Network traffic analysis for IR: Basic protocols in networking


In this article, we’ll discuss some of the basic protocols that are commonly used in computer networking. A good understanding of computer networking is required by fresh hackers in order for them to quickly pick up related cybersecurity content. 

This piece is ideal for individuals who might be getting into cybersecurity from a computer networking background.

Overview of networking protocols

Network protocols are the rules that govern communication between devices within a computer network. These rules include instructions that allow devices to identify and connect to each other, as well as the formatting rules that allow messages to be packed and unpacked from end to end. These rules determine the data that is either received or rejected.

During communication between computers within a network, data is broken down at the source into data packets. These are later on reassembled at their destination. There are various packet-switching techniques which make this possible, and numerous protocols that have been developed that make communication possible as per different categories. These are covered below.

Internet Protocol (IP)

Internet protocols are the set of rules that determine how data is transmitted within a network. The Internet Protocol (IP) in itself is a standard of specifications of how things should work between devices that are connected on the internet. This takes place because of two main things:

  1. IP addressing: This ensures that every device within the network has a unique IP address that can be able to determine the source and destination of the data or traffic in transit
  2. IP routing: This determines the paths that traffic should take based on their IP address. This is made possible by routers

Various protocols will interact with IP to make communication possible over any network. Below are some of these protocols.

Transmission Control Protocol (TCP)

TCP (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Lester Obbayi. Read the original post at: