|
|
1 | (16) |
|
1.1 The TCP/IP Protocol Suite |
|
|
1 | (12) |
|
|
2 | (1) |
|
1.1.1.1 Current Applications |
|
|
2 | (8) |
|
1.1.1.2 Emerging Applications |
|
|
10 | (3) |
|
|
13 | (4) |
|
1.2.1 Examining the TCP/IP Protocol Suite |
|
|
13 | (1) |
|
1.2.2 IP and MAC Addressing |
|
|
14 | (1) |
|
1.2.3 Transport Layer Protocols |
|
|
14 | (1) |
|
1.2.4 Working with the Command Prompt |
|
|
15 | (1) |
|
1.2.5 Windows Built-in Networking Tools |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Chapter 2 Examining the TCP/IP Protocol Suite |
|
|
17 | (16) |
|
|
17 | (7) |
|
2.1.1 OSI Reference Model Layers |
|
|
19 | (1) |
|
2.1.1.1 Layer 1: The Physical Layer |
|
|
19 | (1) |
|
2.1.1.2 Layer 2: The Data Link Layer |
|
|
19 | (1) |
|
2.1.1.3 Layer 2 Subdivision |
|
|
20 | (1) |
|
2.1.1.4 Layer 3: The Network Layer |
|
|
20 | (2) |
|
2.1.1.5 Layer 4: The Transport Layer |
|
|
22 | (1) |
|
2.1.1.6 Layer 5: The Session Layer |
|
|
22 | (1) |
|
2.1.1.7 Layer 6: The Presentation Layer |
|
|
23 | (1) |
|
2.1.1.8 Layer 7: The Application Layer |
|
|
23 | (1) |
|
|
23 | (1) |
|
2.2 The TCP/IP Protocol Suite |
|
|
24 | (6) |
|
2.2.1 The TCP/IP Network Layer |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
2.2.3 The Transport Layer |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
2.2.4 The Application Layer |
|
|
29 | (1) |
|
2.3 Data Flow within a TCP/IP Network |
|
|
30 | (1) |
|
|
31 | (2) |
|
Chapter 3 Addressing at Layers 2 and 3 and the Internet Protocol |
|
|
33 | (76) |
|
|
34 | (16) |
|
3.1.1 Ethernet Frame Operations |
|
|
34 | (2) |
|
|
36 | (8) |
|
3.1.1.2 Full Duplex and the PAUSE Frame |
|
|
44 | (2) |
|
|
46 | (2) |
|
|
48 | (1) |
|
3.1.1.5 Frame Determination |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (12) |
|
3.3.1 Standards Evolution |
|
|
52 | (1) |
|
|
52 | (3) |
|
3.3.2 Frame Format Modifications |
|
|
55 | (1) |
|
3.3.2.1 Carrier Extension |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
3.4.2.3 Backplane 10 GBps Ethernet |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (8) |
|
|
63 | (1) |
|
3.5.2 Hlen and Total Length Fields |
|
|
63 | (1) |
|
3.5.3 Type of Service Field |
|
|
64 | (1) |
|
3.5.4 Identification Field |
|
|
65 | (1) |
|
|
66 | (1) |
|
3.5.6 Fragment Offset Field |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (4) |
|
|
71 | (1) |
|
3.5.10 Source and Destination Address Fields |
|
|
71 | (1) |
|
3.5.11 Options and Padding Fields |
|
|
71 | (1) |
|
|
71 | (20) |
|
|
72 | (1) |
|
|
73 | (1) |
|
3.6.3 Basic Addressing Scheme |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
3.6.3.3 Address Composition and Notation |
|
|
76 | (1) |
|
3.6.3.4 Special IPv4 Addresses |
|
|
77 | (5) |
|
3.6.3.5 Subnetting and the Subnet Mask |
|
|
82 | (8) |
|
3.6.3.6 Classless Networking |
|
|
90 | (1) |
|
|
91 | (8) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
3.7.4 Payload Length Field |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
3.7.7 Source and Destination Address Fields |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
3.7.7.3 Address Allocation |
|
|
96 | (1) |
|
3.7.8 Provider-Based Unicast Addresses |
|
|
97 | (1) |
|
3.7.9 Multicast Addresses |
|
|
97 | (1) |
|
3.7.10 Transporting IPv4 Addresses |
|
|
98 | (1) |
|
|
99 | (10) |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
103 | (4) |
|
|
107 | (2) |
|
