Understanding Tcp/ip: A Clear And Comprehensive Guide
Alena Kabelov¿, Libor Dost¿lek
- 出版商: Packt Publishing
- 出版日期: 2006-02-25
- 售價: $1,710
- 貴賓價: 9.5 折 $1,625
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 190481171X
- ISBN-13: 9781904811718
-
相關分類:
TCP/IP
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$880$704 -
$560$442 -
$690$587 -
$780$616 -
$490$441 -
$780$702 -
$680$578 -
$850$723 -
$550$468 -
$490$387 -
$760$600 -
$650$507 -
$680$537 -
$480$379 -
$720$569 -
$650$514 -
$1,200$948 -
$650$553 -
$590$502 -
$580$458 -
$2,010$1,910 -
$780$616 -
$650$514 -
$600$480 -
$720$612
相關主題
商品描述
Table of Contents
- Chapter 1: Introduction to Network Protocols
- 1.1 ISO OSI
- 1.1.1 Physical Layer
- 1.1.2 Data Link Layer
- 1.1.3 Network Layer
- 1.1.4 Transport Layer
- 1.1.5 Session Layer
- 1.1.6 Presentation Layer
- 1.1.7 Application Layer
- 1.2 TCP/IP
- 1.2.1 Internet Protocol
- 1.2.2 TCP and UDP
- 1.2.3 Application Protocols
- 1.3 Methods of Information Transmission
- 1.3.1 Synchronous Transmission
- 1.3.2 Packet Transmission
- 1.3.3 Asynchronous Transmission
- 1.4 Virtual Circuit
- Chapter 2: Network Monitoring Tools
- 2.1 Packet Drivers
- 2.2 MS Network Monitor
- 2.2.1 Frame Capturing
- 2.2.2 Viewing Captured Frames
- 2.2.3 Filters for Displaying Captured Frames
- 2.3 Ethereal
- 2.4 Homework
- Chapter 3: Physical Layer
- 3.1 Serial Line
- 3.1.1 Serial and Parallel Data Transport
- 3.1.2 Symmetrical and Asymmetrical Signals
- 3.1.3 Synchronous and Asynchronous Transport
- 3.1.4 V.24, V.35, and X.21 Protocols
- 3.1.5 Null Modem
- 3.2 Modems
- 3.2.1 Dial-Up Connection
- 3.2.2 Leased Lines
- 3.2.3 Automatic Modem
- 3.2.3.1 AT Commands
- 3.2.4 Synchronous Transmission
- 3.2.5 Baseband, Voice Band, and ADSL
- 3.2.6 Transmission Rate
- 3.2.6.1 The V.90 Recommendation
- 3.2.7 Data Compression
- 3.2.8 Error Detection
- 3.3 Digital Circuits
- 3.3.1 ISDN
- 3.3.1.1 Basic Rate
- 3.3.1.2 Higher Layer Protocols and Signalization
- 3.3.2 E and T Lines
- 3.4 LAN
- 3.4.1 Structured Cables
- 3.4.1.1 Copper Distribution
- 3.4.1.2 Optical Fibers
- 3.4.2 Ethernet (10 Mbps)
- 3.4.2.1 AUI
- 3.4.2.2 BNC
- 3.4.2.3 Twisted-Pair
- 3.4.3 Fast Ethernet (100 Mbps)
- 3.4.4 Gigabyte Ethernet (1 Gbps)
- Chapter 4: Link Layer
- 4.1 Serial Line Internet Protocol
- 4.2 Compressed SLIP
- 4.3 High-Level Data Link Control Protocol
- 4.3.1 Flag
- 4.3.2 Address Field
- 4.3.3 Control Field
- 4.3.3.1 I-Frame
- 4.3.3.2 S-Frame
- 4.3.3.3 U-Frame
- 4.3.4 Data Field and a Transferred Protocol Type
- 4.3.5 Checksum
- 4.3.6 HDLC Protocol Summary
- 4.4 Point-To-Point Protocol
- 4.4.1 Dialing a Phone Line
- 4.4.2 Link Control Protocol
- 4.4.3 Authentication
- 4.4.3.1 Password Authentication Protocol
- 4.4.3.2 Challenge Handshake Authentication Protocols
- 4.4.3.3 Extensible Authentication Protocol
- 4.4.3.4 Radius Protocol
