Computer Networking & Security#
Table of Contents#
nmap#
[ d ] ndiff
[ y ]
02-10-2024
. Hacker Joe. “NMAP Full Guide (You will never ask about NMAP again)”.
Virtual Private Network#
Resources#
Tools & Technologies
[ h ][ w ] ns-3 - modeling and simulation
[ h ][ d ][ g ][ w ] pfSense
[ h ][ d ][ g ][ w ] Scapy - packet manipulation
[ h ][ d ][ g ][ w ] Wireshark - network traffic capture and analysis
Courses
[ h ] Stanford CS144 Introduction to Computer Networking
Online
[ h ] Submarine Cable Map
border gateway protocol
[ y ]
08-04-2021
. Kevin Du. “BGP Routing and Attacks”.[ y ]
10-12-2021
. Ben Eater. “Why was Facebook down for five hours?”.[ y ]
12-04-2020
. Epic Networks Lab. “BGP Hijacking - Detection and Prevention | Network Traffic Analysis Ep. 16 | CS4558”.[ y ]
09-20-2021
. David Bombal. “Destroying the Internet (BGP routers) EP 1 // BGP Python scapy DoS script”.[ y ]
05-04-2016
. Computerphile. “BGP: Border Gateway Protocol - Computerphile”.
David Bombal
[ y ]
03-01-2024
. “Top 5 Wireshark tricks to troubleshoot SLOW networks”.
JimKurose
[ y ]
01-15-2022
. “5.4 BGP: the Border Gateway Protocol”.[ y ]
01-15-2022
. “4.3 The Internet Protocol, part 1”.[ y ]
01-15-2022
. “4.3 The Internet Protocol, part 2”.[ y ]
01-15-2022
. “4.2 What’s inside a router? Part 2.”[ y ]
01-15-2022
. “4.2 What’s inside a router? Part 1.”.[ y ]
01-15-2022
. “4.1 Introduction to the Network Layer”.[ y ]
09-05-2012
. “Traceroute demonstration”.
Kevin Du
[ y ]
07-31-2021
. “SEED Internet Emulator: Overview”.
Linus Tech Tips
[ y ]
11-08-2022
. “Your Router Sucks. Build Your Own Instead!”.
My Lesson
[ y ]
01-31-2023
. “IBM IT Support - Complete Course | IT Support Technician - Full Course”.
More
[ y ]
10-23-2019
. danscourses. “The Data Link Layer, MAC Addressing, and the Ethernet Frame”.[ y ]
10-12-2023
. The Bearded I.T. Dad. “Beginner to Pro: A Roadmap for Becoming A Network Engineer”.[ y ]
08-30-2021
. Practical Networking. “Network Protocols - ARP, FTP, SMTP, HTTP, SSL, TLS, HTTPS, DNS, DHCP - Networking Fundamentals - L6”.
Texts#
Chou, Eric. (2020). Mastering Python Networking. 3rd Ed. Packt.
[ g ][ g ] Collins, Michael. (2017). Network Security Through Data Analysis: From Data to Action. 2nd Ed. O’Reilly.
Edelman, Jason; Scott S. Lowe; & Matt Oswalt. (2018). Network Programmability and Automation: Skills for the Next-Generation Network Engineer. O’Reilly.
Forshaw, James. (2017). Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation. No Starch Press.
Gilman, Evan & Doug Barth. (2017). Zero Trust Networks: Building Secure Systems in Untrusted Networks. O’Reilly.
Keshav, Srinivasan. (2012). Mathematical Foundations of Computer Networking. Addison-Wesley Professional.
Kurose, James & Keith Ross. (2016). Computer Networking: A Top-Down Approach, 7th Ed.
Liu, Cricket & Paul Albitz. DNS and Bind: Help for System Administrators. 5th Ed. O’Reilly.
[ h ] OccupyTheWeb. Network Basics for Hackers.
