Computer Networks Basics (Part 1)

Computer Networks:

  • Network is invented to communicate two or more computers together.
  • A network is a group of two or more computer systems or other devices that are linked together to exchange data
  • In networks, computing devices exchange data with each other using data links between nodes. 
  • These data links are established with the help of cable media(Ethernet wires) or wireless media(WiFi).

fig1: Basic Network

Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking.

Types of Networks:

  1. Personal Area Network (PAN):

        A personal area network is a computer network organized around an individual. Personal area networks typically involve mobile devices. Personal area networks can be wired or wireless. These networks generally cover a network range of 10 meters (about 30 feet).
  2. Local Area Network (LAN):

        A LAN is a network that connects computers and devices in a limited geographical area such as a home, school, office building.
  3. Wide Area Network (WAN):

        A WAN is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. A WAN uses a communications channel that combines many types of media such as telephone lines, ethernet cables, optical fibers, etc.
  4. Metropolitan Area Networks (MAN):

        Metropolitan area Network covers a larger area than that of a LAN and smaller area when compared to WAN. MANs rarely extend beyond 100km and comprise a combination of different hardware and transmission media.
  5. Wireless Local Area Network (WLAN):

        Wireless local area networks provide wireless communication over short distances using radio or infrared signals instead of traditional network cabling. WLANs are built by attaching a device called the access point to the edge of the wired network. Clients communicate with the AP using a wireless network adapter similar in function to a traditional Ethernet adapter.
  6. Virtual Private Network (VPN):

        The virtual private network is an overlay network in which some of the links between nodes are carried by virtual circuits in the network instead of physical wires. The data link layer protocols of the virtual network are said to be tunneled through the network.


How Different Computers Communicate?

Ans: Using a standard called OSI Model. This standard is followed when the device manufacturing. All networking devices follow this standard.

OSI Model:

  • OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • The main concept of OSI is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions or layers.
  • Each communicating user or program is on a device that can provide those seven layers of function.
  • The seven Open Systems Interconnection layers are:
fig2: OSI Model
  1. Physical Layer:

        This layer conveys the bit stream across the network either electrically, mechanically or through radio waves. The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers and repeaters.
  2. Data Link Layer:

         This layer sets up links across the physical network, putting packets into network frames. This layer has two sublayers the logical link control layer and the media access control layer (MAC). MAC layer types include Ethernet and 802.11 wireless specifications.

  3. Network Layer:

        This layer handles addressing and routing the data. To transfer it from the right source to the right destination. The IP address is part of the network layer. 

  4. Transport Layer:

        This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives. On the internet, TCP and UDP provide these services for most applications.

  5. Session Layer:

        The session layer controls the connections between computers. It establishes, manages and terminates the connections between the local and remote application.

  6. Presentation Layer:

        This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation format to another for example, from clear text to encrypted text at one end and back to clear text at the other.

  7. Application Layer:

        The application layer of the OSI model interacts with the end user. Protocols at this layer handle the requests from different software applications. If a web browser wants to download an image, an email client wants to check the server, and a file-sharing program wants to upload a movie, the protocols in the application layer will process those requests.

Network Components and Functions:

  1. Server: A computer or device on a network that manages network resources. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks like accepts and responds to requests made by another program, known as a client.
  2. Client: A client is an application that runs on a personal computer or workstation and relies on a server to perform some operations. The client accesses the server by way of a network.
  3. Devices: Computer devices, such as a CD-ROM drive or printer, that is not part of the essential computer. Examples of devices include disk drives, printers, and modems.
  4. Hub: Hub is a network hardware device for connecting multiple devices and making them act as a single network segment. A hub works at the physical layer of the OSI model.
  5. Switch: A device that filters and forwards packets between LAN segments. Switches operate at the data link layer and sometimes the network layer of the OSI Reference Model.
  6. Router: A router is a device that is capable of forwarding data packets on a network. Routers are placed at the junction (gateway) of two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets.
  7. Bridge: Bridge is a computer networking device that connects a local area network (LAN) to another local area network that uses the same protocol.
  8. Access Point: A hardware device or a computer's software that acts as a  communication hub for users to connect all their wireless device.

    Be Aware, Be Secure.

    Thank You 🙏


    Comments

    Popular posts from this blog

    Demo 1- How to Track Location by a Link

    Snyk - Ubuntu 20.04 (Linux)

    Cracking VNC Password Using Hydra