CART

(0) items

Guide to TCP/IP, Second Edition,9780619212421
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Guide to TCP/IP, Second Edition

by
Edition:
2nd
ISBN13:

9780619212421

ISBN10:
061921242X
Format:
Paperback
Pub. Date:
1/16/2004
Publisher(s):
Cengage Learning
List Price: $139.33

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
$135.85

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $0.01

Questions About This Book?

What version or edition is this?
This is the 2nd edition with a publication date of 1/16/2004.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.

Related Products


  • *BNDL SPL CK: GUIDE TO TCP/IP
    *BNDL SPL CK: GUIDE TO TCP/IP
  • Guide to TCP/IP
    Guide to TCP/IP
  • Guide to Tcp/ip
    Guide to Tcp/ip
  • Guide to TCP/IP with New EtherPeek
    Guide to TCP/IP with New EtherPeek




Summary

Learn the concepts, terminology, protocols and services that the Transmission Control Protocol/Internet Protocol (TCP/IP) suite uses to make the Internet work! This book clearly displays and demonstrates TCP/IP capabilities while encouraging readers to interact with the protocols as well as to read and learn about them. It provides both the knowledge and tools would-be network administrators and analysts need to understand what's happening on their networks, and to appreciate that behavior from the perspectives of traffic analysis and characterization, error detection and troubleshooting, security analysis and remedial action, and more.

