<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Araiz Naqvi</title>
    <description>The latest articles on DEV Community by Araiz Naqvi (@araiz).</description>
    <link>https://dev.to/araiz</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2598889%2Fbef83394-1fb1-45c0-a748-9ac58bb00161.jpg</url>
      <title>DEV Community: Araiz Naqvi</title>
      <link>https://dev.to/araiz</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/araiz"/>
    <language>en</language>
    <item>
      <title>IPv4: The Foundation of Networking</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Mon, 16 Feb 2026 06:30:00 +0000</pubDate>
      <link>https://dev.to/araiz/ipv4-the-foundation-of-networking-50in</link>
      <guid>https://dev.to/araiz/ipv4-the-foundation-of-networking-50in</guid>
      <description>&lt;p&gt;When diving into networking, the term &lt;strong&gt;IPv4&lt;/strong&gt; comes up pretty quickly, and for good reason. It’s one of the key building blocks of the internet today, despite being on the brink of being replaced by its successor, &lt;strong&gt;IPv6&lt;/strong&gt;. Let's break it down.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is IPv4?
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt; &lt;strong&gt;IPv4&lt;/strong&gt; stands for &lt;strong&gt;Internet Protocol version 4&lt;/strong&gt;, which is used for identifying devices on a network. Think of it as a street address for your device, allowing data to be sent to the correct location on the vast internet highway.&lt;/p&gt;

&lt;p&gt;Unlike a &lt;strong&gt;MAC address&lt;/strong&gt;, which is burned into the device’s hardware by the manufacturer, an IPv4 address is dynamically assigned by a &lt;strong&gt;DHCP server&lt;/strong&gt; (Dynamic Host Configuration Protocol) or can be manually set by the network admin.&lt;/p&gt;

&lt;p&gt;An IPv4 address is a &lt;strong&gt;32-bit&lt;/strong&gt; address, meaning it’s made up of four 8-bit octets, usually represented as four decimal numbers separated by periods (e.g., &lt;strong&gt;192.168.0.1&lt;/strong&gt;). This format gives around &lt;strong&gt;4.3 billion&lt;/strong&gt; possible addresses, which, as you might have heard, isn’t enough anymore. Enter &lt;strong&gt;IPv6&lt;/strong&gt;, a new protocol with a much larger address space.&lt;/p&gt;

