Details zum E-Book

Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols

Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols

Libor Dost?É?íÂ!°lek, Alena Kabelov?É?íÂ!°, CP Books a.s.

E-book
This book covers in detail the Open System Interconnection (OSI) reference model and the TCP/IP protocols that operate that different layers. Its coverage includes various application protocols. The authors explain in an easy-to-read style networking concepts and protocols, with examples that make the book a practical guide in addition to its coverage of theory.
  • Understanding TCP/IP
    • Table of Contents
    • Understanding TCP/IP
    • Credits
    • About the Authors
    • Acknowledgements
    • Preface
      • What This Book Covers
      • What You Need for This Book
      • Conventions
      • Reader Feedback
      • Customer Support
        • Errata
        • Questions
    • 1. Introduction to Network Protocols
      • 1.1 ISO OSI
        • 1.1.1 Physical Layer
        • 1.1.2 Data Link Layer
        • 1.1.3 Network Layer
        • 1.1.4 Transport Layer
        • 1.1.5 Session Layer
        • 1.1.6 Presentation Layer
        • 1.1.7 Application Layer
      • 1.2 TCP/IP
        • 1.2.1 Internet Protocol
        • 1.2.2 TCP and UDP
        • 1.2.3 Application Protocols
      • 1.3 Methods of Information Transmission
        • 1.3.1 Synchronous Transmission
        • 1.3.2 Packet Transmission
        • 1.3.3 Asynchronous Transmission
      • 1.4 Virtual Circuit
    • 2. Network Monitoring Tools
      • 2.1 Packet Drivers
      • 2.2 MS Network Monitor
        • 2.2.1 Frame Capturing
        • 2.2.2 Viewing Captured Frames
        • 2.2.3 Filters for Displaying Captured Frames
      • 2.3 Ethereal
      • 2.4 Homework
    • 3. Physical Layer
      • 3.1 Serial Line
        • 3.1.1 Serial and Parallel Data Transport
        • 3.1.2 Symmetrical and Asymmetrical Signals
        • 3.1.3 Synchronous and Asynchronous Transport
        • 3.1.4 V.24, V.35, and X.21 Protocols
        • 3.1.5 Null Modem
      • 3.2 Modems
        • 3.2.1 Dial-Up Connection
        • 3.2.2 Leased Lines
        • 3.2.3 Automatic Modem
          • 3.2.3.1 AT Commands
        • 3.2.4 Synchronous Transmission
        • 3.2.5 Baseband, Voice Band, and ADSL
        • 3.2.6 Transmission Rate
          • 3.2.6.1 The V.90 Recommendation
        • 3.2.7 Data Compression
        • 3.2.8 Error Detection
      • 3.3 Digital Circuits
        • 3.3.1 ISDN
          • 3.3.1.1 Basic Rate
          • 3.3.1.2 Higher Layer Protocols and Signalization
        • 3.3.2 E and T Lines
      • 3.4 LAN
        • 3.4.1 Structured Cables
          • 3.4.1.1 Copper Distribution
          • 3.4.1.2 Optical Fibers
        • 3.4.2 Ethernet (10 Mbps)
          • 3.4.2.1 AUI
          • 3.4.2.2 BNC
          • 3.4.2.3 Twisted-Pair
            • Optical Fiber
        • 3.4.3 Fast Ethernet (100 Mbps)
        • 3.4.4 Gigabyte Ethernet (1 Gbps)
    • 4. Link Layer
      • 4.1 Serial Line Internet Protocol
      • 4.2 Compressed SLIP
      • 4.3 High-Level Data Link Control Protocol
        • 4.3.1 Flag
        • 4.3.2 Address Field
        • 4.3.3 Control Field
          • 4.3.3.1 I-Frame
          • 4.3.3.2 S-Frame
          • 4.3.3.3 U-Frame
        • 4.3.4 Data Field and a Transferred Protocol Type
        • 4.3.5 Checksum
        • 4.3.6 HDLC Protocol Summary
      • 4.4 Point-To-Point Protocol
        • 4.4.1 Dialing a Phone Line
