- Paperback: 746 pages
- Publisher: O'Reilly Media; 3 edition (April 2002)
- Language: English
- ISBN-10: 0596002971
- ISBN-13: 978-0596002978
- Product Dimensions: 7 x 1.5 x 9.2 inches
- Shipping Weight: 2.6 pounds (View shipping rates and policies)
- Average Customer Review: 39 customer reviews
- Amazon Best Sellers Rank: #208,355 in Books (See Top 100 in Books)
To get the free app, enter your mobile phone number.
TCP/IP Network Administration (3rd Edition; O'Reilly Networking) 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
"Enlightenment Now: The Case for Reason, Science, Humanism, and Progress"
Is the world really falling apart? Is the ideal of progress obsolete? Cognitive scientist and public intellectual Steven Pinker urges us to step back from the gory headlines and prophecies of doom, and instead, follow the data: In seventy-five jaw-dropping graphs, Pinker shows that life, health, prosperity, safety, peace, knowledge, and happiness are on the rise. Learn more
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
This book will be indispensable to Unix system administrators. It describes how to set up and administer a network of Unix systems using the TCP/IP protocols, taking a thoroughly practical approach. Topics covered include basic system configuration, routing, common network applications, and many others. --This text refers to an out of print or unavailable edition of this title.
"A good book to get to grips with TCP/IP, providing good foundations." - Jon Kent, Linux Format, October 2002
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
It does not teach TCP/IP from a simplistic approach--telling you only what you need to know and leaving you begging for more. It lays a ground work based upon the actual theory of these protocols and how they were developed and the thinking that was involved in their creation.
From there, it takes you step by step through the layers of the protocols and presents everything that most people would need to know--even more than they would need to know.
Especially enlightening were the chapters on IPv6--the next generation of the IP protocol, and the chapter covering subnetting.
Overall, if you need the one book to explain TCP/IP and the "ins-and-outs" of these networking protocols, look no further.
This book has all you'll need.
While it is true this book is written for the UNIX/Linux environments, the principles involved will apply to almost any network environment. The 700 plus page book is very well written and extremely well documented, the author has certainly done his homework for this book.
The breakdown of TCP/IP is excellent and there is great material for routing, security and troubleshooting as well. You have been given numerous examples to learn from and work with. Overall this book is certainly one to have around and a great addition to my technical library.
This book is packed with useless references: For instance, the reference of RFC, the protocol that was never used like IPV5.
The Book is really difficult to read as well.
There is no ONE example of TCP/IP packet in this book.
There are also subjects that have nothing to do with TCP IP like bind / sendmail. Read the table of content and you will see what i mean.
Now I can, sometimes, get the boxes to hook up. It takes a while and I have to have the book open, but . . .
The author does however give a fairly detailed discussion of troubleshooting in TCP/IP and give a few hints to assist the beginning sys/ad person. Many of these are readily apparent to those who are acquainted with the dynamics of TCP/IP, while others are based more on a commonsense understanding of how networks are configured. For example, the author advises checking to see if the trouble is unique to only one application or if it only occurs on one remote host versus all remote hosts. Problems that are application specific are to be distinguished from those that may require investigation into the actual network, the latter occurring when hosts are experiencing problems on only certain subnets.
It is interesting that the troubleshooting techniques and tools that are described in this chapter still require a great deal of human intervention, and therefore are dependent on the time restrictions of the network engineer or administrator. These tools include "built-in" investigative ones like `ipconfig', `ping', `traceroute', and `snoop'. Some of these tools unfortunately can also be used to disrupt a network, such as for example when `ping attacks' are used to flood a host with a barrage of ping packets. In addition, many of them can be used to hack into a particular host, or gain information for a successful intrusion into that host's networked computers. Many of them also can be used to gain information on the layers that are below the TCP layer, such as the `arp' command that allows one to analyze problems with translation between IP and Ethernet addresses.
It is not surprising to find discussions on network design in this chapter, and in these discussions one must go deeper into the lower OSI levels. And in these discussions, particularly in the one on how to subdivide an Ethernet in order to manage the network traffic on a particular segment, the author does indirectly discuss performance issues, although they are strictly speaking outside of the TCP/IP protocol, and its sometimes striking and unpredictable behavior on real networks. This complicated behavior of TCP/IP, and the severe financial impact that its maladies can cause for business and industry dictate that a much more sophisticated approach to troubleshooting TCP/IP be used. This approach would deploy a system that responds immediately to TCP problems, analyzes them, and takes correction (on its own if the risks are understood). In addition it would learn from experience, or "keep a historical record' in the words of the author, so as to be able to confront similar problems in the future more efficiently. Having such an autonomous real-time TCP/IP troubleshooter that is not bound by the long time scales characteristic of human intervention would be complex but definitely useful and a huge return on investment.
Most recent customer reviews
The real examples are the best
I gained so much from this book - e.g.Read more