作者:empty 页数:160 出版社:empty |
Packet Guide to Core Network ProtocolsTake an in-depth tour of core Internet protocols and learn how theywork together to move data packets from one network to anotherWith this concise book, youll delve into the aspects of each protocol.including operation basics and security risks, and learn the function ofnetwork hardware such as switches and routers.Ideal for beginning network engineers, each chapter in this book includesa set of review questions, as well as practical, hands-on kab exercises.m Understand basic network architecture, and how protocols andm Learn the structure and operation of the Ethernet protocolm Examine TCP/IP, including the addressing, protocol feld s, andExplore the address resolution process in atypical lPv 4 networkm Become fam liar with switches, access points, routers, and otherm Discover how the Internet Control Message Protocol(ICMP)functions fit together
Nu shel Handbook, theN us hel Handbook lopo, and the OReiylogoaretciseredwade marks ofO'Relly Media, Inc Packet Guide ro Core Network Protocols, the image of a helmet shrike, and relatedtrade dress are trademarks of OReilly Media, IncMany of the designations used by manufacturers and sel ers to distinguish their pra ducts are claimed astrade marls.Where these designations appear in this ba ok, and O'Reilly Media, lnc.was aware of atrademark daim, the designations have been pnn ted in caps or initial caps.While every precaution has been taken in the prep a tation of this book, the publi her and author assumenone sponsibility for errors or omissions, or for damages resulting from the use of the information con-tained herein:
PrefaceTrying to find the perfect networking resource or textbook can be a real challenge.Sometimes they are extremely focused on one technology, and thus miss the mark.Orthey are extremely broad, covering every networking idea known to man, This book isabout something that all networks have in common—the core protocols.Networkshave a couple of basic building blocks:routers, switches, access points, and hostsThese building blocks use a particular set of rules when forwarding bits of informationfrom one side of the network to anotherThese bits are wrapped up inane at little package called a packet.Packets have manyqualities, but one thing they never do isle.lfa packet is present, it is there becausesome device or network host put it there.By looking at the packers running on anetwork and understanding the forces{sometimes go nd, sometimes evil) that put themthere, we can gain a deep understanding of how networks operate and what is happening at a given moment.This hook provides the structure(a.k.a.model) used to formulate network transmissions and then dives into the major protocols populating almost every single networktoday:Ethernet, Internet Protocol(IP) , Address Resolution Protocol(ARP) , and theInternet Control Message Protocol(ICMP) , But this is not simply a description of thefoundation protocols.In each chapter, the protocol is analyzed by examining to polo-gies and the packets generated on actual networks.Wire shark is the tool of choice.Itis not only powerful but the folks out at wire shark.org continue to provide it free ofcharge.
Almost all network devices and hosts use tables to make decisions.The packets arconthe network because a table was consulted and the result indicated that a transmissionbe sent.So the packets are the end result Inside these pages you will find discussionand examples of the ARP tables, routing tables, and source address tables.Tying it alltogether will be step-by-step descriptions of the processes used so that the reader willbe able to comple rely trace and understand the content of the packets and the eventswithin the communications architectureOther key components of this book include addressing and equipment operation.Sincelists of addresses are not much use to someone wishing to understand actual behavior,each chapter describes va nation and application of these addresses.A chapter on maskshas also been included because it is such an integrated part of every single networkJust for fun, there is a section on cabling to provide an explanation of why we connectthings the way we doThe sources used in this book are the actual standards as described by the IEEE andITU-T.Wherever possible, RFCs are directly referenced So, if you see i there, it camefrom cit her the original source or an operational networkIn a nutshell, this book will describe the core protocols, tables, and equipment used oncontemporary networks.Each chapter will take topologies and packets from actualnetworks and explain why the packets were generated and the purpose of the contentfound in each, The goal is to provide an in-depth understanding of these components,security concerns, and operation.AudienceFor those not familiar with O'Reil iy books, they commonly do two things:provide lotsof solid information and help with the real world.Ive tried to do the same thing hereSo this book is terrific for anyone trying to understand networks for the first time andanyone who works with the mona regular basisIf you have never run packet capture or analysis software, the first time is always an eyeopener.All those packets whizzing around the network and each one chock full ofarcane information.With this hook as a guide you will be able to interpret what is seenand understand why it is there.For the professional out there, well, we forget things and sometimes get lost in theweeds.When that happens or if you need a refresher, this book is a great reference, notonly i or the chapter content but for the decomposition of the standards as well.Theexpert in the feld will also find many details not explained ese where.Contents of This BookChapter 1, Networking ModelsMany networking texts start with models.but this is models with a twist.Thisbook focuses on the TCP/IP model, and this chapter gives them a place in theuniverse and describes where the focus should be.Backed up with captures andstandards, the models are populated with protocols, equipment, and addresses,Chapter 2, EthernetE the mer provides the basis for avery large percentage of the networks deployedtoday.This chapter discusses the choices of the network administrator whilea ii|Prefaceproviding significant details about operation and configuration.Topologies andcab lng are two other focal points providing further details into actual networkingpractice.