<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Shaza’s Substack: Networking]]></title><description><![CDATA[Networking forms the backbone of the modern digital landscape, enabling seamless communication and data transfer across the globe. In this section, we aim to demystify the complex concepts, terminologies, and technologies that underpin the functioning of networks. We will break down seemingly daunting topics into easily digestible pieces, making networking fundamentals accessible to everyone.]]></description><link>https://shazaali.substack.com/s/networking</link><image><url>https://substackcdn.com/image/fetch/$s_!2oOa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ebb4394-27e5-4d9f-9784-8350541d233d_523x523.png</url><title>Shaza’s Substack: Networking</title><link>https://shazaali.substack.com/s/networking</link></image><generator>Substack</generator><lastBuildDate>Fri, 15 May 2026 06:31:06 GMT</lastBuildDate><atom:link href="https://shazaali.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Shaza Ali]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[shazaali@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[shazaali@substack.com]]></itunes:email><itunes:name><![CDATA[Shaza Ali]]></itunes:name></itunes:owner><itunes:author><![CDATA[Shaza Ali]]></itunes:author><googleplay:owner><![CDATA[shazaali@substack.com]]></googleplay:owner><googleplay:email><![CDATA[shazaali@substack.com]]></googleplay:email><googleplay:author><![CDATA[Shaza Ali]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Networking Fundamentals "2"]]></title><description><![CDATA[0x08. Networking basics]]></description><link>https://shazaali.substack.com/p/networking-fundamentals-2</link><guid isPermaLink="false">https://shazaali.substack.com/p/networking-fundamentals-2</guid><dc:creator><![CDATA[Shaza Ali]]></dc:creator><pubDate>Thu, 03 Aug 2023 19:43:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8f9334bc-b9f0-455c-99b0-fbc56e131444_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Localhost:</strong></h3><p>"Localhost" refers to the hostname that is used to access the network services running on a device from the same device. In simpler terms, it's a way to refer to your own computer or the device you are currently using.</p><p>When you set up a local server or run software that acts as a server on your computer (e.g., web server, database server), it can be accessed through the "localhost" address. The localhost address is usually represented by the IP address 127.0.0.1 or the hostname "localhost" itself. It is also often referred to as the loopback address.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Shaza&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Using the localhost allows developers to test and access applications, websites, or services locally without having to connect to the internet or use a public IP address. It's a common practice for web developers to set up and test websites on their local machines using a local web server, which is accessed through :</p><p><code>http://localhost</code></p><p><code> or </code></p><p><code>http://127.0.0.1</code></p><p>For example, if you have a local web server running on your computer, you can access it in a web browser by typing:</p><p><code>http://localhost</code></p><p> in the address bar. This will load the web page served by the local web server running on your machine.</p><div><hr></div><h1>0.0.0.0</h1><p>In networking, the 0.0.0.0 IP address is often used to represent the <strong>default route</strong>. The default route is <em>used by routers when they don't have a specific route for a destination IP address. </em>When a router receives a packet with a destination IP address that doesn't match any of its routing table entries, it will forward the packet to the default route.</p><blockquote><p>&#8220;A host may use <strong>0.0.0.0</strong> as its own source address in IP when it has not yet been assigned an address&#8221;<em>   https://en.wikipedia.org/wiki/0.0.0.0</em></p></blockquote><div><hr></div><h3>How to Modify and Manage the Hosts File on Linux ?</h3><p><strong>Linux Hosts File:</strong></p><p>The "hosts" file is a text file found on various operating systems, including Linux, that allows the manual mapping of hostnames to IP addresses. It is used primarily for local domain name resolution and can be used to override the DNS (Domain Name System) lookup for specific hostnames. When a computer tries to access a hostname, the operating system checks the "hosts" file first, and if the hostname is listed there, it resolves the IP address from the file without querying a DNS server.</p><p>In Linux, the location of the "hosts" file is typically:</p><p><code>```</code></p><p><code>/etc/hosts</code></p><p><code>```</code></p><p>The format of the "hosts" file is straightforward. Each line typically contains an IP address, followed by one or more hostnames separated by whitespace (tabs or spaces). Comments can also be added using the '#' symbol at the beginning of a line.</p><p><strong>Here's an example of a simple "hosts" file:</strong></p><p>```</p><p># Example hosts file</p><p>127.0.0.1   localhost</p><p>::1         localhost</p><p>192.168.1.10  myserver</p><p>192.168.1.20  myprinter</p><p>```</p><p>In this example, we have three entries:</p><p>1.<strong> The first two lines</strong> are loopback address entries that <strong>map the localhost to the IPv4 </strong>address 127.0.0.1 and the IPv6 address ::1.