1 00:00:00,810 --> 00:00:08,490 To a technical protocols, you need to understand the basics of network, computer and computer networking. 2 00:00:09,030 --> 00:00:16,320 The more you understand how common networks are pooled and functions, the easier it will be to apply 3 00:00:16,320 --> 00:00:21,540 that knowledge to capturing, analyzing and exploiting new protocols. 4 00:00:23,180 --> 00:00:32,080 These course I will introduce basic network concepts you will encounter every day when you, uh, you 5 00:00:32,160 --> 00:00:33,900 are analyzing it through protocols. 6 00:00:34,080 --> 00:00:42,330 I will also lay the groundwork for a way to think about or protocols make it easier to find previously 7 00:00:42,330 --> 00:00:48,870 unknown security usurious during your analysis network architecture and protocols. 8 00:00:50,220 --> 00:00:54,300 And to me, right here, something actually, this is the network. 9 00:00:55,500 --> 00:01:05,090 And we have, for example, uh, Workstation actually tells us. 10 00:01:06,720 --> 00:01:09,030 So this is the work station, for example. 11 00:01:11,220 --> 00:01:12,320 And here. 12 00:01:13,640 --> 00:01:21,650 Um, so let's at uh, one looks at well, left up again here, for example, and. 13 00:01:27,140 --> 00:01:28,760 And workstation here. 14 00:01:37,590 --> 00:01:41,490 And, for example, it's a server again. 15 00:01:43,560 --> 00:01:48,180 This is a server and it's another server. 16 00:01:50,480 --> 00:01:52,010 Here so. 17 00:01:53,150 --> 00:02:02,630 These are the networks, so we will introduce more deeply about them so that this figure shows actually 18 00:02:03,530 --> 00:02:11,240 five nodes connected with a common network, so each node might have a different operating system or 19 00:02:11,240 --> 00:02:17,360 hardware, but as long as each node follows a set of rules or network protocol. 20 00:02:19,790 --> 00:02:20,140 Surely. 21 00:02:22,240 --> 00:02:22,430 Oops! 22 00:02:23,330 --> 00:02:25,240 It's right down here. 23 00:02:26,430 --> 00:02:27,330 OK. 24 00:02:29,490 --> 00:02:32,460 Network protocol, network protocol. 25 00:02:33,950 --> 00:02:34,340 Here. 26 00:02:46,430 --> 00:02:53,840 So, um, but as long as the whole of the set of rules or an extra protocol, it can communicate with 27 00:02:53,840 --> 00:02:57,320 the other nodes on the network, communicate correctly. 28 00:02:57,320 --> 00:03:02,390 All nodes on network must understand the same network protocol. 29 00:03:02,780 --> 00:03:09,110 And it's our protocol serves many functions, including, uh, one or more, for example. 30 00:03:09,440 --> 00:03:12,620 Let's write it down here. 31 00:03:13,280 --> 00:03:14,240 Uh, text. 32 00:03:18,120 --> 00:03:18,430 So that. 33 00:03:22,690 --> 00:03:24,270 So, um, mobs. 34 00:03:29,190 --> 00:03:29,580 So. 35 00:03:31,360 --> 00:03:33,670 Network protocol functions. 36 00:03:34,690 --> 00:03:35,020 Yes. 37 00:03:37,740 --> 00:03:40,080 Network protocol. 38 00:03:41,050 --> 00:03:41,650 Functions. 39 00:03:45,470 --> 00:03:48,080 So what is what network network? 40 00:03:49,760 --> 00:03:56,450 I already told you that network critical serves many functions, including including, for example, 41 00:03:56,660 --> 00:04:05,450 maintaining mean terror and maintaining, uh, maintaining a station, states base stations state. 42 00:04:06,440 --> 00:04:13,770 So now what maintenance assurance that means these protocols typically implement mechanisms to create 43 00:04:13,790 --> 00:04:18,020 new connections and terminate existing connections. 44 00:04:18,780 --> 00:04:24,990 Um, create new connections and terminate. 