Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer networks
- Network construction
- Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
E-book details
Log in, If you're interested in the contents of the item.
Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
Libor Dost?É?íÂ!°lek, Alena Kabelov?É?íÂ!°, CP Books a.s.
Ebook
This book covers in detail the Open System Interconnection (OSI) reference model and the TCP/IP protocols that operate that different layers. Its coverage includes various application protocols. The authors explain in an easy-to-read style networking concepts and protocols, with examples that make the book a practical guide in addition to its coverage of theory.
- Understanding TCP/IP
- Table of Contents
- Understanding TCP/IP
- Credits
- About the Authors
- Acknowledgements
- Preface
- What This Book Covers
- What You Need for This Book
- Conventions
- Reader Feedback
- Customer Support
- Errata
- Questions
- 1. Introduction to Network Protocols
- 1.1 ISO OSI
- 1.1.1 Physical Layer
- 1.1.2 Data Link Layer
- 1.1.3 Network Layer
- 1.1.4 Transport Layer
- 1.1.5 Session Layer
- 1.1.6 Presentation Layer
- 1.1.7 Application Layer
- 1.2 TCP/IP
- 1.2.1 Internet Protocol
- 1.2.2 TCP and UDP
- 1.2.3 Application Protocols
- 1.3 Methods of Information Transmission
- 1.3.1 Synchronous Transmission
- 1.3.2 Packet Transmission
- 1.3.3 Asynchronous Transmission
- 1.4 Virtual Circuit
- 1.1 ISO OSI
- 2. Network Monitoring Tools
- 2.1 Packet Drivers
- 2.2 MS Network Monitor
- 2.2.1 Frame Capturing
- 2.2.2 Viewing Captured Frames
- 2.2.3 Filters for Displaying Captured Frames
- 2.3 Ethereal
- 2.4 Homework
- 3. Physical Layer
- 3.1 Serial Line
- 3.1.1 Serial and Parallel Data Transport
- 3.1.2 Symmetrical and Asymmetrical Signals
- 3.1.3 Synchronous and Asynchronous Transport
- 3.1.4 V.24, V.35, and X.21 Protocols
- 3.1.5 Null Modem
- 3.2 Modems
- 3.2.1 Dial-Up Connection
- 3.2.2 Leased Lines
- 3.2.3 Automatic Modem
- 3.2.3.1 AT Commands
- 3.2.4 Synchronous Transmission
- 3.2.5 Baseband, Voice Band, and ADSL
- 3.2.6 Transmission Rate
- 3.2.6.1 The V.90 Recommendation
- 3.2.7 Data Compression
- 3.2.8 Error Detection
- 3.3 Digital Circuits
- 3.3.1 ISDN
- 3.3.1.1 Basic Rate
- 3.3.1.2 Higher Layer Protocols and Signalization
- 3.3.2 E and T Lines
- 3.3.1 ISDN
- 3.4 LAN
- 3.4.1 Structured Cables
- 3.4.1.1 Copper Distribution
- 3.4.1.2 Optical Fibers
- 3.4.2 Ethernet (10 Mbps)
- 3.4.2.1 AUI
- 3.4.2.2 BNC
- 3.4.2.3 Twisted-Pair
- Optical Fiber
- 3.4.3 Fast Ethernet (100 Mbps)
- 3.4.4 Gigabyte Ethernet (1 Gbps)
- 3.4.1 Structured Cables
- 3.1 Serial Line
- 4. Link Layer
- 4.1 Serial Line Internet Protocol
- 4.2 Compressed SLIP
- 4.3 High-Level Data Link Control Protocol
- 4.3.1 Flag
- 4.3.2 Address Field
- 4.3.3 Control Field
- 4.3.3.1 I-Frame
- 4.3.3.2 S-Frame
- 4.3.3.3 U-Frame
- 4.3.4 Data Field and a Transferred Protocol Type
- 4.3.5 Checksum
