Views
4 years ago

[Packt] Understanding TCP IP - A Clear and ... - kumanov.com

[Packt] Understanding TCP IP - A Clear and ... - kumanov.com

[Packt] Understanding TCP IP - A Clear and ... -

  • Page 2 and 3: Understanding TCP/IP A clear and co
  • Page 4 and 5: Credits Authors Libor Dostálek Ale
  • Page 6 and 7: Acknowledgements This book has a lo
  • Page 8 and 9: Table of Contents Chapter 3: Physic
  • Page 10 and 11: Table of Contents 4.7.2 Antennas 12
  • Page 12 and 13: Table of Contents 8.3. IP Addresses
  • Page 14 and 15: Table of Contents 14.8.3 The HEAD M
  • Page 16 and 17: Table of Contents 17.3.2 Further Op
  • Page 18 and 19: Preface Chapter 3 deals with the ph
  • Page 20 and 21: Preface New terms and important wor
  • Page 22 and 23: Introduction to Network Protocols F
  • Page 24 and 25: Introduction to Network Protocols 1
  • Page 26 and 27: Introduction to Network Protocols F
  • Page 28 and 29: Introduction to Network Protocols A
  • Page 30 and 31: Introduction to Network Protocols 1
  • Page 32 and 33: Introduction to Network Protocols 1
  • Page 34 and 35: Introduction to Network Protocols 1
  • Page 36 and 37: Introduction to Network Protocols P
  • Page 38 and 39: Network Monitoring Tools 2.1 Packet
  • Page 40 and 41: Network Monitoring Tools First of a
  • Page 42 and 43: Network Monitoring Tools • Per Se
  • Page 44 and 45: Network Monitoring Tools LCP: Ident
  • Page 46 and 47: Network Monitoring Tools Figure 2.7
  • Page 49 and 50: 3 Physical Layer Protocols of the p
  • Page 51 and 52: Chapter 3 3.1.3 Synchronous and Asy
  • Page 53 and 54:

    Chapter 3 Figure 3.3: Connectors us

  • Page 55 and 56:

    Chapter 3 The dialog between the co

  • Page 57 and 58:

    Chapter 3 We can build the line bet

  • Page 59 and 60:

    Chapter 3 modem). If the computer w

  • Page 61 and 62:

    Chapter 3 Figure 3.7: Telephone cir

  • Page 63 and 64:

    Chapter 3 Modems working in the bas

  • Page 65 and 66:

    Chapter 3 Protocol Transfer Capacit

  • Page 67 and 68:

    Chapter 3 compression to communicat

  • Page 69 and 70:

    Chapter 3 Figure 3.16: Connecting a

  • Page 71 and 72:

    Chapter 3 We recognize two levels o

  • Page 73 and 74:

    Chapter 3 More often, however, you

  • Page 75 and 76:

    Chapter 3 The RJ-45 connector (suga

  • Page 77 and 78:

    Chapter 3 Figure 3.29: Faulty weldi

  • Page 79:

    Chapter 3 TP uses two pairs in the

  • Page 82 and 83:

    Link Layer SLIP protocol is very si

  • Page 84 and 85:

    Link Layer Figure 4.3: IP and TCP h

  • Page 86 and 87:

    Link Layer A compressed header cont

  • Page 88 and 89:

    Link Layer • Normal Response Mode

  • Page 90 and 91:

    Link Layer 4.3.3.1 I-Frame The N(S)

  • Page 92 and 93:

    Link Layer U-frames can carry both

  • Page 94 and 95:

    Link Layer • It can use both asyn

  • Page 96 and 97:

    Link Layer 80 o IPCP (protocol numb

  • Page 98 and 99:

    Link Layer This disconnection phase

  • Page 100 and 101:

    Link Layer The 8-bit ID field is th

  • Page 102 and 103:

    Link Layer LCP: CallBack = 0x06 LCP

  • Page 104 and 105:

    Link Layer the authentication gener

  • Page 106 and 107:

    Link Layer Microsoft has introduced

  • Page 108 and 109:

    Link Layer information would have t

  • Page 110 and 111:

    Link Layer 4.4.5 Other Protocols 4.

