Internetworking with TCP/IP: principles, protocols, and architecture Douglas E. Comer.

By: Comer, DouglasMaterial type: TextTextPublication details: New Delhi : Prentice Hall, 2010Edition: 5th edDescription: v. 1, 650 p. : ill. ; 25 cmISBN: 9788120329980(v. 1)Subject(s): Computer Networks | TCP/IP (Computer network protocol) | Data Transmission SystemsDDC classification: 004.6
Contents:
Chapter 1 Introduction And Overview 1.1 The Motivation For Internetworking 1.2 The TCP/IP Internet 1.3 Internet Services 1.4 History And Scope Of The Internet 1.5 The Internet Architecture Board 1.6 The lAB Reorganization 1.7 Internet Request For Comments 1.8 Future Growth And Technology 1.9 Organization Of The Text Chapter 2 Review Of Underlying Network Technologies 2.1 Introduction 2.2 Two Approaches To Network Communication 2.3 Wide Area And Local Area Networks 2.4 Ethernet Technology 2.5 Switched Ethernet 2.6 Asynchronous Transfer Mode Chapter 3 internetworking Concept And Architectural Model 3.1 Introduction 3.2 Application-Level Interconnection 3.3 Network-Level Interconnection 3.4 Properties Of The Internet 3.5 Internet Architecture 3.6 Interconnection Through IP Routers 3.7 The User's View 3.8 All Networks Are Equal 3.9 The Unanswered Questions Chapter 4 Glassful Internet Addresses 4.1 Introduction 4.2 Universal Identifiers 4.3 The Original Glassful Addressing Scheme 4.4 Addresses Specify Network Connections 4.5 Network And Directed Broadcast Addresses 4.6 Limited Broadcast 4.7 The All-Os Address 4.8 Subnet And Classless Extensions 4.9 IP Multicast Addresses 4.10 Weaknesses In Internet Addressing 4.11 Dotted Decimal Notation 4.12 Loopback Address 4.13 Summary Of Special Address Conventions 4.14 Internet Addressing Authority 4.15 Reserved Address Prefixes 4.16 An Example 4.17 Network Byte Order 4.18 Summary Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP) 5.1 Introduction 5.2 The Address Resolution Problem 5.3 Two Types Of Physical Addresses 5.4 Resolution Through Direct Mapping 5.5 Resolution Through Dynamic Binding 5.6 The Address Resolution Cache 5.7 ARP Cache Timeout 5.8 ARP Refinements 5.9 Relationship Of ARP To Other Protocols 5.10 ARP Implementation 5.11 ARP Encapsulation And Identification 5.72 ARP Protocol Format 5.13 Automatic ARP Cache Revalidation 5.14 Reverse Address Resolution (RARP) Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4) 6.1 Introduction 6.2 A Virtual Network 6.3 Internet Architecture And Philosophy 6.4 The Conceptual Service Organization 6.5 Connectionless Delivery System 6.6 Purpose Of The Internet Protocol 6.7 The IPv4 Datagram 6.8 Internet Datagram Options Chapter 7 Internet Protocol: Forwarding IP Datagrams 7.1 Introduction 7.2 Forwarding In An Internet 7.3 Direct And Indirect Delivery 7.4 Table-Driven IP Forwarding 7.5 Next-Hop Forwarding 7.6 Default Routes 7.7 Host-Specific Routes 7.8 The IP Forwarding Algorithm 7.9 Forwarding With IP Addresses 7.10 Handling Incoming Datagrams 7.11 Establishing Routing Tables Chapter 8 Internet Protocol: Error And Control Messages (ICMP) 8.1 Introduction 8.2 The Internet Control Message Protocol 8.3 Error Reporting Vs. Error Correction 8.4 ICMP Message Delivery 8.5 ICMP Message Format 8.6 Testing Destination Reachability And Status (Ping) 8.7 Echo Request And Reply Message Format 8.8 Reports Of Unreachable Destinations 115 8.9 Congestion And Datagram Flow Control 116 8.10 Source Quench Format 117 8.11 Route Change Requests From Routers 118 8.12 Detecting Circular Or Excessively Long Routes 119 8.13 Reporting Other Problems 120 8.14 Clock Synchronization And Transit Time Estimation 121 8.15 Older ICMP Messages No Longer Needed 122 8.16 Summary 123 Chapter 9 Classless And Subnet Address Extensions (CIDR) 9.1 Introduction 9.2 Review Of Relevant Facts 9.3 Minimizing Network Numbers 9.4 Proxy ARP 9.5 Subnet Addressing 9.6 Flexibility In Subnet Address Assignment 9.7 Variable-Length Subnets 9.8 Implementation Of Subnets With Masks 9.9 Subnet Mask Representation 9.10 Forwarding In The Presence Of Subnets 9.11 The Subnet Forwarding Algorithm 9.12 A