Networking Essentials for Beginners


Introduction:
Networking is the backbone of modern communication, enabling billions of devices to connect and exchange information across the globe. Whether you're browsing a website, sending an email, or streaming a video, networking concepts are working behind the scenes to make it possible.
In this blog, I’ve summarized key networking fundamentals including how the Internet works, types of networks (LAN, WAN, MAN, PAN), the OSI and TCP/IP models, IP & MAC addressing, network devices like routers and switches, essential protocols and ports, firewall basics, and the client-server architecture.
If you're starting your journey in tech, preparing for DevOps roles, or aiming to strengthen your fundamentals, this blog will serve as a comprehensive guide to networking essentials.
How does the Internet work?
It basically uses the Optical fiber cable that is placed in the oceans at a large depth.
- to View that visit: https://www.submarinecablemap.com/
There are 3 tiers of company architecture used to provide the Internet to end users
Tier 1: A company that owns the optical fiber cable in the ocean, companies like AT&T, NTT, Verizon
Tier 2: A company like Jio, Airtel, and BSNL that takes the cable on RENT and provides it to their end users
Tier 3: Small companies that also take internet from TIER 2 companies and provide the internet in a small area
- like, Jio fiber, Air Fiber, Sway broadband, You Broadband
Types of Network:
WAN (Wide Area Network):
Scope: Covers a very large geographic area, potentially spanning across cities, countries, or even continents.
Characteristics: Often involves complex infrastructure and can be a combination of public and private networks. Generally offers lower speeds and higher latency compared to LANs and MANs.
Examples:
The Internet is a multinational corporation's network connecting offices across different countries.
MAN (Metropolitan Area Network):
Scope: Covers a larger geographic area than a LAN, typically a city or a large campus
Characteristics: Can be owned by a single entity or multiple organizations. Offers moderate speed and is suitable for connecting multiple LANs within a city.
Examples:
A city-wide network connecting different government agencies, or a network connecting multiple university campuses within a metropolitan area.
LAN (Local Area Network):
Scope: Limited geographic area, such as a home, office building, or school.
Characteristics: Typically privately owned and managed. Offers high-speed data transmission and low latency (delay).
Examples: Your home Wi-Fi network, a computer lab in a school, or the network within a single office building.
PAN (Personal Area Network):
- Connects devices within a very close proximity, typically a few meters, for an individual's personal use. Examples include Bluetooth connections between a phone and headphones or a wireless mouse connected to a computer.
OSI Model & TCP/IP Model
OSI(Open Systems Interconnection) Model:
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. The OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers, and each layer has specific functions and responsibilities.
7 Layers are:
Application Layer (Layer 7)
What It Does: Provides network services directly to user applications, like web browsers or email clients. It’s the layer you interact with when you use the internet.
Key Tasks: Handles protocols like HTTP (for web browsing), SMTP (for email), or FTP (for file transfers). It ensures apps can communicate over the network.
Example: When you type a URL into your browser, the Application Layer formats the request to fetch the webpage.
Analogy: The front desk of a hotel, where guests (users) make requests for services like room bookings or dining.
Presentation Layer (Layer 6)
What It Does: Translates data between the application and the network, ensuring it’s in a usable format. It handles encryption, compression, and data formatting.
Key Tasks: Converts data (e.g., text, images) into a standard format, encrypts sensitive data (like passwords), and compresses data to save bandwidth.
Example: When you send an encrypted email, the Presentation Layer encrypts the message before it’s sent.
Analogy: A translator who converts your words into a language the recipient understands.
Session Layer (Layer 5)
What It Does: Manages communication sessions between devices, ensuring connections are established, maintained, and terminated properly.
Key Tasks: Sets up, coordinates, and ends conversations between applications. It handles session recovery if a connection drops.
Example: During a video call, the Session Layer keeps the connection active and reconnects if the call briefly drops.
Analogy: A meeting coordinator who schedules, starts, and ends a conference call.
Transport Layer (Layer 4)
What It Does: Ensures reliable data transfer between devices, managing flow control, error checking, and data segmentation.
Key Tasks: Uses protocols like TCP (reliable, ordered delivery) or UDP (fast, less reliable). It breaks data into packets and reassembles them at the destination.
Example: When downloading a file, TCP ensures all packets arrive correctly and in order.
Analogy: A courier service that ensures packages are delivered intact and in the right sequence.
Network Layer (Layer 3)
What It Does: Routes data packets between different networks, determining the best path to the destination.
Key Tasks: Uses IP addresses to route packets. Protocols like IP (IPv4 or IPv6) operate here.
Example: When you visit a website, the Network Layer routes your request from your home network to the website’s server across the internet.
Analogy: A GPS system that finds the best route for your package to travel across cities.
Data Link Layer (Layer 2)
What It Does: Handles communication between devices on the same network, ensuring error-free data transfer.
Key Tasks: Uses MAC addresses to identify devices. It detects and corrects errors from the Physical Layer. Protocols include Ethernet.
