Why use packets?
it could be possible to send files and data over the Internet without chopping them down into small packets of information. One computer could send data to another computer in the form of a long unbroken line of bits (small units of information, communicated as pulses of electricity that computers can interpret).
However, such an approach quickly becomes impractical when more than two computers are involved. While the long line of bits passed over the wires between the two computers, no third computer could use those same wires to send information — it would have to wait its turn.
In contrast to this approach, the Internet is a "packet switching" network. Packet switching refers to the ability of networking equipment to process packets independently from each other. It also means that packets can take different network paths to the same destination, so long as they all arrive at the destination. (In certain protocols, packets do need to arrive at their final destinations in the correct order, even if each packet took a different route to get there.)
Because of packet switching, packets from multiple computers can travel over the same wires in basically any order. This enables multiple connections to take place over the same networking equipment at the same time. As a result, billions of devices can exchange data on the Internet at the same time, instead of just a handful.
~ @geekcode
it could be possible to send files and data over the Internet without chopping them down into small packets of information. One computer could send data to another computer in the form of a long unbroken line of bits (small units of information, communicated as pulses of electricity that computers can interpret).
However, such an approach quickly becomes impractical when more than two computers are involved. While the long line of bits passed over the wires between the two computers, no third computer could use those same wires to send information — it would have to wait its turn.
In contrast to this approach, the Internet is a "packet switching" network. Packet switching refers to the ability of networking equipment to process packets independently from each other. It also means that packets can take different network paths to the same destination, so long as they all arrive at the destination. (In certain protocols, packets do need to arrive at their final destinations in the correct order, even if each packet took a different route to get there.)
Because of packet switching, packets from multiple computers can travel over the same wires in basically any order. This enables multiple connections to take place over the same networking equipment at the same time. As a result, billions of devices can exchange data on the Internet at the same time, instead of just a handful.
~ @geekcode
WHAT IS VLAN?
VLAN (Virtual Local Area Network) separates several networks on a logical base. Only devices on the same VLAN can see each other. VLANs where invented to define a networks structure
independently from its physical hardware, to prioritize connections and to minimize broadcast traffic. They were not developed with security in mind, but its a common myth that VLANs can add to your security. Don’t rely on this myth, because several ways exist to
circumvent the separation of a VLAN.
~ @geekcode
VLAN (Virtual Local Area Network) separates several networks on a logical base. Only devices on the same VLAN can see each other. VLANs where invented to define a networks structure
independently from its physical hardware, to prioritize connections and to minimize broadcast traffic. They were not developed with security in mind, but its a common myth that VLANs can add to your security. Don’t rely on this myth, because several ways exist to
circumvent the separation of a VLAN.
~ @geekcode
After completing this terminologies we will share Cisco & other Networking paid courses for free to you guys.
#staytunned
It includes video content
By which you can get better knowledge about the networking
#WeNeedYourSupport
#share us
~ @geekcode
#staytunned
It includes video content
By which you can get better knowledge about the networking
#WeNeedYourSupport
#share us
~ @geekcode
WHAT IS ETHERNET?
Ethernet is a technology that connects wired local area networks (LANs) and enables the device to communicate with each other through a PROTOCOL which is the common network language.
This LAN is a network of computers and other electronic devices which covers a small area in your places like in the office, house, room or building. Unlike LAN, wide area network (WAN) covers much larger geographical areas. Furthermore, Ethernet is a protocol that controls the processes on how the data is transmitted through LAN. It also indicates how the network devices can transmit and format data packets so that the other network devices in the same area network segment can be able to receive, process and recognize them.
~ @geekcode
Ethernet is a technology that connects wired local area networks (LANs) and enables the device to communicate with each other through a PROTOCOL which is the common network language.
This LAN is a network of computers and other electronic devices which covers a small area in your places like in the office, house, room or building. Unlike LAN, wide area network (WAN) covers much larger geographical areas. Furthermore, Ethernet is a protocol that controls the processes on how the data is transmitted through LAN. It also indicates how the network devices can transmit and format data packets so that the other network devices in the same area network segment can be able to receive, process and recognize them.
~ @geekcode
IP?
