- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Computer Networking: Internet Protocols in Action Paperback – Jan 3 2005
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
From the Back Cover
Hands-on networking experience, without the lab!
The best way to learn about network protocols is to see them in action. But that doesn’t mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network.
Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and follow the text to perform the exercises, gaining a thorough understanding of the material by seeing it in action.
- Practicality: Readers are able to learn by doing, without having to use actual networks. Instructors can add an active learning component to their course without the overhead of collecting the materials.
- Flexibility: This approach has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
- Completeness: The exercises take the reader from the basics of examining quiet and busy networks through application, transport, network, and link layers to the crucial issues of network security.
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
The book is very logically organized. Section 1 is an introduction to using Ethereal to collect and inspect packets. I was unaware of Ethereal's ability to color packets based on user-specified 'color rules'. Section 1 also describes the various Ethereal panes and what they mean.
Section 2 starts the hands-on packet analysis work. The CD accompanying the book offers 30 MB of packet traces collected by the author. She uses these traces to expertly illustrate a variety of networking concepts. Section 2 introduces the top of the protocol stack by looking at application protocols. I learned about HTTP Last-Modified, If-Modified-Since, Cache-Control, and ETag headers.
Section 3 discusses transport layer protocols like TCP and UDP. I really liked the author's exposition on TCP Selective Acknowledgement (SACK), and I was glad to see she fully understood and explained TCP sequence numbers. I also finally grapsed the idea behind TCP time sequence graphs by reading this part.
Section 4 covered network layer protocols. After fairly standard material on DHCP, ping, and traceroute, I was surprised and pleased to read about routing protocols. Both interior protocols (RIP and OSPF) and an exterior protocol (BGP) made appearances. Better yet, analysts can examine traffic traces to understand how these protocols work.
Section 5 talked about link-level protocols (wired and wireless), and section 6 concludes the book with a few examples of security-related network events.
My few problems with CN:IPIA are overshadowed by the excellent material elsewhere. On p. 79 the author writes that a mail server involved in exchanging a message is the system which makes a DNS query. In fact, the trace shows it's the mail client, a laptop, making the query. Since the mail server in the example is also the sample network's DNS server, any query it makes would be answered by itself -- and wouldn't appear on the wire. On p. 109, in the second paragraph, the last two references to 'packet 7' should be 'packet 6'. I also think readers should have seen an example of active FTP to complement the book's discussion of passive FTP.
If you're looking to gain a packet-oriented understanding of networking, you must buy this book. It's a fast read, but I have not seen a better hands-on introduction to network traffic. Those wishing to learn packet analysis should start their journey with CN:IPIA, and spend plenty of time inspecting the traces on the book's CD.
So in this book you don't just read about network protocols, you analyze them yourself using this software package. You get to actually see what the various packages like your internet browser are actually sending and receiving. This is a great way to remove the mystery of what networks are actually doing.
At the end of the book there is some discussion and illustrations of ways networks get attacked. There's quite a bit of discussion and demonstration of what the Blaster worm does, including the network traces of its action.
Great Concept, Great Implementation.
Jeanna Matthews does a very good job introducing featured aspects of computer networks. The book follows a tipical top-down approach, which has proven to be the most reasonable option for practical networking (specially at the introductory level). Each chapter begins with a brief theoretic introduction (in the style of 'basic concepts about TCP', and then presents the rest of the practical topics in a 'learn by example practice' way.
Another great point is the CD included with all the network traffic traces you need to follow each example. The book also includes a brief introduction to Ethereal (now renamed as Wireshark).
Super-recommended to students and self-learning people that really want to understand TCP/IP in practice from the ground up. It is also useful as a guide for a lab-based computer networking course (introductory level), along with 'TCP/IP essentials' by Panwar (if you want to cover more advanced topics).
I greatly appreciated the opportunity to explore routing protocols without having to set up my own test lab. I'm sure it wasn't easy to coordinate the packet traces with the text. While I am sure that there are mistakes in "book vs sample trace" examples, I believe that they constitute less than 1% of the examples.
Where the publisher needs to get with the program is that this book is getting pretty old at this point. Easy fruit that needs cleaned up includes expanding areas where protocols have advanced, especially with 802.11 (wifi) standards WPA2 and 802.11n. It's the curse of writing books like this, but if they are unwilling to provide updates, they need to quit charging US$40+ for the book.
Other topics I would like to see, since I don't usually get to examine them, include: broader coverage of other routing protocols, VLANs, trunking, port bonding, fragmentation, tunnelling, IPsec, QoS, NAT, and of course IPv6.
More tools can be used besides Wireshark for examining some of the extended topics, but I really liked using Wireshark for studying network communication. Having all of the equipment is a major distraction from looking at the raw packets and this approach is far easier since the prerequisities to successful studying are both cheaper and more straightforward.
Having this book has really helped me to catch on quick! As one of the reviewers had stated, you should check out her website and see what the students are doing...it's actually really neat!