|Visualization of routing path in internet (Opte Project)|
- LAN (Local Area Networks) : LAN networks used for connecting computers in limited areas such as an office, a building or schools.
- WAN (Wide Area Networks) : WAN networks connect LAN networks to each other. The most obvious example of these networks are Internet.
Networks other than having benefits of ease in connectivity and sharing data, they also have some security risks as well. These security risks derive from the fact, which you open a pathway from your computer to outside world. Therefore security professionals have to have a good understanding of networks and network protocols used to protect Confidentiality, Integrity, Availability of information in computer networks.
TCP/IP is the most common standard for networking. TCP/IP protocols suit consist of four main protocols such as:
- Internet Protocol (IP) : IP protocol is responsible for delivering packets from the source computer to the destination computer based on the IP addresses in the packets headers. IP also break the data to smaller packages known as "Packet" for sending them over the network. The whole Internet network relay on the IP addresses. IP has two version. Version 4 which established in 1981 and still is in use but later because engineers felt there will be more demand for address spaces they introduce IP version 6 in 1998. But still IP V6 is not very adopted and its due to the fact that IP V4 and IP V6 are not compatible.
- Transmission Control Protocol (TCP) : TCP protocol is responsible for providing a reliable and guarantied packet delivery between computers. TCP protocol uses a "three way hand shake process" for establishing the connection between the computers. In this process the client send a "Synchronized packet (SYN)" to the server which want to connect to. Afterward the server will receive this package and in respond sends a "Synchronized/Acknowledge packet (SYN/ACK)". ACK packet is showing that, server received the packet successfully and the SYN packet is for establishing a connection to the client side. In the last step when client received the SYN will send an ACK packet to the server to finalize and establish the connection.
- User Datagram Protocol (UDP) : UDP also like the TCP used for sending Datagrams (messages), the only different is that this method is not reliable because there is no hand shake exist for making the connection. Mostly UDP used in cases which guarantied delivery is not necessary.
- Internet Control Message Protocol (ICMP) : ICMP protocol used by computers and systems in the networks to manage and control the fellow of data on the network. When there is a traffic problem in the network ICMP messages used to inform computers or routers. They also used when the destination unreachable.
At the end , if you are interested to know your public IP address you just need to search word "IP" in the Google search engine. You can also refer to IP2Location website which can show more information based on your IP address. In this website you can check the country, city and the ISP name of any IP address.