<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Keerthan Shetty</title>
    <description>The latest articles on DEV Community by Keerthan Shetty (@keerthan0521).</description>
    <link>https://dev.to/keerthan0521</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F938795%2F0030daa7-3699-4915-b00d-cac9791580a8.jpeg</url>
      <title>DEV Community: Keerthan Shetty</title>
      <link>https://dev.to/keerthan0521</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/keerthan0521"/>
    <language>en</language>
    <item>
      <title>Azure fundamentals concepts - AZ 900</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Wed, 18 Oct 2023 13:03:31 +0000</pubDate>
      <link>https://dev.to/keerthan0521/azure-fundamentals-concepts-az-900-2pp7</link>
      <guid>https://dev.to/keerthan0521/azure-fundamentals-concepts-az-900-2pp7</guid>
      <description>&lt;p&gt;&lt;strong&gt;Cloud Concept&lt;/strong&gt;&lt;br&gt;
This part contains general knowledge about cloud computing e.g. what are the benefits of cloud, the differences types of cloud service offering, and the differences in cloud deployment models.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technological benefits of cloud&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;High Availability&lt;/em&gt; — The major cloud providers (Azure, AWS, GCP) have multiple data centers spread around throughout the world. Data and code stored in the cloud are copied to more than one data center. If anything happens to one data center, the data can be recovered from another data center.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Fault Tolerance&lt;/em&gt; — In case there is any fault in the application or infrastructure, the service can continue to work by moving the work to other healthy servers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Disaster Discover&lt;/em&gt; — The data in the cloud can also get copied to other regions e.g. copy data from West US to East US. If there is natural disaster happened in West US and every data center goes down, the data center in East US will still have the copy of data.&lt;br&gt;
Scalability — The application running in the cloud can expand its size when there are more users in the system.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Elasticity&lt;/em&gt; — The application running in the cloud can shrink its size when there are fewer users in the system. The users can also set automatic shutdown during the non-business hours to save money.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business benefits of cloud&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Agility&lt;/em&gt; — Cloud allows the business to deliver IT system to customers faster. The machines in the cloud are ready for cloud users to spin up when they need and shut down when they are not required.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Economies of scale&lt;/em&gt; — Cloud is a shared pool of machines and services. As the number of customer grows, the cloud providers can lower the cost or increase quality of the services.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Capital Expenditure&lt;/em&gt; (CapEx) vs &lt;em&gt;Operational Expenditure&lt;/em&gt; (OpEx) — Building a data center requires large capital investment for hardware as well as the facility. A data center will also require ongoing electricity and staffs cost for operation. By using cloud, the capital expenditure for building a data center is not required.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Consumption-based model&lt;/em&gt; (pay-as-you-go) — The cloud users only pay for what they need, by the duration they need.&lt;br&gt;
Types of cloud service offering&lt;/p&gt;

&lt;p&gt;&lt;em&gt;IaaS&lt;/em&gt; (Infrastructure as a Service) — In this offering, the cloud providers offer barebone hardware in managed data center such as virtual machine or file storage. The cloud providers will take care of the physical infrastructure e.g. data center security or hardware repair, while the cloud users need to take care of server maintenance. For example, Azure VM allows the users to spin up new virtual machines in any size.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;PaaS&lt;/em&gt; (Platform as a Service) — The cloud providers will take care of the servers. The cloud users only need to bring in application code or data. For example, Azure SQL Database is fully managed service by Azure that the users do not need to / cannot access anything beyond their data.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;SaaS&lt;/em&gt; (Software as a Service) — The cloud providers will take care of both servers and code. The cloud users only need to configure the software to suit their needs. For example, Office 365 allows the users to use Microsoft Office software suite.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Differences in cloud deployment model&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Public Cloud&lt;/em&gt; — When the companies decided to use all their servers from the cloud providers’ data center.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Private Cloud&lt;/em&gt; — When the companies decided to use all their servers on their own data center to replicate the cloud services e.g. offering self-service components.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Hybrid Cloud&lt;/em&gt; — When the companies decided to use some of the servers in their own data center, and some of the servers in public cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Core Azure Services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This part contains the introduction to different services offering in Azure for each service category:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Compute&lt;/em&gt; — Azure Virtual Machine, Container, Kubernetes Service&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Network&lt;/em&gt; — Azure Virtual Network, Load Balancer, VPN Gateway, Application Gateway and Content Delivery Network&lt;br&gt;
Internet of Things (IoT) — Azure IoT Hub, IoT Central&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Big Data &amp;amp; Analytics&lt;/em&gt; — Azure HDInsight, Data Lake Analytics, Databricks&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Artificial Intelligence&lt;/em&gt; — Azure ML, ML Studio&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Serverless Computing&lt;/em&gt; — Azure Function, Logic Apps&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Storage&lt;/em&gt; — Azure Blob Storage, Disk Storage, File Storage, Data Lake Storage&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Database&lt;/em&gt; — Azure SQL DB, SQL DW, CosmosDB&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Management tools&lt;/em&gt; — Azure CLI, Powershell, Portal, Advisor&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Azure Marketplace&lt;/em&gt; — Azure service for deploying ready to use services by Azure or the 3rd party. Such as a package to install and setup R Studio&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security, Privacy, Compliance, and Trust in Azure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This part contains the security Azure provided for their services as well as Azure’s commitment in privacy and regulatory compliance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure services for security in different areas:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Network Security&lt;/em&gt; — Azure Firewall, DDoS Protection, and Network Security Group&lt;/p&gt;

&lt;p&gt;_Authentication and Authorization _— Azure Activity Directory (AD)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Application Security&lt;/em&gt; — Azure Key Vault, Information Protection, Advanced Threat Protection&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Resource Governance&lt;/em&gt; — Azure Policies &amp;amp; Initiatives, Role-Based Access Control (RBAC), Locks, Management Groups, Advisor&lt;br&gt;
Monitoring &amp;amp; Reporting — Azure Monitor, Service Health&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Privacy &amp;amp; Regulatory Compliance&lt;/em&gt; — Azure Government (for US governments), Germany (for EU’s GDPR regulation), Trust Center&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Pricing and Support&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This part contains the information about different types of Azure subscription, cost factors of Azure services, tools for cost calculation, and the support plans in Azure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure subscription types&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Free&lt;/em&gt; — New users will receive $200 credits to spend on any Azure products in the first 30 days. We will also receive free access to popular Azure products for the first 12 months, and the free access to free products forever. This type of subscript require credit card details, but nothing will be charged until we decide to upgrade to pay-as-you-go subscription.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Pay-as-you-go&lt;/em&gt; (PAYG) — Charge monthly for the services used in the last billing period. This type is used by individuals and businesses.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Enterprise Agreement&lt;/em&gt; — Enterprises can make an agreement with Azure which would allow discounted price for software license and Azure services.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Student&lt;/em&gt; — Students will receive $100 credit to spend in the first 12 months. No credit card required for this subscription type, but the student email verification is required.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost Factors of Azure services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Resource Types&lt;/em&gt; — Different Azure products will have different pricing e.g. Azure VM cost will be based on the virtual machine size, operating system, usage hours, and storage size. The users can turn off virtual machine temporarily to save usage hours cost, but the storage cost will always incur.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Subscription Types&lt;/em&gt; — Most users will pay the standard price, while the enterprise customers may have discounted or stable cost.&lt;br&gt;
Locations — For some resource types, the cost will vary based on the server locations. For example, Azure VM in Japan data center might cost more than in US data center.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Inbound and Outbound traffic&lt;/em&gt; — Movement of data between different data center (availability zones) or regions might incur cost.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools for cost calculation for Azure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;TCO Calculator&lt;/em&gt; — The service to compare the cloud cost with the Total Cost of Ownership e.g. how much you need to spend if you are to build the same infrastructure in your own data center.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Pricing Calculator&lt;/em&gt; — The website where the potential customers can plan their cost before moving to Azure cloud&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Azure Cost Management&lt;/em&gt; — Azure free service which shows how much have we spent in this billing period, and also provide the best practices to optimize the cost&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Azure Advisor&lt;/em&gt; — Azure free service which provides the recommendations in high availability, security, performance, and cost based on Azure products we are using&lt;br&gt;
Service Level Agreement (SLA)&lt;/p&gt;

&lt;p&gt;SLA is the minimum time that Azure commit the service will be available to use. If the service is offline for longer time than SLA, Azure will provide credits for the customers.&lt;/p&gt;