- 4.3.6 HDLC Protocol Summary
- 4.4 Point-To-Point Protocol
- 4.4.1 Dialing a Phone Line
- 4.4.2 Link Control Protocol
- 4.4.3 Authentication
- 4.4.3.1 Password Authentication Protocol
- 4.4.3.2 Challenge Handshake Authentication Protocols
- 4.4.3.3 Extensible Authentication Protocol
- 4.4.3.4 Radius Protocol
- 4.4.4 Call-Back Control Protocol
- 4.4.5 Other Protocols
- 4.4.5.1 Multilink Protocol
- 4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
- 4.4.5.3 Compression Control Protocol
- 4.4.5.4 Encryption Control Protocol
- 4.4.5.5 Setting Encryption Keys
- 4.4.6 Internet Protocol Control Protocol
- 4.5 Frame Relay
- 4.5.1 A Frame Relay Protocol Frame
- 4.5.2 IP Through Frame Relay
- 4.5.3 Local Management Interface
- 4.5.4 Frame Relay Configuration on CISCO Routers
- 4.5.5 Frame Relay Protocol
- 4.6 Local Area Networks
- 4.6.1 Ethernet
- 4.7 Wireless Local Area Network
- 4.7.1 Typical WLAN Configuration
- 4.7.1.1 Peer-To-Peer Networks
- 4.7.1.2 Access Point
- 4.7.1.3 Roaming (Several Access Points)
- 4.7.1.4 Backbone Point-to-Point Connection
- 4.7.2 Antennas
- 4.7.3 Security of WLAN
- 4.7.3.1 Service Set ID
- 4.7.3.2 Wired Equivalent Privacy
- 4.7.3.3 IEEE 802.1X
- 4.7.1 Typical WLAN Configuration
- 4.8 Fixed Wireless Access
- 4.8.1 The Differences Between FWA and WLAN
- 4.8.2 The Main Benefits of FWA
- 5. Internet Protocol
- 5.1 IP Datagram
- 5.2. Internet Control Message Protocol
- 5.2.1 Echo
- 5.2.2 Destination Unreachable
- 5.2.3 Source Quench (Lower Sending Speed)
- 5.2.4 Redirect
- 5.2.5 ICMP Router Discovery
- 5.2.6 Time Exceeded
- 5.2.7 Subnet Address Mask Request
- 5.2.8 Time Synchronization
- 5.3 Fragmentation
- 5.4 Optional Entries in the IP Header
- 5.4.1 Record Route
- 5.4.2 Timestamp
- 5.4.3 Source Routing
- 5.4.4 IP Router Alert Option
- 5.5 ARP and RARP Protocols
- 5.5.1 ARP Filtering
- 5.5.2 Proxy ARP
- 5.5.3 Reverse ARP
- 5.6 Internet Group Management Protocol
- 5.7 Multicast and Link Protocol
- 6. IP Address
- 6.1 Network: First Period of History
- 6.1.1 Special-Use IP Addresses
- 6.1.2 Network Mask
- 6.2 Network: Second Period of History
- 6.2.1 Subnetworks
- 6.2.2 Super-Networks and Autonomous Systems
- 6.3 IP Addresses in the Intranet and Special-Use IP Addresses
- 6.4 Unnumbered Interface
- 6.4.1 Dynamic Address Assignment
- 6.5 Address Plan
- 6.6 Over 254 Interfaces in a LAN
- 6.1 Network: First Period of History
- 7. Routing
- 7.1 Forwarding and Screening
- 7.2 Routing
- 7.2.1 Processing
- 7.3 Handling Routing Tables
- 7.3.1 List of Contents of a Routing Table in a Command Prompt
- 7.3.1.1 Contents of a Routing Table in UNIX
- 7.3.2 Routing Table Listing in Windows 2000/XP/2003
- 7.3.3 Contents of a Routing Table in Cisco Routers
- 7.3.4 Routing Table Entry Addition and Removal
- 7.3.1 List of Contents of a Routing Table in a Command Prompt
- 7.4 Routing Protocols
- 7.4.1 Routing Vector Protocols
- 7.4.1.1 RVP Principle
