Understanding Tcp/ip: A Clear And Comprehensive Guide
暫譯: 理解 TCP/IP:清晰且全面的指南
Alena Kabelov¿, Libor Dost¿lek
- 出版商: Packt Publishing
- 出版日期: 2006-02-25
- 售價: $1,740
- 貴賓價: 9.5 折 $1,653
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 190481171X
- ISBN-13: 9781904811718
-
相關分類:
TCP/IP
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$880$704 -
$560$442 -
$690$587 -
$780$616 -
$490$417 -
$780$663 -
$680$537 -
$850$723 -
$550$435 -
$490$387 -
$760$600 -
$650$507 -
$680$537 -
$480$379 -
$720$569 -
$650$514 -
$1,200$948 -
$650$553 -
$590$466 -
$580$458 -
$2,050$1,948 -
$780$616 -
$650$514 -
$600$480 -
$720$569
商品描述
- Chapter 1: Introduction to Network Protocols
- 1.1 ISO OSI
- 1.1.1 Physical Layer
- 1.1.2 Data Link Layer
- 1.1.3 Network Layer
- 1.1.4 Transport Layer
- 1.1.5 Session Layer
- 1.1.6 Presentation Layer
- 1.1.7 Application Layer
- 1.2 TCP/IP
- 1.2.1 Internet Protocol
- 1.2.2 TCP and UDP
- 1.2.3 Application Protocols
- 1.3 Methods of Information Transmission
- 1.3.1 Synchronous Transmission
- 1.3.2 Packet Transmission
- 1.3.3 Asynchronous Transmission
- 1.4 Virtual Circuit
- Chapter 2: Network Monitoring Tools
- 2.1 Packet Drivers
- 2.2 MS Network Monitor
- 2.2.1 Frame Capturing
- 2.2.2 Viewing Captured Frames
- 2.2.3 Filters for Displaying Captured Frames
- 2.3 Ethereal
- 2.4 Homework
- Chapter 3: Physical Layer
- 3.1 Serial Line
- 3.1.1 Serial and Parallel Data Transport
- 3.1.2 Symmetrical and Asymmetrical Signals
- 3.1.3 Synchronous and Asynchronous Transport
- 3.1.4 V.24, V.35, and X.21 Protocols
- 3.1.5 Null Modem
- 3.2 Modems
- 3.2.1 Dial-Up Connection
- 3.2.2 Leased Lines
- 3.2.3 Automatic Modem
- 3.2.3.1 AT Commands
- 3.2.4 Synchronous Transmission
- 3.2.5 Baseband, Voice Band, and ADSL
- 3.2.6 Transmission Rate
- 3.2.6.1 The V.90 Recommendation
- 3.2.7 Data Compression
- 3.2.8 Error Detection
- 3.3 Digital Circuits
- 3.3.1 ISDN
- 3.3.1.1 Basic Rate
- 3.3.1.2 Higher Layer Protocols and Signalization
- 3.3.2 E and T Lines
- 3.4 LAN
- 3.4.1 Structured Cables
- 3.4.1.1 Copper Distribution
- 3.4.1.2 Optical Fibers
- 3.4.2 Ethernet (10 Mbps)
- 3.4.2.1 AUI
- 3.4.2.2 BNC
- 3.4.2.3 Twisted-Pair
- 3.4.3 Fast Ethernet (100 Mbps)
- 3.4.4 Gigabyte Ethernet (1 Gbps)
- Chapter 4: Link Layer
- 4.1 Serial Line Internet Protocol
