bg_image
header

Uniform Resource Identifier - URI

A URI (Uniform Resource Identifier) is a string used to uniquely identify a resource on the Internet or another network. A URI is used to locate or identify a specific resource, whether it's a web page, a file, an image, a video, or any other type of resource.

A URI can be divided into different parts:

  1. URL (Uniform Resource Locator): A specific type of URI used to identify the address of a resource and the mechanism for accessing it. URLs typically include a protocol (such as HTTP or FTP), hostname, port (optional), path, and query string.

  2. URN (Uniform Resource Name): A URN is another type of URI used to identify a resource by its name permanently, regardless of its current location or how it is accessed. A well-known example of a URN is the ISBN system for books.

URI is a more general term that encompasses both URLs and URNs. It is an important component of the internet and is used in many applications to access and identify resources.

 


Uniform Resource Locator - URL

A URL (Uniform Resource Locator) is a string used to uniquely identify and locate the address of a resource on the Internet or another network. A URL typically consists of several parts that specify various information about the resource:

  1. Protocol: The protocol specifies how the resource should be accessed or transferred. Common protocols include HTTP (Hypertext Transfer Protocol), HTTPS (HTTP Secure), FTP (File Transfer Protocol), and FTPS (FTP Secure).

  2. Hostname: The hostname identifies the server where the resource is hosted. This can be a domain like "example.com" or an IP address indicating the exact location of the server.

  3. Port (optional): The port is a numerical address on the server that allows access to specific services. Default ports are often used implicitly (e.g., port 80 for HTTP), but custom ports can also be specified for special services.

  4. Path: The path specifies the location of the resource on the server. It can refer to a specific directory or file.

  5. Query string (optional): The query string is used to pass additional parameters to the server that can be used to identify or customize the requested resource. The query string starts with a question mark and usually contains a series of key-value pairs separated by the ampersand (&).

Together, these parts of a URL form the complete address of a resource on the Internet or another network. URLs are used in web browsers, hyperlinks, APIs, and other internet applications to access and identify resources.

 


Edge-Server

An edge server is a server located at the edges of a network, typically in geographically distributed locations. These servers are often used as part of a Content Delivery Network (CDN) to bring content closer to end users and improve the performance of websites and web applications.

The primary function of an edge server is to deliver content such as web pages, images, videos, and other files to users in their proximity. Instead of users having to retrieve content from a central server that may be far away, the content is served from an edge server located in their geographic region. This leads to faster load times and a better user experience as traffic is routed over shorter distances and potentially over more robust networks.

Edge servers also play a crucial role in providing features such as caching and load balancing. They can cache frequently requested content to improve response times and distribute traffic across various servers to avoid overload.

Overall, edge servers enable businesses and website operators to deliver content more efficiently and improve the performance and availability of their services, especially for users in remote geographic regions.

 


Content Delivery Network - CDN

A Content Delivery Network (CDN) is a network of servers designed to efficiently and quickly distribute content to users around the world. The main goal of a CDN is to improve the performance of websites and web applications by bringing content such as HTML pages, images, videos, scripts, and other static or dynamic content closer to end users.

A CDN operates by deploying copies of content on servers located in various geographical locations known as "edge servers." When a user accesses a website or application supported by a CDN, the content is loaded from the edge server nearest to them, rather than from a central server that may be farther away. This leads to accelerated load times and an enhanced user experience as traffic is routed over shorter distances and potentially over more robust networks.

In addition to performance improvement, a CDN also offers better scalability and fault tolerance for websites and applications since traffic is distributed across multiple servers, and outages at one location do not fully disrupt the service.

Overall, a Content Delivery Network enables businesses and website operators to deliver content more efficiently and enhance user experience regardless of where users are located.

 


Port

A port is a logical communication endpoint that allows various applications on a computer to send and receive data. In networking technology, a port refers to a number that is assigned to a specific application or service on a computer, used to control traffic to that application or service.

Ports are typically represented by a 16-bit number and can range in value from 0 to 65535. The first 1024 ports are known as well-known ports and are reserved for specific services. For example, port 80 is commonly reserved for HTTP (Hypertext Transfer Protocol) used for web traffic, while port 443 is typically reserved for HTTPS (HTTP Secure) used for encrypted web traffic.

Ports are often used in conjunction with the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), both of which are protocols in the Internet Protocol suite (TCP/IP). TCP is a connection-oriented protocol suite, while UDP is a connectionless protocol suite. Both protocols use ports to facilitate data communication between different applications.

 


IP-Address

An IP address (Internet Protocol Address) is a unique numerical identifier assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses are used to identify devices within a network and enable them to communicate with each other.

