DEV Community

Chamarthi Rahul
Chamarthi Rahul

Posted on

Networking Step-by-Step

The only piece of advice that would be helpful to anybody in the Internet-security camp is that no harm can be done in having a strong base in networking. This is important so as to have information about the structures and workings of the data to be transferred, communicated and protected by the computer networks.

Network Architecture

Learn the facts on OSI and TCP/IP models, the models that define how data are structured and how they are put and got across the network.

OSI model

The OPEN SYSTEM INTERCONNECTION (OSI) model is conceptual data model that describes the functioning of a telecommunication or computing system into seven hierarchical layers. This model is used to offer understanding of functioning of numerous subsidiary standards and technologies of networking for data transfer and communication.

Network Protocols

Find out more about other protocols required for a correct network communications like HTTP, HTTPS, FTP and etc. These protocols are intended to guarantee that information is sent with consistency and security on any network.

IP Addressing and Subnetting: Introduce yourself to IP addresses; public and private IP; IPv4 and IPv6; how IP addresses are assigned and subnetting: the process of dividing the actual networks into sub-networks.

Routing and Switching

Understand how routers and switches function in a network, about some of the concepts and protocol applied to a network such as DHCP, NAT, OSPF, and BGP.

Wireless Networking

Government should broadly understand wireless technology by getting to know the various wireless technologies like Wireless Fidelity (Wi-Fi), Wireless Personal Area Network (WPAN) that comprise of Bluetooth and Wireless Wide Area Network (WWAN) which comprises of cellular networks. In relation to this mode of transferring data, there are some securities threats or precautions that must be understood by people.

Network Security

Discover different ways and means through which networks can be protected from threats such as firewalls; IDS (intrusion detection system);IPS (intrusion prevention system); and VPN (virtual private network). Find out about technology such as SSL/TLS, encryption schemes, and secure ways of accessing applications.

Network Troubleshooting

Learn basic network problems and the techniques of solving them through probing more data on the available network tools such as ping, traceroute and Wireshark.

Growing our understanding of networks knowledge will enable us to solve most of the cyber security issues affecting your valuable assets.

Top comments (0)