Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security, 1st Edition (Paperback) book cover

Windows Networking Tools

The Complete Guide to Management, Troubleshooting, and Security, 1st Edition

By Gilbert Held

Auerbach Publications

390 pages | 112 B/W Illus.

Purchasing Options:$ = USD
Paperback: 9781466511064
pub: 2012-11-21
$71.95
x
Hardback: 9781138436862
pub: 2017-11-15
$205.00
x
eBook (VitalSource) : 9780429185496
pub: 2016-04-19
from $34.48


FREE Standard Shipping!

Description

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network—Wireshark—and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking—from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

Table of Contents

Introduction

The TCP/IP Protocol Suite

Applications

Current Applications

Emerging Applications

Book Preview

Examining the TCP/IP Protocol Suite

IP and MAC Addressing

Transport Layer Protocols

Working with the Command Prompt

Windows Built-In Networking Tools

Network Monitoring

Network Security

Efficiency Methods

Examining the TCP/IPProtocol Suite

ISO Reference Model

OSI Reference Model Layers

Layer 1: The Physical Layer

Layer 2: The Data Link Layer

Layer 2 Subdivision

Layer 3: The Network Layer

Layer 4: The Transport Layer

Layer 5: The Session Layer

Layer 6: The Presentation Layer

Layer 7: The Application Layer

Data Flow

The TCP/IP Protocol Suite

The TCP/IP Network Layer

IP

IPv4 Addressing

IPv6 Addressing

ARP

ICMP

The Transport Layer

TCP

UDP

The Application Layer

Data Flow within a TCP/IP Network

Summary

Addressing at Layers2 and 3 and the Internet Protocol

Data Link Addressing

Ethernet Frame Operations

Basic Ethernet

Full Duplex and the PAUSE Frame

vLAN Tagging

SNAP Frames

Frame Determination

Fast Ethernet

4B5B Coding

Delimiters

Interframe Gap

Gigabit Ethernet

Standards Evolution

Varieties

Frame Format Modifications

Carrier Extension

Half-Duplex Use

Frame Bursting

Jumbo Frames

Gigabit Ethernet

Fiber Standards

10GBASE-SR

10GBASE-LR

10GBASE-LRM

10GBASE-ER

10GBASE-ZR

10GBASE-LX4

Copper

10GBASE-CX4

10GSFP+Cu

Backplane 10 GBps Ethernet

10GBASE-T

The IPv4 Header

Vers Field

Hlen and Total Length Fields

Type of Service Field

Identification Field

Flags Field

Fragment Offset Field

Time to Live Field

Protocol Field

Checksum Field

Source and Destination Address Fields

Options and Padding Fields

IPv4 Addressing

Overview

Addressing

Basic Addressing Scheme

Address Classes

Address Formats

Address Composition and Notation

Special IPv4 Addresses

Subnetting and the Subnet Mask

Classless Networking

The IPv6 Header

Ver Field

Priority Field

Flow Label Field

Payload Length Field

Next Header Field

Hop Limit Field

Source and Destination Address Fields

Address Types

Address Notation

Address Allocation

Provider-Based Unicast Addresses

Multicast Addresses

Transporting IPv4 Addresses

ICMP and ARP

ICMP

ICMPv4

ICMPv6

ARP

LAN Delivery

RARP

Transport Layer Protocols

TCP

TCP Header

Source and Destination Port Fields

Sequence and Acknowledgment Number Fields

Hlen Field

Code Bit Field

Window Field

Checksum Field

Urgent Pointer Field

Options Field

Padding Field

Connection Establishment

Connection Function Calls

Port Hiding

Passive OPEN

Active OPEN

The Three-Way Handshake

Overview

Operation

The TCP Window

Avoiding Congestion

TCP Retransmissions

Session Termination

UDP

UDP Header

Source and Destination Port Fields

Length Field

Checksum Field

Operation

Applications

Working with the Command Prompt

The Command Prompt Location

Options

Positioning upon Opening

Controlling the Command Prompt Window

Working with Function Keys and Commands

Function Key Use

Repertoire of Commands

The Help Command

The CLS Command

Controlling Output and Additional Commands

Redirection Methods

Other Useful Commands

Windows Built-In Networking Tools

Ping

Discovery via Ping

Ping Options

Using the Round-Trip Delay

Tracert

Using Tracert

The Pathping Command

The ipconfig Command

The Release and Renew Options

The Flushdns Option

The Displaydns Option

ARP

Reverse ARP (RARP) and ARP and IPv6

The Getmac Command

The Netstat Command

Command Format

The Route Command

Command Format

Commands Supported

The Destination Option

Mask and Netmask

The Gateway Option

The Metric Option

The If Interface Option

Working with Route

The IPv4 Routing Table

The IPv6 Routing Table

The Nslookup Command

The Getmac Command

The Net Command

The Net Accounts Command

Net Accounts Options

The Net Computer Option

The Net Config Option

The Net Continue, Start, and Stop Options

The Net File Option

The Net Helpmsg

The Net Send Command

The Net Localgroup Option

The Net Share Command Option

The Net Session Command

The Net Statistics Command

The Net Time Command

The Net Use Command

The Net User Command

The Netsh Command

The Netsh Wlan Command

The Add Subcommand

The Connect Subcommand

The Delete Subcommand

The Export Profile Subcommand

Other Netsh Wlan Functions

Network Monitoring with Wireshark and WinDump

Wireshark

Program Evolution

Obtaining the Program

Program Overview

The Capture Screen

Packet Colors

Examining a Packet

File Menu Options

Working with Filters

Filter Expressions

Applying a Filter

Statistics

Summary Data

Protocol Hierarchy

Conversations

Endpoints

Packet Lengths

Conversation List

Endpoint List and Other Entries

Telephony

RTP

Stream Analysis

VoIP Calls

The Tools Menu

WinDump

Overview

Initial Operation

Selecting an Interface

Program Format

Using Multiple Switches

Program Switches

WinDump Expressions

Qualifiers

Expression Primitives

Relationship Operators

Utilization Examples

Network Intrusion and Security

Snort

Requirements

Installation

Commencing Snort

Sniffer Mode

Packet Logger Mode

Network Intrusion Detection System Mode

Command Switches

Network Intrusion Detection System Mode

Using SpywareBlaster

Obtaining the Program

Adding Protection

Restricted Site Protection

System Snapshot

The Tools Menu

Flash Killer

Custom Blocking

Checking for Updates

Using Online Armor

Installation

Operation

AXCrypt File Encryption

Installation

Operation

Enhancing Network Performance

Third-Party Networking Tools

Bandwidth Tools

IP Tools

Miscellaneous Networking Tools

Network Information

Other Sites to Consider

Using Search Tools

Windows Built-In Networking Tools

Disk Cleanup

Why Disk Defragmentation Matters

Resource Monitor

System Information

Index

Subject Categories

BISAC Subject Codes/Headings:
BUS087000
BUSINESS & ECONOMICS / Production & Operations Management
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General