  • Page 112 and 113:

    Link Layer 4.4.5.2 Bandwidth Alloca

  • Page 114 and 115:

    Link Layer CCP generally serves to

  • Page 116 and 117:

    Link Layer IPCP uses the following

  • Page 118 and 119:

    Link Layer Figure 4.21: WAN based o

  • Page 120 and 121:

    Link Layer In the physical layer wi

  • Page 122 and 123:

    Link Layer Bit C/R defines if it's

  • Page 124 and 125:

    Link Layer Figure 4.28: BECN signal

  • Page 126 and 127:

    Link Layer There's another option p

  • Page 128 and 129:

    Link Layer In other words, the LAN

  • Page 130 and 131:

    Link Layer Figure 4.34: HUB (repeat

  • Page 132 and 133:

    Link Layer The possible size of the

  • Page 134 and 135:

    Link Layer The structure of the Eth

  • Page 136 and 137:

    Link Layer Figure 4.41: ISO 8802-2

  • Page 138 and 139:

    Link Layer • Indoor environment:

  • Page 140 and 141:

    Link Layer 4.7.1.3 Roaming (Several

  • Page 142 and 143:

    Link Layer Oftentimes, WLANs are us

  • Page 144 and 145:

    Link Layer • The transfer rates a

  • Page 146 and 147:

    Internet Protocol The IP consists o

  • Page 148 and 149:

    Internet Protocol Figure 5.4: Sende

  • Page 150 and 151:

    Internet Protocol The structure of

  • Page 152 and 153:

    Internet Protocol Total IP packet l

  • Page 154 and 155:

    Internet Protocol An ICMP packet he

  • Page 156 and 157:

    Internet Protocol Type Code Descrip

  • Page 158 and 159:

    Internet Protocol 'Router Advertise

  • Page 160 and 161:

    Internet Protocol The destination c

  • Page 162 and 163:

    Internet Protocol • If fragmentat

  • Page 164 and 165:

    Internet Protocol Figure 5.17: IP d

  • Page 166 and 167:

    Internet Protocol The Option number

  • Page 168 and 169:

    Internet Protocol IP: Checksum = 0x

  • Page 170 and 171:

    Internet Protocol Even if the sende

  • Page 172 and 173:

    Internet Protocol could be useful.

  • Page 174 and 175:

    Internet Protocol ETHERNET: Frame L

  • Page 176 and 177:

    Internet Protocol 5.5.2 Proxy ARP T

  • Page 178 and 179:

    Internet Protocol IP address Reserv

  • Page 180 and 181:

    Internet Protocol 2. A request addr

  • Page 182 and 183:

    Internet Protocol The list of accep

  • Page 184 and 185:

    IP Address The problem is how to fi

  • Page 186 and 187:

    IP Address Every network card (netw

  • Page 188 and 189:

    IP Address Mask Number of ones in t

  • Page 190 and 191:

    IP Address Figure 6.4: The Internet

  • Page 192 and 193:

    IP Address Subnetwork in binary not

  • Page 194 and 195:

    IP Address Figure 6.5: The Internet

  • Page 196 and 197:

    IP Address The IP datagram is trans

  • Page 198 and 199:

    IP Address phone: +679-312933 fax-n

  • Page 200 and 201:

    IP Address Figure 6.7: Unnumbered n

  • Page 202 and 203:

    IP Address 6.6 Over 254 Interfaces

  • Page 205 and 206:

    7 Routing IP routing and IP forward

  • Page 207 and 208:

    Chapter 7 Among other things, Figur

  • Page 209 and 210:

    Chapter 7 A router does not sort le

  • Page 211 and 212:

    Chapter 7 The last line in the firs

  • Page 213 and 214:

    The network 224.0.0.0 with the mask

  • Page 215 and 216:

    Chapter 7 The repertoire of command

  • Page 217 and 218:

    Chapter 7 Within the third step (se

  • Page 219 and 220:

    Chapter 7 Router R1 is directly con

  • Page 221 and 222:

    Chapter 7 Figure 7.12: Graph G The

  • Page 223 and 224:

    3. Now, the new vertices of the sub

  • Page 225 and 226:

    Chapter 7 How can a router obtain t

  • Page 227 and 228:

    Chapter 7 Every OSPF router has its

  • Page 229 and 230:

    8 IP Version 6 The original IP vers

  • Page 231 and 232:

    Chapter 8 with each passing datagra

  • Page 233 and 234:

    Chapter 8 Figure 8.2: An example of

  • Page 235 and 236:

    Chapter 8 Table 8.2 shows some of t

  • Page 237 and 238:

    Chapter 8 Figure 8.6: An example of

  • Page 239 and 240:

    Chapter 8 The basic authentication

  • Page 241 and 242:

    Chapter 8 The ICMP type field conta

  • Page 243 and 244:

    Chapter 8 The maximum number of hop

  • Page 245 and 246:

    Chapter 8 ICMP6: ..1...............

