1st Edition

Windows Networking Tools The Complete Guide to Management, Troubleshooting, and Security

By Gilbert Held Copyright 2013
    390 Pages 112 B/W Illustrations
    by Auerbach Publications

    390 Pages
    by Auerbach Publications

    Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

    Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

    In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

    Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

    Introduction
    The TCP/IP Protocol Suite
         Applications
              Current Applications
              Emerging Applications
    Book Preview
         Examining the TCP/IP Protocol Suite
         IP and MAC Addressing
         Transport Layer Protocols
         Working with the Command Prompt
         Windows Built-In Networking Tools
          Network Monitoring
         Network Security
         Efficiency Methods

    Examining the TCP/IPProtocol Suite
    ISO Reference Model
         OSI Reference Model Layers
              Layer 1: The Physical Layer
              Layer 2: The Data Link Layer
              Layer 2 Subdivision
              Layer 3: The Network Layer
              Layer 4: The Transport Layer
              Layer 5: The Session Layer
              Layer 6: The Presentation Layer
              Layer 7: The Application Layer
         Data Flow
    The TCP/IP Protocol Suite
         The TCP/IP Network Layer
         IP
              IPv4 Addressing
              IPv6 Addressing
              ARP
              ICMP
         The Transport Layer
              TCP
              UDP
         The Application Layer
    Data Flow within a TCP/IP Network
    Summary

    Addressing at Layers2 and 3 and the Internet Protocol
    Data Link Addressing
         Ethernet Frame Operations
              Basic Ethernet
              Full Duplex and the PAUSE Frame
              vLAN Tagging
              SNAP Frames
              Frame Determination
    Fast Ethernet
         4B5B Coding
         Delimiters
         Interframe Gap
    Gigabit Ethernet
         Standards Evolution
              Varieties
         Frame Format Modifications
              Carrier Extension
              Half-Duplex Use
              Frame Bursting
              Jumbo Frames
    Gigabit Ethernet
         Fiber Standards
              10GBASE-SR
              10GBASE-LR
              10GBASE-LRM
              10GBASE-ER
              10GBASE-ZR
              10GBASE-LX4
         Copper
              10GBASE-CX4
              10GSFP+Cu
              Backplane 10 GBps Ethernet
              10GBASE-T
    The IPv4 Header
         Vers Field
         Hlen and Total Length Fields
         Type of Service Field
         Identification Field
         Flags Field
         Fragment Offset Field
         Time to Live Field
         Protocol Field
         Checksum Field
         Source and Destination Address Fields
         Options and Padding Fields
    IPv4 Addressing
         Overview
         Addressing
         Basic Addressing Scheme
              Address Classes
              Address Formats
              Address Composition and Notation
              Special IPv4 Addresses
              Subnetting and the Subnet Mask
              Classless Networking
    The IPv6 Header
         Ver Field
         Priority Field
         Flow Label Field
         Payload Length Field
         Next Header Field
         Hop Limit Field
         Source and Destination Address Fields
              Address Types
              Address Notation
              Address Allocation
         Provider-Based Unicast Addresses
         Multicast Addresses
         Transporting IPv4 Addresses
    ICMP and ARP
         ICMP
              ICMPv4
              ICMPv6
         ARP
              LAN Delivery
         RARP

    Transport Layer Protocols
    TCP
         TCP Header
              Source and Destination Port Fields
              Sequence and Acknowledgment Number Fields
              Hlen Field
               Code Bit Field
              Window Field
              Checksum Field
              Urgent Pointer Field
              Options Field
              Padding Field
         Connection Establishment
              Connection Function Calls
              Port Hiding 
              Passive OPEN
              Active OPEN
         The Three-Way Handshake
              Overview
              Operation
              The TCP Window
              Avoiding Congestion
         TCP Retransmissions
         Session Termination
    UDP
         UDP Header
              Source and Destination Port Fields
              Length Field
              Checksum Field
         Operation
         Applications

    Working with the Command Prompt
    The Command Prompt Location
         Options
         Positioning upon Opening
         Controlling the Command Prompt Window
    Working with Function Keys and Commands
         Function Key Use
         Repertoire of Commands
              The Help Command
              The CLS Command
         Controlling Output and Additional Commands
              Redirection Methods
              Other Useful Commands

    Windows Built-In Networking Tools
    Ping
         Discovery via Ping
         Ping Options
         Using the Round-Trip Delay
    Tracert
         Using Tracert
    The Pathping Command
    The ipconfig Command
         The Release and Renew Options
         The Flushdns Option
         The Displaydns Option
    ARP
         Reverse ARP (RARP) and ARP and IPv6
    The Getmac Command
    The Netstat Command
         Command Format
    The Route Command
         Command Format
         Commands Supported
         The Destination Option
         Mask and Netmask
         The Gateway Option
         The Metric Option
         The If Interface Option
         Working with Route
              The IPv4 Routing Table
              The IPv6 Routing Table
    The Nslookup Command
    The Getmac Command
    The Net Command
         The Net Accounts Command
              Net Accounts Options
         The Net Computer Option
         The Net Config Option
         The Net Continue, Start, and Stop Options
         The Net File Option
         The Net Helpmsg
         The Net Send Command
         The Net Localgroup Option
         The Net Share Command Option
         The Net Session Command
         The Net Statistics Command
          The Net Time Command
         The Net Use Command
    The Net User Command
    The Netsh Command
         The Netsh Wlan Command
              The Add Subcommand
              The Connect Subcommand 
              The Delete Subcommand
              The Export Profile Subcommand
              Other Netsh Wlan Functions

    Network Monitoring with Wireshark and WinDump
    Wireshark
         Program Evolution
         Obtaining the Program
         Program Overview
         The Capture Screen
              Packet Colors
              Examining a Packet
              File Menu Options
         Working with Filters
              Filter Expressions
              Applying a Filter
    Statistics 
         Summary Data
         Protocol Hierarchy
         Conversations
         Endpoints
          Packet Lengths
         Conversation List 
         Endpoint List and Other Entries
         Telephony
              RTP
              Stream Analysis
              VoIP Calls
         The Tools Menu
    WinDump
         Overview
              Initial Operation
              Selecting an Interface
              Program Format
         Using Multiple Switches
         Program Switches
         WinDump Expressions
              Qualifiers
              Expression Primitives
              Relationship Operators
              Utilization Examples

    Network Intrusion and Security
    Snort 
         Requirements
         Installation
         Commencing Snort
              Sniffer Mode
              Packet Logger Mode
              Network Intrusion Detection System Mode 
         Command Switches
         Network Intrusion Detection System Mode
    Using SpywareBlaster
         Obtaining the Program
         Adding Protection
              Restricted Site Protection
              System Snapshot
         The Tools Menu
              Flash Killer
               Custom Blocking
         Checking for Updates
    Using Online Armor
         Installation
         Operation
    AXCrypt File Encryption
         Installation
         Operation

    Enhancing Network Performance
    Third-Party Networking Tools
         Bandwidth Tools
         IP Tools
         Miscellaneous Networking Tools
         Network Information
         Other Sites to Consider
         Using Search Tools
    Windows Built-In Networking Tools
         Disk Cleanup
         Why Disk Defragmentation Matters
         Resource Monitor
         System Information

    Index

    Biography

    Gilbert Held