Unified Forwarding Algorithm 9.13 Maintenance Of Subnet Masks 9.14 Broadcasting To Subnets 9.15 Anonymous Point-To-Point Networks 9.16 Classless Addressing And Supemetting 9.17 CIDR Address Blocks And Bit Masks 9.18 Address Blocks And CIDR Notation 9.19 A Classless Addressing Example 9.20 Data Structures And Algorithms For Classless Lookup 9.21 Longest-Match And Mixtures Of Route Types 9.22 CIDR Blocks Reserved For Private Networks Chapter 10 Protocol Layering 10.1 Introduction 10.2 The Need For Multiple Protocols 10.3 The Conceptual Layers Of Protocol Software 10.4 Functionality Of The layers Contents 10.5 X.25 And Its Relation To The ISO Model 10.6 Locus Of Intelligence 10.7 The Protocol Layering Principle 10.8 Layering In The Presence Of Network Substructure 10.9 Two Important Boundaries In The TCP/IP Model 10.10 The Disadvantage Of Layering 10.11 The Basic Idea Behind Multiplexing And Demultiplexing Chapter 11 User Datagram Protocol (UDP) I I.I Introduction 11.2 Identifying The Ultimate Destination 11.3 The User Datagram Protocol 11.4 Format Of UDP Messages 11.5 UDP Pseudo-Header 11.6 UDP Encapsulation And Protocol Layering 11.7 Layering And The UDP Checksum Computation 11.8 UDP Multiplexing, Demultiplexing, And Ports 11.9 Reserved And Available UDP Port Numbers Chapter 12 Reliable Stream Transport Service (TCP) 12.1 Introduction 12.2 The Need For Stream Delivery 12.3 Properties Of The Reliable Delivery Service 12.4 Providing Reliability 12.5 The Idea Behind Sliding Windows 12.6 The Transmission Control Protocol 12.7 Ports, Connections, And Endpoints 12.8 Passive And Active Opens 12.9 Segments, Streams, And Sequence Numbers 12.10 Variable Window Size And Flow Control 12.11 TCP Segment Format 12.12 dut Of Band Data 12.13 TCP Options 12.14 TCP Checksum Computation 12.15 Acknowledgements, Retransmission, And Timeouts 12.16 Accurate Measurement Of Round Trip Samples 12.17 Kam 's Algorithm And Timer Backoff 12.18 Responding To High Variance In Delay 12.19 Response To Congestion 12.20 Fast Recovery And Other Modifications 12.21 Explicit Feedback Mechanisms (SACK and ECN) 12.22 Congestion, Tail Drop, And TCP 12.23 Random Early Detection (RED) 12.24 Establishing A TCP Connection 12.25 Initial Sequence Numbers 12.26 Closing a TCP Connection 12.27 TCP Connection Reset 12.28 TCP State Machine 12.29 Forcing Data Delivery 12.30 Reserved TCP Port Numbers 12.31 TCP Performance 12.32 Silly Window Syndrome And Small Packets 12.33 Avoiding Silly Window Syndrome Chapter 13 Routing Architecture: Cores, Peers, And Algorithms 13.1 Introduction 13.2 The Origin Of Routing Tables 13.3 Forwarding With Partial Information 13.4 Original Internet Architecture And Cores 13.5 Beyond The Core Architecture To Peer Backbones 13.6 Automatic Route Propagation 13.7 Distance Vector (Bellman-Ford) Routing 13.8 Reliability And Routing Protocols 13.9 Link-State (SPF) Routing Chapter 14 Routing Between Peers (BGP) 14.1 Introduction 14.2 Routing Update Protocol Scope 14.3 Determining A Practical Limit On Group Size 14.4 A Fundamental Idea: Extra Hops 14.5 Autonomous System Concept 14.6 Exterior Gateway Protocols And Reachability 14.7 BGP Characteristics 14.8 BGP Functionality And Message Types 14.9 BGP Message Header 14.10 BGP OPEN Message 14.11 BGP UPDATE Message 14.12 Compressed Mask-Address Pairs 14.13 BGP Path Attributes 14.14 BGP KEEPALIVE Message 14.15 Information From The Receiver's Perspective 14.16 The Key Restriction Of Exterior Gateway Protocols 14.17 The Internet Routing Architecture 14.18 BGP NOTIFICATION Message Chapter 15 Routing Within An Autonomous System (RIP, OSPF) 15.1 Introduction 15.2 Static Vj. Dynamic Interior Routes 15.3 Routing Information Protocol (RIP) 15.4 Slow Convergence Problem 15.5 Solving The Slow Convergence Problem 15.6 RlPl Message Format 15.7 R1P2 Address Conventions 15.8 RIP Route Interpretation And Aggregation 15.9 R1P2 Extensions And Message Format 15.10 The Disadvantage Of RIP Hop Counts 15.11 Delay Metric (HELLO) 15.12 Delay Metrics And Oscillation 15.13 Combining RIP, Hello, And BGP 15.14 Gated: