万本电子书0元读

万本电子书0元读

顶部广告

Understanding TCP/IP电子书

售       价:¥

109人正在读 | 0人评论 6.2

作       者:Alena Kabelova

出  版  社:Packt Publishing

出版时间:2006-05-11

字       数:425.6万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is suitable for the novice and experienced system administrators, programmers, and anyone who would like to learn how to work with the TCP/IP protocol suite. It can be read even by those who have little background in networking
目录展开

Understanding TCP/IP

Table of Contents

Understanding TCP/IP

Credits

About the Authors

Acknowledgements

Preface

What This Book Covers

What You Need for This Book

Conventions

Reader Feedback

Customer Support

Errata

Questions

1. Introduction to Network Protocols

1.1 ISO OSI

1.1.1 Physical Layer

1.1.2 Data Link Layer

1.1.3 Network Layer

1.1.4 Transport Layer

1.1.5 Session Layer

1.1.6 Presentation Layer

1.1.7 Application Layer

1.2 TCP/IP

1.2.1 Internet Protocol

1.2.2 TCP and UDP

1.2.3 Application Protocols

1.3 Methods of Information Transmission

1.3.1 Synchronous Transmission

1.3.2 Packet Transmission

1.3.3 Asynchronous Transmission

1.4 Virtual Circuit

2. Network Monitoring Tools

2.1 Packet Drivers

2.2 MS Network Monitor

2.2.1 Frame Capturing

2.2.2 Viewing Captured Frames

2.2.3 Filters for Displaying Captured Frames

2.3 Ethereal

2.4 Homework

3. Physical Layer

3.1 Serial Line

3.1.1 Serial and Parallel Data Transport

3.1.2 Symmetrical and Asymmetrical Signals

3.1.3 Synchronous and Asynchronous Transport

3.1.4 V.24, V.35, and X.21 Protocols

3.1.5 Null Modem

3.2 Modems

3.2.1 Dial-Up Connection

3.2.2 Leased Lines

3.2.3 Automatic Modem

3.2.3.1 AT Commands

3.2.4 Synchronous Transmission

3.2.5 Baseband, Voice Band, and ADSL

3.2.6 Transmission Rate

3.2.6.1 The V.90 Recommendation

3.2.7 Data Compression

3.2.8 Error Detection

3.3 Digital Circuits

3.3.1 ISDN

3.3.1.1 Basic Rate

3.3.1.2 Higher Layer Protocols and Signalization

3.3.2 E and T Lines

3.4 LAN

3.4.1 Structured Cables

3.4.1.1 Copper Distribution

3.4.1.2 Optical Fibers

3.4.2 Ethernet (10 Mbps)

3.4.2.1 AUI

3.4.2.2 BNC

3.4.2.3 Twisted-Pair

Optical Fiber

3.4.3 Fast Ethernet (100 Mbps)

3.4.4 Gigabyte Ethernet (1 Gbps)

4. Link Layer

4.1 Serial Line Internet Protocol

4.2 Compressed SLIP

4.3 High-Level Data Link Control Protocol

4.3.1 Flag

4.3.2 Address Field

4.3.3 Control Field

4.3.3.1 I-Frame

4.3.3.2 S-Frame

4.3.3.3 U-Frame

4.3.4 Data Field and a Transferred Protocol Type

4.3.5 Checksum

4.3.6 HDLC Protocol Summary

4.4 Point-To-Point Protocol

4.4.1 Dialing a Phone Line

4.4.2 Link Control Protocol

4.4.3 Authentication

4.4.3.1 Password Authentication Protocol

4.4.3.2 Challenge Handshake Authentication Protocols

4.4.3.3 Extensible Authentication Protocol

4.4.3.4 Radius Protocol

4.4.4 Call-Back Control Protocol

4.4.5 Other Protocols

4.4.5.1 Multilink Protocol

4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol

4.4.5.3 Compression Control Protocol

4.4.5.4 Encryption Control Protocol

4.4.5.5 Setting Encryption Keys

4.4.6 Internet Protocol Control Protocol

4.5 Frame Relay

4.5.1 A Frame Relay Protocol Frame

4.5.2 IP Through Frame Relay

4.5.3 Local Management Interface

4.5.4 Frame Relay Configuration on CISCO Routers

4.5.5 Frame Relay Protocol

4.6 Local Area Networks

4.6.1 Ethernet

4.7 Wireless Local Area Network

4.7.1 Typical WLAN Configuration

4.7.1.1 Peer-To-Peer Networks

