Introduction to Networks
network is a collection of interconnected devices that
can communicate - sending and receiving data, and also sharing resources
with each other. some networking key concepts.| Concepts | Description |
|---|---|
Nodes |
Individual devices connected to a network. |
Links |
Communication pathways that connect nodes (wired or wireless). |
Data Sharing |
The primary purpose of a network is to enable data exchange. |
Networks, particularly since the advent of the Internet, have radically transformed society, enabling a multitude of possibilities that are now essential to our lives. Below are just a few of the benefits afforded to us by this incredible technology.
| Function | Description |
|---|---|
Resource Sharing | Multiple devices can share hardware (like printers) and software resources. |
Communication |
Instant messaging, emails, and video calls rely on networks. |
Data Access |
Access files and databases from any connected device. |
Collaboration |
Work together in real-time, even when miles apart. |
Local Area Network (LAN) and Wide Area Network (WAN). Local Area Network (LAN)
A Local Area Network (LAN) connects devices over a short
distance, such as within a home, school, or small office building. Here
are some of its key characteristics:
| Characteristic | Description |
|---|---|
Geographical Scope |
Covers a small area. |
Ownership |
Typically owned and managed by a single person or organization. |
Speed |
High data transfer rates. |
Media |
Uses wired (Ethernet cables) or wireless (Wi-Fi) connections. |
Wide Area Network (WAN)
A Wide Area Network (WAN) spans a large geographical area, connecting multiple LANs. Below are some of its key characteristics:
| Characteristic | Description |
|---|---|
Geographical Scope |
Covers cities, countries, or continents. |
Ownership |
Often a collective or distributed ownership (e.g., internet service providers). |
Speed |
Slower data transfer rates compared to LANs due to long-distance data travel. |
Media |
Utilizes fiber optics, satellite links, and leased telecommunication lines. |
Network Concepts
OSI and TCP/IP models, some common network protocols used as rules and standards for data exchange, and the various transmission methods that enable information to traverse efficiently and securely across the network. OSI Model : The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstract layers.
Physical Layer (Layer 1)
The Physical Layer is the first and lowest layer of the
OSI model.This layer deals with the physical connection between
devices, including the hardware components like Ethernet cables, hubs,
and repeaters.
Data Link Layer (Layer 2)
The Data Link Layer provides node-to-node data transfer -
a direct link between two physically connected nodes. Devices such as switches and bridges operate
at this layer, using MAC (Media Access Control) addresses to identify network devices.
Network Layer (Layer 3)
The Network Layer handles packet forwarding, including
the routing of packets through different routers to reach the
destination network. Routers operate at this layer, using IP (Internet Protocol) addresses to identify devices and determine the most efficient path for data transmission.
Transport Layer (Layer 4)
The Transport Layer provides end-to-end communication
services for applications. It is responsible for the reliable (or
unreliable) delivery of data, segmentation, reassembly of messages, flow
control, and error checking. Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
function at this layer. TCP offers reliable, connection-oriented
transmission with error recovery, while UDP provides faster,
connectionless communication without guaranteed delivery.
Session Layer (Layer 5)
The Session Layer manages sessions between applications.
It establishes, maintains, and terminates connections, allowing devices
to hold ongoing communications known as sessions. This layer is
essential for session checkpointing and recovery, ensuring that data
transfer can resume seamlessly after interruptions.
Presentation Layer (Layer 6)
The Presentation Layer acts as a translator between the
application layer and the network format. It handles data
representation, ensuring that information sent by the application layer
of one system is readable by the application layer of another. Encryption protocols and data compression
techniques operate at this layer to secure and optimize data
transmission.
Application Layer (Layer 7)
It enables resource sharing, remote file access, and other network
services. Common protocols operating at this layer include HTTP (Hypertext Transfer Protocol) for web browsing, FTP (File Transfer Protocol) for file transfers, SMTP (Simple Mail Transfer Protocol) for email transmission, and DNS (Domain Name System)
for resolving domain names to IP addresses. This layer serves as the
interface between the network and the application software.
TCP/IP Model: The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a condensed version of the OSI model, tailored for practical implementation on the internet and other networks. Below we see the four layers of the TCP/IP Model.
