| |
| |
Foreword | |
| |
| |
Introduction | |
| |
| |
About This Book | |
| |
| |
Conventions Used in This Book | |
| |
| |
Foolish Assumptions | |
| |
| |
How This Book Is Organized | |
| |
| |
Icons Used in This Book | |
| |
| |
Where to Go from Here | |
| |
| |
| |
TCP/IP Basics and Buzzwords | |
| |
| |
| |
Understanding TCP/IP Basics | |
| |
| |
Pronunciation Guide | |
| |
| |
Dear Emily Post: What's a Protocol? | |
| |
| |
TCP/IP Protocols--Rules for the Internet | |
| |
| |
Checking Out RFCs: The Written Rules | |
| |
| |
What's a Transport? | |
| |
| |
The TCP/IP Declaration of Independence | |
| |
| |
| |
What You Need to Know about Networks | |
| |
| |
What's a Network? | |
| |
| |
Packets, Protocols, and TCP/IP | |
| |
| |
How Ethernet Works | |
| |
| |
How Token Ring Works | |
| |
| |
Getting More Speed | |
| |
| |
Choosing between Ethernet and Token Ring | |
| |
| |
Geographical Types of Networks | |
| |
| |
SOHO Is Not Just a London Neighborhood | |
| |
| |
| |
Internetworking Technologies: Client/Server, P2P, and Grid | |
| |
| |
What Exactly Is Client/Server, Anyway? | |
| |
| |
The Server Part of Client/Server | |
| |
| |
The Client Part of Client/Server | |
| |
| |
Are You Being Served? | |
| |
| |
How TCP/IP Supports Client/Server | |
| |
| |
Recognizing Other Internetworking Styles | |
| |
| |
| |
TCP/IP and Internets, Intranets, and Extranets | |
| |
| |
The Internet versus an internet | |
| |
| |
Who's in Charge of TCP/IP and the Internet, Anyway? | |
| |
| |
What Is an Intranet? | |
| |
| |
What's a Virtual Private Network (VPN)? | |
| |
| |
| |
Getting Technical with Protocols and Addresses | |
| |
| |
| |
Introducing the TCP/IP Model and the Protocols | |
| |
| |
Taking a Modular Approach to Networking | |
| |
| |
The TCP/IP Protocol Suite | |
| |
| |
The Protocols (And You Thought There Were Only Two!) | |
| |
| |
| |
Nice Names and Agonizing Addresses | |
| |
| |
What Did You Say Your Computer's Name Was Again? | |
| |
| |
Translating Host Names into Numbers | |
| |
| |
What's in an IP Address? | |
| |
| |
Getting an IP Address | |
| |
| |
The Four Sections of the IPv4 Address | |
| |
| |
For Math Nerds Only: Biting Down on Bits and Bytes | |
| |
| |
DHCP Gives Network Administrators Time to Rest | |
| |
| |
Will the Internet Ever Run Out of Addresses? | |
| |
| |
Back to the Comfort Zone | |
| |
| |
| |
Not Enough Addresses? Try Subnets, DHCP, CIDR, NAT | |
| |
| |
Working with Subnets and Subnet Masks | |
| |
| |
DHCP Gives Network Administrators Time to Rest | |
| |
| |
CIDR (Classless Inter-Domain Routing) Juices Up the Internet | |
| |
| |
NAT (Network Address Translation) | |
| |
| |
| |
Configuring TCP/IP | |
| |
| |
Setting Up and Configuring TCP/IP: The Basic Steps | |
| |
| |
Configuring Clients to Use TCP/IP | |
| |
| |
Configuring a Server to Use TCP/IP | |
| |
| |
The Network Files | |
| |
| |
Dealing with the Devil | |
| |
| |
| |
IPv6--IP on Steroids | |
| |
| |
If It Ain't Broke, Don't Fix It--Well, Maybe It Could Be Improved | |
| |
| |
Wow! Eight Sections in an IPv6 Address? | |
| |
| |
Shorthand for Non-Stenographers | |
| |
| |
What about Subnet and Supernet Masks? | |
| |
| |
