NETWORKING FOR ETHICAL HACKING | BASIC TERMINOLOGY

NETWORKING BASIC TERMINOLOGY 


If you ask how how important network is to be a Ethical Hacker?, EH is nothing without networking because technologies used today for basic to advanced functions are network dependent and it's skeleton of all processes.

So What is Network?

For a specific purpose if things are connected together, are referred as a NETWORK. A network can be of many types, like a telephone network, television network, computer network or even a people network.

Here we focus computer networks 

COMPUTER NETWORK is also a kind of setup, where it connects two or more devices to share a range of services and information in form if e-mails and messages, databases, documents, web-sites, audios and videos, thelephone calls and video conferences etc.


Let's focus on the basic terminology used for networking in this article. Do follow our blog to learn networking concepts and more.

PROTOCOL is nothing but a set of definitions and rules, which has to be followed by every connected devices accross a network to share and communicate information between them. 

In this widely developed computer era to facilitate End to End communication, a number of protocols worked together to form a Protocol Suites or Stacks.

To list out some of the basic and important protocols there are
  • IP [ Internet Protocol ]
  • FTP [ File Transfer Protocol ]
  • SMTP [ SImple Mail Transfer Protocol ]
  • HTTP [ Hyper Text Transfer Protocol ]
 
NETWORK TYPES are categorized by their size and functionality. Commonly categorized as
  • LAN [ Local Area Networks ]
  • MAN [ Metropolitan Area Networks ]
  • WAN [ Wide Area Networks ]
INTERNETWORK is a general term describing multiple networks connected together. The largest and most well known internetwork is Internet.

Some networks are categorized by their function, as opposed to their size.
  • SAN [ Storage Area Network ] - provides systems with high speed, lossess access to high capacity storage devices.
  • VPN [ Virtual Private Network ] - allows information to be securely sent across a public and unsecure network, such as the internet.  Common uses of VPN are connect branchees and remote users to the main office.

HOST  is a device connected to a network. There can be multiple hosts on a single network.
  • Client  : A host can act as client when he is Requesting Information.
  • Server : A host can act as server when he Provides Information.
  • Peer : A host can also Request and Provide Information called peer.

OPEN SYSTEM
is a system which is connected to the network and is ready for communication.


CLOSED SYSTEM is a system which is not connected to the network and can't be communicated with.


COMPUTER NETWORK is basically an interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices

These are known as NETWORK DEVICES and include things such as
  • Routers
  • Switches
  • Hubs
  • Bridges.

NETWORK TOPOLOGY is the layout arrangement of the different devices in a network. Some are

  • Star
  • Mesh
  • Ring
  • Daisy chain
  • Tree
  • Hybrid

OSI MODEL [ Open Systems Interconnection ]

Is a reference ,model that specifies standard for communications protocols and alsi the functionalities of each layer.

There are multiple layers included :


Let's See each of them in the next article. Follow us

Knowledge sharing is atmost quality of Knowledge gaining, Share the content to your friends.
For more content and quries SUBSCRIBE our blog

Thankyou.

Post a Comment

0 Comments