Course 13 - Network Forensics | Episode 5: TCP/IP Layers, Data Flow, and Network Tools
In this lesson, you’ll learn about:
The fundamentals of protocol analysis and how data flows through network layers
The TCP/IP and OSI networking models
Encapsulation and decapsulation processes
Key Layer 3 and Layer 4 protocols
Essential tools for analyzing network traffic, including Wireshark and Nmap
1. Introduction to Protocol Analysis This lesson provides foundational knowledge of how network communications work, focusing on:
The structure and behavior of networking models
How data moves across a network
How to use analysis tools to understand packet content
The lesson contrasts:
The TCP/IP Model (4 layers): Application, Transport, Internet, Network Access
The OSI Model (7 layers), widely used in academic settings for conceptual understanding
2. Data Encapsulation and Flow Encapsulation Explained (“Onion” Model) As data travels down the network stack:
It starts as the original message (the “core” of the onion)
Each layer adds its own headers and sometimes trailers
These layers wrap the message to form a complete network frame
Layer-by-Layer Wrapping
Transport Layer (Layer 4) Adds source/destination ports and TCP flags
Internet Layer (Layer 3) Adds source/destination IP addresses
Network Access Layer Adds MAC addresses and prepares data for physical transmission
At the receiving end, layers are removed one by one (decapsulation) until the message reaches the Application Layer. 3. Key Network Layers and Protocols A. Layer 3 – Internet Layer / IP Layer 3 is responsible for addressing and routing. Core Functions
Identifying devices using unique IP addresses
Adding source/destination IPs to each packet
Determining routing paths across networks
IP Addressing Concepts
IP addresses use 4 octets (8 bits each → 0–255)
Five IP address classes are defined historically
Private IP ranges include:
10.x.x.x
172.16.x.x – 172.31.x.x
192.168.x.x
Subnetting and CIDR
Subnet Mask: Similar to a zip code that defines network boundaries
B. Layer 4 – Transport Layer / TCP & UDP Layer 4 provides end-to-end communication. TCP (Transmission Control Protocol)
Reliable, connection-oriented
Ensures order delivery and handles retransmissions
Uses the three-way handshake: SYN → SYN-ACK → ACK
Session shutdown uses the FIN–ACK process
UDP (User Datagram Protocol)
Lightweight, connectionless
Suitable for quick bursts of data (e.g., streaming, gaming)
Ports and Sockets
Ports = “lanes on a highway” for different services (e.g., port 80 for HTTP)
Sockets combine IP + Port to identify unique connections
Works with both TCP and UDP
4. Protocol Analysis Tools A. Wireshark A powerful packet analysis tool used to inspect and dissect network traffic. Key Features
Captures packets (“network sniffing”)
Allows deep packet inspection
Supports protocol tree view (mapped to OSI layers)
Provides a hex dump showing raw data
Wireshark can even reconstruct data streams and extract file content from packet captures. B. Nmap (Network Mapper) A widely used open-source tool for network discovery and service enumeration. What Nmap Can Identify
Port states (open, closed, filtered)
Operating system fingerprints
Service versions
Network topology
Nmap understands both:
Traditional subnet masks
CIDR notation (e.g., /24, /22)
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy
Course 13 - Network Forensics | Episode 5: TCP/IP Layers, Data Flow, and Network Tools
In this lesson, you’ll learn about:
The fundamentals of protocol analysis and how data flows through network layers
The TCP/IP and OSI networking models
Encapsulation and decapsulation processes
Key Layer 3 and Layer 4 protocols
Essential tools for analyzing network traffic, including Wireshark and Nmap
1. Introduction to Protocol Analysis This lesson provides foundational knowledge of how network communications work, focusing on:
The structure and behavior of networking models
How data moves across a network
How to use analysis tools to understand packet content
The lesson contrasts:
The TCP/IP Model (4 layers): Application, Transport, Internet, Network Access
The OSI Model (7 layers), widely used in academic settings for conceptual understanding
2. Data Encapsulation and Flow Encapsulation Explained (“Onion” Model) As data travels down the network stack:
It starts as the original message (the “core” of the onion)
Each layer adds its own headers and sometimes trailers
These layers wrap the message to form a complete network frame
Layer-by-Layer Wrapping
Transport Layer (Layer 4) Adds source/destination ports and TCP flags
Internet Layer (Layer 3) Adds source/destination IP addresses
Network Access Layer Adds MAC addresses and prepares data for physical transmission
At the receiving end, layers are removed one by one (decapsulation) until the message reaches the Application Layer. 3. Key Network Layers and Protocols A. Layer 3 – Internet Layer / IP Layer 3 is responsible for addressing and routing. Core Functions
Identifying devices using unique IP addresses
Adding source/destination IPs to each packet
Determining routing paths across networks
IP Addressing Concepts
IP addresses use 4 octets (8 bits each → 0–255)
Five IP address classes are defined historically
Private IP ranges include:
10.x.x.x
172.16.x.x – 172.31.x.x
192.168.x.x
Subnetting and CIDR
Subnet Mask: Similar to a zip code that defines network boundaries
B. Layer 4 – Transport Layer / TCP & UDP Layer 4 provides end-to-end communication. TCP (Transmission Control Protocol)
Reliable, connection-oriented
Ensures order delivery and handles retransmissions
Uses the three-way handshake: SYN → SYN-ACK → ACK
Session shutdown uses the FIN–ACK process
UDP (User Datagram Protocol)
Lightweight, connectionless
Suitable for quick bursts of data (e.g., streaming, gaming)
Ports and Sockets
Ports = “lanes on a highway” for different services (e.g., port 80 for HTTP)
Sockets combine IP + Port to identify unique connections
Works with both TCP and UDP
4. Protocol Analysis Tools A. Wireshark A powerful packet analysis tool used to inspect and dissect network traffic. Key Features
Captures packets (“network sniffing”)
Allows deep packet inspection
Supports protocol tree view (mapped to OSI layers)
Provides a hex dump showing raw data
Wireshark can even reconstruct data streams and extract file content from packet captures. B. Nmap (Network Mapper) A widely used open-source tool for network discovery and service enumeration. What Nmap Can Identify
Port states (open, closed, filtered)
Operating system fingerprints
Service versions
Network topology
Nmap understands both:
Traditional subnet masks
CIDR notation (e.g., /24, /22)
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy