Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $14.99
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
15Activity

Table Of Contents

Networking Models
What Is a Model?
Why Use a Model?
OSI Model
OSI—Beyond the Layers
OSI/ITU-T Protocols
Introducing TCP/IP
TCP/IP and the RFCs
The Practical Side of TCP/IP
Encapsulation
Equipment
Summary
Additional Reading
Review Questions
Review Answers
Lab Activities
Activity 1—Examining Encapsulation
Activity 2—Protocol Distribution
Activity 3—Developing a Protocol/Architecture
Ethernet
Shared Media
Physical Layer
Cabling
Encoding
10Base-T
100Base-T
1000Base-T
Other Types of Signaling
Link Pulse
Autonegotiation
Topologies
Final Thoughts on Ethernet
Activity 1—Basic Framing
Activity 2—Control Field Values
Activity 3—Addressing
Activity 4—Destination Addresses
Activity 5—Logical Link Control
Internet Protocol
Protocol Description
Addressing
Sample Host Configuration
Operation
Digging a Little Deeper—What Addressing Is Sufficient?
Security Warning
Organizations for Assigning Addresses and Names
Activity 1—Determining IP Address Components
Activity 2—IP Packet Capture
Activity 3—Header Checksum
Activity 4—Fragmentation
Activity 5—Special Address Capture
Address Resolution Protocol
The Problem
Techniques
Addressing in the ARP Request
Addressing in the ARP Reply
Example 1—Sender and Target on the Same LAN
Example 2—Sender and Target on Separate LANs
Additional Operations
The Return ARP
Gratuitous ARP
IPv6
Digging a Little Deeper—The Cost of a Distributed Approach
Activity 1—Determining Your IP Address and Your Default Gateway
Activity 2—Examining the ARP Table
Activity 3—Packet Capture
Activity 4—Gratuitous ARP
Activity 5—How Long Does an ARP Table Entry Live?
Network Equipment
Tables and Hosts
Hubs or Repeaters
Switches and Bridges
Access Points
Routers
Another Gateway
Multilayer Switches and Home Gateways
Activity 1—Traffic Comparison
Activity 2—Layer 2 Trace
Activity 3—Tables
Activity 4—Layer 3 Trace
Activity 5—Traffic Comparison
Internet Control Message Protocol
Operations and Types
Echo Request (Type 0) and Echo Reply (Type 8)
Digging a Little Deeper—The One’s Complement
Activity 1—ping
Activity 2—tracert
Activity 3—Startup Packet Capture
Activity 4—Destination Unreachable from the OS
Activity 5—Destination Unreachable from the Router
Subnetting and Other Masking Acrobatics
How Do We Use the Mask?
Classless Inter-Domain Routing
CIDR and Aggregation Implementation
RFC 4632
Activity 1—What Is Your Network?
Activity 2—Change Your Network
Activity 3—What Is the Address Given to You by Your ISP?
Activity 4—Subnet Calculator
Internet Protocol Version 6
IPv6 Fields
Hexadecimal Decode
Extensions
Global Assignments
Zero Suppression and Special Addressing
Unicast Addresses
Multicast Addresses
Anycast Address
Unspecified Address
Required Addresses
IPv4 and IPv6
MAC Addressing
MAC Addresses and IPv6
Autoconfiguration and EUI-64
Autoconfiguration
Internet Control Message Protocol Version 6
Tunneling
Current Status and IPv6 Day
Activity 1—Build the Topology Shown
Activity 2—Configure the Router IPv6 Addresses
Activity 3—Configure the Hosts with Global Unicast IPv6 Addresses
Activity 4—Explain the Neighbor Discovery Process
Activity 5—EUI-64
Transmission Control Protocol
The Client/Server Model
Reliable Communication
Protocol Structure
Ports
Basic Operation
TCP Sliding Window
Window Size and Performance
Sliding Window Experiment
Silly Window Syndrome
TCP Performance and Congestion Control
Port Scanning
User Datagram Protocol
Dynamic Host Configuration Protocol
Domain Name System
Components
nslookup
Updates for UDP
P. 1
Packet Guide to Core Network Protocols

Packet Guide to Core Network Protocols

Ratings: (0)|Views: 807 |Likes:

Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you’ll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. New chapters examine the transmission control protocol (TCP) and user datagram protocol in detail.

Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.

You’ll explore topics including:

Basic network architecture: how protocols and functions fit together The structure and operation of the Ethernet protocol TCP/IP protocol fields, operations, and addressing used for networks The address resolution process in a typical IPv4 network Switches, access points, routers, and components that process packets TCP details, including packet content and client-server packet flow How the Internet Control Message Protocol provides error messages during network operations How network mask (subnetting) helps determine the network The operation, structure, and common uses of the user datagram protocol

Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you’ll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. New chapters examine the transmission control protocol (TCP) and user datagram protocol in detail.

Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.

You’ll explore topics including:

Basic network architecture: how protocols and functions fit together The structure and operation of the Ethernet protocol TCP/IP protocol fields, operations, and addressing used for networks The address resolution process in a typical IPv4 network Switches, access points, routers, and components that process packets TCP details, including packet content and client-server packet flow How the Internet Control Message Protocol provides error messages during network operations How network mask (subnetting) helps determine the network The operation, structure, and common uses of the user datagram protocol

More info:

Publish date: Jun 3, 2011
Added to Scribd: Aug 15, 2011
Copyright:Traditional Copyright: All rights reservedISBN:9781449313845
List Price: $14.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

08/19/2014

263

9781449313845

$14.99

USD

pdf

You're Reading a Free Preview
Pages 11 to 45 are not shown in this preview.
You're Reading a Free Preview
Pages 56 to 133 are not shown in this preview.
You're Reading a Free Preview
Pages 144 to 152 are not shown in this preview.
You're Reading a Free Preview
Pages 163 to 239 are not shown in this preview.
You're Reading a Free Preview
Pages 250 to 263 are not shown in this preview.

Activity (15)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Gaurav Sinha liked this
shin846 liked this
Chidhuro Owen liked this
Constant Kefrane liked this
Christian liked this
tech_geek liked this
kvijayvino liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->