;Routing&lt;/li&gt;
&lt;li&gt;DNS&lt;/li&gt;
&lt;li&gt;VPN
11.Networking tools&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A &lt;strong&gt;Computer Network&lt;/strong&gt; is a collection of devices where two or more devices can communicate with each other by sharing data. &lt;/p&gt;

&lt;h2&gt;
  
  
  Network Types
&lt;/h2&gt;

&lt;p&gt;Networks classified based on the number of devices connected and geographical extent are PAN, LAN, MAN, WAN, WLAN, VPN.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Private Area Network(PAN)&lt;/strong&gt;: A type of network designed to connect devices within a short range. Best suitable for you personal devices like smart phones, laptops, wearables can be connected.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Local Area Network(LAN)&lt;/strong&gt;: A type of network that connects computers through a common communication path within a limited area. Best suitable for home, school, college, office setup.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Metropolitan area network(MAN)&lt;/strong&gt;: A type of network the connects systems over a geographical distance through a shared communication path. Best suitable for towns, cities etc.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wide Area Network(WAN)&lt;/strong&gt;: A type of network the connects devices over a large geographical distances through a shared communication path. Example-Internet.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wireless Local Area Network(WLAN)&lt;/strong&gt;: A type of local area network which connects devices using wireless communication technologies. Example- wifi.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Virtual Private Network(VPN)&lt;/strong&gt;: A type of network that allows you to create a secure and private network over internet or public network. This provides security, anonymity, access restriction etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Network Devices
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcxgobbdbdj42rjwcmxzr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcxgobbdbdj42rjwcmxzr.jpg" alt="Image description" width="270" height="186"&gt;&lt;/a&gt;&lt;br&gt;
Network devices allows hardware on a computer network to communicate with each other.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Modems&lt;/strong&gt;: A network device that is used to convert digital signal into analog signals and demodulates them at the recieving location.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Firewalls&lt;/strong&gt;: A security device that is designed to protect a computer network from unauthorized access or attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Repeater&lt;/strong&gt;: A network device that amplifies the signal and retransmits it to extent the range of the signal.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hub&lt;/strong&gt;: It is a multiport repeater which connects multiple wires coming from different branches.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bridge&lt;/strong&gt;: A bridge is a repeater with add on the fuctionality of filtering content by reading the MAC address of the source and destination.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Switch&lt;/strong&gt;: It is a multiport bridge with a buffer that can boost its efficiency and performance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Router&lt;/strong&gt;: It is a switch like device that routes the data based on the IP addresses.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Gateway&lt;/strong&gt;: It is a passage to connect different networks often with different protocols.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  OSI Model
&lt;/h2&gt;

&lt;p&gt;OSI(Open Sytem Interaction) explains how different computer systems communicate over a network.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpk2tn4ok6waucse850jo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpk2tn4ok6waucse850jo.png" alt="Image description" width="800" height="574"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Application Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Provides an interface to send and recieve data from user.&lt;/li&gt;
&lt;li&gt;Provides different protocols like HTTP, FTP, SMTP etc&lt;/li&gt;
&lt;li&gt;It helps in establishment, maintenance and termination of communication sessions between applications.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Presentation Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Data translation&lt;/li&gt;
&lt;li&gt;Data encryption for security&lt;/li&gt;
&lt;li&gt;Data compression for faster communication&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Session Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Create and manage sessions between systems&lt;/li&gt;
&lt;li&gt;Adds checkpoints to ensure proper data transmission&lt;/li&gt;
&lt;li&gt;Ensures authentication and authorization of data transfer&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Transport Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Converts data into segments. A header is associated with each segment where header helps in service point addressing.&lt;/li&gt;
&lt;li&gt;Flow Control&lt;/li&gt;
&lt;li&gt;Error Control&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Transmits data from one host to another in the form of packets.&lt;/li&gt;
&lt;li&gt;Routing the data packets through best possible routes&lt;/li&gt;
&lt;li&gt;Logical addressing the hosts through unique addressing i.e IP Addressing&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data Link Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;converts data packets into frames&lt;/li&gt;
&lt;li&gt;Error detection using parity check, Checksum, CRC&lt;/li&gt;
&lt;li&gt;Error correction&lt;/li&gt;
&lt;li&gt;Flow Control&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Physical Layer&lt;/strong&gt;: It's functions are