        • 4.4.2 Link Control Protocol
        • 4.4.3 Authentication
          • 4.4.3.1 Password Authentication Protocol
          • 4.4.3.2 Challenge Handshake Authentication Protocols
          • 4.4.3.3 Extensible Authentication Protocol
          • 4.4.3.4 Radius Protocol
        • 4.4.4 Call-Back Control Protocol
        • 4.4.5 Other Protocols
          • 4.4.5.1 Multilink Protocol
          • 4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
          • 4.4.5.3 Compression Control Protocol
          • 4.4.5.4 Encryption Control Protocol
          • 4.4.5.5 Setting Encryption Keys
        • 4.4.6 Internet Protocol Control Protocol
      • 4.5 Frame Relay
        • 4.5.1 A Frame Relay Protocol Frame
        • 4.5.2 IP Through Frame Relay
        • 4.5.3 Local Management Interface
        • 4.5.4 Frame Relay Configuration on CISCO Routers
        • 4.5.5 Frame Relay Protocol
      • 4.6 Local Area Networks
        • 4.6.1 Ethernet
      • 4.7 Wireless Local Area Network
        • 4.7.1 Typical WLAN Configuration
          • 4.7.1.1 Peer-To-Peer Networks
          • 4.7.1.2 Access Point
          • 4.7.1.3 Roaming (Several Access Points)
          • 4.7.1.4 Backbone Point-to-Point Connection
        • 4.7.2 Antennas
        • 4.7.3 Security of WLAN
          • 4.7.3.1 Service Set ID
          • 4.7.3.2 Wired Equivalent Privacy
          • 4.7.3.3 IEEE 802.1X
      • 4.8 Fixed Wireless Access
        • 4.8.1 The Differences Between FWA and WLAN
        • 4.8.2 The Main Benefits of FWA
    • 5. Internet Protocol
      • 5.1 IP Datagram
      • 5.2. Internet Control Message Protocol
        • 5.2.1 Echo
        • 5.2.2 Destination Unreachable
        • 5.2.3 Source Quench (Lower Sending Speed)
        • 5.2.4 Redirect
        • 5.2.5 ICMP Router Discovery
        • 5.2.6 Time Exceeded
        • 5.2.7 Subnet Address Mask Request
        • 5.2.8 Time Synchronization
      • 5.3 Fragmentation
      • 5.4 Optional Entries in the IP Header
        • 5.4.1 Record Route
        • 5.4.2 Timestamp
        • 5.4.3 Source Routing
        • 5.4.4 IP Router Alert Option
      • 5.5 ARP and RARP Protocols
        • 5.5.1 ARP Filtering
        • 5.5.2 Proxy ARP
        • 5.5.3 Reverse ARP
      • 5.6 Internet Group Management Protocol
      • 5.7 Multicast and Link Protocol
    • 6. IP Address
      • 6.1 Network: First Period of History
        • 6.1.1 Special-Use IP Addresses
        • 6.1.2 Network Mask
      • 6.2 Network: Second Period of History
        • 6.2.1 Subnetworks
        • 6.2.2 Super-Networks and Autonomous Systems
      • 6.3 IP Addresses in the Intranet and Special-Use IP Addresses
      • 6.4 Unnumbered Interface
        • 6.4.1 Dynamic Address Assignment
      • 6.5 Address Plan
      • 6.6 Over 254 Interfaces in a LAN
    • 7. Routing
      • 7.1 Forwarding and Screening
      • 7.2 Routing
        • 7.2.1 Processing
      • 7.3 Handling Routing Tables
        • 7.3.1 List of Contents of a Routing Table in a Command Prompt
          • 7.3.1.1 Contents of a Routing Table in UNIX
        • 7.3.2 Routing Table Listing in Windows 2000/XP/2003
        • 7.3.3 Contents of a Routing Table in Cisco Routers
        • 7.3.4 Routing Table Entry Addition and Removal
      • 7.4 Routing Protocols
        • 7.4.1 Routing Vector Protocols
          • 7.4.1.1 RVP Principle
          • 7.4.1.2 RIP and RIP2
        • 7.4.2 Link State Protocols
          • 7.4.2.1 OSPF
        • 7.4.3 IPG and EGP