&lt;p&gt;Azure offers 99.9% SLA on most Azure products&lt;br&gt;
There are some cases that the SLA can be increased. For example, Azure guarantees 99.99% SLA for the virtual machines that have more than one instance across more than one region.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Preview vs Private Preview features&lt;/strong&gt;&lt;br&gt;
Most new features in Azure will be launched as private preview for limited users, then public preview for all the users&lt;br&gt;
After the feature has been thoroughly tested, it will be out of preview and become generally availability feature (GA).&lt;br&gt;
Azure provides Preview Portal for the users to test out new features for Azure portal. For other features that are not related to the portal, the users can access them from standard Azure portal.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Computer Networking - part2</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Thu, 31 Aug 2023 10:05:30 +0000</pubDate>
      <link>https://dev.to/keerthan0521/computer-networking-part-2-7ae</link>
      <guid>https://dev.to/keerthan0521/computer-networking-part-2-7ae</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;OSI Reference model :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhz8bo0zybm0pnpjzvc3w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhz8bo0zybm0pnpjzvc3w.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7 layer of OSI model :&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Physical layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The physical layer is concerned with transmitting raw bits over a communication channel.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Link Layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The main task of the data link layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors. It does so by masking the real errors so the network layer does not see them. It accomplishes this task by having the sender break up the input data into data frames and transmit the frames sequentially.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Network Layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The network layer controls the operation of the subnet. A key design issue is determining how packets are routed from source to destination.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transport Layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The basic function of the transport layer is to accept data from above it, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all this must be done efficiently and in a way that isolates the upper layers from the inevitable changes in the hardware technology over the course of time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;session layer&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The session layer allows users on different machines to establish sessions between them. Sessions offer various services, including dialog control (keeping track of whose turn it is to transmit), token management (preventing two parties from attempting the same critical operation simultaneously), and synchronization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Presentation Layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unlike the lower layers, which are mostly concerned with moving bits around the presentation layer is concerned with the syntax and semantics of the information transmitted&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Application Layer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The application layer contains a variety of protocols that are commonly needed by users. One widely used application protocol is HTTP (Hyper Text Transfer Protocol), which is the basis for the World Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the server hosting the page using HTTP.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22yst43o6whna227fp2g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F22yst43o6whna227fp2g.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>OCI foundations associate</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Sat, 12 Aug 2023 10:13:46 +0000</pubDate>
      <link>https://dev.to/keerthan0521/oci-foundations-associate-13e8</link>
      <guid>https://dev.to/keerthan0521/oci-foundations-associate-13e8</guid>
      <description>&lt;p&gt;Oracle Cloud Infrastructure (OCI) is a set of complementary cloud services that enable you to build and run a range of applications and services in a highly available hosted environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Physical architecture concepts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Regions&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A region is a localized geographic area, and an availability domain is one or more data centers located within a region.&lt;br&gt;
Oracle cloud regions are globally distributed data centers that provide secure, high-performance, local environments. These regions allow businesses to move, build, and run all workloads in the cloud from infrastructure to applications, while meeting regional data regulations&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Availability Domains&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Availability domains are isolated from each other, fault tolerant, and very unlikely to fail simultaneously or be impacted by the failure of another availability domain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Fault Domains&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A fault domain is a grouping of hardware and infrastructure within an availability domain.&lt;br&gt;
Each availability domain contains three fault domains.&lt;br&gt;
they let you distribute your instances so that the instances are not on the same physical hardware within a single availability domain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Realm&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A realm is a logical collection of regions. Realms are isolated from each other and do not share any data.&lt;br&gt;
Account and Access Concepts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Tenancy&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;tenancy is basically secure and isolated partition or account within oci.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Compartment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A compartment is a collection of related resources (such as instances, virtual cloud networks, block volumes) that can be accessed only by certain groups that have been given permission by an administrator.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Identity Domains and Policies&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An identity domain is a container for managing users and roles, federating and provisioning of users, secure application integration through Oracle Single Sign-On (SSO) configuration, and OAuth administration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Oracle Cloud Identifier (OCID)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every Oracle Cloud Infrastructure resource has an Oracle-assigned unique ID called an Oracle Cloud Identifier (OCID). This ID is included as part of the resource’s information in both the Console and API.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;security Zone&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Security Zones allows your Compute, Networking, Object Storage, Database, and other resources comply with Oracle security principles and best practices. A security zone is associated with one or more compartments&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OCI Compute Services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Bare Metal — Code, App Container, Language Runtime, OS, Virtualization; No virtualization&lt;/p&gt;

&lt;p&gt;Dedicated Virtual Hosts — Code, App Container, Language Runtime, OS;&lt;/p&gt;

&lt;p&gt;Virtual Machines — Code, App Container, Language Runtime, OS; Guset on a host server with hypervisor based virtualization;&lt;/p&gt;

&lt;p&gt;Container Engine — Code, App Container (Docker);&lt;/p&gt;

&lt;p&gt;Functions — Code; Consumption based pricing&lt;/p&gt;

&lt;p&gt;BM — Direct Hardware access; Single Tenant server; Use Case: Performance intensive workloads (DB), workloads not virtualized; workload that require specific Hypervisor, workload requires BYO licensing (SQL, Exchange etc)&lt;/p&gt;

