SlideShare a Scribd company logo
1 of 22
Download to read offline
DATA
ENGINEER
Introduction to Networking
Linux-Unix and System Administration
Docker and Docker Compose
Learning Progress Review - Week 3
| Dedy Sianipar | Niki Yulianto Andega | Satrio Budi R |
Introduction to Networking
Why Data Egineers need to learn networking
Data Engineers often accesses servers that can physically exist
anywhere (cloud or on-premise).
Data Engineers necessary to understand how communication between
machines occurs on a data platform, how it enters a network and leaves
a network.
When building etl pipeline, Data Engineers will often communicate with
infra /network team or SRE (DevOps) so it is necessary to understand
the terms in the computer network.
Some reasons data engineers need to understand computer networks:
OSI Model
What Is the OSI Model
The Open Systems Interconnection (OSI) model
describes seven layers that computer systems use
to communicate over a network. It was the first
standard model for network communications,
adopted by all major computer and
telecommunication companies in the early 1980s
The modern Internet is not based on OSI, but on the
simpler TCP/IP model. However, the OSI 7-layer model is
still widely used, as it helps visualize and communicate
how networks operate, and helps isolate and
troubleshoot networking problems.
OSI was introduced in 1983 by representatives of
the major computer and telecom companies, and
was adopted by ISO as an international standard
in 1984.
Ping:
A utility, commonly known as PING, which is used to query another computer on a TCP-IP network in order to
check that there is a connection to it. The user of this utility executes it with the name of the computer or its IP
address, and it then sends out a set of messages which ask the remote computer to reply and produce a short
report on whether the connection was achieved. Most operating systems contain a simple PING utility; there are
also many commercial and shareware versions available. It is sometimes referred to as the Packet INternet
Gopher.
Network
Tools
telnet:
What is Telnet?
Telnet, developed in 1969, is a protocol that provides a command line interface for communication with a remote device or server, sometimes employed
for remote management but also for initial device setup like network hardware. Telnet stands for Teletype Network, but it can also be used as a verb; 'to
telnet' is to establish a connection using the Telnet protocol.
Is Telnet secure?
Because it was developed before the mainstream adaptation of the internet, Telnet on its own does not employ any form of encryption, making it outdated
in terms of modern security. It has largely been overlapped by Secure Shell (SSH) protocol (which has its own security considerations around remote
access), at least on the public internet, but for instances where Telnet is still in use, there are a few methods for securing your communications.
How does Telnet work?
Telnet provides users with a bidirectional interactive text-oriented communication system utilizing a virtual terminal connection over 8 byte. User data is
interspersed in-band with telnet control information over the transmission control protocol (TCP). Often, Telnet was used on a terminal to execute
functions remotely.
The user connects to the server by using the Telnet protocol, which means entering Telnet into a command prompt by following this syntax: telnet
hostname port. The user then executes commands on the server by using specific Telnet commands into the Telnet prompt. To end a session and log off,
the user ends a Telnet command with Telnet.
What are common uses for Telnet?
Telnet can be used to test or troubleshoot remote web or mail servers, as well as for remote access to MUDs (multi-user dungeon games) and trusted
internal networks.
SSH is often used to "login" and perform operations on remote computers but it may also be used for transferring data.
How do I use SSH?
You use a program on your computer (ssh client), to connect to our service (server) and transfer the data to/from our
storage using either a graphical user interface or command line. There are many programs available that enable you to
perform this transfer and some operating systems such as Mac OS X and Linux have this capability built in.
SSH clients will typically support SCP (Secure Copy) and/or SFTP (SSH File Transfer Protocol) for transferring data; we
tend to recommend using SFTP instead of SCP but both will work with our service.
Will I have to use the command line?
No, there are many very good programs with graphical interfaces such as WinSCP for Windows and Cyberduck for Mac OS
X. Please see the access guide for your operating system (Windows, Mac OS X and Linux) for more information.
Why did Research Data Services choose SSH?
SSH enables us to provide a service with encrypted access for the widest range of operating systems (Windows XP-10, Max
OS X and Linux); this would not be possible if we provided Windows networked drives (which utilise the SMB/CIFS
communication protocol). SSH is reliable and secure and is often used in the High Performance Computing community for
this reason.
ssh:
SSH or Secure Shell is a network communication
protocol that enables two computers to communicate
(c.f http or hypertext transfer protocol, which is the
protocol used to transfer hypertext such as web
pages) and share data. An inherent feature of ssh is
that the communication between the two computers
is encrypted meaning that it is suitable for use on
insecure networks.
Linux/Unix
and System Administration
Unix is an operating system. It supports multitasking and multi-user functionality. Unix is most widely used in all forms of computing