&lt;p&gt;While IPv4 is slowly being phased out in favor of IPv6, it remains the backbone of global internet traffic.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Public vs. Private IPs
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;In the world of IPv4, there are two major types of IP addresses: &lt;strong&gt;public&lt;/strong&gt; and &lt;strong&gt;private&lt;/strong&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Private IP addresses&lt;/strong&gt; are used within a local network (LAN) and are not routable over the internet. They are reserved for internal network use and help maintain security by ensuring devices within your network cannot be directly accessed from outside. Common private IP ranges include &lt;strong&gt;192.168.x.x&lt;/strong&gt;, &lt;strong&gt;10.x.x.x&lt;/strong&gt;, and &lt;strong&gt;172.16.x.x to 172.31.x.x&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Public IP addresses&lt;/strong&gt;, on the other hand, are used to identify devices that are directly accessible from the internet. When a device on a private network needs to access the internet, &lt;strong&gt;NAT (Network Address Translation)&lt;/strong&gt; comes into play. NAT translates the private IP address into a public IP address, allowing the device to communicate with external services.&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupujrid33xl6pp9vjl1i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupujrid33xl6pp9vjl1i.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;br&gt;For example, when you type &lt;code&gt;ping google.com&lt;/code&gt; in the terminal, your device’s private IP address is translated to a public IP via your router’s NAT function, and the request reaches the outside world.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The Basics of IPv4 Routing
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;IPv4 is a &lt;strong&gt;connectionless protocol&lt;/strong&gt;, meaning each packet of data is sent independently and may take different paths to its destination. It’s also important to note that IPv4 only provides &lt;strong&gt;best-effort delivery&lt;/strong&gt;; it doesn’t guarantee data delivery. The job of ensuring reliability falls to higher-layer protocols like &lt;strong&gt;TCP&lt;/strong&gt; (Transmission Control Protocol).&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;So how do packets get from your device to the right destination? That’s where &lt;strong&gt;routing&lt;/strong&gt; comes in. Routers are responsible for directing data packets between devices on different networks. They use routing protocols to decide the best path based on several factors, such as &lt;strong&gt;hop count&lt;/strong&gt;, &lt;strong&gt;network load&lt;/strong&gt;, and &lt;strong&gt;bandwidth&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkmj2vrbd3uqu2ztejiek.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkmj2vrbd3uqu2ztejiek.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;br&gt;An important aspect of routing is that it relies on a &lt;strong&gt;hierarchical structure&lt;/strong&gt; for addressing. IPv4 addresses are divided into two main parts:&lt;br&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Network Portion&lt;/strong&gt;: This part identifies the specific network the device belongs to. It helps routers know which path to take to reach the destination network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Host Portion&lt;/strong&gt;: This part identifies the specific device within the network. Once the packet reaches the correct network, it will be forwarded to the correct device based on this portion of the address. 
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How Does IPv4 Work?
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;Let’s look at a real-world example. Imagine you’re trying to contact a device within a local network with the IP address &lt;strong&gt;10.1.1.2&lt;/strong&gt;.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The router will first check the &lt;strong&gt;network portion&lt;/strong&gt; of the destination address (i.e., the first three octets: &lt;strong&gt;10.1.1&lt;/strong&gt;).&lt;/li&gt;
&lt;li&gt;It will then forward the packet to the appropriate network.&lt;/li&gt;
&lt;li&gt;Once the packet reaches the network, routers will use the &lt;strong&gt;host portion&lt;/strong&gt; (i.e., the last octet: &lt;strong&gt;.2&lt;/strong&gt;) to identify the specific device and deliver the data.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you're communicating over the internet, the process is similar but involves more hops, as routers examine the network portion to determine the best path to the destination network and then the host portion to deliver the packet to the right device.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  IPv4 Address Format
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvaobdf1n72w9nqud9mmd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvaobdf1n72w9nqud9mmd.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;An IPv4 address is written as &lt;strong&gt;four decimal numbers&lt;/strong&gt; separated by periods, like &lt;strong&gt;10.1.1.1&lt;/strong&gt;. Each number represents &lt;strong&gt;one byte&lt;/strong&gt; (or &lt;strong&gt;8 bits&lt;/strong&gt;) and can range from 0 to 255. So, a 32-bit IPv4 address consists of four 8-bit segments:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;10&lt;/strong&gt;: 8 bits&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1&lt;/strong&gt;: 8 bits&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1&lt;/strong&gt;: 8 bits&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1&lt;/strong&gt;: 8 bits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allows for &lt;strong&gt;over 4 billion&lt;/strong&gt; unique addresses, but as you can imagine, that’s no longer enough. The exponential growth of devices and internet usage has led to IPv4 address exhaustion, which is why &lt;strong&gt;IPv6&lt;/strong&gt; was introduced to handle the need for a virtually unlimited number of addresses.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;IPv4 might be on the way out, but it's still a core component of how the internet operates today. From dynamically assigning addresses via DHCP to translating private IPs into public ones for internet access, IPv4 plays a crucial role in networking. It’s the backbone of routing, address allocation, and data delivery across the globe.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>codenewbie</category>
      <category>computerscience</category>
      <category>networking</category>
    </item>
    <item>
      <title>Application Layer: Where Software Meets the Network</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Sat, 03 Jan 2026 15:30:00 +0000</pubDate>
      <link>https://dev.to/araiz/application-layer-where-software-meets-the-network-24jh</link>
      <guid>https://dev.to/araiz/application-layer-where-software-meets-the-network-24jh</guid>
      <description>&lt;p&gt;The &lt;strong&gt;Application Layer&lt;/strong&gt; is the layer that bridges software and the network. It doesn’t change the software itself but provides &lt;strong&gt;standards and protocols&lt;/strong&gt; that allow the software to communicate over the internet. Think of it as a translator: your software speaks its language, the Application Layer translates it into network-friendly language, and voilà — your data travels smoothly.&lt;/p&gt;

&lt;p&gt;The most common protocol here is the famous &lt;strong&gt;HTTP&lt;/strong&gt;, or its modern cousin &lt;strong&gt;HTTPS&lt;/strong&gt;. For now, we’ll focus on HTTP — HTTPS involves encryption, which we’ll dive into later.&lt;/p&gt;