</p><p>2. The next two lines map the hostnames "myserver" and "myprinter" to their corresponding IP addresses 192.168.1.10 and 192.168.1.20, respectively.</p><p>By modifying the "hosts" file, you can set up custom hostnames for various local services or override the DNS resolution for specific domains. However, it's essential to use this feature responsibly and avoid altering critical system entries to prevent potential connectivity issues or security concerns.</p><p><strong>To edit the Linux hosts file, you'll need a text editor with administrative privileges (usually, you'll need to use the </strong><code>sudo </code><strong>command)</strong></p><pre><code><code>sudo vim /etc/hosts</code></code></pre><div><hr></div><h3>Netcat or nc</h3><ul><li><p><strong> </strong><code>nc </code><strong>is a networking utility for debugging and investigating the network.</strong></p></li><li><p><strong>Flag : -l</strong></p><ul><li><p><code>-l</code>: The <code>-l</code> option stands for "listen mode." It tells <code>nc</code> to listen for incoming connections on the specified port.</p></li><li><p><code>Example : </code></p><p><code>$ nc -l 2389</code> is using the <code>nc </code>(<code>netcat</code>) utility with the <code>-l</code> option to create a simple listener on a <strong>specified port number</strong>, in this case, port <strong>2389</strong>. </p></li></ul><blockquote><p>When you run the command <code>$ nc -l 2389</code>, the netcat utility starts listening on port 2389 for incoming connections. Once a connection is established to this port, netcat will interact with the connection, reading from and writing to it. It's important to note that netcat in listen mode (<code>-l</code>) will keep running until it is interrupted manually (e.g., by pressing <code>Ctrl + C</code> in the terminal).</p></blockquote></li></ul><p>Usage:</p><ol><li><p>The <code>nc</code> command, also <strong>used to read from and write to network connections.</strong></p></li><li><p>Used for simple network testing, port scanning, or establishing simple communication channels between computers. For example, you can use it to test network connectivity between two computers or to transfer files between systems using a simple protocol.</p><p></p></li></ol><p><strong>More Examples for nc:</strong></p><p><code>$ nc localhost 2389</code>, <code>nc</code> attempts to establish a connection to the service that is listening on port 2389 on the local machine.</p><p><strong>How to know port on which your localhost is running ?</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y9PP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y9PP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 424w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 848w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 1272w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y9PP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png" width="1061" height="225" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:225,&quot;width&quot;:1061,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:28795,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y9PP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 424w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 848w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 1272w, https://substackcdn.com/image/fetch/$s_!y9PP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff425c170-f856-4d77-bad6-5d5130a2f252_1061x225.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><code> sudo nc -l localhost 323</code></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>Edit text in a file using <code>sed </code>command</h3><blockquote><p><code>sed</code> stands for "stream editor," and it is a powerful command-line utility in Unix-based operating systems (including Linux) used for text processing. It reads input text line by line, applies specified operations (such as search and replace), and outputs the result to the standard output or modifies the input file directly.</p></blockquote><p>Let's say you want to replace the word "old" with "new" in the file named "example.txt". You can use the following `sed` command:</p><p><code>```bash</code></p><p><code>sed -i 's/old/new/' example.txt</code></p><p><code>```</code></p><p>The `-i` flag is used to perform the replacement directly in the file "example.txt" (in-place editing). The `s` command within the single quotes specifies the substitution operation. It will replace the first occurrence of "old" with "new" on each line in the file.</p><p>Please note that<strong> `-i` flag in `sed` makes changes directly to the file,</strong> so be cautious when using it. It's always a good idea to create a backup of the file before running the `sed` command, just in case you need to revert the changes.</p><p>Note : <br>In Unix-based systems, modifying system files like <code>/etc/hosts</code> usually requires superuser privileges. You can solve this issue by running the <code>sed</code> command with <code>sudo</code></p><div><hr></div><p><code>ifconfig</code><strong>   vs </strong><code>ipconfig</code><strong> :</strong></p><p><code>ifconfig</code> is used on Unix-based systems (Linux and macOS) to view and configure network interfaces, while <code>ipconfig</code> is used on Windows systems to display network configuration information. Both commands serve similar purposes but are specific to their respective operating systems.