did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471800033

Managing Tcp/Ip Networks: Techniques, Tools and Security Considerations

by
  • ISBN13:

    9780471800033

  • ISBN10:

    0471800031

  • Format: Hardcover
  • Copyright: 2000-02-01
  • Publisher: John Wiley & Sons Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.95

Summary

Managing TCP/IP Networks Techniques, Tools and Security Considerations Gilbert Held, 4-Degree Consulting, Macon, Georgia, USA Focuses on the techniques, tools, diagnostic testing, and security Addresses the practical methods to manage a TCP/IP network Helps readers to manage and control operation and utilization Features include information on data flows, routing protocols and IP address classes TCP/IP is the standardized protocol of the Internet. There are numerous management issues associated with the construction and operation of a TCP/IP network. This comprehensive text addresses these issues, ranging from the planning behind the assignment of TCP/IP addresses to the ability to recognize network problems and the appropriate use of diagnostic tools to discover their cause. Written in an accessible style, this book will appeal to a wide-ranging audience. For professionals in the field of data communications and computer science, LAN administrators, network managers, network analysts, network designers and network engineers. It is also essential reading for students of electrical & electronic engineering, computer science and communications. Visit the Wiley Telecommunications Website on-line at: http://www.wiley.co.uk/commstech/ Visit Our Web Page! http://www.wiley.com

