Description

Book Synopsis
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.

Table of Contents

Introduction 1

About This Book 1

Conventions Used in This Book 2

Foolish Assumptions 2

How This Book Is Organized 3

Part I: TCP/IP from Names to Addresses 3

Part II: Getting Connected 3

Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 4

Part IV: Even More TCP/IP Applications and Services 4

Part V: Network Troubleshooting and Security 4

Part VI: The Part of Tens 5

Icons Used in This Book 5

Where to Go from Here 6

Part I: TCP/IP from Names to Addresses 7

Chapter 1: Understanding TCP/IP Basics 9

Following Rules for the Internet: TCP/IP Protocols 10

Who’s in charge of the Internet and TCP/IP? 10

Checking out RFCs: The written rules 12

Examining Other Standards Organizations That Add to the Rules 13

Distinguishing Between the Internet, an Internet, and an Intranet 13

Extending Intranets to Extranets 14

Introducing Virtual Private Networks 15

Exploring Geographically Based Networks 16

Networks connected by wires and cables 16

Wireless networks 17

The geography of TCP/IP 17

Chapter 2: Layering TCP/IP Protocols 19

Taking a Timeout for Hardware 19

Starting with network connection media 20

Colliding with Ethernet 20

Stacking the TCP/IP Layers 22

Layer 1: The physical layer 23

Layer 2: The data link layer 24

Layer 3: The internet layer 24

Layer 4: The transport layer 24

Layer 5: The application layer 25

TCP/IP For Dummies, 6th Edition viii

Chewing through Network Layers: A Packet’s Journey 25

Understanding TCP/IP: More than just protocols 27

Determining whether your network has a protocol, an application, or a service 27

Plowing through the Protocol List (In Case You Thought Only Two Existed) 28

Physical layer protocols 29

Data link layer protocols 29

Internet layer protocols 29

Transport layer protocols 31

Application layer protocols 36

Chapter 3: Serving Up Clients and Servers 43

Understanding the Server Side 43

Examining the server’s job 44

Identifying types of servers 44

Using dedicated servers 45

Understanding the Client Side 45

Defining a client 45

Clients, clients everywhere 46

Answering the Question “Are You Being Served?” 46

Supporting TCP/IP with Client/Server and Vice Versa 47

Recognizing Other Internetworking Styles: Peer-to-Peer Computing 47

Determining whether peer-to-peer workgroups are still handy 48

P2P applications — P2P across the Internet 48

Chapter 4: Nice Names and Appetizing Addresses 51

What Did You Say Your Host’s Name Is? 52

Playing the numbers game 52

Identifying a computer as uniquely yours 53

Translating names into numbers 54

Taking a Closer Look at IP Addresses 54

Savoring Classful Addressing 55

Recognizing the Parts of an IP Address 56

Class A is for a few enormous networks 57

Class B is for lots of big networks 57

Class C is for millions of small networks 57

Class D is for multicasting 57

Biting Down on Bits and Bytes 58

Obtaining an IP Address 60

Choosing whether to go public or stay private 60

Obeying the network police 61

Obtaining a globally unique IP address 61

Acquiring a static address 62

Getting dynamic addresses with DHCP 62

Finding out your IP address 62

Table of Contents ix

Resolving Names and Addresses with DNS 64

Understanding the minimum amount of information about DNS 64

Using DNS to “Do Nifty Searches” 65

Describing Fully Qualified Domain Names (FQDNs) 65

Branching out into domains 66

Stalking new domains 68

Determining Whether the Internet Will Ever Fill Up 68

Choking on bandwidth 68

Panicking about not having enough addresses 69

Dishing Up More Kinds of Addresses 69

MAC: Media Access Control 69

Port numbers 70

Chapter 5: Need More Addresses? Try Subnetting and NAT 73

Working with Subnets and Subnet Masks 74

Defining subnet masks 76

Why a network has a mask when it has no subnets 76

Subnetting 101 77

Letting the DHCP Protocol Do the Work for You 79

One administrator’s nightmare is another’s fantasy 80

Understanding how the DHCP protocol works —it’s client/server again 81

Being evicted after your lease expires 82

Sharing Addresses with Network Address Translation (NAT) 83

Understanding how NAT works 83

Securing NAT 84

Using NAT and DHCP to work together 84

Swallowing NAT incompatibilities 86

Digesting NAT-PT (Network Address Translation-Protocol Translation) 87

Part II: Getting Connected 89

Chapter 6: Configuring a TCP/IP Network — the Software Side 91