&lt;h2&gt;
  
  
  How It Works: Bob and Larry’s Web Adventure
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Imagine the following scenario:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zo0ojc94vuueqeiozpe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zo0ojc94vuueqeiozpe.png" alt="Bob wants to visit the website called home(Credits: Cisco)" width="800" height="186"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;Bob wants to visit the website called &lt;em&gt;home&lt;/em&gt;. He makes a request to &lt;strong&gt;Larry’s server&lt;/strong&gt;, which understands it should send back the default webpage. Bob receives &lt;code&gt;home.htm&lt;/code&gt;, and it magically appears in his browser.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feui5hfwou1tuqkawc456.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feui5hfwou1tuqkawc456.png" alt="How It Works: Bob and Larry’s Web Adventure" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Seems instant, right? It looks simple, but there’s quite a bit happening behind the scenes — all thanks to &lt;strong&gt;HTTP&lt;/strong&gt;, or &lt;strong&gt;Hyper Text Transfer Protocol&lt;/strong&gt;, created by &lt;strong&gt;Tim Berners-Lee&lt;/strong&gt; in the early 1990s.&lt;/p&gt;




&lt;h2&gt;
  
  
  HTTP Protocol Mechanism: Step by Step
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Here’s what really happens when Bob hits Enter:&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhnpm098ngbyxtkksnh3s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhnpm098ngbyxtkksnh3s.png" alt="What really happens when Bob hits Enter(Credits: Cisco)" width="800" height="241"&gt;&lt;/a&gt;&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;strong&gt;Step 1:&lt;/strong&gt; Bob sends a request to Larry’s server with an &lt;strong&gt;HTTP header&lt;/strong&gt;. The header contains the file name Bob is requesting. If he doesn’t specify, the server just sends the default webpage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2:&lt;/strong&gt; Larry’s server responds with an &lt;strong&gt;HTTP header&lt;/strong&gt; and a &lt;strong&gt;status code&lt;/strong&gt; — for example, &lt;strong&gt;200 OK&lt;/strong&gt;, meaning “All good!” The server sends the first part of the requested file, &lt;code&gt;home.htm&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdm07remo2xju8azbvp55.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdm07remo2xju8azbvp55.png" alt="HTTP Protocol Mechanism: Step by Step" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Step 3:&lt;/strong&gt; The server sends the rest of the file(s) in parts &lt;strong&gt;without headers&lt;/strong&gt; to reduce redundancy.&lt;/p&gt;




&lt;h2&gt;
  
