Preface |
|
xxiii | |
Part I Introduction And Internet Applications |
|
|
Chapter 1 Introduction And Overview |
|
|
1 | (16) |
|
1.1 Growth Of Computer Networking |
|
|
1 | (1) |
|
1.2 Why Networking Seems Complex |
|
|
2 | (1) |
|
1.3 The Five Key Aspects Of Networking |
|
|
2 | (4) |
|
1.4 Public And Private Parts Of The Internet |
|
|
6 | (2) |
|
1.5 Networks, Interoperability, And Standards |
|
|
8 | (1) |
|
1.6 Protocol Suites And Layering Models |
|
|
9 | (2) |
|
1.7 How Data Passes Through Layers |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.9 ISO And The OSI Seven Layer Reference Model |
|
|
13 | (1) |
|
1.10 Remainder Of The Text |
|
|
14 | (1) |
|
|
14 | (3) |
|
Chapter 2 Internet Trends |
|
|
17 | (10) |
|
|
17 | (1) |
|
|
17 | (1) |
|
2.3 Growth Of The Internet |
|
|
18 | (3) |
|
2.4 From Resource Sharing To Communication |
|
|
21 | (1) |
|
2.5 From Text To Multimedia |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.7 From Individual Computers To Cloud Computing |
|
|
23 | (1) |
|
|
24 | (3) |
|
Chapter 3 Internet Applications And Network Programming |
|
|
27 | (22) |
|
|
27 | (1) |
|
3.2 Two Basic Internet Communication Paradigms |
|
|
28 | (1) |
|
3.3 Connection-Oriented Communication |
|
|
29 | (1) |
|
3.4 The Client-Server Model Of Interaction |
|
|
30 | (1) |
|
3.5 Characteristics Of Clients And Servers |
|
|
31 | (1) |
|
3.6 Server Programs And Server-Class Computers |
|
|
31 | (1) |
|
3.7 Requests, Responses, And Direction Of Data Flow |
|
|
32 | (1) |
|
3.8 Multiple Clients And Multiple Servers |
|
|
32 | (1) |
|
3.9 Server Identification And Demultiplexing |
|
|
33 | (1) |
|
|
34 | (1) |
|
3.11 Circular Dependencies Among Servers |
|
|
35 | (1) |
|
3.12 Peer-To-Peer Interactions |
|
|
35 | (1) |
|
3.13 Network Programming And The Socket API |
|
|
36 | (1) |
|
3.14 Sockets, Descriptors, And Network I/O |
|
|
36 | (1) |
|
3.15 Parameters And The Socket API |
|
|
37 | (1) |
|
3.16 Socket Calls In A Client And Server |
|
|
38 | (1) |
|
3.17 Socket Functions Used By Both Client And Server |
|
|
38 | (2) |
|
3.18 The Connect Function Used Only By A Client |
|
|
40 | (1) |
|
3.19 Socket Functions Used Only By A Server |
|
|
40 | (3) |
|
3.20 Socket Functions Used With The Message Paradigm |
|
|
43 | (1) |
|
3.21 Other Socket Functions |
|
|
44 | (1) |
|
3.22 Sockets, Threads, And Inheritance |
|
|
45 | (1) |
|
|
45 | (4) |
|
Chapter 4 Traditional Internet Applications |
|
|
49 | (36) |
|
|
49 | (1) |
|
4.2 Application-Layer Protocols |
|
|
49 | (1) |
|
4.3 Representation And Transfer |
|
|
50 | (1) |
|
|
51 | (1) |
|
4.5 Document Representation With HTML |
|
|
52 | (2) |
|
4.6 Uniform Resource Locators And Hyperlinks |
|
|
54 | (1) |
|
4.7 Web Document Transfer With HTTP |
|
|
55 | (2) |
|
|
57 | (2) |
|
|
59 | (1) |
|
4.10 File Transfer Protocol (FTP) |
|
|
59 | (1) |
|
4.11 FTP Communication Paradigm |
|
|
60 | (3) |
|
|
63 | (1) |
|
4.13 The Simple Mail Transfer Protocol (SMTP) |
|
|
64 | (2) |
|
4.14 ISPs, Mail Servers, And Mail Access |
|
|
66 | (1) |
|
4.15 Mail Access Protocols (POP, IMAP) |
|
|
67 | (1) |
|
4.16 Email Representation Standards (RFC2822, MIME) |
|
|
67 | (2) |
|
4.17 Domain Name System (DNS) |
|
|
69 | (2) |
|
4.18 Domain Names That Begin With A Service Name |
|
|
71 | (1) |
|
4.19 The DNS Hierarchy And Server Model |
|
|
72 | (1) |
|
|
72 | (2) |
|
4.21 Caching In DNS Servers |
|
|
74 | (1) |
|
4.22 Types Of DNS Entries |
|
|
75 | (1) |
|
4.23 Aliases And CNAME Resource Records |
|
|
76 | (1) |
|
4.24 Abbreviations And The DNS |
|
|
76 | (1) |