Installing TCP/IP? Probably Not 91

Detecting whether TCP/IP is installed 92

Determining whether it’s IPv4, IPv6, or both 92

Savoring TCP/IP right out of the box 93

Six Steps to a Complete TCP/IP Configuration 94

Step 1: Determining whether your computer is a client or server or both 95

Step 2: Gathering client information 95

Step 3: Setting up your NIC(s) 95

TCP/IP For Dummies, 6th Edition x

Step 4: Deciding on a static IP address or a DHCP leased address 96

Step 5: Choosing how your host will translate names into IP addresses 97

Step 6: Gathering server information 97

Setting TCP/IP Client Properties 97

Configuring TCP/IP on a Mac OS X client 98

Configuring TCP/IP on a Linux or Unix client 100

Configuring a TCP/IP client on Windows Vista 102

Configuring a TCP/IP client on Windows XP 103

Setting TCP/IP Server Properties 104

Installing TCP/IP from Scratch 105

Feasting on Network Files 107

The local hosts file 107

The trusted hosts file, hostsequiv 109

Freddie’s nightmare: Your personal trust file 110

The services file 111

Daemons Aren’t Devils 113

Relishing your daemons113

Finding the daemons on your computer 113

Chapter 7: Networking SOHO with Wireless 115

Gulping the Minimum Hardware Details 116

NICs 116

Routers 117

Setting Up a Home Wireless Network in Four Steps 118

Step 1: Choose your wireless hardware 118

Step 2: Connect your wireless router 120

Step 3: Set up your wireless router 121

Step 4: Connect your computers 124

Securing Your Network 124

Securing the wired side 125

Securing the wireless side 125

Broadband for Everyone? We Hope 128

Level 1: Using wireless hotspots 128

Level 2: Paying for broadband wireless service 129

Level 3: Going anywhere you want to connect to the Internet with WiMAX 129

Chapter 8: Advancing into Routing Protocols 131

Understanding Routing Lingo 132

Routing Through the Layers — the Journey of a Packet 135

A new message heads out across the Net 135

The message visits the router 137

Into an Internet router and out again 139

Reaching the destination 140

Table of Contents xi

Getting a Handle on How Routers Work 143

Getting Started with Routers 146

Swallowing Routing Protocols 148

Nibbling on IGP protocols 149

Exterior Gateway Protocols (EGP) 152

Understanding How BGP Routers Work 154

Juicing Up Routing with CIDR 154

C Is for Classless 156

CIDR pressing the routing tables 157

You say “subnet,” aggregating.net says “aggregate” 159

Securing Your Router 159

Coring the apple with Denial of Service (DoS) Attacks 160

Hijacking routers 160

Eavesdropping on BGP 161

It’s so sad 161

S-BGP (Secure BGP): Proposals to make BGP routing secure 161

Chapter 9: IPv6: IP on Steroids 163

Say Hello to IPv6 163

Digesting IPv4 limitations 164

Absorbing IPv6 advantages 164

If It Ain’t Broke, Don’t Fix It — Unless It Can Be Improved 165

Wow! Eight Sections in an IPv6 Address? 165

Why use hexadecimal? 166

There’s good news and there’s bad news 166

Take advantage of IPv6 address shortcuts 167

Special IPv6 Addresses 169

IPv6 — and the Using Is Easy 169

Checking out the network with autodiscovery 170

Ensuring that your address is unique 171

Automatically assigning addresses 172

Realizing that autoregistration says “Let us serve you” 172

IPv6 Installation 173

Configuring IPv6 on Windows XP and Windows Server 2003 173

Welcoming IPv6 to Mac OS X175

Getting started with IPv6 in Unix and Linux 175

Other Delicious IPv6 Morsels 176

Security for all 176

Faster, better multimedia 178

Support for real-time applications 178

Improved support for mobile computing 178

Share the Planet — IPv6 and IPv4 Can Coexist 179

Stacking IPv4 and Iv6 179

Tunneling IPv6 through IPv4 180

Whew — You Made It! 180

TCP/IP For Dummies, 6th Edition xii

Chapter 10: Serving Up DNS (The Domain Name System) 181

Taking a Look at the DNS Components 182

Going Back to DNS Basics 183

Revisiting Client/Server with DNS 184

Dishing up DNS client/server definitions 184

Snacking on resolvers and name servers 184

Who’s in charge here? 186

Serving a DNS client’s needs 186

Oops! Can’t help you 187

Who’s Responsible for Name and Address Information? 187

Understanding Servers and Authority 189

Primary name server: Master of your domain 189

Secondary name servers 190

Caching servers 192

Understanding Domains and Zones 193

Problem Solving with Dynamic DNS (DYNDNS) 195

Diving into DNSSEC (DNS Security Extensions) 195