Inter-Autonomous System Communication 15.15 The Open SPF Protocol (OSPF) 15.16 Routing With Partial Information Chapter 16 Internet Multicasting 16.1 Introduction 16.2 Hardware Broadcast 16.3 Hardware Origins Of Multicast 16.4 Ethernet Multicast 16.5 IP Multicast 16.6 The Conceptual Pieces 16.7 IP Multicast Addresses 16.8 Multicast Address Semantics 16.9 Mapping IP Multicast To Ethernet Multicast 16.10 Hosts And Multicast Delivery 16.11 Multicast Scope 16.12 Extending Host Software To Handle Multicasting 16.13 Internet Group Management Protocol 16.14 IGMP Implementation 16.15 Group Membership State Transitions 16.16 IGMP Membership Query Message Format 16.17 IGMP Membership Report Message Format 16.18 Multicast Forwarding And Routing Information 16.19 Basic Multicast Forwarding Paradigms 16.20 Consequences Of TRPF 16.21 Multicast Trees 16.22 The Essence Of Multicast Route Propagation 16.23 Reverse Path Multicasting 16.24 Multicast Routing Protocols 16.25 Reliable Multicast And ACK Implosions Chapter 17 IP Switching And MPLS 17.1 Introduction 17.2 Switching Technology 17.3 Large Networks, Label Swapping, And Paths 17.4 Using Switching With IP 17.5 IP Switching Technologies And MPI^ 17.6 Classification, Flows, And Higher Layer Switching 17.7 Hierarchical Use Of MPLS 17.8 MPLS Encapsulation 17.9 Label Switching Router 17.10 Control Processing And Label Distribution 17.11 MPLS And Fragmentation 17.12 Mesh Topology And Traffic Engineering Chapter 18 Mobile IP 18.1 Introduction 18.2 Mobility, Routing, and Addressing 18 3 Mobile IP Characteristics 18.4 Overview Of Mobile IP Operation 18.5 Mobile Addressing Details 18.6 Foreign Agent Discovery 18.7 Agent Registration 18.8 Registration Message Format 18.9 Communication With A Foreign Agent 18.10 Datagram Transmission And Reception 18.11 The Two-Crossing Problem 18.12 Communication With Computers On the Home Network Chapter 19 Private Network Interconnection (NAT, VPN) 19.1 Introduction 19.2 Private And Hybrid Networks 19.3 VPN Addressing And Routing 19.4 Extending VPN Technology To Individual Hosts 19.5 A VPN With Private Addresses 19.6 Network Address Translation (NAT) 19.7 NAT Translation Table Creation 19.8 Multi-Address NAT 19.9 Port-Mapped NAT 19.10 Interaction Between NAT And ICMP 19.11 Interaction Between NAT And Applications 19.12 NAT In The Presence Of Fragmentation 19.13 Conceptual Address Domains 19.14 Slirp And Iptables Chapter 20 Client-Server Model Of Interaction 20.1 Introduction 20.2 The Client-Server Model' 20.3 A Simple Example: UDP Echo Server 20.4 Time And Date Service 20.5 The Complexity of Servers 20.6 Broadcasting A Request 20.7 Alternatives To The Client-Server Model Chapter 21 The Socket Interface 21.1 Introduction 21.2 The UNIX 1/0 Paradigm And Network I/O 21.3 Adding Network 1/0 to UNIX 21.4 The Socket Abstraction 21.5 Creating A Socket 21.6 Socket Inheritance And Termination 21.7 Specifying A Local Address 21.8 Connecting Sockets To Destination Addresses 21.9 Sending Data Through A Socket 21.10 Receiving Data Through A Socket 21.11 Obtaining Local And Remote Socket Addresses 21.12 Obtaining And Setting Socket Options 21.13 Specifying A Queue Length For A Server 21.14 How A Server Accepts Connections 21.15 Servers That Handle Multiple Services 21.16 Obtaining And Setting Host Names 21.17 Obtaining And Setting The Internal Host Domain 21.18 Socket Library Calls 21.19 Network Byte Order Conversion Routines 21.20 IP Address Manipulation Routines 21.21 Accessing The Domain Name System 21.22 Obtaining Information About Hosts 21.23 Obtaining Information About Networks 21.24 Obtaining Information About Protocols 21.25 Obtaining Information About Network Services 21.26 An Example Client 21.27 An Example Server Chapter 22 Bootstrap And Autoconflguratlon (DHCP) 22.1 Introduction 22.2 History Of Bootstrapping 22.3 Using IP To Determine An IP Address 22.4 The DHCP Retransmission Policy 22.5 The DHCP Message Format 22.6 The Need For Dynamic Configuration 22.7 DHCP Lease Concept 22.8 Multiple Addresses And Relays 22.9 Address Acquisition States 22.10 Early Lease