[ h ][ g ] Peterson, Larry L.; Lawrence Brakmo; & Bruce S. Davie. (2022). TCP Congestion Control: A Systems Approach. Systems Approach.
[ h ][ g ] Peterson, Larry L. et al. (2021). Software-Defined Networks: A Systems Approach. Systems Approach.
[ h ][ g ] Peterson, Larry L. & Bruce S. Davie. (2021). Computer Networks: A Systems Approach. 6e. Morgan Kaufmann Series in Networking.
Sanders, Chris. (2017). Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems. 3e. No Starch Press.
Tanenbaum, Andrew & David Wetherall. (2010). Computer Networks, 5th Ed. Prentice Hall.
White, Russ & Ethan Banks. (2017). Computer Networking Problems and Solutions: An Innovative Approach to Building Resilient, Modern Networks. Pearson.
Gast, Matthew. (2013). 802.11ac: A Survival Guide. O’Reilly.
Gast, Matthew. (2005). 802.11 Wireless Networks: The Definitive Guide. 2e. O’Reilly.
Gulasekaran, Susinder R. & Sundar G. Sankaran. (2021). Wi-Fi 6 Protocol and Network. Artech House Publishers.
Minella, Jennifer. (2022). Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise. Wiley.
Figures#
Terms#
[ w ] 0.0.0.0
[ w ] 6to4
[ w ] Acknowledgement (ACK)
[ w ] Address Space
[ w ] Asynchronous Transfer Mode
[ w ] Australian Overland Telegraph Line
[ w ] Automatic Repeat Query (ARQ)
[ w ] Automatic Repeat Request (ARQ)
[ w ] Autonomous System (AS)
[ w ] Average Per-Bit Delivery Cost (APBDC)
[ w ] Backbone Network
[ w ] Bandwidth
[ w ] Bandwidth Throttling
[ w ] Bandwidth-Delay Product
[ w ] Bit Rate
[ w ] Bit Time
[ w ] Bitstream
[ w ] Border Gateway Protocol (BGP)
[ w ] Bridge
[ w ] Broadband
[ w ] Broadband over Power Lines (BPL)
[ w ] Broadcast Address
[ w ] Burstable Billing
[ w ] Cable Ship
[ w ] Channel Capacity
[ w ] Circuit Switching
[ w ] Class of Service
[ w ] Classful Network
[ w ] Classless Inter-Domain Routing (CIDR)
[ w ] Clock Recovery
[ w ] Coaxial
[ w ] Coaxial Cable
[ w ] Committed Information Rate
[ w ] Communication Protocol
[ w ] Complex Network
[ w ] Connection-Oriented Communication
[ w ] Connectionless Communication
[ w ] Constant Envelope
[ w ] Constellation Diagram
[ w ] Control Plane
[ w ] Core Router
[ w ] Crosstalk
[ w ] Customer Premises Equipment (CPE)
[ w ] Data Cap
[ w ] Data Circuit-Terminating Equipment (DCE)
[ w ] Data Link Layer
[ w ] Data Plane
[ w ] Data Stream
[ w ] Data Terminal Equipment (DTE)
[ w ] Datagram
[ w ] Deep Packet Inspection (DPI)
[ w ] Default Gateway
[ w ] Default Route
[ w ] Delay-Tolerant Networking (DTN)
[ w ] Distance-Vector Routing Protocol
[ w ] Distribution Frame
[ w ] Diversity Scheme
[ w ] DTN Routing
[ w ] Dynamic Host Configuration Protocol (DHCP)
[ w ] Dynamic Network Analysis
[ w ] Dynamic Routing
[ w ] Electrical Cable
[ w ] Electromagnetic Interference (EMI)
[ w ] Encapsulation
[ w ] End System
[ w ] End-to-End Encryption (E2EE)
[ w ] End-to-End Principle
[ w ] Ethernet
[ w ] Ethernet Hub
[ w ] Exterior Gateway Protocol
[ w ] Failover
[ w ] Fiber Optic Cable
[ w ] Flow Control