Why does DNS need DNSSEC? 196

Glimpsing behind the scenes of DNSSEC 197

Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 199

Chapter 11: Digesting Web Clients and Servers 201

Standardizing Web Services 201

Deciphering the Languages of the Web 202

HTML 202

HTML 4 204

XML 205

XHTML 205

HTML + MIME = MHTML 205

Java and other Web dialects 205

Hypertext and hypermedia 206

Understanding How Web Browsing Works 207

Serving up a Web page 207

Storing user information as cookies 209

Managing cookies with your browser 210

Dishing up multimedia over the Internet 212

Feeding Web Pages with Atom and RSS 214

Reducing the Web’s Wide Waistline to Increase Speed 215

Proxy Serving for Speed and Security 218

Caching pages 219

Improving security with filtering 220

Setting up a proxy client 220

Finishing touches 223

Table of Contents xiii

Setting Up a Caching Proxy Server 223

Outlining the general steps for installing and configuring squid 223

Configuring squid for Microsoft Windows Server 2008 224

Browsing Securely 228

Ensuring that a site is secure 228

Using your browser’s security features 229

Setting Up a Web Server 230

Setting up the Apache HTTP Server 231

Speeding up Apache 234

Making Apache more secure 234

Adding Security to HTTP 235

Taking a look at HTTPS 236

Getting up to speed on SSL 236

Stepping through an SSL Transaction 237

Using Digital Certificates for Secure Web Browsing 238

Chapter 12: Minimum Security Facilities 239

What’s the Worst That Could Happen? 239

Jump-Starting Security with the Big Three 240

Installing a personal firewall 241

Vaccinating your system with the anti-s 242

Encrypting data so snoopers can’t read it 243

Adding a Few More Basic Protections 243

Chapter 13: Eating Up E-Mail 245

Getting the Big Picture about How E-Mail Works 245

Feasting on E-Mail’s Client-Server Delights 246

E-mail clients 246

E-mail clients versus Web mail clients 247

E-mail servers 247

Postfix: Configuring the fastest-growing MTA 249

Sharpening the Finer Points of Mail Servers 252

Transferring e-mail by way of store-and-forward 253

Transferring e-mail by way of DNS MX records 254

Understanding How SMTP Works with MTAs 255

Defining E-Mail Protocols 255

Adding More Protocols to the Mix 256

POP3 256

IMAP4 257

HTTP 258

LDAP 258

DNS and its MX records 258

TCP/IP For Dummies, 6th Edition xiv

Chapter 14: Securing E-Mail 261

Common Sense: The Most Important Tool in Your Security Arsenal 261

Being Aware of Possible Attacks 262

Phishing 263

Popping up and under 263

Getting spied on 263

Meeting malware 265

Bombing 265

Have you got anything without spam? Spam, spam, spam! 266

Spoofing 267

Finding Out Whether You’re a Victim 267

Playing Hide-and-Seek with Your E-Mail Address 268

Layering Security 269

Layer 1: Letting your ISP protect your network 269

Layer 2: Building your own walls 270

Layer 3: Securing e-mail on the server side 271

Layer 4: Securing e-mail on the client side 274

Layer 5: Suitely extending e-mail security 278

Using Secure Mail Clients and Servers 278

Setting up a secure IMAP or POP client 279

Setting up a secure mail server 281

Encrypting e-mail 281

Chapter 15: Beyond E-Mail: Social Networking and Online Communities 285

Thumbing to Talk About 286

Choosing a Communication Method 287

Getting together with IRC 288

Jabbering with XMPP 288

Feeding Your Craving for News 289

Getting Even More Social 290

Part IV: Even More TCP/IP

Applications and Services 291

Chapter 16: Mobile IP — The Moveable Feast 293

Going Mobile 294

Understanding How Mobile IP Works 294

Sailing into the Future: Potential Mobile IPv6 Enhancements 296

Mobilizing Security 297

Understanding the risks 297

Using basic techniques to protect your mobile devices 298

Table of Contents xv

Chapter 17: Saving Money with VoIP (Voice Over Internet Protocol) 299

Getting the Scoop on VoIP 299

Getting Started Using VoIP 300

Step 1: Get broadband 300

Step 2: Decide how to call 301

Step 3: Make the call 302

Step 4: Convert the bits back into voice (with VoIP software) 303

Step 5: Converse 303

Yo-Yo Dieting: Understanding How VoIP Packets Move through the Layers 304

Trekking the Protocols from RTP to H323 304

Talking the talk with the TCP/IP stack and more 305

Ingesting VoIP standards from the ITU 306

Vomiting and Other Vicious VoIP Vices 306

Securing Your Calls from VoIP Violation 306