Termination 22.11 Lease Renewal States 22.12 DHCP Options And Message Type 22.13 Option Overload 22.14 DHCP ^nd Domain Names Chapter 23 The Domain Name System (DNS) 23.1 Introduction 23.2 Names For Machines 23.3 Flat Namespace 23.4 Hierarchical Names 23.5 Delegation Of Authority For Names 23.6 Subset Authority 23.7 Internet Domain Names 23.8 Top-Level Domains 23.9 Name Syntax And Type 23.10 Mapping Domain Names To Addresses 23.11 Domain Name Resolution 23.12 Efficient Translation 23.13 Caching: The Key To Efficiency 23.14 Domain Name System Message Format 23.15 Compressed Name Format 23.16 Abbreviation Of Domain Names 23.17 Inverse Mappings 23.18 Pointer Queries 23.19 Object Types And Resource Record Contents 23.20 Obtaining Authority For A Subdomain 23.21 Dynamic DNS Update And Notification 23.22 DNS Security Extensions (DNSSEC) Chapter 24 Remote Login And Desktop (TELNET, SSH) 24.1 Introduction 24.2 Remote Interactive Computing 24.3 TELNET Protocol 24.4 Accommodating Heterogeneity 24.5 Passing Commands That Control The Remote Side 24.6 Forcing The Server To Read A Control Function 24.7 TELNET Options 24.8 TELNET Option Negotiation 24.9 Secure Shell (SSH) 24.10 Other Remote Access Technologies Chapter 25 File Transfer And Access (FTP, TFTP, NFS) 25.1 introduction 25.2 Remote File Access, Transfer, And Storage Networks 25.3 On-line Shared Access 25.4 Sharing By File Transfer 25.5 FTP: The Major TCP/IP File Transfer Protocol 25.6 FTP Features 25.7 FTP Process Model 25.8 TCP Port Numbers And Data Connections 25.9 The User's View Of FTP 25.10 Anonymous FTP 25.11 Secure File Transfer (SSL-FTP, Scp, Sftp) 25.12 TFTP 25.13 NFS - 25.14 Implementation Of NFS (RFC And XDR) Chapter 26 Electronic Mall (SMTP, POP, IMAP, MIME) 26.1 Introduction 26.2 Electronic Mail 26.3 Mailbox Names And Aliases 26.4 Alias Expansion And Mail Forwarding 26.5 TCP/IP Standards For Electronic Mail Service 26.6 Simple Mail Transfer Protocol (SMTP) 26.7 Mail Retrieval And Mailbox Manipulation Protocols 26.8 The MIME Extensions For Non-ASCII Data 26.9 MIME Multipart Messages Chapter 27 World Wide Web (HTTP) 27.1 Introduction 27.2 Importance Of The Web 27.3 Architectural Components 27.4 Uniform Resource Locators 27.5 An Example Document 27.6 Hypertext Transfer Protocol 27.7 HTTP GET Request 27.8 Error Messages 27.9 Persistent Connections And Lengths 27.10 Data Length And Program Output 27.11 Length Encoding And Headers 27.12 Negotiation 27.13 Conditional Requests 27.14 Proxy Servers And Caching 27.15 Caching 27.16 Other HTTP Functionality 27.17 HTTP, Security, And E-Commerce Chapter 28 Voice And Video Over iP (RTP, RSVP, QoS) 28.1 Introduction 28.2 Digitizing And Encoding 28.3 Audio And Video Transmission And Reproduction 28.4 Jitter And Playback Delay 28.5 Real-time Transport Protocol (RTP) 28.6 Streams, Mixing, And Multicasting 28.7 RTP Encapsulation 28.8 RTP Control Protocol (RTCP) 28.9 RTCP Operation 28.10 IP Telephony And Signaling 28.11 Quality Of Service Controversy 28.12 QoS, Utilization, And Capacity 28.13 IntServ Resource Reservation (RSVP) 28.14 IntServ Enforcement (COPS) 28.15 DiffServ And Per-Hop Behavior 28.16 Traffic Scheduling 28.17 Traffic Policing Chapter 29 Network Management (SNMP) 29.1 Introduction 29.2 The Level Of Management Protocols 29.3 Architectural Model 29.4 Protocol Framework 29.5 Examples ofMlB Variables 29.6 The Structure Of Management Information 29.7 Formal Definitions Using ASN. 1 29.8 Structure And Representation OfMIB Object Names 29.9 Simple Network Management Protocol 29.10 SNMP Message Format 29.11 An Example Encoded SNMP Message 29.12 New Features In SNMPvS Chapter 30 internet Security And Firewall Design (iPsec, SSL) 30.1 Introduction 30.2 Protecting Resources 30.3 Information Policy 30.4 Internet Security 30.5 IP Security (IPsec) 30.6 IPsec Authentication Header 30.7 Security Association 30.8 IPsec Encapsulating Security Payload 30.9 Authentication And Mutable Header Fields 30.10 IPsec Tunneling 30.11 Required Security Algorithms 30.12 Secure Sockets (SSL and TLS) 30.13 Firewalls And Internet Access 30.14 Multiple Connections And Weakest Links 30.15 Firewall Implementation And Packet Filters 30.16 Security And Packet Filter Specification 30.17 The Consequence Of Restricted Access For Clients 30.18 Stateful Firewalls 30.19 Content Protection And Proxies 30.20 Monitoring And Logging Chapter 31 A Next Generation IP (IPv6) 31.1 Introduction 31.2 Why Change? 