Caution : Too many gifs ahead. XD

Introduction

I've always been fond of networking devices, imagining them and flow of data around me through those deivces. I'm bad at forming analogies but here I'm trying to make another one 😅. Networking is like having your own Avengers team, where each device plays a special role to keep everything running smoothly and securely. The router acts like Iron Man 🤖, connecting all your devices to the internet. Servers are like Captain America 🛡️, storing and protecting your important data. Firewalls are Thor’s hammer ⚒️, blocking any bad stuff from entering your network. VPNs are the Hulk 💪, hiding your identity and keeping your online activities safe. Switches are like Spider-Man 🕸️, ensuring all your devices communicate with each other seamlessly. Lastly, encryption is Doctor Strange’s magic 🔮, protecting your data and making sure no one can spy on you (we will learn about doctor strange 'in next'). Together, these devices create a powerful network that keeps your internet fast, secure, and ready to tackle anything!

CivilWarAvengersGIF


Servers

  • Servers is a computer program or device that provides a service to other computer programs and their users, known as clients, over a network.
  • A desktop can act like a server, but the limitations of the regular desktop can’t handle heavy traffic; it is only designed for single processors, like Core i7, i5, and so on.
  • A supercomputer is specially designed for servers, so handling huge data or hosting a service, traffic is not an issue. They are designed to work with multiple processors (like Intel Xeon processors).
    These use ECC RAM (Error-Correcting Code).
  • ECC RAM is mainly used in servers, detecting if the data was correctly processed. (Intel CPUs don’t support ECC RAM, but AMD processors do, and Intel Xeon will also support it.)
  • A server should also have hot-swappable hard drives and redundant power supplies, having a stable and robust OS.

SparksElectricalElectricityEquipmentRadioAmateurFireGIF


Hub, Switch, Router

  • HUB: A device with multiple ports that accepts Ethernet connections from network devices (it is not intelligent).
    • Hub does not filter any data or has any intelligence as to where the data is supposed to be sent. It broadcasts the data among all the devices which are connected.
  • Switch: It has multiple ports and can connect with Ethernet cable connections, and a switch is an intelligent hub.
    • A switch can actually learn the physical addresses of the devices connected to it and store these physical addresses, called MAC addresses.
      So when a data packet is sent to a switch, it’s only directed to the intended destination port.
  • To connect with the internet to exchange or route the data outside the network, a device needs to be able to read IP addresses, so hubs and switches can’t read that; this is where Routers come in.

SmallBusinessNetworkSwitchesMarketGIF


Modem vs Router

  • Modem: Brings the internet into your home or business. It establishes and maintains a dedicated connection to your ISP to give you access to the internet.
    • Computers only read digital signals, while signals out on the internet are analog. As analog data comes in from the internet, the modem demodulates the incoming analog signals into digital signals so that computers understand, and vice versa.
  • Router: Comes in after the modem. There are many different types of routers for houses, small, or large businesses.
    • A router is what routes or passes your internet connection to all your devices in your home. It directs data to your phone, computers, tablet, and so on, so those devices can access the internet.
    • Small home/business routers have a built-in switch so that you can connect multiple devices using Ethernet cables, and they also function as a wireless access point so that wireless devices can connect.
  • Conclusion: Hubs & switches are used to create a network, and routers are used to connect networks.

RouterRettrewGIF


WiFi Router vs Wireless Access Point

  • A WiFi router allows multiple wired and wireless devices to join together in a local area network. It broadcasts a WiFi signal so that wireless devices can connect.
    It also has a built-in switch with several network ports so that wired devices can connect.
  • A Wireless Access Point (WAP) relays data between a wired network and wireless devices.
    It is basically a wireless hub that’s used by wireless devices to connect to an existing wired network.
  • A wireless AP connects directly to an organization’s router, then it connects to the modem. Using WAP instead of WiFi routers is for easy management.
  • Routers consist of firewalls and DHCP services but not WAP.

