Computer networking - internet protocols in action

Preface. Acknowledgements. Section 1: Getting Started. 1.0 Introduction. 1.1 Examining a Quiet Network with Ethereal. 1.2 Protocol Layering. 1.3 Examining a Busy Network Using Filters. Section 2: Application Layer Protocols. 2.0 Introduction. 2.1 Under the Hood of HTTP. 2.2 HTTP Caching, Authorization and Cookies. 2.3 FTP-File Transfer Protocol. 2.4 Sending and Receiving Email with SMTP and POP. Section 3: Transport Layer Protocols. 3.0 Introduction. 3.1 Simple TCP Stream. 3.2 Retransmission in TCP. 3.3 Comparing TCP to UDP. 3.4 Competing TCP and UDP Streams. Section 4: Network Layer Protocols. 4.0 Introduction. 4.1 Joining the Internet: Introduction to IP and DHCP. 4.2 Ping and Traceroute. 4.3 Dynamic Routing with RIP. Section 5: Link Layer Protocols. 5.0 Introduction. 5.1 MAC Addresses. 5.2 Ethernet. 5.3 Wireless LANs. Section 6: Security. 6.0 Introduction. 6.1 Encryption. 6.2 IP Spoofing and TCP Session Stealing. 6.3 System Vulnerabilities. Index.