  
  HTTP Status Codes: The Server’s Feedback
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;HTTP status codes are the server’s way of talking back to you. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjig5menxen4fs3ez39fx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjig5menxen4fs3ez39fx.png" alt="HTTP Status Codes: The Server's Feedback" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;They’re divided into five categories:&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;1xx - Informational&lt;/strong&gt;
&lt;/h3&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;100&lt;/strong&gt; - Continue: The client should continue with the request&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;101&lt;/strong&gt; - Switching Protocols: The server is switching protocols&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(Think: “Hold on, I’m processing this…”)&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;2xx - Success&lt;/strong&gt;
&lt;/h3&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;200&lt;/strong&gt; - OK: Request successful&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;201&lt;/strong&gt; - Created: A new resource was successfully created&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;204&lt;/strong&gt; - No Content: Request succeeded but nothing to return&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(Golden responses — everything is perfect!)&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;3xx - Redirection&lt;/strong&gt;
&lt;/h3&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;301&lt;/strong&gt; - Moved Permanently: Resource moved to a new URL&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;302&lt;/strong&gt; - Found: Temporary redirect&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;304&lt;/strong&gt; - Not Modified: Use cached version&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(Server saying: “You need to go somewhere else… temporarily or permanently”)&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;4xx - Client Errors&lt;/strong&gt;
&lt;/h3&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;400&lt;/strong&gt; - Bad Request: Syntax or data issue&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;401&lt;/strong&gt; - Unauthorized: Login required&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;403&lt;/strong&gt; - Forbidden: Access denied&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;404&lt;/strong&gt; - Not Found: Resource missing&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;405&lt;/strong&gt; - Method Not Allowed: Wrong method used&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;408&lt;/strong&gt; - Request Timeout: Server waited too long&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(Basically: “Your request is broken, fix it!”)&lt;/em&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;5xx - Server Errors&lt;/strong&gt;
&lt;/h3&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;500&lt;/strong&gt; - Internal Server Error: Something went wrong on the server&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;502&lt;/strong&gt; - Bad Gateway: Invalid response from upstream&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;503&lt;/strong&gt; - Service Unavailable: Server temporarily down&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;504&lt;/strong&gt; - Gateway Timeout: Upstream server didn’t respond&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;(The server’s way of saying: “It’s not you, it’s me…”)&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>network</category>
      <category>security</category>
    </item>
    <item>
      <title>Overview of the TCP/IP Networking Model</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Sun, 28 Dec 2025 15:30:00 +0000</pubDate>
      <link>https://dev.to/araiz/overview-of-the-tcpip-networking-model-4bj9</link>
      <guid>https://dev.to/araiz/overview-of-the-tcpip-networking-model-4bj9</guid>
      <description>&lt;p&gt;The &lt;strong&gt;TCP/IP Model&lt;/strong&gt; is the backbone of modern networking. It references and defines a wide range of &lt;strong&gt;protocols&lt;/strong&gt; that allow devices to communicate across vast networks. These protocols are formalized using &lt;strong&gt;RFCs&lt;/strong&gt; (Request for Comments) — basically a fancy way of saying, “Hey, we’ve got a standard, let’s agree on it.”&lt;/p&gt;

&lt;p&gt;But here’s the interesting bit: The &lt;strong&gt;TCP/IP model&lt;/strong&gt; doesn’t reinvent the wheel. It doesn’t try to give new names or definitions to protocols that other organizations (like the &lt;strong&gt;IEEE&lt;/strong&gt;) have already created. For example, when it talks about &lt;strong&gt;Ethernet&lt;/strong&gt;, it simply says, “Refer to IEEE Ethernet.”&lt;/p&gt;

&lt;p&gt;So it’s like an organized librarian who just says, “I don’t need to write a new book on this, just read the existing one.” Very efficient.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Goal of TCP/IP
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;The whole point of TCP/IP was to make networking as easy as &lt;em&gt;plug-and-play&lt;/em&gt;. The goal was simple: &lt;strong&gt;Unbox a device, plug it into the network, and bam, you’re online&lt;/strong&gt;. No headaches, no long setup processes, just connectivity.&lt;/p&gt;

&lt;p&gt;Thanks to TCP/IP, manufacturers of &lt;strong&gt;NICs (Network Interface Cards)&lt;/strong&gt;, &lt;strong&gt;Ethernet cables&lt;/strong&gt;, and devices all follow the same set of standards. This means you don’t need to worry about whether your laptop can talk to your router or if your phone will work with your home Wi-Fi. It just does — and it’s all because of the standards and protocols defined in the TCP/IP model.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Layers of TCP/IP
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;To help make sense of all this, engineers divided the TCP/IP model into &lt;strong&gt;layers&lt;/strong&gt;. Each layer has a specific job to do, and each one focuses on a different aspect of networking. These layers help organize how data moves from one place to another.&lt;/p&gt;