- 7.4.1.2 RIP and RIP2
- 7.4.2 Link State Protocols
- 7.4.2.1 OSPF
- 7.4.3 IPG and EGP
- 7.4.4 Aggregation
- 7.4.5 Redistribution
- 7.4.1 Routing Vector Protocols
- 7.5 Neutral Exchange Point
- 8. IP Version 6
- 8.1 Next Headers of IP Version 6 Datagram
- 8.1.1 Hop-By-Hop Options
- 8.1.2 Routing Header
- 8.1.3 Fragment Header
- 8.1.4 Authentication Header
- 8.1.5 Encapsulating Security Payload Header
- 8.2 ICMP Version 6 Protocol
- 8.2.1 Address Resolution
- 8.2.2 Router Discovery
- 8.2.3 Redirect
- 8.3. IP Addresses
- 8.3.1 Types of Address Inscription
- 8.3.2 Multicasts
- 8.3.3 Unicasts
- 8.4 Windows 2003
- 8.1 Next Headers of IP Version 6 Datagram
- 9. Transmission Control Protocol
- 9.1 TCP Segments
- 9.2 TCP Header Options
- 9.3 Establishing and Terminating a Connection with TCP
- 9.3.1 Establishing a Connection
- 9.3.2 Terminating a Connection
- 9.3.3 Aborting a Connection
- 9.4 Determining the Connection State
- 9.5 Response Delay Techniques
- 9.6 Window Technique
- 9.7 Network Congestion
- 9.7.1 Slow Start
- 9.7.2 Congestion Avoidance
- 9.7.3 Segment Loss
- 9.8 The Window Scale Factor
- 10. User Datagram Protocol
- 10.1 Fragmentation
- 10.2 Broadcasts and Multicasts
- 11. Domain Name System
- 11.1 Domains and Subdomains
- 11.2 Name Syntax
- 11.3 Reverse Domains
- 11.4 Resource Records
- 11.5 DNS Protocol
- 11.6 DNS Query
- 11.6.1 DNS Query Packet Format
- 11.6.2 DNS Query Packet Header
- 11.6.3 Question Section
- 11.6.4 The Answer Section, Authoritative Servers, and Additional Information
- 12. Telnet
- 12.1 The NVT Protocol
- 12.2 Telnet Protocol Commands
- 12.2.1 Signal for Synchronization
- 12.2.2 The Telnet Command Line
- 12.2.3 Communication Modes
- 12.3 Example of Windows NT Client Communication
- 12.4 Example of UNIX Client Communication
- 13. File Transfer Protocol
- 13.1 Architecture
- 13.2 Active Mode of FTP Protocol Communication
- 13.3 Passive Mode of FTP Protocol Communication
- 13.4 FTP Commands
- 13.5 Proxy
- 13.6 Return Codes
- 13.7 Abnormal Termination of Data Transfer
- 13.8 Anonymous FTP
- 14. Hypertext Transfer Protocol
- 14.1 Client-Server
- 14.2 Proxy
- 14.3 Gateway
- 14.4 Tunnel
- 14.5 More Intermediate Nodes
- 14.6 Uniform Resource Identifier
- 14.6.1 The http Scheme
- 14.6.2 The ftp Scheme
- 14.6.3 The mailto Scheme
- 14.6.4 The nntp Scheme
- 14.6.5 The telnet Scheme
- 14.6.6 The file Scheme
- 14.6.7 The pop Scheme
- 14.7 Relative URI
- 14.8 The HTTP Request
- 14.8.1 The GET Method
- 14.8.2 The POST Method
- 14.8.3 The HEAD Method
- 14.8.4 The TRACE Method
- 14.8.5 The OPTIONS Method
- 14.9 The HTTP Response
- 14.9.1 An Overview of Result Codes
- 14.10 Other Header Fields
- 14.10.1 Accept Header Field
- 14.10.2 Client Authentication
- 14.10.3 Proxy Authentication
- 14.10.4 Content Header Field
- 14.10.5 Redirection and Temporary Unavailability of Objects
- 14.10.6 Cache
- 14.10.7 Software Information
- 14.11 Cookie