|
4.25 Internationalized Domain Names |
|
|
77 | (1) |
|
4.26 Extensible Representations (XML) |
|
|
78 | (1) |
|
|
79 | (6) |
Part II Data Communication Basics |
|
|
Chapter 5 Overview Of Data Communications |
|
|
85 | (8) |
|
|
85 | (1) |
|
5.2 The Essence Of Data Communications |
|
|
86 | (1) |
|
5.3 Motivation And Scope Of The Subject |
|
|
87 | (1) |
|
5.4 The Conceptual Pieces Of A Communications System |
|
|
87 | (3) |
|
5.5 The Subtopics Of Data Communications |
|
|
90 | (1) |
|
|
91 | (2) |
|
Chapter 6 Information Sources And Signals |
|
|
93 | (20) |
|
|
93 | (1) |
|
|
93 | (1) |
|
6.3 Analog And Digital Signals |
|
|
94 | (1) |
|
6.4 Periodic And Aperiodic Signals |
|
|
94 | (1) |
|
6.5 Sine Waves And Signal Characteristics |
|
|
95 | (2) |
|
|
97 | (1) |
|
6.7 The Importance Of Composite Signals And Sine Functions |
|
|
97 | (1) |
|
6.8 Time And Frequency Domain Representations |
|
|
98 | (1) |
|
6.9 Bandwidth Of An Analog Signal |
|
|
99 | (1) |
|
6.10 Digital Signals And Signal Levels |
|
|
100 | (1) |
|
6.11 Baud And Bits Per Second |
|
|
101 | (1) |
|
6.12 Converting A Digital Signal To Analog |
|
|
102 | (1) |
|
6.13 The Bandwidth Of A Digital Signal |
|
|
103 | (1) |
|
6.14 Synchronization And Agreement About Signals |
|
|
103 | (1) |
|
|
104 | (2) |
|
6.16 Manchester Encoding Used In Computer Networks |
|
|
106 | (1) |
|
6.17 Converting An Analog Signal To Digital |
|
|
107 | (1) |
|
6.18 The Nyquist Theorem And Sampling Rate |
|
|
108 | (1) |
|
6.19 Nyquist Theorem And Telephone System Transmission |
|
|
108 | (1) |
|
|
109 | (1) |
|
6.21 Encoding And Data Compression |
|
|
109 | (1) |
|
|
110 | (3) |
|
Chapter 7 Transmission Media |
|
|
113 | (22) |
|
|
113 | (1) |
|
7.2 Guided And Unguided Transmission |
|
|
113 | (1) |
|
7.3 A Taxonomy By Forms Of Energy |
|
|
114 | (1) |
|
7.4 Background Radiation And Electrical Noise |
|
|
115 | (1) |
|
7.5 Twisted Pair Copper Wiring |
|
|
115 | (2) |
|
7.6 Shielding: Coaxial Cable And Shielded Twisted Pair |
|
|
117 | (1) |
|
7.7 Categories Of Twisted Pair Cable |
|
|
118 | (1) |
|
7.8 Media Using Light Energy And Optical Fibers |
|
|
119 | (1) |
|
7.9 Types Of Fiber And Light Transmission |
|
|
120 | (1) |
|
7.10 Optical Fiber Compared To Copper Wiring |
|
|
121 | (1) |
|
7.11 Infrared Communication Technologies |
|
|
122 | (1) |
|
7.12 Point-To-Point Laser Communication |
|
|
122 | (1) |
|
7.13 Electromagnetic (Radio) Communication |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
7.16 Geostationary Earth Orbit (GEO) Satellites |
|
|
126 | (1) |
|
7.17 GEO Coverage Of The Earth |
|
|
127 | (1) |
|
7.18 Low Earth Orbit (LEO) Satellites And Clusters |
|
|
128 | (1) |
|
7.19 Tradeoffs Among Media Types |
|
|
128 | (1) |
|
7.20 Measuring Transmission Media |
|
|
129 | (1) |
|
7.21 The Effect Of Noise On Communication |
|
|
129 | (1) |
|
7.22 The Significance Of Channel Capacity |
|
|
130 | (1) |
|
|
131 | (4) |
|
Chapter 8 Reliability And Channel Coding |
|
|
135 | (18) |
|
|
135 | (1) |
|
8.2 The Three Main Sources Of Transmission Errors |
|
|
135 | (1) |
|
8.3 Effect Of Transmission Errors On Data |
|
|
136 | (1) |
|
8.4 Two Strategies For Handling Channel Errors |
|
|
137 | (1) |
|
8.5 Block And Convolutional Error Codes |
|
|
138 | (1) |
|
8.6 An Example Block Error Code: Single Parity Checking |
|
|
139 | (1) |
|
8.7 The Mathematics Of Block Error Codes And (n,k) Notation |
|
|
140 | (1) |
|
8.8 Hamming Distance: A Measure Of A Code's Strength |
|
|
140 | (1) |
|
8.9 The Hamming Distance Among Strings In A Codebook |
|
|