</p><p>Resources:</p><p><a href="https://www.thegeekstuff.com/2012/04/nc-command-examples/">8 Practical Linux Netcat NC Command Examples</a></p><p><a href="https://www.geeksforgeeks.org/sed-command-in-linux-unix-with-examples/">sed command</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/p/networking-fundamentals-2/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/p/networking-fundamentals-2/comments"><span>Leave a comment</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/p/networking-fundamentals-2?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/p/networking-fundamentals-2?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Shaza&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Networking Fundamentals]]></title><description><![CDATA[0x07. Networking basics #0 - DevOps - Network ALXSE Guided]]></description><link>https://shazaali.substack.com/p/networking-fundamentals</link><guid isPermaLink="false">https://shazaali.substack.com/p/networking-fundamentals</guid><dc:creator><![CDATA[Shaza Ali]]></dc:creator><pubDate>Wed, 02 Aug 2023 14:08:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/95d79e30-13fb-45f6-bf62-a5cf71382b1a_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Topics:</strong></p><ol><li><p><strong><a href="https://shazaali.substack.com/i/135650468/osi-model-acronym-apstndp">OSI Model</a></strong></p></li><li><p><strong><a href="https://shazaali.substack.com/i/135650468/what-is-a-lan">What is a LAN</a></strong></p></li><li><p><strong><a href="https://shazaali.substack.com/i/135650468/what-is-a-wan">What is a WAN</a></strong></p></li><li><p><strong><a href="https://shazaali.substack.com/i/135650468/what-is-the-internet">What is the Internet</a></strong></p></li><li><p><strong><a href="https://shazaali.substack.com/i/135650468/tcpudp">TCP/UDP</a></strong></p></li><li><p><strong><a href="https://shazaali.substack.com/i/135650468/toolprotocol-to-check-device-connection">Protocol-to-check-device-connection</a></strong></p></li></ol><p><strong>Intro.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Shaza&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Networking refers to the practice of connecting multiple computers and devices together to<strong> enable them to communicate and share resources</strong> with one another. It involves the design, implementation, and management of various hardware and software components that <strong>facilitate data exchange and communication across a network.</strong></p><div><hr></div><h3><strong>OSI Model - acronym "APSTNDP"</strong></h3><p>OSI model is like <strong>a set of rules</strong> that helps different computers and devices talk to each other in <em>a standardized way</em>. </p><p>It divides the process of communication into <strong>seven steps or layers</strong>, each responsible for a specific task. This makes it easier for different systems to work together, just like following <strong>a common set of instructions</strong>. So, no matter what type of device or network you have, as long as it follows these rules, it can communicate and share information with other systems that also follow the same rules.</p><h4><strong>Physical Layer (Layer 1): Delivery Guy</strong></h4><ul><li><p><strong>Physical Layer is like the "delivery guy" of the network.</strong> It <strong>takes </strong>the data from the sender, packages it in a suitable way for the specific delivery method (cables, wireless signals, etc.), ensures that it reaches its destination, and then hands it over to the receiver. This layer is primarily concerned with the physical means of getting data from one device to another and making sure it arrives intact.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XjKX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XjKX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 424w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 848w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 1272w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XjKX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png" width="406" height="128.82692307692307" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a07c494-2262-4569-a835-8815904296b0_5667x1798.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:462,&quot;width&quot;:1456,&quot;resizeWidth&quot;:406,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;physical layer&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="physical layer" title="physical layer" srcset="https://substackcdn.com/image/fetch/$s_!XjKX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 424w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 848w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 1272w, https://substackcdn.com/image/fetch/$s_!XjKX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07c494-2262-4569-a835-8815904296b0_5667x1798.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Resource https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/</figcaption></figure></div></li></ul><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/subscribe?"><span>Subscribe now</span></a></p><h4><strong>The Data Link Layer(Layer 2 ) : "Traffic cop"</strong></h4><p>Second layer of the networking framework. It is responsible for managing the <strong>direct communication</strong> between devices that are<strong> connected to the same local network.</strong> In simple terms, it's like the "traffic cop" that ensures smooth and reliable communication on the local network.</p><p><em>Here's what the Data Link Layer does in more detail:</em></p><ol><li><p><strong>Error Detection and Correction:</strong> <strong>detect and correct errors</strong>.