IPv4 Addressing | Teleinf Edu
Classful addressing, subnetting, Variable Length Subnet Masking (VLSM), and CIDR.
2 min
Routing, transport, and application-layer behavior in modern packet networks.
Articles: 165
Classful addressing, subnetting, Variable Length Subnet Masking (VLSM), and CIDR.
2 min
The 128-bit addressing scheme, notation, special addresses, and address shortening.
2 min
Analysis of the fields in an IPv4 packet header, including fragmentation and TTL.
2 min
The streamlined header structure of IPv6.
2 min
Dividing IP networks into smaller subnetworks for efficient address allocation.
4 min
Variable Length Subnet Masking and Classless Inter-Domain Routing techniques.
4 min
RFC 1918 private IP ranges, reserved addresses, and special-use addresses.
4 min
Network Address Translation and Port Address Translation for private networks.
4 min
Migration strategies: dual stack, tunneling, and translation mechanisms.
4 min
How large IP packets are divided and reassembled across different MTU sizes.
4 min
Error reporting and diagnostic messages in IP networks (ping, traceroute).
4 min
Mapping IP addresses to MAC addresses in local networks.
4 min
Running IPv4 and IPv6 simultaneously on the same network infrastructure.
4 min
Tunneling IPv6 traffic over IPv4 networks and vice versa.
4 min
Summarizing multiple routes to reduce routing table size and improve efficiency.
4 min
Mobile IP protocols enabling devices to maintain connectivity while moving.
4 min
ICMPv6-based protocol replacing ARP for address resolution in IPv6 networks.
4 min
Automatic IPv6 address configuration without DHCP servers.
4 min
Static vs. dynamic routing, autonomous systems, routing policies, and metrics.
4 min
Distance vector, link state, and path vector routing algorithm principles.
2 min
Manual route configuration, default routes, and administrative distances.
2 min
A simple distance-vector IGP based on hop count.
2 min
Improvements in RIPv2: VLSM support, authentication, and multicast updates.
2 min
A complex link-state IGP with hierarchical areas and LSA types.
4 min
OSPF area types, LSA flooding, and hierarchical network design.
4 min
Cisco's proprietary distance-vector (IGRP) and hybrid (EIGRP) protocols.
4 min
The path-vector EGP that powers the Internet, based on path attributes and policies.
2 min
AS_PATH, NEXT_HOP, LOCAL_PREF, and other BGP decision-making attributes.
2 min
Route filtering, redistribution, and policy-based routing implementation.
2 min
PIM-SM, PIM-DM, and IGMP for efficient one-to-many communication.
2 min
From classic 10Mbps to modern 100Gbps Ethernet and beyond.
2 min
Detailed breakdown of the fields in an Ethernet frame (Preamble, MAC Addresses, FCS).
2 min
The 48-bit physical address used for local network communication.
2 min
Legacy network devices operating at the physical layer, collision domains, and half-duplex operation.
2 min
The Carrier Sense Multiple Access with Collision Detection media access method.
2 min
How Ethernet switches learn MAC addresses and forward frames in modern networks.
2 min
Virtual LANs: creating logical network segments and VLAN tagging protocols.
2 min
Preventing loops in switched networks with STP, RSTP, and MSTP.
2 min
Metro Ethernet services, service level agreements, and carrier-grade features.
2 min
Cat5, Cat6, Cat6a specifications, fiber optic cables, and physical layer requirements.
2 min
Simultaneous bidirectional communication eliminating collision detection needs.
4 min
Automatic speed and duplex configuration between network devices.
2 min
Bundling multiple physical links for increased bandwidth and redundancy.
2 min
Link Aggregation Control Protocol for dynamic link bundling management.
2 min
Error detection, flow control, and medium access control at Layer 2.
2 min
High-Level Data Link Control frame structure, commands, and operation modes.
2 min
PPP frame format, authentication methods, and network control protocols.
2 min
Packet-switched WAN technology with virtual circuits and congestion control.
2 min
LLC, LAPB, LAPD and other data link control mechanisms.
2 min
IEEE 802.2 standard providing interface between MAC layer and network protocols.
2 min
Spanning Tree Protocol messages and bridge communication mechanisms.
2 min
IEEE 802.1AB protocol for network topology discovery and device information exchange.
2 min
802.1X authentication, MAC address security, and Layer 2 protection mechanisms.
2 min
Managing data transmission rate between sender and receiver at Layer 2.