- 4.2 Compressed SLIP
- 4.3 High-Level Data Link Control Protocol
- 4.3.1 Flag
- 4.3.2 Address Field
- 4.3.3 Control Field
- 4.3.3.1 I-Frame
- 4.3.3.2 S-Frame
- 4.3.3.3 U-Frame
- 4.3.4 Data Field and a Transferred Protocol Type
- 4.3.5 Checksum
- 4.3.6 HDLC Protocol Summary
- 4.4 Point-To-Point Protocol
- 4.4.1 Dialing a Phone Line
- 4.4.2 Link Control Protocol
- 4.4.3 Authentication
- 4.4.3.1 Password Authentication Protocol
- 4.4.3.2 Challenge Handshake Authentication Protocols
- 4.4.3.3 Extensible Authentication Protocol
- 4.4.3.4 Radius Protocol
- 4.4.4 Call-Back Control Protocol
- 4.4.5 Other Protocols
- 4.4.5.1 Multilink Protocol
- 4.4.5.2 Bandwidth Allocation Protocol and Bandwidth Allocation Control Protocol
- 4.4.5.3 Compression Control Protocol
- 4.4.5.4 Encryption Control Protocol
- 4.4.5.5 Setting Encryption Keys
- 4.4.6 Internet Protocol Control Protocol
- 4.5 Frame Relay
- 4.5.1 A Frame Relay Protocol Frame
- 4.5.2 IP Through Frame Relay
- 4.5.3 Local Management Interface
- 4.5.4 Frame Relay Configuration on CISCO Routers
- 4.5.5 Frame Relay Protocol
- 4.6 Local Area Networks
- 4.6.1 Ethernet
- 4.7 Wireless Local Area Network
- 4.7.1 Typical WLAN Configuration
- 4.7.1.1 Peer-To-Peer Networks
- 4.7.1.2 Access Point
- 4.7.1.3 Roaming (Several Access Points)
- 4.7.1.4 Backbone Point-to-Point Connection
- 4.7.2 Antennas
- 4.7.3 Security of WLAN
- 4.7.3.1 Service Set ID
- 4.7.3.2 Wired Equivalent Privacy
- 4.7.3.3 IEEE 802.1X
- 4.8 Fixed Wireless Access
- 4.8.1 The Differences Between FWA and WLAN
- 4.8.2 The Main Benefits of FWA
- Chapter 5: Internet Protocol
- 5.1 IP Datagram
- 5.2. Internet Control Message Protocol
- 5.2.1 Echo
- 5.2.2 Destination Unreachable
- 5.2.3 Source Quench (Lower Sending Speed)
- 5.2.4 Redirect
- 5.2.5 ICMP Router Discovery
- 5.2.6 Time Exceeded
- 5.2.7 Subnet Address Mask Request
- 5.2.8 Time Synchronization
- 5.3 Fragmentation
- 5.4 Optional Entries in the IP Header
- 5.4.1 Record Route
- 5.4.2 Timestamp
- 5.4.3 Source Routing
- 5.4.4 IP Router Alert Option
- 5.5 ARP and RARP Protocols
- 5.5.1 ARP Filtering
- 5.5.2 Proxy ARP
- 5.5.3 Reverse ARP
- 5.6 Internet Group Management Protocol
- 5.7 Multicast and Link Protocol
- Chapter 6: IP Address
- 6.1 Network: First Period of History
