From the course: Network Forensics

Unlock the full course today

Join today to access over 23,300 courses taught by industry experts.

Protocol analysis

Protocol analysis

- [Instructor] There are two dominate network models in use today. Both of them adopt layered architecture. One is Open Systems Interconnection or OSI, and the other is Transmission Control Protocol/Internet Protocol or TCP/IP. Each layer of these mainstream network models specifies protocols of its own. For instance, the transport layer features two major protocols called TCP and User Datagram Protocol or UDP. TCP is connection-oriented protocol which means that it creates a reliable connection between hosts and ensures that packets arrive in order and free of errors. TCP also retransmits packets if they fail to show up on the other side. For this type of bullet-proof communication to happen, the TCP protocol needs to explicitly establish a connection and break it up. Three-way handshaking is the process TCP adopts. To create a connection, a host sends a synchronized, or SYN segment, in a transport layer header. The receiving side can accept the SYN request by sending a SYN…

Contents