45 00:04:25,640 --> 00:04:26,930 Actually, can I do like that? 46 00:04:27,470 --> 00:04:30,070 Yes, and terminate it. 47 00:04:31,890 --> 00:04:34,770 Meaning connections here. 48 00:04:35,460 --> 00:04:44,820 So these are the functions of network protocols, and this is also identifying nodes for addressing 49 00:04:45,930 --> 00:04:46,230 what's. 50 00:04:49,140 --> 00:04:50,040 I know it's. 51 00:04:54,950 --> 00:04:59,500 So what Identifying the most for addressing means. 52 00:05:00,680 --> 00:05:04,520 OK, so data must be um. 53 00:05:06,240 --> 00:05:06,750 Troy, this. 54 00:05:10,890 --> 00:05:21,090 Others think so data the main must be addressed threat and transmits it to correct not on a network. 55 00:05:21,450 --> 00:05:29,850 So saying some protocols implement and addressing mechanism to identify specific nodes or group groups, 56 00:05:29,880 --> 00:05:33,360 actually some protocols. 57 00:05:34,780 --> 00:05:42,960 Actually, not some put yes, some protocols implement, implement and addressing mechanism and the 58 00:05:43,020 --> 00:05:45,130 racing mechanism. 59 00:05:47,280 --> 00:05:53,390 Mechanism to identify to widen ify spaces. 60 00:05:54,750 --> 00:06:05,670 Specific UM, nodes or groups of nodes, lots of or nodes, nodes or. 61 00:06:06,630 --> 00:06:10,020 Rural groups of lots. 62 00:06:13,070 --> 00:06:15,860 And here it is. 63 00:06:17,960 --> 00:06:27,560 And if a political serves many function, as you know, one of them is controlling for controlling controlling 64 00:06:28,580 --> 00:06:29,030 flow. 65 00:06:30,610 --> 00:06:38,440 So the amount of data transferred across a network is limited, politicos can implement ways of managing 66 00:06:38,560 --> 00:06:43,120 data flow to increase throttled and reduced latency. 67 00:06:44,170 --> 00:06:51,160 And we have also guaranteeing the order of trance transmitted data. 68 00:06:54,160 --> 00:07:05,020 The order of transmitted data, so many networks do not guarantee that the order in which the data is 69 00:07:05,020 --> 00:07:12,850 sent will match the order in which it's received a protocol can be reorder the data to ensure is delivered 70 00:07:13,120 --> 00:07:14,560 in the correct order. 71 00:07:14,980 --> 00:07:17,140 And we also have detecting. 72 00:07:18,630 --> 00:07:21,660 And correcting or errors? 73 00:07:23,350 --> 00:07:23,890 Errors. 74 00:07:24,930 --> 00:07:30,900 So many networks are not hundred presence, reliable data can be corrupted. 75 00:07:31,230 --> 00:07:36,400 It's important to detect corruption and ideally correct it. 76 00:07:36,990 --> 00:07:44,840 And we have to have lastly formatting, formatting and encoding data. 77 00:07:46,410 --> 00:07:52,290 Data, so the data isn't always in the form of suitable for transmitting on a network. 78 00:07:52,830 --> 00:08:03,990 So a protocol to specify ways of encoding data, such as encoding English text into English text, uh, 79 00:08:04,080 --> 00:08:08,730 into my binary files. 80 00:08:10,580 --> 00:08:11,920 So, um. 81 00:08:13,750 --> 00:08:16,480 We have all seen health protocol suites here. 82 00:08:16,920 --> 00:08:19,240 Let's come here so. 83 00:08:21,570 --> 00:08:26,670 The CPI is the de facto protocol that modern networks use. 84 00:08:31,460 --> 00:08:33,030 He's simply a pea. 85 00:08:34,210 --> 00:08:34,740 So. 86 00:08:37,490 --> 00:08:43,010 These protocols, actually, I'll you you can think of this party IP as a single protocol. 87 00:08:43,430 --> 00:08:48,920 It's actually a combination of two protocols, so that's what this trip means. 88 00:08:50,460 --> 00:08:52,200 And here next. 89 00:08:56,540 --> 00:09:04,920 But here this key IP is, uh, combination is home.