x Contents 4GSKXKYUR[ZOUT[YOTM*49 8.8 WINS 149 /TZXUJ[IZOUT =/49TGSKXKMOYZXGZOUT =/49TGSKXKYUR[ZOUT =/49VXU^_GMKTZY 8.9 SNMP (simple network management protocol) 150 9436HGYOIIUSVUTKTZY 9436HGYOIIUSSGTJY 9436SGTGMKSKTZOTLUXSGZOUTHGYK3/( 9436\VXUZUIURUVKXGZOUTY 9436SGTGMKSKTZ 9436YKI[XOZ_ 9436OTZKXUVKXGHOROZ_ 8.10 SMTP (simple mail transfer protocol) 154 8.11 POP (post office protocol) 155 8.12 BOOTP (bootstrap protocol) 156 8.13 DHCP (dynamic host configuration protocol) 158 *.)6UVKXGZOUT *.)6SKYYGMKLUXSGZ 9 :)6/6[ZOROZOKY 9.1 Introduction 162 9.2 PING (packet Internet groper) 163 9.3 ARP 166 9.4 NETSTAT 167 9.5 NBTSTAT 167 9.6 IPCONFIG 168 9.7 WINIPCFG 169 9.8 TRACE RouTe 170 9.9 ROUTE 172 9.10 The HOSTS file 173 10 2'4Y_YZKSIUSVUTKTZY 10.1 Introduction 174 10.2 Repeaters 175 6GIQGMOTM 2UIGR+ZNKXTKZXKVKGZKXY 8KSUZKXKVKGZKXY 10.3 Media converters 176 Contents xi 10.4 Bridges 177 /TZKRROMKTZHXOJMKY 9U[XIKXU[ZOTMHXOJMKY 98:GTJZXGTYRGZOUTGRHXOJMKY 2UIGR\YXKSUZKHXOJMKY 10.5 Hubs 179 *KYQZUV\YYZGIQGHRKN[HY 9NGXKJ\YY]OZINKJN[HY 3GTGMKJN[HY 9KMSKTZGHRKN[HY *[GRYVKKJN[HY 3UJ[RGXN[HY .[HOTZKXIUTTKIZOUT 10.6 Switches 182 )[ZZNXU[MN\YYZUXKGTJLUX]GXJ 2G_KXY]OZINKY\YRG_KXY]OZINKY ,[RRJ[VRK^Y]OZINKY 9]OZINGVVROIGZOUTY 10.7 Routers 186 :]UVUXZ\YS[RZOVUXZXU[ZKXY 'IIKYYXU[ZKXY (UXJKXXU[ZKXY 8U[ZOTM\YHXOJMOTM 10.8 Gateways 187 10.9 Print servers 188 10.10 Terminal servers 188 10.11 Thin servers 189 10.12 Remote access servers 189 10.13 Network timeservers 190 11 :NK/TZKXTKZ 11.1 The Internet and internet 191 11.2 The objectives, background and history of TCP/IP 191 :NKUXOMOTUL:)6GTJ/6 :NKNOYZUX_GTJHGIQMXU[TJUL:)6/6 11.3 The Internet organizational structure 192 /))(/'( /+:,/8:, :NK/TZKXTKZYUIOKZ_ /'( 11.4 The World Wide Web 193 11.5 An introduction to HTML 194 xii Contents 11.6 HTTP 194 11.7 Java 195 11.8 CGI 196 11.9 Scripting: JavaScript 196 11.10 XML 196 11.11 Server side includes 197 11.12 Perl 197 12 /TZKXTKZGIIKYY 12.1 Connecting a single host to the Internet 198 12.2 Connecting remote hosts to corporate LAN 200 12.3 Connecting multiple hosts to the Internet 200 )UTTKIZOUT\OGVXU^_YKX\KX )UTTKIZOUT\OG4':YKX\KX/6SGYW[KXGJOTM )UTTKIZOUT\OG/6YNGXKX )UTTKIZOUT\OG;4/>UX4:MGZK]G_ )UTTKIZOUT\OGJKJOIGZKJXU[ZKX 13 :NK/TZKXTKZLUXIUSS[TOIGZOUTY 13.1 Introduction 203 13.2 Hardware and software issues 203 13.3 Speed/bandwidth issues 204 13.4 Legal issues 204 13.5 E-mail 205 656GTJ93:6YKX\KXY +SGORYULZ]GXKXKYOJOTMUTZNKRUIGRNUYZ]UXQYZGZOUT +SGORYULZ]GXKXKYOJOTMUTGXKSUZKYKX\KX <UOIKXKZXOK\GRULKSGOR 13.6 Internet telephony 206 /TZXUJ[IZOUT 6)ZU6) 6)ZUVNUTK 6NUTKZUVNUTK 3O^KJ6)VNUTKZUSO^KJ6)VNUTK]OZNOTZXGTKZ6(> /TIUSOTMIGRRY]OZNIGRR]GOZOTM 