Skip to content

mahmoodfathy/ITI-Study-Guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 

Repository files navigation

ITI Open Source Study Guide

Week 1 - Computer Networks

  1. Introduction to Computer Networks

  2. OSI Model

  3. TCP/IP Model

  4. Network Devices

  5. Network media

  6. Introduction to Wireless Networks

  7. Security Fundamentals

Introduction to Computer Networks

  • Basics
  1. Difference between Hubs,Switches,and Routers
  2. Network Topologies
  3. What are Peer to Peer networks
  4. What is the Client/Server Architecture
  5. An Important well rounded summary

OSI Model

  • Review these two lectures here:
  1. OSI Model from a developer POV
  2. OSI Model from an IT POV
  • Summary of the Open systems interconnect
  • Layer 1 Physical : This is the physical layer, in which 1 and 0 data bytes can be sent as electric signals, wifi, or light via "the wire"

  • Layer 2 Data Link : These are the separation of the data bytes into frames. Notably, the frames will identify the source and destination MAC addresses of the devices' network card. Since electrical signals travel in all directions in a network, the data frames reach all devices in the network. Once the data frame is able to identify that the device is not the intended destination, the frames drop. In an unsecured network, this is where a malicious application can choose to not drop the frames, and steal the data.

  • Layer 3 Network : Once layer 2 is done, it generalizes the frames from MAC addresses to IP addresses.

  • Layer 4 Transport : This tranport layer further generalizes the network layer IP address into source and destination ports.

  • Layer 5 Session : Since there may be several TCP connections to one server at a time, with identical packet information from layers 1 through 4, we need a way to distinguish the session by ID to tag it.

  • Layer 6 Presentation : This is where the resource might be secured/encrypted with HTTPS/TLS by scrambling the HTTP request string. I didn't know HTTPS encrypted anything. I thought it was only a way to identify the true identity of a website. Also, encryption might be accomplished via VPN. At this step, if the data is encrypted, the model decrypts the information to reach step 7. It might be possible that a malicious attack to steal data can be avoided by encrypting. "This is where you can get screwed if you are on public wifi...people can sniff your data."

  • Layer 7 Application : This is where a client device makes a request to a server device, such as a GET request. This request contains a whole bunch of information, such as headers, cookies, content-type headers, etc, which is summarized into a string, so the string can participate with the rest of the OSI models as byte data.

TCP/IP Model

  • Review this Lecture:
  1. OSI and TCP/IP Model
  • Public IP vs Private IP:
  1. Public IP vs Private IP
  2. Nating from a developer POV
  • DHCP server How does it Work?
  1. DHCP Server

Network Devices

  • Network Hardware
  1. devices such as computers , printers and phones
  2. NIC
  3. Repeater
  4. Hub
  5. Switch
  6. Router
  7. Splitter
  8. Patch Panels

Network Media

  • Network Transmission Media
  1. Cable Media
  2. Wireless Media
  • Cable Media
  1. STP (shielded twisted pair)
  2. UTP (unshielded twisted pair )
  3. Fiber Optics
  4. Coaxial Cables
  • Wireless Media
  1. Wifi
  2. Infrared
  3. Bluetooth
  4. Microwave

UTP vs STP

  • Advantages of Fiber Optics :
  1. Faster than twisted pair and coaxial
  2. Send data as light pulses over glass medium
  3. Free of electromagnetic interference
  4. Highly resistance to Eavesdropping
  5. Support extremely high data transfer rate
  6. Allow grater cable distances without repeater

Wireless Networks

Security Fundamentals

About

This a study guide for open source track inside iti

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published