Table of Contents

Preface xv
Introducing TCP/IP
1(54)
What is TCP/IP?
2(1)
The Origins and History of TCP/IP
2(5)
TCP/IP's Design Goals
2(1)
A TCP/IP Chronology
3(3)
Who ``Owns'' TCP/IP?
6(1)
Meet the Standards Groups that Manage TCP/IP
6(1)
TCP/IP Standards and RFCs
7(1)
OSI Network Reference Model Overview
8(8)
Models Break Networking into Layers
9(1)
The ISO/OSI Network Reference Model
10(1)
How Protocol Layers Behave
11(5)
The TCP/IP Networking Model
16(5)
TCP/IP Network Access Layer
16(1)
TCP/IP Network Access Layer Protocols
17(1)
TCP/IP Internet Layer Functions
18(1)
TCP/IP Internet Layer Protocols
19(1)
TCP/IP Transport Layer Functions
20(1)
TCP/IP Transport Layer Protocols
20(1)
TCP/IP Application Layer
20(1)
TCP/IP Protocols, Services, Sockets, and Ports
21(3)
TCP/IP Protocol Numbers
22(1)
TCP/IP Port Numbers
23(1)
TCP/IP Sockets
24(1)
Data Encapsulation in TCP/IP
24(1)
About Protocol Analysis
25(7)
Useful Roles for Protocol Analysis
25(1)
Protocol Analyzer Elements
26(5)
Placing a Protocol Analyzer on a Network
31(1)
Chapter Summary
32(2)
Key Terms
34(11)
Review Questions
45(4)
Hands-on Projects
49(4)
Case Projects
53(2)
IP Addressing and Related Topics
55(46)
IP Addressing Basics
56(1)
Anatomy of an IP Address
57(1)
IP Address Classes
58(4)
More About Class A Addresses
59(1)
More About Class B Addresses
60(1)
More About Class C Addresses
61(1)
More About Address Classes D and E
62(1)
Network, Broadcast, Multicast, and Other Special IP Addresses
62(4)
Broadcast Packet Structures
63(1)
Multicast Packet and Address Structures
63(3)
The Vanishing IP Address Space
66(2)
Understanding Basic Binary Arithmetic
68(3)
Converting Decimal to Binary
68(1)
Converting Binary to Decimal
69(1)
High-Order Bit Patterns
70(1)
Low-Order Bit Patterns
70(1)
IP Networks, Subnets, and Masks
71(6)
IP Subnets and Supernets
71(6)
Classless Inter-Domain Routing (CIDR)
77(2)
Public Versus Private IP Addresses
79(2)
Managing Access to IP Address Information
81(1)
Obtaining Public IP Addresses
82(1)
IP Addressing Schemes
82(3)
The Network Space
82(2)
The Host Space
84(1)
Chapter Summary
85(1)
Key Terms
86(4)
Review Questions
90(4)
Hands-on Projects
94(3)
Case Projects
97(4)
Data Link and Network Layer TCP/IP Protocols
101(66)
Data Link Protocols
102(5)
The Serial Line Internet Protocol (SLIP)
103(1)
Point-to-Point Protocol (PPP)
104(2)
Special Handling for PPP Links
106(1)
Frame Types
107(11)
Ethernet Frame Types
107(7)
Token Ring Frame Types
114(4)
Hardware Addresses in the IP Environment
118(9)
ARP Packet Fields and Functions
121(3)
ARP Cache
124(2)
Proxy ARP
126(1)
Reverse ARP (RARP)
127(1)
About Internet Protocol (IP)
127(5)
Sending IP Datagrams
128(1)
Route Resolution Process
129(3)
Lifetime of an IP Datagram
132(1)
Fragmentation and Reassembly
133(4)
Service Delivery Options
137(3)
Precedence
137(1)
Type of Service (TOS)
137(2)
Differentiated Services (Diffserv) and Early Congestion Notification (ECN)
139(1)
IP Header Fields and Functions
140(8)
Version Field
140(1)
Header Length Field
140(1)
Type of Service Field
140(2)
New TOS Field Function: Differentiated Services and Congestion Control
142(3)
Total Length Field
145(1)
Identification Field
145(1)
Flags Field
145(1)
Fragment Offset Field
146(1)
Time to Live (TTL) Field
146(1)
Protocol Field
146(1)
Header Checksum Field
147(1)
Source Address Field
147(1)
Destination Address Field
147(1)
Options Fields
148(1)
Chapter Summary
148(2)
Key Terms
150(7)
Review Questions
157(3)
Hands-on Projects
160(5)
Case Projects
165(2)
Internet Control Message Protocol (ICMP)
167(50)
Understanding the Internet Control Message Protocol
168(2)
Overview of RFC 792
168(1)
