Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security

Overview

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how...

See more details below
Other sellers (Paperback)
  • All (8) from $52.40   
  • New (5) from $52.40   
  • Used (3) from $86.90   
Sending request ...

Overview

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

Read More Show Less

Product Details

  • ISBN-13: 9781466511064
  • Publisher: Taylor & Francis
  • Publication date: 11/27/2012
  • Pages: 390
  • Sales rank: 1,124,441
  • Product dimensions: 6.10 (w) x 9.10 (h) x 1.10 (d)

Table of Contents

Introduction
The TCP/IP Protocol Suite
Applications
Current Applications
Emerging Applications
Book Preview
Examining the TCP/IP Protocol Suite
IP and MAC Addressing
Transport Layer Protocols
Working with the Command Prompt
Windows Built-In Networking Tools
Network Monitoring
Network Security
Efficiency Methods

Examining the TCP/IPProtocol Suite
ISO Reference Model
OSI Reference Model Layers
Layer 1: The Physical Layer
Layer 2: The Data Link Layer
Layer 2 Subdivision
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer
Data Flow
The TCP/IP Protocol Suite
The TCP/IP Network Layer
IP
IPv4 Addressing
IPv6 Addressing
ARP
ICMP
The Transport Layer
TCP
UDP
The Application Layer
Data Flow within a TCP/IP Network
Summary

Addressing at Layers2 and 3 and the Internet Protocol
Data Link Addressing
Ethernet Frame Operations
Basic Ethernet
Full Duplex and the PAUSE Frame
vLAN Tagging
SNAP Frames
Frame Determination
Fast Ethernet
4B5B Coding
Delimiters
Interframe Gap
Gigabit Ethernet
Standards Evolution
Varieties
Frame Format Modifications
Carrier Extension
Half-Duplex Use
Frame Bursting
Jumbo Frames
Gigabit Ethernet
Fiber Standards
10GBASE-SR
10GBASE-LR
10GBASE-LRM
10GBASE-ER
10GBASE-ZR
10GBASE-LX4
Copper
10GBASE-CX4
10GSFP+Cu
Backplane 10 GBps Ethernet
10GBASE-T
The IPv4 Header
Vers Field
Hlen and Total Length Fields
Type of Service Field
Identification Field
Flags Field
Fragment Offset Field
Time to Live Field
Protocol Field
Checksum Field
Source and Destination Address Fields
Options and Padding Fields
IPv4 Addressing
Overview
Addressing
Basic Addressing Scheme
Address Classes
Address Formats
Address Composition and Notation
Special IPv4 Addresses
Subnetting and the Subnet Mask
Classless Networking
The IPv6 Header
Ver Field
Priority Field
Flow Label Field
Payload Length Field
Next Header Field
Hop Limit Field
Source and Destination Address Fields
Address Types
Address Notation
Address Allocation
Provider-Based Unicast Addresses
Multicast Addresses
Transporting IPv4 Addresses
ICMP and ARP
ICMP
ICMPv4
ICMPv6
ARP
LAN Delivery
RARP

Transport Layer Protocols
TCP
TCP Header
Source and Destination Port Fields
Sequence and Acknowledgment Number Fields
Hlen Field
Code Bit Field
Window Field
Checksum Field
Urgent Pointer Field
Options Field
Padding Field
Connection Establishment
Connection Function Calls
Port Hiding
Passive OPEN
Active OPEN
The Three-Way Handshake
Overview
Operation
The TCP Window
Avoiding Congestion
TCP Retransmissions
Session Termination
UDP
UDP Header
Source and Destination Port Fields
Length Field
Checksum Field
Operation
Applications

Working with the Command Prompt
The Command Prompt Location
Options
Positioning upon Opening
Controlling the Command Prompt Window
Working with Function Keys and Commands
Function Key Use
Repertoire of Commands
The Help Command
The CLS Command
Controlling Output and Additional Commands
Redirection Methods
Other Useful Commands

Windows Built-In Networking Tools
Ping
Discovery via Ping
Ping Options
Using the Round-Trip Delay
Tracert
Using Tracert
The Pathping Command
The ipconfig Command
The Release and Renew Options
The Flushdns Option
The Displaydns Option
ARP
Reverse ARP (RARP) and ARP and IPv6
The Getmac Command
The Netstat Command
Command Format
The Route Command
Command Format
Commands Supported
The Destination Option
Mask and Netmask
The Gateway Option
The Metric Option
The If Interface Option
Working with Route
The IPv4 Routing Table
The IPv6 Routing Table
The Nslookup Command
The Getmac Command
The Net Command
The Net Accounts Command
Net Accounts Options
The Net Computer Option
The Net Config Option
The Net Continue, Start, and Stop Options
The Net File Option
The Net Helpmsg
The Net Send Command
The Net Localgroup Option
The Net Share Command Option
The Net Session Command
The Net Statistics Command
The Net Time Command
The Net Use Command
The Net User Command
The Netsh Command
The Netsh Wlan Command
The Add Subcommand
The Connect Subcommand
The Delete Subcommand
The Export Profile Subcommand
Other Netsh Wlan Functions

Network Monitoring with Wireshark and WinDump
Wireshark
Program Evolution
Obtaining the Program
Program Overview
The Capture Screen
Packet Colors
Examining a Packet
File Menu Options
Working with Filters
Filter Expressions
Applying a Filter
Statistics
Summary Data
Protocol Hierarchy
Conversations
Endpoints
Packet Lengths
Conversation List
Endpoint List and Other Entries
Telephony
RTP
Stream Analysis
VoIP Calls
The Tools Menu
WinDump
Overview
Initial Operation
Selecting an Interface
Program Format
Using Multiple Switches
Program Switches
WinDump Expressions
Qualifiers
Expression Primitives
Relationship Operators
Utilization Examples

Network Intrusion and Security
Snort
Requirements
Installation
Commencing Snort
Sniffer Mode
Packet Logger Mode
Network Intrusion Detection System Mode
Command Switches
Network Intrusion Detection System Mode
Using SpywareBlaster
Obtaining the Program
Adding Protection
Restricted Site Protection
System Snapshot
The Tools Menu
Flash Killer
Custom Blocking
Checking for Updates
Using Online Armor
Installation
Operation
AXCrypt File Encryption
Installation
Operation

Enhancing Network Performance
Third-Party Networking Tools
Bandwidth Tools
IP Tools
Miscellaneous Networking Tools
Network Information
Other Sites to Consider
Using Search Tools
Windows Built-In Networking Tools
Disk Cleanup
Why Disk Defragmentation Matters
Resource Monitor
System Information

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)