Computer Networking: Internet Protocols in Action
Hands-on networking experience, without the lab!
The best way to learn about network protocols is to see them in action. But that doesn't mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network
Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and follow the text to perform the exercises, gaining a thorough understanding of the material by seeing it in action.
- Practicality: Readers are able to learn by doing, without having to use actual networks. Instructors can add an active learning component to their course without the overhead of collecting the materials.
- Flexibility: This approach has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
- Completeness: The exercises take the reader from the basics of examining quiet and busy networks through application, transport, network, and link layers to the crucial issues of network security.
Table of Contents
Section 1: Getting Started.
1.1 Examining a Quiet Network with Ethereal.
1.2 Protocol Layering.
1.3 Examining a Busy Network Using Filters.
Section 2: Application Layer Protocols.
2.1 Under the Hood of HTTP.
2.2 HTTP Caching, Authorization and Cookies.
2.3 FTP—File Transfer Protocol.
2.4 Sending and Receiving Email with SMTP and POP.
Section 3: Transport Layer Protocols.
3.1 Simple TCP Stream.
3.2 Retransmission in TCP.
3.3 Comparing TCP to UDP.
3.4 Competing TCP and UDP Streams.
Section 4: Network Layer Protocols.
4.1 Joining the Internet: Introduction to IP and DHCP.
4.2 Ping and Traceroute.
4.3 Dynamic Routing with RIP.
Section 5: Link Layer Protocols.
5.1 MAC Addresses.
5.3 Wireless LANs.
Section 6: Security.
6.2 IP Spoofing and TCP Session Stealing.
6.3 System Vulnerabilities.
Sign up now »
- FTSenior Python Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTR&D EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result ...
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
"Too little too late. Spice normally has better standards than this. I ..."
Spiceworks' free management software gets integrated MDM