- 4.4.4 Call-Back Control Protocol
- 4.4.5 Other Protocols
- 4.4.5.1 Multilink Protocol
- 4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
- 4.4.5.3 Compression Control Protocol
- 4.4.5.4 Encryption Control Protocol
- 4.4.5.5 Setting Encryption Keys
- 4.4.6 Internet Protocol Control Protocol
- 4.5 Frame Relay
- 4.5.1 A Frame Relay Protocol Frame
- 4.5.2 IP Through Frame Relay
- 4.5.3 Local Management Interface
- 4.5.4 Frame Relay Configuration on CISCO Routers
- 4.5.5 Frame Relay Protocol
- 4.6 Local Area Networks
- 4.6.1 Ethernet
- 4.7 Wireless Local Area Network
- 4.7.1 Typical WLAN Configuration
- 4.7.1.1 Peer-To-Peer Networks
- 4.7.1.2 Access Point
- 4.7.1.3 Roaming (Several Access Points)
- 4.7.1.4 Backbone Point-to-Point Connection
- 4.7.2 Antennas
- 4.7.3 Security of WLAN
- 4.7.3.1 Service Set ID
- 4.7.3.2 Wired Equivalent Privacy
- 4.7.3.3 IEEE 802.1X
- 4.8 Fixed Wireless Access
- 4.8.1 The Differences Between FWA and WLAN
- 4.8.2 The Main Benefits of FWA
- Chapter 5: Internet Protocol
- 5.1 IP Datagram
- 5.2. Internet Control Message Protocol
- 5.2.1 Echo
- 5.2.2 Destination Unreachable
- 5.2.3 Source Quench (Lower Sending Speed)
- 5.2.4 Redirect
- 5.2.5 ICMP Router Discovery
- 5.2.6 Time Exceeded
- 5.2.7 Subnet Address Mask Request
- 5.2.8 Time Synchronization
- 5.3 Fragmentation
- 5.4 Optional Entries in the IP Header
- 5.4.1 Record Route
- 5.4.2 Timestamp
- 5.4.3 Source Routing
- 5.4.4 IP Router Alert Option
- 5.5 ARP and RARP Protocols
- 5.5.1 ARP Filtering
- 5.5.2 Proxy ARP
- 5.5.3 Reverse ARP
- 5.6 Internet Group Management Protocol
- 5.7 Multicast and Link Protocol
- Chapter 6: IP Address
- 6.1 Network: First Period of History
- 6.1.1 Special-Use IP Addresses
- 6.1.2 Network Mask
- 6.2 Network: Second Period of History
- 6.2.1 Subnetworks
- 6.2.2 Super-Networks and Autonomous Systems
- 6.3 IP Addresses in the Intranet and Special-Use IP Addresses
- 6.4 Unnumbered Interface
- 6.4.1 Dynamic Address Assignment
- 6.5 Address Plan
- 6.6 Over 254 Interfaces in a LAN
- Chapter 7: Routing
- 7.1 Forwarding and Screening
- 7.2 Routing
- 7.2.1 Processing
- 7.3 Handling Routing Tables
- 7.3.1 List of Contents of a Routing Table in a Command Prompt
- 7.3.1.1 Contents of a Routing Table in UNIX
- 7.3.2 Routing Table Listing in Windows 2000/XP/2003
- 7.3.3 Contents of a Routing Table in Cisco Routers
- 7.3.4 Routing Table Entry Addition and Removal
- 7.4 Routing Protocols
- 7.4.1 Routing Vector Protocols
- 7.4.1.1 RVP Principle
- 7.4.1.2 RIP and RIP2
- 7.4.2 Link State Protocols
- 7.4.2.1 OSPF
- 7.4.3 IPG and EGP
- 7.4.4 Aggregation
- 7.4.5 Redistribution
- 7.5 Neutral Exchange Point
- Chapter 8: IP Version 6
- 8.1 Next Headers of IP Version 6 Datagram
- 8.1.1 Hop-By-Hop Options
- 8.1.2 Routing Header
- 8.1.3 Fragment Header
- 8.1.4 Authentication Header