- 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
- 14.11.1.1 Cookie Header Field
- 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
- 15. Email
- 15.1 Email Architecture
- 15.1.1 DNS and Email
- 15.2 Mail Message Format
- 15.2.1 Basic Header Fields
- 15.3 MIME
- 15.3.1 MIME Header Fields
- 15.3.1.1 MIME-Version
- 15.3.1.2 Content-Type
- 15.3.1.3 Content-Transfer-Encoding
- 15.3.1.4 Content-Disposition
- 15.3.2 Standard Encoding Mechanisms
- 15.3.2.1 Quoted-Printable
- 15.3.2.2 Base64
- 15.3.3 Non-ASCII Text in Message Header Fields
- 15.3.4 Discrete Media Types in Content-Type
- 15.3.4.1 text
- 15.3.4.2 application
- 15.3.4.3 image
- 15.3.4.4 audio
- 15.3.4.5 video
- 15.3.4.6 model
- 15.3.5 Composite Media Types in Content-Type
- 15.3.5.1 multipart
- 15.3.5.2 message
- 15.3.1 MIME Header Fields
- 15.4 SMTP
- 15.5 ESMTP
- VERB
- 8BITMIME
- SIZE
- ETRN
- 15.5.1 Message Delivery Receipt
- 15.5.1.1 Delivery Status Notification
- 15.5.1.2 The Disposition-Notification-To Header Field
- 15.6 POP3
- 15.7 IMAP4
- 15.7.1 Unauthenticated State
- 15.7.1.1 LOGIN
- 15.7.1.2 AUTHENTICATE
- 15.7.2 Authenticated State
- 15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
- 15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
- 15.7.2.3 STATUS
- 15.7.2.4 SELECT and EXAMINE Commands
- 15.7.3 Open Mailbox
- 15.7.3.1 COPY
- 15.7.3.2 SEARCH
- 15.7.3.3 FETCH
- 15.7.3.4 STORE
- 15.7.3.5 EXPUNGE
- 15.7.3.6 CLOSE
- 15.8 Mailing Lists
- 15.7.1 Unauthenticated State
- 15.1 Email Architecture
- 16. Forums
- 16.1 Message Format
- 16.2 NNTP Protocol
- 16.2.1 End User Communication
- 16.2.2 Communication Among Servers
- 16.2.3 Session Termination
- 17. Lightweight Directory Access Protocol
- 17.1 Protocol Principle
- 17.2 Data Model of LDAP Directory
- 17.3 LDAP Protocol Data Units
- 17.3.1 The Search Operation
- 17.3.1.1 Filters
- 17.3.2 Further Operations with Entries
- 17.3.2.1 The Add Operation
- 17.3.2.2 The Modify Operation
- 17.3.2.3 The Delete Operation
- 17.3.2.4 The Modify DN Operation
- 17.3.2.5 The Compare Operation
- 17.3.1 The Search Operation
- 17.4 Server Programs
- 17.5 Client Programs
- 17.5.1 The LDAP Browser
- 17.5.2 The OpenLDAP Client
- 17.5.3 ADSIedit
- 17.5.4 MS Outlook Express and MS Outlook
- 17.6 Lightweight Directory Interchange Format
- A. CISCO Routers
- A.1 Interface Identification
- A.2 Cables
- A.3 Memory
- A.4 Console
- A.5 Commands
- A.5.1 Non-Privileged Mode
- A.5.2 Privileged mode
- A.6 Configuration
- A.6.1 Setting a Password for Privileged Mode
- A.6.2 Web
- A.6.3 ConfigMaker
- A.7 Debugging
- Index
- Title: Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
- Author: Libor Dost?É?íÂ!°lek, Alena Kabelov?É?íÂ!°, CP Books a.s.
- Original title: Understanding TCP/IP. A clear and comprehensive guide to TCP/IP protocols
- ISBN: 9781847190567, 9781847190567
- Date of issue: 2006-05-11
- Format: Ebook
- Item ID: e_2x3t
- Publisher: Packt Publishing