</p></li><li><p><strong>Data Framing:</strong> Data sent over a network is broken down into smaller chunks called frames. The Data Link Layer puts a header (containing addressing information) and a trailer (with error-checking information) around each frame to mark the beginning and end of the data and to facilitate its reliable delivery.</p></li><li><p><strong>Media Access Control (MAC) Addressing:</strong> Every network device, like a network card or adapter, has a unique identifier called <strong>a MAC address</strong>. The Data Link Layer uses these MAC addresses to identify devices on the local network. This way, it can direct data to the correct device.</p></li><li><p><strong>Controls Access:</strong>  Since multiple devices share the same network, It uses a set of rules known as the Media Access Control <strong>(MAC) protocol</strong> to prevent data collisions and ensure fair access to the network.</p></li></ol><h4>Network Layer (Layer 3): "GPS" for data</h4><ul><li><p>Determines the best <strong>path </strong>for data to travel from the source to the destination across multiple networks.</p></li></ul><h4><strong>Transport Layer (Layer 4):</strong></h4><ul><li><p>Controlling the data flow <strong>to avoid congestion</strong>, and ensuring that all the data reaches its destination accurately and without errors.</p></li><li><p><strong>TCP/UDP : protocols have their actions here, coming later</strong></p></li></ul><h4>Session Layer (Layer 5):  "Conversation manager" </h4><p>The Session Layer is like a "conversation manager" for applications on different devices. Its main tasks are:</p><ul><li><p>When two applications want to communicate with each other, they need to set up a "session" to keep their conversation organized. keeps it active while the applications are talking, and closes it when they are done.</p></li><li><p><strong>Synchronizes data exchange between applications.</strong></p></li></ul><h4><strong>Presentation Layer (Layer 6): &#8220;Translator / formatter&#8221;</strong></h4><p>Focuses on data representation and translation for different applications to understand each other.</p><h4><strong>Application Layer (Layer 7):</strong> </h4><p>The topmost layer, the Application Layer, <strong>interacts directly with end-user </strong>applications. It provides services and interfaces for applications to access network resources and services, such as email (SMTP), file transfer (FTP), and web browsing <strong>(HTTP).</strong></p><blockquote><p>Using the mnemonic "All People Seem To Need Data Processing" can help you remember both the order of the OSI layers and their respective word representations.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fNCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fNCx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 424w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 848w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 1272w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fNCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png" width="223" height="182.81981981981983" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:273,&quot;width&quot;:333,&quot;resizeWidth&quot;:223,&quot;bytes&quot;:14108,&quot;alt&quot;:&quot;Layer names and their mnemonics&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Layer names and their mnemonics" title="Layer names and their mnemonics" srcset="https://substackcdn.com/image/fetch/$s_!fNCx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 424w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 848w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 1272w, https://substackcdn.com/image/fetch/$s_!fNCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b8b5bf7-1178-4e8d-945f-43f8be155b2a_333x273.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Layer names and their mnemonics</figcaption></figure></div><div><hr></div><h3><strong>What is a LAN ?</strong></h3><p><strong>a LAN (Local Area Network) is a network of computers and devices </strong>that are connected to each other within a relatively small area, like a home, office, or school. It allows these devices to communicate and share resources with each other, such as files, printers, and internet access. LANs are typically faster and more secure than accessing resources over the internet since the devices are physically close to each other and share a common network.</p><h4>Typical usage</h4><p>Local Area Networks (LANs) are commonly used in various settings for different purposes, including:</p><ul><li><p><strong>Sharing Resources</strong></p></li><li><p><strong>Internet Access</strong></p></li><li><p><strong>Email and Communication</strong></p></li><li><p><strong>Intranets:</strong> Organizations often use LANs to host intranet websites for internal communications, announcements, and knowledge-sharing.</p></li><li><p><strong>Security and Surveillance:</strong> LANs are used for setting up security systems, including IP cameras and access control devices.</p></li><li><p><strong>Small Business Networking:</strong> LANs are common in small businesses where they help connect computers, printers, and other devices, streamlining workflows and improving productivity.</p><h4>Typical geographical size</h4><p>The range of a typical LAN is usually limited to a few hundred meters, such as within a building or a campus. To connect multiple LANs over larger distances, Wide Area Networks (WANs) or the internet are used.