&lt;p&gt;The layers of the TCP/IP model look like this:&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F59y8x65ssoah99iqq86m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F59y8x65ssoah99iqq86m.png" alt="TCP/IP Layers" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(In this module, we’ll talk about the basics of each layer and dive deeper into them along the way.)&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Physical Layer
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;The &lt;strong&gt;Physical Layer&lt;/strong&gt; is where the magic starts. This is the layer responsible for transmitting data in its most basic form: &lt;strong&gt;bits&lt;/strong&gt;. So, it’s literally all about “pushing data through the wires.” It's like the delivery truck that brings the packages, but doesn't care what's inside. It just gets them from point A to point B.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Data Link Layer
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Next up, we have the &lt;strong&gt;Data Link Layer&lt;/strong&gt;. This layer is in charge of actually sending those &lt;strong&gt;bits&lt;/strong&gt; to the right device. It does so by using a unique identifier known as a &lt;strong&gt;MAC Address&lt;/strong&gt; (Media Access Control). Think of it as the “home address” of every device on the network. Just like a letter needs a postal address to get to the right home, data needs a MAC address to know where it’s going.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Network Layer
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;The &lt;strong&gt;Network Layer&lt;/strong&gt; is like a GPS for your data. It helps your data traverse networks, jumping from one router to another until it reaches its destination. This is where the &lt;strong&gt;IP&lt;/strong&gt; (Internet Protocol) lives, and it’s in charge of routing your data between networks, so it can find its way through the maze of routers and switches.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Transport and Application Layers
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Finally, we get to the &lt;strong&gt;Transport Layer&lt;/strong&gt; and &lt;strong&gt;Application Layer&lt;/strong&gt;. These are the layers that deal with the data you actually care about.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;strong&gt;Transport Layer&lt;/strong&gt; ensures the data is &lt;strong&gt;delivered correctly&lt;/strong&gt; — it’s like making sure your package doesn’t get lost or damaged along the way.&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Application Layer&lt;/strong&gt; is where all the fun happens. It’s the layer where services like &lt;strong&gt;HTTP&lt;/strong&gt;, &lt;strong&gt;FTP&lt;/strong&gt;, and &lt;strong&gt;SMTP&lt;/strong&gt; live. This is the part of the model where the apps and services that you interact with directly operate. It’s where your email, browsing, and streaming come to life.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;The TCP/IP model is the invisible force behind everything you do online. By dividing the tasks of networking into &lt;strong&gt;layers&lt;/strong&gt;, engineers made it easier for devices to communicate, and standardized it all so that it just works — across vendors, countries, and platforms.&lt;/p&gt;

&lt;p&gt;It’s efficient, it’s organized, and most importantly, it just works. So the next time you plug in your device, remember: TCP/IP has got your back.&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>beginners</category>
      <category>networking</category>
    </item>
    <item>
      <title>History Leading to the TCP/IP Model</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Sat, 27 Dec 2025 15:30:00 +0000</pubDate>
      <link>https://dev.to/araiz/history-leading-to-the-tcpip-model-33o2</link>
      <guid>https://dev.to/araiz/history-leading-to-the-tcpip-model-33o2</guid>
      <description>&lt;p&gt;Today, when we talk about networking, we &lt;em&gt;all&lt;/em&gt; pretty much use the &lt;strong&gt;TCP/IP model&lt;/strong&gt;. It’s the standard. The gold standard. But it wasn’t always this simple.&lt;/p&gt;

&lt;p&gt;Not too long ago, networking was like the Wild West — every vendor did their own thing, and if you had devices from different manufacturers, you needed a lot of patience (and a lot of technical know-how) to make them talk to each other.&lt;/p&gt;

&lt;p&gt;Back in the 1970s and 1980s, &lt;strong&gt;IBM&lt;/strong&gt; held a dominant market share and created its own proprietary network model called &lt;strong&gt;SNA (Systems Network Architecture)&lt;/strong&gt;. While IBM was busy claiming the throne, other vendors were off doing their own thing, building incompatible models. The result? A network engineer’s worst nightmare: &lt;strong&gt;a patchwork of models&lt;/strong&gt; that didn’t always play well together.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Need for a Universal Model
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;So, what did network engineers do when faced with these different models?&lt;br&gt;
Well, they had to work their magic. They spent hours trying to make these models &lt;strong&gt;exchange information&lt;/strong&gt;—essentially translating languages between incompatible systems. It was like having two people speak different languages, trying to have a conversation with a dictionary in hand.&lt;/p&gt;

&lt;p&gt;Let’s take a look at this visual from the early days:&lt;/p&gt;




&lt;h2&gt;
  
