DEV Community

Cover image for Journey to Becoming a Cloud Engineer - Week Three
Shubham Murti
Shubham Murti

Posted on • Updated on

Journey to Becoming a Cloud Engineer - Week Three

Hello Community!

As I dive deeper into my journey to becoming a Cloud Engineer, Week Three has focused on understanding network protocols, models, and addressing schemes. This week, I explored ports, the client-server and peer-to-peer models, various network protocols, and the differences between IPv4 and IPv6. Here’s a detailed breakdown of my learnings:

Introduction to Ports and Their Numbers

Ports are fundamental to network communication. They act as endpoints for different services running on a device, enabling multiple processes to operate simultaneously and efficiently manage network traffic.

Common Port Numbers

  • HTTP (Port 80): Handles standard web traffic. When you access a website, HTTP is the protocol used to fetch the web pages from a server.
  • HTTPS (Port 443): Secures web traffic by encrypting data using SSL/TLS. This ensures that sensitive information like login credentials and payment details are protected during transmission.
  • FTP (Port 21): Facilitates the transfer of files between a client and a server. It supports both uploading and downloading files across a network.
  • SMTP (Port 25): Manages the sending of emails. SMTP is used to transmit email messages from the client to the server and between different servers.
  • POP3 (Port 110): Retrieves emails from a server to a client, typically removing the emails from the server after they are downloaded. This allows users to manage their emails offline.
  • IMAP (Port 143): Allows clients to access and manage emails on a server without removing them. IMAP supports synchronization across multiple devices, so emails are accessible from any device.
  • DNS (Port 53): Translates human-readable domain names (like www.example.com) into IP addresses that computers use to identify each other on the network.
  • SSH (Port 22): Provides secure remote login to servers. SSH encrypts the data transmitted between the client and the server, ensuring secure access for administrative tasks.

Client-Server Model

The client-server model is a cornerstone of network architecture. It defines a relationship where clients request services, and servers provide these services.

Client-Server Interaction

Example: When you use a web browser (client) to visit a website, the browser sends a request to a web server. The server processes this request and sends the requested web page back to the browser. This interaction is the essence of the client-server model, where clients (such as web browsers) depend on servers (such as web servers) to provide resources and services.

Peer-to-Peer (P2P) Model

In the peer-to-peer model, every device in the network can act as both a client and a server. Peers share resources and data directly with each other without relying on a central server.

Key Characteristics

  • Decentralization: Unlike the client-server model, P2P does not rely on a central server. Each peer can communicate with other peers and share resources directly.
  • Use Cases: P2P is commonly used in file-sharing networks and collaborative applications where direct sharing of resources is beneficial.

Network Protocols

Network protocols are sets of rules that define how data is transmitted and received across networks. Understanding these protocols is crucial for managing network communications effectively.

Key Network Protocols

  • TCP/IP (Transmission Control Protocol/Internet Protocol): Forms the foundation of internet communication. TCP/IP ensures reliable data transmission by establishing connections and managing the data packets exchanged between devices.
  • HTTP (Hypertext Transfer Protocol): Facilitates the transfer of resources, such as HTML documents, from web servers to browsers. HTTP is the primary protocol for web data communication.
  • HTTPS (HTTP Secure): Extends HTTP by adding encryption through SSL/TLS. This ensures that data transmitted over the web is secure and protected from eavesdropping.
  • FTP (File Transfer Protocol): Allows for the transfer of files between clients and servers. It supports various file operations, including uploading, downloading, and managing files on a remote server.
  • SMTP (Simple Mail Transfer Protocol): Handles the sending of emails from clients to servers and between servers. SMTP ensures the delivery of email messages to their intended recipients.
  • POP3 (Post Office Protocol 3): Retrieves emails from a server to a client, usually removing them from the server. This allows users to access their emails offline after downloading.
  • IMAP (Internet Message Access Protocol): Enables clients to access and manage emails on a server without downloading them. IMAP supports email synchronization across multiple devices, providing a unified view of email.
  • PPP (Point-to-Point Protocol): Establishes direct connections between two network nodes. PPP is often used for dial-up internet connections and provides a method for connecting to a network over serial links.
  • UDP (User Datagram Protocol): Offers a faster but less reliable data transmission method compared to TCP. UDP is used in applications where speed is critical, such as streaming media and online gaming.

IPv4 vs. IPv6

IPv4 and IPv6 are different versions of the Internet Protocol, each with distinct characteristics and advantages.

IPv4 (Internet Protocol version 4)

  • Address Format: Uses a 32-bit address format, which supports approximately 4.3 billion unique IP addresses.
  • Usage: IPv4 is widely used and supported, but its address space is limited. The growing number of devices and network demands have led to address shortages.

IPv6 (Internet Protocol version 6)

  • Address Format: Employs a 128-bit address format, allowing for an almost limitless number of unique IP addresses.
  • Advantages: IPv6 addresses the limitations of IPv4 by providing a vast address space. It also incorporates improvements in security and efficiency, supporting future network growth and scalability.

Closure

Week Three has deepened my understanding of network protocols and models, crucial for anyone in the field of cloud engineering. Mastering these concepts enhances my ability to design, manage, and troubleshoot network systems effectively.

Thank you for joining me on this journey! If you have any insights, tips, or resources to share, I’d love to hear from you. 😊

Stay tuned for more updates next week!

Shubham Murti — Aspiring Cloud Security Engineer | Weekly Cloud Learning !!

Let’s connect: Linkdin, Twitter, Github

Top comments (0)