Formatted contents note |
Chapter 1 Introduction And Overview<br/>1.1 The Motivation For Internetworking<br/>1.2 The TCP/IP Internet<br/>1.3 Internet Services<br/>1.4 History And Scope Of The Internet<br/>1.5 The Internet Architecture Board<br/>1.6 The lAB Reorganization<br/>1.7 Internet Request For Comments<br/>1.8 Future Growth And Technology<br/>1.9 Organization Of The Text<br/>Chapter 2 Review Of Underlying Network Technologies<br/>2.1 Introduction<br/>2.2 Two Approaches To Network Communication<br/>2.3 Wide Area And Local Area Networks<br/>2.4 Ethernet Technology<br/>2.5 Switched Ethernet<br/>2.6 Asynchronous Transfer Mode<br/>Chapter 3 internetworking Concept And Architectural Model<br/>3.1 Introduction<br/>3.2 Application-Level Interconnection<br/>3.3 Network-Level Interconnection<br/>3.4 Properties Of The Internet<br/>3.5 Internet Architecture<br/>3.6 Interconnection Through IP Routers<br/>3.7 The User's View<br/>3.8 All Networks Are Equal<br/>3.9 The Unanswered Questions<br/>Chapter 4 Glassful Internet Addresses<br/>4.1 Introduction<br/>4.2 Universal Identifiers<br/>4.3 The Original Glassful Addressing Scheme<br/>4.4 Addresses Specify Network Connections<br/>4.5 Network And Directed Broadcast Addresses<br/>4.6 Limited Broadcast<br/>4.7 The All-Os Address<br/>4.8 Subnet And Classless Extensions<br/>4.9 IP Multicast Addresses<br/>4.10 Weaknesses In Internet Addressing<br/>4.11 Dotted Decimal Notation<br/>4.12 Loopback Address<br/>4.13 Summary Of Special Address Conventions<br/>4.14 Internet Addressing Authority<br/>4.15 Reserved Address Prefixes<br/>4.16 An Example<br/>4.17 Network Byte Order<br/>4.18 Summary<br/>Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)<br/>5.1 Introduction<br/>5.2 The Address Resolution Problem<br/>5.3 Two Types Of Physical Addresses<br/>5.4 Resolution Through Direct Mapping<br/>5.5 Resolution Through Dynamic Binding<br/>5.6 The Address Resolution Cache<br/>5.7 ARP Cache Timeout<br/>5.8 ARP Refinements<br/>5.9 Relationship Of ARP To Other Protocols<br/>5.10 ARP Implementation<br/>5.11 ARP Encapsulation And Identification<br/>5.72 ARP Protocol Format<br/>5.13 Automatic ARP Cache Revalidation<br/>5.14 Reverse Address Resolution (RARP)<br/>Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4)<br/>6.1 Introduction<br/>6.2 A Virtual Network<br/>6.3 Internet Architecture And Philosophy<br/>6.4 The Conceptual Service Organization<br/>6.5 Connectionless Delivery System<br/>6.6 Purpose Of The Internet Protocol<br/>6.7 The IPv4 Datagram<br/>6.8 Internet Datagram Options<br/>Chapter 7 Internet Protocol: Forwarding IP Datagrams<br/>7.1 Introduction<br/>7.2 Forwarding In An Internet<br/>7.3 Direct And Indirect Delivery<br/>7.4 Table-Driven IP Forwarding<br/>7.5 Next-Hop Forwarding<br/>7.6 Default Routes<br/>7.7 Host-Specific Routes<br/>7.8 The IP Forwarding Algorithm<br/>7.9 Forwarding With IP Addresses<br/>7.10 Handling Incoming Datagrams<br/>7.11 Establishing Routing Tables<br/>Chapter 8 Internet Protocol: Error And Control Messages (ICMP)<br/>8.1 Introduction<br/>8.2 The Internet Control Message Protocol<br/>8.3 Error Reporting Vs. Error Correction<br/>8.4 ICMP Message Delivery<br/>8.5 ICMP Message