Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • LAN
  • WAN
  • Differences between LAN and WAN
  • Public IP VS Local IP
  1. Network Basics

LAN / WAN

LAN (Local Area Network) and WAN (Wide Area Network) are two types of networks used in computer networking.

LAN

  • A LAN is a network that covers a small geographical area, such as a home, office, or school.

  • It connects devices within the same location, allowing them to share resources and communicate with each other.

  • LANs are typically faster and have lower latency compared to WANs.

  • Common LAN technologies include Ethernet and Wi-Fi.

WAN

  • A WAN is a network that covers a large geographical area, often spanning multiple cities, countries, or even continents.

  • It connects multiple LANs and allows for long-distance communication.

  • WANs are typically slower and have higher latency compared to LANs due to the longer distance between devices.

  • WANs are often established using leased lines, satellite links, or internet connections.

Differences between LAN and WAN

  • Size and Coverage: LANs cover a smaller area, while WANs cover a larger area.

  • Distance: LANs operate within a short distance, typically a few hundred meters, while WANs can span across vast distances.

  • Speed and Latency: LANs offer higher speed and lower latency compared to WANs.

  • Ownership and Control: LANs are privately owned and controlled by a single organization, while WANs may involve multiple organizations and service providers.

Both LANs and WANs play important roles in network connectivity, with LANs providing local connectivity and WANs enabling global connectivity.

Public IP VS Local IP

A public IP address and a local IP address are two distinct types of IP addresses used in networking.

  1. Public IP Address: A public IP address is a unique identifier assigned to a device connected to a network, such as the internet. It is provided by your Internet Service Provider (ISP) and serves as the address used to communicate with devices outside of your local network. Your public IP address allows your device to connect to other devices and services on the internet.

  2. Local IP Address: A local IP address, also known as a private IP address, is used within a local network to identify devices and facilitate communication. It is not directly accessible from the internet. Local IP addresses are typically assigned by a router or DHCP server and are used for internal network communication. They allow devices within the same network to communicate with each other and access shared resources.

The most common range of private IP addresses used in local networks are:

  • IPv4: 192.168.0.0 to 192.168.255.255, 172.16.0.0 to 172.31.255.255, and 10.0.0.0 to 10.255.255.255.

  • IPv6: fc00::/7.

Public IP addresses are necessary for devices to communicate over the internet, while local IP addresses are used for communication within a local network. It's important to understand the distinction between the two when configuring network devices and understanding network communication.

PreviousNetwork devicesNextVPN (Virtual Private Network)

Last updated 1 year ago