Skip to the content.

Networking Basics

Network

A network refers to the connection of two or more computers for the purpose of sharing data, information, or resources.

Types of Networks

Ethernet

Ethernet (IEEE 802.3) is a standard that defines wired connections of networked devices. This standard defines the way data is formatted over the wire to ensure disparate devices can communicate over the same cables.

Device Address

Media Access Control (MAC) Address -

Internet Protocol (IP) Address -

Internet Protocol (IPv4 and IPv6)

IP is currently deployed and used worldwide in two major versions. IPv4 provides a 32-bit address space, which by the late 1980s was projected to be exhausted. IPv6 was introduced in December 1995 and provides a 128-bit address space along with several other important features.

To learn more, check out IP address

Wifi

Widely adopted for its easy deployment and cost-effectiveness, wireless networking provides versatility, enabling devices to roam freely within signal range.

Virtual Local Network

VLANs are created by switches to logically segments a network without altering physical topology. VLAN Trunking is when you have VLANs spanning multiple switches to extend the reach of that VLAN.

Sample diagram:

Quality of Service

Quality of Service (QoS) refers to the technology that allows the network to prioritize certain types of traffic over others.

Network Address Translation (NAT)

Network Address Translation (NAT) translates private IP addresses to a public IP address, allowing multiple devices on a local network to access the internet using a single public IP.

Sample diagram:

Port Address Translation (PAT)

Port Address Translation (PAT), a subset of NAT, maps multiple private IP addresses to a single public IP address using different ports, allowing multiple devices to share one public IP address simultaneously.

Almost similar to a forward proxy, but their differences are:

Sample diagram:

Networking Tools

Proxy

A proxy server acts as an intermediary between a client and the internet.

Forward Proxy

A forward proxy acts as an intermediary that sits between clients and the external servers. It forwards client requests to the internet and returns the server’s response to the client.

Direction:

Client -> Forward Proxy -> Internet -> Server 

Sample diagram from Security Boulevard:

Reverse Proxy

A reverse proxy sits in front of one or more servers and forwards client requests to the appropriate server. The client interacts with the reverse proxy as if it were the server.

Direction:

Client -> Reverse Proxy -> Internal Network -> Server(s) 

Sample diagram from Security Boulevard:

Transparent Proxy

A transparent proxy, also known as an intercepting proxy, inline proxy, or forced proxy, is a type of forward proxy that intercepts and redirects client requests without requiring any client-side configuration or awareness.

Sample diagram from Wallarm:

Networking Models

Various models, architectures, and standards facilitate the interconnection of hardware and software systems for sharing information and coordinating activities. The integration includes communication devices, storage, processing, security, input/output devices, operating systems, software, services, data, and people.

  1. Provide Reliable Communications -
    • Ensure dependable communication between hosts and users.
  2. Isolate Functions in Layers -
    • Segment functions into distinct layers for better organization and management.
  3. Packets as Communication Basis -
    • Use packets as the fundamental unit of communication.
  4. Standardize Routing, Addressing, and Control -
    • Implement standardized protocols for routing, addressing, and control.
  5. Allow Additional Layer Functionality -
    • Enable flexibility for layers beyond internetworking to add functionality.
  6. Vendor-Agnostic, Scalable, and Resilient -
    • Ensure compatibility across vendors, scalability, and resilience in network design.

In the most basic form, a network model has at least two layers:

OSI Model

The Open Systems Interconnection (OSI) Model is a conceptual framework for describing the communication structure of interconnected computer systems, comprising seven layers.

Encapsulation and De-encapsulation Encapsulation occurs as data descends, and de-encapsulation happens as it ascends. The OSI Model aids in understanding networking terminology and processes.

The encapsulation/de-encapsulation process is best depicted visually below:

TCP/IP

Transmission Control Protocol/Internet Protocol (TCP/IP) is platform-independent but resource-intensive and designed for ease of use rather than security. It predates the OSI model.

SYN, SYN-ACK, ACK Handshake

The SYN, SYN-ACK, and ACK handshake is a process used in the TCP (Transmission Control Protocol) to establish a connection between two devices on a network.

This three-step handshake ensures that both the sender and receiver are ready to exchange data and have agreed upon initial sequence numbers for reliable communication.

Network Appliance

A network appliance is a dedicated hardware device with pre-installed software that is designed to provide specific networking services.

Common Network Devices

SD-WAN

Software-Defined Wide Area Network (SD-WAN) is a virtualized network architecture that allows enterprises to leverage any combination of transport services, including MPLS, LTE, and broadband internet services, to securely connect users to applications.

SASE

Secure Access Service Edge (SASE) is a network architecture that combines WAN capabilities with comprehensive security functions, such as SWG, CASB, FWaaS, and ZTNA, into a single, cloud-delivered service model.

Network Tools

Network Protocol Analyzers

Network Tools

Network Protocol Analyzers

Network Protocol Analyzers capture data packets transmitted over the network, decode them, and present the information in a human-readable format. These tools to diagnose issues, ensure optimal network performance, and detect malicious activities by providing detailed insights into network traffic.

Below are some available network analyzers:

Note that the packet captures can be forged, with tools like hping3. This tools can spoof headers and payload just like in a legitimate traffic.

SPAN Mode

Switch Port Analyzer (SPAN) mode is a feature on network switches that allows the monitoring of network traffic by mirroring the traffic from one or more source ports or VLANs to a designated destination port.

tcpdump

tcpdump is a powerful command-line packet analyzer tool used for capturing and analyzing network traffic on Unix-like operating systems.

Sample Commands:

nmap

nmap (Network Mapper) is a widely-used open-source tool for network discovery and security auditing. It can quickly scan large networks to determine which hosts are up, what services they are offering, and what operating systems and versions they are running.

Sample Commands:

Wireshark

Wireshark provides a comprehensive suite of tools for capturing and interactively analyzing network traffic.

Capture traffic on a specific interface (using the GUI):

  1. Open Wireshark.
  2. Select the network interface you want to capture from.
  3. Click the “Start” button to begin capturing packets.

Common filters:

To find packets containing specific keywords:

  1. Edit > Find Packet
  2. Enter the keyword that you want to search > Find

  3. To see the entire stream, click Analyze > Follow.

Save captured packets to a file (using the GUI):

  1. After capturing traffic, go to “File” > “Save As”.
  2. Choose the desired file format and location.
  3. Click “Save”.

Read packets from a file (using the GUI):

  1. Go to “File” > “Open”.
  2. Select the capture file you want to analyze.
  3. Click “Open”.

Back to main page