Format<br/>8.6 Testing Destination Reachability And Status (Ping)<br/>8.7 Echo Request And Reply Message Format<br/>8.8 Reports Of Unreachable Destinations 115<br/>8.9 Congestion And Datagram Flow Control 116<br/>8.10 Source Quench Format 117<br/>8.11 Route Change Requests From Routers 118<br/>8.12 Detecting Circular Or Excessively Long Routes 119<br/>8.13 Reporting Other Problems 120<br/>8.14 Clock Synchronization And Transit Time Estimation 121<br/>8.15 Older ICMP Messages No Longer Needed 122<br/>8.16 Summary 123<br/>Chapter 9 Classless And Subnet Address Extensions (CIDR)<br/>9.1 Introduction<br/>9.2 Review Of Relevant Facts<br/>9.3 Minimizing Network Numbers<br/>9.4 Proxy ARP<br/>9.5 Subnet Addressing<br/>9.6 Flexibility In Subnet Address Assignment<br/>9.7 Variable-Length Subnets<br/>9.8 Implementation Of Subnets With Masks<br/>9.9 Subnet Mask Representation<br/>9.10 Forwarding In The Presence Of Subnets<br/>9.11 The Subnet Forwarding Algorithm<br/>9.12 A Unified Forwarding Algorithm<br/>9.13 Maintenance Of Subnet Masks<br/>9.14 Broadcasting To Subnets<br/>9.15 Anonymous Point-To-Point Networks<br/>9.16 Classless Addressing And Supemetting<br/>9.17 CIDR Address Blocks And Bit Masks<br/>9.18 Address Blocks And CIDR Notation<br/>9.19 A Classless Addressing Example<br/>9.20 Data Structures And Algorithms For Classless Lookup<br/>9.21 Longest-Match And Mixtures Of Route Types<br/>9.22 CIDR Blocks Reserved For Private Networks<br/>Chapter 10 Protocol Layering<br/>10.1 Introduction<br/>10.2 The Need For Multiple Protocols<br/>10.3 The Conceptual Layers Of Protocol Software<br/>10.4 Functionality Of The layers<br/>Contents<br/>10.5 X.25 And Its Relation To The ISO Model<br/>10.6 Locus Of Intelligence<br/>10.7 The Protocol Layering Principle<br/>10.8 Layering In The Presence Of Network Substructure<br/>10.9 Two Important Boundaries In The TCP/IP Model<br/>10.10 The Disadvantage Of Layering<br/>10.11 The Basic Idea Behind Multiplexing And Demultiplexing<br/>Chapter 11 User Datagram Protocol (UDP)<br/>I I.I Introduction<br/>11.2 Identifying The Ultimate Destination<br/>11.3 The User Datagram Protocol<br/>11.4 Format Of UDP Messages<br/>11.5 UDP Pseudo-Header<br/>11.6 UDP Encapsulation And Protocol Layering<br/>11.7 Layering And The UDP Checksum Computation<br/>11.8 UDP Multiplexing, Demultiplexing, And Ports<br/>11.9 Reserved And Available UDP Port Numbers<br/>Chapter 12 Reliable Stream Transport Service (TCP)<br/>12.1 Introduction<br/>12.2 The Need For Stream Delivery<br/>12.3 Properties Of The Reliable Delivery Service<br/>12.4 Providing Reliability<br/>12.5 The Idea Behind Sliding Windows<br/>12.6 The Transmission Control Protocol<br/>12.7 Ports, Connections, And Endpoints<br/>12.8 Passive And Active Opens<br/>12.9 Segments, Streams, And Sequence Numbers<br/>12.10 Variable Window Size And Flow Control<br/>12.11 TCP Segment Format<br/>12.12 dut Of Band Data<br/>12.13 TCP Options<br/>12.14 TCP Checksum Computation<br/>12.15 Acknowledgements, Retransmission, And Timeouts<br/>12.16 Accurate Measurement Of Round Trip Samples<br/>12.17 Kam 's Algorithm And Timer Backoff<br/>12.18 Responding To High Variance In Delay<br/>12.19 Response To