  
  Enter the ISO and OSI Model
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;To solve this mess, the &lt;strong&gt;ISO&lt;/strong&gt; (International Organization for Standardization) stepped in. They launched a formal effort, bringing together technologically advanced countries to create a standardized networking model. This led to the creation of the &lt;strong&gt;OSI&lt;/strong&gt; (Open Systems Interconnection) model, a seven-layer framework designed to make devices from different vendors talk to each other.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6i508prhu8uo3nqj7imz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6i508prhu8uo3nqj7imz.png" alt="OSI Model" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;The OSI model, with its structure and defined layers, gave engineers a formal way of understanding how networks should function. It was an ideal concept, but it faced a bit of a challenge — it was complex and slow to catch on.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Rise of TCP/IP
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Meanwhile, across the pond, the &lt;strong&gt;US Department of Defense (DoD)&lt;/strong&gt; had a more practical (and less formal) approach to creating a networking standard. They needed something that could scale across different systems and be reliable in critical situations. Enter &lt;strong&gt;TCP/IP&lt;/strong&gt;.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw2m2t9hn8345d7wybatx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw2m2t9hn8345d7wybatx.png" alt="TCP/IP Model" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;This model wasn’t born out of a bureaucratic committee but rather from university volunteers who saw the need for a simpler, more adaptable networking system. Over time, &lt;strong&gt;TCP/IP&lt;/strong&gt; became the dominant model, outpacing the OSI model and taking the world by storm.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Evolution of Networking Models
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;For a while, both the &lt;strong&gt;OSI&lt;/strong&gt; and &lt;strong&gt;TCP/IP&lt;/strong&gt; models coexisted in organizations. But, like all good things, OSI eventually took a backseat. The simplicity and practicality of &lt;strong&gt;TCP/IP&lt;/strong&gt; won out, and it remains the foundational networking model we use today.&lt;/p&gt;




&lt;p&gt;&lt;br&gt;Now that you’ve got a taste of how the TCP/IP model came to be, it’s easy to see how far networking has evolved. From the &lt;strong&gt;SNA model&lt;/strong&gt; to the rise of &lt;strong&gt;OSI&lt;/strong&gt;, and finally the triumphant &lt;strong&gt;TCP/IP&lt;/strong&gt;, it’s been a journey of collaboration, frustration, and ultimately standardization.&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>beginners</category>
      <category>networking</category>
    </item>
    <item>
      <title>Perspectives on Networking</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Fri, 26 Dec 2025 14:57:50 +0000</pubDate>
      <link>https://dev.to/araiz/perspectives-on-networking-26o9</link>
      <guid>https://dev.to/araiz/perspectives-on-networking-26o9</guid>
      <description>&lt;p&gt;When you’re new to networking, your perspective is usually very simple — you &lt;em&gt;use&lt;/em&gt; the network. You connect your laptop, open a browser, and expect the internet to behave itself.&lt;/p&gt;

&lt;p&gt;A network engineer, on the other hand, looks at the same setup and sees cables, devices, protocols, and potential failure points just waiting for the wrong moment to strike.&lt;/p&gt;

&lt;p&gt;Neither perspective is wrong. They’re just different viewpoints of the same system.&lt;/p&gt;

&lt;p&gt;Let’s start with the most common one: how everyday users experience networking.&lt;/p&gt;




&lt;h2&gt;
  
  
  Typical Network Usage
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;In a basic home setup, a PC connects to a &lt;strong&gt;cable modem&lt;/strong&gt; using an &lt;strong&gt;Ethernet cable&lt;/strong&gt;. That cable modem then connects to a &lt;strong&gt;cable TV outlet&lt;/strong&gt;, also known as a &lt;strong&gt;CATV wall outlet&lt;/strong&gt;, to access the internet.&lt;/p&gt;

&lt;p&gt;If that sentence sounded like technical noise, don’t worry — that’s normal. Let’s slow it down.&lt;/p&gt;

&lt;p&gt;Think of the internet as a massive highway. Your PC is a car that wants to get on that highway. Unfortunately, your PC can’t just merge directly into internet traffic like a reckless driver.&lt;/p&gt;

&lt;p&gt;It needs a gatekeeper.&lt;/p&gt;

&lt;p&gt;That gatekeeper is the &lt;strong&gt;cable modem&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The cable modem connects your home network to your &lt;strong&gt;ISP&lt;/strong&gt;, or Internet Service Provider. The ISP owns the highway and decides who gets access. Data from your ISP travels through the cable TV line, reaches your modem, and the modem translates it into something your PC can actually understand. Without this translation step, your device would just be staring at raw signals wondering what it did wrong.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft3ps87kqfaowdvro9uls.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft3ps87kqfaowdvro9uls.png" alt="Wifi vs DSL" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;Now let’s look at a slightly different setup.&lt;/p&gt;

