TCP/IP For Dummies

Paperback
from $0.00

Author: Candace Leiden

ISBN-10: 0470450606

ISBN-13: 9780470450604

Category: Protocols & Standards - Computer Networks

Packed with the latest information on TCP/IP standards and protocols\ TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans.\ The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures...

Search in google:

Keep your network up to date with the latest TCP/IP standards and protocols Now that IPv4 and IPv6 have joined and coexist, TCP/IP administration and standards have had quite a makeover. This book helps you catch up! Learn how to handle blogs and social networks, and get the scoop on new Web protocols, wireless routers, updated hardware, new voice and mobile technologies, security procedures to defend against new threats, and a whole lot more. Stack 'em up — understand the TCP/IP layer stack and protocol stack Pick your system — configure TCP/IP on Windows 7, Windows 2008, Mac OS X, Linux, Unix, Windows Vista, or Windows XP Go wireless — set up a wireless router and network, configure TCP/IP for Wi-Fi, and handle security Safety's your business — learn to use encryption, authentication, digital certificates, and signatures, and set up secure credit card transactions From 4 to 6 — learn to use IPv6 solutions, build IPv6 addresses, and discover the advantages of dual protocol stacks All about e-mail — explore the various e-mail protocols and how to secure and configure clients and services Socialize — create connectivity for blogs, social networking sites, chats, and instant messaging Keep users happy — secure your network and sniff out problems Open the book and find: Six steps to a complete TCP/IP configuration The pros and cons of trusted host files Common-sense best practices for network security How to configure DNS clients and servers Tips for managing cookies What to expect from a VoIP phone system How to set up and secure mobile IP Some different uses for TCP/IP