        • 7.4.4 Aggregation
        • 7.4.5 Redistribution
      • 7.5 Neutral Exchange Point
    • 8. IP Version 6
      • 8.1 Next Headers of IP Version 6 Datagram
        • 8.1.1 Hop-By-Hop Options
        • 8.1.2 Routing Header
        • 8.1.3 Fragment Header
        • 8.1.4 Authentication Header
        • 8.1.5 Encapsulating Security Payload Header
      • 8.2 ICMP Version 6 Protocol
        • 8.2.1 Address Resolution
        • 8.2.2 Router Discovery
        • 8.2.3 Redirect
      • 8.3. IP Addresses
        • 8.3.1 Types of Address Inscription
        • 8.3.2 Multicasts
        • 8.3.3 Unicasts
      • 8.4 Windows 2003
    • 9. Transmission Control Protocol
      • 9.1 TCP Segments
      • 9.2 TCP Header Options
      • 9.3 Establishing and Terminating a Connection with TCP
        • 9.3.1 Establishing a Connection
        • 9.3.2 Terminating a Connection
        • 9.3.3 Aborting a Connection
      • 9.4 Determining the Connection State
      • 9.5 Response Delay Techniques
      • 9.6 Window Technique
      • 9.7 Network Congestion
        • 9.7.1 Slow Start
        • 9.7.2 Congestion Avoidance
        • 9.7.3 Segment Loss
      • 9.8 The Window Scale Factor
    • 10. User Datagram Protocol
      • 10.1 Fragmentation
      • 10.2 Broadcasts and Multicasts
    • 11. Domain Name System
      • 11.1 Domains and Subdomains
      • 11.2 Name Syntax
      • 11.3 Reverse Domains
      • 11.4 Resource Records
      • 11.5 DNS Protocol
      • 11.6 DNS Query
        • 11.6.1 DNS Query Packet Format
        • 11.6.2 DNS Query Packet Header
        • 11.6.3 Question Section
        • 11.6.4 The Answer Section, Authoritative Servers, and Additional Information
    • 12. Telnet
      • 12.1 The NVT Protocol
      • 12.2 Telnet Protocol Commands
        • 12.2.1 Signal for Synchronization
        • 12.2.2 The Telnet Command Line
        • 12.2.3 Communication Modes
      • 12.3 Example of Windows NT Client Communication
      • 12.4 Example of UNIX Client Communication
    • 13. File Transfer Protocol
      • 13.1 Architecture
      • 13.2 Active Mode of FTP Protocol Communication
      • 13.3 Passive Mode of FTP Protocol Communication
      • 13.4 FTP Commands
      • 13.5 Proxy
      • 13.6 Return Codes
      • 13.7 Abnormal Termination of Data Transfer
      • 13.8 Anonymous FTP
    • 14. Hypertext Transfer Protocol
      • 14.1 Client-Server
      • 14.2 Proxy
      • 14.3 Gateway
      • 14.4 Tunnel
      • 14.5 More Intermediate Nodes
      • 14.6 Uniform Resource Identifier
        • 14.6.1 The http Scheme
        • 14.6.2 The ftp Scheme
        • 14.6.3 The mailto Scheme
        • 14.6.4 The nntp Scheme
        • 14.6.5 The telnet Scheme
        • 14.6.6 The file Scheme
        • 14.6.7 The pop Scheme
      • 14.7 Relative URI
      • 14.8 The HTTP Request
        • 14.8.1 The GET Method
        • 14.8.2 The POST Method
        • 14.8.3 The HEAD Method
        • 14.8.4 The TRACE Method
        • 14.8.5 The OPTIONS Method
      • 14.9 The HTTP Response
        • 14.9.1 An Overview of Result Codes
      • 14.10 Other Header Fields
        • 14.10.1 Accept Header Field
        • 14.10.2 Client Authentication
        • 14.10.3 Proxy Authentication
        • 14.10.4 Content Header Field
        • 14.10.5 Redirection and Temporary Unavailability of Objects
        • 14.10.6 Cache
        • 14.10.7 Software Information
      • 14.11 Cookie
        • 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