[ w ] Forwarding Plane
[ w ] Forwarding Table
[ w ] Frame
[ w ] Frame Check Sequence (FCS)
[ w ] Frame Relay
[ w ] Gateway
[ w ] Goodput
[ w ] Gossip Protocol
[ w ] Great-Circle Navigation
[ w ] Guard Interval
[ w ] Handshake
[ w ] Header
[ w ] Heterogeneous Network
[ w ] Hex Dump
[ w ] High Performance Computing Act of 1991
[ w ] Holddown
[ w ] Hop
[ w ] Hosts File
[ w ] Hub
[ w ] Human-Readable
[ w ] Hypertext Transfer Protocol (HTTP)
[ w ] IEEE 1901
[ w ] IEEE 802
[ w ] IEEE 802.1
[ w ] IEEE 802.11
[ w ] IEEE 802.1X
[ w ] IEEE 802.3
[ w ] IGMP Snooping
[ w ] Information Superhighway
[ w ] Intelligent Transportation System (ITS)
[ w ] Inter Packet Gap (IPG)
[ w ] Interplanetary Internet
[ w ] Interior Gateway Protocol (IGP)
[ w ] Internet
[ w ] Internet Assigned Numbers Authority (IANA)
[ w ] Internet Backbone
[ w ] Internet Checksum
[ w ] Internet Exchange Point (IXP)
[ w ] Internet Group Management Protocol (IGMP)
[ w ] Internet History
[ w ] Internet of Things (IoT)
[ w ] Internet of Vehicles (IoV)
[ w ] Internet Protocol (IP)
[ w ] Internet Protocol Suite (TCP/IP)
[ w ] Internet Protocol version 4 (IPv4)
[ w ] Internet Protocol version 6 (IPv6)
[ w ] IP Address
[ w ] IP Multicast
[ w ] IP Tunnel
[ w ] IPv4 Address Exhaustion
[ w ] IPv4 Shared Address Space
[ w ] Kerberos
[ w ] Leased Line
[ w ] Link-Local Address
[ w ] Link Aggregation
[ w ] Link Aggregation Control Protocol (LACP)
[ w ] Link Encryption
[ w ] Link Layer
[ w ] Link-State Routing Protocol
[ w ] Load
[ w ] Load Balancing
[ w ] Local Area Network (LAN)
[ w ] localhost
[ w ] Longest Prefix Match
[ w ] Loopback
[ w ] Maximal-Ratio Combining (MRC)
[ w ] Maximum Transmission Unit (MTU)
[ w ] Media Access Control (MAC)
[ w ] Media Access Control (MAC) Address
[ w ] Message Switching
[ w ] Metcalfe’s Law
[ w ] Mobile Ad Hoc Network (MANET)
[ w ] Modulation
[ w ] Modulator-Demodulator (Modem)
[ w ] Multicast Address
[ w ] National Information Infrastructure (NII)
[ w ] National Science Foundation Network (NSFNET)
[ w ] Net Bias
[ w ] Network Address Translation (NAT)
[ w ] Network Administrator
[ w ] Network Architecture
[ w ] Network Congestion
[ w ] Network Delay
[ w ] Network Effect
[ w ] Network Equipment
[ w ] Network Forensics
[ w ] Network Interface Controller (NIC)
[ w ] Network Layer
[ w ] Network Metric
[ w ] Network Packet
[ w ] Network Planning and Design
[ w ] Network Science
[ w ] Network Security
[ w ] Network Security Services (NSS)
[ w ] Network Segment
[ w ] Network Service Provider (NSP)
[ w ] Network Socket
[ w ] Network Theory
[ w ] Network Topology
[ w ] Network Traffic
[ w ] Next-Generation Network (NGN)
[ w ] Node
[ w ] Open Shortest Path First (OSPF)
[ w ] Open Systems Interconnection (OSI) Model
[ w ] Optical Fiber
[ w ] Out-of-Order Delivery
[ w ] Overhead
[ w ] Overlay Network
[ w ] Packet
[ w ] Packet Analysis
[ w ] Packet Capture Appliance
[ w ] Packet Forwarding
[ w ] Packet Loss
[ w ] Packet Switching