Foreword.Introduction.About This Book.Conventions Used in This Book.Foolish Assumptions.How This Book Is Organized.PART I: Basics and Buzzwords.PART II: TCP/IP from Soup to Nuts to Desserts.PART III: TCP/IP Stew -- a Little of This, a Pinch of That.PART IV: The Part of Tens.Icons Used in This Book.Where to Go from Here.PART I: Basics and Buzzwords.Chapter 1: Understanding TCP/IP Basics.Pronunciation Guide.Dear Emily Post: What's a Protocol?The Protocol of Open Systems.What's a Transport?The TCP/IP Declaration of Independence.Dedicated to the proposition that all vendors are created equal.Dedicated to the proposition that all operating systems are created equal.Chapter 2: What You Need to Know about Networks.What's a Network?What kinds of devices can be on a network?How does TCP/IP fit into the network?What a Network Can Do for You.What a Network Can Do to You (There's No Such Thing as a Free Lunch).Protocols and Packets and Humpty Dumpty's Fall off the Wall.All the King's horses and all the King's men.… can put your packets together again (with the help of TCP/IP).What's a LAN?How Ethernet works.With this ring.Token ring versus Ethernet.Fast Ethernet, Faster, Fastest and Beyond.What's a WAN?SOHO is Not Just a London Neighborhood.Mother Goose Network Services, Inc..Chapter 3: Client/Server -- the Foundation of Internetworking.What Exactly is Client/Server, Anyway?What client/server is.What client/server isn't.The Server Part of Client/Server.The Client Part ofClient/Server.Client/Server/Server?Are You Being Served?What Does All This Have to Do with TCP/IP?Server Push.Oh … Now I Get It!Chapter 4: TCP/IP and Internets, Intranets, and Extranets.The Internet versus an internet.The Internet is.Is the Internet free?What is the Internet backbone?What's in store for the Internet?Nets, Nets, and More Nets.An intranet is.An extranet is.A Virtual Private Network (VPN) is.Who's in Charge of TCP/IP and the Internet, Anyway?IPv6, the Next Generation of TCP/IP.Chapter 5: Luscious Layers.ISO OSI -- More Than a Palindrome?The ImpOSIble Dream?Taking a Modular Approach to Networking.The ISO OSI seven-layer cake.Layer 1: The physical layer.Layer 2: The data link layer.Layer 3: The network layer.Layer 4: The transport layer.Layer 5: The session layer.Layer 6: The presentation layer.Layer 7: The application layer.Fitting TCP/IP into the Seven-Layer Cake.PART II: TCP/IP from Soup to Nuts to Desserts.Chapter 6: Do You Have a Complete Set of TCP/IP Dinnerware?The TCP/IP Protocol Suite.TCP/IP bowls you over.Protocol, application, or service?The Protocols (and You Thought There Were Only Two!).IP: Internet Protocol.TCP: Transmission Control Protocol.UDP: User Datagram Protocol.ARP: Address Resolution Protocol.RARP: Reverse Address Resolution Protocol.ICMP: Internet Control Message Protocol.FTP: File Transfer Protocol.Telnet.TFTP: Trivial File Transfer Protocol.SNMP: Simple Network Management Protocol.SMTP: Simple Mail Transfer Protocol.POP3: Post Office Protocol, v3.IMAP4: Internet Message Access Protocol, v4.LDAP: Lightweight Directory Access Protocol.NTP: Network Time Protocol.HTTP: HyperText Transfer Protocol.S-HTTP: Secure HTTP.BOOTP: Boot Protocol.RIP, OSPF, BGP: Gateway (Router) Protocols.PPTP: Point to Point Tunneling Protocol.DHCP: Dynamic Host Configuration Protocol.SSL: Secure Sockets Layer.IPSec: IP Security Protocol.RSVP: Resource Reservation Protocol.IPP: The Internet Printing Protocol/1.0.The Kerberos Network Authentication Service.And many, many more.Chapter 7: E-Mail and Beyond -- Shipping and Handling Included.The Medium is the Message (Sometimes).POP3, IMAP4: Your invisible friends.Casper, the friendly MTA.The E-Mail Course at the TCP/IP Banquet.E-mail addresses: @ marks the spot.How can I find someone's e-mail address?SMTP: The Meat and Potatoes.MIME means a lot more than Marcel Marceau.How an SMTP gateway works."Alias Smith and Jones".Is Your E-Mail Secure?Don't let people eavesdrop on your mail.Wall up your network to keep out shady characters.Avoid getting bombed, spammed, or spoofed.Free E-mail with All the Trimmings.Free specialized e-mail services.Not just for English speakers.Free e-mail reminders.Usenet News: Sharing Info over Lunch at the Network Table.Reading the news with a free newsreader.Using newsgroups to find out more about TCP/IP.Use a Web browser and mouse your way through the newsgroup.Are E-Mail and News too Slow For You?Messaging in an instant.Talking the talk.Internet Relay Chat (IRC): TCP/IP's version of CB radio.How do you choose?ET Should Have Used Internet Phone.How Else Can TCP/IP Help You Communicate Over the Internet?Chapter 8: Feasting on Information.How Do Information Services Help Me?What Are Hypertext and Hypermedia?The World Wide Web (WWW).Thanks, but I'm just looking.Mousing across the Web.How Does Information Get on the Web?The Web Is a High-Calorie Feast.Sifting through the information on the Web.Enjoying delectable multimedia.Attend a convention or trade show on the Web.Reducing the Web's Wait.Who's in Charge of the Web?A Few Blasts from the Past Are Still Useful.Using Archie to search FTP archives.Gophers go-fer Internet gold.Gopher a WAIS down the internet.Chapter 9: Share and Share Alike.The FTP Blue Plate Special.Using Anonymous FTP to Get Good Stuff.Choose Your FTP Client Application.Using FTP to Transfer Files.Beyond the Basics (Just a Little).Just looking at a file.FTPing non-text files.Smart FTP Tricks.Using rcp (Not Just Another Copy Program).Chapter 10: Sharing Loaves and Fishes -- NIS and NFS.Fishing for Information with NIS.Figuring out what kind of information you can get with NIS.Understanding why NIS is so popular on intranets.What's Domain idea?Master of your domain.The role of slave servers.The role of the clients.NIS in Action.Behind the scenes at OOPS.The OOPS problem.The OOPS solution.Okay, NIS Is Great -- Are There Pitfalls?Configuration and administration.Performance.Security.NIS+ is a fine kettle of fish.Using NFS to Share Fishes … er, Files.NFS means nifty file sharing.Why is NFS so great?Your home away from home.What about NFS Performance?NFS performance tips.Weighing performance against security.Getting in one another's way.There's interoperability and then there's interoperability.Automounting -- It Sounds Illegal.Mounting.NFS mounting.Now do I get to find out what the automounter is?How about Some NFS Security Tips?NIS and NFS Together.Are NIS and NFS Used on the Internet?WebNFS -- Technology Moves into the Future.What's WebNFS?How to use WebNFS.Chapter 11: Fishing in a Really Big Pond.Getting to Know DNS.DNS = Does Nifty Searches.Client/Server Again -- You Can't Get Away from It.Who's responsible?Name servers and resolvers.DNS's pieces and parts.The Internet's Definition of Domain.Subdomains.The internationalization of the Internet.Fully qualified domain names.Servers, Authority, and Other Techie Stuff.Who's in charge here?The primary is master of the domain.The secondary name servers.Caching servers.Servers, lies, and videotapes.DNS versus NIS.Finding Information about Domains.Where is whois?Your fishing pole: nslookup.WINS (Windows Internet Name Service): Name Resolution According to Microsoft.Chapter 12: Over There, Over There, Do Some Stuff, Do Some Stuff, Over There.The Crepe Place/In Paris = TCP/IP?Sharing Other People's Computers.Cycle stealing -- would you steal a Harley?You can't steal a moped.Why did the hungry user steal cycles? To get to the restaurant on the other side of the network.Using Telnet to Borrow Processing Power.What you need to know before starting telnet.Mastering telnet.The great escape.Serving telnet where you least expect it.Telneting in the palm of your hand.R you Ready for MoRe Remote log-ins?Stealing Cycles with rsh.What? They Don't Trust You? No Problem: Rexec to the Rescue!Another Option for Windows Users: the Multiheaded Beast.Sniffing Out Security Holes with SSH.PART III: TCP/IP Stew -- a Little of This, a Pinch of That.Chapter 13: Nice Names and Agonizing Addresses.What Did You Say Your Computer's Name Was Again?Getting to know you ….Uniquely yours ….What's the Local Hosts File?The Many Faces of IP Addresses.Why bother with a number if the computer has a name?What's in an IP address?How Do I Get an IP Address?The Four Sections of the IPv4 Address.Class A is for a few enormous networks.Class B is for lots of big networks.Class C is for the thousands of small networks.Class D is for multicasting.For Math Nerds Only: Biting Down on Bits and Bytes.Administering Subnets and Subnet Masks.Mask-erading subnets.Why do I have a mask if it's not Halloween?Subnetting 101.Expanding with Supernets and Supernet Masks.A bit makes more than a bit of difference.Supernets -- the bottom line.DHCP Gives Network Administrators Time to Rest.One administrator's nightmare is another's fantasy.Here's how it works -- it's client/server again.Oh no! My lease expired. Am I evicted?Is the Internet Getting Low on Addresses?Will the Internet Ever Run Out of Addresses?CIDR (Classless Inter-Domain Routing) Juices up the Internet.What's CIDR?You say subnet, NEToRAMA says supernet.Back to the Comfort Zone.Chapter 14: Configuring TCP/IP -- Will Someone Please Set the Network Table?Are the Files Already on the Table?Configuring TCP/IP.Configuring TCP/IP on a Windows 95 or Windows 98 Client.Configuring TCP/IP on a Windows 2000 Server.The Local Hosts File.Maintaining a local hosts file.What's in the local hosts file?Improving TCP/IP's digestion of the local hosts file.The Trusted Hosts File.The Trusted Hosts Print File.Freddie's Nightmare: Your Personal Trust File.This is scary. Why would I ever want rhosts?Surprise! The curse of the network administrator lives.The Networks File.The Internet Daemon Configuration File.The Protocols File.The Services File.Dealing with the Devil.Chapter 15: IPv6 -- IP on Steroids.If It Ain't Broke, Don't Fix It -- Well, Maybe it Could Be Improved.Wow! Eight Sections in an IPv6 Address?Don't these long addresses clog network traffic?Why use hexadecimal?There's good news and there's bad news.Shorthand for Non-Stenographers.The leading zero (0000) shortcut.The double colon (::) shortcut.The IPv4 coexistence shortcut.What about Subnet and Supernet Masks?Special IPv6 Addresses.IPv6 -- and the Using Is Easy.Checking out the network buffet with autodiscovery.Let someone else fill your platter -- use autoconfiguration.Autoregistration says "Let us serve you".Other Delicious IPv6 Morsels.Security for all.Faster, better multimedia.Support for real-time applications.Improved support for mobile computing.Sharing the Planet -- IPv6 and IPv4 Can Coexist.Who's Using IPv6?Whew … You Made it!Chapter 16: Is Anyone There?Information, Please.Fingering Your Friends and Enemies.Fingering a user.Fingering the users on a host.Using a Finger Gateway.Knock, Knock -- Who's There?w-ant to Know More?rwho There, You Devil?ruptime, Cousin