Congestion<br/>12.20 Fast Recovery And Other Modifications<br/>12.21 Explicit Feedback Mechanisms (SACK and ECN)<br/>12.22 Congestion, Tail Drop, And TCP<br/>12.23 Random Early Detection (RED)<br/>12.24 Establishing A TCP Connection<br/>12.25 Initial Sequence Numbers<br/>12.26 Closing a TCP Connection<br/>12.27 TCP Connection Reset<br/>12.28 TCP State Machine<br/>12.29 Forcing Data Delivery<br/>12.30 Reserved TCP Port Numbers<br/>12.31 TCP Performance<br/>12.32 Silly Window Syndrome And Small Packets<br/>12.33 Avoiding Silly Window Syndrome<br/>Chapter 13 Routing Architecture: Cores, Peers, And Algorithms<br/>13.1 Introduction<br/>13.2 The Origin Of Routing Tables<br/>13.3 Forwarding With Partial Information<br/>13.4 Original Internet Architecture And Cores<br/>13.5 Beyond The Core Architecture To Peer Backbones<br/>13.6 Automatic Route Propagation<br/>13.7 Distance Vector (Bellman-Ford) Routing<br/>13.8 Reliability And Routing Protocols<br/>13.9 Link-State (SPF) Routing<br/>Chapter 14 Routing Between Peers (BGP)<br/>14.1 Introduction<br/>14.2 Routing Update Protocol Scope<br/>14.3 Determining A Practical Limit On Group Size<br/>14.4 A Fundamental Idea: Extra Hops<br/>14.5 Autonomous System Concept<br/>14.6 Exterior Gateway Protocols And Reachability<br/>14.7 BGP Characteristics<br/>14.8 BGP Functionality And Message Types<br/>14.9 BGP Message Header<br/>14.10 BGP OPEN Message<br/>14.11 BGP UPDATE Message<br/>14.12 Compressed Mask-Address Pairs<br/>14.13 BGP Path Attributes<br/>14.14 BGP KEEPALIVE Message<br/>14.15 Information From The Receiver's Perspective<br/>14.16 The Key Restriction Of Exterior Gateway Protocols<br/>14.17 The Internet Routing Architecture<br/>14.18 BGP NOTIFICATION Message<br/>Chapter 15 Routing Within An Autonomous System (RIP, OSPF)<br/>15.1 Introduction<br/>15.2 Static Vj. Dynamic Interior Routes<br/>15.3 Routing Information Protocol (RIP)<br/>15.4 Slow Convergence Problem<br/>15.5 Solving The Slow Convergence Problem<br/>15.6 RlPl Message Format<br/>15.7 R1P2 Address Conventions<br/>15.8 RIP Route Interpretation And Aggregation<br/>15.9 R1P2 Extensions And Message Format<br/>15.10 The Disadvantage Of RIP Hop Counts<br/>15.11 Delay Metric (HELLO)<br/>15.12 Delay Metrics And Oscillation<br/>15.13 Combining RIP, Hello, And BGP<br/>15.14 Gated: Inter-Autonomous System Communication<br/>15.15 The Open SPF Protocol (OSPF)<br/>15.16 Routing With Partial Information<br/>Chapter 16 Internet Multicasting<br/>16.1 Introduction<br/>16.2 Hardware Broadcast<br/>16.3 Hardware Origins Of Multicast<br/>16.4 Ethernet Multicast<br/>16.5 IP Multicast<br/>16.6 The Conceptual Pieces<br/>16.7 IP Multicast Addresses<br/>16.8 Multicast Address Semantics<br/>16.9 Mapping IP Multicast To Ethernet Multicast<br/>16.10 Hosts And Multicast Delivery<br/>16.11 Multicast Scope<br/>16.12 Extending Host Software To Handle Multicasting<br/>16.13 Internet Group Management Protocol<br/>16.14 IGMP Implementation<br/>16.15 Group Membership State Transitions<br/>16.16 IGMP Membership Query Message Format<br/>16.17 IGMP Membership Report Message Format<br/>16.18 Multicast Forwarding And Routing Information<br/>16.19 Basic Multicast Forwarding Paradigms<br/>16.20 