Special IPv6 Addresses | |
| |
| |
IPv6--and the Using Is Easy | |
| |
| |
Setting Up IPv6 | |
| |
| |
Other Delicious IPv6 Morsels | |
| |
| |
Sharing the Planet--IPv6 and IPv4 Can Coexist | |
| |
| |
Welcome to the 6Bone | |
| |
| |
When ... You Made It! | |
| |
| |
| |
Using and Configuring TCP/IP Services | |
| |
| |
| |
Resolving Names and Addresses with DNS | |
| |
| |
Getting to Know DNS | |
| |
| |
DNS = Does Nifty Searches | |
| |
| |
Revisiting Client/Server--You Can't Get Away from It | |
| |
| |
The Internet's Definition of Domain | |
| |
| |
Servers, Authority, and Other Techie Stuff | |
| |
| |
Configuring a DNS Client | |
| |
| |
| |
E-Mail and Other Communication Services | |
| |
| |
Is E-Mail TCP/IP? | |
| |
| |
E-Mail Addresses: @ Marks the Spot | |
| |
| |
Understanding How Internet Mail Works | |
| |
| |
Setting Up Your MUA | |
| |
| |
Mutt | |
| |
| |
"Alias Smith and Jones" | |
| |
| |
Configuring a Mail Server (MTA) | |
| |
| |
Interconnecting Internet Mail with Proprietary Mail | |
| |
| |
Free E-Mail with All the Trimmings | |
| |
| |
Going Beyond E-Mail with Usenet News | |
| |
| |
Are E-Mail and News Too Slow for You? | |
| |
| |
ET Should Have Used Internet Phone | |
| |
| |
| |
Getting Started with Web Clients and Servers | |
| |
| |
What Are Hypertext and Hypermedia? | |
| |
| |
Understanding How Web Browsers Work | |
| |
| |
How Does Information Get on the Web? | |
| |
| |
Using Your Search Engine | |
| |
| |
Web Services | |
| |
| |
Reducing the Web's Wait | |
| |
| |
Who's in Charge of the Web? | |
| |
| |
| |
Sharing Files with FTP and rcp | |
| |
| |
The FTP Blue Plate Special | |
| |
| |
Using Anonymous FTP to Get Good Stuff | |
| |
| |
Choosing Your FTP Client Application | |
| |
| |
Using FTP to Transfer Files | |
| |
| |
Beyond the Basics (Just a Little) | |
| |
| |
Smart FTP Tricks | |
| |
| |
Installing and Configuring an FTP Server | |
| |
| |
Using rcp (Not Just Another Copy Program) | |
| |
| |
| |
Sharing Compute Power across a Network | |
| |
| |
Sharing Other People's Computers | |
| |
| |
Telnet: A Protocol, Application, and Service | |
| |
| |
R you Ready foR MoRe Remote log-ins? | |
| |
| |
Stealing Cycles with rsh | |
| |
| |
What? They Don't Trust You? No Problem: rexec to the Rescue! | |
| |
| |
Sniffing Out Security Holes with SSH | |
| |
| |
Working with Secure Clients and Servers | |
| |
| |
Using a Secure telnet Client with a Secure Server | |
| |
| |
The Most Important telnet Tip for Servers | |
| |
| |
The Second Most Important telnet Tip for Servers | |
| |
| |
Stealing Cycles on a Very Large Scale | |
| |
| |
| |
Mobile IP, Dialup Networking, and IP Telephony | |
| |
| |
Mobile IP for Hassle-Free Travel | |
| |
| |
Connecting with Dialup Protocols | |
| |
| |
Understanding IP Telephony | |
| |
| |
| |
Network Hardware and Security | |
| |
| |
| |
The Dreaded Hardware Chapter | |
| |
| |
What's Hardware Got to Do with It? | |
| |
| |
Keep Layers in Mind | |
| |
| |
Packets Chew through Network Layers | |
| |
| |
Modems | |
| |
| |
Satisfy Your Need for Speed with Other Things That People Call Modems | |
| |
| |
Stretching the Network | |
| |
| |
Rowter or Rooter? Dosesn't Matter | |