Chapter 4 Transport Layer Protocols |
|
|
109 | (24) |
|
|
109 | (19) |
|
|
110 | (1) |
|
4.1.1.1 Source and Destination Port Fields |
|
|
110 | (4) |
|
4.1.1.2 Sequence and Acknowledgment Number Fields |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
4.1.1.7 Urgent Pointer Field |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
4.1.2 Connection Establishment |
|
|
118 | (1) |
|
4.1.2.1 Connection Function Calls |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
4.1.3 The Three-Way Handshake |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
|
123 | (2) |
|
4.1.3.3 Avoiding Congestion |
|
|
125 | (2) |
|
4.1.4 TCP Retransmissions |
|
|
127 | (1) |
|
4.1.5 Session Termination |
|
|
127 | (1) |
|
|
128 | (5) |
|
|
128 | (1) |
|
4.2.1.1 Source and Destination Port Fields |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (3) |
|
Chapter 5 Working with the Command Prompt |
|
|
133 | (26) |
|
5.1 The Command Prompt Location |
|
|
133 | (5) |
|
|
136 | (1) |
|
5.1.2 Positioning upon Opening |
|
|
137 | (1) |
|
5.1.3 Controlling the Command Prompt Window |
|
|
137 | (1) |
|
5.2 Working with Function Keys and Commands |
|
|
138 | (21) |
|
|
139 | (1) |
|
5.2.2 Repertoire of Commands |
|
|
139 | (2) |
|
|
141 | (3) |
|
|
144 | (1) |
|
5.2.3 Controlling Output and Additional Commands |
|
|
145 | (1) |
|
5.2.3.1 Redirection Methods |
|
|
145 | (6) |
|
5.2.3.2 Other Useful Commands |
|
|
151 | (5) |
|
|
156 | (3) |
|
Chapter 6 Windows Built-In Networking Tools |
|
|
159 | (82) |
|
|
159 | (5) |
|
|
162 | (1) |
|
|
162 | (1) |
|
6.1.3 Using the Round-Trip Delay |
|
|
163 | (1) |
|
|
164 | (3) |
|
|
167 | (1) |
|
|
167 | (3) |
|
|
170 | (5) |
|
6.4.2 The Release and Renew Options |
|
|
173 | (1) |
|
6.4.3 The Flushdns Option |
|
|
174 | (1) |
|
6.4.4 The Displaydns Option |
|
|
174 | (1) |
|
|
175 | (4) |
|
6.5.1 Reverse ARP (RARP) and ARP and IPv6 |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (10) |
|
|
181 | (1) |
|
|
181 | (2) |
|
|
183 | (1) |
|
6.7.1.3 The -e and -s Switches |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
6.7.1.7 The -p Switch and Interval Use |
|
|
186 | (1) |
|
|
187 | (4) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (8) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
6.8.3 The Destination Option |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
6.8.7 The If Interface Option |
|
|
195 | (1) |
|
|
195 | (1) |
|
6.8.8.1 The IPv4 Routing Table |
|
|
196 | (1) |
|
6.8.8.2 The IPv6 Routing Table |
|
|
197 | (2) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
203 | (18) |
|
6.11.1 The Net Accounts Command |
|
|
204 | (1) |
|
6.11.1.1 Net Accounts Options |
|
|
204 | (2) |
|
6.11.2 The Net Computer Option |
|
|
206 | (1) |
|
6.11.3 The Net Config Option |
|
|
206 | (1) |
|
6.11.4 The Net Continue, Start, and Stop Options |
|
|
206 | (1) |
|
6.11.5 The Net File Option |
|
|
207 | (1) |
|
6.11.6 The Net Group Option |
|
|
207 | (2) |
|
|
209 | (1) |
|
6.11.8 The Net Send Command |
|
|
209 | (1) |
|
6.11.9 The Net Localgroup Option |
|
|
210 | (1) |
|
6.11.10 The Net Share Command Option |
|
|
210 | (3) |
|
6.11.11 The Net Session Command |
|
|
213 | (1) |
|
6.11.12 The Net Statistics Command |
|
|
214 | (3) |
|
6.11.13 The Net Time Command |
|
|
217 | (1) |
|
6.11.14 The Net Use Command |
|
|
218 | (3) |
|
6.12 The Net User Command |
|
|
