Practical Networking .net
post

Host to Host through a Router

We’ve looked at what it takes for two hosts directly connected to each other to communicate. And we’ve looked at what it takes for a host to speak to another host through a switch. Now we add another network device as we look at what it takes for traffic to pass from host to host […]

post

Host to Host through a Switch

In the last article, we looked at everything that happens for two hosts to communicate directly with one another. In this article, we will add a common network device: a switch. We will take a look at what happens for communication from Host to Host through a Switch. This article will be the practical application of everything […]

post

Host to Host Communication

After discussing the makeup of the OSI Model and some of the Key Players involved in moving a packet from one host to another, we can finally discuss the specific functions which occur in allowing Host to Host communication. At the very core of the Internet is this idea that two computers can communicate with […]

post

Key Players

The Internet is a fascinating blend of many different elements that all work together to create a world wide network of networks which allow billions of different devices to communicate. In this article, we will look at some of the key players of the Internet and the role each fulfills in order to achieve network communication. This list is far from […]

post

OSI Model

The Open Systems Interconnect model (OSI Model) explains all the individual functions that are necessary for the Internet to work. It is a set of seven independent functions which combine to accomplish the end-goal of Computer to Computer communication. Much like a car is composed of independent functions which combine to accomplish the end-goal of […]

post

Ethernet Wiring

Ethernet is a family of specifications that governs a few different things: It covers all the different wiring specifications (10BASE-T, 100BASE-TX, 1000BASE-T, etc…). It describes how to send bits (1s and 0s) across each wire. It also determines how to interpret those bits into meaningful frames. Initially, this article was meant to just cover the […]

post

Cryptography

Do you do online banking? Do you work from home? Do you use VPNs to access company resources? All these would not be possible without Cryptography. Cryptography is the art of keeping secrets, specifically through any form of communication. Cryptography has existed for thousands of years, but has become increasingly more important in recent history due […]

post

Authentication

In Cryptography, the concept of Authentication serves to provide proof that the other side of a communication is indeed who they claim to be, and who you intend for them to be. There are multiple ways to verify the opposing party’s Authentication. We will look at three of the most common: Username and Password Pre-Shared-Key […]