Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security


Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how...

See more details below
Other sellers (Paperback)
  • All (8) from $52.40   
  • New (5) from $52.40   
  • Used (3) from $86.90   
Sending request ...


Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

Read More Show Less

Product Details

  • ISBN-13: 9781466511064
  • Publisher: Taylor & Francis
  • Publication date: 11/27/2012
  • Pages: 390
  • Sales rank: 1,124,441
  • Product dimensions: 6.10 (w) x 9.10 (h) x 1.10 (d)

Table of Contents

The TCP/IP Protocol Suite
Current Applications
Emerging Applications
Book Preview
Examining the TCP/IP Protocol Suite
IP and MAC Addressing
Transport Layer Protocols
Working with the Command Prompt
Windows Built-In Networking Tools
Network Monitoring
Network Security
Efficiency Methods

Examining the TCP/IPProtocol Suite
ISO Reference Model
OSI Reference Model Layers
Layer 1: The Physical Layer
Layer 2: The Data Link Layer
Layer 2 Subdivision
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer
Data Flow
The TCP/IP Protocol Suite
The TCP/IP Network Layer
IPv4 Addressing
IPv6 Addressing
The Transport Layer
The Application Layer
Data Flow within a TCP/IP Network

Addressing at Layers2 and 3 and the Internet Protocol
Data Link Addressing
Ethernet Frame Operations
Basic Ethernet
Full Duplex and the PAUSE Frame
vLAN Tagging
SNAP Frames
Frame Determination
Fast Ethernet
4B5B Coding
Interframe Gap
Gigabit Ethernet
Standards Evolution
Frame Format Modifications
Carrier Extension
Half-Duplex Use
Frame Bursting
Jumbo Frames
Gigabit Ethernet
Fiber Standards
Backplane 10 GBps Ethernet
The IPv4 Header
Vers Field
Hlen and Total Length Fields
Type of Service Field
Identification Field
Flags Field
Fragment Offset Field
Time to Live Field
Protocol Field
Checksum Field
Source and Destination Address Fields
Options and Padding Fields
IPv4 Addressing
Basic Addressing Scheme
Address Classes
Address Formats
Address Composition and Notation
Special IPv4 Addresses
Subnetting and the Subnet Mask
Classless Networking
The IPv6 Header
Ver Field
Priority Field
Flow Label Field
Payload Length Field
Next Header Field
Hop Limit Field
Source and Destination Address Fields
Address Types
Address Notation
Address Allocation
Provider-Based Unicast Addresses
Multicast Addresses
Transporting IPv4 Addresses
LAN Delivery

Transport Layer Protocols
TCP Header
Source and Destination Port Fields
Sequence and Acknowledgment Number Fields
Hlen Field
Code Bit Field
Window Field
Checksum Field
Urgent Pointer Field
Options Field
Padding Field
Connection Establishment
Connection Function Calls
Port Hiding
Passive OPEN
Active OPEN
The Three-Way Handshake
The TCP Window
Avoiding Congestion
TCP Retransmissions
Session Termination
UDP Header
Source and Destination Port Fields
Length Field
Checksum Field

Working with the Command Prompt
The Command Prompt Location
Positioning upon Opening
Controlling the Command Prompt Window
Working with Function Keys and Commands
Function Key Use
Repertoire of Commands
The Help Command
The CLS Command
Controlling Output and Additional Commands
Redirection Methods
Other Useful Commands

Windows Built-In Networking Tools
Discovery via Ping
Ping Options
Using the Round-Trip Delay
Using Tracert
The Pathping Command
The ipconfig Command
The Release and Renew Options
The Flushdns Option
The Displaydns Option
Reverse ARP (RARP) and ARP and IPv6
The Getmac Command
The Netstat Command
Command Format
The Route Command
Command Format
Commands Supported
The Destination Option
Mask and Netmask
The Gateway Option
The Metric Option
The If Interface Option
Working with Route
The IPv4 Routing Table
The IPv6 Routing Table
The Nslookup Command
The Getmac Command
The Net Command
The Net Accounts Command
Net Accounts Options
The Net Computer Option
The Net Config Option
The Net Continue, Start, and Stop Options
The Net File Option
The Net Helpmsg
The Net Send Command
The Net Localgroup Option
The Net Share Command Option
The Net Session Command
The Net Statistics Command
The Net Time Command
The Net Use Command
The Net User Command
The Netsh Command
The Netsh Wlan Command
The Add Subcommand
The Connect Subcommand
The Delete Subcommand
The Export Profile Subcommand
Other Netsh Wlan Functions

Network Monitoring with Wireshark and WinDump
Program Evolution
Obtaining the Program
Program Overview
The Capture Screen
Packet Colors
Examining a Packet
File Menu Options
Working with Filters
Filter Expressions
Applying a Filter
Summary Data
Protocol Hierarchy
Packet Lengths
Conversation List
Endpoint List and Other Entries
Stream Analysis
VoIP Calls
The Tools Menu
Initial Operation
Selecting an Interface
Program Format
Using Multiple Switches
Program Switches
WinDump Expressions
Expression Primitives
Relationship Operators
Utilization Examples

Network Intrusion and Security
Commencing Snort
Sniffer Mode
Packet Logger Mode
Network Intrusion Detection System Mode
Command Switches
Network Intrusion Detection System Mode
Using SpywareBlaster
Obtaining the Program
Adding Protection
Restricted Site Protection
System Snapshot
The Tools Menu
Flash Killer
Custom Blocking
Checking for Updates
Using Online Armor
AXCrypt File Encryption

Enhancing Network Performance
Third-Party Networking Tools
Bandwidth Tools
IP Tools
Miscellaneous Networking Tools
Network Information
Other Sites to Consider
Using Search Tools
Windows Built-In Networking Tools
Disk Cleanup
Why Disk Defragmentation Matters
Resource Monitor
System Information


Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)