There are two types of IP addresses: IPv4 (Internet Protocol Version 4) and IPv6 (Internet Protocol Version 6). IPv4 uses a 32-bit number, while IPv6 uses a longer 128-bit number. A typical IPv4 address looks like this: 192.168.0.1, whereas an IPv6 address is more complex, such as: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

IP addresses are used to identify devices on the Internet and allow them to exchange data. They play a central role in routing data packets across the Internet, enabling information to be forwarded between different computers and networks.

 


Domain Name System - DNS

The Domain Name System (DNS) is a hierarchical and distributed system designed to translate human-readable domain names into machine-readable IP addresses. It facilitates communication between computers on the Internet by managing the mapping of easily memorizable domain names to the numerical IP addresses that represent the actual communication targets.

Key functions of DNS include:

  1. Name Resolution: The primary purpose of DNS is to resolve domain names to IP addresses. For example, when you access a website like "www.example.com," your computer uses DNS to find the corresponding IP address of that website.

  2. Hierarchical Structure: DNS has a hierarchical structure evident in domain names such as "example.com." The hierarchy extends from right to left, with the right side being the Top-Level Domain (TLD), like ".com" or ".org," and the left side indicating specific subdomains (e.g., "example").

  3. Distributed Database: DNS is decentralized and operates with a distributed database structure. There are multiple DNS servers distributed worldwide that collaborate to manage the mapping of domain names to IP addresses.

  4. DNS Servers: Various types of DNS servers exist, including Authoritative DNS Servers, which provide authorized information for specific domains, and Recursive DNS Servers, which handle queries from clients and, if necessary, access Authoritative DNS Servers to obtain the required information.

DNS plays a crucial role on the Internet by providing a user-friendly way to access resources without users needing to know the underlying numerical IP addresses.

 


Application Layer - OSI Layer 7

The Application Layer is the topmost layer in the OSI (Open Systems Interconnection) model, encompassing functions directly related to the interaction between the application and the end user. This layer provides services accessible to application software and end-users. The primary tasks of the Application Layer include offering network services, facilitating communication, and transferring data between applications.

Some typical services and protocols used in the Application Layer include:

  1. HTTP (Hypertext Transfer Protocol): Used for exchanging hypertext documents on the World Wide Web.

  2. SMTP (Simple Mail Transfer Protocol): Used for email transmission.

  3. FTP (File Transfer Protocol): Enables file transfer over a network.

  4. DNS (Domain Name System): Provides domain name to IP address translation.

  5. SNMP (Simple Network Management Protocol): Used for network management and monitoring.

The Application Layer serves as an interface between the application and the lower layers of the OSI model. It is responsible for ensuring that applications on different devices can communicate by providing services such as data transfer, error control, and security.

 


Presentation Layer - OSI Layer 6

The Presentation Layer, also known as Layer 6, is the sixth layer in the OSI (Open Systems Interconnection) model. Positioned just above the Session Layer and below the Application Layer, the OSI model provides a conceptual framework for standardizing communication between diverse computer systems.

The primary function of the Presentation Layer is to ensure that data exchanged between applications is in a format suitable for communication. The tasks of the Presentation Layer include:

  1. Data Translation: The Presentation Layer is responsible for translating data into a format that can be correctly interpreted by the Application Layer. This involves converting data into a common format understood by the communicating applications.

  2. Encryption and Compression: This layer may apply encryption and compression techniques to enhance security and improve the efficiency of data transmission.

  3. Character Set Translation: If different character sets are in use, the Presentation Layer can perform translation between these character sets to ensure that transmitted data is correctly interpreted.

The Presentation Layer plays a crucial role in ensuring interoperability between different systems by making sure that data is transmitted in a form understandable by the involved applications. It provides an abstraction layer that bridges the diverse data formats and encodings used by different systems.

 


Session Layer - OSI Layer 5

The Session Layer, also known as Layer 5, is one of the seven layers in the OSI (Open Systems Interconnection) model. Positioned as the third layer from the bottom, the OSI model is a conceptual framework designed to standardize communication between different computer systems.

The primary role of the Session Layer is to establish, maintain, and terminate sessions between applications on different devices. This layer enables two applications on different devices to create a communication session for the exchange of data. The Session Layer ensures that data exchange occurs in an organized and synchronized manner.

Key functions of the Session Layer include:

  1. Session establishment and termination: It facilitates the setup, maintenance, and termination of communication sessions between applications.

  2. Synchronization: The Session Layer ensures that data transmission between the involved applications is synchronized to maintain consistency.

  3. Dialog control: It monitors and controls the dialogue between applications to ensure that data is transmitted in the correct order.

  4. Data management: The Session Layer allows for the management of data exchanged during a session, including error correction and recovery when needed.

In summary, the Session Layer is responsible for coordinating and managing communication sessions to ensure smooth and efficient data transmission between applications.