Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Overview | p. 1 |
Applications | p. 2 |
Current Applications | p. 2 |
Electronic Mail | p. 2 |
File Transfers | p. 4 |
Remote Terminal Access | p. 7 |
Web Surfing | p. 7 |
Emerging Applications | p. 10 |
Audio and Video Players | p. 10 |
Voice-over-IP | p. 11 |
Virtual Private Networking | p. 14 |
Book Preview | p. 14 |
The Protocol Suite | p. 15 |
The Standards Process | p. 15 |
The Internet Protocol and Related Protocols | p. 16 |
Transport Layer Protocols | p. 16 |
Applications and Built-In Diagnostic Tools | p. 16 |
Routing | p. 17 |
Security Threats | p. 17 |
Enhancing Security | p. 17 |
Emerging Technologies | p. 17 |
The Protocol Suite | p. 19 |
The ISO Reference Model | p. 19 |
OSI Reference Model Layers | p. 20 |
Data Flow | p. 24 |
The TCP/IP Protocol Suite | p. 24 |
The Network Layer | p. 24 |
The Transport Layer | p. 26 |
The Application Layer | p. 27 |
Data Flow and Header Utilization | p. 27 |
Internet Governing Bodies and the Standards Process | p. 31 |
Internet Governing Bodies | p. 31 |
Internet Evolution | p. 32 |
The IAB and IETF | p. 33 |
The IANA | p. 34 |
Request for Comments | p. 34 |
The Standards Process | p. 35 |
RFC Details | p. 36 |
Accessing RFCs | p. 36 |
Best Current Practice | p. 42 |
The Internet Protocol and Related Protocols | p. 43 |
The Internet Protocol | p. 44 |
Datagrams and Segments | p. 44 |
Datagrams and Datagram Transmission | p. 44 |
Routing | p. 45 |
The IP Header | p. 45 |
IP Addressing | p. 57 |
Overview | p. 58 |
The IP Addressing Scheme | p. 59 |
Class A Addresses | p. 62 |
Class B Addresses | p. 63 |
Class C Addresses | p. 65 |
Class D Addresses | p. 65 |
Class E Addresses | p. 67 |
Dotted Decimal Notation | p. 68 |
Basic Workstation Configuration | p. 69 |
Reserved Addresses | p. 73 |
The WINIPCFG Utility | p. 74 |
Subnetting | p. 76 |
Multiple Interface Addresses | p. 82 |
Address Resolution | p. 84 |
Ethernet and Token Ring Frame Formats | p. 84 |
LAN Delivery | p. 85 |
Address Resolution Operation | p. 85 |
Proxy ARP | p. 87 |
RARP | p. 87 |
ICMP | p. 88 |
Overview | p. 88 |
The ICMP Type Field | p. 89 |
The ICMP Code Field | p. 89 |
Examining Message Types and Code Field Values | p. 90 |
ICMP Vulnerabilities | p. 97 |
The Transport Layer | p. 99 |
TCP | p. 99 |
The TCP Header | p. 100 |
Source and Destination Port Fields | p. 100 |
Sequence and Acknowledgment Number Fields | p. 107 |
Hlen Field | p. 108 |
Code Bits Field | p. 108 |
Window Field | p. 109 |
Checksum Field | p. 110 |
Urgent Pointer Field | p. 110 |
Options | p. 111 |
Padding Field | p. 112 |
Connection Establishment | p. 112 |
Connection Function Calls | p. 112 |
The Three-Way Handshake | p. 114 |
The TCP Window | p. 116 |
TCP Timers | p. 120 |
UDP | p. 121 |
The UDP Header | p. 121 |
Operation | p. 123 |
Applications | p. 123 |
Applications and Built-in Diagnostic Tools | p. 125 |
The DNS | p. 125 |
Purpose | p. 126 |
The Domain Name Structure | p. 126 |
The Name Resolution Process | p. 129 |
DNS Records | p. 135 |
Diagnostic Tools | p. 137 |
Ping | p. 137 |
Traceroute | p. 141 |
PathPing | p. 144 |
Nslookup | p. 146 |
Finger | p. 152 |
Routing and Routing Protocols | p. 155 |
Network Routing | p. 156 |
Routing in a Global System | p. 156 |
Routing Table Update Methods | p. 162 |
The Routing Information Protocol | p. 162 |
Illustrative Network | p. 162 |
Dynamic Table Updates | p. 163 |
Basic Limitations | p. 166 |
RIP Versions | p. 167 |
The Basic RIPv1 Packet | p. 168 |
RIPv2 | p. 170 |
OSPF | p. 172 |
Overview | p. 172 |
Path Metrics | p. 173 |
The Link State Database | p. 174 |
Database Update | p. 174 |
Constructing the Shortest Path | p. 176 |
Initialization Activity | p. 176 |
Router Types | p. 178 |
Message Types | p. 178 |
Common Message Header | p. 179 |
Operation | p. 180 |
Configuring Cisco Routers | p. 181 |
Configuring RIP | p. 181 |
Examining RIP Routing Tables | p. 182 |
Configuring IGRP | p. 182 |
Configuring OSPF | p. 184 |
Summary | p. 186 |
Security Threats | p. 187 |
Password Cracking | p. 187 |
Internet Availability | p. 188 |
Cracking Methods | p. 188 |
Password Creation Policy | p. 190 |
File and Print Sharing | p. 192 |
Enabling | p. 192 |
Establishing Access Controls | p. 192 |
Viruses and Worms | p. 193 |
Types of Viruses | p. 194 |
Scanning | p. 196 |
Network Attacks | p. 199 |
Using Whois | p. 199 |
Hacker Search Techniques | p. 203 |
Ping Sweeps | p. 203 |
Ping Attack | p. 203 |
Directed Broadcast | p. 205 |
UDP Echo | p. 205 |
Buffer Overflows | p. 206 |
Enhancing Security | p. 207 |
Router Access Considerations | p. 208 |
Router Control | p. 208 |
Direct Cabling | p. 208 |
Telnet and Web Access | p. 209 |
Router Access Lists | p. 212 |
Rationale for Use | p. 212 |
Types of Access Lists | p. 215 |
New Capabilities in Access Lists | p. 220 |
Applying a Named Access List | p. 226 |
Configuration Principles | p. 227 |
Limitations | p. 227 |
Firewalls | p. 228 |
Installation Location | p. 228 |
Basic Functions | p. 229 |
IPSec | p. 232 |
Protocols | p. 233 |
Modes | p. 233 |
AH Header Format | p. 235 |
ESP Header and Trailer | p. 236 |
Operations | p. 238 |
Emerging Technologies | p. 239 |
Virtual Private Networking | p. 239 |
Benefits | p. 240 |
Limitations | p. 242 |
Other Issues to Consider | p. 244 |
Setting Up Remote Access Service | p. 245 |
Mobile IP | p. 247 |
Overview | p. 249 |
Operation | p. 249 |
Voice-over-IP | p. 250 |
Constraints | p. 251 |
Networking Configurations | p. 254 |
IPv6 | p. 256 |
Overview | p. 256 |
Address Architecture | p. 256 |
TCP/IP Protocol Reference Numbers | |
ICMP Type and Code Values | p. 265 |
Internet Protocol (IP) Protocol Type Field Values | p. 271 |
Port Numbers | p. 275 |
Index | p. 309 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.