Computer Networking: Internet Protocols in Action
January 2005, ©2005
Section 1: Getting Started.
1.1 Examining a Quiet Network with Ethereal.
1.2 Protocol Layering.
1.3 Examining a Busy Network Using Filters.
Section 2: Application Layer Protocols.
2.1 Under the Hood of HTTP.
2.2 HTTP Caching, Authorization and Cookies.
2.3 FTP—File Transfer Protocol.
2.4 Sending and Receiving Email with SMTP and POP.
Section 3: Transport Layer Protocols.
3.1 Simple TCP Stream.
3.2 Retransmission in TCP.
3.3 Comparing TCP to UDP.
3.4 Competing TCP and UDP Streams.
Section 4: Network Layer Protocols.
4.1 Joining the Internet: Introduction to IP and DHCP.
4.2 Ping and Traceroute.
4.3 Dynamic Routing with RIP.
Section 5: Link Layer Protocols.
5.1 MAC Addresses.
5.3 Wireless LANs.
Section 6: Security.
6.2 IP Spoofing and TCP Session Stealing.
6.3 System Vulnerabilities.
Practicality: Students are able to learn by doing without having to use actual networks, while instructors are freed from the job of collecting the materials.
Flexibility: Has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
Completeness: The exercises take the student from the basics of examining quiet and busy networks—through application, transport, network, and link layers—to the crucial issues of network security.