Example: In your home Wi-Fi network, the Data Link Layer ensures your laptop and router exchange data correctly.
Analogy: A local mailroom sorting letters to ensure they reach the right office within a building.
Physical Layer (Layer 1)
What It Does: Manages the physical connection between devices, transmitting raw bits over hardware like cables or Wi-Fi.
Key Tasks: Defines hardware standards (e.g., cables, connectors, signal voltages). It converts data into electrical or optical signals.
Example: When you connect to Wi-Fi, the Physical Layer sends radio signals between your device and the router.
Analogy: The physical roads or wires that carry packages from one place to another.
Real-World Example: Sending an email involves all layers. The Application Layer formats the email, the Presentation Layer encrypts it, the Session Layer maintains the connection, the Transport Layer ensures reliable delivery, the Network Layer routes it to the recipient’s server, the Data Link Layer handles local network communication, and the Physical Layer sends the data over cables or Wi-Fi.
TCP/IP Model:
The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking framework that enables reliable communication between devices over interconnected networks. It provides a standardized set of protocols for transmitting data across interconnected networks, ensuring efficient and error-free delivery. Each layer has specific functions that help manage different aspects of network communication, making it essential for understanding and working with modern networks.
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1970s and is based on standard protocols. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike the seven layers in the OSI model.
4 Layers are:
Application Layer
What It Does: Combines the OSI’s Application, Presentation, and Session layers. It handles user-facing services, data formatting, and session management.
Key Tasks: Supports protocols like HTTP (web), SMTP (email), FTP (file transfer), and DNS (domain name resolution). It ensures apps can communicate over the network.
Example: When you visit a website, the Application Layer sends an HTTP request to the server and displays the webpage.
Analogy: A one-stop service desk handling customer requests, translations, and session coordination.
Transport Layer
What It Does: Manages end-to-end data transfer, ensuring reliability and flow control. It’s identical to the OSI Transport Layer.
Key Tasks: Uses TCP for reliable, ordered delivery (e.g., for emails) or UDP for faster, less reliable delivery (e.g., for streaming). It segments data into packets.
Example: When streaming a video, UDP sends packets quickly, prioritizing speed over perfection.
Analogy: A shipping company that decides whether to use guaranteed delivery (TCP) or express shipping with some risk of loss (UDP).
Network Layer
What It Does: Routes data packets across different networks, finding the best path to the destination. Matches the OSI Network Layer.
Key Tasks: Uses IP (IPv4 or IPv6) to assign addresses and route packets. Works with routing protocols to navigate the internet.
Example: When you send a message via WhatsApp, the Network Layer routes it from your phone to the recipient’s server.
Analogy: A postal service that forwards packages across cities using addresses.
Network Access Layer
What It Does: Combines the OSI’s Data Link and Physical layers. It handles data transfer within a single network and the physical transmission of bits.
Key Tasks: Uses MAC addresses for local communication and manages hardware (e.g., Ethernet, Wi-Fi). Converts data into signals for cables or wireless.
Example: In your home network, the Network Access Layer ensures your laptop’s data reaches your router via Wi-Fi.
Analogy: A local delivery truck that picks up packages and sends them over physical roads or airwaves.
Real-World Example: When you stream a movie, the Application Layer handles the streaming app’s interface and protocols (e.g., HTTPS), the Transport Layer uses UDP to deliver video packets quickly, the Network Layer routes packets to the streaming server, and the Network Access Layer sends signals over your Wi-Fi or Ethernet cable.
What is IP & MAC Address?
IP:
1. Internet Protocol (IP):
It's a fundamental protocol that defines how data is transmitted across networks.
It ensures that data packets (small chunks of data) are correctly routed to their destination.
Essentially, it's the language that devices use to communicate with each other on the internet.
2. IP Address:
An IP address is a unique numerical identifier assigned to each device connected to a network that uses the Internet Protocol.
It acts like a postal address for your device on the internet, enabling other devices to find and communicate with it.
There are two main versions of IP addresses: IPv4 and IPv6
IPv4: addresses are 32-bit numbers, typically written in dotted-decimal notation (e.g., 192.168.1.1).
IPv6: addresses are 128-bit numbers, designed to address the shortage of IPv4 addresses.
IP addresses can be public (visible to the outside world, used for internet communication) or private (used within a local network).
MAC Address:
Physical Address: MAC addresses are unique, hardware-level identifiers permanently assigned to a network interface card (NIC).
Local Network Communication: They are used for communication within a local network, like a home or office network, to ensure data packets reach the correct device.
Unchanging: MAC addresses are typically fixed and do not change.
Routers & Switches
Routers:
Function: A router connects multiple networks, allowing devices on different networks to communicate, including connecting your local network to the internet. It acts as a traffic director between different networks.
Layer: Routers operate at the Network Layer (Layer 3) of the OSI model.
Connectivity: Connects LANs to other LANs or to the Internet.
Example: A router connects your home network (LAN) to your internet service provider's network, enabling you to access the internet.
Switches:
Function: A switch connects devices within the same network, allowing them to communicate with each other. Think of it as a traffic controller within a single office building.