&lt;ul&gt;
&lt;li&gt;Bit-by-bit transmission&lt;/li&gt;
&lt;li&gt;Encoding and decoding of a signal&lt;/li&gt;
&lt;li&gt;Data rate control&lt;/li&gt;
&lt;li&gt;Decides data rate, mode of communication(simplex, half duplex, full duplex)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Physical Layer, Datalink Layer, Network Layer, Transport layer together are called &lt;em&gt;hardware layers&lt;/em&gt;.&lt;br&gt;
Application layer, presentation layer, Session layer together are called &lt;em&gt;software layers&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  TCP/IP model
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22a1wp1xv8jw6cn9cvcx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22a1wp1xv8jw6cn9cvcx.png" alt="Image description" width="800" height="637"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It is more simple and practical model with 4 layers which is why it is extensively used in real world networks.&lt;br&gt;
Layers of TCP/IP models&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Application Layer&lt;/strong&gt;: This layer deals with data representation, encoding and dialog control issues.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Transport layer&lt;/strong&gt;: This layer ensures reliable data, error correction, flow control and segmentation of data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Internet Layer&lt;/strong&gt;: This layer is responsible for routing data packets across different networks and ensuring they reach their destination.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Access layer&lt;/strong&gt;: This layer defines how data is formatted, addressed, and transmitted over various types of network. &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Network Protocols
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;TCP Protocol&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It is responsible for breaking down a stream of bytes into segments and reconnecting them at the other end, retransmitting whatever might be lost and also organizing the segments in the correct order. &lt;/li&gt;
&lt;li&gt;It is connection-oriented.&lt;/li&gt;
&lt;li&gt;It helps in flow and error control&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy41sic0yigrftblhhf2r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy41sic0yigrftblhhf2r.png" alt="Image description" width="373" height="135"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;UDP Protocol&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unlike TCP it is used when you can establish an unreliable and connection less network.
-Helps to establish low latency communication.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzqa9nhe1ycr35s6rk4n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzqa9nhe1ycr35s6rk4n.png" alt="Image description" width="386" height="131"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;choose TCP if you need reliable, sequence transmission, data integrity.&lt;br&gt;
choose UDP if you need low latency, low overhead, less processing. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP protocol&lt;/strong&gt;:&lt;br&gt;
Establishes communication for devices over internet and ensures that data reaches the correct destination using unique set of number known as ip address.&lt;br&gt;
IP address for source and destination.&lt;br&gt;
Routing tables to direct data from source and destination.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;IPv4&lt;/em&gt; - It is an internet protocol used to identify devices. It provides a unique 32-bit address for each device. Used for routing data between devices on local networks and across the internet.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;IPv6&lt;/em&gt; - It is an internet protocol with a 128-bit address and hexa-decimal format separated by colon(:). Includes built-in security features such as IPsec for encryption and authentication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gmcdidn7r4r1ar3ry0y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gmcdidn7r4r1ar3ry0y.png" alt="Image description" width="800" height="234"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Ports:
&lt;/h2&gt;

&lt;p&gt;Ports are communication endpoints that allow different services on a device to send and recieve data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmbdhqs68fgsn09t9o1m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnmbdhqs68fgsn09t9o1m.png" alt="Image description" width="800" height="510"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Subnetting:
&lt;/h2&gt;

&lt;p&gt;It is a technique to divide a larger IP network into smaller, more manageable sub-networks. &lt;br&gt;
Class A: 8-bit network ID, 24-bit host ID.&lt;br&gt;
Class B: 16-bit network ID, 16-bit host ID.&lt;br&gt;
Class C: 24-bit network ID, 8-bit host ID.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CIDR&lt;/strong&gt;: Classless Inter Domain Routing.&lt;br&gt;
A method for allocating IP address&lt;br&gt;
10.0.0.0/24&lt;br&gt;
10.0.0.0 - IP address&lt;br&gt;
24 - subnet mask(represents how many bits can change in ip)&lt;br&gt;
allocates 256 ips&lt;/p&gt;

&lt;h2&gt;
  
  
  Routing:
&lt;/h2&gt;

&lt;p&gt;It is the process of path selection in any network(best path for communication is choosen) &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Routing creates efficiency&lt;/li&gt;
&lt;li&gt;Path determination&lt;/li&gt;
&lt;li&gt;Data forwarding&lt;/li&gt;
&lt;li&gt;Load balancing
Types of routing:&lt;/li&gt;
&lt;li&gt;Static routing: In this type of routing the routing table is updated by the network administrator manually and routing decisions are not based on topology or condition of network.&lt;/li&gt;
&lt;li&gt;Dynamic routing: In this type of routing the routing table is automatically updated using routing protocols. In response to changes in condition or topology of network, router adds a new route in the routing table.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Domain Name System(DNS):
&lt;/h2&gt;

&lt;p&gt;It translates human readable domain names to machine readable IP address.helps find mail servers, balances web traffic among&lt;br&gt;
servers, redirects requests, performs reverse lookups, and speeds up responses through caching.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2kew7g8gijpff3ysg2d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2kew7g8gijpff3ysg2d.png" alt="Image description" width="800" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Virtual Private Network(VPN):
&lt;/h2&gt;

&lt;p&gt;A secure tunnel to your internet connection&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A strong security protocol&lt;/li&gt;
&lt;li&gt;you get to control who sees what you're doing&lt;/li&gt;
&lt;li&gt;Work regardless of location&lt;/li&gt;
&lt;li&gt;Limitless internet&lt;/li&gt;
&lt;li&gt;A smoother connection
VPN encrypts your data and routes it through a server.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Networking Tools
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Ping: To check if a host is reachable or not

&lt;ul&gt;
&lt;li&gt;Example: ping example.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Traceroute: Traces the path that data takes from one device to another across the network.

&lt;ul&gt;
&lt;li&gt;Example: traceroute example.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;ifconfig: Displays or configures network interface settings on a device.

&lt;ul&gt;
&lt;li&gt;Example: ifconfig&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Netstat: To display active network connections, routing tables etc

&lt;ul&gt;
&lt;li&gt;Example: netstat -a&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Nmap: A network scanning tool used to discover hosts and services on a network.

&lt;ul&gt;
&lt;li&gt;Example: nmap -p 1-1000 target&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;iperf: Measures network bandwidth between two devices.

&lt;ul&gt;
&lt;li&gt;Example: iperf -s(server) , iperf -c (client)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;wireshark: A network protocol analyzer that captures and inspects network traffic in real-time&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;host: To query DNS servers about domain info.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Example: host example.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;tcpdump:  A command-line packet analyzer used to capture and analyze network traffic.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dig(domain information groper): To query DNS servers about host addresses, mail exchanges etc&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Example: dig example.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>devops</category>
      <category>networking</category>
      <category>cloud</category>
      <category>computernetworking</category>
    </item>
  </channel>
</rss>