systems such as desktop, laptop, and servers. On Unix, there is a Graphical user interface similar to windows that support easy
navigation and support environment. With GUI, using a Unix based system is easy but still one should know the Unix commands for
the cases where a GUI is not available such as telnet session.
There are several different versions of UNIX, however, there are many similarities. The most popular varieties of UNIX systems are
Sun Solaris, Linux/GNU, and MacOS X.
Any UNIX operating system consists of three parts; kernel, shell and Programs.
Unix is indispensable. From simple command-line applications to connecting and talking to servers, Unix made possible which GUI
based other operating systems could not do. Unix is there in all sorts of applications and systems be it Android, iOS, PlayStation etc.
Those prospective candidates who are to work with server technology and administration, should definitely learn Unix, get familiar
with its commands, use cases, and core principle. Particularly, those who handle Linux or Ubuntu systems or even those who want
to go for big data analytics should surely learn uses of Unix. Simple applications of Unix commands such as pwd, chdir, dir, ls, ls-l,
passwd should be known to all computer science graduates or computer enthusiastic.
What is Unix:
Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact,
one of the most popular platforms on the planet, Android, is powered by the
Linux operating system. An operating system is software that manages all of
the hardware resources associated with your desktop or laptop. To put it
simply, the operating system manages the communication between your
software and your hardware. Without the operating system (OS), the software
wouldn’t function.
What is Linux:
Bootloader – The software that manages the boot process of your computer. For most users, this will
simply be a splash screen that pops up and eventually goes away to boot into the operating system.
Kernel – This is the one piece of the whole that is actually called ?Linux?. The kernel is the core of the
system and manages the CPU, memory, and peripheral devices. The kernel is the lowest level of the OS.
Init system – This is a sub-system that bootstraps the user space and is charged with controlling
daemons. One of the most widely used init systems is systemd? which also happens to be one of the most
controversial. It is the init system that manages the boot process, once the initial booting is handed over
from the bootloader (i.e., GRUB or GRand Unified Bootloader).
Daemons – These are background services (printing, sound, scheduling, etc.) that either start up during
boot or after you log into the desktop.
Graphical server – This is the sub-system that displays the graphics on your monitor. It is commonly
referred to as the X server or just X.
Desktop environment – This is the piece that the users actually interact with. There are many desktop
environments to choose from (GNOME, Cinnamon, Mate, Pantheon, Enlightenment, KDE, Xfce, etc.). Each
desktop environment includes built-in applications (such as file managers, configuration tools, web
browsers, and games).
Applications – Desktop environments do not offer the full array of apps. Just like Windows and macOS,
Linux offers thousands upon thousands of high-quality software titles that can be easily found and
installed. Most modern Linux distributions (more on this below) include App Store-like tools that
centralize and simplify application installation. For example, Ubuntu Linux has the Ubuntu Software
Center (a rebrand of GNOME Software? Figure 1) which allows you to quickly search among the thousands
of apps and install them from one centralized location.
The Linux operating system comprises several different pieces:
1.
2.
3.
4.
5.
6.
7.
Docker and
Docker Compose
Docker Basic.
Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate
your applications from your infrastructure so you can deliver software quickly. With Docker, you can manage your
infrastructure in the same ways you manage your applications. By taking advantage of Docker’s methodologies for
shipping, testing, and deploying code quickly, you can significantly reduce the delay between writing code and
running it in production.
The Docker platform
Docker provides the ability to package and run an application in a loosely isolated environment called a container.
The isolation and security allow you to run many containers simultaneously on a given host. Containers are
lightweight and contain everything needed to run the application, so you do not need to rely on what is currently
installed on the host. You can easily share containers while you work, and be sure that everyone you share with
gets the same container that works in the same way.
Docker provides tooling and a platform to manage the lifecycle of your containers:
·Develop your application and its supporting components using containers.
·The container becomes the unit for distributing and testing your application.
·When you’re ready, deploy your application into your production environment, as a container or an orchestrated
service. This works the same whether your production environment is a local data center, a cloud provider, or a
hybrid of the two.
Develop your application and its supporting components using containers.
The container becomes the unit for distributing and testing your application.
When you’re ready, deploy your application into your production environment, as a container or an orchestrated
service. This works the same whether your production environment is a local data center, a cloud provider, or a
hybrid of the two.
Docker provides tooling and a platform to manage the lifecycle of your containers:
What can I use Docker for?