&lt;p&gt;VM — Multi-tenant VMs; Use cases: to control all aspects of env, to deploy legacy app running on windows/linux, to move apps from on-premise to OCI&lt;/p&gt;

&lt;p&gt;Dedicated Virtual Host — Single-tenant VMs&lt;/p&gt;

&lt;p&gt;Instance Basics — various instance sizes(CPU, RAM, Bandwidth); Support both Intel and AMD processors; Provide GPU and HPC instance options(RDMA); instance placed on virtual network with powerful connectivity options; Depends on other OCI services such as Block volume (Boot(OS)/Data) and VCN(Virtual Nic)&lt;/p&gt;

&lt;p&gt;Vertical Scaling — Scale up/Down; Downtime required;&lt;/p&gt;

&lt;p&gt;Autoscaling — Enable large scale deployment of VM from a single gold image with automatic configuration; Scale out/Scale in; If one VM fails, others will keep working; based on metrics; Running Instance -&amp;gt; Config (Gold Image — OS image, metadata, shape, vNICs, Storage, subnets) -&amp;gt; Instance Pool (put in diff ADs, Manage all together) -&amp;gt; Scaling Rule&lt;/p&gt;

&lt;p&gt;How to Deploy containers?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Manually SSH into machines and run Docker&lt;/li&gt;
&lt;li&gt;Scripting or Config mgmt tools&lt;/li&gt;
&lt;li&gt;Orchestration Systems&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Oracle Kubernetes Engine — K8S; Containers in Pods, Pods in Node (Instances); OKE and OCIR&lt;/p&gt;

&lt;p&gt;Functions — small but powerful blocks of code that generally do one simple thing; stores as Docker image; invoked in response to a CLI command or signed HTTP request Push container to Registry -&amp;gt; Configure Function Trigger -&amp;gt; Code runs only when triggered -&amp;gt; Pay for code execution time only; based on FN project&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;OCI Storage Services&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Block Volume, Local NVMe, File Storage, Object Storage, Archive Storage&lt;/p&gt;

&lt;p&gt;Storage Requirements — Persistent vs Non-persistent, What type of data?(Database, videos, audio, photos, text), Performance (max capacity, IOPS, throughput), Durability (Copies of data), Connectivity (Local vs network, How does apps access the data), Protocol (Block vs File vs HTTPs)&lt;/p&gt;

&lt;p&gt;Block Storage — Hard drive in a server(on a remote chassis); stored on device in fixed sized blocks (512 bytes); Access by OS as mounted drive volume; Storage for compute services; 2 types (Boot Volume/OS Disk, Block Volume/Data Disks) Use cases — Databases, Exchange, VMWare, Server Boot. Block volume stores replica of data in 3 separate FDs; No need to configure s/w based protection(RAID-10 etc); Periodic backups&lt;br&gt;
(automated schedule backups);&lt;/p&gt;

&lt;p&gt;Block volume backup — Complete point-in-time snapshot copy of block volumes; Encrypted and stored in Object Storage and can be restored as new volumes to any AD within same region; Can copy block volume backups from one-region to another(X-Region Backup); Backups can be scheduled&lt;/p&gt;

&lt;p&gt;Block Volume Tiers — (50 GB — 32 TB, up to 32 volumes/instance (32x32=1PB); Data encrypted at rest and in-transit(oracle managed/customer managed key)&lt;br&gt;
Basic(2 IOPS/GB, 240 KB/s/GB Throughput); throughput intensive workloads with large sequential I/O such as big data &amp;amp; streaming, log processing and data warehouses.\&lt;br&gt;
Balanced (60 IOPS/GB, 480 KB/s/GB); most workloads that perform random I/O such as boot disks\&lt;br&gt;
High Performance (75 IOPS/GB, 600 KB/s/GB); workload require best possible performance including large DB’s&lt;/p&gt;

&lt;p&gt;Local NVMe — temp storage, locally attached to compute instance; app require high performance local storage; Use case — NoSQL DB, In-memory DB, Scale-out txn DB, Data warehousing. Storage non-persistent but survives reboot. OCI uses NVMe(Non-Volatile Memory Express) interface for very high performance. OCI provides no RAID, snapshots, backup capabilities&lt;/p&gt;

&lt;p&gt;File Storage — Hierarchical collection of docs organized into named directories which are themselves structured files. Distributed file systems make distributed look exactly like local file systems. Distributed file standards — NFS and SMB (provide access over networks). FSS — supports NFS v.3; Data protection: Snapshots(10000 per file system); Security (Data at rest, in-transit encryption). Use cases: Oracle Apps, HPC, Big Data and Analytics, General purpose file systems. FS — replicates data in 3 FDs; can take snapshot and restore snapshot&lt;/p&gt;