&lt;p&gt;Instead of a PC connected by Ethernet, imagine a tablet using &lt;strong&gt;Wi-Fi&lt;/strong&gt;, also called a &lt;strong&gt;Wireless Local Area Network (WLAN)&lt;/strong&gt;. No cables, no plugging things in — just vibes and radio waves.&lt;/p&gt;

&lt;p&gt;In many setups like this, the internet connection comes through &lt;strong&gt;DSL&lt;/strong&gt;, which stands for &lt;strong&gt;Digital Subscriber Line&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;DSL uses your telephone line to deliver internet access. Yes, the same line that was once used only for phone calls now carries internet data as well. To make that possible, a &lt;strong&gt;DSL modem&lt;/strong&gt; connects to the phone line and separates voice signals from data signals, converting the internet traffic into a form your wireless devices can use.&lt;/p&gt;

&lt;p&gt;So while it looks like magic from the outside, there’s still a lot of networking discipline happening behind the scenes to keep things smooth.&lt;/p&gt;




&lt;h2&gt;
  
  
  Enterprise Networks
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;When networking moves beyond homes and into organizations, things scale up quickly.&lt;/p&gt;

&lt;p&gt;A network built and maintained by a corporation to allow its employees, systems, and services to communicate is called an &lt;strong&gt;enterprise network&lt;/strong&gt;.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2k5s7p8mm7kr0cw2fec9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2k5s7p8mm7kr0cw2fec9.png" alt="Enterprise Networks" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These networks are designed for reliability, performance, and security. Downtime isn’t just annoying here — it’s expensive. Enterprise networks support hundreds or thousands of devices, multiple locations, and strict access controls. This is where networking stops being “plug and play” and starts becoming a serious engineering discipline.&lt;/p&gt;




&lt;h2&gt;
  
  
  SOHO Networks
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;Somewhere between a home network and a full enterprise setup lives the &lt;strong&gt;SOHO network&lt;/strong&gt;, short for &lt;strong&gt;Small Office / Home Office&lt;/strong&gt; network.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ieaq9kuptfi3vdq610k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ieaq9kuptfi3vdq610k.png" alt="SOHO Networks" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These are typically home networks used for business purposes — freelancers, small startups, or remote workers running professional operations from home. They’re smaller than enterprise networks but often more complex than a typical household setup.&lt;/p&gt;

&lt;p&gt;SOHO networks still need to be reliable and secure, but without the massive infrastructure of a corporate environment. Think of them as networking’s middle child — doing important work, just on a smaller scale.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>network</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Why Do Networks Even Work Correctly?</title>
      <dc:creator>Araiz Naqvi</dc:creator>
      <pubDate>Thu, 18 Dec 2025 14:29:27 +0000</pubDate>
      <link>https://dev.to/araiz/why-do-networks-even-work-correctly-2jce</link>
      <guid>https://dev.to/araiz/why-do-networks-even-work-correctly-2jce</guid>
      <description>&lt;p&gt;Have you ever stopped and wondered &lt;em&gt;why&lt;/em&gt; the internet usually works?&lt;br&gt;
You tap a link, send a message, or start a video — and most of the time, it just… works.&lt;/p&gt;

&lt;p&gt;That’s not luck.&lt;br&gt;
And it’s definitely not vibes.&lt;/p&gt;

&lt;p&gt;Networks work because devices and software agree to follow a shared set of rules. Every router, switch, server, and laptop behaves itself. No freelancing allowed.&lt;/p&gt;

&lt;p&gt;If they didn’t follow rules, networking wouldn’t be “slow” or “a bit buggy.” It would be complete chaos. Your laptop would be screaming into the void while the router pretends it doesn’t exist.&lt;/p&gt;

&lt;p&gt;These rules come in the form of &lt;strong&gt;standards&lt;/strong&gt; and &lt;strong&gt;protocols&lt;/strong&gt;, and they’re the reason your devices don’t act like strangers refusing to make eye contact.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdyvqalcb63v2nlh01cha.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdyvqalcb63v2nlh01cha.png" alt="Standards and Protocols." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;






&lt;h3&gt;
  
  
  What Are Standards?
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;&lt;strong&gt;Standards&lt;/strong&gt; are universal guidelines that make sure devices built by different companies can still work together peacefully.&lt;/p&gt;

&lt;p&gt;They exist so networking doesn’t turn into a reality show.&lt;/p&gt;

&lt;p&gt;Imagine if every phone manufacturer decided to use a completely different charging port.&lt;br&gt;
Oh wait — that already happened, and everyone suffered.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yf4i2b6pf21bx25mfrr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yf4i2b6pf21bx25mfrr.png" alt="Standards." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;Standards prevent that kind of pain in networking.&lt;/p&gt;

&lt;p&gt;They define things like how Ethernet cables send data, how Wi-Fi communicates through the air, and how devices are identified on a network. Thanks to standards like IEEE 802.3, IEEE 802.11, and IP addressing, your laptop can connect to a router it’s never met before and still trust it enough to exchange data.&lt;/p&gt;

&lt;p&gt;Without standards, networking would just be very expensive hardware sitting around, aggressively ignoring each other.&lt;/p&gt;




&lt;h3&gt;
  
  
  What Are Protocols?
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;If standards are the rules of the road, &lt;strong&gt;protocols&lt;/strong&gt; are the driving instructions.&lt;/p&gt;

&lt;p&gt;Protocols define how data is formatted, sent, received, and what happens when something goes wrong — because something &lt;em&gt;always&lt;/em&gt; goes wrong.&lt;/p&gt;

&lt;p&gt;Think of standards as agreeing to speak English.&lt;br&gt;
Protocols decide how the conversation happens.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenhn5dhypwak47qaysy2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenhn5dhypwak47qaysy2.png" alt="Protocols" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;Who talks first?&lt;br&gt;
How does the message end?&lt;br&gt;
What happens if someone didn’t hear you and says, “Sorry, say that again?”&lt;/p&gt;

&lt;p&gt;Protocols like TCP, IP, HTTP, DNS, SMTP, and HTTPS handle all this quietly in the background. Every time you open a website or send an email, they’re working overtime so you don’t have to think about it.&lt;/p&gt;

&lt;p&gt;When protocols do their job well, you don’t notice them at all — which is honestly the highest compliment in networking.&lt;/p&gt;




&lt;h3&gt;
  
  
  How Standards and Protocols Work Together
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;Let’s say the network is a big party.&lt;/p&gt;

&lt;p&gt;Standards are the house rules. Everyone speaks the same language, uses the same doors, and doesn’t randomly shout over others.&lt;/p&gt;

&lt;p&gt;Protocols are the step-by-step social instructions. You walk in, say hello, shake hands, and start a conversation instead of just yelling your life story at strangers.&lt;/p&gt;

&lt;p&gt;Standards define &lt;em&gt;what’s allowed&lt;/em&gt;.&lt;br&gt;
Protocols define &lt;em&gt;how things actually happen&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Together, they make sure devices don’t just connect — they communicate properly, without awkward misunderstandings.&lt;/p&gt;




&lt;h3&gt;
  
  
  Networking Models
&lt;/h3&gt;

&lt;p&gt;&lt;br&gt;Now here’s the problem: there are &lt;strong&gt;a lot&lt;/strong&gt; of standards and protocols. Enough to overwhelm even motivated learners.&lt;/p&gt;

&lt;p&gt;To keep everyone sane, &lt;strong&gt;networking models&lt;/strong&gt; were created.&lt;/p&gt;

&lt;p&gt;A networking model breaks networking into layers, with each layer handling a specific responsibility. This way, engineers don’t have to think about everything at once and lose their minds.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1dhxpo6uryoa8hgzgoo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1dhxpo6uryoa8hgzgoo.png" alt="TCP/IP" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;It’s like building a house. Architects, electricians, and plumbers all do different jobs, but they follow the same blueprint. In networking, vendors and engineers follow networking models to design systems that actually work in the real world.&lt;/p&gt;

&lt;p&gt;The most commonly used model today is the &lt;strong&gt;TCP/IP model&lt;/strong&gt;.&lt;br&gt;
It’s so widely used that your phone, laptop, router, and probably your smart fridge are all quietly running it right now.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>iot</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
