Computer Networking Basics | TryHackMe Networking Concepts
This article provides a comprehensive overview of fundamental networking concepts, essential for anyone delving into cybersecurity and IT infrastructure. It covers topics such as IP addressing, the OSI model, common networking tools, and protocols, offering practical insights and examples to solidify understanding. The article also provides the answers for TryHackMe Networking Concepts room.
OSI Model Explained
The OSI (Open Systems Interconnection) model, created by the International Organization for Standardization (ISO), is a conceptual framework outlining how communication occurs in computer networks. It provides a structured approach to understanding networking concepts, despite being theoretical. The OSI model consists of seven layers:
The layers are numbered from bottom to top, with the physical layer as layer 1 and the application layer as layer 7. Mnemonics such as “Please Do Not Throw Spinach Pizza Away” can assist in remembering the sequence. Familiarity with these layers and their numbering is essential for understanding terms like “layer 3 switch” or “layer 7 firewall.”
Detailed Layer Functions:
Layer 1: Physical Layer
Layer 2: Data Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
Studying the OSI model may seem overwhelming initially, but understanding its layers simplifies learning networking protocols and concepts.
TCP/IP Model Explained
The TCP/IP model (Transmission Control Protocol/Internet Protocol) was created in the 1970s by the U.S. Department of Defense (DoD) to ensure robust communication in networks, even if parts of the network fail due to events such as military attacks. Its design, particularly the adaptability of routing protocols, allows the network to function despite changes in topology.
Unlike the ISO OSI model, which has seven layers, the TCP/IP model has four primary layers. When considering how the two models align, the TCP/IP layers consolidate or map the OSI layers as follows:
TCP/IP Model Layers (Top to Bottom):
Application Layer
Transport Layer
Internet Layer
Link Layer
Five-Layer Representation:
Some modern textbooks, like Computer Networking: A Top-Down Approach, describe the TCP/IP model as having five layers by explicitly adding the physical layer. In this representation:
Application Layer
Transport Layer
Network Layer
Link Layer
Physical Layer
This alternate model aligns more closely with physical implementations in modern networking. Studying both the conceptual ISO OSI model and the practical TCP/IP model provides a well-rounded understanding of network design and functionality.
Basics of IP Addresses & Subnets
An IP address is a unique identifier assigned to devices on a network, allowing them to communicate without confusion. For example, addresses like 192.168.0.1 or 172.16.159.243 are IPv4 (Internet Protocol version 4) addresses. IPv4 is the most commonly used IP version today, though IPv6 is also gaining traction.
What is an IP Address?
Think of an IP address as a digital equivalent of your home postal address. Just as your home address enables others to send mail to you without ambiguity, an IP address ensures that data sent over a network reaches the correct device.
Key Points About IPv4
Public vs. Private IP Addresses
IP addresses are classified as either public or private:
Public IP Addresses:
Private IP Addresses:
Private IP Ranges:
Analogy: A private IP address functions like an isolated city, where internal communication is possible, but external communication requires going through a “gatekeeper” (the router).
Finding Your IP Address
Routing and Routers
A router acts like a post office, directing data packets toward their destination. When sending a parcel:
Technical Explanation:
By understanding these concepts, you can better grasp the structure of networking and the importance of IP addressing in enabling communication across devices and networks.
UDP & TCP Protocols Explained
The IP protocol allows devices to communicate on a network by identifying hosts with their unique IP addresses. However, to enable communication between specific processes on these devices, transport layer protocols come into play. The two primary transport protocols are UDP and TCP, each serving different purposes.
Recommended by LinkedIn
UDP (User Datagram Protocol)
Nature:
Port Numbers:
Analogy:
Use Cases:
TCP (Transmission Control Protocol)
Nature:
Reliability Features:
Three-Way Handshake:
Port Numbers:
Analogy:
Use Cases:
Key Differences Between UDP and TCP
FeatureUDPTCPConnectionConnectionlessConnection-oriented (requires handshake)ReliabilityNo delivery confirmationEnsures reliable data deliverySpeedFasterSlower due to connection setup and trackingUse CasesDNS, VoIP, gaming, video streamingWeb browsing, email, file transfersPort Numbers1–65535 (0 reserved)1–65535 (0 reserved)
Understanding when to use UDP or TCP depends on the application’s requirements, such as speed versus reliability.
Encapsulation Explained
Encapsulation is the process by which each layer of a networking model (such as OSI or TCP/IP) adds a header (and sometimes a trailer) to the data received from the layer above it. This ensures that each layer performs its specific function without interference from other layers. Encapsulation is essential for structured data transmission and communication between devices.
Steps of Encapsulation
Application Data:
Transport Layer (TCP/UDP):
Network Layer (IP):
Data Link Layer (Ethernet/WiFi):
De-Encapsulation
On the receiving device, the encapsulation process is reversed:
Encapsulation in Networking
Encapsulation is the process by which each layer of a networking model (such as OSI or TCP/IP) adds a header (and sometimes a trailer) to the data received from the layer above it. This ensures that each layer performs its specific function without interference from other layers. Encapsulation is essential for structured data transmission and communication between devices.
Steps of Encapsulation
Application Data:
Transport Layer (TCP/UDP):
Network Layer (IP):
Data Link Layer (Ethernet/WiFi):
De-Encapsulation
On the receiving device, the encapsulation process is reversed:
The Life of a Packet: Example (Searching for a Room on TryHackMe)
User Input:
Transport Layer:
Network Layer:
Data Link Layer:
Routers:
Server Reception:
TryHackMe Networking Concepts | Room Answers
Room answers can be found here.
Watch Also: