Introductory Networking
An introduction to networking theory and basic networking tools
Last updated
An introduction to networking theory and basic networking tools
Last updated
The OSI (Open Systems Interconnection) Model is a standardized model which we use to demonstrate the theory behind computer networking.
The OSI Model consists of 7 layers
This layer of the OSI model essentially provides networking options to programs running on a computer. It works almost exclusively with applications, providing an interface for them to use in order to transmit data.
The presentation layer translates the data into a standardized format, as well as handling any encryption, compression or other transformations to the data.
It is responsible to setting up a connection with the other computer across the network. If a session can be established then it's the job of the session layer to maintain it, as well as co-operate with the session layer of the remote computer in order to synchronize communications.
Its first purpose is to choose the protocol over which the data is to be transmitted. The two most common protocols in the transport layer are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). With TCP the transmission is connection-based (Connection between the computers is established and maintained for the duration of the request). With UDP , packets of data are thrown at the receiving computer. With the protocol selected, the transport layer then divides the transmission up into bite-sized pieces (Over TCP these are called segments, over UDP they are called datagrams)
The network layer is responsible for locating the destination of your request. At this stage we are working with what is referred to as Logical addressing (i.e. IP addresses) which are still software controlled. Logical addresses are used to provide order to networks , categorizing them and allowing us to properly sort them. The most common form of logical addressing is IPV4 format.
The data link layer focuses on the physical addressing of the transmission. It receives a packet from the network layer and adds in a physical (MAC) address of the receiving endpoint. Inside every network enabled computer is a Network Interface Card (NIC) which comes with a unique MAC (Media Access Control) address to identify it.
The physical layer is right down to hardware of the computer. This is where the electrical pulses that make up data transfer over a network are sent and received. Its the job of the physical layer to covert the binary data of the transmission into signals and transmit them across the network, as well as receiving incoming signals and converting them back into binary data.
As data is passed down each layer of the model, more information containing details specific to the layer in question is added on to the start of the transmission.
Encapsulation is the process by which data can be sent from one computer to another
When the message is received by the second computer, it reverses the process. This is known as de-encapsulation.
It serves as the basis for real-world networking. The TCP/IP model consists of four layers: Application, Transport, Internet and Network Interface.
The OSI Model and the TCP/IP model match up like this:
The process of forming a stable connection between two computers is called the three-way handshake.
The ping command is used when we want to test whether a connection to a remote resource is possible.
Traceroute can be used to map the path your request takes as it heads to the target machine. On Windows it is Tracert.
It essentially allows you to query who a domain name is registered to.
Dig gives us the TTL (Time To Live) of a queried DNS record.