&lt;p&gt;Object Storage — All data, managed as objects; Each object stored in a bucket, relies on standard HTTP verbs; flat structure; OSS — An internet-scale, high performance storage platform; ideal for unstructured data;&lt;br&gt;
regional service; storage classes (hot/cold); Use cases: content repo for data, images, logs &amp;amp; video etc; Archive/Backup, Storing log data for analysis; Storing large datasets; Big Data/Hadoop storage&lt;br&gt;
OS replicates in 3 FDs; stores replica of data in more than AD&lt;br&gt;
OS Tiers — Standard Storage Tier(Hot) Fast, immediate, and frequent access; Data retrieval in instances; Always serves the most recent copy of the data when retrieved; Standard buckets can’t be downgraded to archive storage. Archive Storage Tier (Cold) Seldom or rarely accessed data but must be retained and preserved for long periods of time; 10x cheaper than standard tier ($0.0026 vs $0.0255 Gb/month);&lt;br&gt;
90 days min retention period; objects needs to be restored before download; TTFB after restore request is made: 4 hours; Archive bucket can’t be upgraded to Standard&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;OCI Network Services&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Virtual Cloud Network — software defined private network that you setup in OCI; Enable OCI resources to communicate&lt;br&gt;
VCN address space — Address space 10.0.0.0/16; Every resource will get its own unique private IP address; subnet — divide VCN into one or more sub networks;&lt;br&gt;
Gateways — IGW; Public Subnet(DMZ);&lt;br&gt;
NAT Gateway (Blocks inbound connection)&lt;br&gt;
DRG — virtual router that provides a path for private traffic between your VCN and destinations other than the internet; DRG to establish a connection with on-premises network via IPsec VPN, FastConnect(private, dedicated connectivity)&lt;br&gt;
Service Gateway — Communication to public OCI services — access without using internet&lt;br&gt;
Peering — process of connecting multiple VCN; Local VCN peering (same region); Remote VCN peering (Different Region) No transitive peering&lt;br&gt;
VCN Security — Firewall rules (Subnet layer); Network Security Group (VNIC layer)&lt;br&gt;
Load Balancer — sits between client and backends; performs tasks such as: Service Discovery, Health Check, Algorithm. LB Benefits — Fault tolerance and HA; Scale; Naming abstraction. LB Types — Public LB, LB pair for HA&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;OCI IAM&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IAM — Identities, Permissions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Principals — IAM entity that is allowed to interact with OCI resources; IAM users and Instance Principals&lt;/p&gt;

&lt;p&gt;IAM Users and Groups — 1st IAM user is default admin; Users -&amp;gt; Groups -&amp;gt; at least one policy&lt;/p&gt;

&lt;p&gt;Instance Principals — let instances make API calls against other OCI services&lt;br&gt;
Network Admin, Storage Admin etc — Policies&lt;/p&gt;

&lt;p&gt;Authentication — deals with user identity; Username/Password, API Signing key, Auth Tokens&lt;/p&gt;

&lt;p&gt;Authorization — actions performed by principals; Policies; Allow group &amp;lt;&amp;gt; to &amp;lt;&amp;gt; resource-type in tenancy/compartment where conditions &amp;lt;&amp;gt;&lt;/p&gt;

&lt;p&gt;Policies — Allow to in where&lt;br&gt;
Verb — inspect(list resources), read(inspect_user-specified metadata), use (Read+Update), manage(all permissions)&lt;br&gt;
Resource type — all-resources, database-family, instance-family, object-family etc&lt;/p&gt;

&lt;p&gt;Common Policies — Network admin(manage virtual-network-family), Instance Launchers(manage instance-family, use volume-family, use virtual-network-family)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;OCI Database Services&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;OCI DB Options — VM (Fast Provisioning), Bare metal(Fast performance), RAC (Managed HA), Exadata DB systems(Managed Exadata Infra), Autonomous — Shared/Dedicated(Self-driving, Self-Securing, Self-Repairing)&lt;/p&gt;

&lt;p&gt;DB Systems — Managed DB systems, Complete Lifecycle automation (Provisioning, Patching, Backup &amp;amp; Restore), HA and DR (RAC &amp;amp; Data Guard), Scalability (Dynamic CPU and Storage Scaling), Security (Infra(IAM, VCN, Audit), Database(TDE, Encrypted RMAN backup/Block volume encryption)), BYOL&lt;/p&gt;