Your developers write code locally and share their work with their colleagues using Docker
containers.
They use Docker to push their applications into a test environment and execute automated and
manual tests.
When developers find bugs, they can fix them in the development environment and redeploy
them to the test environment for testing and validation.
When testing is complete, getting the fix to the customer is as simple as pushing the updated
image to the production environment.
Fast, consistent delivery of your applications
Docker streamlines the development lifecycle by allowing developers to work in standardized
environments using local containers which provide your applications and services. Containers are
great for continuous integration and continuous delivery (CI/CD) workflows.
Consider the following example scenario:
Responsive deployment and scaling
Docker’s container-based platform allows for highly portable workloads. Docker containers can run
on a developer’s local laptop, on physical or virtual machines in a data center, on cloud providers,
or in a mixture of environments.
Docker’s portability and lightweight nature also make it easy to dynamically manage workloads,
scaling up or tearing down applications and services as business needs dictate, in near real time
Running more workloads on the same hardware
Docker is lightweight and fast. It provides a viable, cost-effective alternative to hypervisor-based
virtual machines, so you can use more of your compute capacity to achieve your business goals.
Docker is perfect for high density environments and for small and medium deployments where you
need to do more with fewer resources.
Docker
architecture
Docker uses a client-server architecture. The Docker client talks to the Docker daemon, which does the heavy
lifting of building, running, and distributing your Docker containers. The Docker client and daemon can run on
the same system, or you can connect a Docker client to a remote Docker daemon. The Docker client and
daemon communicate using a REST API, over UNIX sockets or a network interface. Another Docker client is
Docker Compose, that lets you work with applications consisting of a set of containers.
The Docker daemon
The Docker daemon (dockerd) listens for Docker API requests and manages Docker objects such as images,
containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker
services.
The Docker client
The Docker client (docker) is the primary way that many Docker users interact with Docker. When you use
commands such as docker run, the client sends these commands to dockerd, which carries them out. The
docker command uses the Docker API. The Docker client can communicate with more than one daemon.
The Docker Desktop
Docker Desktop is an easy-to-install application for your Mac or Windows environment that enables you to build
and share containerized applications and microservices. Docker Desktop includes the Docker daemon
(dockerd), the Docker client (docker), Docker Compose, Docker Content Trust, Kubernetes, and Credential
Helper. For more information, see Docker Desktop.
Docker registries
A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is
configured to look for images on Docker Hub by default. You can even run your own private registry.
When you use the docker pull or docker run commands, the required images are pulled from your configured
registry. When you use the docker push command, your image is pushed to your configured registry.
Docker objects
When you use Docker, you are creating and using images, containers, networks, volumes, plugins, and other
objects. This section is a brief overview of some of those objects.
Images
An image is a read-only template with instructions for creating a Docker container. Often, an image is based on
another image, with some additional customization. For example, you may build an image which is based on the
ubuntu image, but installs the Apache web server and your application, as well as the configuration details
needed to make your application run.
You might create your own images or you might only use those created by others and published in a registry. To
build your own image, you create a Dockerfile with a simple syntax for defining the steps needed to create the
image and run it. Each instruction in a Dockerfile creates a layer in the image. When you change the Dockerfile
and rebuild the image, only those layers which have changed are rebuilt. This is part of what makes images so
lightweight, small, and fast, when compared to other virtualization technologies.
Containers
A container is a runnable instance of an image. You can create, start, stop, move, or delete a container using the
Docker API or CLI. You can connect a container to one or more networks, attach storage to it, or even create a
new image based on its current state.
By default, a container is relatively well isolated from other containers and its host machine. You can control how
isolated a container’s network, storage, or other underlying subsystems are from other containers or from the
host machine.
A container is defined by its image as well as any configuration options you provide to it when you create or start
it. When a container is removed, any changes to its state that are not stored in persistent storage disappear.
Sources:
https://www.imperva.com/learn/application-security/osi-model/
https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100300429
https://www.extrahop.com/resources/protocols/telnet/
https://geekflare.com/understanding-ssh/
https://www.educba.com/uses-of-unix/
https://www.linux.com/what-is-linux/
https://www.geeksforgeeks.org/how-linux-kernel-boots/
https://docs.docker.com/get-started/overview/
Thank You!