141 | (1) |
|
8.10 The Tradeoff Between Error Detection And Overhead |
|
|
142 | (1) |
|
8.11 Error Correction With Row And Column (RAC) Parity |
|
|
142 | (2) |
|
8.12 The 16-Bit Checksum Used In The Internet |
|
|
144 | (1) |
|
8.13 Cyclic Redundancy Codes (CRCs) |
|
|
145 | (3) |
|
8.14 An Efficient Hardware Implementation Of CRC |
|
|
148 | (1) |
|
8.15 Automatic Repeat Request (ARQ) Mechanisms |
|
|
148 | (1) |
|
|
149 | (4) |
|
Chapter 9 Transmission Modes |
|
|
153 | (12) |
|
|
153 | (1) |
|
9.2 A Taxonomy Of Transmission Modes |
|
|
153 | (1) |
|
9.3 Parallel Transmission |
|
|
154 | (1) |
|
|
155 | (1) |
|
9.5 Transmission Order: Bits And Bytes |
|
|
156 | (1) |
|
9.6 Timing Of Serial Transmission |
|
|
156 | (1) |
|
9.7 Asynchronous Transmission |
|
|
157 | (1) |
|
9.8 RS-232 Asynchronous Character Transmission |
|
|
157 | (1) |
|
9.9 Synchronous Transmission |
|
|
158 | (1) |
|
9.10 Bytes, Blocks, And Frames |
|
|
159 | (1) |
|
9.11 Isochronous Transmission |
|
|
160 | (1) |
|
9.12 Simplex, Half-Duplex, And Full-Duplex Transmission |
|
|
160 | (2) |
|
9.13 DCE And DTE Equipment |
|
|
162 | (1) |
|
|
162 | (3) |
|
Chapter 10 Modulation And Modems |
|
|
165 | (16) |
|
|
165 | (1) |
|
10.2 Carriers, Frequency, And Propagation |
|
|
165 | (1) |
|
10.3 Analog Modulation Schemes |
|
|
166 | (1) |
|
10.4 Amplitude Modulation |
|
|
166 | (1) |
|
10.5 Frequency Modulation |
|
|
167 | (1) |
|
10.6 Phase Shift Modulation |
|
|
168 | (1) |
|
10.7 Amplitude Modulation And Shannon's Theorem |
|
|
168 | (1) |
|
10.8 Modulation, Digital Input, And Shift Keying |
|
|
168 | (1) |
|
|
169 | (2) |
|
10.10 Phase Shift And A Constellation Diagram |
|
|
171 | (2) |
|
10.11 Quadrature Amplitude Modulation |
|
|
173 | (1) |
|
10.12 Modem Hardware For Modulation And Demodulation |
|
|
174 | (1) |
|
10.13 Optical And Radio Frequency Modems |
|
|
174 | (1) |
|
|
175 | (1) |
|
10.15 QAM Applied To Dialup |
|
|
175 | (1) |
|
10.16 V32 And V.32bis Dialup Modems |
|
|
176 | (1) |
|
|
177 | (4) |
|
Chapter 11 Multiplexing And Demultiplexing (Channelization) |
|
|
181 | (18) |
|
|
181 | (1) |
|
11.2 The Concept Of Multiplexing |
|
|
181 | (1) |
|
11.3 The Basic Types Of Multiplexing |
|
|
182 | (1) |
|
11.4 Frequency Division Multiplexing (FDM) |
|
|
183 | (2) |
|
11.5 Using A Range Of Frequencies Per Channel |
|
|
185 | (1) |
|
|
186 | (1) |
|
11.7 Wavelength Division Multiplexing (WDM) |
|
|
187 | (1) |
|
11.8 Time Division Multiplexing (TDM) |
|
|
187 | (1) |
|
|
188 | (1) |
|
11.10 Framing Used In The Telephone System Version Of TDM |
|
|
189 | (1) |
|
|
190 | (1) |
|
11.12 The Problem With Synchronous TDM: Unfilled Slots |
|
|
190 | (1) |
|
|
191 | (1) |
|
11.14 Inverse Multiplexing |
|
|
192 | (1) |
|
11.15 Code Division Multiplexing |
|
|
193 | (2) |
|
|
195 | (4) |
|
Chapter 12 Access And Interconnection Technologies |
|
|
199 | (20) |
|
|
199 | (1) |
|
12.2 Internet Access Technology: Upstream And Downstream |
|
|
199 | (1) |
|
12.3 Narrowband And Broadband Access Technologies |
|
|
200 | (2) |
|
12.4 The Local Loop And ISDN |
|
|
202 | (1) |
|
12.5 Digital Subscriber Line (DSL) Technologies |
|
|
202 | (1) |
|
12.6 Local Loop Characteristics And Adaptation |
|
|
203 | (1) |
|
12.7 The Data Rate Of ADSL |
|
|
204 | (1) |
|
12.8 ADSL Installation And Splitters |
|
|
205 | (1) |
|
12.9 Cable Modem Technologies |
|
|
205 | (1) |
|
12.10 The Data Rate Of Cable Modems |
|
|
206 | (1) |
|
12.11 Cable Modem Installation |
|
|
206 | (1) |
|
|
207 | (1) |
|
12.13 Access Technologies That Employ Optical Fiber |
|
|
208 | (1) |
