售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Understanding TCP/IP
Table of Contents
Understanding TCP/IP
Credits
About the Authors
Acknowledgements
Preface
What This Book Covers
What You Need for This Book
Conventions
Reader Feedback
Customer Support
Errata
Questions
1. Introduction to Network Protocols
1.1 ISO OSI
1.1.1 Physical Layer
1.1.2 Data Link Layer
1.1.3 Network Layer
1.1.4 Transport Layer
1.1.5 Session Layer
1.1.6 Presentation Layer
1.1.7 Application Layer
1.2 TCP/IP
1.2.1 Internet Protocol
1.2.2 TCP and UDP
1.2.3 Application Protocols
1.3 Methods of Information Transmission
1.3.1 Synchronous Transmission
1.3.2 Packet Transmission
1.3.3 Asynchronous Transmission
1.4 Virtual Circuit
2. Network Monitoring Tools
2.1 Packet Drivers
2.2 MS Network Monitor
2.2.1 Frame Capturing
2.2.2 Viewing Captured Frames
2.2.3 Filters for Displaying Captured Frames
2.3 Ethereal
2.4 Homework
3. Physical Layer
3.1 Serial Line
3.1.1 Serial and Parallel Data Transport
3.1.2 Symmetrical and Asymmetrical Signals
3.1.3 Synchronous and Asynchronous Transport
3.1.4 V.24, V.35, and X.21 Protocols
3.1.5 Null Modem
3.2 Modems
3.2.1 Dial-Up Connection
3.2.2 Leased Lines
3.2.3 Automatic Modem
3.2.3.1 AT Commands
3.2.4 Synchronous Transmission
3.2.5 Baseband, Voice Band, and ADSL
3.2.6 Transmission Rate
3.2.6.1 The V.90 Recommendation
3.2.7 Data Compression
3.2.8 Error Detection
3.3 Digital Circuits
3.3.1 ISDN
3.3.1.1 Basic Rate
3.3.1.2 Higher Layer Protocols and Signalization
3.3.2 E and T Lines
3.4 LAN
3.4.1 Structured Cables
3.4.1.1 Copper Distribution
3.4.1.2 Optical Fibers
3.4.2 Ethernet (10 Mbps)
3.4.2.1 AUI
3.4.2.2 BNC
3.4.2.3 Twisted-Pair
Optical Fiber
3.4.3 Fast Ethernet (100 Mbps)
3.4.4 Gigabyte Ethernet (1 Gbps)
4. Link Layer
4.1 Serial Line Internet Protocol
4.2 Compressed SLIP
4.3 High-Level Data Link Control Protocol
4.3.1 Flag
4.3.2 Address Field
4.3.3 Control Field
4.3.3.1 I-Frame
4.3.3.2 S-Frame
4.3.3.3 U-Frame
4.3.4 Data Field and a Transferred Protocol Type
4.3.5 Checksum
4.3.6 HDLC Protocol Summary
4.4 Point-To-Point Protocol
4.4.1 Dialing a Phone Line
4.4.2 Link Control Protocol
4.4.3 Authentication
4.4.3.1 Password Authentication Protocol
4.4.3.2 Challenge Handshake Authentication Protocols
4.4.3.3 Extensible Authentication Protocol
4.4.3.4 Radius Protocol
4.4.4 Call-Back Control Protocol
4.4.5 Other Protocols
4.4.5.1 Multilink Protocol
4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
4.4.5.3 Compression Control Protocol
4.4.5.4 Encryption Control Protocol
4.4.5.5 Setting Encryption Keys
4.4.6 Internet Protocol Control Protocol
4.5 Frame Relay
4.5.1 A Frame Relay Protocol Frame
4.5.2 IP Through Frame Relay
4.5.3 Local Management Interface
4.5.4 Frame Relay Configuration on CISCO Routers
4.5.5 Frame Relay Protocol
4.6 Local Area Networks
4.6.1 Ethernet
4.7 Wireless Local Area Network
4.7.1 Typical WLAN Configuration
4.7.1.1 Peer-To-Peer Networks
4.7.1.2 Access Point
4.7.1.3 Roaming (Several Access Points)
4.7.1.4 Backbone Point-to-Point Connection
4.7.2 Antennas
4.7.3 Security of WLAN
4.7.3.1 Service Set ID
4.7.3.2 Wired Equivalent Privacy
4.7.3.3 IEEE 802.1X
4.8 Fixed Wireless Access