&lt;p&gt;DB Systems Operations — Launch, start, stop or reboot DB systems(Billing continues in stop state for BM DB systems), Scale (CPU cores (BM DB), Storage(VM DB)), Patching (2 step process, For Exadata and RAC patches are rolling)&lt;/p&gt;

&lt;p&gt;DB Systems Backup — Manual/Automatic Backups, Auto backups written to Oracle owned Object storage buckets, Runs between midnight — 6 AM in DB system time zone, Preset retention periods: 7, 15, 30, 45 and 60 Days; Recover DB from backup stored in Object storage(Last known good state, Timestamp specified, Using SCN)&lt;/p&gt;

&lt;p&gt;DB Systems HA and DR — Oracle Data Guard — survive disasters and data corruptions (maintain sync between primary and standby DB); Active Data Guard (adv features for data protection and availability, included in Extreme Performance edition and Exadata service); 2 modes — switchover(planned migration, no data loss), Failover (unplanned, min data loss)&lt;/p&gt;

&lt;p&gt;MAA — Primary and standby DB can be either a single-instance oracle db or RAC db&lt;/p&gt;

&lt;p&gt;Autonomous Databases — Fully managed DB with 2 workload types; TP, DWH; Deployment options — Dedicated/Shared; Automates backing up DB, patching w/o downtime, Upgrade DB, Tune DB&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OCI Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Shared Security Model — OCI upto virtualization; Customer (Patching app and OS, OS config, IAM, Network security, Endpoint protection, Data Classification and Compliance)&lt;/p&gt;

&lt;p&gt;Security Services — OCI IAM, MFA, Federation, Storage and DB services, Data Safe, Key Management, OS Management Service, Bare Metal, Dedicated VM hosts, VCN, NSG, SL, WAF&lt;br&gt;
IAM — RBAC; Authentication -&amp;gt; OCI IAM -&amp;gt; Authorization -&amp;gt; Compartments -&amp;gt; Resources; MFA; SSO using IDP&lt;/p&gt;

&lt;p&gt;Data Protection — Block volume (Data enc at-rest/in-transit, BYOK) File Storage (Data enc at-rest/in-transit, BYOK) Object Storage (Data enc at-rest, BYOK, Private Buckets, Pre authenticated requests) Database(TDE, Data safe, Data Vault) Key Management (BYOK, use HSM)&lt;/p&gt;

&lt;p&gt;OS &amp;amp; Workload isolation — OS Mgmt service configured by default for Oracle Linux; Network protection — Tiered subnet strategy for VCN, Gateways, Security Lists, NSG, OCI WAF (XSS, SQL Injection), Protection against layer 7&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OCI Pricing and Billing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Pricing Models — Pay as you go; Monthly Flex (Universal Credits) $1000 monthly charge/12 months -&amp;gt; 33% — 60% savings vs PAYG; BYOL (apply on-premise Oracle license); All OCI region have same pricing;&lt;/p&gt;

&lt;p&gt;Block volume (Storage cost $0.0255 per GB/month, Performance Cost (VPU/GB) — NA for Basic, 10 VPU at $0.0017 for balanced, 20 VPU at $0.0034 for higher performance); Data Transfer costs — Ingress/Egress free b/w data transfers, Egress charge for different regions; To and from internet (Egress charged), DRG/FastConnect both Ingress/Egress free&lt;/p&gt;

&lt;p&gt;Pricing Example — Outbound Data Transfer 10 TB free&lt;/p&gt;

&lt;p&gt;Billing — Cost Tracking Tags, Cost Analysis, Budgets, Alert every 15 mins, Usage reports (automatically generated CSV file, 24 hrs data, retained for 1 year)&lt;/p&gt;

&lt;p&gt;Free Tier — $300 free credit for 30 days; upto 8 instances, 5TB storage&lt;/p&gt;

&lt;p&gt;Always Free — 2 Oracle Autonomous DB, 2 OCI Compute VMS, Block, Object and Archive Storage, LB and Data egress, Monitoring and Notifications&lt;/p&gt;

