Computer Networking: Internet Protocols in Action

Book description

Hands-on networking experience, without the lab!

The best way to learn about network protocols is to see them in action. But that doesn't mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network.

Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and follow the text to perform the exercises, gaining a thorough understanding of the material by seeing it in action.

Features

Practicality: Readers are able to learn by doing, without having to use actual networks. Instructors can add an active learning component to their course without the overhead of collecting the materials.

* Flexibility: This approach has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.

Completeness: The exercises take the reader from the basics of examining quiet and busy networks through application, transport, network, and link layers to the crucial issues of network security.

Table of contents

  1. Copyright
  2. Preface
    1. INTRODUCTION
    2. GETTING THE MOST OUT OF THE BOOK AND CD
      1. PACKET TRACES
      2. ORGANIZATION OF THE TEXT
    3. WHY THIS BOOK
      1. CONTACTING THE AUTHOR
  3. Acknowledgments
  4. 1. Getting Started
    1. 1.1. Examining a Quiet Network with Ethereal
      1. 1.1.1. INTRODUCTION
      2. 1.1.2. CONFIGURATION
      3. 1.1.3. EXPERIMENT
        1. 1.1.3.1. USING THE CAPTURE OPTIONS DIALOG
        2. 1.1.3.2. EXAMINING A SHORT TRACE
        3. 1.1.3.3. LIST, PROTOCOL, AND RAW PANES
        4. 1.1.3.4. TRACE SUMMARY STATISTICS
      4. 1.1.4. QUESTIONS
      5. 1.1.5. DISCUSSION AND INVESTIGATION
      6. 1.1.6. RESOURCES
    2. 1.2. Protocol Layering
      1. 1.2.1. INTRODUCTION
      2. 1.2.2. CONFIGURATION
      3. 1.2.3. EXPERIMENT
        1. 1.2.3.1. PROTOCOL HIERARCHY STATISTICS
        2. 1.2.3.2. TCP CONNECTION
        3. 1.2.3.3. FRAME LAYER
        4. 1.2.3.4. ETHERNET LAYER
        5. 1.2.3.5. INTERNET PROTOCOL LAYER
        6. 1.2.3.6. TRANSPORT CONTROL PROTOCOL LAYER
        7. 1.2.3.7. PACKET OVERVIEW
        8. 1.2.3.8. UDP PACKETS
      4. 1.2.4. QUESTIONS
      5. 1.2.5. DISCUSSION AND INVESTIGATION
      6. 1.2.6. RESOURCES
    3. 1.3. Examining a Busy Network Using Filters
      1. 1.3.1. INTRODUCTION
      2. 1.3.2. CONFIGURATION
      3. 1.3.3. EXPERIMENT
        1. 1.3.3.1. CAPTURE FILTERS
        2. 1.3.3.2. COLOR FILTERS
        3. 1.3.3.3. DISPLAY FILTERS
        4. 1.3.3.4. SEARCHING FOR PACKETS
      4. 1.3.4. QUESTIONS
      5. 1.3.5. DISCUSSION AND INVESTIGATION
      6. 1.3.6. RESOURCES
  5. 2. Application Layer Protocols
    1. 2.1. Under the Hood of HTTP
      1. 2.1.1. INTRODUCTION
      2. 2.1.2. CONFIGURATION
      3. 2.1.3. EXPERIMENT
        1. 2.1.3.1. HTTP GET REQUEST
        2. 2.1.3.2. HTTP RESPONSE
        3. 2.1.3.3. MULTIPLE GET REQUESTS PER URL
        4. 2.1.3.4. PLAIN TEXT DATA
        5. 2.1.3.5. MULTIPLE TCP STREAMS
      4. 2.1.4. QUESTIONS
      5. 2.1.5. DISCUSSION AND INVESTIGATION
      6. 2.1.6. RESOURCES
    2. 2.2. HTTP Caching, Authorization, and Cookies
      1. 2.2.1. INTRODUCTION
      2. 2.2.2. CONFIGURATION
      3. 2.2.3. EXPERIMENT
        1. 2.2.3.1. COOKIES
        2. 2.2.3.2. AUTHORIZATION HEADERS
        3. 2.2.3.3. CACHING HEADERS
      4. 2.2.4. QUESTIONS
      5. 2.2.5. DISCUSSION AND INVESTIGATION
      6. 2.2.6. RESOURCES
    3. 2.3. File Transfer Protocol
      1. 2.3.1. INTRODUCTION
      2. 2.3.2. CONFIGURATION
      3. 2.3.3. EXPERIMENT
        1. 2.3.3.1. CONTROL CHANNEL
        2. 2.3.3.2. DATA CHANNELS
      4. 2.3.4. QUESTIONS
      5. 2.3.5. DISCUSSION AND INVESTIGATION
      6. 2.3.6. RESOURCES
    4. 2.4. Sending and Receiving E-mail with SMTP and POP
      1. 2.4.1. INTRODUCTION
      2. 2.4.2. CONFIGURATION
      3. 2.4.3. EXPERIMENT
        1. 2.4.3.1. OUTGOING MAIL
        2. 2.4.3.2. INCOMING MAIL
        3. 2.4.3.3. E-MAIL HEADERS
        4. 2.4.3.4. NO MAIL
      4. 2.4.4. QUESTIONS
      5. 2.4.5. DISCUSSION AND INVESTIGATION
      6. 2.4.6. RESOURCES
  6. 3. Transport Layer Protocols
    1. 3.1. Introduction to TCP
      1. 3.1.1. INTRODUCTION
      2. 3.1.2. CONFIGURATION
      3. 3.1.3. EXPERIMENT
        1. 3.1.3.1. LOCAL TTCP CONNECTION
        2. 3.1.3.2. CONNECTION ESTABLISHMENT
        3. 3.1.3.3. ONE-WAY DATA FLOW
        4. 3.1.3.4. CLOSING A CONNECTION
        5. 3.1.3.5. CONNECTION STATISTICS
        6. 3.1.3.6. REMOTE SSH CONNECTION
      4. 3.1.4. QUESTIONS
      5. 3.1.5. DISCUSSION AND INVESTIGATION
      6. 3.1.6. RESOURCES
    2. 3.2. Retransmission in TCP
      1. 3.2.1. INTRODUCTION
      2. 3.2.2. CONFIGURATION
      3. 3.2.3. EXPERIMENT
        1. 3.2.3.1. LOCAL TTCP CONNECTION
        2. 3.2.3.2. SACK OPTION NEGOTIATED
        3. 3.2.3.3. MISSING PACKETS AND RETRANSMISSION
        4. 3.2.3.4. IMPACT ON SENDING RATE
        5. 3.2.3.5. REMOTE TTCP CONNECTION
      4. 3.2.4. QUESTIONS
      5. 3.2.5. DISCUSSION AND INVESTIGATION
      6. 3.2.6. RESOURCES
    3. 3.3. Comparing TCP to UDP
      1. 3.3.1. INTRODUCTION
      2. 3.3.2. CONFIGURATION
      3. 3.3.3. EXPERIMENT
        1. 3.3.3.1. USING TTCP TO GENERATE TCP AND UDP TRAFFIC
        2. 3.3.3.2. NORMAL DATA TRANSFER IN TCP
        3. 3.3.3.3. NORMAL DATA TRANSFER IN UDP
        4. 3.3.3.4. NO RECEIVER PRESENT FOR TCP AND UDP
      4. 3.3.4. QUESTIONS
      5. 3.3.5. DISCUSSION AND INVESTIGATION
      6. 3.3.6. RESOURCES
    4. 3.4. Competing TCP and UDP Streams
      1. 3.4.1. INTRODUCTION
      2. 3.4.2. CONFIGURATION
      3. 3.4.3. EXPERIMENT
        1. 3.4.3.1. TWO COMPETING TCP STREAMS
        2. 3.4.3.2. UDP COMPETING WITH TCP
        3. 3.4.3.3. TWO COMPETING UDP STREAMS
      4. 3.4.4. QUESTIONS
      5. 3.4.5. DISCUSSION AND INVESTIGATION
      6. 3.4.6. RESOURCES
  7. 4. Network Layer Protocols
    1. 4.1. Joining the Internet: Introduction to IP and DHCP
      1. 4.1.1. INTRODUCTION
      2. 4.1.2. CONFIGURATION
      3. 4.1.3. EXPERIMENT
        1. 4.1.3.1. OBTAINING AN IP ADDRESS VIA DHCP
        2. 4.1.3.2. FRAGMENTATION IN IPv4
        3. 4.1.3.3. PING OVER IPv6
      4. 4.1.4. QUESTIONS
      5. 4.1.5. DISCUSSION AND INVESTIGATION
      6. 4.1.6. RESOURCES
    2. 4.2. Ping and Traceroute
      1. 4.2.1. INTRODUCTION
      2. 4.2.2. CONFIGURATION
      3. 4.2.3. EXPERIMENT
        1. 4.2.3.1. LOCAL AND REMOTE PINGS
        2. 4.2.3.2. LOCAL TRACEROUTE
        3. 4.2.3.3. REMOTE TRACEROUTE