TiposDeConexionEthernetVsWifiGIF


WiFi Security

  • WEP (Wireless Equivalent Privacy): 1999, meant to provide the same security for wireless networks as wired networks (40-bit encryption key). Easily hackable.
  • WPA (Wi-Fi Protected Access): Used TKIP (Temporary Key Integrity Protocol), dynamically changing its keys as they’re being used to ensure data integrity. Still, TKIP has vulnerabilities.
  • WPA2: Uses AES (Advanced Encryption Standard, a symmetric encryption algorithm) strong enough to resist brute force attacks.
  • WPA + WPA2: This is for compatibility. Older devices prior to 2006 don’t support AES, and modern devices connect to WPA2.
  • WPA3: Introduced in 2018, provides enhanced security.
  • WPS (Wi-Fi Protected Setup): Designed to make it as easy as possible for devices to join a secure wireless network (Push button method, WPS client).
  • Access Control: Blocks/grants access to the network using MAC addresses (Once the MAC address is blocked, it can generate an IP address but can’t communicate with other devices/networks). MeshWifiGIF

Bluetooth vs WiFi

  • Both use radio frequency technologies for wirelessly connecting to electronic devices. Certain devices have both Bluetooth and WiFi functionality.
  • Bluetooth:
    • Created to eliminate the hassle of dealing with wires and cables.
    • A low-power, wireless technology that uses short-range radio to connect nearby devices.
    • Range: ~30 feet (10 meters).
    • Operates at 2.4 GHz using FHSS (Frequency Hopping Spread Spectrum), making interception difficult.
      Example: Wireless earphones and speakers.
  • WiFi:
    • A wireless technology that allows devices to connect to the internet.
    • Commonly accessed via WiFi routers connected to the ISP.
    • Range: 100-300 feet (30-91 meters).
  • Differences:
    • Bluetooth connects devices; WiFi connects devices to the internet.
    • Bluetooth has slower transfer rates and shorter range, but uses less power than WiFi.

BabyHeadphoneGIF


Hotspot

  • A location where people access the internet wirelessly with mobile devices like laptops, tablets, or smartphones.
  • Public Hotspots:
    • Connected with WAP or WiFi routers linked to an ISP. These broadcast WiFi signals for nearby connections.
    • Not all are free—some require passwords or payment.
  • Private Hotspots:
    • Example: Home WiFi or tethering from smartphones.
    • Mobile hotspots are either standalone devices or built into smartphones.
    • Example: Jio Hotspot.
  • Public Hotspot Precautions:
    • Turn off folder sharing or protect with passwords.
    • Use antivirus programs and firewalls.
    • Install a VPN.

TurnItOnKyleBroflovskiGIF


Firewall

  • A system designed to prevent unauthorized access to a private network by filtering incoming internet traffic.
  • Purpose: Creates a safety barrier between private and public networks.
  • Operates based on rules known as “ACCESS CONTROL LIST,” determined by the Network Administrator.
  • Types:
    • Host-based Firewall: Software installed on individual computers.
    • Network-based Firewall: A combination of hardware and software operating at the network layer.

FirewallBenrob0329GIF


Virtual Private Network (VPN)

  • Establishes a secure and reliable connection over an unsecured network (e.g., the internet).
  • Protects your online activity and disguises your identity.
  • Provides a secure tunnel between two endpoints.

AskingBuddyGIF


Proxy Server

  • Retrieves data from the internet on behalf of users, acting as a middleman.
  • Benefits:
    • Privacy (hides IP addresses).
    • Speed (uses caching for faster page retrieval).
    • Saves bandwidth and logs activity.
  • Limitation: Doesn’t encrypt data (hackers can intercept it).

Example (Opening Instagram)

When you open Instagram on your phone, your request goes through your WiFi router or mobile network, which sends it to the internet. A DNS server finds Instagram’s address and connects you to their servers. Once connected, Instagram’s servers send the data (like your feed and reels) back to your phone. When you like a reel, your phone sends this action to Instagram’s servers, where it gets saved and updated for others to see. All of this happens in seconds, thanks to networking devices like routers, modems, and servers working together behind the scenes.

InstagramDoubleTapGIF


Conclusion

Networking is a big part of our connected world today, making it easy for devices to talk to each other and share information. By learning the basics like servers and routers, and even advanced things like VPNs and firewalls, you can understand how everything works and keep systems safe. Technology keeps changing, so staying updated on networking helps you handle new challenges and take advantage of all the opportunities in this digital age.


In Next

We will how to connect to these devices and what can we do throught these in later blogs (after completion of Bandit series).

CatComputerGIF