</description>
      <category>oci</category>
      <category>oracle</category>
      <category>cloud</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Linux commands everyone should know</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Fri, 11 Aug 2023 06:23:51 +0000</pubDate>
      <link>https://dev.to/keerthan0521/linux-commands-everyone-should-know-2nk</link>
      <guid>https://dev.to/keerthan0521/linux-commands-everyone-should-know-2nk</guid>
      <description>&lt;p&gt;&lt;strong&gt;Navigation&lt;/strong&gt;&lt;br&gt;
pwd - present working directory&lt;br&gt;
cd - change directory&lt;br&gt;
ls - list directory contents&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Manipulating files and directories&lt;/strong&gt;&lt;br&gt;
cp - copy files and directories&lt;br&gt;
mv - move/rename files and directories&lt;br&gt;
mkdir - create a directory&lt;br&gt;
rm - remove files and directories&lt;br&gt;
rmdir - remove empty directory&lt;br&gt;
ln - create hard and soft links&lt;br&gt;
file - determine file type&lt;br&gt;
less- view file content&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Know more about command&lt;/strong&gt;&lt;br&gt;
type - indicate how a command name is interpreted&lt;br&gt;
which - displays which executable program will be executed&lt;br&gt;
help - get help from shell builtin&lt;br&gt;
man - displays manual page for command&lt;br&gt;
whatis - displays one page of its manual page&lt;br&gt;
alias - create an alias for a command&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Redirection&lt;/strong&gt;&lt;br&gt;
cat - concatenate and view files&lt;br&gt;
sort -sort lines of text&lt;br&gt;
uniq - report and omit repeated lines&lt;br&gt;
grep - print lines matching a pattern&lt;br&gt;
head - output the first part of a file&lt;br&gt;
tail - output the last part of a file&lt;br&gt;
echo - display a line of text&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Permission&lt;/strong&gt;&lt;br&gt;
id - display user identity&lt;br&gt;
chmod - change a file’s mode&lt;br&gt;
umask - set default file permissions&lt;br&gt;
su - run a shell as another user&lt;br&gt;
sudo - execute command as another user&lt;br&gt;
chown - change a file’s owner&lt;br&gt;
chgrp - change a file’s group ownership&lt;br&gt;
passwd - change user’s password&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Search for file&lt;/strong&gt;&lt;br&gt;
locate - Find files by name&lt;br&gt;
find - Search for files in a directory hierarchy&lt;br&gt;
touch - Change file times&lt;br&gt;
stat - Display file or file system status&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Processes&lt;/strong&gt;&lt;br&gt;
ps - report a snapshot of current process&lt;br&gt;
top - display task&lt;br&gt;
jobs - list active jobs&lt;br&gt;
bg - place a job in the background&lt;br&gt;
fg - place a job in the foreground&lt;br&gt;
kill - send a signal to process&lt;br&gt;
killall - kill process by name&lt;br&gt;
shutdown - shutdown or reboot system&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shell Environment&lt;/strong&gt;&lt;br&gt;
printenv - print part or all of the environment&lt;br&gt;
set -set shell options&lt;br&gt;
export - expoert env to subsequently executed programs&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;&lt;br&gt;
mount - mount a file system&lt;br&gt;
umount- unmount the file system&lt;br&gt;
fsck - check and repair a file system&lt;br&gt;
fdisk - manipulate disk partition table&lt;br&gt;
mkfs - create a file system&lt;br&gt;
dd - convert and copy a file&lt;br&gt;
mkisofs - create an iso 9660 image file&lt;br&gt;
cdrecord - write a data to optical storage media&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Networking&lt;/strong&gt;&lt;br&gt;
ping - send an ICMP ECHO_REQUEST to network hosts&lt;br&gt;
traceroute - print the route packets trace to a network host&lt;br&gt;
ip -Show/manipulate routing, devices, policy routing, and tunnels&lt;br&gt;
netstat - Print network connections, routing tables, interface statistics,masquerade connections, and multicast memberships&lt;/p&gt;

&lt;p&gt;ftp-Internet file transfer program&lt;br&gt;
wget - Non-interactive network downloader&lt;br&gt;
ssh - OpenSSH SSH client (remote login program)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Archiving and Backup&lt;/strong&gt;&lt;br&gt;
gzip - Compress or expand files&lt;br&gt;
bzip2 - A block sorting file compressor&lt;br&gt;
tar - Tape archiving utility&lt;br&gt;
zip - Package and compress files&lt;br&gt;
rsync - Remote file and directory synchronization&lt;/p&gt;

&lt;p&gt;&lt;a href="https://keerthan0521.github.io/Linux-commands/"&gt;Github&lt;/a&gt; &lt;/p&gt;