4.8.1 The Differences Between FWA and WLAN
4.8.2 The Main Benefits of FWA
5. Internet Protocol
5.1 IP Datagram
5.2. Internet Control Message Protocol
5.2.1 Echo
5.2.2 Destination Unreachable
5.2.3 Source Quench (Lower Sending Speed)
5.2.4 Redirect
5.2.5 ICMP Router Discovery
5.2.6 Time Exceeded
5.2.7 Subnet Address Mask Request
5.2.8 Time Synchronization
5.3 Fragmentation
5.4 Optional Entries in the IP Header
5.4.1 Record Route
5.4.2 Timestamp
5.4.3 Source Routing
5.4.4 IP Router Alert Option
5.5 ARP and RARP Protocols
5.5.1 ARP Filtering
5.5.2 Proxy ARP
5.5.3 Reverse ARP
5.6 Internet Group Management Protocol
5.7 Multicast and Link Protocol
6. IP Address
6.1 Network: First Period of History
6.1.1 Special-Use IP Addresses
6.1.2 Network Mask
6.2 Network: Second Period of History
6.2.1 Subnetworks
6.2.2 Super-Networks and Autonomous Systems
6.3 IP Addresses in the Intranet and Special-Use IP Addresses
6.4 Unnumbered Interface
6.4.1 Dynamic Address Assignment
6.5 Address Plan
6.6 Over 254 Interfaces in a LAN
7. Routing
7.1 Forwarding and Screening
7.2 Routing
7.2.1 Processing
7.3 Handling Routing Tables
7.3.1 List of Contents of a Routing Table in a Command Prompt
7.3.1.1 Contents of a Routing Table in UNIX
7.3.2 Routing Table Listing in Windows 2000/XP/2003
7.3.3 Contents of a Routing Table in Cisco Routers
7.3.4 Routing Table Entry Addition and Removal
7.4 Routing Protocols
7.4.1 Routing Vector Protocols
7.4.1.1 RVP Principle
7.4.1.2 RIP and RIP2
7.4.2 Link State Protocols
7.4.2.1 OSPF
7.4.3 IPG and EGP
7.4.4 Aggregation
7.4.5 Redistribution
7.5 Neutral Exchange Point
8. IP Version 6
8.1 Next Headers of IP Version 6 Datagram
8.1.1 Hop-By-Hop Options
8.1.2 Routing Header
8.1.3 Fragment Header
8.1.4 Authentication Header
8.1.5 Encapsulating Security Payload Header
8.2 ICMP Version 6 Protocol
8.2.1 Address Resolution
8.2.2 Router Discovery
8.2.3 Redirect
8.3. IP Addresses
8.3.1 Types of Address Inscription
8.3.2 Multicasts
8.3.3 Unicasts
8.4 Windows 2003
9. Transmission Control Protocol
9.1 TCP Segments
9.2 TCP Header Options
9.3 Establishing and Terminating a Connection with TCP
9.3.1 Establishing a Connection
9.3.2 Terminating a Connection
9.3.3 Aborting a Connection
9.4 Determining the Connection State
9.5 Response Delay Techniques
9.6 Window Technique
9.7 Network Congestion
9.7.1 Slow Start
9.7.2 Congestion Avoidance
9.7.3 Segment Loss
9.8 The Window Scale Factor
10. User Datagram Protocol
10.1 Fragmentation
10.2 Broadcasts and Multicasts
11. Domain Name System
11.1 Domains and Subdomains
11.2 Name Syntax
11.3 Reverse Domains
11.4 Resource Records
11.5 DNS Protocol
11.6 DNS Query
11.6.1 DNS Query Packet Format
11.6.2 DNS Query Packet Header
11.6.3 Question Section
11.6.4 The Answer Section, Authoritative Servers, and Additional Information
12. Telnet
12.1 The NVT Protocol
12.2 Telnet Protocol Commands
12.2.1 Signal for Synchronization
12.2.2 The Telnet Command Line
12.2.3 Communication Modes
12.3 Example of Windows NT Client Communication
12.4 Example of UNIX Client Communication
13. File Transfer Protocol
13.1 Architecture
13.2 Active Mode of FTP Protocol Communication