You, too, can be a secret agent 307

Authenticating VoIP-ers 307

Keeping voice attacks separate from data 308

Defending with firewalls 308

Testing Your VoIP Security 308

Chapter 18: File and Print Sharing Services 309

Defining Basic File Sharing Terms 309

Using FTP to Copy Files 310

Understanding how FTP works 310

Using anonymous FTP to get good stuff 311

Choosing your FTP client 312

Transferring the files 312

Securing FTP file transfers 315

Using rcp or scp to Copy Files 316

Sharing Network File Systems 317

Nifty file sharing with NFS (Network File System) 317

Solving the buried file update problem with NFSv4 318

Examining the mount Protocol 319

Automounting 320

Configuring an NFS Server 320

Step 1: Edit the exports file 321

Step 2: Update the netgroup file 321

Step 3: Start the daemons 322

Configuring an NFS Client 323

TCP/IP For Dummies, 6th Edition xvi

Picking Up Some NFS Performance Tips 324

Hardware tips 324

Server tips 325

Client tips 325

Weighing performance against security 325

Getting NFS Security Tips 325

Sharing Files Off the Stack 326

Using Windows network shares 326

Using Samba to share file and print services 327

Working with Network Print Services 328

Valuing IPP features 329

Setting up Windows Server 2008 print servers over IPP 330

Printing with the Common Unix Print System (CUPS) 331

Chapter 19: Sharing Compute Power 333

Sharing Network Resources 333

Accessing Remote Computers 334

Using a telnet client 334

“R” you ready for more remote access? 335

Executing commands with rsh and rexec 335

Securing Remote Access Sessions 336

Taking Control of Remote Desktops 337

Sharing Clustered Resources 338

Clustering for high availability 338

Clustering for load balancing 338

Clustering for supercomputing 339

Sharing Compute Power with Grid and Volunteer Computing 339

Part V: Network Troubleshooting and Security 341

Chapter 20: Staying with Security Protocols 343

Determining Who Is Responsible for Network Security 344

Following the Forensic Trail: Examining the Steps for Securing Your Network 344

Step 1: Prescribing Preventive Medicine for Security 345

Step 2: Observing Symptoms of Malware Infection 347

Uncovering more contagions 348

Step 3: Diagnosing Security Ailments with netstat, ps, and Logging 355

Monitoring network use with ps 355

Nosing around with netstat 357

Examining logs for symptoms of disease 362

Syslog-ing into the next generation 363

Microsoft proprietary event logging 370

Table of Contents xvii

Chapter 21: Relishing More Meaty Security 373

Defining Encryption 374

Advancing Encryption with Advanced Encryption Standard (AES) 375

Peering into Authentication 376

Do you have any ID? A digital certificate will do 377

Getting digital certificates 377

Using digital certificates378

Checking your certificates 379

Coping with certificate problems 380

IPSec (IP Security Protocol): More Authentication 381

Kerberos — Guardian or Fiend? 382

Understanding Kerberos concepts 382

Playing at Casino Kerberos 383

Training the dog — one step per head 384

Setting up a Kerberos server step by step 385

Setting up a Kerberos client step by step 387

Chapter 22: Troubleshooting Connectivity and Performance Problems 389

Chasing Network Problems from End to End 390

Getting Started with Ping 390

Pinging away with lots of options 391

And now, for “some-ping” completely different: Running ping graphically 393

Death by ping 395

Diagnosing Problems Step by Step 396

Pinging yourself and others 396

Using nslookup to query a name server 401

Using traceroute (tracert) to fi nd network problems 403

Simplifying SNMP, the Simple Network Management Protocol 406

Just barely describing how SNMP works 406

Using SMNP programming free 407

Part VI: The Part of Tens 411

Chapter 23: Ten More Uses for TCP/IP 413

Chapter 24: Ten More Resources for Information about TCP/IP Security 417

Index 421

TCP IP for Dummies

Product form

£20.79

Includes FREE delivery

RRP £25.99 – you save £5.20 (20%)

Order before 4pm today for delivery by Mon 19 Jan 2026.

A Paperback / softback by Candace Leiden, Marshall Wilensky

15 in stock


    View other formats and editions of TCP IP for Dummies by Candace Leiden

    Publisher: John Wiley & Sons Inc
    Publication Date: 07/08/2009
    ISBN13: 9780470450604, 978-0470450604
    ISBN10: 0470450606

    Description

    Book Synopsis
    Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.

