Windows Networking Tools

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Paperback
$62.95 $50.36
ISBN 9781466511064
Cat# K14816
Add to cart
SAVE 20%
eBook (VitalSource)
$62.95 $44.07
ISBN 9781466511071
Cat# KE16430
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:
 
 

Features

  • Provides a review of the TCP/IP protocol suite as well as IP and MAC addressing so that readers can appreciate the use of various networking tools and how they are used in a LAN and a TCP/IP network environment
  • Covers how to use built-in and third-party networking tools to diagnose network problems and performance issues as well as enhance the security of computer systems
  • Details built-in Windows networking tools and third-party networking products, including open source and freeware
  • Examines the use of a variety of software tools designed to scan for open ports to define vulnerability issues and tools to minimize and alleviate different types of hacking, ranging from keyboard loggers to firewalls and network viruses
  • Discusses a variety of networking tools that can be used to enhance the performance of a computer

Summary

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

Table of Contents

Introduction
The TCP/IP Protocol Suite
     Applications
          Current Applications
          Emerging Applications
Book Preview
     Examining the TCP/IP Protocol Suite
     IP and MAC Addressing
     Transport Layer Protocols
     Working with the Command Prompt
     Windows Built-In Networking Tools
      Network Monitoring
     Network Security
     Efficiency Methods

Examining the TCP/IPProtocol Suite
ISO Reference Model
     OSI Reference Model Layers
          Layer 1: The Physical Layer
          Layer 2: The Data Link Layer
          Layer 2 Subdivision
          Layer 3: The Network Layer
          Layer 4: The Transport Layer
          Layer 5: The Session Layer
          Layer 6: The Presentation Layer
          Layer 7: The Application Layer
     Data Flow
The TCP/IP Protocol Suite
     The TCP/IP Network Layer
     IP
          IPv4 Addressing
          IPv6 Addressing
          ARP
          ICMP
     The Transport Layer
          TCP
          UDP
     The Application Layer
Data Flow within a TCP/IP Network
Summary

Addressing at Layers2 and 3 and the Internet Protocol
Data Link Addressing
     Ethernet Frame Operations
          Basic Ethernet
          Full Duplex and the PAUSE Frame
          vLAN Tagging
          SNAP Frames
          Frame Determination
Fast Ethernet
     4B5B Coding
     Delimiters
     Interframe Gap
Gigabit Ethernet
     Standards Evolution
          Varieties
     Frame Format Modifications
          Carrier Extension
          Half-Duplex Use
          Frame Bursting
          Jumbo Frames
Gigabit Ethernet
     Fiber Standards
          10GBASE-SR
          10GBASE-LR
          10GBASE-LRM
          10GBASE-ER
          10GBASE-ZR
          10GBASE-LX4
     Copper
          10GBASE-CX4
          10GSFP+Cu
          Backplane 10 GBps Ethernet
          10GBASE-T
The IPv4 Header
     Vers Field
     Hlen and Total Length Fields
     Type of Service Field
     Identification Field
     Flags Field
     Fragment Offset Field
     Time to Live Field
     Protocol Field
     Checksum Field
     Source and Destination Address Fields
     Options and Padding Fields
IPv4 Addressing
     Overview
     Addressing
     Basic Addressing Scheme
          Address Classes
          Address Formats
          Address Composition and Notation
          Special IPv4 Addresses
          Subnetting and the Subnet Mask
          Classless Networking
The IPv6 Header
     Ver Field
     Priority Field
     Flow Label Field
     Payload Length Field
     Next Header Field
     Hop Limit Field
     Source and Destination Address Fields
          Address Types
          Address Notation
          Address Allocation
     Provider-Based Unicast Addresses
     Multicast Addresses
     Transporting IPv4 Addresses
ICMP and ARP
     ICMP
          ICMPv4
          ICMPv6
     ARP
          LAN Delivery
     RARP