Layer: Switches operate at the Data Link Layer (Layer 2) of the OSI model
Connectivity: Connects devices like computers, printers, and servers within a LAN.
Example: In a home network, a switch might connect your computers, gaming consoles, and smart TVs to your router.
Firewall, Ports, Protocols
Protocols:
A protocol is a set of rules that govern how data is transmitted and received between devices on a network.
HTTP (Hypertext Transfer Protocol)(Port: 80): The foundation of data communication for the World Wide Web. It's used to transmit hypertext (like web pages) between web browsers and servers.
HTTPS (Hypertext Transfer Protocol Secure)(Port: 443): An encrypted version of HTTP. It uses TLS/SSL to provide a secure connection, protecting sensitive data during transmission.
FTP (File Transfer Protocol)(Port:
20
(Data),21
(Control)): Used to transfer files between computers over a network. It allows for uploading and downloading files.SMTP (Simple Mail Transfer Protocol)(Port: 25, 465, 587): The standard protocol for sending emails. It handles the transmission of email messages from a client to a mail server and between mail servers.
TCP (Transmission Control Protocol): A connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data. It's used for applications where accuracy is crucial.
UDP (User Datagram Protocol): A connectionless protocol that offers a faster but less reliable way to transmit data. It's suitable for applications where speed is prioritized over absolute accuracy.
IP (Internet Protocol): The core protocol responsible for routing data packets across networks, ensuring that information reaches its intended destination.
ARP (Address Resolution Protocol): A protocol that translates IP addresses into MAC addresses, enabling devices to locate each other on a local network segment.
SSH(Port: 22): SSH, or Secure Shell, is a network protocol that provides a secure way to access and manage remote computers. It uses encryption to protect data transmitted between a client and a server, making it suitable for use over unsecured networks. Essentially, SSH allows you to securely log in to another computer, execute commands, and transfer files.
Ports:
Ports are virtual locations on a device that are used to identify specific services or applications.
They are identified by numbers, ranging from 0 to 65535.
Each port is associated with a specific protocol and service. For example, port 80 is typically used for HTTP (web traffic), and port 443 is used for HTTPS (secure web traffic).
Ports allow a device to handle multiple network connections simultaneously, directing incoming data to the appropriate application or service.
Firewall:
Firewalls act as security checkpoints, inspecting network traffic and enforcing rules to protect networks from unauthorized access and malicious activity. They use protocols and port numbers to identify and filter traffic, allowing or blocking connections based on pre-defined rules. For example, a firewall can be configured to block all traffic on port 21 (FTP) while allowing traffic on port 80 (HTTP) and 443 (HTTPS).
Client-Server Architecture
The client-server model is a network architecture where clients request resources or services from a central server. The server then provides these resources or services to the client. This model is fundamental to how many applications and services operate on the internet and within local networks.
Here's a more detailed breakdown:
Clients: These are devices or software applications that initiate requests for data or services. Examples include web browsers, email clients, and mobile apps.
Servers: These are powerful computers or software that provide resources and services to clients. They store data, run applications, and handle requests.
Communication: Clients and servers communicate over a network using protocols like HTTP, TCP/IP, and others.
Request-Response: The core of the model is the request-response pattern. A client sends a request, and the server processes it and sends back a response.
Separation of Concerns: The client-server model promotes separation of concerns. Clients handle user interfaces and some processing, while servers handle data storage and complex operations.
Examples:
When you visit a website, your web browser (client) sends a request to the web server, which then sends back the website's content.
When you send an email, your email client (client) connects to an email server, which then relays the message to the recipient's email server.
Online banking involves a client (web browser or app) making requests to a bank's server to access accounts, transfer funds, etc.
Benefits:
Centralized Management: Servers can be managed and maintained centrally, making it easier to update and secure resources
Scalability: The model can easily scale by adding more clients or servers as needed.
Resource Sharing: Servers can share resources like databases, applications, and storage with multiple clients.
Improved Performance: By offloading complex tasks to the server, clients can operate more efficiently
Conclusion
Understanding networking is crucial for anyone entering fields like DevOps, cybersecurity, system administration, or cloud computing. These core concepts, from layered communication models to addressing, routing, and protocols, form the foundation upon which modern computing relies.
As I continue my journey in tech, diving deep into these topics has helped me understand not just how the internet works, but why it works the way it does. I hope this blog helps you the same way it helped me consolidate my learning.
Stay curious, keep exploring, and happy learning!
Subscribe to my newsletter
Read articles from Amitabh soni directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Amitabh soni
Amitabh soni
DevOps Enthusiast | Passionate Learner in Tech | BSc IT Student I’m a second-year BSc IT student with a deep love for technology and an ambitious goal: to become a DevOps expert. Currently diving into the world of automation, cloud services, and version control, I’m excited to learn and grow in this dynamic field. As I expand my knowledge, I’m eager to connect with like-minded professionals and explore opportunities to apply what I’m learning in real-world projects. Let’s connect and see how we can innovate together!