For both good and ill, modern society around the world has been trans-formed by the Internet. But the Internet was not the first data communications network, not by a long shot. So, what was it about the Internet that enabled the revolution? In a very basic way, it was the use of TCP/IP. TCP/IP enabled the Internet to be the first data network where the use could be driven by the users and not controlled by the carriers. TCP/IP is an end-to- end protocol. The network is there to carry the bits from any device at the edge of the network to any other device. This stands in stark contrast to X.25, frame relay, ATM, and other carrier-managed data networks, where the carrier determined who you could talk to, and in an even starker contrast to the phone network, where the carrier determined what you could do.
This end-to-end architecture has resulted in an amazing proliferation of applications because the network does not get in the way of individual entrepreneurs developing the next great thing and running it over the Internet. It also did not get in the way of millions of people putting up their own Web pages or, with somewhat more controversy, swapping music and movie fi les. Even if you consider the Internet boom and subsequent bust, the Internet, and TCP/IP, are here to stay. And, while here, they will continue to radically change the way we interact with employers, service providers, each other, and the world at large.
Table of Contents
Part I: TCP/IP from Names to Addresses
Chapter 1: Understanding TCP/IP Basics.
Chapter 2: Layering TCP/IP Protocols.
Chapter 3: Serving Up Clients and Servers
Chapter 4: Nice Names and Appetizing Addresses
Chapter 5: Need More Addresses? Try Subnetting and NAT
Part II: Getting Connected
Chapter 6: Configuring a TCP/IP Network — the Software Side
Chapter 7: Networking SOHO with Wireless
Chapter 8: Advancing into Routing Protocols
Chapter 9: IPv6: IP on Steroids.
Chapter 10: Serving Up DNS (The Domain Name System)
Part III: Configuring Clients and Servers: Web, E-Mail, and Chat
Chapter 11: Digesting Web Clients and Servers.
Chapter 12: Minimum Security Facilities.
Chapter 13: Eating Up E-Mail
Chapter 14: Securing E-Mail
Chapter 15: Beyond E-Mail: Social Networking and Online Communities.
Part IV: Even More TCP/IP Applications and Services
Chapter 16: Mobile IP — The Moveable Feast
Chapter 17: Saving Money with VoIP (Voice Over Internet Protocol)
Chapter 18: File and Print Sharing Services
Chapter 19: Sharing Compute Power
Part V: Network Troubleshooting and Security
Chapter 20: Staying with Security Protocols
Chapter 21: Relishing More Meaty Security
Chapter 22: Troubleshooting Connectivity and Performance Problems
Part VI: The Part of Tens
Chapter 23: Ten More Uses for TCP/IP
Chapter 24: Ten More Resources for Information about TCP/IP Security