Consequences Of TRPF<br/>16.21 Multicast Trees<br/>16.22 The Essence Of Multicast Route Propagation<br/>16.23 Reverse Path Multicasting<br/>16.24 Multicast Routing Protocols<br/>16.25 Reliable Multicast And ACK Implosions<br/>Chapter 17 IP Switching And MPLS<br/>17.1 Introduction<br/>17.2 Switching Technology<br/>17.3 Large Networks, Label Swapping, And Paths<br/>17.4 Using Switching With IP<br/>17.5 IP Switching Technologies And MPI^<br/>17.6 Classification, Flows, And Higher Layer Switching<br/>17.7 Hierarchical Use Of MPLS<br/>17.8 MPLS Encapsulation<br/>17.9 Label Switching Router<br/>17.10 Control Processing And Label Distribution<br/>17.11 MPLS And Fragmentation<br/>17.12 Mesh Topology And Traffic Engineering<br/>Chapter 18 Mobile IP<br/>18.1 Introduction<br/>18.2 Mobility, Routing, and Addressing<br/>18 3 Mobile IP Characteristics<br/>18.4 Overview Of Mobile IP Operation<br/>18.5 Mobile Addressing Details<br/>18.6 Foreign Agent Discovery<br/>18.7 Agent Registration<br/>18.8 Registration Message Format<br/>18.9 Communication With A Foreign Agent<br/>18.10 Datagram Transmission And Reception<br/>18.11 The Two-Crossing Problem<br/>18.12 Communication With Computers On the Home Network<br/>Chapter 19 Private Network Interconnection (NAT, VPN)<br/>19.1 Introduction<br/>19.2 Private And Hybrid Networks<br/>19.3 VPN Addressing And Routing<br/>19.4 Extending VPN Technology To Individual Hosts<br/>19.5 A VPN With Private Addresses<br/>19.6 Network Address Translation (NAT)<br/>19.7 NAT Translation Table Creation<br/>19.8 Multi-Address NAT<br/>19.9 Port-Mapped NAT<br/>19.10 Interaction Between NAT And ICMP<br/>19.11 Interaction Between NAT And Applications<br/>19.12 NAT In The Presence Of Fragmentation<br/>19.13 Conceptual Address Domains<br/>19.14 Slirp And Iptables<br/>Chapter 20 Client-Server Model Of Interaction<br/>20.1 Introduction<br/>20.2 The Client-Server Model'<br/>20.3 A Simple Example: UDP Echo Server<br/>20.4 Time And Date Service<br/>20.5 The Complexity of Servers<br/>20.6 Broadcasting A Request<br/>20.7 Alternatives To The Client-Server Model<br/>Chapter 21 The Socket Interface<br/>21.1 Introduction<br/>21.2 The UNIX 1/0 Paradigm And Network I/O<br/>21.3 Adding Network 1/0 to UNIX<br/>21.4 The Socket Abstraction<br/>21.5 Creating A Socket<br/>21.6 Socket Inheritance And Termination<br/>21.7 Specifying A Local Address<br/>21.8 Connecting Sockets To Destination Addresses<br/>21.9 Sending Data Through A Socket<br/>21.10 Receiving Data Through A Socket<br/>21.11 Obtaining Local And Remote Socket Addresses<br/>21.12 Obtaining And Setting Socket Options<br/>21.13 Specifying A Queue Length For A Server<br/>21.14 How A Server Accepts Connections<br/>21.15 Servers That Handle Multiple Services<br/>21.16 Obtaining And Setting Host Names<br/>21.17 Obtaining And Setting The Internal Host Domain<br/>21.18 Socket Library Calls<br/>21.19 Network Byte Order Conversion Routines<br/>21.20 IP Address Manipulation Routines<br/>21.21 Accessing The Domain Name System<br/>21.22 Obtaining Information About Hosts<br/>21.23 Obtaining Information About Networks<br/>21.24 Obtaining Information About Protocols<br/>21.25 Obtaining Information