1st Edition
Windows Networking Tools The Complete Guide to Management, Troubleshooting, and Security
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.
Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.
In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.
Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.
Introduction
The TCP/IP Protocol Suite
Applications
Current Applications
Emerging Applications
Book Preview
Examining the TCP/IP Protocol Suite
IP and MAC Addressing
Transport Layer Protocols
Working with the Command Prompt
Windows Built-In Networking Tools
Network Monitoring
Network Security
Efficiency Methods
Examining the TCP/IPProtocol Suite
OSI Reference Model Layers
Layer 1: The Physical Layer
Layer 2: The Data Link Layer
Layer 2 Subdivision
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer
Data Flow
The TCP/IP Protocol Suite
The TCP/IP Network Layer
IP
IPv4 Addressing
IPv6 Addressing
ARP
ICMP
The Transport Layer
TCP
UDP
The Application Layer
Data Flow within a TCP/IP Network
Summary
Addressing at Layers2 and 3 and the Internet Protocol
Ethernet Frame Operations
Basic Ethernet
Full Duplex and the PAUSE Frame
vLAN Tagging
SNAP Frames
Frame Determination
Fast Ethernet
4B5B Coding
Delimiters
Interframe Gap
Gigabit Ethernet
Standards Evolution
Varieties
Frame Format Modifications
Carrier Extension
Half-Duplex Use
Frame Bursting
Jumbo Frames
Gigabit Ethernet
Fiber Standards
10GBASE-SR
10GBASE-LR
10GBASE-LRM
10GBASE-ER
10GBASE-ZR
10GBASE-LX4
Copper
10GBASE-CX4
10GSFP+Cu
Backplane 10 GBps Ethernet
10GBASE-T
The IPv4 Header
Vers Field
Hlen and Total Length Fields
Type of Service Field
Identification Field
Flags Field
Fragment Offset Field
Time to Live Field
Protocol Field
Checksum Field
Source and Destination Address Fields
Options and Padding Fields
IPv4 Addressing
Overview
Addressing
Basic Addressing Scheme
Address Classes
Address Formats
Address Composition and Notation
Special IPv4 Addresses
Subnetting and the Subnet Mask
Classless Networking
The IPv6 Header
Ver Field
Priority Field
Flow Label Field
Payload Length Field
Next Header Field
Hop Limit Field
Source and Destination Address Fields
Address Types
Address Notation
Address Allocation
Provider-Based Unicast Addresses
Multicast Addresses
Transporting IPv4 Addresses
ICMP and ARP
ICMP
ICMPv4
ICMPv6
ARP
LAN Delivery
RARP
Transport Layer Protocols
TCP
TCP Header
Source and Destination Port Fields
Sequence and Acknowledgment Number Fields
Hlen Field
Code Bit Field
Window Field
Checksum Field
Urgent Pointer Field
Options Field
Padding Field
Connection Establishment
Connection Function Calls
Port Hiding
Passive OPEN
Active OPEN
The Three-Way Handshake
Overview
Operation
The TCP Window
Avoiding Congestion
TCP Retransmissions
Session Termination
UDP
UDP Header
Source and Destination Port Fields
Length Field
Checksum Field
Operation
Applications
Working with the Command Prompt
Options
Positioning upon Opening
Controlling the Command Prompt Window
Working with Function Keys and Commands
Function Key Use
Repertoire of Commands
The Help Command
The CLS Command
Controlling Output and Additional Commands
Redirection Methods
Other Useful Commands
Windows Built-In Networking Tools
Discovery via Ping
Ping Options
Using the Round-Trip Delay
Tracert
Using Tracert
The Pathping Command
The ipconfig Command
The Release and Renew Options
The Flushdns Option
The Displaydns Option
ARP
Reverse ARP (RARP) and ARP and IPv6
The Getmac Command
The Netstat Command
Command Format
The Route Command
Command Format
Commands Supported
The Destination Option
Mask and Netmask
The Gateway Option
The Metric Option
The If Interface Option
Working with Route
The IPv4 Routing Table
The IPv6 Routing Table
The Nslookup Command
The Getmac Command
The Net Command
The Net Accounts Command
Net Accounts Options
The Net Computer Option
The Net Config Option
The Net Continue, Start, and Stop Options
The Net File Option
The Net Helpmsg
The Net Send Command
The Net Localgroup Option
The Net Share Command Option
The Net Session Command
The Net Statistics Command
The Net Time Command
The Net Use Command
The Net User Command
The Netsh Command
The Netsh Wlan Command
The Add Subcommand
The Connect Subcommand
The Delete Subcommand
The Export Profile Subcommand
Other Netsh Wlan Functions
Network Monitoring with Wireshark and WinDump
Wireshark
Program Evolution
Obtaining the Program
Program Overview
The Capture Screen
Packet Colors
Examining a Packet
File Menu Options
Working with Filters
Filter Expressions
Applying a Filter
Statistics
Summary Data
Protocol Hierarchy
Conversations
Endpoints
Packet Lengths
Conversation List
Endpoint List and Other Entries
Telephony
RTP
Stream Analysis
VoIP Calls
The Tools Menu
WinDump
Overview
Initial Operation
Selecting an Interface
Program Format
Using Multiple Switches
Program Switches
WinDump Expressions
Qualifiers
Expression Primitives
Relationship Operators
Utilization Examples
Network Intrusion and Security
Snort
Requirements
Installation
Commencing Snort
Sniffer Mode
Packet Logger Mode
Network Intrusion Detection System Mode
Command Switches
Network Intrusion Detection System Mode
Using SpywareBlaster
Obtaining the Program
Adding Protection
Restricted Site Protection
System Snapshot
The Tools Menu
Flash Killer
Custom Blocking
Checking for Updates
Using Online Armor
Installation
Operation
AXCrypt File Encryption
Installation
Operation
Enhancing Network Performance
Third-Party Networking Tools
Bandwidth Tools
IP Tools
Miscellaneous Networking Tools
Network Information
Other Sites to Consider
Using Search Tools
Windows Built-In Networking Tools
Disk Cleanup
Why Disk Defragmentation Matters
Resource Monitor
System Information
Index
Biography
Gilbert Held