13.3 Passive Mode of FTP Protocol Communication
13.4 FTP Commands
13.5 Proxy
13.6 Return Codes
13.7 Abnormal Termination of Data Transfer
13.8 Anonymous FTP
14. Hypertext Transfer Protocol
14.1 Client-Server
14.2 Proxy
14.3 Gateway
14.4 Tunnel
14.5 More Intermediate Nodes
14.6 Uniform Resource Identifier
14.6.1 The http Scheme
14.6.2 The ftp Scheme
14.6.3 The mailto Scheme
14.6.4 The nntp Scheme
14.6.5 The telnet Scheme
14.6.6 The file Scheme
14.6.7 The pop Scheme
14.7 Relative URI
14.8 The HTTP Request
14.8.1 The GET Method
14.8.2 The POST Method
14.8.3 The HEAD Method
14.8.4 The TRACE Method
14.8.5 The OPTIONS Method
14.9 The HTTP Response
14.9.1 An Overview of Result Codes
14.10 Other Header Fields
14.10.1 Accept Header Field
14.10.2 Client Authentication
14.10.3 Proxy Authentication
14.10.4 Content Header Field
14.10.5 Redirection and Temporary Unavailability of Objects
14.10.6 Cache
14.10.7 Software Information
14.11 Cookie
14.11.1 Set-Cookie and Set-Cookie2 Header Fields
14.11.1.1 Cookie Header Field
15. Email
15.1 Email Architecture
15.1.1 DNS and Email
15.2 Mail Message Format
15.2.1 Basic Header Fields
15.3 MIME
15.3.1 MIME Header Fields
15.3.1.1 MIME-Version
15.3.1.2 Content-Type
15.3.1.3 Content-Transfer-Encoding
15.3.1.4 Content-Disposition
15.3.2 Standard Encoding Mechanisms
15.3.2.1 Quoted-Printable
15.3.2.2 Base64
15.3.3 Non-ASCII Text in Message Header Fields
15.3.4 Discrete Media Types in Content-Type
15.3.4.1 text
15.3.4.2 application
15.3.4.3 image
15.3.4.4 audio
15.3.4.5 video
15.3.4.6 model
15.3.5 Composite Media Types in Content-Type
15.3.5.1 multipart
15.3.5.2 message
15.4 SMTP
15.5 ESMTP
VERB
8BITMIME
SIZE
ETRN
15.5.1 Message Delivery Receipt
15.5.1.1 Delivery Status Notification
15.5.1.2 The Disposition-Notification-To Header Field
15.6 POP3
15.7 IMAP4
15.7.1 Unauthenticated State
15.7.1.1 LOGIN
15.7.1.2 AUTHENTICATE
15.7.2 Authenticated State
15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
15.7.2.3 STATUS
15.7.2.4 SELECT and EXAMINE Commands
15.7.3 Open Mailbox
15.7.3.1 COPY
15.7.3.2 SEARCH
15.7.3.3 FETCH
15.7.3.4 STORE
15.7.3.5 EXPUNGE
15.7.3.6 CLOSE
15.8 Mailing Lists
16. Forums
16.1 Message Format
16.2 NNTP Protocol
16.2.1 End User Communication
16.2.2 Communication Among Servers
16.2.3 Session Termination
17. Lightweight Directory Access Protocol
17.1 Protocol Principle
17.2 Data Model of LDAP Directory
17.3 LDAP Protocol Data Units
17.3.1 The Search Operation
17.3.1.1 Filters
17.3.2 Further Operations with Entries
17.3.2.1 The Add Operation
17.3.2.2 The Modify Operation
17.3.2.3 The Delete Operation
17.3.2.4 The Modify DN Operation
17.3.2.5 The Compare Operation
17.4 Server Programs
17.5 Client Programs
17.5.1 The LDAP Browser
17.5.2 The OpenLDAP Client
17.5.3 ADSIedit
17.5.4 MS Outlook Express and MS Outlook
17.6 Lightweight Directory Interchange Format
A. CISCO Routers
A.1 Interface Identification
A.2 Cables
A.3 Memory
A.4 Console
A.5 Commands
A.5.1 Non-Privileged Mode
A.5.2 Privileged mode
A.6 Configuration
A.6.1 Setting a Password for Privileged Mode
A.6.2 Web
A.6.3 ConfigMaker
A.7 Debugging
Index
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