- 8.1.5 Encapsulating Security Payload Header
- 8.2 ICMP Version 6 Protocol
- 8.2.1 Address Resolution
- 8.2.2 Router Discovery
- 8.2.3 Redirect
- 8.3. IP Addresses
- 8.3.1 Types of Address Inscription
- 8.3.2 Multicasts
- 8.3.3 Unicasts
- 8.4 Windows 2003
- Chapter 9: Transmission Control Protocol
- 9.1 TCP Segments
- 9.2 TCP Header Options
- 9.3 Establishing and Terminating a Connection with TCP
- 9.3.1 Establishing a Connection
- 9.3.2 Terminating a Connection
- 9.3.3 Aborting a Connection
- 9.4 Determining the Connection State
- 9.5 Response Delay Techniques
- 9.6 Window Technique
- 9.7 Network Congestion
- 9.7.1 Slow Start
- 9.7.2 Congestion Avoidance
- 9.7.3 Segment Loss
- 9.8 The Window Scale Factor
- Chapter 10: User Datagram Protocol
- 10.1 Fragmentation
- 10.2 Broadcasts and Multicasts
- Chapter 11: Domain Name System
- 11.1 Domains and Subdomains
- 11.2 Name Syntax
- 11.3 Reverse Domains
- 11.4 Resource Records
- 11.5 DNS Protocol
- 11.6 DNS Query
- 11.6.1 DNS Query Packet Format
- 11.6.2 DNS Query Packet Header
- 11.6.3 Question Section
- 11.6.4 The Answer Section, Authoritative Servers, and Additional Information
- Chapter 12: Telnet
- 12.1 The NVT Protocol
- 12.2 Telnet Protocol Commands
- 12.2.1 Signal for Synchronization
- 12.2.2 The Telnet Command Line
- 12.2.3 Communication Modes
- 12.3 Example of Windows NT Client Communication
- 12.4 Example of UNIX Client Communication
- Chapter 13: File Transfer Protocol
- 13.1 Architecture
- 13.2 Active Mode of FTP Protocol Communication
- 13.3 Passive Mode of FTP Protocol Communication
- 13.4 FTP Commands
- 13.5 Proxy
- 13.6 Return Codes
- 13.7 Abnormal Termination of Data Transfer
- 13.8 Anonymous FTP
- Chapter 14: Hypertext Transfer Protocol
- 14.1 Client-Server
- 14.2 Proxy
- 14.3 Gateway
- 14.4 Tunnel
- 14.5 More Intermediate Nodes
- 14.6 Uniform Resource Identifier
- 14.6.1 The http Scheme
- 14.6.2 The ftp Scheme
- 14.6.3 The mailto Scheme
- 14.6.4 The nntp Scheme
- 14.6.5 The telnet Scheme
- 14.6.6 The file Scheme
- 14.6.7 The pop Scheme
- 14.7 Relative URI
- 14.8 The HTTP Request
- 14.8.1 The GET Method
- 14.8.2 The POST Method
- 14.8.3 The HEAD Method
- 14.8.4 The TRACE Method
- 14.8.5 The OPTIONS Method
- 14.9 The HTTP Response
- 14.9.1 An Overview of Result Codes
- 14.10 Other Header Fields
- 14.10.1 Accept Header Field
- 14.10.2 Client Authentication
- 14.10.3 Proxy Authentication
- 14.10.4 Content Header Field
- 14.10.5 Redirection and Temporary Unavailability of Objects
- 14.10.6 Cache
- 14.10.7 Software Information
- 14.11 Cookie
- 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
- 14.11.1.1 Cookie Header Field
- Chapter 15: Email
- 15.1 Email Architecture
- 15.1.1 DNS and Email
- 15.2 Mail Message Format
- 15.2.1 Basic Header Fields
- 15.3 MIME
- 15.3.1 MIME Header Fields
- 15.3.1.1 MIME-Version