221 | (3) |
|
|
224 | (17) |
|
6.13.1 The Netsh Wlan Command |
|
|
228 | (3) |
|
6.13.1.1 The Add Subcommand |
|
|
231 | (2) |
|
6.13.1.2 The Connect Subcommand |
|
|
233 | (1) |
|
6.13.1.3 The Delete Subcommand |
|
|
234 | (2) |
|
6.13.1.4 The Export Profile Subcommand |
|
|
236 | (2) |
|
6.13.1.5 Other Netsh Wlan Functions |
|
|
238 | (3) |
|
Chapter 7 Network Monitoring with Wireshark and WinDump |
|
|
241 | (58) |
|
|
241 | (28) |
|
|
241 | (1) |
|
7.1.2 Obtaining the Program |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (1) |
|
7.1.4.2 Examining a Packet |
|
|
247 | (3) |
|
7.1.4.3 File Menu Options |
|
|
250 | (1) |
|
7.1.5 Working with Filters |
|
|
250 | (3) |
|
7.1.5.1 Filter Expressions |
|
|
253 | (1) |
|
7.1.5.2 Applying a Filter |
|
|
254 | (2) |
|
|
256 | (1) |
|
|
256 | (1) |
|
7.1.6.2 Protocol Hierarchy |
|
|
257 | (1) |
|
|
257 | (2) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
7.1.6.7 Conversation List |
|
|
260 | (1) |
|
7.1.6.8 Endpoint List and Other Entries |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (2) |
|
|
263 | (2) |
|
|
265 | (4) |
|
|
269 | (1) |
|
|
269 | (30) |
|
|
270 | (1) |
|
7.2.1.1 Initial Operation |
|
|
271 | (1) |
|
7.2.1.2 Selecting an Interface |
|
|
271 | (2) |
|
|
273 | (1) |
|
7.2.1.4 Using Multiple Switches |
|
|
274 | (2) |
|
|
276 | (12) |
|
7.2.2 WinDump Expressions |
|
|
288 | (1) |
|
|
288 | (2) |
|
7.2.2.2 Expression Primitives |
|
|
290 | (1) |
|
7.2.2.3 Relationship Operators |
|
|
290 | (1) |
|
7.2.2.4 Utilization Examples |
|
|
290 | (9) |
|
Chapter 8 Network Intrusion and Security |
|
|
299 | (46) |
|
|
299 | (23) |
|
|
300 | (2) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (3) |
|
8.1.3.2 Packet Logger Mode |
|
|
307 | (1) |
|
8.1.3.3 Network Intrusion Detection System Mode |
|
|
308 | (2) |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
312 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
8.1.4.13 The -k and -K Switches |
|
|
315 | (1) |
|
8.1.4.14 The -l and -L Switches |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
8.1.4.17 The -p and -P Switches |
|
|
317 | (1) |
|
|
317 | (1) |
|
8.1.4.19 The -r and -R Switches |
|
|
318 | (1) |
|
8.1.4.20 The -s and -S Switches |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
8.1.4.23 The -v and -V Switches |
|
|
318 | (1) |
|
|
318 | (1) |
|
8.1.4.25 The -X and -x Switches |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
8.1.5 Network Intrusion Detection System Mode |
|
|
319 | (3) |
|
8.2 Using Spyware Blaster |
|
|
322 | (10) |
|
8.2.1 Obtaining the Program |
|
|
323 | (2) |
|
|
325 | (2) |
|
8.2.2.1 Restricted Site Protection |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
8.2.4 Checking for Updates |
|
|
331 | (1) |
|
|
332 | (6) |
|
|
332 | (3) |
|
|
335 | (3) |
|
8.4 AXCrypt File Encryption |
|
|
338 | (7) |
|
|
340 | (1) |
|
|
340 | (5) |
|
Chapter 9 Enhancing Network Performance |
|
|
345 | (16) |
|
9.1 Third-Party Networking Tools |
|
|
345 | (7) |
|
|
346 | (1) |
|
|
347 | (1) |
|
9.1.3 Miscellaneous Networking Tools |
|
|
348 | (1) |
|
9.1.4 Network Information |
|
|
349 | (1) |
|
9.1.5 Other Sites to Consider |
|
|
349 | (1) |
|
|
350 | (2) |
|
9.2 Windows Built-in Networking Tools |
|
|
352 | (9) |
|
|
352 | (2) |
|
9.2.2 Why Disk Defragmentation Matters |
|
|
354 | (1) |
|
|
355 | (3) |
|
|
358 | (3) |
Index |
|
361 | |