Print this page Share

Computer Networking: Internet Protocols in Action

ISBN: 978-0-471-66186-3
288 pages
January 2005, ©2005
Computer Networking: Internet Protocols in Action (0471661864) cover image


This revolutionary text and its accompanying CD replace a whole lab full of computer equipment. They give computer science students realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Using the latest version of the open source program Ethereal, the reader opens packet trace files from the CD and follows the text to perform the exercises, gaining a thorough understanding of the material in the best way possible—by seeing it in action. This approach also benefits the instructor, who is spared the time-consuming tasks of maintaining a laboratory and taking traces. It can even relieve the anxiety system administrators have about students collecting traces on campus networks!
See More

Table of Contents



Section 1: Getting Started.

1.0 Introduction.

1.1 Examining a Quiet Network with Ethereal.

1.2 Protocol Layering.

1.3 Examining a Busy Network Using Filters.

Section 2: Application Layer Protocols.

2.0 Introduction.

2.1 Under the Hood of HTTP.

2.2 HTTP Caching, Authorization and Cookies.

2.3 FTP—File Transfer Protocol.

2.4 Sending and Receiving Email with SMTP and POP.

Section 3: Transport Layer Protocols.

3.0 Introduction.

3.1 Simple TCP Stream.

3.2 Retransmission in TCP.

3.3 Comparing TCP to UDP.

3.4 Competing TCP and UDP Streams.

Section 4: Network Layer Protocols.

4.0 Introduction.

4.1 Joining the Internet: Introduction to IP and DHCP.

4.2 Ping and Traceroute.

4.3 Dynamic Routing with RIP.

Section 5: Link Layer Protocols.

5.0 Introduction.

5.1 MAC Addresses.

5.2 Ethernet.

5.3 Wireless LANs.

Section 6: Security.

6.0 Introduction.

6.1 Encryption.

6.2 IP Spoofing and TCP Session Stealing.

6.3 System Vulnerabilities.


See More

The Wiley Advantage

  • Practicality: Students are able to learn by doing without having to use actual networks, while instructors are freed from the job of collecting the materials.
  • Flexibility: Has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
  • Completeness: The exercises take the student from the basics of examining quiet and busy networks—through application, transport, network, and link layers—to the crucial issues of network security.
See More
Instructors Resources
Wiley Instructor Companion Site
Request a print evaluation copy
Contact us
Contact your Wiley Representative
Find Your Rep
See More
See Less
Students Resources
Wiley Student Companion Site
See More
See Less
Back to Top