- 6.1.1 Special-Use IP Addresses
- 6.1.2 Network Mask
- 6.2 Network: Second Period of History
- 6.2.1 Subnetworks
- 6.2.2 Super-Networks and Autonomous Systems
- 6.3 IP Addresses in the Intranet and Special-Use IP Addresses
- 6.4 Unnumbered Interface
- 6.4.1 Dynamic Address Assignment
- 6.5 Address Plan
- 6.6 Over 254 Interfaces in a LAN
- Chapter 7: Routing
- 7.1 Forwarding and Screening
- 7.2 Routing
- 7.2.1 Processing
- 7.3 Handling Routing Tables
- 7.3.1 List of Contents of a Routing Table in a Command Prompt
- 7.3.1.1 Contents of a Routing Table in UNIX
- 7.3.2 Routing Table Listing in Windows 2000/XP/2003
- 7.3.3 Contents of a Routing Table in Cisco Routers
- 7.3.4 Routing Table Entry Addition and Removal
- 7.4 Routing Protocols
- 7.4.1 Routing Vector Protocols
- 7.4.1.1 RVP Principle
- 7.4.1.2 RIP and RIP2
- 7.4.2 Link State Protocols
- 7.4.2.1 OSPF
- 7.4.3 IPG and EGP
- 7.4.4 Aggregation
- 7.4.5 Redistribution
- 7.5 Neutral Exchange Point
- Chapter 8: IP Version 6
- 8.1 Next Headers of IP Version 6 Datagram
- 8.1.1 Hop-By-Hop Options
- 8.1.2 Routing Header
- 8.1.3 Fragment Header
- 8.1.4 Authentication Header
- 8.1.5 Encapsulating Security Payload Header
- 8.2 ICMP Version 6 Protocol
- 8.2.1 Address Resolution
- 8.2.2 Router Discovery
- 8.2.3 Redirect
- 8.3. IP Addresses
- 8.3.1 Types of Address Inscription
- 8.3.2 Multicasts
- 8.3.3 Unicasts
- 8.4 Windows 2003
- Chapter 9: Transmission Control Protocol
- 9.1 TCP Segments
- 9.2 TCP Header Options
- 9.3 Establishing and Terminating a Connection with TCP
- 9.3.1 Establishing a Connection
- 9.3.2 Terminating a Connection
- 9.3.3 Aborting a Connection
- 9.4 Determining the Connection State
- 9.5 Response Delay Techniques
- 9.6 Window Technique
- 9.7 Network Congestion
- 9.7.1 Slow Start
- 9.7.2 Congestion Avoidance
- 9.7.3 Segment Loss
- 9.8 The Window Scale Factor
- Chapter 10: User Datagram Protocol
- 10.1 Fragmentation
- 10.2 Broadcasts and Multicasts
- Chapter 11: Domain Name System
- 11.1 Domains and Subdomains
- 11.2 Name Syntax
- 11.3 Reverse Domains
- 11.4 Resource Records
- 11.5 DNS Protocol
- 11.6 DNS Query
- 11.6.1 DNS Query Packet Format
- 11.6.2 DNS Query Packet Header
- 11.6.3 Question Section
- 11.6.4 The Answer Section, Authoritative Servers, and Additional Information