Link Layer
This layer is responsible for handling the physical aspects of network hardware and media. It includes technologies such as Ethernet for wired connections and Wi-Fi for wireless connections.
Internet Layer
The Internet Layer manages the logical addressing of
devices and the routing of packets across networks. Protocols like IP
(Internet Protocol) and ICMP (Internet Control Message Protocol) operate
at this layer, ensuring that data reaches its intended destination by
determining logical paths for packet transmission.
Transport Layer
At the Transport Layer, the TCP/IP model provides
end-to-end communication services that are essential for the functioning
of the internet. This includes the use of TCP (Transmission Control
Protocol) for reliable communication and UDP (User Datagram Protocol)
for faster, connectionless services. This layer ensures that data
packets are delivered in a sequential and error-free manner,
corresponding to the Transport Layer of the OSI model.
Application Layer
The Application Layer of the TCP/IP model contains
protocols that offer specific data communication services to
applications. Protocols such as HTTP (Hypertext Transfer Protocol), FTP
(File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol)
enable functionalities like web browsing, file transfers, and email
services. This layer corresponds to the top three layers of the OSI
model (Session, Presentation, and Application)
Common Network Protocols
| Protocol | Description |
|---|---|
HTTP (Hypertext Transfer Protocol) |
Primarily used for transferring web pages. It operates at the Application Layer, allowing browsers and servers to communicate in the delivery of web content. |
FTP (File Transfer Protocol) |
Facilitates the transfer of files between systems, also functioning at the Application Layer. It provides a way for users to upload or download files to and from servers. |
SMTP (Simple Mail Transfer Protocol) |
Handles the transmission of email. Operating at the Application Layer, it is responsible for sending messages from one server to another, ensuring they reach their intended recipients. |
TCP (Transmission Control Protocol) |
Ensures reliable data transmission through error checking and recovery, operating at the Transport Layer. It establishes a connection between sender and receiver to guarantee the delivery of data in the correct order. |
UDP (User Datagram Protocol) |
Allows for fast, connectionless communication, which operates without error recovery. This makes it ideal for applications that require speed over reliability, such as streaming services. UDP operates at the Transport Layer. |
IP (Internet Protocol) |
Crucial for routing packets across network boundaries, functioning at the Internet Layer. It handles the addressing and routing of packets to ensure they travel from the source to the destination across diverse networks. |
Network Communication
MAC addresses, IP addresses, and ports. A Media Access Control (MAC) address is a unique identifier
assigned to the network interface card (NIC) of a device, allowing it
to be recognized on a local network. An Internet Protocol (IP) address is a numerical label assigned to each device connected to a network that utilizes the Internet Protocol for communication. A port is a number assigned to specific processes or
services on a network to help computers sort and direct network traffic
correctly. Well-known ports, numbered from 0 to 1023, Registered ports, which range from 1024 to 49151, Dynamic or private ports, also known as ephemeral ports, range from 49152 to 65535.Dynamic Host Configuration Protocol (DHCP) &NAT
DHCP is a network management protocol used to automate the
process of configuring devices on IP networks. It allows devices to
automatically receive an IP address and other network configuration
parameters, such as subnet mask, default gateway, and DNS servers,
without manual intervention. To better understand Network Address Translation (NAT), It's helpful to know that there are several types of Network Address Translation (NAT), each designed for specific networking needs. Below are the different types of NAT.
