Understanding Tcp/ip: A Clear And Comprehensive Guide

Alena Kabelov¿, Libor Dost¿lek

  • 出版商: Packt Publishing
  • 出版日期: 2006-05-11
  • 售價: $1,358
  • 貴賓價: 9.5$1,290
  • 語言: 英文
  • 頁數: 480
  • 裝訂: Paperback
  • ISBN: 190481171X
  • ISBN-13: 9781904811718
  • 相關分類: 計算機網路

下單後立即進貨 (1~2週)

商品描述

Table of Contents

 
  • Chapter 1: Introduction to Network Protocols
    • 1.1 ISO OSI
      • 1.1.1 Physical Layer
      • 1.1.2 Data Link Layer
      • 1.1.3 Network Layer
      • 1.1.4 Transport Layer
      • 1.1.5 Session Layer
      • 1.1.6 Presentation Layer
      • 1.1.7 Application Layer
    • 1.2 TCP/IP
      • 1.2.1 Internet Protocol
      • 1.2.2 TCP and UDP
      • 1.2.3 Application Protocols
    • 1.3 Methods of Information Transmission
      • 1.3.1 Synchronous Transmission
      • 1.3.2 Packet Transmission
      • 1.3.3 Asynchronous Transmission
    • 1.4 Virtual Circuit
     
    • Chapter 2: Network Monitoring Tools
      • 2.1 Packet Drivers
      • 2.2 MS Network Monitor
        • 2.2.1 Frame Capturing
        • 2.2.2 Viewing Captured Frames
        • 2.2.3 Filters for Displaying Captured Frames
      • 2.3 Ethereal
      • 2.4 Homework
       
      • Chapter 3: Physical Layer
        • 3.1 Serial Line
          • 3.1.1 Serial and Parallel Data Transport
          • 3.1.2 Symmetrical and Asymmetrical Signals
          • 3.1.3 Synchronous and Asynchronous Transport
          • 3.1.4 V.24, V.35, and X.21 Protocols
          • 3.1.5 Null Modem
        • 3.2 Modems
          • 3.2.1 Dial-Up Connection
          • 3.2.2 Leased Lines
          • 3.2.3 Automatic Modem
            • 3.2.3.1 AT Commands
          • 3.2.4 Synchronous Transmission
          • 3.2.5 Baseband, Voice Band, and ADSL
          • 3.2.6 Transmission Rate
            • 3.2.6.1 The V.90 Recommendation
          • 3.2.7 Data Compression
          • 3.2.8 Error Detection
        • 3.3 Digital Circuits
          • 3.3.1 ISDN
            • 3.3.1.1 Basic Rate
            • 3.3.1.2 Higher Layer Protocols and Signalization
          • 3.3.2 E and T Lines
        • 3.4 LAN
          • 3.4.1 Structured Cables
            • 3.4.1.1 Copper Distribution
            • 3.4.1.2 Optical Fibers
          • 3.4.2 Ethernet (10 Mbps)
            • 3.4.2.1 AUI
            • 3.4.2.2 BNC
            • 3.4.2.3 Twisted-Pair
          • 3.4.3 Fast Ethernet (100 Mbps)
          • 3.4.4 Gigabyte Ethernet (1 Gbps)
         