- 15.3.1.2 Content-Type
- 15.3.1.3 Content-Transfer-Encoding
- 15.3.1.4 Content-Disposition
- 15.3.2 Standard Encoding Mechanisms
- 15.3.2.1 Quoted-Printable
- 15.3.2.2 Base64
- 15.3.3 Non-ASCII Text in Message Header Fields
- 15.3.4 Discrete Media Types in Content-Type
- 15.3.4.1 text
- 15.3.4.2 application
- 15.3.4.3 image
- 15.3.4.4 audio
- 15.3.4.5 video
- 15.3.4.6 model
- 15.3.5 Composite Media Types in Content-Type
- 15.3.5.1 multipart
- 15.3.5.2 message
- 15.4 SMTP
- 15.5 ESMTP
- 15.5.1 Message Delivery Receipt
- 15.5.1.1 Delivery Status Notification
- 15.5.1.2 The Disposition-Notification-To Header Field
- 15.6 POP3
- 15.7 IMAP4
- 15.7.1 Unauthenticated State
- 15.7.1.1 LOGIN
- 15.7.1.2 AUTHENTICATE
- 15.7.2 Authenticated State
- 15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
- 15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
- 15.7.2.3 STATUS
- 15.7.2.4 SELECT and EXAMINE Commands
- 15.7.3 Open Mailbox
- 15.7.3.1 COPY
- 15.7.3.2 SEARCH
- 15.7.3.3 FETCH
- 15.7.3.4 STORE
- 15.7.3.5 EXPUNGE
- 15.7.3.6 CLOSE
- 15.8 Mailing Lists
- Chapter 16: Forums
- 16.1 Message Format
- 16.2 NNTP Protocol
- 16.2.1 End User Communication
- 16.2.2 Communication Among Servers
- 16.2.3 Session Termination
- Chapter 17: Lightweight Directory Access Protocol
- 17.1 Protocol Principle
- 17.2 Data Model of LDAP Directory
- 17.3 LDAP Protocol Data Units
- 17.3.1 The Search Operation
- 17.3.1.1 Filters
- 17.3.2 Further Operations with Entries
- 17.3.2.1 The Add Operation
- 17.3.2.2 The Modify Operation
- 17.3.2.3 The Delete Operation
- 17.3.2.4 The Modify DN Operation
- 17.3.2.5 The Compare Operation
- 17.4 Server Programs
- 17.5 Client Programs
- 17.5.1 The LDAP Browser
- 17.5.2 The OpenLDAP Client
- 17.5.3 ADSIedit
- 17.5.4 MS Outlook Express and MS Outlook
- 17.6 Lightweight Directory Interchange Format
- Appendix A: CISCO Routers
- A.1 Interface Identification
- A.2 Cables
- A.3 Memory
- A.4 Console
- A.5 Commands
- A.5.1 Non-Privileged Mode
- A.5.2 Privileged mode
- A.6 Configuration
- A.6.1 Setting a Password for Privileged Mode
- A.6.2 Web
- A.6.3 ConfigMaker
- A.7 Debugging
商品描述(中文翻譯)
目錄
前言
第一章:網路協議介紹
1.1 ISO OSI
1.1.1 實體層
1.1.2 資料鏈結層
1.1.3 網路層
1.1.4 傳輸層
1.1.5 會議層
1.1.6 表示層
1.1.7 應用層
1.2 TCP/IP
1.2.1 網際網路協議
1.2.2 TCP和UDP
1.2.3 應用協議
1.3 資訊傳輸方法
1.3.1 同步傳輸
1.3.2 封包傳輸
1.3.3 非同步傳輸
1.4 虛擬電路
第二章:網路監控工具
2.1 封包驅動程式
2.2 MS網路監視器
2.2.1 捕獲封包
2.2.2 檢視捕獲的封包
2.2.3 顯示捕獲的封包的過濾器
2.3 Ethereal
2.4 作業
第三章:實體層
3.1 串行線
3.1.1 串行和並行資料傳輸
3.1.2 對稱和非對稱信號
3.1.3 同步和非同步傳輸
3.1.4 V.24、V.35和X.21協議
3.1.5 空調調制解調器
3.2 調制解調器
3.2.1 撥號連接
3.2.2 租用線路
3.2.3 自動撥號調制解調器
3.2.3.1 AT指令
3.2.4 同步傳輸
3.2.5 基頻、語音頻帶和ADSL
3.2.6 傳輸速率
3.2.6.1 V.90建議
3.2.7 資料壓縮
3.2.8 錯誤檢測
3.3 數位電路
3.3.1 ISDN
3.3.1.1 基本速率
3.3.1.2 高層協議和信令
3.3.2 E和T線路
3.4 局域網
3.4.1 結構化電纜
3.4.1.1 銅配線
3.4.1.2 光纖
3.4.2 以太網(10 Mbps)
3.4.2.1 AUI
3.4.2.2 BNC
3.4.2.3 ```