2 min
Go-Back-N and Selective Repeat protocols for reliable data transmission.
2 min
Simple acknowledgment-based flow control mechanism with timeout and retransmission.
2 min
Introduction to Multi-Protocol Label Switching and its advantages over traditional IP routing.
2 min
How Forwarding Equivalence Classes (FECs), labels, and Label Switched Paths (LSPs) work.
2 min
Layer 3 VPNs using MPLS: VRF, RD, RT, and PE-CE routing.
2 min
Constraint-based routing and explicit path setup for optimal resource utilization.
2 min
Extending MPLS to optical and other switching technologies.
2 min
Virtual Private Networks using IPsec: AH, ESP, and tunnel protocols.
2 min
Secure Sockets Layer and Transport Layer Security protocols for encrypted communications.
2 min
Packet filtering, stateful inspection, and next-generation firewall features.
2 min
Intrusion Detection Systems and Intrusion Prevention Systems for network security.
2 min
802.1X authentication, RADIUS, and network admission control systems.
2 min
WEP, WPA, WPA2, WPA3, and enterprise wireless security protocols.
2 min
SNMP, NetFlow, and other network monitoring and analysis tools.
2 min
Virtual Private Network technologies: SSL VPN, L2TP, PPTP, and WireGuard.
2 min
802.1X, EAP, RADIUS, TACACS+, and other network authentication protocols.
2 min
Distributed Denial of Service attack mitigation and protection strategies.
2 min
Encryption algorithms, key management, and secure communication protocols.
2 min
Public Key Infrastructure, digital certificates, and certificate authorities.
2 min
Network traffic analysis, digital evidence collection, and incident investigation.
2 min
Security Information and Event Management systems for threat detection.
2 min
Zero trust security model, microsegmentation, and identity-based access control.
2 min
Network isolation, VLANs, microsegmentation, and security zones.
2 min
Network vulnerability scanning, assessment tools, and security evaluation.
2 min
Network penetration testing methodologies, tools, and ethical hacking techniques.
2 min
Security policy development, governance, and compliance frameworks.
2 min
Security architecture, defense in depth, and secure network design principles.
2 min
Well-known, registered, and dynamic ports; ephemeral allocation and demultiplexing logic.
2 min
The ones complement method for error detection in transport and network layers.
3 min
Reliable, connection-oriented transport: header, 3-way handshake, flags, and flow control.
3 min
Detailed analysis of TCP header fields: sequence/ack numbers, flags, window, checksum, MSS, and options.
3 min
The full TCP finite state machine: LISTEN, SYN-SENT, ESTABLISHED, FIN-WAIT, CLOSE-WAIT, LAST-ACK, TIME-WAIT transitions.
3 min
Sliding window mechanism and flow control in TCP connections.
3 min
Slow start, congestion avoidance, and fast recovery algorithms.
3 min
Fast retransmit, fast recovery, duplicate ACK logic, and selective acknowledgments (SACK).
3 min
Role of RTO, RTT estimation (Jacobson/Karels), keep-alive, persistence, and TIME-WAIT timer.
3 min
Operational extensions: MSS, Window Scale, Timestamps, SACK Permitted, Selective ACK, Fast Open.
3 min
Mitigations against SYN flood, RST injection, sequence prediction attacks; SYN cookies and best practices.
3 min
Connectionless, best-effort transport for real-time applications and its simple header.
3 min
Understanding length, source/destination ports, checksum, and pseudo-header usage.
3 min
Real-time applications using UDP: streaming, gaming, and VoIP.
3 min
Network programming interfaces and socket APIs for TCP and UDP.
3 min
Configurable behaviors via setsockopt: timeouts, buffers, KEEPALIVE, NODELAY, and broadcast.
3 min
Multi-streaming transport protocol combining TCP and UDP features.
3 min
Quick UDP Internet Connections: Google's low-latency transport protocol.
3 min
The protocol of the World Wide Web for requesting and serving web pages.
3 min
The two most dominant application models that have shaped the internet and distributed systems are the Client-Server model and the Peer-to-Peer (P2P) model.
2 min
Hierarchical system for translating human-readable domain names to IP addresses.
3 min
Different types of DNS records and their purpose.
3 min
Cryptographic Authentication for DNS Queries and Responses
3 min
Automatic assignment of IP addresses and other network parameters to hosts.
4 min
Additional configuration options for DHCP.
4 min
Dynamic Host Configuration Protocol for IPv6 networks.
