|Other Retailer||Price Checked Time||Their Price in NZD||Our Price|
|Amazon UK||yesterday||70.82||$59.97||You save $10.85|
|Amazon US||4 days ago||70.35||$59.97||You save $10.38|
* Chapter 1 is a general introduction to networking concepts the understanding of which is required for reading the book. The chapter introduces the Open System Interconnection (OSI) networking framework, which defines seven layers for implementing network protocols, and the simpler TCP/IP model. It also explains the three different data transmission methods: synchronous, asynchronous, and packet. * Chapter two focuses on tools that can be used to monitor data transfers on the network. Three tools are covered: MS Network Monitor and Ethereal. * Chapter 3 discusses the first of the seven layers of the OSI model: the physical layer. Serial lines, modems, digital circuits, and other hardware devices are covered. The chapter also explains how the choice of the physical layer depends on the choice of the link protocol, with emphasis on Ethernet, Fast Ethernet, and Gigabyte. * Chapter 4 explains the link layer, focusing on the following link protocols: Serial Line Internet Protocol (SLIP), Compressed SLIP (CSLIP), High-level Data Link Control (HDLC), Point-to-Point Protocol (PPP), Frame Relay, and Ethernet. * Chapter 5 talks about the Internet Protocol (IP). It covers IP datagram, Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), Reverse ARP (RARP), and Internet Group Management Protocol (IGMP). * Chapter 6 covers IP addresses in IP version 4. The various classes of IP addresses, reserved IP addresses, net masks, subnetworks, and super networks. * Chapter 7 covers IP routing and IP forwarding, including handling routing tables; routing protocols, such as Routing Vector Protocols (RVP) and Link State Protocols (LSP); and Neutral Exchange Point (NIX). * Chapter 8 focused on IP version 6, which enlarges the IP address size from 4 to 16 bytes and introduces some changes to the IP datagram. * Chapter 9 covers the Transmission Control Protocol (TCP), the protocol that transfers data between applications on different computers. * Chapter 10 presents the simpler alternative to TCP, the User Datagram Protocol (UDP). * Chapter 11 covers the Domain Name System (DNS), which translates IP addresses into domain names and vice versa. * Chapter 12-17 covers a number of application protocols, namely Telnet, FTP, HTTP, SMTP, ESMTP, IMAP4, POP3, NNTP, and LDAP. * Appendix A covers working with CISCO routers. since CISCO is considered the dominant company in this area.
Alena Kabelova was born in 1964 in Budweis, Europe. She graduated in ICT at the Economical University in Prague. She worked together with Libor Dostalek as a hostmaster. She is mostly involved in development and schooling of software. At present, she works as a senior project manager at the PVT and focuses mainly on electronic banking. Her experiences as the hostmaster of an important European ISP are applied in this publication. Libor Dostalek was born in 1957 in Prague, Europe. He graduated in mathematics at the Charles University in Prague. Since last 20 years he has been involved in ICT architecture and security. His experiences as the IT architect and the hostmaster of one of the first European Internet Service Providers have been used while writing this publication. Later he became an IT architect of one of the first home banking applications fully based on the PKI architecture, and also an IT architect of one of the first GSM banking applications (mobile banking). As a head consultant, he designed the architecture of several European public certification service providers (certification authorities) and also many e-commerce and e-banking applications. The public knows him either as an author of many publications about TCP/IP and security or as a teacher. He taught at various schools as well as held various commercial courses. At present, he lectures on Cryptology at the Charles University in Prague. Nowadays, he is an employee of Siemens.