Useful Links
Computer Science
Computer Networking
Network Analysis
1. Introduction to Network Analysis
2. Foundational Networking Concepts
3. Network Traffic Capture
4. Tools for Network Analysis
5. The Analysis Process
6. Analyzing Network Protocols
7. Practical Application: Troubleshooting
8. Practical Application: Performance Optimization
9. Practical Application: Security Analysis
10. Advanced Topics in Network Analysis
Foundational Networking Concepts
The OSI Model
Overview and Purpose of the OSI Model
Seven-Layer Architecture
Abstraction and Modularity
Protocol Stack Interaction
Layer 1: Physical
Physical Media Types
Copper Cables
Fiber Optic Cables
Wireless Media
Signaling and Encoding
Digital Signal Transmission
Modulation Techniques
Signal Attenuation
Network Topologies
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Layer 2: Data Link
Framing and Error Detection
Frame Structure
Cyclic Redundancy Check
Error Correction Methods
MAC Addressing
Address Format and Structure
Unicast, Multicast, and Broadcast
Address Resolution
Switches and Bridges
Frame Forwarding
MAC Address Tables
Collision Domains
VLANs and Tagging
VLAN Concepts
802.1Q Tagging
VLAN Trunking
Layer 3: Network
IP Addressing and Subnetting
IPv4 Address Classes
Subnet Masks
CIDR Notation
IPv6 Addressing
Routing and Routers
Routing Tables
Static Routing
Dynamic Routing Protocols
ARP and Neighbor Discovery
Address Resolution Protocol
IPv6 Neighbor Discovery
ARP Cache Management
Layer 4: Transport
TCP vs. UDP
Connection-oriented vs. Connectionless
Reliability Mechanisms
Performance Characteristics
Ports and Sockets
Port Number Ranges
Socket Programming Concepts
Port Multiplexing
Flow Control and Congestion Control
Sliding Window Protocol
Congestion Avoidance Algorithms
Buffer Management
Layer 5: Session
Session Establishment and Termination
Session Initiation
Session Maintenance
Session Cleanup
Session Management Protocols
NetBIOS Sessions
RPC Sessions
SQL Sessions
Layer 6: Presentation
Data Encoding and Translation
Character Encoding
Data Format Conversion
Endianness Handling
Encryption and Compression
Symmetric Encryption
Asymmetric Encryption
Data Compression Algorithms
Layer 7: Application
Application Protocols
Protocol Design Principles
Client-Server Architecture
Peer-to-Peer Architecture
User Interfaces
Command Line Interfaces
Graphical User Interfaces
Web-based Interfaces
The TCP/IP Model
Comparison with OSI Model
Four-Layer vs. Seven-Layer Model
Layer Mapping
Practical Implementation Differences
Link Layer
Ethernet Technologies
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Wireless Technologies
802.11 Standards
Cellular Networks
Bluetooth
Internet Layer
IPv4 Addressing
Address Classes
Private Address Ranges
Network Address Translation
IPv6 Addressing
Address Types
Address Autoconfiguration
Transition Mechanisms
Routing Protocols
Distance Vector Protocols
Link State Protocols
Path Vector Protocols
Transport Layer
TCP Functions
Reliable Data Delivery
Connection Management
Error Recovery
UDP Functions
Datagram Delivery
Minimal Overhead
Real-time Applications
Application Layer
Common Application Protocols
HTTP and HTTPS
FTP and SFTP
SMTP and POP3
DNS and DHCP
Core Network Components
Packets, Frames, and Segments
Data Unit Terminology
Structure and Headers
Header Fields
Payload Data
Trailer Information
Encapsulation and Decapsulation
Protocol Data Units
Header Addition Process
Header Removal Process
MAC Addresses
Address Formats
48-bit Address Structure
Organizationally Unique Identifier
Locally Administered Addresses
Address Resolution
ARP Process
ARP Table Management
Gratuitous ARP
IP Addresses
IPv4 Addressing
Address Structure
Classful Addressing
Classless Addressing
IPv6 Addressing
Address Format
Address Types
Address Scopes
Subnetting and CIDR
Subnet Calculation
Variable Length Subnet Masks
Supernetting
Ports and Sockets
Well-known Ports
System Ports (0-1023)
Common Service Ports
Port Assignment Authority
Ephemeral Ports
Dynamic Port Allocation
Port Range Configuration
Port Exhaustion Issues
Socket Communication
Socket Types
Socket States
Socket Programming
Key Protocols
Ethernet
Frame Structure
Preamble and Start Frame Delimiter
Destination and Source Addresses
EtherType Field
Frame Check Sequence
Collision Domains
CSMA/CD Operation
Collision Detection
Backoff Algorithms
Address Resolution Protocol
ARP Requests and Replies
ARP Message Format
Broadcast and Unicast ARP
ARP Cache Timeout
ARP Spoofing
Attack Mechanisms
Detection Methods
Prevention Techniques
Internet Protocol
IPv4 Header Fields
Version and Header Length
Type of Service
Total Length
Identification and Flags
Time to Live
Protocol Field
Header Checksum
Source and Destination Addresses
IPv6 Header Fields
Version and Traffic Class
Flow Label
Payload Length
Next Header
Hop Limit
Source and Destination Addresses
Internet Control Message Protocol
Echo Requests and Replies
Ping Operation
Echo Message Format
Round-Trip Time Calculation
Error Messages
Destination Unreachable
Time Exceeded
Parameter Problem
Redirect Messages
Transmission Control Protocol
Connection Establishment
Three-Way Handshake
SYN Flood Protection
Connection State Machine
Flow and Congestion Control
Receive Window
Congestion Window
Slow Start Algorithm
Fast Recovery
User Datagram Protocol
Datagram Structure
UDP Header Format
Checksum Calculation
Port Multiplexing
Use Cases
Real-time Applications
Simple Request-Response
Broadcast and Multicast
Domain Name System
Name Resolution Process
Recursive Queries
Iterative Queries
DNS Caching
Record Types
A and AAAA Records
CNAME Records
MX Records
NS Records
PTR Records
SOA Records
Dynamic Host Configuration Protocol
Lease Process
DHCP Discover
DHCP Offer
DHCP Request
DHCP Acknowledge
DHCP Options
Subnet Mask
Default Gateway
DNS Servers
Lease Time
Hypertext Transfer Protocol
Request and Response Structure
HTTP Methods
Status Codes
Header Fields
Message Body
Secure Communication
TLS Handshake
Certificate Validation
Encryption Algorithms
Previous
1. Introduction to Network Analysis
Go to top
Next
3. Network Traffic Capture