Table of Contents

Preface xv
Acknowledgments xvii
Introduction
1(14)
Rationale for network management
1(2)
Cost of service interruptions
2(1)
Size and complexity of networks
2(1)
Performance monitoring
2(1)
Coping with equipment sophistication
3(1)
The network management process
3(6)
The OSI framework for network management
4(1)
Configuration/change management
4(1)
Fault/problem management
5(1)
Performance/growth management
6(1)
Security/access management
7(1)
Accounting/cost management
7(1)
Other network management functions
8(1)
Asset management
8(1)
Planning/support management
9(1)
Tools and systems
9(2)
Monitoring tools
10(1)
Diagnostic tools
10(1)
Computer-based management systems
10(1)
Book preview
11(4)
The TCP/IP protocol suite
11(1)
The Internet Protocol
12(1)
The transport protocols
12(1)
DNS operations
12(1)
Layer 2 management
12(1)
Layer 3 and layer 4 management
13(1)
SNMP and RMON
13(1)
Management by utility program
13(1)
Security management
13(2)
The TCP/IP Protocol Suite
15(14)
Evolution
15(1)
Governing bodies
16(2)
The IAB
16(1)
The IANA
16(1)
The IETF
17(1)
RFCs
17(1)
The ISO Reference Model
18(6)
Layers of the OSI Reference Model
19(1)
Layer 1: The physical layer
19(1)
Layer 2: The data link layer
19(1)
Layer 3: The network layer
20(1)
Layer 4: The transport layer
20(1)
Layer 5: The session layer
21(1)
Layer 6: The presentation layer
21(1)
Layer 7: The application layer
21(1)
Data flow
22(1)
Layer subdivision
22(1)
Addressing
22(2)
Universally vs. locally administered addresses
24(1)
The TCP/IP protocol suite
24(5)
Comparison with the ISO Reference Model
25(1)
The network layer
25(1)
ICMP
26(1)
The transport layer
26(1)
TCP
26(1)
UDP
26(1)
Port numbers
26(1)
Application data delivery
27(2)
The Internet Protocol
29(44)
The IPv4 header
29(7)
Vers field
30(1)
Hlen and Total Length fields
30(1)
Type of Service field
30(1)
Identification field
31(1)
Flags field
32(1)
Fragment Offset field
32(1)
Time-to-Live field
33(1)
Protocol field
33(1)
Checksum field
33(1)
Source and Destination Address fields
33(3)
Options and Padding fields
36(1)
IP addressing
36(17)
Overview
37(1)
IPv4
38(1)
The basic addressing scheme
39(1)
Address classes
40(1)
Address formats
40(1)
Address composition and notation
41(1)
Special IP addresses
42(1)
Class A
42(1)
Class B
43(1)
Class C
43(1)
Class D
44(1)
Class E
44(1)
Reserved addresses
45(1)
Subnetting and the subnet mask
46(2)
Host addresses on subnets
48(1)
The subnet mask
49(1)
Configuration examples
50(2)
Classless networking
52(1)
The IPv6 header
53(9)
Ver field
55(1)
Priority field
56(1)
Flow Label field
57(1)
Payload Length field
57(1)
Next Header field
57(1)
Hop Limit field
57(1)
Source and Destination Address fields
58(1)
Address types
58(1)
Address notation
58(1)
Address allocation
59(1)
Provider-Based Unicast addresses
60(1)
Multicast address
61(1)
Transporting IPv4 addresses
61(1)
ICMP and ARP
62(11)
ICMP
62(1)
ICMPv4
62(1)
Type field
62(1)
Code field
63(1)
ICMPv6
64(1)
Type field
64(1)
Code field
64(1)
ARP
64(3)
Need for address resolution
67(1)
Operation
67(1)
Hardware Type field
68(1)
Protocol Type field
68(1)
Hardware Length field
68(1)
Protocol Length field
68(1)
Operation field
69(1)
Sender Hardware Address field
69(1)
Sender IP Address field
69(1)
Target Hardware Address field
70(1)
Target IP Address field
70(1)
ARP notes
70(3)
The Transport Layer
73(16)
TCP
73(14)
The TCP header
74(1)
Source and Destination Port fields
74(1)
Port numbers
75(1)
Well-known ports
75(1)
Registered port numbers
76(1)
Dynamic port numbers
76(1)
Sequence Number field
76(2)
Acknowledgment Number field
78(1)
Hlen field
78(1)
Reserved field
78(1)
Code Bit fields
78(1)
URG bit
79(1)
ACK bit
79(1)
PSH bit
79(1)
RST bit
79(1)
SYN bit
79(1)
FIN bit
79(1)
Window field
79(1)
Checksum field
80(1)
Urgent Pointer field
80(1)
Options field
80(1)
Padding field
81(1)
Operation
81(1)
Connection types
82(1)
The three-way handshake
82(1)
Segment size support
83(1)
The Window field and flow control
84(1)
Timers
85(1)
Delayed ACK
85(1)
FIN-WAIT-2 timer
85(1)
Persist
86(1)
Keep Alive
86(1)
Slow start and congestion avoidance
86(1)
UDP
87(2)
The UDP header
87(1)
Source and Destination Port fields
88(1)
Length field
88(1)
Checksum field
88(1)
Operation
88(1)
The Domain Name System
89(24)
Evolution
89(1)
The Hosts.Txt file
89(1)
DNS overview
90(5)
The domain structure
91(1)
DNS components
92(1)
Resource records
92(1)
Name servers
93(1)
Resolvers
93(1)
The resolution process
93(2)
The DNS database
95(18)
Overview
95(1)
Resource records
96(2)
Using a sample network
98(1)
DNS software configuration
98(1)
The BOOT file
98(2)
Using resource records
100(1)
SOA record
101(1)
NS records
101(1)
MX records
101(1)
A records
102(1)
CNAME records
102(1)
PTR records
102(1)
Loopback files
103(1)
All-zero/all-ones files
103(1)
For further resolution
104(1)
Accessing a DNS database
105(1)
nslookup
105(7)
The Whois command
112(1)
Layer 2 Management
113(50)
Ethernet frame operations
113(11)
Ethernet frame composition
114(1)
Preamble field
115(1)
Start-of-Frame Delimiter field
115(1)
Destination Address field
115(1)
I/G subfield
116(1)
U/L subfield
117(1)