31.3 Beyond IPv4 31.4 The Road To A New Version Of IP 31.5 The Name Of The Next IP 31.6 Features Of IPv6 31.7 General Form Of An IPv6 Datagram 31.8 IPv6 Base Header Format 31.9 IPv6 Extension Headers 31.10 Parsing An IPv6 Datagram 31.11 IPv6 Fragmentation And Reassembly 31.12 The Consequence Of End-To-End Fragmentation 31.13 IPv6 Source Routing 31.14 IPv6 Options 31.15 Size Of The IPv6 Address Space 31.16 IPv6 Colon Hexadecimal Notation 31.17 Three Basic IPv6 Address Types 31.18 The Duality Of Broadcast And Multicast 31.19 An Engineering Choice And Simulated Broadcast 31.20 Proposed IPv6 Address Space Assignment 31.21 Embedded IPv4 Addresses And Transition 31.22 Unspecified And Loopback Addresses 31.23 Unicast Address Structure 31.24 Interface Identifiers 31.25 Local Addresses 31.26 Autoconfiguration And Renumbering
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
004.6 COM/I (Browse shelf(Opens below)) Available P18670
Total holds: 0

Includes bibliographical references and indexes.

Chapter 1 Introduction And Overview
1.1 The Motivation For Internetworking
1.2 The TCP/IP Internet
1.3 Internet Services
1.4 History And Scope Of The Internet
1.5 The Internet Architecture Board
1.6 The lAB Reorganization
1.7 Internet Request For Comments
1.8 Future Growth And Technology
1.9 Organization Of The Text
Chapter 2 Review Of Underlying Network Technologies
2.1 Introduction
2.2 Two Approaches To Network Communication
2.3 Wide Area And Local Area Networks
2.4 Ethernet Technology
2.5 Switched Ethernet
2.6 Asynchronous Transfer Mode
Chapter 3 internetworking Concept And Architectural Model
3.1 Introduction
3.2 Application-Level Interconnection
3.3 Network-Level Interconnection
3.4 Properties Of The Internet
3.5 Internet Architecture
3.6 Interconnection Through IP Routers
3.7 The User's View
3.8 All Networks Are Equal
3.9 The Unanswered Questions
Chapter 4 Glassful Internet Addresses
4.1 Introduction
4.2 Universal Identifiers
4.3 The Original Glassful Addressing Scheme
4.4 Addresses Specify Network Connections
4.5 Network And Directed Broadcast Addresses
4.6 Limited Broadcast
4.7 The All-Os Address
4.8 Subnet And Classless Extensions
4.9 IP Multicast Addresses
4.10 Weaknesses In Internet Addressing
4.11 Dotted Decimal Notation
4.12 Loopback Address
4.13 Summary Of Special Address Conventions
4.14 Internet Addressing Authority
4.15 Reserved Address Prefixes
4.16 An Example
4.17 Network Byte Order
4.18 Summary
Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)
5.1 Introduction
5.2 The Address Resolution Problem
5.3 Two Types Of Physical Addresses
5.4 Resolution Through Direct Mapping
5.5 Resolution Through Dynamic Binding
5.6 The Address Resolution Cache
5.7 ARP Cache Timeout
5.8 ARP Refinements
5.9 Relationship Of ARP To Other Protocols
5.10 ARP Implementation
5.11 ARP Encapsulation And Identification
5.72 ARP Protocol Format
5.13 Automatic ARP Cache Revalidation
5.14 Reverse Address Resolution (RARP)
Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4)
6.1 Introduction
6.2 A Virtual Network
6.3 Internet Architecture And Philosophy
6.4 The Conceptual Service Organization
6.5 Connectionless Delivery System
6.6 Purpose Of The Internet Protocol
6.7 The IPv4 Datagram
6.8 Internet Datagram Options
Chapter 7 Internet Protocol: Forwarding IP Datagrams
7.1 Introduction
7.2 Forwarding In An Internet
7.3 Direct And Indirect Delivery
7.4 Table-Driven IP Forwarding
7.5 Next-Hop Forwarding
7.6 Default Routes
7.7 Host-Specific Routes
7.8 The IP Forwarding Algorithm
7.9 Forwarding With IP Addresses
7.10 Handling Incoming Datagrams
7.11 Establishing Routing Tables
Chapter 8 Internet Protocol: Error And Control Messages (ICMP)
8.1 Introduction
8.2 The Internet Control Message Protocol
