- Basics
- Difference between Hubs,Switches,and Routers
- Network Topologies
- What are Peer to Peer networks
- What is the Client/Server Architecture
- An Important well rounded summary
- Review these two lectures here:
- Summary of the Open systems interconnect
-
Layer 1 Physical : This is the physical layer, in which 1 and 0 data bytes can be sent as electric signals, wifi, or light via "the wire"
-
Layer 2 Data Link : These are the separation of the data bytes into frames. Notably, the frames will identify the source and destination MAC addresses of the devices' network card. Since electrical signals travel in all directions in a network, the data frames reach all devices in the network. Once the data frame is able to identify that the device is not the intended destination, the frames drop. In an unsecured network, this is where a malicious application can choose to not drop the frames, and steal the data.
-
Layer 3 Network : Once layer 2 is done, it generalizes the frames from MAC addresses to IP addresses.
-
Layer 4 Transport : This tranport layer further generalizes the network layer IP address into source and destination ports.
-
Layer 5 Session : Since there may be several TCP connections to one server at a time, with identical packet information from layers 1 through 4, we need a way to distinguish the session by ID to tag it.
-
Layer 6 Presentation : This is where the resource might be secured/encrypted with HTTPS/TLS by scrambling the HTTP request string. I didn't know HTTPS encrypted anything. I thought it was only a way to identify the true identity of a website. Also, encryption might be accomplished via VPN. At this step, if the data is encrypted, the model decrypts the information to reach step 7. It might be possible that a malicious attack to steal data can be avoided by encrypting. "This is where you can get screwed if you are on public wifi...people can sniff your data."
-
Layer 7 Application : This is where a client device makes a request to a server device, such as a GET request. This request contains a whole bunch of information, such as headers, cookies, content-type headers, etc, which is summarized into a string, so the string can participate with the rest of the OSI models as byte data.
- Review this Lecture:
- Public IP vs Private IP:
- DHCP server How does it Work?
- Network Hardware
- devices such as computers , printers and phones
- NIC
- Repeater
- Hub
- Switch
- Router
- Splitter
- Patch Panels
- Network Transmission Media
- Cable Media
- Wireless Media
- Cable Media
- STP (shielded twisted pair)
- UTP (unshielded twisted pair )
- Fiber Optics
- Coaxial Cables
- Wireless Media
- Wifi
- Infrared
- Bluetooth
- Microwave
- Advantages of Fiber Optics :
- Faster than twisted pair and coaxial
- Send data as light pulses over glass medium
- Free of electromagnetic interference
- Highly resistance to Eavesdropping
- Support extremely high data transfer rate
- Allow grater cable distances without repeater
- How Wireless Communication Works
- How Wireless Communication integrates in the IOT world
- Virtualization
- HyperVisors
- What is cloud computing?
- It is recommended to read the pdf regarding this section for further knowledge
- Security in general
- White hat vs gray hat vs black hat hackers
- It is recommended to read the pdf regarding this section for further knowledge