What is Networking?
Networking is the process of connecting devices (computers, phones, servers) to exchange data
and share resources. Think of it as building a digital highway for communication.
Key Networking Components:
1. Nodes: Devices like computers and phones.
2. Links: The pathways (cables, Wi-Fi) that connect devices.
3. Network Types:
o LAN: Local Area Network (e.g., home or office).
o WAN: Wide Area Network (e.g., the internet).
o MAN: Metropolitan Area Network (city-wide networks).
o PAN: Personal Area Network(Personal networks e.g., Bluetooth devices
II. IP Addressing
What is an IP Address?
An IP address is a unique identifier for a device on a network, like a postal address for your
home. It ensures that data sent over a network reaches the correct destination.
Types of IP Addresses:
1. IPv4: A 32-bit address, e.g., 192.168.1.1. It’s simple but limited in number.
2. IPv6: A 128-bit address, e.g., 2001:0db8:85a3::7334. Supports a massive number of
devices and includes built-in security features.
Public vs. Private IPs:
Public IPs: Visible on the internet; assigned by ISPs.
Private IPs: Used within local networks (e.g., 192.168.x.x). These are hidden from the
internet using NAT (Network Address Translation).
III. Key Networking Protocols and Ports
, TCP (Transmission Control Protocol)
TCP ensures reliable delivery of data by establishing a connection before data is sent. It’s like
sending a package with a tracking number.
7 Common TCP Ports and Example Applications:
1. Port 80: HTTP (Web browsing).
2. Port 443: HTTPS (Secure web browsing).
3. Port 21: FTP (File Transfer Protocol).
4. Port 22: SSH (Secure Shell).
5. Port 25: SMTP (Email).
6. Port 53: DNS (Domain Name System).
7. Port 110: POP3 (Email retrieval).
IV. 20 Common Network Protocols Explained
Application Layer Protocols
1. HTTP (HyperText Transfer Protocol)
o Purpose: Transfers web pages and resources.
o Example: Accessing http://example.com.
o Cybersecurity Relevance: Vulnerable to attacks without HTTPS.
2. HTTPS (HTTP Secure)
o Purpose: Secure HTTP using SSL/TLS encryption.
o Example: Banking or shopping online (e.g., https://bank.com).
o Cybersecurity Benefit: Encrypts data in transit.
3. FTP (File Transfer Protocol)
o Purpose: Transfers files between systems.
o Example: Uploading website files to a server.
o Cybersecurity Concern: Transmits data in plain text unless secured with SFTP.
4. SFTP (Secure File Transfer Protocol)
o Purpose: Securely transfers files using SSH.
o Example: Sending encrypted backups.
o Cybersecurity Benefit: Prevents data interception.
5. SMTP (Simple Mail Transfer Protocol)
o Purpose: Sends emails from a client to a server.
o Example: Sending emails via Gmail.
o Cybersecurity Concern: Vulnerable to spoofing without SPF/DKIM.
6. IMAP (Internet Message Access Protocol)