ICMP's Vital Role on IP Networks
169(1)
Testing and Troubleshooting Sequences for ICMP
170(13)
Connectivity Testing with PING
170(2)
Path Discovery with Traceroute
172(2)
Path Discovery with Pathping
174(1)
Path MTU Discovery with ICMP
174(4)
Routing Sequences for ICMP
178(4)
Security Issues for ICMP
182(1)
ICMP Packet Fields and Functions
183(19)
Constant ICMP Fields
183(4)
The Variable ICMP Structures and Functions
187(15)
Chapter Summary
202(1)
Key Terms
203(3)
Review Questions
206(4)
Hands-on Projects
210(6)
Case Projects
216(1)
Transport Layer TCP/IP Protocols
217(42)
UDP---A Connectionless Transport Layer Protocol
218(6)
Overview of UDP
219(1)
UDP Header Fields and Functions
219(4)
UDP Port Numbers and Processes
223(1)
TCP---A Connection-Oriented Protocol
224(22)
Overview of TCP
225(1)
TCP Startup Connection Process (TCP Handshake)
226(5)
TCP Keep-Alive Process
231(1)
TCP Connection Termination
232(2)
TCP Sequence and Acknowledgment Process
234(2)
TCP Error-Detection and Error-Recovery Process
236(2)
TCP Congestion Control
238(2)
TCP Sliding Window
240(1)
TCP Header Fields and Functions
241(5)
Choosing Between TCP and UDP
246(1)
Chapter Summary
247(1)
Key Terms
248(3)
Review Questions
251(4)
Hands-on Projects
255(2)
Case Projects
257(2)
Basic TCP/IP Services
259(46)
How Application Layer IP Protocols Work and Behave
260(1)
Understanding FTP
261(6)
FTP Elements
262(2)
Sample FTP Communications
264(3)
Understanding Telnet
267(5)
Telnet Elements
268(2)
Sample Telnet Communications
270(2)
Understanding SMTP
272(5)
SMTP Elements
273(2)
Sample SMTP Communications
275(2)
Understanding HTTP
277(6)
HTTP Elements
278(2)
Sample HTTP Communications
280(3)
Other Common IP-based Services
283(5)
Echo
284(1)
Quote of the Day (QOD)
284(1)
Character Generator (Chargen)
284(1)
Whois
285(1)
TFTP
285(1)
Finger
286(1)
Remote Procedure Call (RPC)
286(1)
Simple Network Management Protocol (SNMP)
286(1)
NetBIOS over TCP/IP
287(1)
Decoding Application Layer Protocols
288(2)
Chapter Summary
290(1)
Key Terms
291(3)
Review Questions
294(4)
Hands-on Projects
298(5)
Case Projects
303(2)
Domain Name System (DNS)
305(48)
DNS History and Background
306(8)
DNS Database Structure
307(2)
The DNS Namespace
309(1)
DNS Database Records
310(1)
Delegating DNS Authority
311(1)
Types of DNS Servers
311(2)
The Client Side of DNS
313(1)
How Domain Name Servers Work
314(2)
The Importance of DNS Caching
316(1)
DNS Configuration Files and Resource Record Formats
317(5)
Start of Authority (SOA) Record
318(1)
Address (A) and Canonical Name (CNAME) Records
319(2)
Mapping Addresses to Names
321(1)
Handling the Loopback Address
322(1)
Obtaining and Storing Root Server Data
322(1)
Examining the named.root File
323(1)
The Nslookup Command
323(4)
Nslookup Details
325(1)
Using Nslookup
325(2)
DNS Query/Response Packet Formats
327(7)
DNS Implementation
334(3)
The Trouble with DNS
335(1)
Additional Readings on DNS
336(1)
Chapter Summary
337(1)
Key Terms
338(4)
Review Questions
342(3)
Hands-on Projects
345(7)
Case Projects
352(1)
The Dynamic Host Configuration Protocol (DHCP)
353(38)
Introducing DHCP
354(5)
How DHCP Works
355(1)
The Role of Leases
356(1)
DHCP Software Elements
357(1)
DHCP Lease Types
358(1)
More About DHCP Leases
358(1)
Understanding IP Address Management with DHCP
359(1)
The Standard Address Discovery Process
360(8)
The Discover Packet
361(2)
The Offer Packet
363(2)
The Request Packet
365(2)
The Acknowledgment Packet
367(1)
The Address Renewal Process
368(2)
The Renewal Time (T1)
368(1)
The Rebinding Time (T2)
368(2)
The DHCP Address Release Process
370(1)
DHCP Packet Structures
370(6)
DHCP Options
372(4)
Broadcast and Unicast in DHCP
376(1)