- Chapter 12: Telnet
- 12.1 The NVT Protocol
- 12.2 Telnet Protocol Commands
- 12.2.1 Signal for Synchronization
- 12.2.2 The Telnet Command Line
- 12.2.3 Communication Modes
- 12.3 Example of Windows NT Client Communication
- 12.4 Example of UNIX Client Communication
- Chapter 13: File Transfer Protocol
- 13.1 Architecture
- 13.2 Active Mode of FTP Protocol Communication
- 13.3 Passive Mode of FTP Protocol Communication
- 13.4 FTP Commands
- 13.5 Proxy
- 13.6 Return Codes
- 13.7 Abnormal Termination of Data Transfer
- 13.8 Anonymous FTP
- Chapter 14: Hypertext Transfer Protocol
- 14.1 Client-Server
- 14.2 Proxy
- 14.3 Gateway
- 14.4 Tunnel
- 14.5 More Intermediate Nodes
- 14.6 Uniform Resource Identifier
- 14.6.1 The http Scheme
- 14.6.2 The ftp Scheme
- 14.6.3 The mailto Scheme
- 14.6.4 The nntp Scheme
- 14.6.5 The telnet Scheme
- 14.6.6 The file Scheme
- 14.6.7 The pop Scheme
- 14.7 Relative URI
- 14.8 The HTTP Request
- 14.8.1 The GET Method
- 14.8.2 The POST Method
- 14.8.3 The HEAD Method
- 14.8.4 The TRACE Method
- 14.8.5 The OPTIONS Method
- 14.9 The HTTP Response
- 14.9.1 An Overview of Result Codes
- 14.10 Other Header Fields
- 14.10.1 Accept Header Field
- 14.10.2 Client Authentication
- 14.10.3 Proxy Authentication
- 14.10.4 Content Header Field
- 14.10.5 Redirection and Temporary Unavailability of Objects
- 14.10.6 Cache
- 14.10.7 Software Information
- 14.11 Cookie
- 14.11.1 Set-Cookie and Set-Cookie2 Header Fields
- 14.11.1.1 Cookie Header Field
- Chapter 15: Email
- 15.1 Email Architecture
- 15.1.1 DNS and Email
- 15.2 Mail Message Format
- 15.2.1 Basic Header Fields
- 15.3 MIME
- 15.3.1 MIME Header Fields
- 15.3.1.1 MIME-Version
- 15.3.1.2 Content-Type
- 15.3.1.3 Content-Transfer-Encoding
- 15.3.1.4 Content-Disposition
- 15.3.2 Standard Encoding Mechanisms
- 15.3.2.1 Quoted-Printable
- 15.3.2.2 Base64
- 15.3.3 Non-ASCII Text in Message Header Fields
- 15.3.4 Discrete Media Types in Content-Type
- 15.3.4.1 text
- 15.3.4.2 application
- 15.3.4.3 image
- 15.3.4.4 audio
- 15.3.4.5 video
- 15.3.4.6 model
- 15.3.5 Composite Media Types in Content-Type
- 15.3.5.1 multipart
- 15.3.5.2 message
- 15.4 SMTP
- 15.5 ESMTP
- 15.5.1 Message Delivery Receipt
- 15.5.1.1 Delivery Status Notification