| Type | Description |
|---|---|
Static NAT |
Involves a one-to-one mapping, where each private IP address corresponds directly to a public IP address. |
Dynamic NAT |
Assigns a public IP from a pool of available addresses to a private IP as needed, based on network demand. |
Port Address Translation (PAT) |
Also known as NAT Overload, is the most common form of NAT in home networks. Multiple private IP addresses share a single public IP address, differentiating connections by using unique port numbers. This method is widely used in home and small office networks, allowing multiple devices to share a single public IP address for internet access. |
Internet Architecture
Internet Architecture describes how data is organized,
transmitted, and managed across networks. Different architectural models
serve different needs—some offer a straightforward client-server setup
(like a website), while others rely on a more distributed approach (like
file-sharing platforms). Understanding these models helps us see why
networks are designed and operated the way they are. Different
architectures solve different problems. Often, we see a combination of
architectures creating hybrid models. Each model comes with its own set
of trade-offs in terms of scalability, performance, security, and
manageability. In the following paragraphs, we will describe the
different architectures in more detail. Peer-to-Peer (P2P) network, each node, whether it's a
computer or any other device, acts as both a client and a server. This
setup allows nodes to communicate directly with each other, sharing
resources such as files, processing power, or bandwidth, without the
need for a central server. P2P networks can be fully decentralized, with
no central server involved, or partially centralized, where a central
server may coordinate some tasks but does not host data.Client-Server model is one of the most widely used
architectures on the Internet. In this setup, clients, which are user
devices, send requests, such as a web browser asking for a webpage, and
servers respond to these requests, like a web server hosting the
webpage. This model typically involves centralized servers where data
and applications reside, with multiple clients connecting to these
servers to access services and resources.Key Comparisons
Below is a comparison table that outlines key characteristics of different network architectures
Architecture |
Centralized |
Scalability |
Ease of Management |
Typical Use Cases |
|---|---|---|---|---|
P2P |
Decentralized (or partial) | High (as peers grow) | Complex (no central control) | File-sharing, blockchain |
Client-Server |
Centralized | Moderate | Easier (server-based) | Websites, email services |
Hybrid |
Partially central | Higher than C-S | More complex management | Messaging apps, video conferencing |
Cloud |
Centralized in provider’s infra | High | Easier (outsourced) | Cloud storage, SaaS, PaaS |
SDN |
Centralized control plane | High (policy-driven) | Moderate (needs specialized tools) | Datacenters, large enterprises |
Network Security
In networking, the term security refers to the measures taken to
protect data, applications, devices, and systems within this network
from unauthorized access or damage. The goal is to uphold and maintain
the CIA triad:
| Principle | Description |
|---|---|
Confidentiality |
Only authorized users can view the data. |
Integrity |
The data remains accurate and unaltered. |
Availability |
Network resources are accessible when needed. |
In the next paragraphs, we will discuss two critical components of network security: Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS).
Firewalls
A Firewall is a network security device, either
hardware, software, or a combination of both, that monitors incoming and
outgoing network traffic. Firewalls enforce a set of rules (known as firewall policies or access control lists) to determine whether to allow or block
specific traffic. We can imagine a firewall as a security guard at the
entrance of a building, checking who is allowed in or out based on a
list of rules. If a visitor doesn’t meet the criteria (e.g., not on the
guest list), they are denied entry.
The open source router/firewall pfSense. It's large number of plugins (known as "Packages") give it a range of capabilities.
Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion Detection and Prevention Systems (IDS/IPS) are security solutions designed to monitor and respond to suspicious network or system activity. An Intrusion Detection System (IDS) observes traffic or system events to identify malicious behavior or policy violations, generating alerts but not blocking the suspicious traffic. In contrast, an Intrusion Prevention System (IPS) operates similarly to an IDS but takes an additional step by preventing or rejecting malicious traffic in real time. The key difference lies in their actions: an IDS detects and alerts, while an IPS detects and prevents.
The widely used Suricata software can function as both an IDS and an IPS. Here, we see the user enable a detection rule, then begin inline monitoring.
Best Practices
Here are the best practices for enhancing network security, summarized in the following table:
| Practice | Description |
|---|---|
Define Clear Policies |
Consistent firewall rules based on the principle of least privilege (only allow what is necessary). |
Regular Updates |
Keep firewall, IDS/IPS signatures, and operating systems up to date to defend against the latest threats. |
Monitor and Log Events |
Regularly review firewall logs, IDS/IPS alerts, and system logs to identify suspicious patterns early. |
Layered Security |
Use defense in depth (a strategy that leverages
multiple security measures to slow down an attack) with multiple layers:
Firewalls, IDS/IPS, antivirus, and endpoint protection to cover
different attack vectors. |
Periodic Penetration Testing |
Test the effectiveness of the security policies and devices by simulating real attacks. |

0 Comments
Thanks For your comment