    Table of Contents

    Introduction 1

    About This Book 1

    Conventions Used in This Book 2

    Foolish Assumptions 2

    How This Book Is Organized 3

    Part I: TCP/IP from Names to Addresses 3

    Part II: Getting Connected 3

    Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 4

    Part IV: Even More TCP/IP Applications and Services 4

    Part V: Network Troubleshooting and Security 4

    Part VI: The Part of Tens 5

    Icons Used in This Book 5

    Where to Go from Here 6

    Part I: TCP/IP from Names to Addresses 7

    Chapter 1: Understanding TCP/IP Basics 9

    Following Rules for the Internet: TCP/IP Protocols 10

    Who’s in charge of the Internet and TCP/IP? 10

    Checking out RFCs: The written rules 12

    Examining Other Standards Organizations That Add to the Rules 13

    Distinguishing Between the Internet, an Internet, and an Intranet 13

    Extending Intranets to Extranets 14

    Introducing Virtual Private Networks 15

    Exploring Geographically Based Networks 16

    Networks connected by wires and cables 16

    Wireless networks 17

    The geography of TCP/IP 17

    Chapter 2: Layering TCP/IP Protocols 19

    Taking a Timeout for Hardware 19

    Starting with network connection media 20

    Colliding with Ethernet 20

    Stacking the TCP/IP Layers 22

    Layer 1: The physical layer 23

    Layer 2: The data link layer 24

    Layer 3: The internet layer 24

    Layer 4: The transport layer 24

    Layer 5: The application layer 25

    TCP/IP For Dummies, 6th Edition viii

    Chewing through Network Layers: A Packet’s Journey 25

    Understanding TCP/IP: More than just protocols 27

    Determining whether your network has a protocol, an application, or a service 27

    Plowing through the Protocol List (In Case You Thought Only Two Existed) 28

    Physical layer protocols 29

    Data link layer protocols 29

    Internet layer protocols 29

    Transport layer protocols 31

    Application layer protocols 36

    Chapter 3: Serving Up Clients and Servers 43

    Understanding the Server Side 43

    Examining the server’s job 44

    Identifying types of servers 44

    Using dedicated servers 45

    Understanding the Client Side 45

    Defining a client 45

    Clients, clients everywhere 46

    Answering the Question “Are You Being Served?” 46

    Supporting TCP/IP with Client/Server and Vice Versa 47

    Recognizing Other Internetworking Styles: Peer-to-Peer Computing 47

    Determining whether peer-to-peer workgroups are still handy 48

    P2P applications — P2P across the Internet 48

    Chapter 4: Nice Names and Appetizing Addresses 51

    What Did You Say Your Host’s Name Is? 52

    Playing the numbers game 52

    Identifying a computer as uniquely yours 53

    Translating names into numbers 54

    Taking a Closer Look at IP Addresses 54

    Savoring Classful Addressing 55

    Recognizing the Parts of an IP Address 56

    Class A is for a few enormous networks 57

    Class B is for lots of big networks 57

    Class C is for millions of small networks 57

    Class D is for multicasting 57

    Biting Down on Bits and Bytes 58

    Obtaining an IP Address 60

    Choosing whether to go public or stay private 60

    Obeying the network police 61

    Obtaining a globally unique IP address 61

    Acquiring a static address 62

    Getting dynamic addresses with DHCP 62

    Finding out your IP address 62

    Table of Contents ix

    Resolving Names and Addresses with DNS 64

    Understanding the minimum amount of information about DNS 64

    Using DNS to “Do Nifty Searches” 65

    Describing Fully Qualified Domain Names (FQDNs) 65

    Branching out into domains 66

    Stalking new domains 68

    Determining Whether the Internet Will Ever Fill Up 68

    Choking on bandwidth 68

    Panicking about not having enough addresses 69

    Dishing Up More Kinds of Addresses 69

    MAC: Media Access Control 69

    Port numbers 70

    Chapter 5: Need More Addresses? Try Subnetting and NAT 73

    Working with Subnets and Subnet Masks 74

    Defining subnet masks 76

    Why a network has a mask when it has no subnets 76

    Subnetting 101 77

    Letting the DHCP Protocol Do the Work for You 79

    One administrator’s nightmare is another’s fantasy 80

    Understanding how the DHCP protocol works —it’s client/server again 81

    Being evicted after your lease expires 82

    Sharing Addresses with Network Address Translation (NAT) 83

    Understanding how NAT works 83

    Securing NAT 84

    Using NAT and DHCP to work together 84

    Swallowing NAT incompatibilities 86

    Digesting NAT-PT (Network Address Translation-Protocol Translation) 87

    Part II: Getting Connected 89

