Windows Networking Tools : The Complete Guide to Management, Troubleshooting, and Security book cover
1st Edition

Windows Networking Tools
The Complete Guide to Management, Troubleshooting, and Security

ISBN 9781466511064
Published November 21, 2012 by Auerbach Publications
390 Pages 112 B/W Illustrations

SAVE $20.99
was $69.95
USD $48.96

Prices & shipping based on shipping country


Book Description

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

Table of Contents

The TCP/IP Protocol Suite
          Current Applications
          Emerging Applications
Book Preview
     Examining the TCP/IP Protocol Suite
     IP and MAC Addressing
     Transport Layer Protocols
     Working with the Command Prompt
     Windows Built-In Networking Tools
      Network Monitoring
     Network Security
     Efficiency Methods

Examining the TCP/IPProtocol Suite
ISO Reference Model
     OSI Reference Model Layers
          Layer 1: The Physical Layer
          Layer 2: The Data Link Layer
          Layer 2 Subdivision
          Layer 3: The Network Layer
          Layer 4: The Transport Layer
          Layer 5: The Session Layer
          Layer 6: The Presentation Layer
          Layer 7: The Application Layer
     Data Flow
The TCP/IP Protocol Suite
     The TCP/IP Network Layer
          IPv4 Addressing
          IPv6 Addressing
     The Transport Layer
     The Application Layer
Data Flow within a TCP/IP Network

Addressing at Layers2 and 3 and the Internet Protocol
Data Link Addressing
     Ethernet Frame Operations
          Basic Ethernet
          Full Duplex and the PAUSE Frame
          vLAN Tagging
          SNAP Frames
          Frame Determination
Fast Ethernet
     4B5B Coding
     Interframe Gap
Gigabit Ethernet
     Standards Evolution
     Frame Format Modifications
          Carrier Extension
          Half-Duplex Use
          Frame Bursting
          Jumbo Frames
Gigabit Ethernet
     Fiber Standards
          Backplane 10 GBps Ethernet
The IPv4 Header
     Vers Field
     Hlen and Total Length Fields
     Type of Service Field
     Identification Field
     Flags Field
     Fragment Offset Field
     Time to Live Field
     Protocol Field
     Checksum Field
     Source and Destination Address Fields
     Options and Padding Fields
IPv4 Addressing
     Basic Addressing Scheme
          Address Classes
          Address Formats
          Address Composition and Notation
          Special IPv4 Addresses
          Subnetting and the Subnet Mask
          Classless Networking
The IPv6 Header
     Ver Field
     Priority Field
     Flow Label Field
     Payload Length Field
     Next Header Field
     Hop Limit Field
     Source and Destination Address Fields
          Address Types
          Address Notation
          Address Allocation
     Provider-Based Unicast Addresses
     Multicast Addresses
     Transporting IPv4 Addresses
          LAN Delivery

Transport Layer Protocols
     TCP Header
          Source and Destination Port Fields
          Sequence and Acknowledgment Number Fields
          Hlen Field
           Code Bit Field
          Window Field
          Checksum Field
          Urgent Pointer Field
          Options Field
          Padding Field
     Connection Establishment
          Connection Function Calls
          Port Hiding 
          Passive OPEN
          Active OPEN
     The Three-Way Handshake
          The TCP Window
          Avoiding Congestion
     TCP Retransmissions
     Session Termination
     UDP Header
          Source and Destination Port Fields
          Length Field
          Checksum Field

Working with the Command Prompt
The Command Prompt Location
     Positioning upon Opening
     Controlling the Command Prompt Window
Working with Function Keys and Commands
     Function Key Use
     Repertoire of Commands
          The Help Command
          The CLS Command
     Controlling Output and Additional Commands
          Redirection Methods
          Other Useful Commands

Windows Built-In Networking Tools
     Discovery via Ping
     Ping Options
     Using the Round-Trip Delay
     Using Tracert
The Pathping Command
The ipconfig Command
     The Release and Renew Options
     The Flushdns Option
     The Displaydns Option
     Reverse ARP (RARP) and ARP and IPv6
The Getmac Command
The Netstat Command
     Command Format
The Route Command
     Command Format
     Commands Supported
     The Destination Option
     Mask and Netmask
     The Gateway Option
     The Metric Option
     The If Interface Option
     Working with Route
          The IPv4 Routing Table
          The IPv6 Routing Table
The Nslookup Command
The Getmac Command
The Net Command
     The Net Accounts Command
          Net Accounts Options
     The Net Computer Option
     The Net Config Option
     The Net Continue, Start, and Stop Options
     The Net File Option
     The Net Helpmsg
     The Net Send Command
     The Net Localgroup Option
     The Net Share Command Option
     The Net Session Command
     The Net Statistics Command
      The Net Time Command
     The Net Use Command
The Net User Command
The Netsh Command
     The Netsh Wlan Command
          The Add Subcommand
          The Connect Subcommand 
          The Delete Subcommand
          The Export Profile Subcommand
          Other Netsh Wlan Functions

Network Monitoring with Wireshark and WinDump
     Program Evolution
     Obtaining the Program
     Program Overview
     The Capture Screen
          Packet Colors
          Examining a Packet
          File Menu Options
     Working with Filters
          Filter Expressions
          Applying a Filter
     Summary Data
     Protocol Hierarchy
      Packet Lengths
     Conversation List 
     Endpoint List and Other Entries
          Stream Analysis
          VoIP Calls
     The Tools Menu
          Initial Operation
          Selecting an Interface
          Program Format
     Using Multiple Switches
     Program Switches
     WinDump Expressions
          Expression Primitives
          Relationship Operators
          Utilization Examples

Network Intrusion and Security
     Commencing Snort
          Sniffer Mode
          Packet Logger Mode
          Network Intrusion Detection System Mode 
     Command Switches
     Network Intrusion Detection System Mode
Using SpywareBlaster
     Obtaining the Program
     Adding Protection
          Restricted Site Protection
          System Snapshot
     The Tools Menu
          Flash Killer
           Custom Blocking
     Checking for Updates
Using Online Armor
AXCrypt File Encryption

Enhancing Network Performance
Third-Party Networking Tools
     Bandwidth Tools
     IP Tools
     Miscellaneous Networking Tools
     Network Information
     Other Sites to Consider
     Using Search Tools
Windows Built-In Networking Tools
     Disk Cleanup
     Why Disk Defragmentation Matters
     Resource Monitor
     System Information


View More