| |
| |
Choosing a Router | |
| |
| |
Configuring a Router on Windows NT Server | |
| |
| |
Getting Started with Routing Protocols | |
| |
| |
Gateways: The Ultimate Interpreters | |
| |
| |
The Party's Over--It's Decision Time | |
| |
| |
| |
Troubleshooting Connectivity Problems Step by Step | |
| |
| |
Getting Started with ping | |
| |
| |
Chasing Network Problems Step by Step | |
| |
| |
Using ps to Diagnose Network Services | |
| |
| |
| |
Protecting and Monitoring Network Security | |
| |
| |
Looking Back at Early Security | |
| |
| |
What's Involved in Network Security? | |
| |
| |
Jump-starting Security in Only Four Steps | |
| |
| |
Sweating the Small Stuff! | |
| |
| |
Using Built-in Security Tools | |
| |
| |
Protecting Your Network | |
| |
| |
Introducing Firewalls | |
| |
| |
Analyzing Windows Internet Security | |
| |
| |
| |
Securing E-Mail and Other TCP/IP Applications | |
| |
| |
Don't Believe Everything You Read, Part One: E-Mail | |
| |
| |
Don't Believe Everything You Read, Part Two: Usenet News | |
| |
| |
Passwords May Not Be As Safe As You Think | |
| |
| |
Be Aware of Security Pitfalls in Your Applications and Services | |
| |
| |
| |
Advanced Security | |
| |
| |
Getting Started with Encryption and Authentication | |
| |
| |
Kerberos--Guardian or Fiend? | |
| |
| |
Using Secure Protocols for Secure Internet Transactions | |
| |
| |
IPSec (IP Security Protocol) | |
| |
| |
Getting Started with VPNs (Virtual Private Networks) | |
| |
| |
| |
The Part of Tens | |
| |
| |
| |
Ten Strange but Real TCP/IP Network Devices (No Kidding!) | |
| |
| |
Soda Machines | |
| |
| |
Toasters | |
| |
| |
You Better Watch Out, You Better Not Pout | |
| |
| |
From the North Pole to the South Pole | |
| |
| |
A Telescope in California | |
| |
| |
The Refrigerator | |
| |
| |
The Streets of Seattle (for Anne Marie) | |
| |
| |
An Interactive Model Railroad | |
| |
| |
Tend a Garden Even If You Have No Land | |
| |
| |
Space: The Final Frontier on the Web? | |
| |
| |
| |
Watch Your Back--Ten Practical Security Tips | |
| |
| |
Protecting Your Business | |
| |
| |
Take a Free "Snoop Test" | |
| |
| |
Browse Anonymously | |
| |
| |
Use Secure Clients | |
| |
| |
Use Secure Servers | |
| |
| |
Be CERTain You Know the Dangers | |
| |
| |
Know What Your Browser Is Doing | |
| |
| |
Keep Security Up-to-Date | |
| |
| |
Clear the Browser Cache | |
| |
| |
Cover Your Browser's Tracks in the Windows Registry | |
| |
| |
| |
Ten Ways to Get RFCs | |
| |
| |
Making Friends with the Editor | |
| |
| |
Finding the RFC Index | |
| |
| |
Using the Web to Get an RFC (And More) | |
| |
| |
Using Anonymous FTP to Get an RFC | |
| |
| |
Getting an RFC via E-Mail | |
| |
| |
| |
About the CD | |
| |
| |
System Requirements | |
| |
| |
Using the CD with Microsoft Windows | |
| |
| |
Using the CD with Linux or UNIX | |
| |
| |
Using the CD with the Mac OS | |
| |
| |
What You'll Find | |
| |
| |
Bonus chapters | |
| |
| |
Browsers | |
| |
| |
Messaging and IP telephony tools | |
| |
| |
Networking utilities and tools | |
| |
| |
Reference information | |
| |
| |
Security applications | |
| |
| |
Troubleshooting the CD | |
| |
| |
Index | |