</description>
      <category>linux</category>
      <category>bash</category>
      <category>learning</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Networking fundamentals - Part 1</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Tue, 18 Jul 2023 17:27:06 +0000</pubDate>
      <link>https://dev.to/keerthan0521/networking-fundamentals-part-1-53fg</link>
      <guid>https://dev.to/keerthan0521/networking-fundamentals-part-1-53fg</guid>
      <description>&lt;p&gt;&lt;strong&gt;Networking models based on functions&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Client Server system&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8TFjYD0Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6adgnq9lh9gmdkqeyt1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8TFjYD0Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6adgnq9lh9gmdkqeyt1.png" alt="Image description" width="700" height="264"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Peer to peer system&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--liZOK1yM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k7trpcdc7rf1qcvibxc8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--liZOK1yM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k7trpcdc7rf1qcvibxc8.png" alt="Image description" width="585" height="220"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Networks based on proximity&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Local Area Network&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Personal Area network&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Metropolitan Area network&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Wide Area Network&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Gp_HWZ-e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fq6jrk6sjjq815yuqggb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Gp_HWZ-e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fq6jrk6sjjq815yuqggb.png" alt="Image description" width="800" height="229"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Network Topology&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bus topology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ch-qxEvQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ux41vxqrjzdre64eegmt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ch-qxEvQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ux41vxqrjzdre64eegmt.png" alt="Image description" width="318" height="159"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ring topology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ring topology is a type of network configuration in which each device on the network is connected to two other devices, forming a “ring.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--V3aIHGCB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/91rurl0kojzm1y348ucz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--V3aIHGCB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/91rurl0kojzm1y348ucz.png" alt="Image description" width="230" height="219"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Star topology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Star topology is a type of network topology in which every device in the network is individually connected to a central node, known as the switch or hub.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z0rCn5iD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/46gw9wjr8gtnfp1zch6x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z0rCn5iD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/46gw9wjr8gtnfp1zch6x.png" alt="Image description" width="237" height="213"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mesh topology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Mesh topology is a type of network topology in which all devices in the network are interconnected. In a mesh topology, data can be transmitted by routing (sent the shortest distance) and flooding (sent to all devices).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--QKxTE81q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zr8ojw8tg8hsu1yo9fsg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--QKxTE81q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zr8ojw8tg8hsu1yo9fsg.png" alt="Image description" width="213" height="236"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hybrid topology&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;hybrid topology is the combination of two or more networks. The network type could be Star, Ring, Bus, or Mesh. However, in most cases, only the Star and Ring topologies are used to create a Hybrid network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wQR3QyOw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dv9o0gfk5vx13u29u3q8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wQR3QyOw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dv9o0gfk5vx13u29u3q8.png" alt="Image description" width="269" height="187"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>networking</category>
      <category>cloud</category>
      <category>devops</category>
      <category>aws</category>
    </item>
    <item>
      <title>Basic linux commands</title>
      <dc:creator>Keerthan Shetty</dc:creator>
      <pubDate>Sun, 09 Jul 2023 17:11:06 +0000</pubDate>
      <link>https://dev.to/keerthan0521/basic-linux-commands-3k97</link>
      <guid>https://dev.to/keerthan0521/basic-linux-commands-3k97</guid>
      <description>&lt;p&gt;ls - list storage&lt;/p&gt;

&lt;p&gt;pwd - present working directory&lt;/p&gt;

&lt;p&gt;cd - change directory&lt;/p&gt;

&lt;p&gt;file - to know file type&lt;/p&gt;

&lt;p&gt;locate - locate the file&lt;/p&gt;

&lt;p&gt;which - command to find a command&lt;/p&gt;

&lt;p&gt;history - history of commands&lt;/p&gt;

&lt;p&gt;whatis - to get what command does&lt;/p&gt;

&lt;p&gt;appropos - command to get info about command what it does&lt;/p&gt;

&lt;p&gt;man - manual page&lt;/p&gt;

&lt;p&gt;mkdir - create a directory&lt;/p&gt;

&lt;p&gt;touch - create a empty file / update date on a file&lt;/p&gt;

&lt;p&gt;cp - createa copy of file / edit a file without removing&lt;/p&gt;

&lt;p&gt;mv - move a file / rename a file&lt;/p&gt;

&lt;p&gt;rm -r direct_name -&amp;gt;remove a directory&lt;/p&gt;

&lt;p&gt;rmdir - remove a directory if it contains nothing&lt;/p&gt;

&lt;p&gt;cat - concatenate&lt;/p&gt;

&lt;p&gt;sudo - super user do&lt;/p&gt;

&lt;p&gt;chmod - change a mode&lt;/p&gt;

&lt;p&gt;users - who are logged into system&lt;/p&gt;

&lt;p&gt;killall - kill a process&lt;/p&gt;

&lt;p&gt;chsh - change shell&lt;/p&gt;

&lt;p&gt;env - environmental variable&lt;/p&gt;

&lt;p&gt;lscpu - cpu information&lt;/p&gt;

&lt;p&gt;lshw - hardware information&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