    Chapter 6: Configuring a TCP/IP Network — the Software Side 91

    Installing TCP/IP? Probably Not 91

    Detecting whether TCP/IP is installed 92

    Determining whether it’s IPv4, IPv6, or both 92

    Savoring TCP/IP right out of the box 93

    Six Steps to a Complete TCP/IP Configuration 94

    Step 1: Determining whether your computer is a client or server or both 95

    Step 2: Gathering client information 95

    Step 3: Setting up your NIC(s) 95

    TCP/IP For Dummies, 6th Edition x

    Step 4: Deciding on a static IP address or a DHCP leased address 96

    Step 5: Choosing how your host will translate names into IP addresses 97

    Step 6: Gathering server information 97

    Setting TCP/IP Client Properties 97

    Configuring TCP/IP on a Mac OS X client 98

    Configuring TCP/IP on a Linux or Unix client 100

    Configuring a TCP/IP client on Windows Vista 102

    Configuring a TCP/IP client on Windows XP 103

    Setting TCP/IP Server Properties 104

    Installing TCP/IP from Scratch 105

    Feasting on Network Files 107

    The local hosts file 107

    The trusted hosts file, hostsequiv 109

    Freddie’s nightmare: Your personal trust file 110

    The services file 111

    Daemons Aren’t Devils 113

    Relishing your daemons113

    Finding the daemons on your computer 113

    Chapter 7: Networking SOHO with Wireless 115

    Gulping the Minimum Hardware Details 116

    NICs 116

    Routers 117

    Setting Up a Home Wireless Network in Four Steps 118

    Step 1: Choose your wireless hardware 118

    Step 2: Connect your wireless router 120

    Step 3: Set up your wireless router 121

    Step 4: Connect your computers 124

    Securing Your Network 124

    Securing the wired side 125

    Securing the wireless side 125

    Broadband for Everyone? We Hope 128

    Level 1: Using wireless hotspots 128

    Level 2: Paying for broadband wireless service 129

    Level 3: Going anywhere you want to connect to the Internet with WiMAX 129

    Chapter 8: Advancing into Routing Protocols 131

    Understanding Routing Lingo 132

    Routing Through the Layers — the Journey of a Packet 135

    A new message heads out across the Net 135

    The message visits the router 137

    Into an Internet router and out again 139

    Reaching the destination 140

    Table of Contents xi

    Getting a Handle on How Routers Work 143

    Getting Started with Routers 146

    Swallowing Routing Protocols 148

    Nibbling on IGP protocols 149

    Exterior Gateway Protocols (EGP) 152

    Understanding How BGP Routers Work 154

    Juicing Up Routing with CIDR 154

    C Is for Classless 156

    CIDR pressing the routing tables 157

    You say “subnet,” aggregating.net says “aggregate” 159

    Securing Your Router 159

    Coring the apple with Denial of Service (DoS) Attacks 160

    Hijacking routers 160

    Eavesdropping on BGP 161

    It’s so sad 161

    S-BGP (Secure BGP): Proposals to make BGP routing secure 161

    Chapter 9: IPv6: IP on Steroids 163

    Say Hello to IPv6 163

    Digesting IPv4 limitations 164

    Absorbing IPv6 advantages 164

    If It Ain’t Broke, Don’t Fix It — Unless It Can Be Improved 165

    Wow! Eight Sections in an IPv6 Address? 165

    Why use hexadecimal? 166

    There’s good news and there’s bad news 166

    Take advantage of IPv6 address shortcuts 167

    Special IPv6 Addresses 169

    IPv6 — and the Using Is Easy 169

    Checking out the network with autodiscovery 170

    Ensuring that your address is unique 171

    Automatically assigning addresses 172

    Realizing that autoregistration says “Let us serve you” 172

    IPv6 Installation 173

    Configuring IPv6 on Windows XP and Windows Server 2003 173

    Welcoming IPv6 to Mac OS X175

    Getting started with IPv6 in Unix and Linux 175

    Other Delicious IPv6 Morsels 176

    Security for all 176

    Faster, better multimedia 178

    Support for real-time applications 178

    Improved support for mobile computing 178

    Share the Planet — IPv6 and IPv4 Can Coexist 179

    Stacking IPv4 and Iv6 179

    Tunneling IPv6 through IPv4 180

    Whew — You Made It! 180

    TCP/IP For Dummies, 6th Edition xii

    Chapter 10: Serving Up DNS (The Domain Name System) 181

    Taking a Look at the DNS Components 182

    Going Back to DNS Basics 183

    Revisiting Client/Server with DNS 184

    Dishing up DNS client/server definitions 184

    Snacking on resolvers and name servers 184

    Who’s in charge here? 186

    Serving a DNS client’s needs 186

    Oops! Can’t help you 187

    Who’s Responsible for Name and Address Information? 187

    Understanding Servers and Authority 189