        • Chapter 4: Link Layer
          • 4.1 Serial Line Internet Protocol
          • 4.2 Compressed SLIP
          • 4.3 High-Level Data Link Control Protocol
            • 4.3.1 Flag
            • 4.3.2 Address Field
            • 4.3.3 Control Field
              • 4.3.3.1 I-Frame
              • 4.3.3.2 S-Frame
              • 4.3.3.3 U-Frame
            • 4.3.4 Data Field and a Transferred Protocol Type
            • 4.3.5 Checksum
            • 4.3.6 HDLC Protocol Summary
          • 4.4 Point-To-Point Protocol
            • 4.4.1 Dialing a Phone Line
            • 4.4.2 Link Control Protocol
            • 4.4.3 Authentication
              • 4.4.3.1 Password Authentication Protocol
              • 4.4.3.2 Challenge Handshake Authentication Protocols
              • 4.4.3.3 Extensible Authentication Protocol
              • 4.4.3.4 Radius Protocol
            • 4.4.4 Call-Back Control Protocol
            • 4.4.5 Other Protocols
              • 4.4.5.1 Multilink Protocol
              • 4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
              • 4.4.5.3 Compression Control Protocol
              • 4.4.5.4 Encryption Control Protocol
              • 4.4.5.5 Setting Encryption Keys
            • 4.4.6 Internet Protocol Control Protocol
          • 4.5 Frame Relay
            • 4.5.1 A Frame Relay Protocol Frame
            • 4.5.2 IP Through Frame Relay
            • 4.5.3 Local Management Interface
            • 4.5.4 Frame Relay Configuration on CISCO Routers
            • 4.5.5 Frame Relay Protocol
          • 4.6 Local Area Networks
            • 4.6.1 Ethernet
          • 4.7 Wireless Local Area Network
            • 4.7.1 Typical WLAN Configuration
              • 4.7.1.1 Peer-To-Peer Networks
              • 4.7.1.2 Access Point
              • 4.7.1.3 Roaming (Several Access Points)
              • 4.7.1.4 Backbone Point-to-Point Connection
            • 4.7.2 Antennas
            • 4.7.3 Security of WLAN
              • 4.7.3.1 Service Set ID
              • 4.7.3.2 Wired Equivalent Privacy
              • 4.7.3.3 IEEE 802.1X
          • 4.8 Fixed Wireless Access
            • 4.8.1 The Differences Between FWA and WLAN
            • 4.8.2 The Main Benefits of FWA
           
          • Chapter 5: Internet Protocol
            • 5.1 IP Datagram
            • 5.2. Internet Control Message Protocol
              • 5.2.1 Echo
              • 5.2.2 Destination Unreachable
              • 5.2.3 Source Quench (Lower Sending Speed)
              • 5.2.4 Redirect
              • 5.2.5 ICMP Router Discovery
              • 5.2.6 Time Exceeded
              • 5.2.7 Subnet Address Mask Request
              • 5.2.8 Time Synchronization
            • 5.3 Fragmentation
            • 5.4 Optional Entries in the IP Header
              • 5.4.1 Record Route
              • 5.4.2 Timestamp
              • 5.4.3 Source Routing
              • 5.4.4 IP Router Alert Option
            • 5.5 ARP and RARP Protocols
              • 5.5.1 ARP Filtering
              • 5.5.2 Proxy ARP
              • 5.5.3 Reverse ARP
            • 5.6 Internet Group Management Protocol
            • 5.7 Multicast and Link Protocol
             
            • Chapter 6: IP Address
              • 6.1 Network: First Period of History
                • 6.1.1 Special-Use IP Addresses
                • 6.1.2 Network Mask
              • 6.2 Network: Second Period of History
                • 6.2.1 Subnetworks
                • 6.2.2 Super-Networks and Autonomous Systems
              • 6.3 IP Addresses in the Intranet and Special-Use IP Addresses
              • 6.4 Unnumbered Interface
                • 6.4.1 Dynamic Address Assignment
              • 6.5 Address Plan
              • 6.6 Over 254 Interfaces in a LAN
               
              • Chapter 7: Routing
                • 7.1 Forwarding and Screening
                • 7.2 Routing
                  • 7.2.1 Processing
                • 7.3 Handling Routing Tables
                  • 7.3.1 List of Contents of a Routing Table in a Command Prompt
                    • 7.3.1.1 Contents of a Routing Table in UNIX
                  • 7.3.2 Routing Table Listing in Windows 2000/XP/2003
                  • 7.3.3 Contents of a Routing Table in Cisco Routers
                  • 7.3.4 Routing Table Entry Addition and Removal
                • 7.4 Routing Protocols
                  • 7.4.1 Routing Vector Protocols
                    • 7.4.1.1 RVP Principle
                    • 7.4.1.2 RIP and RIP2
                  • 7.4.2 Link State Protocols
                    • 7.4.2.1 OSPF
                  • 7.4.3 IPG and EGP
                  • 7.4.4 Aggregation
                  • 7.4.5 Redistribution
                • 7.5 Neutral Exchange Point
                 
