Sams teach yourself TCP/IP in 24 hours / Joe Casad.Material type: TextPublication details: New Delhi : Pearson, 2007Edition: 3rd edDescription: xv, 455 p. ill. ; 24 cmISBN:
- 005.7/1376 22 C3343
|Item type||Current library||Call number||Status||Date due||Barcode|
|Books||UE-Central Library||005.7/1376 C3343 (Browse shelf(Opens below))||Available||T1167|
|Books||UE-Central Library||005.71376 C3343 (Browse shelf(Opens below))||Available||T2045|
Introduction. I. Tcp/ip basics. Hour 1. What is tcp/ip? Networks and protocols. The development of tcp/ip. Tcp/ip features. Standards organizations and rfcs. Summary. Q&a. Key terms. Hour 2. How tcp/ip works. The tcp/ip protocol system. Tcp/ip and the osi model. Data packages. A quick look at tcp/ip networking. Summary. Q&a. Key terms. Ii. The tcp/ip protocol system. Hour 3. The network access layer. Protocols and hardware. The network access layer and the osi model. Network architecture. Physical addressing. Anatomy of a frame. Lan technologies. Other network-access technologies. Summary. Q&a. Key terms. Hour 4. The internet layer. Addressing and delivering. Internet protocol (ip). Address resolution protocol (arp). Rarp. Internet control message protocol (icmp). Summary. Q&a. Workshop. Key terms. Hour 5. Subnetting. Subnets in tcp/ip. Converting a subnet mask to dotted decimal notation. Working with subnets. Classless internet domain routing. Summary. Q&a. Key terms. Hour 6. The transport layer. Introducing the transport layer. Transport layer concepts. Understanding tcp and udp. A note about firewalls. Summary. Q&a. Key terms. Hour 7. The application layer. What is the application layer? The tcp/ip application layer and osi. Network services. Apis and the application layer. Operating environments and the application layer. Tcp/ip utilities. Summary. Q&a. Key terms. Hour 8. Dial-up tcp/ip. A look at modems. Serial line internet protocol (slip). Point-to-point protocol (ppp). Summary. Q&a. Key terms. Iii. Networking with tcp/ip. Hour 9. Network hardware. Divided networks. Routing in tcp/ip. Network address translation (nat). Summary. Q&a. Key terms. Hour 10. Routing. Introduction to routing in tcp/ip. Recapping routers. Routing on complex networks. Examining interior routers. Classless routing. Summary. Q&a. Key terms. Hour 11. Name resolution. What is name resolution? Name resolution using hosts files. Dns name resolution. Registering a domain. Managing dns. Dynamic dns. Netbios name resolution. Methods for netbios name resolution. Testing netbios name resolution. Other name resolution services. Summary. Q&a. Workshop. Key terms. Hour 12. Dynamic host configuration protocol (dhcp). The case for server-supplied ip addresses. What is dhcp? How dhcp works. Configuring dhcp. Summary. Q&a. Key terms. Iv. Tcp/ip utilities. Hour 13. Connectivity utilities. Connectivity problems. Protocol dysfunction and misconfiguration. Line problems. Name resolution problems. Network performance problems. Traceroute. Using connectivity utilities to troubleshoot problems. Summary. Q&a. Workshop. Key terms. Hour 14. File transfer and access utilities. File transfer protocol. Trivial file transfer protocol. Remote copy. Integrating network file access. Summary. Q&a. Workshop. Key terms. Hour 15. Remote access utilities. Telnet. Berkeley remote utilities. New directions in remote access. Summary. Q&a. Key terms. V. Tcp/ip and the internet. Hour 16. The internet: a closer look. How the internet looks. What happens on the internet. Summary. Q&a. Key terms. Hour 17. Http, html, and the world wide web. What is the world wide web? A closer look at urls. Understanding html. Understanding http. Advanced html techniques. Xml. The new web. Summary. Q&a. Workshop. Key terms. Hour 18. Email. What is email? How email looks. How email works. Simple mail transfer protocol (smtp). Retrieving the mail. Email readers. Web-based email. Spam. Summary. Q&a. Workshop. Key terms. Hour 19. What hackers do. What is a hacker? What do hackers want? Getting passwords. Other access techniques. Getting comfortable. Getting ready for the next attack. Attacking a network. Denial-of-service attacks. Summary. Key terms. Vi. Advanced topics. Hour 20. Tcp/ip security. Encryption. Securing tcp/ip. Virtual private networks (vpns). Kerberos. Summary. Q&a. Key terms. Hour 21. Network management protocols. Simple network management protocol. Remote monitoring. Summary. Q&a. Key terms. Hour 22. Wireless networks. 802.11 networks. Wireless application protocol (wap). Bluetooth. Summary. Q&a. Key terms. Hour 23. Recent and emerging technologies. Tcp/ip in the future. Ipv6. The view from the client. The view from the server. Web services. What is a computer anyway? Summary. Q&a. Key terms. Hour 24. -implementing a tcp/ip network-seven days in the life of maurice. A brief history of hypothetical, inc. Seven days in the life of maurice. Summary. Q&a. Index.