Skip to main content

Posts

Understanding TCP & UDP

 TCP (Transmission Control Protocol) is stateful. This means it maintains a connection state between the communicating parties throughout the communication session. Stateful Nature of TCP Connection Establishment : TCP requires a connection to be established between the sender and receiver before data transmission can begin. This is done through a process called the three-way handshake. Three-Way Handshake : This process involves the exchange of three messages (SYN, SYN-ACK, and ACK) to establish a reliable connection. Maintaining State : During the connection, TCP keeps track of various parameters to ensure reliable and ordered data delivery. Sequence Numbers : TCP assigns sequence numbers to each byte of data to ensure it is received in the correct order. Acknowledgements (ACKs) : The receiver sends acknowledgements for the received data packets. If an ACK is not received, the sender retransmits the data. Flow Control : TCP uses a window mechanism to control the rate of data transmis
Recent posts

Basics of OSI Model in networking

 The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and standardize the functions of a telecommunication or computing system. It divides the process of networking into seven distinct layers, each responsible for specific tasks related to data transmission across a network. The OSI model was developed by the International Organization for Standardization (ISO) to help different networks and devices communicate with each other in a standardized way. Here’s a brief overview: Physical Layer: This is the foundation. It’s like the cables and the hardware that connect computers. Imagine the physical wires or the radio signals used for Wi-Fi. Data Link Layer: This layer is responsible for making sure that the data gets from one point to another without errors. Think of it as the traffic cop that ensures data goes to the correct place on the same network. Network Layer: This is where routing happens. It decides the best path for the data to travel from one

GCP Cloud Armor - Architecture flow of Cloud Amor with Load Balancer

Google Cloud Armor and Google Load Balancer work together to shield your website from digital villains. We will see how they are connected and how traffic flows using an architecture diagram Explanation : Client sends request: The user (client) initiates a request to your website or application. Request reaches internet: The request travels through the internet and reaches your network. Router directs traffic: Your router routes the request towards GCP Network. Load Balancer distributes traffic: The GCP Load Balancer receives the request and distributes it evenly among your backend servers. Cloud Armor inspects traffic: Before reaching the backend servers, the request passes through Cloud Armor. Cloud Armor filters and protects: Cloud Armor analyzes the request using your configured security policies. It filters malicious traffic, mitigates DDoS attacks, and blocks web application vulnerabilities. Clean request to backend servers: If the request passes Cloud Armor's scrutiny, it ge

GCP Cloud Armor - Protect Your Websites and Apps

Google Cloud Armor stands as your valiant protector, a multi-layered shield against the ever-evolving digital threats. It's like a fortified outpost at the edge of your network, meticulously inspecting incoming traffic, neutralizing malicious intent before it reaches your critical assets. Cloud Armor absorbs and distributes attack traffic, ensuring your website remains operational even under the heaviest bombardment. Shield your applications from common vulnerabilities like SQL injection and cross-site scripting. Cloud Armor's pre-configured and customizable WAF rules act as vigilant sentries, blocking malicious requests before they wreak havoc. Cloud Armor's intelligent rate limiting throttles suspicious traffic patterns, preventing bots and unauthorized access attempts from overwhelming your systems. Benefits: Unbreakable Security: Focus on your core business knowing your website and applications are shielded from a vast array of threats. Uptime Uninterrupted: Deliver a s

Terraform - Build Azure VM and provision with shell script

Terraform - Build Azure VM and provision with shell script Below will be performed 1. Create linux virtual machine 2. Provision virtual machine with shell script using remote-exec Below is terraform code - main.tf main.tf provider "azurerm" {     # The "feature" block is required for AzureRM provider 2.x.     # If you're using version 1.x, the "features" block is not allowed.     version = "=2.0"         features {}     subscription_id = "xxxxxx"     client_id       = "xxxxxxx"     client_secret   = "xxxxxxxxxxxxx"     tenant_id       = "xxxxxxxxxxxxxxxxx" } resource "azurerm_resource_group" "resgrp1" {     name     = "ajdocker2"     location = "eastus"     tags = {         environment = "Aj project1"     } } resource "azurerm_virtual_network" "vnet1" {     name                = "ajvnet1"     address_space      

Learn to build docker image

Hi guys, I will try to show you here how u can learn to build a image using docker and run that image later as a container. I will build a image to run a webserver with static content in it and for this I will use nginx image which is available in docker hub . Hoping that you have already installed docker package in your machine. Below are the steps to build a simple docker image: 1. Create a Docker file and add below contents "From nginx" indicates that docker should use nginx image. If nginx image is available in local repository then it will use that else it will download from docker hub "COPY index.html /usr/share/nginx/html" says that copy the index.html which is available in current directory to directory /usr/share/nginx/html 2. Create index.html  which is required as per above steps in same directory 3. Build the image mynginx is the image name given and v1 is the tag for that image Please note that at the end of command there