- 15.5.1.2 The Disposition-Notification-To Header Field
- 15.6 POP3
- 15.7 IMAP4
- 15.7.1 Unauthenticated State
- 15.7.1.1 LOGIN
- 15.7.1.2 AUTHENTICATE
- 15.7.2 Authenticated State
- 15.7.2.1 CREATE, DELETE, RENAME, and LIST Commands
- 15.7.2.2 SUBSRCIBE, LSUB, and UNSUBSCRIBE Commands
- 15.7.2.3 STATUS
- 15.7.2.4 SELECT and EXAMINE Commands
- 15.7.3 Open Mailbox
- 15.7.3.1 COPY
- 15.7.3.2 SEARCH
- 15.7.3.3 FETCH
- 15.7.3.4 STORE
- 15.7.3.5 EXPUNGE
- 15.7.3.6 CLOSE
- 15.8 Mailing Lists
- Chapter 16: Forums
- 16.1 Message Format
- 16.2 NNTP Protocol
- 16.2.1 End User Communication
- 16.2.2 Communication Among Servers
- 16.2.3 Session Termination
- Chapter 17: Lightweight Directory Access Protocol
- 17.1 Protocol Principle
- 17.2 Data Model of LDAP Directory
- 17.3 LDAP Protocol Data Units
- 17.3.1 The Search Operation
- 17.3.1.1 Filters
- 17.3.2 Further Operations with Entries
- 17.3.2.1 The Add Operation
- 17.3.2.2 The Modify Operation
- 17.3.2.3 The Delete Operation
- 17.3.2.4 The Modify DN Operation
- 17.3.2.5 The Compare Operation
- 17.4 Server Programs
- 17.5 Client Programs
- 17.5.1 The LDAP Browser
- 17.5.2 The OpenLDAP Client
- 17.5.3 ADSIedit
- 17.5.4 MS Outlook Express and MS Outlook
- 17.6 Lightweight Directory Interchange Format
- Appendix A: CISCO Routers
- A.1 Interface Identification
- A.2 Cables
- A.3 Memory
- A.4 Console
- A.5 Commands
- A.5.1 Non-Privileged Mode
- A.5.2 Privileged mode
- A.6 Configuration
- A.6.1 Setting a Password for Privileged Mode
- A.6.2 Web
- A.6.3 ConfigMaker
- A.7 Debugging
商品描述(中文翻譯)
目錄
- 前言
- 第1章:網路協定簡介
- 1.1 ISO OSI
- 1.1.1 實體層
- 1.1.2 資料鏈路層
- 1.1.3 網路層
- 1.1.4 傳輸層
- 1.1.5 會話層
- 1.1.6 表示層
- 1.1.7 應用層
- 1.2 TCP/IP
- 1.2.1 網際網路協定
- 1.2.2 TCP 和 UDP
- 1.2.3 應用協定
- 1.3 資訊傳輸方法
- 1.3.1 同步傳輸
- 1.3.2 封包傳輸
- 1.3.3 非同步傳輸
- 1.4 虛擬電路
- 第2章:網路監控工具
- 2.1 封包驅動程式
- 2.2 MS 網路監控器
- 2.2.1 幀捕獲
- 2.2.2 檢視捕獲的幀
- 2.2.3 顯示捕獲幀的過濾器
- 2.3 Ethereal
- 2.4 作業
- 第3章:實體層
- 3.1 串行線路
- 3.1.1 串行和並行資料傳輸
- 3.1.2 對稱和非對稱信號
- 3.1.3 同步和非同步傳輸
- 3.1.4 V.24、V.35 和 X.21 協定
- 3.1.5 虛擬調製解調器
- 3.2 調製解調器
- 3.2.1 拨號連接
- 3.2.2 租用線路
- 3.2.3 自動調製解調器
- 3.2.3.1 AT 指令
- 3.2.4 同步傳輸
- 3.2.5 基帶、語音頻帶和 ADSL
- 3.2.6 傳輸速率
- 3.2.6.1 V.90 建議
- 3.2.7 數據壓縮
- 3.2.8 錯誤檢測
- 3.3 數位電路
- 3.3.1 ISDN
- 3.3.1.1 基本速率
- 3.3.1.2 高層協定和信號化
- 3.3.2 E 和 T 線路