  • Page 247 and 248:

    Chapter 8 Additionally, the ICMP me

  • Page 249 and 250:

    Chapter 8 The Redirect ICMP message

  • Page 251 and 252:

    Chapter 8 There can also be dedicat

  • Page 253:

    Chapter 8 Besides the long names of

  • Page 256 and 257:

    Transmission Control Protocol The e

  • Page 258 and 259:

    Transmission Control Protocol The s

  • Page 260 and 261:

    Transmission Control Protocol The c

  • Page 262 and 263:

    Transmission Control Protocol 9.2 T

  • Page 264 and 265:

    Transmission Control Protocol 9.3.1

  • Page 266 and 267:

    Transmission Control Protocol Anoth

  • Page 268 and 269:

    Transmission Control Protocol Figur

  • Page 270 and 271:

    Transmission Control Protocol The f

  • Page 272 and 273:

    Transmission Control Protocol Anoth

  • Page 274 and 275:

    Transmission Control Protocol The s

  • Page 276 and 277:

    Transmission Control Protocol For s

  • Page 278 and 279:

    Transmission Control Protocol The w

  • Page 280 and 281:

    Transmission Control Protocol 9.7 N

  • Page 282 and 283:

    Transmission Control Protocol 9.7.3

  • Page 285 and 286:

    10 User Datagram Protocol User Data

  • Page 287 and 288:

    Chapter 10 If the checksum is calcu

  • Page 289 and 290:

    11 Domain Name System All applicati

  • Page 291 and 292:

    Chapter 11 The names create a tree

  • Page 293 and 294:

    Chapter 11 Figure 11.2: Reverse dom

  • Page 295 and 296:

    Chapter 11 Note that the RR format

  • Page 297 and 298:

    Chapter 11 11.6.1 DNS Query Packet

  • Page 299 and 300:

    Chapter 11 Domain Name System (resp

  • Page 301 and 302:

    Chapter 11 www.google.com: type A,

  • Page 303 and 304:

    12 Telnet Telnet is one of the olde

  • Page 305 and 306:

    Chapter 12 Figure 12.1: Network arc

  • Page 307 and 308:

    Chapter 12 Decimal Notation Command

  • Page 309 and 310:

    Chapter 12 Name Option Decimal Numb

  • Page 311 and 312:

    telnet> or • The user runs the te

  • Page 313 and 314:

    12.2.3 Communication Modes The mode

  • Page 315 and 316:

    T Chapter 12 Client Server Descript

  • Page 317 and 318:

    Chapter 12 Figure 12.4: Client/serv

  • Page 319:

    • ( 28) The server does not suppo

  • Page 322 and 323:

    File Transfer Protocol 13.1 Archite

  • Page 324 and 325:

    File Transfer Protocol • Transmis

  • Page 326 and 327:

    File Transfer Protocol 6. Now we ca

  • Page 328 and 329:

    File Transfer Protocol Client Start

  • Page 330 and 331:

    File Transfer Protocol FTP Command

  • Page 332 and 333:

    File Transfer Protocol The problem

  • Page 334 and 335:

    File Transfer Protocol • 4: A tra

  • Page 336 and 337:

    File Transfer Protocol users for ex

  • Page 338 and 339:

    Hypertext Transfer Protocol Figure

  • Page 340 and 341:

    Hypertext Transfer Protocol In the

  • Page 342 and 343:

    Hypertext Transfer Protocol 14.2 Pr

  • Page 344 and 345:

    Hypertext Transfer Protocol Figure

  • Page 346 and 347:

    Hypertext Transfer Protocol Figure

  • Page 348 and 349:

    Hypertext Transfer Protocol Now, th

  • Page 350 and 351:

    Hypertext Transfer Protocol A rever

  • Page 352 and 353:

    Hypertext Transfer Protocol 14.6.3

  • Page 354 and 355:

    Hypertext Transfer Protocol Figure

  • Page 356 and 357:

    Hypertext Transfer Protocol The res

  • Page 358 and 359:

    Hypertext Transfer Protocol 342 fil

  • Page 360 and 361:

    Hypertext Transfer Protocol 14.9 Th

  • Page 362 and 363:

    Hypertext Transfer Protocol An over

  • Page 364 and 365:

    Hypertext Transfer Protocol this. T

  • Page 366 and 367:

    Hypertext Transfer Protocol However

  • Page 368 and 369:

    Hypertext Transfer Protocol 14.10.7

  • Page 370 and 371:

    Hypertext Transfer Protocol 4. The

  • Page 373 and 374:

    15 Email Electronic mail (email) is

  • Page 375 and 376:

    Chapter 15 Figure 15.1: SMTP archit

  • Page 377 and 378:

    Two protocols are available for usi

  • Page 379 and 380:

    Chapter 15 From the Internet, the m

  • Page 381 and 382:

    15.1.1 DNS and Email Chapter 15 We

  • Page 383 and 384:

    Chapter 15 Header Field Bcc: Messag

  • Page 385 and 386:

    Chapter 15 Header fields carry the

  • Page 387 and 388:

    Chapter 15 15.3.1.3 Content-Transfe

  • Page 389 and 390:

    Chapter 15 15.3.2.2 Base64 Base64 i

  • Page 391 and 392:

    Chapter 15 Example: The last group

  • Page 393 and 394:

    Chapter 15 Example: An MS Word file

  • Page 395 and 396:

    Chapter 15 A delimiter is a special

  • Page 397 and 398:

    Chapter 15 The software creating a

  • Page 399 and 400:

    Chapter 15 Content-type: applicatio

  • Page 401 and 402:

    Chapter 15 Command VRFY address EXP

  • Page 403 and 404:

    Chapter 15 VERB The VERB (Verbose)

  • Page 405 and 406:

    Chapter 15 Figure 15.10: Message de

  • Page 407 and 408:

    Chapter 15 In the previous example,

  • Page 409 and 410:

    Chapter 15 o o Action: Action speci

  • Page 411 and 412:

    Chapter 15 o The disposition-type c

  • Page 413 and 414:

    Chapter 15 Although there are vario

  • Page 415 and 416:

    o BAD (command error, for example,

  • Page 417 and 418:

    Chapter 15 Directory listing in the

  • Page 419 and 420:

    The RENAME command can be used to c

  • Page 421 and 422:

    Chapter 15 15.7.3.1 COPY The COPY c

  • Page 423 and 424:

    Chapter 15 returned data repeats th

  • Page 425 and 426:

    Chapter 15 Examples: 35 store 9:10

  • Page 427:

    Chapter 15 The retrieval of informa

  • Page 430 and 431:

    Forums The problem is in the distri

  • Page 432 and 433:

    Forums 205 closing connection - goo

  • Page 434 and 435:

    Forums ARTICLE 220 148 article Pat

  • Page 436 and 437:

    Forums In reality, news servers are

  • Page 438 and 439:

    Lightweight Directory Access Protoc

  • Page 440 and 441:

    Lightweight Directory Access Protoc

  • Page 442 and 443:

    Lightweight Directory Access Protoc

  • Page 444 and 445:

    Lightweight Directory Access Protoc

  • Page 446 and 447:

    Lightweight Directory Access Protoc

  • Page 448 and 449:

    Lightweight Directory Access Protoc

  • Page 450 and 451:

    Lightweight Directory Access Protoc

  • Page 452 and 453:

    Lightweight Directory Access Protoc

  • Page 454 and 455:

    CISCO Routers For the purposes of t

  • Page 456 and 457:

    CISCO Routers A.1 Interface Identif

  • Page 458 and 459:

    CISCO Routers A simple TFTP server

  • Page 460 and 461:

    CISCO Routers Alternatively, we can

  • Page 462 and 463:

    CISCO Routers As we have mentioned

  • Page 464 and 465:

    CISCO Routers A.6.2 Web If we enter

  • Page 466 and 467:

    CISCO Routers First, we have to spe

  • Page 469 and 470:

    Index A ABM, 71 active close, 252 a

  • Page 471 and 472:

    Direct Sequence Spread Spectrum, 12

  • Page 473 and 474:

    source quench message, 141 structur

  • Page 475 and 476:

    modems about, 40 ADSL, 47 automatic

  • Page 477 and 478:

    advertisement, 229 routing, 189, 19

Understanding TCP/IP Model Internals and Interfaces
TCP/IP and PPP - O'Reilly Media
TCP/IP Services for OpenVMS Technical Update and Strategy
Cross-platform TCP/IP Socket programming in REXX Contents
Well Known Port Numbers - TCP/IP
hp TCP/IP Services for OpenVMS™ V5.5 and Beyond ... - OpenMPE
Use of TCP/IP in stead of APPC interface. - Nordic TWS conference
Understanding IPv6, Third Edition - Cdn.oreilly.com
Discovery IP tech manual.pdf - TierOne Telecommunications
The ABCs of IP Version 6 - Madrid 2002 Global IPv6 Summit
Understanding TCP/IP - Packt Publishing
The Internet and TCP/IP - School of Computer Science and ...
TCP/IP Tutorial and Technical Overview
the-protocols-tcp-ip-illustrated-volume-1.9780201633467.24290
TCP/IP Tutorial and Technical Overview - INSTAT
TCP/IP Tutorial and Technical Overview - CiteSeerX
TCP/IP Tutorial and Technical Overview - IBM Redbooks
Broadband & TCP/IP fundamentals
TCP/IP Fundamentals - Sfisaca.org