5[ZMUOTMIGRRY]OZNXKM[RGXVNUTKZNXU[MN6) 2O\K\UOIKIUSS[TOIGZOUT]OZNI[YZUSKXY\OG]KHVGMK 9KI[XKVNUTKY 13.7 Paging 209 939YNUXZSKYYGMKYKX\OIK *'0*YUIQ Contents xiii 13.8 Voice mail 210 6)ZU6) 13.9 Fax 211 ,G^SGINOTKKSGORZULG^SGINOTKKSGOR ,G^SGINOTKZULG^SGINOTK 13.10 Video conferencing 211 <OJKUG[JOUJUI[SKTZIUTLKXKTIOTM <OJKUTKZ]UXQOTM 13.11 News 212 4K]YV[YN 4K]YV[RR 4K]YMXU[VY ;9+4+: 9KGXINGMKTZY 13.12 Additional information 214 /TZKXTKZZKRKVNUT_ <OJKUIUTLKXKTIOTM 6GMOTM ,G^ <UOIKIUSS[TOIGZOUT\OG]KHVGMKROTQ <UOIKSGOR 4K]YYKX\OIKY 666YKX\KXY +SGOR 14 9KI[XOZ_IUTYOJKXGZOUTY 14.1 The security problem 216 14.2 Controlling access to the network 218 '[ZNKTZOIGZOUT 8U[ZKXY ,OXK]GRRY 14.3 Intrusion detection systems (IDS) 223 .UYZHGYKJ/*9 4KZ]UXQHGYKJ/*9 14.4 Security management 224 )KXZOLOIGZOUT /TLUXSGZOUTYKI[XOZ_VUROIOKY 9KI[XOZ_GJ\OYUX_YKX\OIKY 14.5 The public key infrastructure (PKI) 227 /TZXUJ[IZOUTZUIX_VZUMXGVN_ +TIX_VZOUTGTJJOMOZGRYOMTGZ[XKK^VRGOTKJ 61/JKLOTOZOUTV[HROIQK_OTLXGYZX[IZ[XK 61/L[TIZOUTY 14.6 References 232 /TZKXTKZK^ZXGTKZOTZXGTKZYKI[XOZ_ xiv Contents +TIX_VZOUT ,OXK]GRRYVXU^_YKX\KXYKZI 15 6XUIKYYG[ZUSGZOUT 15.1 Background 234 15.2 Legacy automation architectures 234 15.3 The factory of the future 236 :NKTKZ]UXQOTMVXUZUIURYZGIQ 'VVROIGZOUTRG_KXJGZGYZX[IZ[XKY +SHKJJKJ]KHYKX\KXY 8U[ZKXYGTJY]OZINKY 4KZ]UXQGIIKYY :NOTYKX\KXY 4KZ]UXQIGVGHRKGVVROIGZOUTVXUIKYYUXY4)'6Y +ZNKXTKZIUSVGZOHRK62)Y +ZNKXTKZIUSVGZOHRK9)'*'Y_YZKSY 15.4 References 241 '[ZUSGZOUTZXKTJY :)6/6HGYKJLGIZUX_G[ZUSGZOUT :NOTYKX\KXY =KHIUSVGZOHRK9)'*'Y_YZKSY 0G\G 16 /TYZGRROTMGTJZXU[HRKYNUUZOTM+ZNKXTKZY_YZKSY 16.1 Network drivers 243 4KZ]UXQJXO\KXY )USVGZOHOROZ_GTJ[YGMK 16.2 Network card/driver configuration 244 16.3 Network driver interface specification (NDIS) 245 16.4 Open data link interface (ODI) 245 16.5 Packet drivers 246 16.6 Plug and play architecture 246 16.7 PCMCIA interface 246 /TZXUJ[IZOUT 6)3)/'OTZKXLGIK 16.8 Protocol analyzers 247 17 :XU[HRKYNUUZOTM:)6/6 17.1 Maintenance and troubleshooting of real TCP/IP networks 249 17.2 Network troubleshooting 250 /TIXKGYOTMT[SHKXULIURROYOUTYUTZNK+ZNKXTKZTKZ]UXQ . Network timeservers 190 11 :NK/TZKXTKZ 11.1 The Internet and internet 191 11.2 The objectives, background and history of TCP/IP 191 :NKUXOMOTUL:)6GTJ/6 :NKNOYZUX_GTJHGIQMXU[TJUL:)6/6. 13 :NK/TZKXTKZLUXIUSS[TOIGZOUTY 13.1 Introduction 203 13.2 Hardware and software issues 203 13.3 Speed/bandwidth issues 204 13.4 Legal issues 204 13.5 E-mail 205 656GTJ93:6YKXKXY. 16.8 Protocol analyzers 247 17 :XU[HRKYNUUZOTM:)6/6 17.1 Maintenance and troubleshooting of real TCP/IP networks 249 17.2 Network troubleshooting 250 /TIXKGYOTMT[SHKXULIURROYOUTYUTZNK+ZNKXTKZTKZ]UXQ