|
12.14 Head-End And Tail-End Modem Terminology |
|
|
208 | (1) |
|
12.15 Wireless Access Technologies |
|
|
209 | (1) |
|
12.16 High-Capacity Connections At The Internet Core |
|
|
209 | (1) |
|
12.17 Circuit Termination, DSU/CSU, And NIU |
|
|
210 | (1) |
|
12.18 Telephone Standards For Digital Circuits |
|
|
211 | (1) |
|
12.19 DS Terminology And Data Rates |
|
|
212 | (1) |
|
12.20 Highest Capacity Circuits (STS Standards) |
|
|
212 | (1) |
|
12.21 Optical Carrier Standards |
|
|
213 | (1) |
|
|
213 | (1) |
|
12.23 Synchronous Optical Network (SONET) |
|
|
214 | (1) |
|
|
215 | (4) |
Part III Packet Switching And Network Technologies |
|
|
Chapter 13 Local Area Networks: Packets, Frames, And Topologies |
|
|
219 | (20) |
|
|
219 | (1) |
|
13.2 Circuit Switching And Analog Communication |
|
|
220 | (1) |
|
|
221 | (1) |
|
13.4 Local And Wide Area Packet Networks |
|
|
222 | (1) |
|
13.5 Standards For Packet Format And Identification |
|
|
223 | (1) |
|
13.6 IEEE 802 Model And Standards |
|
|
224 | (1) |
|
13.7 Point-To-Point And Multi-Access Networks |
|
|
225 | (2) |
|
|
227 | (2) |
|
13.9 Packet Identification, Demultiplexing, MAC Addresses |
|
|
229 | (1) |
|
13.10 Unicast, Broadcast, And Multicast Addresses |
|
|
230 | (1) |
|
13.11 Broadcast, Multicast, And Efficient Multi-Point Delivery |
|
|
231 | (1) |
|
|
232 | (1) |
|
13.13 Byte And Bit Stuffing |
|
|
233 | (1) |
|
|
234 | (5) |
|
Chapter 14 The IEEE MAC Sublayer |
|
|
239 | (14) |
|
|
239 | (1) |
|
14.2 A Taxonomy Of Mechanisms For Shared Access |
|
|
239 | (1) |
|
14.3 Static And Dynamic Channel Allocation |
|
|
240 | (1) |
|
14.4 Channelization Protocols |
|
|
241 | (1) |
|
14.5 Controlled Access Protocols |
|
|
242 | (2) |
|
14.6 Random Access Protocols |
|
|
244 | (6) |
|
|
250 | (3) |
|
Chapter 15 Wired LAN Technology (Ethernet And 802.3) |
|
|
253 | (12) |
|
|
253 | (1) |
|
15.2 The Venerable Ethernet |
|
|
253 | (1) |
|
15.3 Ethernet Frame Format |
|
|
254 | (1) |
|
15.4 Ethernet Frame Type Field And Demultiplexing |
|
|
254 | (1) |
|
15.5 IEEE's Version Of Ethernet (802.3) |
|
|
255 | (1) |
|
15.6 LAN Connections And Network Interface Cards |
|
|
256 | (1) |
|
15.7 Ethernet Evolution And Thicknet Wiring |
|
|
256 | (1) |
|
15.8 Thinnet Ethernet Wiring |
|
|
257 | (1) |
|
15.9 Twisted Pair Ethernet Wiring And Hubs |
|
|
258 | (1) |
|
15.10 Physical And Logical Ethernet Topology |
|
|
259 | (1) |
|
15.11 Wiring In An Office Building |
|
|
259 | (2) |
|
15.12 Ethernet Data Rates And Cable Types |
|
|
261 | (1) |
|
15.13 Twisted Pair Connectors And Cables |
|
|
261 | (1) |
|
|
262 | (3) |
|
Chapter 16 Wireless Networking Technologies |
|
|
265 | (26) |
|
|
265 | (1) |
|
16.2 A Taxonomy Of Wireless Networks |
|
|
265 | (1) |
|
16.3 Personal Area Networks (PANs) |
|
|
266 | (1) |
|
16.4 ISM Wireless Bands Used By LANs And PANs |
|
|
267 | (1) |
|
16.5 Wireless LAN Technologies And Wi-Fi |
|
|
267 | (1) |
|
16.6 Spread Spectrum Techniques |
|
|
268 | (1) |
|
16.7 Other Wireless LAN Standards |
|
|
269 | (1) |
|
16.8 Wireless LAN Architecture |
|
|
270 | (1) |
|
16.9 Overlap, Association, And 802.11 Frame Format |
|
|
271 | (1) |
|
16.10 Coordination Among Access Points |
|
|
272 | (1) |
|
16.11 Contention And Contention-Free Access |
|
|
272 | (2) |
|
16.12 Wireless MAN Technology And WiMax |
|
|
274 | (2) |
|
16.13 PAN Technologies And Standards |
|
|
276 | (1) |
|
16.14 Other Short-Distance Communication Technologies |
|
|
277 | (1) |
|
16.15 Wireless WAN Technologies |
|
|
278 | (2) |
|
|
280 | (1) |
|
16.17 Cell Clusters And Frequency Reuse |
|
|
280 | (2) |
|
16.18 Generations Of Cellular Technologies |
|
|
282 | (2) |
|
16.19 VSAT Satellite Technology |
|
|
284 | (1) |
|
|
285 | (1) |
|
16.21 Software Defined Radio And The Future Of Wireless |
|
|
286 | (1) |
|
|
287 | (4) |
|
Chapter 17 Repeaters, Bridges, And Switches |
|
|
291 | (14) |
|
|
291 | (1) |
|
17.2 Distance Limitation And LAN Design |
|
|
291 | (1) |
|
17.3 Fiber Modem Extensions |
|
|
292 | (1) |
|
|
293 | (1) |
|
17.5 Bridges And Bridging |
|
|
293 | (1) |
|
17.6 Learning Bridges And Frame Filtering |
|
|
294 | (1) |
|
17.7 Why Bridging Works Well |
|
|
295 | (1) |
|
17.8 Distributed Spanning Tree |
|
|
296 | (1) |
|
17.9 Switching And Layer 2 Switches |
|
|
297 | (2) |
|
|
299 | (1) |
|
17.11 Multiple Switches And Shared VLANs |
|
|
300 | (1) |
|
17.12 The Importance Of Bridging |
|
|
301 | (1) |
|
|
302 | (3) |
|
Chapter 18 WAN Technologies And Dynamic Routing |
|
|
305 | (20) |
|
|
305 | (1) |
|
18.2 Large Spans And Wide Area Networks |
|
|
305 | (1) |
|
18.3 Traditional WAN Architecture |
|
|
306 | (2) |
|
|
308 | (1) |
|
18.5 Store And Forward Paradigm |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (3) |
|
|
313 | (1) |
|
18.9 Dynamic Routing Updates In A WAN |
|
|
313 | (1) |
|
|
314 | (1) |
|
18.11 Forwarding Table Computation |
|
|
315 | (1) |
|
18.12 Distributed Route Computation |
|
|
316 | (4) |
|
18.13 Shortest Paths And Weights |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
322 | (3) |
|
Chapter 19 Networking Technologies Past And Present |
|
|
325 | (10) |
|
|
325 | (1) |
|
19.2 Connection And Access Technologies |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
328 | (4) |
|
|
332 | (3) |
Part IV Internetworking |
|
|
Chapter 20 Internetworking: Concepts, Architecture, And Protocols |
|
|
335 | (10) |
|
|
335 | (1) |
|
20.2 The Motivation For Internetworking |
|
|
335 | (1) |
|
20.3 The Concept Of Universal Service |
|
|
336 | (1) |
|
20.4 Universal Service In A Heterogeneous World |
|
|
336 | (1) |
|
|
337 | (1) |
|
20.6 Physical Network Connection With Routers |
|
|
337 | (1) |
|
20.7 Internet Architecture |
|
|
338 | (1) |
|
20.8 Intranets And Internets |
|
|
339 | (1) |
|
20.9 Achieving Universal Service |
|
|
339 | (1) |
|
|
339 | (2) |
|
20.11 Protocols For Internetworking |
|
|
341 | (1) |
|
20.12 Review Of TCP/IP Layering |
|
|
341 | (1) |
|
20.13 Host Computers, Routers, And Protocol Layers |
|
|
342 | (1) |
|
|
342 | (3) |
|
Chapter 21 IP: Internet Addressing |
|
|
345 | (24) |
|
|
345 | (1) |
|
|
345 | (1) |
|
21.3 The Hourglass Model And Difficulty Of Change |
|
|
346 | (1) |
|
21.4 Addresses For The Virtual Internet |
|
|
346 | (2) |
|
21.5 The IP Addressing Scheme |
|
|
348 | (1) |
|
21.6 The IP Address Hierarchy |
|
|
348 | (1) |
|
21.7 Original Classes Of IPv4 Addresses |
|
|
349 | (1) |
|
21.8 IPv4 Dotted Decimal Notation |
|
|
350 | (1) |
|
21.9 Authority For Addresses |
|
|
351 | (1) |
|
21.10 IPv4 Subnet And Classless Addressing |
|
|
351 | (2) |
|
|
353 | (1) |
|
21.12 CIDR Notation Used With IPv4 |
|
|
354 | (1) |
|
|
354 | (2) |
|
21.14 CIDR Host Addresses |
|
|
356 | (1) |
|
21.15 Special IPv4 Addresses |
|
|
357 | (2) |
|
21.16 Summary Of Special IPv4 Addresses |
|
|
359 | (1) |
|
21.17 IPv4 Berkeley Broadcast Address Form |
|
|
359 | (1) |
|
21.18 Routers And The IPv4 Addressing Principle |
|
|
360 | (1) |
|
|
361 | (1) |
|
21.20 IPv6 Multihoming And Network Renumbering |
|
|
361 | (1) |
|
|
362 | (1) |
|
21.22 IPv6 Colon Hexadecimal Notation |
|
|
363 | (1) |
|
|
364 | (5) |
|
