Chapter 01 ยท Part A

The Big Picture Foundation

What actually happens between tapping a link and the page loading. The whole story in one chapter, before we break it apart.
Networking is about getting data from one device to another. A network consists of devices (phones, laptops, servers), connections (cables, Wi-Fi), and protocols (rules for how they talk). The internet is not one network โ€” it's millions of networks connected together. Your device doesn't know how the packet gets there; it just trusts the layers underneath to figure it out. That's the whole abstraction.

1.1 What Is a Network, Really?

A network is two or more devices that can send data to each other. That's it. Your phone and your Wi-Fi speaker = a network. All the computers in your school = a network. Every connected device on Earth = a network of networks, which is what we call "the internet."

There are three ingredients in every network:

All three have to be there. A phone and a speaker that can't physically reach each other aren't a network. Two devices on the same cable that speak different languages aren't a network either.

1.2 Why Networks Exist

This seems obvious, but articulating it helps. Networks exist because sharing is more efficient than duplicating.

Without a network...With a network...
Every document lives on one computerDocuments are centralised; anyone authorised can access them
Every computer needs its own printerOne printer serves the whole office
Information can only be shared by physical transfer (USB, paper)Information moves in milliseconds to anyone, anywhere
Remote collaboration is impossibleTeams on different continents work on the same project in real-time

The modern world runs on networks. Your school's attendance system, the Eftpos machine at the shops, Uber, Netflix, your online exam portal, the traffic lights โ€” all networked. When networking breaks, modern life grinds to a halt. This is why security matters so much.

1.3 The Journey of a Click โ€” A Story

Let's follow what actually happens when you open Instagram on your phone at home. This is a high-level tour. Every chapter that follows zooms into one step.

From "tap" to "page loads" โ€” 12 things that happen in ~300ms YOUR PHONE taps "Instagram" HOME Wi-Fi radio waves to router HOME ROUTER adds NAT sends to ISP ISP NETWORK routes across Australia/world THE INTERNET many hops META DATA CENTRE Instagram servers build your feed โ† response travels back the same way: servers โ†’ internet โ†’ ISP โ†’ router โ†’ Wi-Fi โ†’ phone
Many milestones. ~300ms total on a decent connection. Each arrow hides layers of protocols, encryption, and routing decisions.

The 12 steps in plain English

  1. Tap. Your phone app decides it needs fresh content from Instagram's servers.
  2. DNS lookup. Your phone needs Instagram's IP address. It asks your Wi-Fi router, which asks your ISP's DNS resolver, which (if nothing is cached) walks the DNS tree to find Instagram's authoritative server. Answer comes back: 157.240.7.174.
  3. TCP handshake. Phone opens a connection to that IP. Three quick packets โ€” SYN, SYN-ACK, ACK โ€” set up a reliable channel.
  4. TLS handshake. Since Instagram uses HTTPS, phone and server negotiate an encryption key. After this, all traffic between them is scrambled.
  5. HTTP request. Phone sends "GET /my-feed" over the encrypted channel.
  6. Wi-Fi hop. The packet travels from your phone's Wi-Fi radio to your router via radio waves.
  7. NAT rewrite. Your router rewrites the source address from your phone's private IP to your public IP, notes the translation in its table, and forwards.
  8. ISP routing. Your ISP's routers forward the packet toward Instagram's network. Each router looks at the destination IP and picks the best next hop.
  9. Global hops. The packet may travel through submarine cables and 10+ routers across continents.
  10. Instagram's server. A web server receives the request, consults databases, builds your feed, and sends back an HTTP response.
  11. Return journey. The response follows essentially the same path in reverse.
  12. Render. Your browser/app parses the HTML, downloads images (each via the same process!), and displays the feed.

This all happens in roughly 300 milliseconds. When it feels slow, something in this chain is slow: DNS, a distant server, a congested network, or your own Wi-Fi.

THIS IS WHAT THE REST OF THE GUIDE EXPLAINS. Every step above gets its own deep dive somewhere. Chapter 4 (OSI/TCP-IP) explains the layered wrapping. Chapter 5 explains the IP addressing. Chapter 6 explains HTTP, DNS, TCP. Chapter 12 explains the TLS handshake. Chapter 7 explains the Wi-Fi step. If you understand the 12 steps above, you understand the backbone of this entire subject.

1.4 The Two Sides of Networking

The course is organised in two halves. The split is important because the same concepts keep coming back from different angles.

Side 1 โ€” How Networks WorkSide 2 โ€” How Networks Get Attacked
Topologies, hardware, models, protocols, addressingThreats, vulnerabilities, attacks
Goal: understand the normal, working systemGoal: understand where and how that system breaks
Chapters 1โ€“7Chapters 9โ€“11

Then a third part ties them together: how we defend (Chapters 12โ€“16). The logic is: you can't defend a system you don't understand, and you can't understand what needs defending without knowing how attacks work. That's why the course runs in this order.

THE BIG TAKEAWAY: Security is never an add-on. It's a property that emerges from how the whole system is designed. If you build a house with no locks on any doors, adding an alarm later is pointless. Networks are the same โ€” bolt-on security is weak security. This is called defence in depth and it's a principle you'll see repeated throughout the course.

1.5 Two Recurring Themes

Theme 1: Layering makes networks scale

You don't need to know how Wi-Fi radios work to use Instagram. Instagram's developers don't need to know how undersea cables work. Your ISP doesn't need to know what HTTPS is to forward packets. Every layer trusts the layers below to do their job.

This is how a system built by millions of people, using thousands of different technologies, still works together coherently. Each layer has a defined interface to the layer above and below. As long as the interface is honoured, the internals can change freely.

Theme 2: Every defence has a trade-off

More security usually means more friction, more complexity, more cost, or slower performance. Good design isn't "maximum security." It's right-sized security for the context โ€” enough protection for the actual risk, without crippling the thing you're trying to protect.

Examples you'll meet:

The point: security isn't a scale from 0 to 100 where you want 100. It's a set of engineering trade-offs where the right answer depends on what you're protecting from what.

1.6 How to Study This Course

Some concrete advice for the year ahead:

ONE MENTAL HABIT TO BUILD: When you hear about any attack, breach, or piece of technology in the news, pause and ask: "Which layer? Which CIA pillar? What defence would have stopped this?" Chapter 8 gives you the frameworks to answer these questions. By the end of the course, you should do this automatically. That's the skill examiners are testing.

1.7 What's Next

From here:

After that the course alternates between deeper networking (5-7) and then pivots into security (8 onwards). Take your time with Chapter 4; it's the foundation everything else builds on.

โ† Previous
You're at the start