</p></li></ul><h3><strong>What is a WAN ?</strong></h3><h4>Typical usage</h4><ul><li><p>Spans a large geographic area, connecting multiple local area networks (LANs) together. Unlike LANs, which cover smaller regions like homes, offices, or campuses, <strong>WANs can cover entire cities, countries, or even span across continents. </strong>WANs are designed to enable <strong>long-distance communication</strong> between distant locations and allow organizations and individuals to connect and share data over vast geographical distances. <strong>Examples</strong></p><ol><li><p><strong>Cloud Services:</strong> Many cloud-based services, such as cloud storage, software-as-a-service (SaaS), and cloud computing, rely on WANs to deliver data and applications to users from remote data centers.</p></li><li><p><strong>Video Conferencing:</strong> WANs enable video conferencing and real-time communication between people in different cities or countries, fostering collaboration and reducing the need for travel.</p></li><li><p><strong>Banking and Finance:</strong> WANs are used by financial institutions to connect their branches and provide online banking and other financial services to customers.</p></li><li><p><strong>Telecommunication Networks</strong></p><p><em>WAN would be used to connect offices located in separate buildings a few streets away. WAN technologies, such as leased lines, fiber optics, or wireless links. WANs are commonly used by organizations to interconnect their geographically dispersed offices and provide seamless communication and resource sharing across multiple locations.</em></p></li></ol></li></ul><h4>Typical geographical size</h4><p>vary significantly and depends on the specific network requirements and infrastructure. WANs can cover relatively small areas, such as connecting two neighboring cities, or they can span across entire continents, connecting different countries. The internet itself is a prime example of a global WAN, connecting networks and users worldwide. WANs typically involve long-distance communication and rely on various technologies, such as leased lines, fiber optics, satellites</p><h3><strong>What is the Internet ?</strong></h3><p>The Internet is like a vast <strong>global network of connected computers and devices.</strong> It allows people from all over the world to communicate, share information, and access various online services, like websites, emails, videos, and more. </p><h4>What is an IP address ?</h4><p>An IP address is like a <strong>unique identifier or address for a device connected to the internet or a network</strong>. It consists of a series of numbers, separated by dots, like "192.168.0.1." IP</p><h4><strong>What are the 2 types of IP address:</strong> </h4><ol><li><p><strong>IPv4 (Internet Protocol version 4):</strong> This is the <strong>older </strong>and most widely used type of IP address. It uses a <strong>32-bit number format</strong> and can represent around 4.3 billion unique addresses. IPv4 addresses are running out due to the growing number of devices connected to the internet.</p></li><li><p><strong>IPv6 (Internet Protocol version 6):</strong> IPv6 is the <strong>newer </strong>and more advanced type of IP address. It uses a <strong>128-bit number format </strong>and can provide an astronomical number of unique addresses, <strong>making it capable of accommodating the ever-expanding number of devices on the internet.</strong></p></li></ol><h4>What is <code>localhost ?</code></h4><p>"Localhost" is like a special hostname used to refer to the computer you are currently using. It is <strong>often associated with the IP address 127.0.0.1. When you use "localhost" in your web browser or other applications, you are referring to your own computer, </strong>allowing you to test and access services running on your own machine.</p><h4>What is a subnet ?</h4><p>A subnet is like a smaller, s<strong>eparate network within a larger network</strong>. It's like dividing a large area into smaller neighborhoods. Subnets help<strong> manage and organize</strong> devices in a network, allowing more efficient routing and controlling network traffic.</p><blockquote><p><strong>Why IPv6 was created ?:</strong> IPv6 was created because IPv4, with its limited number of addresses, was running out of available addresses due to the rapid growth of the internet and the increasing number of devices connected to it. IPv6 provides a significantly larger pool of unique addresses, allowing for the continued growth of the internet and ensuring that all devices can be assigned a unique address, even as the number of connected devices continues to expand.</p></blockquote><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PpvN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PpvN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 424w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 848w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 1272w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PpvN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png" width="482" height="224.83067092651757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:292,&quot;width&quot;:626,&quot;resizeWidth&quot;:482,&quot;bytes&quot;:21232,&quot;alt&quot;:&quot;Intranet vs Web&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Intranet vs Web" title="Intranet vs Web" srcset="https://substackcdn.com/image/fetch/$s_!PpvN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 424w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 848w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 1272w, https://substackcdn.com/image/fetch/$s_!PpvN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ddb336a-ad17-4b1e-b13e-28bd3b33ec77_626x292.