Visit complete Cyber Security roadmap

← Back to Topics List

Basics of Computer Networking

Computer networking refers to the practice of connecting two or more computing devices, creating an infrastructure in which they can exchange data, resources, and software. It is a fundamental part of cyber security and IT skills. In this chapter, we will cover five aspects of computer networking, including networking devices, network types, network protocols, IP addresses, and the OSI model.

Networking Devices

Several devices enable and facilitate communication between different devices. Common networking devices include:

  • Hubs: Devices that connect different devices together, transmitting data packets to all devices on the network.
  • Switches: Similar to hubs, but transmit data packets only to specific devices instead of broadcasting to all.
  • Routers: Devices that direct data packets between networks and provide the best path for data packets to reach their destination.
  • Firewalls: Devices or software that monitor and filter incoming and outgoing network traffic, allowing only authorized data to pass through.

Network Types

There are various types of networks based on the distance they cover, and the number of devices they connect. A few common network types are:

  • Personal Area Network (PAN): Connects devices within an individual workspace, typically within a range of 10 meters.
  • Local Area Network (LAN): Covers a small geographical area, such as a home or office, connecting multiple computers and other devices.
  • Wide Area Network (WAN): Covers a larger geographical area, interconnecting different LANs, often using leased telecommunication lines or wireless links.
  • Virtual Private Network (VPN): A secure network established over the public internet, encrypting the data transferred and restricting access to authorized users only.

Network Protocols

Protocols are sets of rules that govern the communication between devices within a network. Some of the most common protocols include:

  • Transmission Control Protocol (TCP): Ensures the reliable transmission of data and establishes connections between devices.
  • Internet Protocol (IP): Facilitates the transmission of data packets, assigning unique IP addresses to identify devices.
  • User Datagram Protocol (UDP): A lightweight, fast, but less reliable protocol compared to TCP, often used for streaming and gaming applications.

IP Addresses

An IP address is a unique identifier assigned to every device in a network. There are two types of IP addresses:

  • IPv4: Uses a 32-bit addressing system, allowing for approximately 4.3 billion unique IP addresses.
  • IPv6: Uses a 128-bit addressing system, providing a significantly larger number of available IP addresses.

IP addresses can also be categorized as dynamic or static, depending on whether they change over time or remain constant for a device.

OSI Model

The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and describe how different network protocols interact. It divides networking functions into seven distinct layers:

  • Physical Layer: Deals with the physical connection between devices, including cabling and hardware.
  • Data Link Layer: Handles the communication between adjacent devices on the same network.
  • Network Layer: Identifies the best route for data packets and manages IP addresses.
  • Transport Layer: Ensures the reliable transmission of data, including error checking and flow control.
  • Session Layer: Establishes, maintains, and terminates connections between applications on different devices.
  • Presentation Layer: Translates data into a format that is suitable for transmission between devices.
  • Application Layer: Represents the user interface with which applications interact.

Mastering the basics of computer networking is key to understanding and implementing effective cyber security measures. This chapter has covered essential networking concepts, but it is important to continually expand your knowledge in this ever-evolving field.

Found any mistakes? Help us improve by updating the file here..

Community

roadmap.sh is the 6th most starred project on GitHub and is visited by hundreds of thousands of developers every month.

Roadmaps Best Practices Guides Videos Store YouTube

roadmap.sh by Kamran Ahmed

Community created roadmaps, articles, resources and journeys to help you choose your path and grow in your career.

© roadmap.sh · FAQs · Terms · Privacy

ThewNewStack

The leading DevOps resource for Kubernetes, cloud-native computing, and the latest in at-scale development, deployment, and management.