      4. 4.2.4. QUESTIONS
      5. 4.2.5. DISCUSSION AND INVESTIGATION
      6. 4.2.6. RESOURCES
    3. 4.3. Dynamic Routing with RIP
      1. 4.3.1. INTRODUCTION
      2. 4.3.2. CONFIGURATION
      3. 4.3.3. EXPERIMENT
        1. 4.3.3.1. NO RIP ENABLED
        2. 4.3.3.2. RIP ENABLED ON THE ENDPOINTS
        3. 4.3.3.3. RIP ENABLED ON ALL MACHINES BUT ONE
        4. 4.3.3.4. RIP ENABLED END-TO-END
        5. 4.3.3.5. ADDING A LOOP IN THE NETWORK GRAPH
        6. 4.3.3.6. ADJUSTING TO A FAILED LINK
        7. 4.3.3.7. OPEN SHORTEST PATH FIRST
      4. 4.3.4. QUESTIONS
      5. 4.3.5. DISCUSSION AND INVESTIGATION
      6. 4.3.6. RESOURCES
    4. 4.4. Border Gateway Protocol
      1. 4.4.1. INTRODUCTION
      2. 4.4.2. CONFIGURATION
      3. 4.4.3. EXPERIMENT
        1. 4.4.3.1. ESTABLISHING BGP PEERING SESSIONS
        2. 4.4.3.2. WITHDRAWING A ROUTE
        3. 4.4.3.3. REPAIRING A CONNECTION
      4. 4.4.4. QUESTIONS
      5. 4.4.5. DISCUSSION AND INVESTIGATION
      6. 4.4.6. RESOURCES
  8. 5. Link Layer Protocols
    1. 5.1. MAC Addresses and the Address Resolution Protocol (ARP)
      1. 5.1.1. INTRODUCTION
      2. 5.1.2. CONFIGURATION
      3. 5.1.3. EXPERIMENT
        1. 5.1.3.1. ADDRESS RESOLUTION PROTOCOL
        2. 5.1.3.2. MAC ADDRESS SPOOFING
      4. 5.1.4. QUESTIONS
      5. 5.1.5. DISCUSSION AND INVESTIGATION
      6. 5.1.6. RESOURCES
    2. 5.2. Ethernet
      1. 5.2.1. INTRODUCTION
      2. 5.2.2. CONFIGURATION
      3. 5.2.3. EXPERIMENT
        1. 5.2.3.1. ETHERNET SWITCH
        2. 5.2.3.2. ETHERNET HUB
      4. 5.2.4. QUESTIONS
      5. 5.2.5. DISCUSSION AND INVESTIGATION
      6. 5.2.6. RESOURCES
    3. 5.3. Wireless LANs
      1. 5.3.1. INTRODUCTION
      2. 5.3.2. CONFIGURATION
      3. 5.3.3. EXPERIMENT
        1. 5.3.3.1. BEACON FRAMES
        2. 5.3.3.2. WEP DISABLED
        3. 5.3.3.3. DATA FRAMES
        4. 5.3.3.4. WEP ENABLED
      4. 5.3.4. QUESTIONS
      5. 5.3.5. DISCUSSION AND INVESTIGATION
      6. 5.3.6. RESOURCES
  9. 6. Security
    1. 6.1. Encryption
      1. 6.1.1. INTRODUCTION
      2. 6.1.2. CONFIGURATION
      3. 6.1.3. EXPERIMENT
        1. 6.1.3.1. PLAIN TEXT TELNET SESSION
        2. 6.1.3.2. ENCRYPTED SSH SESSION
        3. 6.1.3.3. ATTACKS AGAINST SSH
        4. 6.1.3.4. COMPARING HTTP AND HTTPS
      4. 6.1.4. QUESTIONS
      5. 6.1.5. DISCUSSION AND INVESTIGATION
      6. 6.1.6. RESOURCES
    2. 6.2. IP Spoofing and TCP Session Stealing
      1. 6.2.1. INTRODUCTION
      2. 6.2.2. CONFIGURATION
      3. 6.2.3. EXPERIMENT
        1. 6.2.3.1. TCP SESSION HIJACKING
        2. 6.2.3.2. TCP SESSION TERMINATION
      4. 6.2.4. QUESTIONS
      5. 6.2.5. DISCUSSION AND INVESTIGATION
      6. 6.2.6. RESOURCES
    3. 6.3. System Vulnerabilities
      1. 6.3.1. INTRODUCTION
      2. 6.3.2. CONFIGURATION
      3. 6.3.3. EXPERIMENT
        1. 6.3.3.1. PORT SCANS
        2. 6.3.3.2. BLASTER WORM
      4. 6.3.4. QUESTIONS
      5. 6.3.5. DISCUSSION AND INVESTIGATION
      6. 6.3.6. RESOURCES

Product information

  • Title: Computer Networking: Internet Protocols in Action
  • Author(s): Jeanna Matthews
  • Release date: January 2005
  • Publisher(s): Wiley
  • ISBN: 9780471661863