Networking
Fundamentals
Networking is the foundation of modern communication and
information sharing. It involves the interconnection of devices,
allowing the exchange of data, resources, and services across
local and global scales.
by Shaurya Hans
Network Topologies
Bus Topology Star Topology Mesh Topology
All devices are connected Devices are connected to Devices are
to a single cable, forming a central hub, allowing for interconnected, creating
a linear structure. efficient communication multiple paths for data
and management. transmission, ensuring
redundancy and reliability.
Network Protocols
1 TCP/IP 2 HTTP/HTTPS
The fundamental set of protocols for Protocols that define how web
internet communication, enabling browsers and servers communicate,
seamless data exchange. ensuring secure data transfer.
3 DHCP 4 DNS
Automatically assigns IP addresses to Translates human-readable domain
devices, simplifying network names into IP addresses, enabling
configuration and management. web navigation.
Network Devices
Router Switch Modem Access Point
Connects multiple Connects devices Converts digital Provides wireless
networks and within a local data into analog connectivity,
routes data network, enabling signals for allowing devices to
between them. high-speed data transmission over connect to a
transfer. telephone or cable network without
lines. physical cables.
IP Addressing
IPv4 IPv6
The most widely used IP addressing The newer addressing protocol that
scheme, consisting of 32-bit addresses provides a larger address space to
divided into four octets. accommodate the growing number of
connected devices.
Public vs. Private IP Addresses DHCP
Public IP addresses are unique and The Dynamic Host Configuration
globally accessible, while private IP Protocol automatically assigns IP
addresses are used within a local addresses to devices, simplifying
network. network management.
Subnetting
1 Subnet Mask
The subnet mask is used to divide a network into smaller, more
manageable subnets.
2 Network Portion
The network portion of the IP address identifies the specific
network the device belongs to.
3 Host Portion
The host portion of the IP address identifies the individual device
within the subnet.
Network Security
Firewalls Encryption Access Control
Firewalls monitor and Encryption techniques, Authentication and
control network traffic, such as SSL/TLS, ensure authorization mechanisms
protecting against the confidentiality and regulate user and device
unauthorized access and integrity of data access to network
potential threats. transmitted over the resources, enhancing
network. overall security.
Troubleshooting Networking Issues
Identify the Isolate the Implement Verify and
Problem Cause Solutions Monitor
Determine the Systematically Apply appropriate Confirm the
specific issue, examine network troubleshooting effectiveness of
such as components, techniques and the solutions and
connectivity, software, and implement continuously
performance, or configurations to corrective monitor the
security-related pinpoint the root measures to network to
concerns. cause of the resolve the ensure optimal
problem. identified issues. performance and
security.