    Primary name server: Master of your domain 189

    Secondary name servers 190

    Caching servers 192

    Understanding Domains and Zones 193

    Problem Solving with Dynamic DNS (DYNDNS) 195

    Diving into DNSSEC (DNS Security Extensions) 195

    Why does DNS need DNSSEC? 196

    Glimpsing behind the scenes of DNSSEC 197

    Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 199

    Chapter 11: Digesting Web Clients and Servers 201

    Standardizing Web Services 201

    Deciphering the Languages of the Web 202

    HTML 202

    HTML 4 204

    XML 205

    XHTML 205

    HTML + MIME = MHTML 205

    Java and other Web dialects 205

    Hypertext and hypermedia 206

    Understanding How Web Browsing Works 207

    Serving up a Web page 207

    Storing user information as cookies 209

    Managing cookies with your browser 210

    Dishing up multimedia over the Internet 212

    Feeding Web Pages with Atom and RSS 214

    Reducing the Web’s Wide Waistline to Increase Speed 215

    Proxy Serving for Speed and Security 218

    Caching pages 219

    Improving security with filtering 220

    Setting up a proxy client 220

    Finishing touches 223

    Table of Contents xiii

    Setting Up a Caching Proxy Server 223

    Outlining the general steps for installing and configuring squid 223

    Configuring squid for Microsoft Windows Server 2008 224

    Browsing Securely 228

    Ensuring that a site is secure 228

    Using your browser’s security features 229

    Setting Up a Web Server 230

    Setting up the Apache HTTP Server 231

    Speeding up Apache 234

    Making Apache more secure 234

    Adding Security to HTTP 235

    Taking a look at HTTPS 236

    Getting up to speed on SSL 236

    Stepping through an SSL Transaction 237

    Using Digital Certificates for Secure Web Browsing 238

    Chapter 12: Minimum Security Facilities 239

    What’s the Worst That Could Happen? 239

    Jump-Starting Security with the Big Three 240

    Installing a personal firewall 241

    Vaccinating your system with the anti-s 242

    Encrypting data so snoopers can’t read it 243

    Adding a Few More Basic Protections 243

    Chapter 13: Eating Up E-Mail 245

    Getting the Big Picture about How E-Mail Works 245

    Feasting on E-Mail’s Client-Server Delights 246

    E-mail clients 246

    E-mail clients versus Web mail clients 247

    E-mail servers 247

    Postfix: Configuring the fastest-growing MTA 249

    Sharpening the Finer Points of Mail Servers 252

    Transferring e-mail by way of store-and-forward 253

    Transferring e-mail by way of DNS MX records 254

    Understanding How SMTP Works with MTAs 255

    Defining E-Mail Protocols 255

    Adding More Protocols to the Mix 256

    POP3 256

    IMAP4 257

    HTTP 258

    LDAP 258

    DNS and its MX records 258

    TCP/IP For Dummies, 6th Edition xiv

    Chapter 14: Securing E-Mail 261

    Common Sense: The Most Important Tool in Your Security Arsenal 261

    Being Aware of Possible Attacks 262

    Phishing 263

    Popping up and under 263

    Getting spied on 263

    Meeting malware 265

    Bombing 265

    Have you got anything without spam? Spam, spam, spam! 266

    Spoofing 267

    Finding Out Whether You’re a Victim 267

    Playing Hide-and-Seek with Your E-Mail Address 268

    Layering Security 269

    Layer 1: Letting your ISP protect your network 269

    Layer 2: Building your own walls 270

    Layer 3: Securing e-mail on the server side 271

    Layer 4: Securing e-mail on the client side 274

    Layer 5: Suitely extending e-mail security 278

    Using Secure Mail Clients and Servers 278

    Setting up a secure IMAP or POP client 279

    Setting up a secure mail server 281

    Encrypting e-mail 281

    Chapter 15: Beyond E-Mail: Social Networking and Online Communities 285

    Thumbing to Talk About 286

    Choosing a Communication Method 287

    Getting together with IRC 288

    Jabbering with XMPP 288

    Feeding Your Craving for News 289

    Getting Even More Social 290

    Part IV: Even More TCP/IP

    Applications and Services 291

    Chapter 16: Mobile IP — The Moveable Feast 293

    Going Mobile 294

    Understanding How Mobile IP Works 294

    Sailing into the Future: Potential Mobile IPv6 Enhancements 296

    Mobilizing Security 297

    Understanding the risks 297

    Using basic techniques to protect your mobile devices 298

    Table of Contents xv

    Chapter 17: Saving Money with VoIP (Voice Over Internet Protocol) 299

    Getting the Scoop on VoIP 299

    Getting Started Using VoIP 300

    Step 1: Get broadband 300

    Step 2: Decide how to call 301

    Step 3: Make the call 302

    Step 4: Convert the bits back into voice (with VoIP software) 303