More Related Content

What's hot

Introduction to Linux OS
Introduction to Linux OSIntroduction to Linux OS
Introduction to Linux OSMohammed Safwat
 
Intro tounix
Intro tounixIntro tounix
Intro tounixdjprince
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxplarsen67
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux IntroductionRamasubbu .P
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux SystemWayne Jones Jnr
 
Introduction to Linux_by_Amit & Jiban
Introduction to Linux_by_Amit & Jiban Introduction to Linux_by_Amit & Jiban
Introduction to Linux_by_Amit & Jiban Amit Nath
 
Intro to linux
Intro to linuxIntro to linux
Intro to linuxgabrail
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linuxanand09
 
Linux ppt
Linux pptLinux ppt
Linux pptlincy21
 
linux software architecture
linux software architecture linux software architecture
linux software architecture Sneha Ramesh
 
Everything You Need to Know About Linux Distros and Their Functionalities
Everything You Need to Know About Linux Distros and Their FunctionalitiesEverything You Need to Know About Linux Distros and Their Functionalities
Everything You Need to Know About Linux Distros and Their FunctionalitiesMariyamYouss
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - OverviewAshita Agrawal
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating systemSadhana28
 
Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unixAchu dhan
 

What's hot (20)

Introduction to Linux OS
Introduction to Linux OSIntroduction to Linux OS
Introduction to Linux OS
 
Intro tounix
Intro tounixIntro tounix
Intro tounix
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Linux opearting system
Linux opearting systemLinux opearting system
Linux opearting system
 
Introduction to Linux_by_Amit & Jiban
Introduction to Linux_by_Amit & Jiban Introduction to Linux_by_Amit & Jiban
Introduction to Linux_by_Amit & Jiban
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linux
 
History of Linux
History of LinuxHistory of Linux
History of Linux
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
linux software architecture
linux software architecture linux software architecture
linux software architecture
 
Everything You Need to Know About Linux Distros and Their Functionalities
Everything You Need to Know About Linux Distros and Their FunctionalitiesEverything You Need to Know About Linux Distros and Their Functionalities
Everything You Need to Know About Linux Distros and Their Functionalities
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Slim Server Theory
Slim Server TheorySlim Server Theory
Slim Server Theory
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating system
 
Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unix
 

Similar to Introduction to Networking | Linux-Unix and System Administration | Docker and Docker Compose.

Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxMahiDivya
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system pptAchyut Sinha
 
Modern operating system.......
Modern operating system.......Modern operating system.......
Modern operating system.......vignesh0009
 
system software and application software
system software and application softwaresystem software and application software
system software and application softwareTallat Satti
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.pptgadisaAdamu
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingJérôme Kehrli
 
1.1.1.Introduction.pdf
1.1.1.Introduction.pdf1.1.1.Introduction.pdf
1.1.1.Introduction.pdfbemnitekalegn
 
Client server component
Client server componentClient server component
Client server componentSatya P. Joshi
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxplarsen67
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computersgyanikashukla
 

Similar to Introduction to Networking | Linux-Unix and System Administration | Docker and Docker Compose. (20)

Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
IntroToUnix.ppt
IntroToUnix.pptIntroToUnix.ppt
IntroToUnix.ppt
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
Operating system1
Operating system1Operating system1
Operating system1
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Operating system
Operating system Operating system
Operating system
 
