Many years ago bought the "TCP/IP Detailed" 3 volume, at that time may not have seen, also may be looked and forgot, did not leave any impression, then the book also as scrap sold.
Selling books when the feeling seems to be, bought too many books, basically did not see, move moved to move the trouble, rather than from the Internet to read some information directly, three boxes of books are sold, there are many books are quite famous, the scope of the book is also very wide.
The language level, in fact, did not understand the essence of the language, and even the use of development tools as a learning language, now remember, bought a variety of "Developer's Guide": Delphi, C++builder, VB, ASP, JBuilder, C #; Now it's unthinkable, The scope is too wide, it is ensemble.
Now do not buy books, basically are borrowing books, but complete read a lot of books.
Recently wanted to look at the "TCP/IP" book, to understand many of the basic framework will involve the complete process of communication, these processes at the operating system level of reflection. It is also a project that uses the range notation for IP addresses: https://en.wikipedia.org/wiki/Subnetwork#Subnetting, and the impact of a book "Wireshark network analysis is so simple" introduced by others.
There is a book review recommended "graphic TCP/IP Fifth Edition", the first edition of 1994, the Japanese wrote the book, looked at, seemingly and for many years the feeling of almost, still can't see, do not look like also understand, see also is not reach deep and meticulous degree, seemingly also will soon forget, perhaps read such a book is This feeling.
Let's just say that, at the same time, typing records the directory structure of the book, also count as a memory.
Chapter One basic knowledge of the network
Background of computer network appearance
The popularization and diversification of 1.1.1 computer
1.1.2 from standalone mode to network interconnect mode
1.1.3 from computer communication to information communication
The function of 1.1.4 computer network
7 Stages of computer and network development
1.2.1 Batch Processing
1.2.2 CTSS
1.2.3 Communication between computers
The generation of 1.2.4 computer network
1.2.5 The popularity of the internet
1.2.6 the era of Internet technology as the center
1.2.7 from "Simply establish a connection" to "secure connection"
1.2.8 Handheld Diamond TCP/IP
Agreement
1.3.1 The ubiquitous protocols
The necessity of 1.3.2 Agreement
1.3.3 Agreement as human-to-human dialogue
1.3.4 protocols in the computer
1.3.5 Packet Switching protocol
Who rules the agreement?