Communications with a DHCP Relay Agent
377(1)
Microsoft DHCP Scopes and Classes
378(1)
Troubleshooting DHCP
379(1)
Chapter Summary
379(1)
Key Terms
380(2)
Review Questions
382(4)
Hands-on Projects
386(3)
Case Projects
389(2)
Securing TCP/IP Environments
391(60)
Understanding Computer and Network Security
392(8)
Principles of IP Security
392(2)
Understanding Typical IP Attacks, Exploits, and Break-ins
394(3)
Common Types of IP-Related Attacks
397(1)
What IP Services Are Most Vulnerable?
398(1)
Holes, Back Doors, and Other Illicit Points of Entry
399(1)
The Anatomy of IP Attacks
400(3)
Reconnaissance and Discovery Processes
400(2)
The Attack
402(1)
The Cover-up
402(1)
Common IP Points of Attack
403(12)
Viruses, Worms, and Trojan Horse Programs
403(3)
Denial of Service (DoS) Attacks
406(2)
Distributed Denial of Service Attacks (DDoS)
408(2)
Buffer Overflows/Overruns
410(1)
Spoofing
410(1)
TCP Session Hijacking
411(1)
Network Sniffing
412(3)
Maintaining IP Security
415(15)
Apply Security Patches and Fixes
415(1)
Knowing Which Ports to Block
416(1)
Recognizing Attack Signatures
417(2)
Using IP Security (IPSec)
419(1)
Protecting the Perimeter of the Network
419(2)
Understanding the Basics of Firewalls
421(3)
Understanding the Basics of Proxy Servers
424(1)
Implementing Firewalls and Proxy Servers
425(1)
Planning and Implementing, Step by Step
425(2)
Understanding the Test-Attack-Tune Cycle
427(1)
Understanding the Role of IDS in IP Security
428(1)
Updating Anti-Virus Engines and Virus Lists
428(1)
The Security Update Process
429(1)
Understanding Security Policies and Recovery Plans
430(2)
Windows XP and 2003: Another Generation of Network Security
432(3)
Chapter Summary
435(1)
Key Terms
436(6)
Review Questions
442(4)
Hands-on Projects
446(3)
Case Projects
449(2)
Routing in the IP Environment
451(42)
Understanding Routing
452(7)
How Entries Are Placed in the Routing Table
453(1)
Routing Protocols and Routed Protocols
454(1)
Grouping Routing Protocols
454(5)
Routing Characteristics
459(5)
Route Convergence
459(1)
Split Horizon
459(1)
Poison Reverse
460(1)
Time to Live (TTL)
460(1)
Multicast Versus Broadcast Update Behavior
461(1)
ICMP Router Adverstisements
461(1)
Black Holes
461(1)
Areas, Autonomous Systems, and Border Routers
462(2)
Interior Gateway Protocols (IGPs)
464(10)
RIP
464(5)
Open Shortest Path First (OSPF)
469(4)
Enhanced Interior Gateway Routing Protocol (EIGRP)
473(1)
Border Gateway Protocol (BGP)
474(1)
Managing Routing on an In-House Internetwork
475(2)
Hybrid Networks
477(1)
Routing on and off a Wide Area Network
477(2)
Several Small Offices
477(1)
Hub and Spoke
477(1)
Multiprotocol
478(1)
Mobile Users
478(1)
Routing to and from the Internet
479(1)
Securing Routers and Routing Behavior
480(1)
Troubleshooting IP Routing
481(1)
Chapter Summary
481(2)
Key Terms
483(3)
Review Questions
486(4)
Hands-on Projects
490(1)
Case Projects
491(2)
Monitoring and Managing IP Networks
493(34)
Understanding Network Management Practices and Principles
494(6)
Network Management Architectures
494(2)
The OSI Network Management Model
496(1)
Practical Network Management
497(1)
In-band Versus Out-of-band Management
498(2)
Understanding SNMP
500(9)
Management Information Base (MIB) Objects
501(5)
SNMP Agents
506(1)
SNMP Managers
506(1)
SNMP Messages
506(2)
SNMP Security
508(1)
Installing and Configuring SNMP Agents and Consoles
509(3)
Agent Configuration
510(1)
Console Installation
511(1)
Console Configuration
512(1)
SNMP Consoles, Tools, Utilities, and Key Files
512(1)
Integrating SNMP with Other Management Environments
513(1)
Troubleshooting SNMP
514(1)
Chapter Summary
515(1)
Key Terms
516(2)
Review Questions
518(4)