8.3 Error Reporting Vs. Error Correction
8.4 ICMP Message Delivery
8.5 ICMP Message Format
8.6 Testing Destination Reachability And Status (Ping)
8.7 Echo Request And Reply Message Format
8.8 Reports Of Unreachable Destinations 115
8.9 Congestion And Datagram Flow Control 116
8.10 Source Quench Format 117
8.11 Route Change Requests From Routers 118
8.12 Detecting Circular Or Excessively Long Routes 119
8.13 Reporting Other Problems 120
8.14 Clock Synchronization And Transit Time Estimation 121
8.15 Older ICMP Messages No Longer Needed 122
8.16 Summary 123
Chapter 9 Classless And Subnet Address Extensions (CIDR)
9.1 Introduction
9.2 Review Of Relevant Facts
9.3 Minimizing Network Numbers
9.4 Proxy ARP
9.5 Subnet Addressing
9.6 Flexibility In Subnet Address Assignment
9.7 Variable-Length Subnets
9.8 Implementation Of Subnets With Masks
9.9 Subnet Mask Representation
9.10 Forwarding In The Presence Of Subnets
9.11 The Subnet Forwarding Algorithm
9.12 A Unified Forwarding Algorithm
9.13 Maintenance Of Subnet Masks
9.14 Broadcasting To Subnets
9.15 Anonymous Point-To-Point Networks
9.16 Classless Addressing And Supemetting
9.17 CIDR Address Blocks And Bit Masks
9.18 Address Blocks And CIDR Notation
9.19 A Classless Addressing Example
9.20 Data Structures And Algorithms For Classless Lookup
9.21 Longest-Match And Mixtures Of Route Types
9.22 CIDR Blocks Reserved For Private Networks
Chapter 10 Protocol Layering
10.1 Introduction
10.2 The Need For Multiple Protocols
10.3 The Conceptual Layers Of Protocol Software
10.4 Functionality Of The layers
Contents
10.5 X.25 And Its Relation To The ISO Model
10.6 Locus Of Intelligence
10.7 The Protocol Layering Principle
10.8 Layering In The Presence Of Network Substructure
10.9 Two Important Boundaries In The TCP/IP Model
10.10 The Disadvantage Of Layering
10.11 The Basic Idea Behind Multiplexing And Demultiplexing
Chapter 11 User Datagram Protocol (UDP)
I I.I Introduction
11.2 Identifying The Ultimate Destination
11.3 The User Datagram Protocol
11.4 Format Of UDP Messages
11.5 UDP Pseudo-Header
11.6 UDP Encapsulation And Protocol Layering
11.7 Layering And The UDP Checksum Computation
11.8 UDP Multiplexing, Demultiplexing, And Ports
11.9 Reserved And Available UDP Port Numbers
Chapter 12 Reliable Stream Transport Service (TCP)
12.1 Introduction
12.2 The Need For Stream Delivery
12.3 Properties Of The Reliable Delivery Service
12.4 Providing Reliability
12.5 The Idea Behind Sliding Windows
12.6 The Transmission Control Protocol
12.7 Ports, Connections, And Endpoints
12.8 Passive And Active Opens
12.9 Segments, Streams, And Sequence Numbers
12.10 Variable Window Size And Flow Control
12.11 TCP Segment Format
12.12 dut Of Band Data
12.13 TCP Options
12.14 TCP Checksum Computation
12.15 Acknowledgements, Retransmission, And Timeouts
12.16 Accurate Measurement Of Round Trip Samples
12.17 Kam 's Algorithm And Timer Backoff
12.18 Responding To High Variance In Delay
12.19 Response To Congestion
12.20 Fast Recovery And Other Modifications
12.21 Explicit Feedback Mechanisms (SACK and ECN)
12.22 Congestion, Tail Drop, And TCP
12.23 Random Early Detection (RED)
12.24 Establishing A TCP Connection
12.25 Initial Sequence Numbers
12.26 Closing a TCP Connection
12.27 TCP Connection Reset
12.28 TCP State Machine
12.29 Forcing Data Delivery
12.30 Reserved TCP Port Numbers
12.31 TCP Performance
12.32 Silly Window Syndrome And Small Packets
12.33 Avoiding Silly Window Syndrome
Chapter 13 Routing Architecture: Cores, Peers, And Algorithms
13.1 Introduction
13.2 The Origin Of Routing Tables
13.3 Forwarding With Partial Information
13.4 Original Internet Architecture And Cores
13.5 Beyond The Core Architecture To Peer Backbones
13.6 Automatic Route Propagation
13.7 Distance Vector (Bellman-Ford) Routing
13.8 Reliability And Routing Protocols
13.9 Link-State (SPF) Routing
Chapter 14 Routing Between Peers (BGP)
14.1 Introduction
14.2 Routing Update Protocol Scope
14.3 Determining A Practical Limit On Group Size
14.4 A Fundamental Idea: Extra Hops
14.5 Autonomous System Concept