4.7.1.2 Access Point

4.7.1.3 Roaming (Several Access Points)

4.7.1.4 Backbone Point-to-Point Connection

4.7.2 Antennas

4.7.3 Security of WLAN

4.7.3.1 Service Set ID

4.7.3.2 Wired Equivalent Privacy

4.7.3.3 IEEE 802.1X

4.8 Fixed Wireless Access

4.8.1 The Differences Between FWA and WLAN

4.8.2 The Main Benefits of FWA

5. Internet Protocol

5.1 IP Datagram

5.2. Internet Control Message Protocol

5.2.1 Echo

5.2.2 Destination Unreachable

5.2.3 Source Quench (Lower Sending Speed)

5.2.4 Redirect

5.2.5 ICMP Router Discovery

5.2.6 Time Exceeded

5.2.7 Subnet Address Mask Request

5.2.8 Time Synchronization

5.3 Fragmentation

5.4 Optional Entries in the IP Header

5.4.1 Record Route

5.4.2 Timestamp

5.4.3 Source Routing

5.4.4 IP Router Alert Option

5.5 ARP and RARP Protocols

5.5.1 ARP Filtering

5.5.2 Proxy ARP

5.5.3 Reverse ARP

5.6 Internet Group Management Protocol

5.7 Multicast and Link Protocol

6. IP Address

6.1 Network: First Period of History

6.1.1 Special-Use IP Addresses

6.1.2 Network Mask

6.2 Network: Second Period of History

6.2.1 Subnetworks

6.2.2 Super-Networks and Autonomous Systems

6.3 IP Addresses in the Intranet and Special-Use IP Addresses

6.4 Unnumbered Interface

6.4.1 Dynamic Address Assignment

6.5 Address Plan

6.6 Over 254 Interfaces in a LAN

7. Routing

7.1 Forwarding and Screening

7.2 Routing

7.2.1 Processing

7.3 Handling Routing Tables

7.3.1 List of Contents of a Routing Table in a Command Prompt

7.3.1.1 Contents of a Routing Table in UNIX

7.3.2 Routing Table Listing in Windows 2000/XP/2003

7.3.3 Contents of a Routing Table in Cisco Routers

7.3.4 Routing Table Entry Addition and Removal

7.4 Routing Protocols

7.4.1 Routing Vector Protocols

7.4.1.1 RVP Principle

7.4.1.2 RIP and RIP2

7.4.2 Link State Protocols

7.4.2.1 OSPF

7.4.3 IPG and EGP

7.4.4 Aggregation

7.4.5 Redistribution

7.5 Neutral Exchange Point

8. IP Version 6

8.1 Next Headers of IP Version 6 Datagram

8.1.1 Hop-By-Hop Options

8.1.2 Routing Header

8.1.3 Fragment Header

8.1.4 Authentication Header

8.1.5 Encapsulating Security Payload Header

8.2 ICMP Version 6 Protocol

8.2.1 Address Resolution

8.2.2 Router Discovery

8.2.3 Redirect

8.3. IP Addresses

8.3.1 Types of Address Inscription

8.3.2 Multicasts

8.3.3 Unicasts

8.4 Windows 2003

9. Transmission Control Protocol

9.1 TCP Segments

9.2 TCP Header Options

9.3 Establishing and Terminating a Connection with TCP

9.3.1 Establishing a Connection

9.3.2 Terminating a Connection

9.3.3 Aborting a Connection

9.4 Determining the Connection State

9.5 Response Delay Techniques

9.6 Window Technique

9.7 Network Congestion

9.7.1 Slow Start

9.7.2 Congestion Avoidance

9.7.3 Segment Loss

9.8 The Window Scale Factor

10. User Datagram Protocol

10.1 Fragmentation

10.2 Broadcasts and Multicasts

11. Domain Name System

11.1 Domains and Subdomains

11.2 Name Syntax

11.3 Reverse Domains

11.4 Resource Records

11.5 DNS Protocol

11.6 DNS Query

11.6.1 DNS Query Packet Format

11.6.2 DNS Query Packet Header

11.6.3 Question Section

11.6.4 The Answer Section, Authoritative Servers, and Additional Information

12. Telnet

12.1 The NVT Protocol

12.2 Telnet Protocol Commands

12.2.1 Signal for Synchronization

12.2.2 The Telnet Command Line

12.2.3 Communication Modes

12.3 Example of Windows NT Client Communication

12.4 Example of UNIX Client Communication

13. File Transfer Protocol