Chapter 22 Datagram Forwarding |
|
|
369 | (22) |
|
|
369 | (1) |
|
22.2 Connectionless Service |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
22.5 The IPv4 Datagram Header Format |
|
|
371 | (2) |
|
22.6 The IPv6 Datagram Header Format |
|
|
373 | (1) |
|
22.7 IPv6 Base Header Format |
|
|
373 | (2) |
|
22.8 Forwarding An IP Datagram |
|
|
375 | (1) |
|
22.9 Network Prefix Extraction And Datagram Forwarding |
|
|
376 | (1) |
|
22.10 Longest Prefix Match |
|
|
377 | (1) |
|
22.11 Destination Address And Next-Hop Address |
|
|
378 | (1) |
|
22.12 Best-Effort Delivery |
|
|
378 | (1) |
|
|
379 | (1) |
|
22.14 Transmission Across An Internet |
|
|
380 | (1) |
|
22.15 MTU And Datagram Fragmentation |
|
|
381 | (2) |
|
22.16 Fragmentation Of An IPv6 Datagram |
|
|
383 | (1) |
|
22.17 Reassembly Of An IP Datagram From Fragments |
|
|
384 | (1) |
|
22.18 Collecting The Fragments Of A Datagram |
|
|
385 | (1) |
|
22.19 The Consequence Of Fragment Loss |
|
|
386 | (1) |
|
22.20 Fragmenting An IPv4 Fragment |
|
|
386 | (1) |
|
|
387 | (4) |
|
Chapter 23 Support Protocols And Technologies |
|
|
391 | (24) |
|
|
391 | (1) |
|
|
391 | (2) |
|
23.3 An Example Of IPv4 Addresses |
|
|
393 | (1) |
|
23.4 The IPv4 Address Resolution Protocol (ARP) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
23.7 ARP Caching And Message Processing |
|
|
396 | (2) |
|
23.8 The Conceptual Address Boundary |
|
|
398 | (1) |
|
23.9 Internet Control Message Protocol (ICMP) |
|
|
399 | (1) |
|
23.10 ICMP Message Format And Encapsulation |
|
|
400 | (1) |
|
23.11 IPv6 Address Binding With Neighbor Discovery |
|
|
401 | (1) |
|
23.12 Protocol Software, Parameters, And Configuration |
|
|
401 | (1) |
|
23.13 Dynamic Host Configuration Protocol (DHCP) |
|
|
402 | (1) |
|
23.14 DHCP Protocol Operation And Optimizations |
|
|
403 | (1) |
|
23.15 DHCP Message Format |
|
|
404 | (1) |
|
23.16 Indirect DHCP Server Access Through A Relay |
|
|
405 | (1) |
|
23.17 IPv6 Autoconfiguration |
|
|
405 | (1) |
|
23.18 Network Address Translation (NAT) |
|
|
406 | (1) |
|
23.19 NAT Operation And IPv4 Private Addresses |
|
|
407 | (2) |
|
23.20 Transport-Layer NAT (NAPT) |
|
|
409 | (1) |
|
|
410 | (1) |
|
23.22 NAT Software And Systems For Use At Home |
|
|
410 | (1) |
|
|
411 | (4) |
|
Chapter 24 UDP: Datagram Transport Service |
|
|
415 | (10) |
|
|
415 | (1) |
|
24.2 Transport Protocols And End-To-End Communication |
|
|
415 | (1) |
|
24.3 The User Datagram Protocol |
|
|
416 | (1) |
|
24.4 The Connectionless Paradigm |
|
|
417 | (1) |
|
24.5 Message-Oriented Interface |
|
|
417 | (1) |
|
24.6 UDP Communication Semantics |
|
|
418 | (1) |
|
24.7 Modes Of Interaction And Multicast Delivery |
|
|
419 | (1) |
|
24.8 Endpoint Identification With Protocol Port Numbers |
|
|
419 | (1) |
|
|
420 | (1) |
|
24.10 The UDP Checksum And The Pseudo Header |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (3) |
|
Chapter 25 TCP: Reliable Transport Service |
|
|
425 | (22) |
|
|
425 | (1) |
|
25.2 The Transmission Control Protocol |
|
|
425 | (1) |
|
25.3 The Service TCP Provides To Applications |
|
|
426 | (1) |
|
25.4 End-To-End Service And Virtual Connections |
|
|
427 | (1) |
|
25.5 Techniques That Transport Protocols Use |
|
|
428 | (4) |
|
25.6 Techniques To Avoid Congestion |
|
|
432 | (1) |
|
25.7 The Art Of Protocol Design |
|
|
433 | (1) |
|
25.8 Techniques Used In TCP To Handle Packet Loss |
|
|
434 | (1) |
|
25.9 Adaptive Retransmission |
|
|
435 | (1) |
|
25.10 Comparison Of Retransmission Times |
|
|
436 | (1) |
|
25.11 Buffers, Flow Control, And Windows |