- 3.4 LAN
- 3.4.1 結構化電纜
- 3.4.1.1 銅分配
- 3.4.1.2 光纖
- 3.4.2 乙太網路 (10 Mbps)
- 3.4.2.1 AUI
- 3.4.2.2 BNC
- 3.4.2.3 纏繞對
- 3.4.3 快速乙太網路 (100 Mbps)
- 3.4.4 千兆乙太網路 (1 Gbps)
- 第4章:鏈路層
- 4.1 串行線路網際網路協定
- 4.2 壓縮 SLIP
- 4.3 高層資料鏈路控制協定
- 4.3.1 標誌
- 4.3.2 地址欄位
- 4.3.3 控制欄位
- 4.3.3.1 I-幀
- 4.3.3.2 S-幀
- 4.3.3.3 U-幀
- 4.3.4 資料欄位和傳輸的協定類型
- 4.3.5 檢查碼
- 4.3.6 HDLC 協定摘要
- 4.4 點對點協定
- 4.4.1 拨打電話線
- 4.4.2 鏈路控制協定
- 4.4.3 認證
- 4.4.3.1 密碼認證協定
- 4.4.3.2 挑戰握手認證協定
- 4.4.3.3 可擴展認證協定
- 4.4.3.4 Radius 協定
- 4.4.4 回撥控制協定
- 4.4.5 其他協定
- 4.4.5.1 多鏈路協定
- 4.4.5.2 頻寬分配協定和頻寬分配控制協定
- 4.4.5.3 壓縮控制協定
- 4.4.5.4 加密控制協定
- 4.4.5.5 設定加密金鑰
- 4.4.6 網際網路協定控制協定
- 4.5 幀中繼
- 4.5.1 幀中繼協定幀
- 4.5.2 通過幀中繼的 IP
- 4.5.3 本地管理介面
- 4.5.4 CISCO 路由器上的幀中繼配置
- 4.5.5 幀中繼協定
- 4.6 區域網路
- 4.6.1 乙太網路
- 4.7 無線區域網路
- 4.7.1 典型 WLAN 配置
- 4.7.1.1 對等網路
- 4.7.1.2 存取點
- 4.7.1.3 漂移 (多個存取點)
- 4.7.1.4 骨幹點對點連接
- 4.7.2 天線
- 4.7.3 WLAN 的安全性
- 4.7.3.1 服務集識別碼
- 4.7.3.2 有線等效隱私
- 4.7.3.3 IEEE 802.1X
- 4.8 固定無線接入
- 4.8.1 FWA 和 WLAN 的差異
- 4.8.2 FWA 的主要好處
- 第5章:網際網路協定
- 5.1 IP 數據報
- 5.2 網際網路控制消息協定
- 5.2.1 回音
- 5.2.2 目的地不可達
- 5.2.3 源抑制 (降低發送速度)
- 5.2.4 重定向
- 5.2.5 ICMP 路由器發現
- 5.2.6 超時
- 5.2.7 子網地址掩碼請求
- 5.2.8 時間同步
- 5.3 分段
- 5.4 IP 標頭中的可選項
- 5.4.1 記錄路由
- 5.4.2 時間戳
- 5.4.3 源路由
- 5.4.4 IP 路由器警報選項
- 5.5 ARP 和 RARP 協定
- 5.5.1 ARP 過濾
- 5.5.2 代理 ARP
- 5.5.3 反向 ARP
- 5.6 網際網路組管理協定
- 5.7 多播和鏈路協定
- 第6章:IP 地址
- 6.1 網路:歷史的第一階段
- 6.1.1 特殊用途 IP 地址
- 6.1.2 網路掩碼
- 6.2 網路:歷史的第二階段
- 6.2.1 子網
- 6.2.2 超網和自治系統
- 6.3 內部網路中的 IP 地址和特殊用途 IP 地址
- 6.4 無編號介面
- 6.4.1 動態地址分配
- 6.5 地址計劃
- 6.6 在 LAN 中超過 254 個介面
- 第7章:路由
- 7.1 轉發和篩選
- 7.2 路由
- 7.2.1 處理
- 7.3 處理路由表
- 7.3.1 命令提示符中的路由表內容
- 7.3.1.1 UNIX 中的路由表內容
- 7.3.2 Windows 2000/XP/2003 中的路由表列出
- 7.3.3 Cisco 路由器中的路由表內容
- 7.3.4 路由表條目的新增和刪除
- 7.4 路由協定
- 7.4.1 路由向量協定
- 7.4.1.1 RVP 原則
- 7.4.1.2 RIP 和 RIP2
- 7.4.2 鏈路狀態協定
- 7.4.2.1 OSPF
- 7.4.3 IPG 和 EGP
- 7.4.4 聚合
- 7.4.5 重新分配
- 7.5 中立交換點
- 第8章:IP 版本 6
- 8.1 IP 版本 6 數據報的下一標頭
- 8.1.1 跳躍選項
- 8.1.2 路由標頭
- 8.1.3 分段標頭
- 8.1.4 認證標頭
- 8.1.5 封裝安全有效載荷標頭
- 8.2 ICMP 版本 6 協定
- 8.2.1 地址解析
- 8.2.2 路由器發現
- 8.2.3 重定向
- 8.3 IP 地址
- 8.3.1 地址註冊類型
- 8.3.2 多播
- 8.3.3 單播
- 8.4 Windows 2003
- 第9章:傳輸控制協定
- 9.1 TCP 段
- 9.2 TCP 標頭選項
- 9.3 使用 TCP 建立和終止連接
- 9.3.1 建立連接
- 9.3.2 終止連接
- 9.3.3 中止連接
- 9.4 確定連接狀態
- 9.5 響應延遲技術
- 9.6 窗口技術
- 9.7 網路擁塞
- 9.7.1 慢啟動
- 9.7.2 擁塞避免
- 9.7.3 段丟失