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Intranet vs Web</figcaption></figure></div><div><hr></div><h3><strong>TCP/UDP</strong></h3><p><strong>TCP/UDP:</strong> TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the two mainly used data transfer protocols at the transport layer in the OSI model.</p><p><strong>Main Difference between TCP and UDP:</strong> The main difference between TCP and UDP lies in their communication characteristics:</p><ul><li><p><strong>TCP </strong>provides reliable data transfer with <strong>error checking and retransmission if needed. It ensures that data is delivered accurately and in the correct order. </strong>However, this reliability comes with additional overhead, making TCP slower than UDP.</p></li><li><p>UDP, on the other hand, is a <strong>faster </strong>but less reliable protocol. It does not guarantee data delivery or error correction. Data packets sent via UDP may be lost or arrive out of order. It is commonly used for <strong>real-time applications like video streaming and online gaming</strong>, where speed is more critical than reliability.</p><p></p></li></ul><h4>What is a port ?</h4><ul><li><p>Port is just a <strong>unique number assigned to every application of a computers</strong>. In computer networking, <em>each application or service running on a device is assigned a unique number</em> known as a "port number." Port numbers <strong>help identify which application or service should handle incoming data packets.</strong> There are 65,536 port numbers available, ranging from 0 to 65535.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8jGs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8jGs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 424w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 848w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 1272w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8jGs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp" width="298" height="274.99769585253455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10229743-af0c-434c-bcae-805796ed7567_868x801.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:801,&quot;width&quot;:868,&quot;resizeWidth&quot;:298,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Port? - Scaler Topics&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Port? - Scaler Topics" title="What is Port? - Scaler Topics" srcset="https://substackcdn.com/image/fetch/$s_!8jGs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 424w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 848w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 1272w, https://substackcdn.com/image/fetch/$s_!8jGs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10229743-af0c-434c-bcae-805796ed7567_868x801.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Resource : https://www.scaler.com/topics/images/what-is-port1_thumbnail.webp</figcaption></figure></div></li></ul><blockquote><p><strong>SSH (Secure Shell) - Port Number: 22</strong></p><p><em><strong>SSH (Secure Shell):</strong> SSH is a secure network protocol used for s<strong>ecure remote access </strong>to computers and devices over a network. It provides encrypted communication between the client and the server.</em></p><p><strong>HTTP (Hypertext Transfer Protocol) - Port Number: 80</strong></p><p><em>application layer protocol used to transmit and receive web pages</em></p><p><strong>HTTPS (Hypertext Transfer Protocol Secure) - Port Number: 443</strong></p><p><em>secure version of HTTP that incorporates encryption to secure the data transmitted between the client (web browser) and the server (web server). It uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols to encrypt data.</em></p></blockquote><h4><strong>Tool/Protocol to Check Device Connection:</strong> </h4><p><br>The "<strong>ping</strong>" tool is commonly used to check if a device is connected to a network. It uses the <strong>ICMP </strong>(Internet Control Message Protocol) to <strong>send a small packet to the target device and waits for a response. If the target device responds, it means the device is connected and reachable on the network</strong>. Ping is widely used for <em>troubleshooting </em>network connectivity issues and determining the latency (<strong>ping time</strong>) between devices.</p><div><hr></div><p>Definitions: </p><ul><li><p><strong>MAC address</strong></p></li></ul><p>Media Access Control address) is a <strong>unique identifier </strong>assigned to a network interface card (<strong>NIC</strong>) in a device. It is a hardware-based address used at the Data Link Layer (Layer 2) of the OSI model to uniquely identify a device on a local network.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CMPe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CMPe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 424w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 848w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 1272w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CMPe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png" width="527" height="265.35302390998595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:358,&quot;width&quot;:711,&quot;resizeWidth&quot;:527,&quot;bytes&quot;:11784,&quot;alt&quot;:&quot;The MAC address is a unique identifier assigned to each NIC. It is used by the Data Link Layer to identify devices on the same local network.