          • 14.11.1.1 Cookie Header Field
    • 15. Email
      • 15.1 Email Architecture
        • 15.1.1 DNS and Email
      • 15.2 Mail Message Format
        • 15.2.1 Basic Header Fields
      • 15.3 MIME
        • 15.3.1 MIME Header Fields
          • 15.3.1.1 MIME-Version
          • 15.3.1.2 Content-Type
          • 15.3.1.3 Content-Transfer-Encoding
          • 15.3.1.4 Content-Disposition
        • 15.3.2 Standard Encoding Mechanisms
          • 15.3.2.1 Quoted-Printable
          • 15.3.2.2 Base64
        • 15.3.3 Non-ASCII Text in Message Header Fields
        • 15.3.4 Discrete Media Types in Content-Type
          • 15.3.4.1 text
          • 15.3.4.2 application
          • 15.3.4.3 image
          • 15.3.4.4 audio
          • 15.3.4.5 video
          • 15.3.4.6 model
        • 15.3.5 Composite Media Types in Content-Type
          • 15.3.5.1 multipart
          • 15.3.5.2 message
      • 15.4 SMTP
      • 15.5 ESMTP
        • VERB
        • 8BITMIME
        • SIZE
        • ETRN
        • 15.5.1 Message Delivery Receipt
          • 15.5.1.1 Delivery Status Notification
          • 15.5.1.2 The Disposition-Notification-To Header Field
      • 15.6 POP3
      • 15.7 IMAP4
        • 15.7.1 Unauthenticated State
          • 15.7.1.1 LOGIN
          • 15.7.1.2 AUTHENTICATE
        • 15.7.2 Authenticated State
          • 15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
          • 15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
          • 15.7.2.3 STATUS
          • 15.7.2.4 SELECT and EXAMINE Commands
        • 15.7.3 Open Mailbox
          • 15.7.3.1 COPY
          • 15.7.3.2 SEARCH
          • 15.7.3.3 FETCH
            • 15.7.3.4 STORE
            • 15.7.3.5 EXPUNGE
            • 15.7.3.6 CLOSE
        • 15.8 Mailing Lists
    • 16. Forums
      • 16.1 Message Format
      • 16.2 NNTP Protocol
        • 16.2.1 End User Communication
        • 16.2.2 Communication Among Servers
        • 16.2.3 Session Termination
    • 17. Lightweight Directory Access Protocol
      • 17.1 Protocol Principle
      • 17.2 Data Model of LDAP Directory
      • 17.3 LDAP Protocol Data Units
        • 17.3.1 The Search Operation
          • 17.3.1.1 Filters
        • 17.3.2 Further Operations with Entries
          • 17.3.2.1 The Add Operation
          • 17.3.2.2 The Modify Operation
          • 17.3.2.3 The Delete Operation
          • 17.3.2.4 The Modify DN Operation
          • 17.3.2.5 The Compare Operation
      • 17.4 Server Programs
      • 17.5 Client Programs
        • 17.5.1 The LDAP Browser
        • 17.5.2 The OpenLDAP Client
        • 17.5.3 ADSIedit
        • 17.5.4 MS Outlook Express and MS Outlook
      • 17.6 Lightweight Directory Interchange Format
    • A. CISCO Routers
      • A.1 Interface Identification
      • A.2 Cables
      • A.3 Memory
      • A.4 Console
      • A.5 Commands
        • A.5.1 Non-Privileged Mode
        • A.5.2 Privileged mode
      • A.6 Configuration
        • A.6.1 Setting a Password for Privileged Mode
        • A.6.2 Web
        • A.6.3 ConfigMaker
      • A.7 Debugging
    • Index
  • Titel: Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
  • Autor: Libor Dost?É?íÂ!°lek, Alena Kabelov?É?íÂ!°, CP Books a.s.
  • Originaler Titel: Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
  • ISBN: 9781847190567, 9781847190567
  • Veröffentlichungsdatum: 2006-05-11
  • Format: E-book
  • Artikelkennung: e_2x3t
  • Verleger: Packt Publishing