Operating system destop
Operating system destopOperating system destop
Operating system destop
 
Modern operating system.......
Modern operating system.......Modern operating system.......
Modern operating system.......
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.ppt
 
Linux
LinuxLinux
Linux
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
 
1.1.1.Introduction.pdf
1.1.1.Introduction.pdf1.1.1.Introduction.pdf
1.1.1.Introduction.pdf
 
Foss Presentation
Foss PresentationFoss Presentation
Foss Presentation
 
Client server component
Client server componentClient server component
Client server component
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
training report
training reporttraining report
training report
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 

Recently uploaded

VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 

Recently uploaded (20)

E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 

Introduction to Networking | Linux-Unix and System Administration | Docker and Docker Compose.

  • 1. DATA ENGINEER Introduction to Networking Linux-Unix and System Administration Docker and Docker Compose Learning Progress Review - Week 3 | Dedy Sianipar | Niki Yulianto Andega | Satrio Budi R |
  • 3. Why Data Egineers need to learn networking Data Engineers often accesses servers that can physically exist anywhere (cloud or on-premise). Data Engineers necessary to understand how communication between machines occurs on a data platform, how it enters a network and leaves a network. When building etl pipeline, Data Engineers will often communicate with infra /network team or SRE (DevOps) so it is necessary to understand the terms in the computer network. Some reasons data engineers need to understand computer networks:
  • 4. OSI Model What Is the OSI Model The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network. It was the first standard model for network communications, adopted by all major computer and telecommunication companies in the early 1980s The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer model is still widely used, as it helps visualize and communicate how networks operate, and helps isolate and troubleshoot networking problems. OSI was introduced in 1983 by representatives of the major computer and telecom companies, and was adopted by ISO as an international standard in 1984.
  • 5. Ping: A utility, commonly known as PING, which is used to query another computer on a TCP-IP network in order to check that there is a connection to it. The user of this utility executes it with the name of the computer or its IP address, and it then sends out a set of messages which ask the remote computer to reply and produce a short report on whether the connection was achieved. Most operating systems contain a simple PING utility; there are also many commercial and shareware versions available. It is sometimes referred to as the Packet INternet Gopher. Network Tools
  • 6. telnet: What is Telnet? Telnet, developed in 1969, is a protocol that provides a command line interface for communication with a remote device or server, sometimes employed for remote management but also for initial device setup like network hardware. Telnet stands for Teletype Network, but it can also be used as a verb; 'to telnet' is to establish a connection using the Telnet protocol. Is Telnet secure? Because it was developed before the mainstream adaptation of the internet, Telnet on its own does not employ any form of encryption, making it outdated in terms of modern security. It has largely been overlapped by Secure Shell (SSH) protocol (which has its own security considerations around remote access), at least on the public internet, but for instances where Telnet is still in use, there are a few methods for securing your communications. How does Telnet work? Telnet provides users with a bidirectional interactive text-oriented communication system utilizing a virtual terminal connection over 8 byte. User data is interspersed in-band with telnet control information over the transmission control protocol (TCP). Often, Telnet was used on a terminal to execute functions remotely. The user connects to the server by using the Telnet protocol, which means entering Telnet into a command prompt by following this syntax: telnet hostname port. The user then executes commands on the server by using specific Telnet commands into the Telnet prompt. To end a session and log off, the user ends a Telnet command with Telnet. What are common uses for Telnet? Telnet can be used to test or troubleshoot remote web or mail servers, as well as for remote access to MUDs (multi-user dungeon games) and trusted internal networks.
  • 7. SSH is often used to "login" and perform operations on remote computers but it may also be used for transferring data. How do I use SSH? You use a program on your computer (ssh client), to connect to our service (server) and transfer the data to/from our storage using either a graphical user interface or command line. There are many programs available that enable you to perform this transfer and some operating systems such as Mac OS X and Linux have this capability built in. SSH clients will typically support SCP (Secure Copy) and/or SFTP (SSH File Transfer Protocol) for transferring data; we tend to recommend using SFTP instead of SCP but both will work with our service. Will I have to use the command line? No, there are many very good programs with graphical interfaces such as WinSCP for Windows and Cyberduck for Mac OS X. Please see the access guide for your operating system (Windows, Mac OS X and Linux) for more information. Why did Research Data Services choose SSH? SSH enables us to provide a service with encrypted access for the widest range of operating systems (Windows XP-10, Max OS X and Linux); this would not be possible if we provided Windows networked drives (which utilise the SMB/CIFS communication protocol). SSH is reliable and secure and is often used in the High Performance Computing community for this reason. ssh: SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data. An inherent feature of ssh is that the communication between the two computers is encrypted meaning that it is suitable for use on insecure networks.