Transport Layer Protocols
TCP
     TCP Header
          Source and Destination Port Fields
          Sequence and Acknowledgment Number Fields
          Hlen Field
           Code Bit Field
          Window Field
          Checksum Field
          Urgent Pointer Field
          Options Field
          Padding Field
     Connection Establishment
          Connection Function Calls
          Port Hiding 
          Passive OPEN
          Active OPEN
     The Three-Way Handshake
          Overview
          Operation
          The TCP Window
          Avoiding Congestion
     TCP Retransmissions
     Session Termination
UDP
     UDP Header
          Source and Destination Port Fields
          Length Field
          Checksum Field
     Operation
     Applications

Working with the Command Prompt
The Command Prompt Location
     Options
     Positioning upon Opening
     Controlling the Command Prompt Window
Working with Function Keys and Commands
     Function Key Use
     Repertoire of Commands
          The Help Command
          The CLS Command
     Controlling Output and Additional Commands
          Redirection Methods
          Other Useful Commands

Windows Built-In Networking Tools
Ping
     Discovery via Ping
     Ping Options
     Using the Round-Trip Delay
Tracert
     Using Tracert
The Pathping Command
The ipconfig Command
     The Release and Renew Options
     The Flushdns Option
     The Displaydns Option
ARP
     Reverse ARP (RARP) and ARP and IPv6
The Getmac Command
The Netstat Command
     Command Format
The Route Command
     Command Format
     Commands Supported
     The Destination Option
     Mask and Netmask
     The Gateway Option
     The Metric Option
     The If Interface Option
     Working with Route
          The IPv4 Routing Table
          The IPv6 Routing Table
The Nslookup Command
The Getmac Command
The Net Command
     The Net Accounts Command
          Net Accounts Options
     The Net Computer Option
     The Net Config Option
     The Net Continue, Start, and Stop Options
     The Net File Option
     The Net Helpmsg
     The Net Send Command
     The Net Localgroup Option
     The Net Share Command Option
     The Net Session Command
     The Net Statistics Command
      The Net Time Command
     The Net Use Command
The Net User Command
The Netsh Command
     The Netsh Wlan Command
          The Add Subcommand
          The Connect Subcommand 
          The Delete Subcommand
          The Export Profile Subcommand
          Other Netsh Wlan Functions

Network Monitoring with Wireshark and WinDump
Wireshark
     Program Evolution
     Obtaining the Program
     Program Overview
     The Capture Screen
          Packet Colors
          Examining a Packet
          File Menu Options
     Working with Filters
          Filter Expressions
          Applying a Filter
Statistics 
     Summary Data
     Protocol Hierarchy
     Conversations
     Endpoints
      Packet Lengths
     Conversation List 
     Endpoint List and Other Entries
     Telephony
          RTP
          Stream Analysis
          VoIP Calls
     The Tools Menu
WinDump
     Overview
          Initial Operation
          Selecting an Interface
          Program Format
     Using Multiple Switches
     Program Switches
     WinDump Expressions
          Qualifiers
          Expression Primitives
          Relationship Operators
          Utilization Examples

Network Intrusion and Security
Snort 
     Requirements
     Installation
     Commencing Snort
          Sniffer Mode
          Packet Logger Mode
          Network Intrusion Detection System Mode 
     Command Switches
     Network Intrusion Detection System Mode
Using SpywareBlaster
     Obtaining the Program
     Adding Protection
          Restricted Site Protection
          System Snapshot
     The Tools Menu
          Flash Killer
           Custom Blocking
     Checking for Updates
Using Online Armor
     Installation
     Operation
AXCrypt File Encryption
     Installation
     Operation

Enhancing Network Performance
Third-Party Networking Tools
     Bandwidth Tools
     IP Tools
     Miscellaneous Networking Tools
     Network Information
     Other Sites to Consider
     Using Search Tools
Windows Built-In Networking Tools
     Disk Cleanup
     Why Disk Defragmentation Matters
     Resource Monitor
     System Information

Index

 
Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us