14.6 Exterior Gateway Protocols And Reachability
14.7 BGP Characteristics
14.8 BGP Functionality And Message Types
14.9 BGP Message Header
14.10 BGP OPEN Message
14.11 BGP UPDATE Message
14.12 Compressed Mask-Address Pairs
14.13 BGP Path Attributes
14.14 BGP KEEPALIVE Message
14.15 Information From The Receiver's Perspective
14.16 The Key Restriction Of Exterior Gateway Protocols
14.17 The Internet Routing Architecture
14.18 BGP NOTIFICATION Message
Chapter 15 Routing Within An Autonomous System (RIP, OSPF)
15.1 Introduction
15.2 Static Vj. Dynamic Interior Routes
15.3 Routing Information Protocol (RIP)
15.4 Slow Convergence Problem
15.5 Solving The Slow Convergence Problem
15.6 RlPl Message Format
15.7 R1P2 Address Conventions
15.8 RIP Route Interpretation And Aggregation
15.9 R1P2 Extensions And Message Format
15.10 The Disadvantage Of RIP Hop Counts
15.11 Delay Metric (HELLO)
15.12 Delay Metrics And Oscillation
15.13 Combining RIP, Hello, And BGP
15.14 Gated: Inter-Autonomous System Communication
15.15 The Open SPF Protocol (OSPF)
15.16 Routing With Partial Information
Chapter 16 Internet Multicasting
16.1 Introduction
16.2 Hardware Broadcast
16.3 Hardware Origins Of Multicast
16.4 Ethernet Multicast
16.5 IP Multicast
16.6 The Conceptual Pieces
16.7 IP Multicast Addresses
16.8 Multicast Address Semantics
16.9 Mapping IP Multicast To Ethernet Multicast
16.10 Hosts And Multicast Delivery
16.11 Multicast Scope
16.12 Extending Host Software To Handle Multicasting
16.13 Internet Group Management Protocol
16.14 IGMP Implementation
16.15 Group Membership State Transitions
16.16 IGMP Membership Query Message Format
16.17 IGMP Membership Report Message Format
16.18 Multicast Forwarding And Routing Information
16.19 Basic Multicast Forwarding Paradigms
16.20 Consequences Of TRPF
16.21 Multicast Trees
16.22 The Essence Of Multicast Route Propagation
16.23 Reverse Path Multicasting
16.24 Multicast Routing Protocols
16.25 Reliable Multicast And ACK Implosions
Chapter 17 IP Switching And MPLS
17.1 Introduction
17.2 Switching Technology
17.3 Large Networks, Label Swapping, And Paths
17.4 Using Switching With IP
17.5 IP Switching Technologies And MPI^
17.6 Classification, Flows, And Higher Layer Switching
17.7 Hierarchical Use Of MPLS
17.8 MPLS Encapsulation
17.9 Label Switching Router
17.10 Control Processing And Label Distribution
17.11 MPLS And Fragmentation
17.12 Mesh Topology And Traffic Engineering
Chapter 18 Mobile IP
18.1 Introduction
18.2 Mobility, Routing, and Addressing
18 3 Mobile IP Characteristics
18.4 Overview Of Mobile IP Operation
18.5 Mobile Addressing Details
18.6 Foreign Agent Discovery
18.7 Agent Registration
18.8 Registration Message Format
18.9 Communication With A Foreign Agent
18.10 Datagram Transmission And Reception
18.11 The Two-Crossing Problem
18.12 Communication With Computers On the Home Network
Chapter 19 Private Network Interconnection (NAT, VPN)
19.1 Introduction
19.2 Private And Hybrid Networks
19.3 VPN Addressing And Routing
19.4 Extending VPN Technology To Individual Hosts
19.5 A VPN With Private Addresses
19.6 Network Address Translation (NAT)
19.7 NAT Translation Table Creation
19.8 Multi-Address NAT
19.9 Port-Mapped NAT
19.10 Interaction Between NAT And ICMP
19.11 Interaction Between NAT And Applications
19.12 NAT In The Presence Of Fragmentation
19.13 Conceptual Address Domains
19.14 Slirp And Iptables
Chapter 20 Client-Server Model Of Interaction
20.1 Introduction
20.2 The Client-Server Model'
20.3 A Simple Example: UDP Echo Server
20.4 Time And Date Service
20.5 The Complexity of Servers
20.6 Broadcasting A Request
20.7 Alternatives To The Client-Server Model
Chapter 21 The Socket Interface
21.1 Introduction
21.2 The UNIX 1/0 Paradigm And Network I/O
21.3 Adding Network 1/0 to UNIX
21.4 The Socket Abstraction
21.5 Creating A Socket
21.6 Socket Inheritance And Termination
21.7 Specifying A Local Address
21.8 Connecting Sockets To Destination Addresses
21.9 Sending Data Through A Socket
21.10 Receiving Data Through A Socket
21.11 Obtaining Local And Remote Socket Addresses