Universal versus locally administered addressing
117(1)
Source Address field
118(2)
Type field
120(1)
Length field
121(1)
Data field
122(1)
Frame Check Sequence field
123(1)
Ethernet media access control
124(6)
Functions
125(1)
Transmit media access management
126(2)
Collision detection
128(1)
Jam pattern
128(1)
Wait time
128(2)
Late collisions
130(1)
Ethernet Logical Link Control
130(3)
The LLC protocol data unit
130(2)
Types and classes of service
132(1)
Type 1
132(1)
Type 2
133(1)
Type 3
133(1)
Classes of service
133(1)
Other Ethernet frame types
133(2)
Ethernet_SNAP frame
133(1)
NetWare Ethernet_802.3 frame
134(1)
Receiver frame determination
135(1)
Fast Ethernet
135(1)
Start-of-Stream Delimiter
136(1)
End-of-Stream Delimiter
136(1)
Gigabit Ethernet
136(3)
Carrier extension
137(2)
Packet bursting
139(1)
Token-Ring frame operations
139(15)
Transmission formats
140(1)
Starting/ending delimiters
141(1)
Differential Manchester encoding
141(1)
Non-data symbols
142(1)
Access control field
143(3)
The monitor bit
146(1)
The active monitor
146(1)
Frame Control field
147(1)
Destination Address field
147(1)
Universally administered address
148(1)
Locally administered address
148(1)
Functional address indicator
148(1)
Address values
148(1)
Source Address field
149(2)
Routing Information field
151(1)
Information field
152(1)
Frame Check Sequence field
152(1)
Frame Status field
152(2)
Token-Ring Medium Access Control
154(5)
Vectors and subvectors
155(1)
MAC control
156(1)
Purge frame
157(1)
Beacon frame
157(1)
Duplicate Address Test frame
158(1)
Station insertion
158(1)
Token-Ring Logical Link Control
159(2)
Service Access Points
159(1)
DSAP
160(1)
SSAP
160(1)
Types and classes of service
161(1)
Summary
161(2)
Layer 3 and Layer 4 Management
163(22)
Using WebXRay
163(13)
Overview
164(1)
Operation
164(1)
Autodiscovery
165(2)
Service selection
167(1)
Topology discovery
167(1)
Hosts information
168(1)
Services information
169(1)
Traffic measuring
170(1)
Server Host Table
170(1)
Server-Client Matrix Table
171(1)
IP Host Table
171(1)
IP Matrix Table
171(2)
Protocol distribution
173(1)
Filtering and packet decoding
174(2)
Using EtherPeek
176(9)
Operation
176(1)
Packet capture
176(1)
Filtering
177(2)
Selective packet capture
179(1)
Packet decoding
179(3)
Network statistics
182(3)
SNMP and RMON
185(40)
SNMP and RMON overview
185(6)
Basic architecture
186(1)
Manager
186(1)
Agents
187(1)
Management Information Base
188(1)
RMON
188(1)
Probes and agents
188(1)
MIBs
188(1)
Operation
189(1)
Evolution
190(1)
The SNMP protocol
191(9)
Basic SNMP commands
191(1)
GetRequest
192(1)
GetNextRequest
192(1)
SetRequest
193(1)
GetResponse
193(1)
Trap
194(1)
SNMP version 2
194(1)
New features
195(1)
GetBulkRequest
196(1)
InformRequest
196(1)
SNMPv3
197(1)
Architecture
198(1)
SNMP engine modules
199(1)
Application modules
199(1)
Operation
200(1)
Understanding the MIB
200(25)
The object identifier
201(1)
Structure and identification of management information
202(1)
Network management subtrees
203(1)
The mgmt subtree
203(1)
The experimental subtree
203(1)
The private subtree
204(1)
Program utilization example
204(3)
MIB II objects
207(1)
The System Group
208(2)
The Interfaces Group
210(3)
The Address Translation Group
213(1)
The Internet Protocol Group
214(1)
The Internet Control Message Protocol Group
214(2)
The Transmission Group
216(1)
The Transmission Control Protocol Group
217(1)
The User Datagram Protocol Group
218(1)
The Exterior Gateway Protocol Group
218(1)
The SNMP Group
218(1)
Authentication traps
218(1)
Incoming traffic counts
219(1)
Outgoing traffic counts
220(5)
Management by Utility Program
225(20)
Network utility programs
225(11)
Ping
225(1)
Overview
226(1)
Operation
227(1)
Utilization
228(1)
Operational example
228(1)
Traceroute
229(1)
Overview
229(1)
Operation
230(1)
Utilization
231(1)
Operational example
231(1)
Nbtstat
232(1)
Operation
233(1)
Netstat
234(1)
Operation
235(1)
Monitoring server performance
236(9)
Using Windows NT/2000 Performance Monitor
236(1)
Overview
236(1)
Utilization
237(3)
Observing processor performance
240(1)
Working with alerts
241(4)
Security
245(30)
Router security
246(7)
Need for access security
246(1)
Router access
247(1)
Telnet access
247(2)
TFTP access
249(1)
Securing console and virtual terminals
250(1)
File transfer
251(1)
Internal router security
251(1)
Additional protective measures
252(1)
Router access-lists
253(10)
Overview
254(1)
TCP/IP protocol suite review
254(2)
Using access-lists
256(1)
Configuration principles
256(1)
Standard access-lists
257(3)
Extended access-lists
260(2)
Limitations
262(1)
Using firewall proxy services
263(9)
Access-list limitations
263(1)
Proxy services
264(2)
ICMP proxy services
266(2)
Limitations
268(1)
Operational example
268(1)
Using classes
268(1)
Alert generation
269(1)
Packet filtering
270(2)
The gap to consider
272(1)
Network address translation
272(3)
Types of address translations
274(1)
Static NAT
274(1)
Pooled NAT
274(1)
Port Address Translation
274(1)
Appendix A The SNMP Management Information Base (MIB-II) 275(50)
Appendix B Demonstration Software 325(2)
Index 327

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program