  • 9. Unix is an operating system. It supports multitasking and multi-user functionality. Unix is most widely used in all forms of computing systems such as desktop, laptop, and servers. On Unix, there is a Graphical user interface similar to windows that support easy navigation and support environment. With GUI, using a Unix based system is easy but still one should know the Unix commands for the cases where a GUI is not available such as telnet session. There are several different versions of UNIX, however, there are many similarities. The most popular varieties of UNIX systems are Sun Solaris, Linux/GNU, and MacOS X. Any UNIX operating system consists of three parts; kernel, shell and Programs. Unix is indispensable. From simple command-line applications to connecting and talking to servers, Unix made possible which GUI based other operating systems could not do. Unix is there in all sorts of applications and systems be it Android, iOS, PlayStation etc. Those prospective candidates who are to work with server technology and administration, should definitely learn Unix, get familiar with its commands, use cases, and core principle. Particularly, those who handle Linux or Ubuntu systems or even those who want to go for big data analytics should surely learn uses of Unix. Simple applications of Unix commands such as pwd, chdir, dir, ls, ls-l, passwd should be known to all computer science graduates or computer enthusiastic. What is Unix:
  • 10. Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one of the most popular platforms on the planet, Android, is powered by the Linux operating system. An operating system is software that manages all of the hardware resources associated with your desktop or laptop. To put it simply, the operating system manages the communication between your software and your hardware. Without the operating system (OS), the software wouldn’t function. What is Linux:
  • 11. Bootloader – The software that manages the boot process of your computer. For most users, this will simply be a splash screen that pops up and eventually goes away to boot into the operating system. Kernel – This is the one piece of the whole that is actually called ?Linux?. The kernel is the core of the system and manages the CPU, memory, and peripheral devices. The kernel is the lowest level of the OS. Init system – This is a sub-system that bootstraps the user space and is charged with controlling daemons. One of the most widely used init systems is systemd? which also happens to be one of the most controversial. It is the init system that manages the boot process, once the initial booting is handed over from the bootloader (i.e., GRUB or GRand Unified Bootloader). Daemons – These are background services (printing, sound, scheduling, etc.) that either start up during boot or after you log into the desktop. Graphical server – This is the sub-system that displays the graphics on your monitor. It is commonly referred to as the X server or just X. Desktop environment – This is the piece that the users actually interact with. There are many desktop environments to choose from (GNOME, Cinnamon, Mate, Pantheon, Enlightenment, KDE, Xfce, etc.). Each desktop environment includes built-in applications (such as file managers, configuration tools, web browsers, and games). Applications – Desktop environments do not offer the full array of apps. Just like Windows and macOS, Linux offers thousands upon thousands of high-quality software titles that can be easily found and installed. Most modern Linux distributions (more on this below) include App Store-like tools that centralize and simplify application installation. For example, Ubuntu Linux has the Ubuntu Software Center (a rebrand of GNOME Software? Figure 1) which allows you to quickly search among the thousands of apps and install them from one centralized location. The Linux operating system comprises several different pieces: 1. 2. 3. 4. 5. 6. 7.
  • 13. Docker Basic. Docker is an open platform for developing, shipping, and running applications. Docker enables you to separate your applications from your infrastructure so you can deliver software quickly. With Docker, you can manage your infrastructure in the same ways you manage your applications. By taking advantage of Docker’s methodologies for shipping, testing, and deploying code quickly, you can significantly reduce the delay between writing code and running it in production.
  • 14. The Docker platform Docker provides the ability to package and run an application in a loosely isolated environment called a container. The isolation and security allow you to run many containers simultaneously on a given host. Containers are lightweight and contain everything needed to run the application, so you do not need to rely on what is currently installed on the host. You can easily share containers while you work, and be sure that everyone you share with gets the same container that works in the same way. Docker provides tooling and a platform to manage the lifecycle of your containers: ·Develop your application and its supporting components using containers. ·The container becomes the unit for distributing and testing your application. ·When you’re ready, deploy your application into your production environment, as a container or an orchestrated service. This works the same whether your production environment is a local data center, a cloud provider, or a hybrid of the two.