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The MAC address is a unique identifier assigned to each NIC. It is used by the Data Link Layer to identify devices on the same local network." title="The MAC address is a unique identifier assigned to each NIC. It is used by the Data Link Layer to identify devices on the same local network." srcset="https://substackcdn.com/image/fetch/$s_!CMPe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 424w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 848w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 1272w, https://substackcdn.com/image/fetch/$s_!CMPe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff97229d9-3282-4acd-9e6b-f7bb70826899_711x358.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The MAC address is a unique identifier assigned to each NIC. It is used by the Data Link Layer to identify devices on the same local network.</figcaption></figure></div><ul><li><p><strong>Private and public address</strong></p><ul><li><p><strong>Private address</strong>: A private IP address is used <strong>within a private network,</strong> like a home or office <strong>LAN</strong>. It is not directly accessible from the internet, allowing devices on the local network to communicate with each other, but they need a public IP address to access the internet.</p></li><li><p><strong>Public address:</strong> A public IP address is assigned to a device by the <em>internet service provider (ISP)</em>. It is <strong>globally routable </strong>on the internet, allowing devices to be identified and accessed from anywhere on the internet.</p><div><hr></div></li></ul></li></ul><h4><strong>TCP/UDP ports List</strong></h4><p>TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) <strong>use port numbers to direct data to specific applications running on a device. </strong>Here are some common port numbers for popular services:</p><ul><li><p>SSH (Secure Shell) - Port 22 (TCP)</p></li><li><p>HTTP (Hypertext Transfer Protocol) - Port 80 (TCP)</p></li><li><p>HTTPS (HTTP Secure) - Port 443 (TCP)</p></li><li><p>FTP (File Transfer Protocol) - Port 21 (TCP)</p></li><li><p>DNS (Domain Name System) - Port 53 (UDP/TCP)</p></li></ul><p>SMTP (Simple Mail Transfer Protocol) - Port 25 (TCP)</p><div><hr></div><h4>What is ping /ICMP ?</h4><p>Ping is a utility used to check the reachability of a network device (usually a computer) and measure the round-trip time for data to travel from the source to the destination and back. It works using ICMP (Internet Control Message Protocol) packets. If the target device is reachable, it responds with an acknowledgment, and the round-trip time (ping time) is displayed.</p><h4>Positional parameters</h4><ul><li><p>Positional parameters are variables used in command-line interfaces or shell scripts to represent arguments passed to a program or script when it is executed. The first argument is represented by $1, the second argument by $2, and so on. For example, if a script is executed as "script.sh apple orange," $1 would represent "apple," and $2 would represent "orange."</p><p></p><div><hr></div></li></ul><p><code>netstat</code>: stands for "<strong>network statistics</strong>." It is a command-line tool used to display various network-related information on a computer. When you run the "netstat" command, it provides a list of active network connections, open ports, routing tables, and other network-related statistics on your system. It is useful for diagnosing network issues, monitoring</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f6o1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f6o1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 424w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 848w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 1272w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f6o1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png" width="954" height="228" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:228,&quot;width&quot;:954,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37553,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f6o1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 424w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 848w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 1272w, https://substackcdn.com/image/fetch/$s_!f6o1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1aeef32-00e1-4e7e-9295-b0724eb33986_954x228.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p><strong>Resources:</strong></p><p><a href="https://www.youtube.com/watch?v=bj-Yfakjllc&amp;list=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi">Network Devices - Hosts, IP Addresses, Networks - Networking Fundamentals Playlist</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/p/networking-fundamentals/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/p/networking-fundamentals/comments"><span>Leave a comment</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/p/networking-fundamentals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://shazaali.substack.com/p/networking-fundamentals?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://shazaali.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Shaza&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>