Computer Networking: Internet Protocols in Action (Paperback)
Hands-on networking experience, without the lab!
The best way to learn about network protocols is to see them in action. But that doesn't mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network.
Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and follow the text to perform the exercises, gaining a thorough understanding of the material by seeing it in action.
* Practicality: Readers are able to learn by doing, without having to use actual networks. Instructors can add an active learning component to their course without the overhead of collecting the materials.
* Flexibility: This approach has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
* Completeness: The exercises take the reader from the basics of examining quiet and busy networks through application, transport, network, and link layers to the crucial issues of network security.
Table of Contents:
How to Use This Book.
Section 1. Getting Started.
1.1 Examining a Quiet Network with Ethereal.
1.2 Protocol Layering.
1.3 Examining a Busy Network Using Filters.
Section 2. Application Layer Protocols.
2.1 Under the Hood of HTTP.
2.2 HTTP Caching, Authorization and Cookies.
2.3 FTP—File Transfer Protocol.
2.4 Sending and Receiving Email with SMTP and POP.
Section 3. Transport Layer Protocols.
3.1 Simple TCP Stream.
3.2 Retransmission in TCP.
3.3 Comparing TCP to UDP.
3.4 Competing TCP and UDP Streams.
Section 4. Network Layer Protocols.
4.1 Joining the Internet: Introduction to IP and DHCP.
4.2 Ping and Traceroute.
4.3 Dynamic Routing with RIP.
Section 5. Link Layer Protocols.
5.1 MAC Addresses.
5.3 Wireless LANs.
Section 6. Security.
6.2 IP Spoofing and TCP Session Stealing.
6.3 System Vulnerabilities.