|
|
437 | (1) |
|
25.12 TCP's Three-Way Handshake |
|
|
438 | (2) |
|
25.13 TCP Congestion Control |
|
|
440 | (1) |
|
25.14 Versions Of TCP Congestion Control |
|
|
441 | (1) |
|
25.15 Other Variations: SACK And ECN |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
443 | (4) |
|
Chapter 26 Internet Routing And Routing Protocols |
|
|
447 | (22) |
|
|
447 | (1) |
|
26.2 Static Vs. Dynamic Routing |
|
|
447 | (1) |
|
26.3 Static Routing In Hosts And A Default Route |
|
|
448 | (1) |
|
26.4 Dynamic Routing And Routers |
|
|
449 | (1) |
|
26.5 Routing In The Global Internet |
|
|
450 | (1) |
|
26.6 Autonomous System Concept |
|
|
451 | (1) |
|
26.7 The Two Types Of Internet Routing Protocols |
|
|
451 | (3) |
|
26.8 Routes And Data Traffic |
|
|
454 | (1) |
|
26.9 The Border Gateway Protocol (BGP) |
|
|
454 | (2) |
|
26.10 The Routing Information Protocol (RIP) |
|
|
456 | (1) |
|
|
457 | (1) |
|
26.12 The Open Shortest Path First Protocol (OSPF) |
|
|
458 | (1) |
|
26.13 An Example OSPF Graph |
|
|
459 | (1) |
|
|
459 | (1) |
|
26.15 Intermediate System - Intermediate System (IS-IS) |
|
|
460 | (1) |
|
|
461 | (4) |
|
|
465 | (4) |
Part V Other Networking Concepts & Technologies |
|
|
Chapter 27 Network Performance (QoS And DiffServ) |
|
|
469 | (20) |
|
|
469 | (1) |
|
27.2 Measures Of Performance |
|
|
469 | (1) |
|
|
470 | (2) |
|
27.4 Capacity, Throughput, And Goodput |
|
|
472 | (1) |
|
27.5 Understanding Throughput And Delay |
|
|
473 | (1) |
|
|
474 | (1) |
|
27.7 The Relationship Between Delay And Throughput |
|
|
475 | (1) |
|
27.8 Measuring Delay, Throughput, And Jitter |
|
|
476 | (2) |
|
27.9 Passive Measurement, Small Packets, And NetFlow |
|
|
478 | (1) |
|
27.10 Quality Of Service (QoS) |
|
|
479 | (1) |
|
27.11 Fine-Grain And Coarse-Grain QoS |
|
|
480 | (2) |
|
27.12 Implementation Of QoS |
|
|
482 | (2) |
|
27.13 Internet QoS Technologies |
|
|
484 | (1) |
|
|
485 | (4) |
|
Chapter 28 Multimedia And IP Telephony (VoIP) |
|
|
489 | (18) |
|
|
489 | (1) |
|
28.2 Real-Time Data Transmission And Best-Effort Delivery |
|
|
489 | (1) |
|
28.3 Delayed Playback And Jitter Buffers |
|
|
490 | (1) |
|
28.4 Real-Time Transport Protocol (RTP) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
28.7 Signaling And VoIP Signaling Standards |
|
|
494 | (1) |
|
28.8 Components Of An IP Telephone System |
|
|
495 | (3) |
|
28.9 Summary Of Protocols And Layering |
|
|
498 | (1) |
|
28.10 H.323 Characteristics |
|
|
499 | (1) |
|
|
499 | (1) |
|
28.12 SIP Characteristics And Methods |
|
|
500 | (1) |
|
28.13 An Example SIP Session |
|
|
501 | (1) |
|
28.14 Telephone Number Mapping And Routing |
|
|
502 | (1) |
|
|
503 | (4) |
|
Chapter 29 Network Security |
|
|
507 | (26) |
|
|
507 | (1) |
|
29.2 Criminal Exploits And Attacks |
|
|
507 | (4) |
|
|
511 | (1) |
|
29.4 Responsibility And Control |
|
|
512 | (1) |
|
29.5 Security Technologies |
|
|
513 | (1) |
|
29.6 Hashing: An Integrity And Authentication Mechanism |
|
|
513 | (1) |
|
29.7 Access Control And Passwords |
|
|
514 | (1) |
|
29.8 Encryption: A Fundamental Security Technique |
|
|
514 | (1) |
|
29.9 Private Key Encryption |
|
|
515 | (1) |
|
29.10 Public Key Encryption |
|
|
515 | (1) |
|
29.11 Authentication With Digital Signatures |
|
|
516 | (1) |
|
29.12 Key Authorities And Digital Certificates |
|
|
517 | (2) |
|
|
519 | (1) |
|
29.14 Firewall Implementation With A Packet Filter |
|
|
520 | (2) |
|
29.15 Intrusion Detection Systems |
|
|
522 | (1) |
|
29.16 Content Scanning And Deep Packet Inspection |
|
|