IP like Ethernet is a connection-less protocol, that means it doesn’t know a relation between packets. It is used to define the source and destination host on layer 3(OSI MODEL), to find the (quickest)
path between two communications partners by routing packets and to handle
errors with ICMP.
Today there are two variants of IP IPv4 and IPv6. Both protocols differ widely and not only in size of IP addresses. IPv6 can be extended through so called optional headers.
~ @geekcode
IP like Ethernet is a connection-less protocol, that means it doesn’t know a relation between packets. It is used to define the source and destination host on layer 3(OSI MODEL), to find the (quickest)
path between two communications partners by routing packets and to handle
errors with ICMP.
Today there are two variants of IP IPv4 and IPv6. Both protocols differ widely and not only in size of IP addresses. IPv6 can be extended through so called optional headers.
~ @geekcode
WHAT IS TCP?
Transmission Control Protocol (TCP)
A connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP.
TCP takes messages from an application/server and divides them into packets, which can then be forwarded by the devices in the network – switches, routers, security gateways – to the destination. TCP numbers each packet and reassembles them prior to handing them off to the application/server recipient. Because it is
connection-oriented, it ensures a connection is established and maintained until the exchange between the application/servers sending and receiving the message is complete.
~ @geekcode
Transmission Control Protocol (TCP)
A connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP.
TCP takes messages from an application/server and divides them into packets, which can then be forwarded by the devices in the network – switches, routers, security gateways – to the destination. TCP numbers each packet and reassembles them prior to handing them off to the application/server recipient. Because it is
connection-oriented, it ensures a connection is established and maintained until the exchange between the application/servers sending and receiving the message is complete.
~ @geekcode
I will post TCP / IP protocol beginner guide pdf book in 10 mins #staytunned
By this pdf you will get some additional information about TCP/IP in depth.
~ @geekcode
By this pdf you will get some additional information about TCP/IP in depth.
~ @geekcode
WHAT IS FIREWALL?
A firewall is neither a product nor a tiny, magical box with lots of blinking LEDs even if more IT security companies try to let you think so. A firewall is a security concept. It serves to protect the network and
computers from being attacked and is only as effective as the combination of itscomponents.
Typical parts of a firewall are a packet filter, intrusion detection system, intrusion pre- vention system, log analyzer,
continuous system updates, virus scanner, proxies,honeypot and/or VPNs. A packet filter works on layer 3 and 4 and decides which packets shall pass, be dropped, rejected or redirected depending on its rule-set. Intrusion detection systems can be classified into two different types: host- and net-work intrusion detection system. A host intrusion detection system (HIDS for short) locates successful attacks on a local computer by, for example, continuously checking all files and directories against a database of cryptographic checksums.
A network intrusion detection system (NIDS) therefore detects attacks in the network
traffic and can operate on all layers at the same time. Its functionality can be compared to a virus scanner, because it searches for signatures of known attacks. Additionally it has the possibility to learn what is classified as normal traffic in a network and the anomaly detection component alarms packets that differs from it.
~ @geekcode
A firewall is neither a product nor a tiny, magical box with lots of blinking LEDs even if more IT security companies try to let you think so. A firewall is a security concept. It serves to protect the network and
computers from being attacked and is only as effective as the combination of itscomponents.
Typical parts of a firewall are a packet filter, intrusion detection system, intrusion pre- vention system, log analyzer,
continuous system updates, virus scanner, proxies,honeypot and/or VPNs. A packet filter works on layer 3 and 4 and decides which packets shall pass, be dropped, rejected or redirected depending on its rule-set. Intrusion detection systems can be classified into two different types: host- and net-work intrusion detection system. A host intrusion detection system (HIDS for short) locates successful attacks on a local computer by, for example, continuously checking all files and directories against a database of cryptographic checksums.
A network intrusion detection system (NIDS) therefore detects attacks in the network
traffic and can operate on all layers at the same time. Its functionality can be compared to a virus scanner, because it searches for signatures of known attacks. Additionally it has the possibility to learn what is classified as normal traffic in a network and the anomaly detection component alarms packets that differs from it.
~ @geekcode