About Network Services<br/>21.26 An Example Client<br/>21.27 An Example Server<br/>Chapter 22 Bootstrap And Autoconflguratlon (DHCP)<br/>22.1 Introduction<br/>22.2 History Of Bootstrapping<br/>22.3 Using IP To Determine An IP Address<br/>22.4 The DHCP Retransmission Policy<br/>22.5 The DHCP Message Format<br/>22.6 The Need For Dynamic Configuration<br/>22.7 DHCP Lease Concept<br/>22.8 Multiple Addresses And Relays<br/>22.9 Address Acquisition States<br/>22.10 Early Lease Termination<br/>22.11 Lease Renewal States<br/>22.12 DHCP Options And Message Type<br/>22.13 Option Overload<br/>22.14 DHCP ^nd Domain Names<br/>Chapter 23 The Domain Name System (DNS)<br/>23.1 Introduction<br/>23.2 Names For Machines<br/>23.3 Flat Namespace<br/>23.4 Hierarchical Names<br/>23.5 Delegation Of Authority For Names<br/>23.6 Subset Authority<br/>23.7 Internet Domain Names<br/>23.8 Top-Level Domains<br/>23.9 Name Syntax And Type<br/>23.10 Mapping Domain Names To Addresses<br/>23.11 Domain Name Resolution<br/>23.12 Efficient Translation<br/>23.13 Caching: The Key To Efficiency<br/>23.14 Domain Name System Message Format<br/>23.15 Compressed Name Format<br/>23.16 Abbreviation Of Domain Names<br/>23.17 Inverse Mappings<br/>23.18 Pointer Queries<br/>23.19 Object Types And Resource Record Contents<br/>23.20 Obtaining Authority For A Subdomain<br/>23.21 Dynamic DNS Update And Notification<br/>23.22 DNS Security Extensions (DNSSEC)<br/>Chapter 24 Remote Login And Desktop (TELNET, SSH)<br/>24.1 Introduction<br/>24.2 Remote Interactive Computing<br/>24.3 TELNET Protocol<br/>24.4 Accommodating Heterogeneity<br/>24.5 Passing Commands That Control The Remote Side<br/>24.6 Forcing The Server To Read A Control Function<br/>24.7 TELNET Options<br/>24.8 TELNET Option Negotiation<br/>24.9 Secure Shell (SSH)<br/>24.10 Other Remote Access Technologies<br/>Chapter 25 File Transfer And Access (FTP, TFTP, NFS)<br/>25.1 introduction<br/>25.2 Remote File Access, Transfer, And Storage Networks<br/>25.3 On-line Shared Access<br/>25.4 Sharing By File Transfer<br/>25.5 FTP: The Major TCP/IP File Transfer Protocol<br/>25.6 FTP Features<br/>25.7 FTP Process Model<br/>25.8 TCP Port Numbers And Data Connections<br/>25.9 The User's View Of FTP<br/>25.10 Anonymous FTP<br/>25.11 Secure File Transfer (SSL-FTP, Scp, Sftp)<br/>25.12 TFTP<br/>25.13 NFS -<br/>25.14 Implementation Of NFS (RFC And XDR)<br/>Chapter 26 Electronic Mall (SMTP, POP, IMAP, MIME)<br/>26.1 Introduction<br/>26.2 Electronic Mail<br/>26.3 Mailbox Names And Aliases<br/>26.4 Alias Expansion And Mail Forwarding<br/>26.5 TCP/IP Standards For Electronic Mail Service<br/>26.6 Simple Mail Transfer Protocol (SMTP)<br/>26.7 Mail Retrieval And Mailbox Manipulation Protocols<br/>26.8 The MIME Extensions For Non-ASCII Data<br/>26.9 MIME Multipart Messages<br/>Chapter 27 World Wide Web (HTTP)<br/>27.1 Introduction<br/>27.2 Importance Of The Web<br/>27.3 Architectural Components<br/>27.4 Uniform Resource Locators<br/>27.5 An Example Document<br/>27.6 Hypertext Transfer Protocol<br/>27.7 HTTP GET Request<br/>27.8 Error Messages<br/>27.9 Persistent Connections And Lengths<br/>27.10 Data Length And Program Output<br/>27.11 Length Encoding And