of rwho.The World According to ARP.The nslookup Utility.The showmount Utility.Reach Out and Touch Something, with ping.ps, We Love You.Afraid to Ask for Directions? Traceroute Tells You Where You're Going.Chapter 17: Mobile-IP, Dialup Networking, and IP Telephony.Mobile-IP for Hassle-Free Travel.Mobilizing security.Mobile-IP -- too good to be true?Connecting with Dialup Protocols.PPP (no, not "the bathroom protocol," silly!).SLIP your way onto the network.Using PPTP to create VPNs (Virtual Private Networks).In UUCP, the U lies and the C misleads.Which dialup solution is for you?Dialup security.Understanding IP Telephony.Who's in charge of IP telephony?VoIP -- Voice information in packets.How can I use VoIP?Chapter 18: The Dreaded Hardware Chapter.Catering a Network Banquet.Are you in charge or did you just come to eat?What's hardware got to do with it?Keep Layers in Mind.Packets Chew through Network Layers.Modem Munchies.Satisfy Your Need for Speed with Other Things That People Call Modems.Cable me up.ISDN: Immediate Surfing Down the Net and DSL: Darn Speedy Linkage.Beam me down, Scotty!Serve Your Guests with Terminal Servers.Stretching the Network Dinner Party into a Banquet.Hubba, Hubba.There's Ethernet and there's Fast Ethernet.Who really needs to go that fast?A Switch in Time Saves Nine Intranet Hassles.Rowter or Rooter? Doesn't Matter.How does routing work, anyway?Routing protocols.Configuring a router on Windows NT Server.Gateways: The Ultimate Interpreters.The Party's Over -- It's Decision Time.Chapter 19: Security -- Will the Bad Guys Please Stand Up?In the Good-Ol' Days.What's Involved in Network Security?Who's responsible for network security?What's the worst that can happen?IPSec (IP Security Protocol).There's good news ….… and bad news.The TCP/IP Banquet Is By Invitation Only.Tales from the crypt.The X-Files -- tales of authentication.To catch a thief.Speaking of telnet -- go beyond the basics.Tunneling through the Internet.Be Aware of Security Pitfalls in Your Applications.Put limits on TFTP.Be careful of what's anonymous.Don't believe everything you read, Part One: E-mail.Don't believe everything you read, Part Two: Usenet news.We trust only Johnny Carson and Walter Cronkite.NFS = No File Stealing!Sweat the small stuff!How Promiscuous Is Your Network Interface Card?Credit Card Shopping on the World Wide Web.How does the S-HTTP (Secure HTTP) protocol help?How does the SSL (Secure Socket Layer) protocol help?E-Commerce -- a Shopper's Dream?Watch out, Big Four!What kind of business can you do over the Internet?What happens when you give a credit card number on the Web.Commonly Held Myths about Network Security.Protecting Your Network.Can you protect the cables?Can you detect an unauthorized host or device on your network?Can you keep unauthorized users off your computers?What's a Firewall?How a firewall works.Types of firewalls.Network management considerations when setting up a firewall.Approaching Secure Environments.Kerberos -- Guardian or Fiend?Playing at Casino Kerberos.Training the dog -- one step per head.Guardian of the Gates of Microsoft.We're CERTainly Interested in Security.PART IV: The Part of Tens.Chapter 20: Ten Reasons to Use TCP/IP.You Dream of Untangling the Web.You Want Free Entertainment.You Want to Sell Your Wares on the Web.You Live to Shop.You Need E-Mail.You Want to Run Programs on Other People's Computers.You Want Someone to Play With.Sneakernet Is Wearing You Out.You Have Files to Procure.Chapter 21: Ten Frequently Asked Questions about TCP/IP and the Internet.What Software Do I Need to Get on the Internet?Do I Need Linux or UNIX to Run TCP/IP?Can I Have a Web Server and Still Have Security?What's CGI?Does the Web have a Card Catalog?What's a Cookie?Can I Catch a Virus by Looking at a Web Page?What's Java?How Do I Read Usenet News Articles?Why Isn't IPv6 Here Yet?Chapter 22: Ten Strange but Real TCP/IP Network Devices (No Kidding!).Soda Machines.Toasters.Squeaks and Squeals from Australia.A Telescope.The Refrigerator.The Streets of Seattle (for Anne Marie).An Interactive Model Railroad.Weather Stations.IBM PC.Space: The Final Frontier on the Web?Beepers.Chapter 23: Watch Your Back -- Ten Practical Security Tips.Be Paranoid.Be CERTain You Know the Dangers.Know What Your Browser is Doing.Keep Your Browser's Security Up-to-Date.Maintain Your Privacy.Cover Your Browser's Tracks in the Windows Registry.Some Yummy Tips About SPAM.Chapter 24: Ten Ways to Get RFCs.Making Friends with the Editor.Finding the RFC Index.Understanding entries in an RFC Index.RFC name format.Using the Web to Get an RFC (and more).Visiting the RFC Editor.Going beyond the RFC Editor.Using Anonymous FTP to Get an RFC.Getting an RFC via e-Mail.Chapter 25: Ten RFCs and Web Sites Worth Tasting.The Whole RFC Catalog.The Hitchhiker's Guide.Nibbling on NetGuide's Net Newbie.It's Official.Trust No One?What Are the Webopedia and Whatis?Reveling in TechFest.Flipping through Internetworking Technology Overview from Cisco Systems.Looking for Something We Missed?A View from Mars.Appendix: About the CD.System Requirements.Using the CD with Microsoft Windows.Using the CD with Linux.What You'll Find.Browsers.Messaging tools.Networking utilities.Reference information.Security applications.If You Have Problems (of the CD Kind).Index.IDG Books Worldwide End-User License Agreement.GNU General Public License.Installation Instructions.Book Registration Information.