    Step 5: Converse 303

    Yo-Yo Dieting: Understanding How VoIP Packets Move through the Layers 304

    Trekking the Protocols from RTP to H323 304

    Talking the talk with the TCP/IP stack and more 305

    Ingesting VoIP standards from the ITU 306

    Vomiting and Other Vicious VoIP Vices 306

    Securing Your Calls from VoIP Violation 306

    You, too, can be a secret agent 307

    Authenticating VoIP-ers 307

    Keeping voice attacks separate from data 308

    Defending with firewalls 308

    Testing Your VoIP Security 308

    Chapter 18: File and Print Sharing Services 309

    Defining Basic File Sharing Terms 309

    Using FTP to Copy Files 310

    Understanding how FTP works 310

    Using anonymous FTP to get good stuff 311

    Choosing your FTP client 312

    Transferring the files 312

    Securing FTP file transfers 315

    Using rcp or scp to Copy Files 316

    Sharing Network File Systems 317

    Nifty file sharing with NFS (Network File System) 317

    Solving the buried file update problem with NFSv4 318

    Examining the mount Protocol 319

    Automounting 320

    Configuring an NFS Server 320

    Step 1: Edit the exports file 321

    Step 2: Update the netgroup file 321

    Step 3: Start the daemons 322

    Configuring an NFS Client 323

    TCP/IP For Dummies, 6th Edition xvi

    Picking Up Some NFS Performance Tips 324

    Hardware tips 324

    Server tips 325

    Client tips 325

    Weighing performance against security 325

    Getting NFS Security Tips 325

    Sharing Files Off the Stack 326

    Using Windows network shares 326

    Using Samba to share file and print services 327

    Working with Network Print Services 328

    Valuing IPP features 329

    Setting up Windows Server 2008 print servers over IPP 330

    Printing with the Common Unix Print System (CUPS) 331

    Chapter 19: Sharing Compute Power 333

    Sharing Network Resources 333

    Accessing Remote Computers 334

    Using a telnet client 334

    “R” you ready for more remote access? 335

    Executing commands with rsh and rexec 335

    Securing Remote Access Sessions 336

    Taking Control of Remote Desktops 337

    Sharing Clustered Resources 338

    Clustering for high availability 338

    Clustering for load balancing 338

    Clustering for supercomputing 339

    Sharing Compute Power with Grid and Volunteer Computing 339

    Part V: Network Troubleshooting and Security 341

    Chapter 20: Staying with Security Protocols 343

    Determining Who Is Responsible for Network Security 344

    Following the Forensic Trail: Examining the Steps for Securing Your Network 344

    Step 1: Prescribing Preventive Medicine for Security 345

    Step 2: Observing Symptoms of Malware Infection 347

    Uncovering more contagions 348

    Step 3: Diagnosing Security Ailments with netstat, ps, and Logging 355

    Monitoring network use with ps 355

    Nosing around with netstat 357

    Examining logs for symptoms of disease 362

    Syslog-ing into the next generation 363

    Microsoft proprietary event logging 370

    Table of Contents xvii

    Chapter 21: Relishing More Meaty Security 373

    Defining Encryption 374

    Advancing Encryption with Advanced Encryption Standard (AES) 375

    Peering into Authentication 376

    Do you have any ID? A digital certificate will do 377

    Getting digital certificates 377

    Using digital certificates378

    Checking your certificates 379

    Coping with certificate problems 380

    IPSec (IP Security Protocol): More Authentication 381

    Kerberos — Guardian or Fiend? 382

    Understanding Kerberos concepts 382

    Playing at Casino Kerberos 383

    Training the dog — one step per head 384

    Setting up a Kerberos server step by step 385

    Setting up a Kerberos client step by step 387

    Chapter 22: Troubleshooting Connectivity and Performance Problems 389

    Chasing Network Problems from End to End 390

    Getting Started with Ping 390

    Pinging away with lots of options 391

    And now, for “some-ping” completely different: Running ping graphically 393

    Death by ping 395

    Diagnosing Problems Step by Step 396

    Pinging yourself and others 396

    Using nslookup to query a name server 401

    Using traceroute (tracert) to fi nd network problems 403

    Simplifying SNMP, the Simple Network Management Protocol 406

    Just barely describing how SNMP works 406

    Using SMNP programming free 407

    Part VI: The Part of Tens 411

    Chapter 23: Ten More Uses for TCP/IP 413

    Chapter 24: Ten More Resources for Information about TCP/IP Security 417

    Index 421

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account