Headers<br/>27.12 Negotiation<br/>27.13 Conditional Requests<br/>27.14 Proxy Servers And Caching<br/>27.15 Caching<br/>27.16 Other HTTP Functionality<br/>27.17 HTTP, Security, And E-Commerce<br/>Chapter 28 Voice And Video Over iP (RTP, RSVP, QoS)<br/>28.1 Introduction<br/>28.2 Digitizing And Encoding<br/>28.3 Audio And Video Transmission And Reproduction<br/>28.4 Jitter And Playback Delay<br/>28.5 Real-time Transport Protocol (RTP)<br/>28.6 Streams, Mixing, And Multicasting<br/>28.7 RTP Encapsulation<br/>28.8 RTP Control Protocol (RTCP)<br/>28.9 RTCP Operation<br/>28.10 IP Telephony And Signaling<br/>28.11 Quality Of Service Controversy<br/>28.12 QoS, Utilization, And Capacity<br/>28.13 IntServ Resource Reservation (RSVP)<br/>28.14 IntServ Enforcement (COPS)<br/>28.15 DiffServ And Per-Hop Behavior<br/>28.16 Traffic Scheduling<br/>28.17 Traffic Policing<br/>Chapter 29 Network Management (SNMP)<br/>29.1 Introduction<br/>29.2 The Level Of Management Protocols<br/>29.3 Architectural Model<br/>29.4 Protocol Framework<br/>29.5 Examples ofMlB Variables<br/>29.6 The Structure Of Management Information<br/>29.7 Formal Definitions Using ASN. 1<br/>29.8 Structure And Representation OfMIB Object Names<br/>29.9 Simple Network Management Protocol<br/>29.10 SNMP Message Format<br/>29.11 An Example Encoded SNMP Message<br/>29.12 New Features In SNMPvS<br/>Chapter 30 internet Security And Firewall Design (iPsec, SSL)<br/>30.1 Introduction<br/>30.2 Protecting Resources<br/>30.3 Information Policy<br/>30.4 Internet Security<br/>30.5 IP Security (IPsec)<br/>30.6 IPsec Authentication Header<br/>30.7 Security Association<br/>30.8 IPsec Encapsulating Security Payload<br/>30.9 Authentication And Mutable Header Fields<br/>30.10 IPsec Tunneling<br/>30.11 Required Security Algorithms<br/>30.12 Secure Sockets (SSL and TLS)<br/>30.13 Firewalls And Internet Access<br/>30.14 Multiple Connections And Weakest Links<br/>30.15 Firewall Implementation And Packet Filters<br/>30.16 Security And Packet Filter Specification<br/>30.17 The Consequence Of Restricted Access For Clients<br/>30.18 Stateful Firewalls<br/>30.19 Content Protection And Proxies<br/>30.20 Monitoring And Logging<br/>Chapter 31 A Next Generation IP (IPv6)<br/>31.1 Introduction<br/>31.2 Why Change?<br/>31.3 Beyond IPv4<br/>31.4 The Road To A New Version Of IP<br/>31.5 The Name Of The Next IP<br/>31.6 Features Of IPv6<br/>31.7 General Form Of An IPv6 Datagram<br/>31.8 IPv6 Base Header Format<br/>31.9 IPv6 Extension Headers<br/>31.10 Parsing An IPv6 Datagram<br/>31.11 IPv6 Fragmentation And Reassembly<br/>31.12 The Consequence Of End-To-End Fragmentation<br/>31.13 IPv6 Source Routing<br/>31.14 IPv6 Options<br/>31.15 Size Of The IPv6 Address Space<br/>31.16 IPv6 Colon Hexadecimal Notation<br/>31.17 Three Basic IPv6 Address Types<br/>31.18 The Duality Of Broadcast And Multicast<br/>31.19 An Engineering Choice And Simulated Broadcast<br/>31.20 Proposed IPv6 Address Space Assignment<br/>31.21 Embedded IPv4 Addresses And Transition<br/>31.22 Unspecified And Loopback Addresses<br/>31.23 Unicast Address Structure<br/>31.24 Interface Identifiers<br/>31.25 Local Addresses<br/>31.26 Autoconfiguration And Renumbering |