The birth and standardization of 1.4.1 computer communication
Standardization of the 1.4.2 Protocol
Protocol layering and OSI reference Model
Layering of 1.5.1 protocols
1.5.2 Understanding layering through dialogue
1.5.3 OSI Reference Model
1.5.4 the role of each layer in the OSI Reference Model
Examples of OSI Reference Model communication processing
1.6.17 Layer Communication
1.6.2 Session-level processing
1.6.3 processing below the transport layer
Classification of transmission modes
1.7.1 for connection type and non-connection oriented
1.7.2 circuit switching and packet switching
1.7.3 classification based on the number of receiver terminals
Address
Uniqueness of the 1.8.1 address
1.8.2 the hierarchy of addresses
Elements of the network
1.9.1 communication Media and Data link
1.9.2 NIC
1.9.3 Repeater
1.9.4 Bridge/2-layer switch
1.9.5 Router/Layer 3 switch
1.9.6 4-7-layer Switch
1.9.7 Gateway
Modern network Real State
The composition of the 1.10.1 network
1.10.2 Internet Communication
1.10.3 Mobile Communication
1.10.4 the network from the point of view of information publishers
Chapter II Basic knowledge of TCP/IP
Background and history of the advent of TCP/IP
2.1.1 From the application of military technology
The birth of 2.1.2 Arpanet
2.1.3 The birth of TCP/IP
The popularization of 2.1.4 Unix system and the expansion of Internet
2.1.5 The Enlightenment of commercial Internet service
Standardization of TCP/IP
2.2.1 Specific meanings of TCP/IP
2.2.2 TCP/IP standardization Essence
2.2.3 TCP/IP specification--RFC
2.2.4 standardization process for TCP/IP
2.2.5 How to obtain RFC
Basic knowledge of the Internet
2.3.1 Internet definition
2.3.2 the relationship between Internet and TCP/IP
2.3.3 Structure of the Internet
2.3.4 ISP and Regional Network
TCP/IP protocol layered model
2.4.1 TCP/IP and OSI Reference Model
2.4.2 Hardware (physical layer)
2.4.3 Network interface layer (data link layer)
2.4.4 Internet Layer (Network layer)
2.4.5 Transport Layer
2.4.6 Application Layer (layering above the session layer)
TCP/IP layered model and communication example
2.5.1 Data Sheet Header
2.5.2 Sending Packets
2.5.3 packets that pass through the data link
2.5.4 Packet Receive processing
Chapter III Data Link
The role of the data link
Data Link-related technologies
3.2.1 MAC Address
3.2.2 Shared Media-type network
3.2.3 Non-shared media network
3.2.4 forwarding based on MAC address
3.2.5 Loop Detection Technology
3.2.6 VLAN
Ethernet
3.3.1 Ethernet Connection Form
Classification of 3.3.2 Ethernet
History of the 3.3.3 Ethernet
3.3.4 Ethernet Frame Format
Wireless communication
3.4.1 Types of wireless communication
3.4.2 IEEE802.11
3.4.3 ieee802.11b and ieee802.11g
3.4.4 ieee802.11a
3.4.5 IEEE802.11n
3.4.6 considerations when using a wireless LAN
3.4.7 bluetooth
3.4.8 WiMAX
3.4.9 ZigBee
Ppp
3.5.1 PPP Definition
3.5.2 LCP and NCP
3.5.3 PPP Frame format
3.5.4 PPPoE
Other data links
3.6.1 ATM
3.6.2 POS
3.6.3 FDDI
3.6.4 Token Ring
3.6.5 100vg-anylan
3.6.6 Fibre Channel
3.6.7 Hippi
3.6.8 IEEE1394
3.6.9 HDMI
3.6.10 ISCSI
3.6.11 InfiniBand
3.6.12 DOCSIS
3.6.13 High Speed PLC
Public network
3.7.1 Analog Call Lines
3.7.2 Mobile Communication Service
3.7.3 ADSL
3.7.4 FTTH
3.7.5 Cable TV
3.7.6 Line
3.7.7 VPN
3.7.8 Public Wireless LAN
3.7.9 other public wireless communication services
Fourth Chapter IP protocol
IP as Internet Protocol
4.1.1 IP equivalent to the third layer of the OSI Reference Model
The relationship between 4.1.2 Network layer and Data link layer
IP Fundamentals
4.2.1 IP address belongs to network layer address
4.2.2 Routing Control
Abstraction of the 4.2.3 Data link
4.2.4 IP is for non-connected
Basic knowledge of IP addresses
4.3.1 Definition of IP address
4.3.2 IP address consists of network and host two-part identification
4.3.3 Classification of IP addresses
4.3.4 Broadcast Address
4.3.5 IP Multicast
4.3.6 Subnet Mask
4.3.7 CIDR and VLSM
4.3.8 Global address and private address
4.3.9 The global address who decides
Routing control
4.4.1 IP address and routing control
4.4.2 Aggregation of routing control tables
IP segmentation processing and re-construction processing
4.5.1 Data Link, MTU is different