Hands-on Projects
522(3)
Case Projects
525(2)
TCP/IP, Netbios, and Wins
527(50)
History of NetBIOS
528(1)
What Is NetBIOS (and Why Do I Care)?
529(1)
How Windows 2000, Windows XP, and Windows Server 2003 Work with NetBIOS
530(1)
NetBIOS and TCP/IP
531(2)
Using DNS Only
531(1)
Using NBF Only
531(1)
Combining TCP/IP and NetBIOS
531(2)
How Does NetBIOS Work?
533(3)
NetBIOS Traffic
534(1)
Registering and Challenging NetBIOS Names
534(1)
NetBIOS Name Resolution
534(1)
Other NetBIOS Services
535(1)
NetBIOS Names
536(2)
Structure of NetBIOS Names
536(1)
NetBIOS Name Types and Suffixes
537(1)
NetBIOS Scope Identifier
537(1)
NetBIOS Name Registration and Resolution
538(6)
Name Resolution Regimes by Node Type
539(2)
NetBIOS Name Cache and LMHOSTS File
541(1)
WINS Name Registration and Resolution
541(2)
DNS and the HOSTS File
543(1)
NetBIOS Over TCP/IP
544(1)
NetBIOS and DNS Name Resolution
545(3)
Creating a Usable Host Name from a NetBIOS Name
545(3)
Converting an Encoded NetBIOS Name to a Fully Qualified Domain Name
548(1)
WINS Servers
548(4)
How WINS Works
548(1)
Different WINS Configurations
549(3)
Integrating WINS and DNS
552(5)
Pointing DNS at WINS for NetBIOS Name Resolution
554(2)
Reverse DNS Lookup for NetBIOS Names
556(1)
Windows Server 2003 WINS Improvements
556(1)
Troubleshooting WINS and NetBIOS
557(4)
Common Sources of Failure
557(1)
Tools for Troubleshooting NetBIOS and WINS Problems
557(2)
Typical Errors in NetBIOS and Wins
559(1)
Security Flaw in NetBIOS
560(1)
Chapter Summary
561(1)
Key Terms
562(1)
Review Questions
563(4)
Hands-on Projects
567(8)
Case Projects
575(2)
Internet Protocol Version 6 (IPv6)
577(58)
Why Create a New Version of IP?
578(1)
The IPv6 Address Space
579(11)
Address Format and Allocations
579(4)
Address Types
583(6)
Address Allocations
589(1)
Routing Considerations
590(3)
Neighbor Discovery and Router Advertisement
591(1)
Path MTU Discovery and Changes in Fragmentation
592(1)
IPv6 Packet Formats
593(10)
Basic IPv6 Header Format
593(4)
Extension Headers
597(6)
New and Enhanced IPv6 Features
603(12)
Autoconfiguration
603(2)
Security
605(5)
Quality of Service (QoS)
610(1)
Router Alerts and Hop-by-Hop Options
611(1)
Mobile Users
612(3)
Coexistence of IPv4 and IPv6
615(2)
Dual Stack Approach
615(1)
Tunneling Through the IPv4 Cloud
616(1)
IPv6 Rate of Adoption
617(1)
Transitioning to IPv6: The Reality
617(3)
Interoperability
618(1)
Availability
619(1)
What's Next?
620(1)
Chapter Summary
620(2)
Key Terms
622(4)
Review Questions
626(5)
Hands-on Projects
631(2)
Case Projects
633(2)
APPENDIX A Important RFCs
635(6)
APPENDIX B Key IP Resources Online
641(6)
General IP/Internet Overviews
641(1)
IP/Internet Histories
641(1)
General Pointers to Internet and Networking Topics
642(1)
RFC Resources
642(1)
IP Addressing, Subnetting, and Supernetting
642(1)
Binary Arithmetic Overviews
642(1)
General IP Protocol Information
643(1)
DNS Information
643(1)
DHCP Information
643(1)
IP Security
643(1)
IP Routing
644(1)
SNMP
644(1)
NetBIOS over TCP/IP
645(1)
IPv6
645(1)
TCP/IP Newsgroups
646(1)
APPENDIX C Command-line IP Utilities
647(8)
ARP
648(1)
IPCONFIG
648(1)
Netsh
649(1)
Netstat
650(1)
Pathping
651(1)
Ping
652(1)
Route
652(1)
Tracert
653(2)
APPENDIX D Windows 2000 and Windows XP Registry Settings
655(8)
APPENDIX E Contents of the CD
663(4)
Tools
663(1)
Engineers Edition Toolset
663(1)
EtherPeek for Windows Demo
663(1)
IP Subnet Calculator
663(1)
NetScanTools Standard Edition
664(1)
VisualRoute
664(1)
PacketScrubber
664(1)
ProConvert
664(1)
Trace Files
664(3)
APPENDIX F TCP/UDP Port Numbers
667(2)
APPENDIX G DHCP Options
669(2)
Glossary 671


Please wait while the item is added to your cart...