13.1 Architecture

13.2 Active Mode of FTP Protocol Communication

13.3 Passive Mode of FTP Protocol Communication

13.4 FTP Commands

13.5 Proxy

13.6 Return Codes

13.7 Abnormal Termination of Data Transfer

13.8 Anonymous FTP

14. Hypertext Transfer Protocol

14.1 Client-Server

14.2 Proxy

14.3 Gateway

14.4 Tunnel

14.5 More Intermediate Nodes

14.6 Uniform Resource Identifier

14.6.1 The http Scheme

14.6.2 The ftp Scheme

14.6.3 The mailto Scheme

14.6.4 The nntp Scheme

14.6.5 The telnet Scheme

14.6.6 The file Scheme

14.6.7 The pop Scheme

14.7 Relative URI

14.8 The HTTP Request

14.8.1 The GET Method

14.8.2 The POST Method

14.8.3 The HEAD Method

14.8.4 The TRACE Method

14.8.5 The OPTIONS Method

14.9 The HTTP Response

14.9.1 An Overview of Result Codes

14.10 Other Header Fields

14.10.1 Accept Header Field

14.10.2 Client Authentication

14.10.3 Proxy Authentication

14.10.4 Content Header Field

14.10.5 Redirection and Temporary Unavailability of Objects

14.10.6 Cache

14.10.7 Software Information

14.11 Cookie

14.11.1 Set-Cookie and Set-Cookie2 Header Fields

14.11.1.1 Cookie Header Field

15. Email

15.1 Email Architecture

15.1.1 DNS and Email

15.2 Mail Message Format

15.2.1 Basic Header Fields

15.3 MIME

15.3.1 MIME Header Fields

15.3.1.1 MIME-Version

15.3.1.2 Content-Type

15.3.1.3 Content-Transfer-Encoding

15.3.1.4 Content-Disposition

15.3.2 Standard Encoding Mechanisms

15.3.2.1 Quoted-Printable

15.3.2.2 Base64

15.3.3 Non-ASCII Text in Message Header Fields

15.3.4 Discrete Media Types in Content-Type

15.3.4.1 text

15.3.4.2 application

15.3.4.3 image

15.3.4.4 audio

15.3.4.5 video

15.3.4.6 model

15.3.5 Composite Media Types in Content-Type

15.3.5.1 multipart

15.3.5.2 message

15.4 SMTP

15.5 ESMTP

VERB

8BITMIME

SIZE

ETRN

15.5.1 Message Delivery Receipt

15.5.1.1 Delivery Status Notification

15.5.1.2 The Disposition-Notification-To Header Field

15.6 POP3

15.7 IMAP4

15.7.1 Unauthenticated State

15.7.1.1 LOGIN

15.7.1.2 AUTHENTICATE

15.7.2 Authenticated State

15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands

15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands

15.7.2.3 STATUS

15.7.2.4 SELECT and EXAMINE Commands

15.7.3 Open Mailbox

15.7.3.1 COPY

15.7.3.2 SEARCH

15.7.3.3 FETCH

15.7.3.4 STORE

15.7.3.5 EXPUNGE

15.7.3.6 CLOSE

15.8 Mailing Lists

16. Forums

16.1 Message Format

16.2 NNTP Protocol

16.2.1 End User Communication

16.2.2 Communication Among Servers

16.2.3 Session Termination

17. Lightweight Directory Access Protocol

17.1 Protocol Principle

17.2 Data Model of LDAP Directory

17.3 LDAP Protocol Data Units

17.3.1 The Search Operation

17.3.1.1 Filters

17.3.2 Further Operations with Entries

17.3.2.1 The Add Operation

17.3.2.2 The Modify Operation

17.3.2.3 The Delete Operation

17.3.2.4 The Modify DN Operation

17.3.2.5 The Compare Operation

17.4 Server Programs

17.5 Client Programs

17.5.1 The LDAP Browser

17.5.2 The OpenLDAP Client

17.5.3 ADSIedit

17.5.4 MS Outlook Express and MS Outlook

17.6 Lightweight Directory Interchange Format

A. CISCO Routers

A.1 Interface Identification

A.2 Cables

A.3 Memory

A.4 Console

A.5 Commands

A.5.1 Non-Privileged Mode

A.5.2 Privileged mode

A.6 Configuration

A.6.1 Setting a Password for Privileged Mode

A.6.2 Web

A.6.3 ConfigMaker

A.7 Debugging

Index

累计评论(0条) 1个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部