[ w ] Patch Panel
[ w ] Peak Information Rate (PIR)
[ w ] Peering
[ w ] PHY-Level Collision Avoidance (PLCA)
[ w ] Physical Layer
[ w ] Ping of Death
[ w ] Point-to-Point Protocol
[ w ] Port
[ w ] Power-Line Communication (PLC)
[ w ] Preamble
[ w ] Preboot Execution Environment (PXE)
[ w ] Private Network
[ w ] Processing Delay
[ w ] Propagation Delay
[ w ] Proprietary Protocol
[ w ] Protocol Analysis
[ w ] Protocol Data Unit
[ w ] Protocol Ossification
[ w ] Open Shortest Path First (OSPF)
[ w ] Queueing Delay
[ w ] Queueing Theory
[ w ] QUIC
[ w ] Radio-Frequency Interference (RFI)
[ w ] Real-Time Communication (RTC)
[ w ] Real-Time Computing
[ w ] Redundancy
[ w ] Reed’s Law
[ w ] Reliability
[ w ] Reliable Byte Stream
[ w ] Reliable Multicast
[ w ] Reserved IP Address
[ w ] Residential Gateway
[ w ] Reverse Proxy
[ w ] Round-Robin Scheduling
[ w ] Round-Trip Delay (RTD)
[ w ] Round-Trip Time (RTT)
[ w ]
route
[ w ] Route Poisoning
[ w ] Router
[ w ] Routing
[ w ] Routing Convergence
[ w ] Routing Information Protocol (RIP)
[ w ] Routing Loop
[ w ] Routing Protocol
[ w ] Routing Table
[ w ] Secure Network Programming
[ w ] Session
[ w ] Sink
[ w ] Slashdot Effect
[ w ] Software-Defined Networking (SDN)
[ w ] Software-Defined Wide Area Network (SD-WAN)
[ w ] Split-Horizon Route Advertisement
[ w ] Spoofing Attack
[ w ] Static Routing
[ w ] Statistical Multiplexing
[ w ] Store and Forward
[ w ] Submarine Branchine Unit
[ w ] Submarine Communications Cable
[ w ] submarine communications cables
[ w ] Subnet
[ w ] Switch
[ w ] Syncword
[ w ] TAT-8
[ w ] Telecommunications Circuit
[ w ] Telecommunications Network
[ w ] Telegrapher’s Equations
[ w ] Telephone Network
[ w ] Throughput
[ w ] Tiered Service
[ w ] Trans Atlantic Telecommunications Cable
[ w ] Trans Atlantic Telegraph Cable
[ w ] Transmission Control Protocol (TCP)
[ w ] Transmission Delay
[ w ] Transmit Diversity
[ w ] Transport Layer
[ w ] Trunking
[ w ] Tunneling Protocol
[ w ] Twisted Pair
[ w ] User Datagram Protocol (UDP)
[ w ] Vehicular Ad Hoc Network (VANET)
[ w ] Virtual Circuit
[ w ] Virtual Link Trunking (VLT)
[ w ] Wide Area Network (WAN)
[ w ] Wireless Ad Hoc Network (WANET)
[ w ] Interactive Connectivity Establishment (ICE)
[ w ] Network Address Translation (NAT)
RFC 1631
RFC 2663
RFC 4787
[ w ] Quick UDP Internet Connections (QUIC)
[ w ] Real-Time Transport Protocol (RTP)
[ w ] RTP Control Protocol (RTCP)
RFC 3550
[ w ] Secure Real-Time Transport Protocol (SRTP)
[ w ] Session Initiation Protocol (SIP)
[ w ] Session Traversal Utilities for NAT (STUN)
RFC 3489
RFC 5389
[ Apple Platform Security ] FaceTime security
[ w ] Maximum Segment Size (MSS) [ cloudflare ]
[ w ] Maximum Transmission Unit (MTU) [ cloudflare ]
AXT Alien Crosstalk
ADC Analog-to-Digital Converter w
Bandwidth
BER Bit Error Rate
Bluetooth 5.0, 5.1, 5.2
BLE Bluetooth Low Energy
Bonjour
BGP Border Gateway Protocol
CMP Communications Multipurpose Plenum