                • Chapter 8: IP Version 6
                  • 8.1 Next Headers of IP Version 6 Datagram
                    • 8.1.1 Hop-By-Hop Options
                    • 8.1.2 Routing Header
                    • 8.1.3 Fragment Header
                    • 8.1.4 Authentication Header
                    • 8.1.5 Encapsulating Security Payload Header
                  • 8.2 ICMP Version 6 Protocol
                    • 8.2.1 Address Resolution
                    • 8.2.2 Router Discovery
                    • 8.2.3 Redirect
                  • 8.3. IP Addresses
                    • 8.3.1 Types of Address Inscription
                    • 8.3.2 Multicasts
                    • 8.3.3 Unicasts
                  • 8.4 Windows 2003
                   
                  • Chapter 9: Transmission Control Protocol
                    • 9.1 TCP Segments
                    • 9.2 TCP Header Options
                    • 9.3 Establishing and Terminating a Connection with TCP
                      • 9.3.1 Establishing a Connection
                      • 9.3.2 Terminating a Connection
                      • 9.3.3 Aborting a Connection
                    • 9.4 Determining the Connection State
                    • 9.5 Response Delay Techniques
                    • 9.6 Window Technique
                    • 9.7 Network Congestion
                      • 9.7.1 Slow Start
                      • 9.7.2 Congestion Avoidance
                      • 9.7.3 Segment Loss
                    • 9.8 The Window Scale Factor
                     
                       
                      • Chapter 11: Domain Name System
                        • 11.1 Domains and Subdomains
                        • 11.2 Name Syntax
                        • 11.3 Reverse Domains
                        • 11.4 Resource Records
                        • 11.5 DNS Protocol
                        • 11.6 DNS Query
                          • 11.6.1 DNS Query Packet Format
                          • 11.6.2 DNS Query Packet Header
                          • 11.6.3 Question Section
                          • 11.6.4 The Answer Section, Authoritative Servers, and Additional Information
                         
                        • Chapter 12: Telnet
                          • 12.1 The NVT Protocol
                          • 12.2 Telnet Protocol Commands
                            • 12.2.1 Signal for Synchronization
                            • 12.2.2 The Telnet Command Line
                            • 12.2.3 Communication Modes
                          • 12.3 Example of Windows NT Client Communication
                          • 12.4 Example of UNIX Client Communication
                           
                          • Chapter 13: File Transfer Protocol
                            • 13.1 Architecture
                            • 13.2 Active Mode of FTP Protocol Communication
                            • 13.3 Passive Mode of FTP Protocol Communication
                            • 13.4 FTP Commands
                            • 13.5 Proxy
                            • 13.6 Return Codes
                            • 13.7 Abnormal Termination of Data Transfer
                            • 13.8 Anonymous FTP
                             
                            • Chapter 14: Hypertext Transfer Protocol
                              • 14.1 Client-Server
                              • 14.2 Proxy
                              • 14.3 Gateway
                              • 14.4 Tunnel
                              • 14.5 More Intermediate Nodes
                              • 14.6 Uniform Resource Identifier
                                • 14.6.1 The http Scheme
                                • 14.6.2 The ftp Scheme
                                • 14.6.3 The mailto Scheme
                                • 14.6.4 The nntp Scheme
                                • 14.6.5 The telnet Scheme
                                • 14.6.6 The file Scheme
                                • 14.6.7 The pop Scheme
                              • 14.7 Relative URI
                              • 14.8 The HTTP Request
                                • 14.8.1 The GET Method
                                • 14.8.2 The POST Method
                                • 14.8.3 The HEAD Method
                                • 14.8.4 The TRACE Method
                                • 14.8.5 The OPTIONS Method
                              • 14.9 The HTTP Response
                                • 14.9.1 An Overview of Result Codes
                              • 14.10 Other Header Fields
                                • 14.10.1 Accept Header Field
                                • 14.10.2 Client Authentication
                                • 14.10.3 Proxy Authentication
                                • 14.10.4 Content Header Field
                                • 14.10.5 Redirection and Temporary Unavailability of Objects
                                • 14.10.6 Cache
                                • 14.10.7 Software Information
                              • 14.11 Cookie
                                • 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
                                  • 14.11.1.1 Cookie Header Field
                               
