0% found this document useful (0 votes)
10 views

Basics of Networking

The document provides an overview of computer networking, defining key concepts such as types of networks (LAN, WAN, MAN, PAN) and essential networking components like IP addresses and network devices. It also explains the OSI and TCP/IP models, common protocols, IP addressing basics, and network security concepts. Additionally, it covers wireless networking standards and security protocols.

Uploaded by

cipherpunk123
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Basics of Networking

The document provides an overview of computer networking, defining key concepts such as types of networks (LAN, WAN, MAN, PAN) and essential networking components like IP addresses and network devices. It also explains the OSI and TCP/IP models, common protocols, IP addressing basics, and network security concepts. Additionally, it covers wireless networking standards and security protocols.

Uploaded by

cipherpunk123
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Basics of Networking

A Foundation for Penetration Testing

1
Introduction to Computer
Networking
Networking is the backbone of modern communication, enabling devices to
exchange information efficiently.

2
What is a Computer Network?
• A computer network is a group of interconnected devices that communicate and
share resources.
• Examples: LAN (Local Area Network), WAN (Wide Area Network), and the
Internet.

3
Types of Networks
• LAN: Covers a small geographic area like a home, office, or building.
• WAN: Spans large geographic areas, connecting multiple LANs.
• MAN: Covers a city or campus area, larger than LAN but smaller than WAN.
• PAN: Personal Area Network connects devices within an individual’s workspace
(e.g., Bluetooth).

4
Key Networking Concepts
• IP Address: A unique identifier for a device on a network.
• MAC Address: A hardware address that identifies a device’s network interface.
• DNS: Domain Name System converts domain names to IP addresses.

5
Network Topologies
• The physical or logical arrangement of network devices.
• Types:
Star Topology: All devices connect to a central hub.
Bus Topology: Devices share a common backbone cable.
Ring Topology: Devices form a closed loop.
Mesh Topology: Devices are interconnected for redundancy.

6
Network Devices
• Router: Directs data packets between networks.
• Switch: Connects devices within a single network.
• Hub: Broadcasts data to all connected devices.
• Access Point: Provides wireless connectivity.

7
OSI Model Overview
• The Open Systems Interconnection model standardizes networking functions.
• Layers:
Application: User interface (e.g., HTTP, FTP).
Presentation: Data translation and encryption.
Session: Manages connections between applications.
Transport: Ensures reliable data delivery (e.g., TCP, UDP).
Network: Handles routing and addressing (e.g., IP).
Data Link: Handles error correction for frames.
Physical: Transmits raw bitstreams over physical media.

8
TCP/IP Model Overview
• A simplified model for network communication.
• Layers:
Application: Combines OSI’s application, presentation, and session layers.
Transport: Ensures reliable communication (e.g., TCP, UDP).
Internet: Handles logical addressing and routing (e.g., IP).
Network Access: Manages hardware and physical connections.

9
Common Protocols
• HTTP/HTTPS: For accessing web pages.
• FTP/SFTP: For file transfers.
• SMTP/IMAP: For sending and receiving emails.
• DNS: Resolves domain names to IP addresses.
• DHCP: Automatically assigns IP addresses.

10
IP Addressing Basics
• IPv4: 32-bit addressing (e.g., 192.168.1.1).
• IPv6: 128-bit addressing, designed to replace IPv4.
• Subnet Mask: Defines the network and host portions of an IP address.

11
Network Security Concepts
• Firewall: Monitors and controls incoming/outgoing traffic.
• VPN: Creates secure connections over public networks.
• Encryption: Secures data in transit.
• Intrusion Detection Systems (IDS): Monitors networks for malicious activity.

12
Wireless Networking
• Wi-Fi Standards: IEEE 802.11 protocols (a, b, g, n, ac, ax).
• Security Protocols: WEP (weak), WPA, WPA2, and WPA3.
• SSID: Network name for wireless connections.

13

You might also like