CMR Communications Multipurpose Riser
Crosstalk
CRC Cyclic Redundancy Check
DAC Digital-to-Analog Converter w
DNS Domain Name System
DHCP Dynamic Host Configuration Protocol
DNS Sinkhole w
EMI Electromagnetic Interference
ELFEXT Equal Level FEXT
Ethernet
FEXT Far-End Crosstalk
FCS Frame Check Sequence
Gain w
Higher-Order Modulation (1024-QAM)
Hosts File w
IF Intermediate Frequency w
IP Internet Protocol
ISP Internet Service Provider
LAN Local Area Network (e.g., home or small business)
LTE Long Term Evolution
MCS Modulation and Coding Scheme
MU-MIMO Multi-User Multi-Input Multi-Output
mDNS Multicast DNS
NEXT Near-End Crosstalk [dB per foot]
NFC Near Field Communication
NAS Network-Attached Storage Synology w
Nyquist Frequency w
Nyquist-Shannon Sampling Theorem w
OFDMA Orthogonal Frequency-Division Multiple Access
PCI Peripheral Component Interconnect w
PAN Personal Area Network (e.g., Mobile Hotspot)
Personal Cloud w
PVC Polyvinyl Chloride
PSNEXT Power Sum NEXT
QoS Quality of Service
RF Radio Frequency
RSSI Received Signal Strength Indicator w
Receiver
RFID
RJ Registered Jack
RPS Redundant Power Supply
Sampling w
Shannon-Hartley Theorem w
STP Shielded Twisted Pair
SNR Signal-to-Noise Ratio
SFP Small Form-Factor Pluggable w
SDN Software-Defined Networking
SAN Storage-Area Network w
TCP/IP (IP Suite)
Throughput
Transceiver
TCP Transmission Control Protocol
Transmitter
TWT Target Wake Time
Ultra Wideband
UPS Uninterruptible Power Supply w
UPnP Universal Plug and Play
USB Universal Serial Bus w
UDP User Datagram Protocol
UTP Unshielded Twisted Pair
VLAN Virtual LAN
WAN Wide Area Network (e.g., the Internet)
WAN Failover
WiFi Wireless Fidelity
WiFi 6 (802.11ax)
WiFi 6E
WPA WiFi Protected Access
WSN Wireless Sensor Network w
Z-Wave
Zero-Configuration Networking
Zigbee
Notes#
Hub - a physical layer (layer 1) device that allows for connections from many computers at once
each device connected to a hub communicates with every other hub-connected device simultaneously, which generates a lot of noise and a collision domain
each hub-connected device must determine whether incoming traffic is meant for it
Collision Domain - a network segment where only one device can communicate at a time
if multiple systems attempt to send data at the same time then the electrical pulses sent across the cable can interfere with each other, which slows down network communication
Switch (“switching hub”) - a data link layer (layer 2) device which allows for intra-LAN communication
a switch inspect ethernet data to determine which computer to forward it to
benefits: reduces/eliminates collision domain; decreases retransmission; increases throughput
Router - a network layer (layer 3) device which allows for inter-LAN communication
switches connect computers within a single network whereas routers connect computers across networks
a router inspects IP data to determine where to forward it
a routing table contains information about how to route traffic