                              • Chapter 15: Email
                                • 15.1 Email Architecture
                                  • 15.1.1 DNS and Email
                                • 15.2 Mail Message Format
                                  • 15.2.1 Basic Header Fields
                                • 15.3 MIME
                                  • 15.3.1 MIME Header Fields
                                    • 15.3.1.1 MIME-Version
                                    • 15.3.1.2 Content-Type
                                    • 15.3.1.3 Content-Transfer-Encoding
                                    • 15.3.1.4 Content-Disposition
                                  • 15.3.2 Standard Encoding Mechanisms
                                    • 15.3.2.1 Quoted-Printable
                                    • 15.3.2.2 Base64
                                  • 15.3.3 Non-ASCII Text in Message Header Fields
                                  • 15.3.4 Discrete Media Types in Content-Type
                                    • 15.3.4.1 text
                                    • 15.3.4.2 application
                                    • 15.3.4.3 image
                                    • 15.3.4.4 audio
                                    • 15.3.4.5 video
                                    • 15.3.4.6 model
                                  • 15.3.5 Composite Media Types in Content-Type
                                    • 15.3.5.1 multipart
                                    • 15.3.5.2 message
                                • 15.4 SMTP
                                • 15.5 ESMTP
                                  • 15.5.1 Message Delivery Receipt
                                    • 15.5.1.1 Delivery Status Notification
                                    • 15.5.1.2 The Disposition-Notification-To Header Field
                                • 15.6 POP3
                                • 15.7 IMAP4
                                  • 15.7.1 Unauthenticated State
                                    • 15.7.1.1 LOGIN
                                    • 15.7.1.2 AUTHENTICATE
                                  • 15.7.2 Authenticated State
                                    • 15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
                                    • 15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
                                    • 15.7.2.3 STATUS
                                    • 15.7.2.4 SELECT and EXAMINE Commands
                                  • 15.7.3 Open Mailbox
                                    • 15.7.3.1 COPY
                                    • 15.7.3.2 SEARCH
                                    • 15.7.3.3 FETCH
                                    • 15.7.3.4 STORE
                                    • 15.7.3.5 EXPUNGE
                                    • 15.7.3.6 CLOSE
                                • 15.8 Mailing Lists
                                 
                                • Chapter 16: Forums
                                  • 16.1 Message Format
                                  • 16.2 NNTP Protocol
                                    • 16.2.1 End User Communication
                                    • 16.2.2 Communication Among Servers
                                    • 16.2.3 Session Termination
                                   
                                  • Chapter 17: Lightweight Directory Access Protocol
                                    • 17.1 Protocol Principle
                                    • 17.2 Data Model of LDAP Directory
                                    • 17.3 LDAP Protocol Data Units
                                      • 17.3.1 The Search Operation
                                        • 17.3.1.1 Filters
                                      • 17.3.2 Further Operations with Entries
                                        • 17.3.2.1 The Add Operation
                                        • 17.3.2.2 The Modify Operation
                                        • 17.3.2.3 The Delete Operation
                                        • 17.3.2.4 The Modify DN Operation
                                        • 17.3.2.5 The Compare Operation
                                    • 17.4 Server Programs
                                    • 17.5 Client Programs
                                      • 17.5.1 The LDAP Browser
                                      • 17.5.2 The OpenLDAP Client
                                      • 17.5.3 ADSIedit
                                      • 17.5.4 MS Outlook Express and MS Outlook
                                    • 17.6 Lightweight Directory Interchange Format
                                     
                                    • Appendix A: CISCO Routers
                                      • A.1 Interface Identification
                                      • A.2 Cables
                                      • A.3 Memory
                                      • A.4 Console
                                      • A.5 Commands
                                        • A.5.1 Non-Privileged Mode
                                        • A.5.2 Privileged mode
                                      • A.6 Configuration
                                        • A.6.1 Setting a Password for Privileged Mode
                                        • A.6.2 Web
                                        • A.6.3 ConfigMaker
                                      • A.7 Debugging