DEV Community

Cover image for Navigating the Basics: Insights into Computer Networking
Akinwumi Omolade
Akinwumi Omolade

Posted on

Navigating the Basics: Insights into Computer Networking

Titbits on Computer Networking

We say the cloud is no more than a virtual network in a data center.

But what is networking?

Image description

Networking involves linking all your computers together.
Your computer needs to be connected to a system, and your traffic must be directed from your switch to the destination. This is the fundamental role of a network.
A network serves as the platform for sharing all your data. Without a network, communication is not possible.

Components of Networking:

Transferring traffic from source A to source B is essential.
Without a network, communication is impossible.

Routers play a pivotal role in interconnecting various elements on the internet.
A router, resembling a computer, houses multiple network interface ports, often referred to as interfaces.
Each interface is required to operate on a distinct subnet. [ A subnet is a subdivision of an IP network. It allows for the efficient allocation of IP addresses and provides a way to logically group devices. ]

The interfaces on a router can be metaphorically compared to the components of a computer.
For seamless data transmission to its destination, these diverse router components must effectively communicate.

Similar to the Limbs of an Octopus:
Interfaces on a router can be likened to the limbs of an octopus.
For effective data transmission to its destination, these diverse limbs on the router need to communicate.

The components constituting the network include

  1. Routers

  2. Switches

  3. Cables

  4. Local Area Network connections

  5. Wide Area Network connections.

Routing Table

Routers create (or have to build) routing tables, which can be likened to a map or GPS for navigating network traffic.

Imagine a router as a guide for data that is traveling in a network. To guide the data to its destination, the router builds something called a routing table. This table is a bit like a map or GPS, helping the router make smart decisions about where to send the data. Just as you use a map to find the best route while driving, the routing table helps the router find the best path for data to reach its destination in a network.

Basics of Networking [The OSI Model]

The 7-layer model of OSM model of the open system model. This is a model that helps troubleshoot networks and data centers. The OSI model was designed for communication in the networking world in different layers of the stack

Layer 1 Layer 2 Layer 3
Physical Data Link Network
Media Signal and Binary Transmission MAC and LLC Physical Addressing Path determination and IP
Wire Fibre Bits Mac Address Frames IP Address
Layer 4 Layer 5 Layer 6
Transport Session Presentation
End to end connections and reliability Interhost communication Data representation and encryption
TCP-VPD Segments Sockets Data TLS data
Layer 7
Application
Application and Network
HTTP-DNS-SSH Data

At
Layer 1 : This is the cable between your computers
Layer 2: This is the network card in your computer
Layer 3: This is where routing occurs
Layer 4: The transport layer can adjust the flow of your data (TCP: reliable date, UDP: real-time date) from the source to the destination
Layer 5: Communicating between your host
Layer 6: Where data encryption occurs
Layer 7: the things you use

TCP/IP, or the Internet Protocol suite, consists of different protocols that help computers communicate over a network.

TCP (Transmission Control Protocol):
Think of TCP as a careful messenger. When you use TCP to send a message from one computer to another, it ensures that the message arrives safely, and the sender expects a confirmation that the message was received.

UDP (User Datagram Protocol):
Now, UDP is like a swift messenger. It's great for real-time conversations. When you use UDP, you're not waiting for a confirmation that your message arrived; you just send it quickly.

ICMP (Internet Control Message Protocol):
Meet ICMP, the inspector of the network. It's like the protocol that checks if everything is working fine. Ever heard of "ping"? That's ICMP saying, "Hey, are you there?" It helps figure out if different parts of the network are talking to each other properly.

In simple terms, TCP is for careful and reliable communication, UDP is for quick and real-time talks, and ICMP is like a network detective making sure everything is in order.

Let's talk about LANs and WANs!

LAN (Local Area Network):
Imagine LAN as your personal space. It's like having your own set of cables and things within a small area, maybe your home or office. LAN is for when your devices are close to each other.

WAN (Wide Area Network):
Now, WAN is like connecting beyond your personal space. It goes from your place to another place, but over a wider distance. WAN is when you want to connect with something that's not right next to you, like another office in a different city.

VLANs (Virtual LANs):
Think of VLANs as separating different groups within your space. It's like having different sections but in one big area. To keep them apart, we use a tag, like a special label, to say which group each part belongs to. It's like putting stickers on things to keep them organized.

Let's dive into BGP (Border Gateway Protocol) in simple terms!

What is BGP?
BGP is like a superhero for connecting different computer networks. It's used to link big things together, like connecting a data center to the cloud joining one organization with another, or even connecting to the internet.

How does BGP work?
Imagine BGP as a messenger for computers. It uses special messages, like saying "hello" to check if everything is good. These messages help exchange information about the best paths for data to travel from one place to another.

BGP Messages:
In the BGP world, there are four types of messages:

  1. Open Message: It's like saying "Let's talk!"
  2. Keep-Alive Message: It's like a health check to make sure everything is okay.
  3. Update Message: It's when BGP shares information about the best paths.
  4. Notification Message: If there's a problem, BGP sends a notification, like an error alert.

BGP Attributes:
BGP uses some special attributes to decide the best paths:

  1. Origin Attribute: It tells where the information comes from.
  2. ASpath: It's like a road map, showing the path the data should take.
  3. Next Hop: It points to the next destination, like a guide for the data.

Forming a Relationship:
BGP goes through different phases to start talking:

  1. Idle: It's like getting ready.
  2. Active: It's actively trying to connect.
  3. Turning Traffic: Finally, it starts handling the actual data traffic.

So, in simple terms, BGP is like a superhero messenger helping computers decide the best routes for data to travel from one place to another.

In conclusion, computer networking serves as the vital infrastructure that connects devices, allowing seamless communication and data sharing.

I trust you found this article valuable. Feel free to connect with me on LinkedIn or share your thoughts in the comments section.

Top comments (0)