  • 15. Develop your application and its supporting components using containers. The container becomes the unit for distributing and testing your application. When you’re ready, deploy your application into your production environment, as a container or an orchestrated service. This works the same whether your production environment is a local data center, a cloud provider, or a hybrid of the two. Docker provides tooling and a platform to manage the lifecycle of your containers:
  • 16. What can I use Docker for? Your developers write code locally and share their work with their colleagues using Docker containers. They use Docker to push their applications into a test environment and execute automated and manual tests. When developers find bugs, they can fix them in the development environment and redeploy them to the test environment for testing and validation. When testing is complete, getting the fix to the customer is as simple as pushing the updated image to the production environment. Fast, consistent delivery of your applications Docker streamlines the development lifecycle by allowing developers to work in standardized environments using local containers which provide your applications and services. Containers are great for continuous integration and continuous delivery (CI/CD) workflows. Consider the following example scenario:
  • 17. Responsive deployment and scaling Docker’s container-based platform allows for highly portable workloads. Docker containers can run on a developer’s local laptop, on physical or virtual machines in a data center, on cloud providers, or in a mixture of environments. Docker’s portability and lightweight nature also make it easy to dynamically manage workloads, scaling up or tearing down applications and services as business needs dictate, in near real time Running more workloads on the same hardware Docker is lightweight and fast. It provides a viable, cost-effective alternative to hypervisor-based virtual machines, so you can use more of your compute capacity to achieve your business goals. Docker is perfect for high density environments and for small and medium deployments where you need to do more with fewer resources.
  • 18. Docker architecture Docker uses a client-server architecture. The Docker client talks to the Docker daemon, which does the heavy lifting of building, running, and distributing your Docker containers. The Docker client and daemon can run on the same system, or you can connect a Docker client to a remote Docker daemon. The Docker client and daemon communicate using a REST API, over UNIX sockets or a network interface. Another Docker client is Docker Compose, that lets you work with applications consisting of a set of containers.
  • 19. The Docker daemon The Docker daemon (dockerd) listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services. The Docker client The Docker client (docker) is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockerd, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon. The Docker Desktop Docker Desktop is an easy-to-install application for your Mac or Windows environment that enables you to build and share containerized applications and microservices. Docker Desktop includes the Docker daemon (dockerd), the Docker client (docker), Docker Compose, Docker Content Trust, Kubernetes, and Credential Helper. For more information, see Docker Desktop. Docker registries A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry. When you use the docker pull or docker run commands, the required images are pulled from your configured registry. When you use the docker push command, your image is pushed to your configured registry.
  • 20. Docker objects When you use Docker, you are creating and using images, containers, networks, volumes, plugins, and other objects. This section is a brief overview of some of those objects. Images An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. For example, you may build an image which is based on the ubuntu image, but installs the Apache web server and your application, as well as the configuration details needed to make your application run. You might create your own images or you might only use those created by others and published in a registry. To build your own image, you create a Dockerfile with a simple syntax for defining the steps needed to create the image and run it. Each instruction in a Dockerfile creates a layer in the image. When you change the Dockerfile and rebuild the image, only those layers which have changed are rebuilt. This is part of what makes images so lightweight, small, and fast, when compared to other virtualization technologies.
  • 21. Containers A container is a runnable instance of an image. You can create, start, stop, move, or delete a container using the Docker API or CLI. You can connect a container to one or more networks, attach storage to it, or even create a new image based on its current state. By default, a container is relatively well isolated from other containers and its host machine. You can control how isolated a container’s network, storage, or other underlying subsystems are from other containers or from the host machine. A container is defined by its image as well as any configuration options you provide to it when you create or start it. When a container is removed, any changes to its state that are not stored in persistent storage disappear.