Fragmentation and recombination of IP packets in 4.5.2
4.5.3 Path MTU Discovery
IPv6
The necessity of 4.6.1 IPV6
Characteristics of 4.6.2 IPv6
4.6.3 method for labeling IP addresses in IPV6
4.6.4 structure of the IPV6 address
4.6.5 Global Unicast Address
4.6.6 Link Local Thin address
4.6.7 Unique Local Address
4.6.8 IPv6 Segmented processing
IPV4 Header
IPV6 Header Format
Fifth IP protocol Related technologies
Unable to complete communication with IP only
Dns
5.2.1 IP Address inconvenient memory
5.2.2 The generation of DNS
5.2.3 The composition of the domain name
5.2.4 DNS Queries
5.2.5 DNS is like a distributed database in the Internet
Arp
5.3.1 ARP Overview
The working mechanism of 5.3.2 ARP
5.3.3 IP address and MAC address are indispensable?
5.3.4 RARP
5.3.5 Proxy ARP
Icmp
5.4.1 ICMP for secondary IP
5.4.2 The main ICMP message
5.4.3 Other ICMP messages
5.4.4 ICMPv6
Dhcp
5.5.1 DHCP for Plug and Play
5.5.2 DHCP's working mechanism
5.5.3 DHCP Relay Agent
Nat
5.6.1 NAT Definition
Working mechanism of 5.6.2 NAT
5.6.3 nat-pt (NAPT-PT)
Potential problems with 5.6.4 NAT
5.6.5 potential problems with NAT traversal
IP tunneling
Other IP-related technologies
5.8.1 IP multicast-related technologies
5.8.2 IP anycast
5.8.3 Communication Quality Control
5.8.4 Explicit Congestion notification
5.8.5 Mobile IP
The sixth chapter TCP and UDP
The role of the transport layer
6.1.1 Transport Layer Definition
6.1.2 Communication Processing
6.1.32 Transport Layer protocols TCP and UDP
6.1.4 TCP and UDP distinction
Port number
6.2.1 Port Number Definition
6.2.2 identify applications based on port number
6.2.3 Communication recognition by IP address, port number, protocol number
6.2.4 How to determine the port number
6.2.5 Port number and protocol
Udp
Tcp
6.4.1 Characteristics of TCP machine purpose
6.4.2 improves reliability with serial number and confirmation response
6.4.3 How to determine the re-send timeout
6.4.4 Connection Management
6.4.5 TCP sends data in segments
6.4.6 using window control to increase speed
6.4.7 window control and heavy-hair control
6.4.8 Flow Control
6.4.9 Congestion Control
6.4.10 specification for improving network utilization
6.4.11 applications that use TCP
Other Transport Layer protocols
6.5.1 Udp-lite
6.5.2 SCTP
6.5.3 DCCP
Format of the UDP header
TCP Header Format
Seventh Chapter Routing Protocol
Definition of routing control
7.1.1 IP address and routing control
7.1.2 static Routing and dynamic routing
7.1.3 the basis of dynamic routing
Scope of routing control
7.2.1 various organizational structures for Internet access
7.2.2 Autonomous system and routing protocol
7.2.3 IGP and EGP
Routing algorithms
7.3.1 Distance vector algorithm
7.3.2 Link State algorithm
7.3.3 Primary Routing protocol
Rip
7.4.1 Broadcast Routing control information
7.4.2 routing based on distance vectors
7.4.3 RIP processing When using a subnet mask
7.4.4 the processing of the change of the RIP middle
7.4.5 RIP2
Ospf
7.5.1 OSPF is a link-state routing protocol
7.5.2 Basic knowledge of OSPF
7.5.3 Overview of how OSPF works
7.5.4 Subdivision management of regional stratification
Bgp
7.6.1 BGP and as number
7.6.2 BGP is a path vector protocol
Mpls
Basic network action of 7.7.1 MPLS
Advantages of 7.7.2 MPLS
Eighth Chapter Application Agreement
Application Layer Protocol Overview
Telnet
8.2.1 TELNET
8.2.2 SSH
File transfer
Email
8.4.1 e-mail working mechanism
8.4.2 e-mail address
8.4.3 MIME
8.4.4 SMTP
8.4.5 POP
8.4.6 IMAP
Www
8.5.1 the booming of the Internet
8.5.2 www basic concept
8.5.3 URI
8.5.4 HTML
8.5.5 HTTP
8.5.6 JavaScript, CGI, cookies
Network management
8.6.1 SNMP
8.6.2 MIB
8.6.3 RMON
8.6.4 SNMP Application Examples
The Nineth Chapter Network security
TCP/IP and network security
Elements of network security components
9.2.1 Firewall
9.2.2 IDs (Intrusion detection System)
9.2.3 anti-virus/Personal Firewall
Fundamentals of encryption technology
9.3.1 Symmetric cipher system and public key cryptosystem
9.3.2 Identity Authentication Technology
Security protocols
9.4.1 IPsec and VPN
9.4.2 Tls/ssl and HTTPS
9.4.3 IEEE802.1X
Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.
Diagram of TCP/IP version fifth-directory