522 | (1) |
|
29.17 Virtual Private Networks (VPNs) |
|
|
523 | (2) |
|
29.18 The Use of VPN Technology For Telecommuting |
|
|
525 | (1) |
|
29.19 Packet Encryption Vs. Tunneling |
|
|
526 | (2) |
|
29.20 Security Technologies |
|
|
528 | (1) |
|
|
529 | (4) |
|
Chapter 30 Network Management (SNMP) |
|
|
533 | (12) |
|
|
533 | (1) |
|
30.2 Managing An Intranet |
|
|
533 | (1) |
|
30.3 FCAPS: The Industry Standard Model |
|
|
534 | (2) |
|
30.4 Example Network Elements |
|
|
536 | (1) |
|
30.5 Network Management Tools |
|
|
536 | (2) |
|
30.6 Network Management Applications |
|
|
538 | (1) |
|
30.7 Simple Network Management Protocol |
|
|
539 | (1) |
|
30.8 SNMP's Fetch-Store Paradigm |
|
|
539 | (1) |
|
30.9 The SNMP MIB And Object Names |
|
|
540 | (1) |
|
30.10 The Variety Of MIB Variables |
|
|
541 | (1) |
|
30.11 MIB Variables That Correspond To Arrays |
|
|
541 | (1) |
|
|
542 | (3) |
|
Chapter 31 Software Defined Networking (SDN) |
|
|
545 | (22) |
|
|
545 | (1) |
|
31.2 Marketing Hype And Reality |
|
|
545 | (1) |
|
31.3 Motivation For A New Approach |
|
|
546 | (2) |
|
31.4 Conceptual Organization Of A Network Element |
|
|
548 | (1) |
|
31.5 Control Plane Modules And The Hardware Interface |
|
|
549 | (1) |
|
31.6 A New Paradigm: Software Defined Networking |
|
|
550 | (1) |
|
31.7 Unanswered Questions |
|
|
551 | (1) |
|
31.8 Shared Controllers And Network Connections |
|
|
552 | (1) |
|
|
553 | (1) |
|
31.10 OpenFlow: A Controller-To-Element Protocol |
|
|
554 | (1) |
|
31.11 Classification Engines In Switches |
|
|
555 | (1) |
|
31.12 TCAM And High-Speed Classification |
|
|
556 | (1) |
|
31.13 Classification Across Multiple Protocol Layers |
|
|
557 | (1) |
|
31.14 TCAM Size And The Need For Multiple Patterns |
|
|
557 | (1) |
|
31.15 Items OpenFlow Can Specify |
|
|
558 | (1) |
|
31.16 Traditional And Extended IP Forwarding |
|
|
559 | (1) |
|
31.17 End-To-End Path With MPLS Using Layer 2 |
|
|
560 | (1) |
|
31.18 Dynamic Rule Creation And Control Of Flows |
|
|
561 | (1) |
|
31.19 A Pipeline Model For Flow Tables |
|
|
562 | (1) |
|
31.20 SDN's Potential Effect On Network Vendors |
|
|
563 | (1) |
|
|
564 | (3) |
|
Chapter 32 The Internet Of Things |
|
|
567 | (12) |
|
|
567 | (1) |
|
|
567 | (2) |
|
32.3 Choosing A Network Technology |
|
|
569 | (1) |
|
|
570 | (1) |
|
32.5 Low Power Wireless Communication |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
32.8 802.15.4 Radios And Wireless Mesh Networks |
|
|
572 | (1) |
|
32.9 Internet Connectivity And Mesh Routing |
|
|
573 | (1) |
|
32.10 IPv6 In A ZigBee Mesh Network |
|
|
574 | (1) |
|
32.11 The ZigBee Forwarding Paradigm |
|
|
575 | (1) |
|
32.12 Other Protocols In the ZigBee Stack |
|
|
576 | (1) |
|
|
577 | (2) |
|
Chapter 33 Trends In Networking Technologies And Uses |
|
|
579 | (10) |
|
|
579 | (1) |
|
33.2 The Need For Scalable Internet Services |
|
|
579 | (1) |
|
33.3 Content Caching (Akamai) |
|
|
580 | (1) |
|
|
580 | (1) |
|
33.5 Server Virtualization |
|
|
581 | (1) |
|
33.6 Peer-To-Peer Communication |
|
|
581 | (1) |
|
33.7 Distributed Data Centers And Replication |
|
|
582 | (1) |
|
33.8 Universal Representation (XML) |
|
|
582 | (1) |
|
|
583 | (1) |
|
33.10 Mobility And Wireless Networking |
|
|
583 | (1) |
|
|
583 | (1) |
|
33.12 Higher-Speed Access And Switching |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
584 | (2) |
|
|
586 | (1) |
|
33.16 Widespread Deployment Of IPv6 |
|
|
586 | (1) |
|
|
587 | (2) |
Appendix 1 A Simplified Application Programming Interface |
|
589 | (28) |
Index |
|
617 | |