3 min
How email works: SMTP for sending, POP and IMAP for receiving.
3 min
Email transmission protocol: commands, responses, and security extensions.
4 min
Email retrieval protocol for downloading messages from mail servers.
2 min
Advanced email protocol for managing messages on the server side.
3 min
Classic protocol for transferring files between client and server.
4 min
Active vs Passive FTP modes and their networking implications.
4 min
Secure file transfer via SSH with encryption and authentication.
4 min
Synchronization of time in computer systems operating over packet-switched, variable-latency data networks.
3 min
Monitoring and management of network devices using MIB and OID.
4 min
Remote terminal access protocol and its security limitations.
2 min
Secure remote access and file transfer with public key authentication.
3 min
Quality of Service (QoS) is the ability of a network to provide better or special service to selected network traffic over various technologies.
3 min
GET, POST, PUT, DELETE and other HTTP request methods and their usage.
3 min
Request and response headers: Content-Type, Authorization, Cache-Control.
3 min
HTTP Secure: SSL/TLS encryption for web communications.
3 min
Binary framing, multiplexing, and server push in HTTP/2.
2 min
HTTP over QUIC: the next generation of web protocols.
3 min
Full-duplex communication over a single TCP connection for web applications.
3 min
Representational State Transfer architecture and API design principles.
3 min
Session management and user tracking with HTTP cookies and security.
3 min
QoS Metrics are specific, measurable parameters used to describe the characteristics of a network's behavior from the perspective of data transmission.
3 min
QoS Models are the architectures of Quality of Service: Best-Effort, Integrated Services (IntServ), and Differentiated Services (DiffServ).
3 min
DSCP marking and per-hop behavior for scalable QoS implementation.
3 min
Resource reservation with RSVP for guaranteed service quality.
3 min
FIFO, Priority, Weighted Fair Queuing, and active queue management.
3 min
Traffic Shaping is a proactive QoS mechanism designed to regulate the flow of network traffic.
3 min
Network-wide congestion avoidance and management strategies.
3 min
Introduction to Compression
2 min
Lossless vs. Lossy Compression
2 min
Information Theory
2 min
Measuring information content and data redundancy in digital communications.
2 min
How to measure compression effectiveness and quality trade-offs.
2 min
Teoretyczne podstawy kompresji danych i algorytmicznej teorii informacji.
2 min
Theoretical limits and practical considerations for data compression.
2 min
Lossless algorithms: Huffman coding, LZW, and RLE.
2 min
Methods that achieve high compression by discarding less important information: Transform (DCT), Predictive, and Fractal coding.
2 min
Optimal prefix-free coding algorithm for lossless data compression.
2 min
Advanced entropy coding technique achieving near-optimal compression ratios.
2 min
Dictionary-based compression used in GIF images and Unix compress.
2 min
Simple compression technique for data with many consecutive repeated values.
2 min
LZ77, LZ78 and modern variants like DEFLATE and LZ4.
2 min
The Burrows-Wheeler Transform is a fully reversible algorithm that rearranges the characters in a block of data. It does not compress the data itself but permutes it in such a way that characters with similar contexts are grouped together, making the output highly amenable to other compression algorithms like RLE and entropy coding.
2 min
A closer look at popular image formats and their compression techniques: JPEG and GIF.
2 min
The magic behind video files: inter-frame and intra-frame compression in standards like MPEG and M-JPEG.
2 min
Perceptual audio coding techniques used in MP3, AAC, and other audio formats.
2 min
Lossy compression based on DCT for photographic images with quality control.
2 min
Lossless image compression format with support for transparency using the DEFLATE algorithm.
2 min
Audio compression based on psychoacoustic model achieving a compression ratio of 10:1.
2 min
Advanced video coding standard with motion compensation and prediction.
2 min
High Efficiency Video Coding with improved compression over H.264.
2 min
High Efficiency Video Coding with improved compression over H.264.
2 min
Techniques for compressing web content to reduce data transfer size and improve performance.
2 min
Database compression techniques for efficient data storage and performance improvement.
2 min
Header compression techniques in protocols such as IPv6, TCP, and VoIP.
2 min
Transparent compression in modern file systems such as NTFS, ZFS, and Btrfs.
2 min
Strategies deduplication and compression in distributed storage systems.
2 min
Compression with low latency for live video streaming and real-time communication.
2 min
Compression techniques for high-ratio storage of long-term data and backup systems.
2 min