000 | 05042cam a22002174a 4500 | ||
---|---|---|---|
999 |
_c775 _d775 |
||
001 | 2045 | ||
005 | 20200708113431.0 | ||
008 | 030224s2004 inua 001 0 eng | ||
020 | _a9788131707852 | ||
040 | _cPK | ||
082 | 0 | 0 |
_a005.7/1376 _222 _bC3343 |
100 | 1 | _aCasad, Joe, | |
245 | 1 | 0 |
_aSams teach yourself TCP/IP in 24 hours / _cJoe Casad. |
250 | _a3rd ed. | ||
260 |
_aNew Delhi : _bPearson, _c2007 |
||
300 |
_axv, 455 p. _bill. ; _c24 cm. |
||
500 | _aIncludes index. | ||
650 | 0 | _aTCP/IP (Computer network protocol) | |
942 | _cBK | ||
505 | 0 | _a Introduction. I. Tcp/ip basics. Hour 1. What is tcp/ip? Networks and protocols. The development of tcp/ip. Tcp/ip features. Standards organizations and rfcs. Summary. Q&a. Key terms. Hour 2. How tcp/ip works. The tcp/ip protocol system. Tcp/ip and the osi model. Data packages. A quick look at tcp/ip networking. Summary. Q&a. Key terms. Ii. The tcp/ip protocol system. Hour 3. The network access layer. Protocols and hardware. The network access layer and the osi model. Network architecture. Physical addressing. Anatomy of a frame. Lan technologies. Other network-access technologies. Summary. Q&a. Key terms. Hour 4. The internet layer. Addressing and delivering. Internet protocol (ip). Address resolution protocol (arp). Rarp. Internet control message protocol (icmp). Summary. Q&a. Workshop. Key terms. Hour 5. Subnetting. Subnets in tcp/ip. Converting a subnet mask to dotted decimal notation. Working with subnets. Classless internet domain routing. Summary. Q&a. Key terms. Hour 6. The transport layer. Introducing the transport layer. Transport layer concepts. Understanding tcp and udp. A note about firewalls. Summary. Q&a. Key terms. Hour 7. The application layer. What is the application layer? The tcp/ip application layer and osi. Network services. Apis and the application layer. Operating environments and the application layer. Tcp/ip utilities. Summary. Q&a. Key terms. Hour 8. Dial-up tcp/ip. A look at modems. Serial line internet protocol (slip). Point-to-point protocol (ppp). Summary. Q&a. Key terms. Iii. Networking with tcp/ip. Hour 9. Network hardware. Divided networks. Routing in tcp/ip. Network address translation (nat). Summary. Q&a. Key terms. Hour 10. Routing. Introduction to routing in tcp/ip. Recapping routers. Routing on complex networks. Examining interior routers. Classless routing. Summary. Q&a. Key terms. Hour 11. Name resolution. What is name resolution? Name resolution using hosts files. Dns name resolution. Registering a domain. Managing dns. Dynamic dns. Netbios name resolution. Methods for netbios name resolution. Testing netbios name resolution. Other name resolution services. Summary. Q&a. Workshop. Key terms. Hour 12. Dynamic host configuration protocol (dhcp). The case for server-supplied ip addresses. What is dhcp? How dhcp works. Configuring dhcp. Summary. Q&a. Key terms. Iv. Tcp/ip utilities. Hour 13. Connectivity utilities. Connectivity problems. Protocol dysfunction and misconfiguration. Line problems. Name resolution problems. Network performance problems. Traceroute. Using connectivity utilities to troubleshoot problems. Summary. Q&a. Workshop. Key terms. Hour 14. File transfer and access utilities. File transfer protocol. Trivial file transfer protocol. Remote copy. Integrating network file access. Summary. Q&a. Workshop. Key terms. Hour 15. Remote access utilities. Telnet. Berkeley remote utilities. New directions in remote access. Summary. Q&a. Key terms. V. Tcp/ip and the internet. Hour 16. The internet: a closer look. How the internet looks. What happens on the internet. Summary. Q&a. Key terms. Hour 17. Http, html, and the world wide web. What is the world wide web? A closer look at urls. Understanding html. Understanding http. Advanced html techniques. Xml. The new web. Summary. Q&a. Workshop. Key terms. Hour 18. Email. What is email? How email looks. How email works. Simple mail transfer protocol (smtp). Retrieving the mail. Email readers. Web-based email. Spam. Summary. Q&a. Workshop. Key terms. Hour 19. What hackers do. What is a hacker? What do hackers want? Getting passwords. Other access techniques. Getting comfortable. Getting ready for the next attack. Attacking a network. Denial-of-service attacks. Summary. Key terms. Vi. Advanced topics. Hour 20. Tcp/ip security. Encryption. Securing tcp/ip. Virtual private networks (vpns). Kerberos. Summary. Q&a. Key terms. Hour 21. Network management protocols. Simple network management protocol. Remote monitoring. Summary. Q&a. Key terms. Hour 22. Wireless networks. 802.11 networks. Wireless application protocol (wap). Bluetooth. Summary. Q&a. Key terms. Hour 23. Recent and emerging technologies. Tcp/ip in the future. Ipv6. The view from the client. The view from the server. Web services. What is a computer anyway? Summary. Q&a. Key terms. Hour 24. -implementing a tcp/ip network-seven days in the life of maurice. A brief history of hypothetical, inc. Seven days in the life of maurice. Summary. Q&a. Index. |