21.12 Obtaining And Setting Socket Options
21.13 Specifying A Queue Length For A Server
21.14 How A Server Accepts Connections
21.15 Servers That Handle Multiple Services
21.16 Obtaining And Setting Host Names
21.17 Obtaining And Setting The Internal Host Domain
21.18 Socket Library Calls
21.19 Network Byte Order Conversion Routines
21.20 IP Address Manipulation Routines
21.21 Accessing The Domain Name System
21.22 Obtaining Information About Hosts
21.23 Obtaining Information About Networks
21.24 Obtaining Information About Protocols
21.25 Obtaining Information About Network Services
21.26 An Example Client
21.27 An Example Server
Chapter 22 Bootstrap And Autoconflguratlon (DHCP)
22.1 Introduction
22.2 History Of Bootstrapping
22.3 Using IP To Determine An IP Address
22.4 The DHCP Retransmission Policy
22.5 The DHCP Message Format
22.6 The Need For Dynamic Configuration
22.7 DHCP Lease Concept
22.8 Multiple Addresses And Relays
22.9 Address Acquisition States
22.10 Early Lease Termination
22.11 Lease Renewal States
22.12 DHCP Options And Message Type
22.13 Option Overload
22.14 DHCP ^nd Domain Names
Chapter 23 The Domain Name System (DNS)
23.1 Introduction
23.2 Names For Machines
23.3 Flat Namespace
23.4 Hierarchical Names
23.5 Delegation Of Authority For Names
23.6 Subset Authority
23.7 Internet Domain Names
23.8 Top-Level Domains
23.9 Name Syntax And Type
23.10 Mapping Domain Names To Addresses
23.11 Domain Name Resolution
23.12 Efficient Translation
23.13 Caching: The Key To Efficiency
23.14 Domain Name System Message Format
23.15 Compressed Name Format
23.16 Abbreviation Of Domain Names
23.17 Inverse Mappings
23.18 Pointer Queries
23.19 Object Types And Resource Record Contents
23.20 Obtaining Authority For A Subdomain
23.21 Dynamic DNS Update And Notification
23.22 DNS Security Extensions (DNSSEC)
Chapter 24 Remote Login And Desktop (TELNET, SSH)
24.1 Introduction
24.2 Remote Interactive Computing
24.3 TELNET Protocol
24.4 Accommodating Heterogeneity
24.5 Passing Commands That Control The Remote Side
24.6 Forcing The Server To Read A Control Function
24.7 TELNET Options
24.8 TELNET Option Negotiation
24.9 Secure Shell (SSH)
24.10 Other Remote Access Technologies
Chapter 25 File Transfer And Access (FTP, TFTP, NFS)
25.1 introduction
25.2 Remote File Access, Transfer, And Storage Networks
25.3 On-line Shared Access
25.4 Sharing By File Transfer
25.5 FTP: The Major TCP/IP File Transfer Protocol
25.6 FTP Features
25.7 FTP Process Model
25.8 TCP Port Numbers And Data Connections
25.9 The User's View Of FTP
25.10 Anonymous FTP
25.11 Secure File Transfer (SSL-FTP, Scp, Sftp)
25.12 TFTP
25.13 NFS -
25.14 Implementation Of NFS (RFC And XDR)
Chapter 26 Electronic Mall (SMTP, POP, IMAP, MIME)
26.1 Introduction
26.2 Electronic Mail
26.3 Mailbox Names And Aliases
26.4 Alias Expansion And Mail Forwarding
26.5 TCP/IP Standards For Electronic Mail Service
26.6 Simple Mail Transfer Protocol (SMTP)
26.7 Mail Retrieval And Mailbox Manipulation Protocols
26.8 The MIME Extensions For Non-ASCII Data
26.9 MIME Multipart Messages
Chapter 27 World Wide Web (HTTP)
27.1 Introduction
27.2 Importance Of The Web
27.3 Architectural Components
27.4 Uniform Resource Locators
27.5 An Example Document
27.6 Hypertext Transfer Protocol
27.7 HTTP GET Request
27.8 Error Messages
27.9 Persistent Connections And Lengths
27.10 Data Length And Program Output
27.11 Length Encoding And Headers
27.12 Negotiation
27.13 Conditional Requests
27.14 Proxy Servers And Caching
27.15 Caching
27.16 Other HTTP Functionality
27.17 HTTP, Security, And E-Commerce
Chapter 28 Voice And Video Over iP (RTP, RSVP, QoS)
28.1 Introduction
28.2 Digitizing And Encoding
28.3 Audio And Video Transmission And Reproduction
28.4 Jitter And Playback Delay
28.5 Real-time Transport Protocol (RTP)
28.6 Streams, Mixing, And Multicasting
28.7 RTP Encapsulation
28.8 RTP Control Protocol (RTCP)
28.9 RTCP Operation
28.10 IP Telephony And Signaling
28.11 Quality Of Service Controversy
28.12 QoS, Utilization, And Capacity
28.13 IntServ Resource Reservation (RSVP)
28.14 IntServ Enforcement (COPS)
28.15 DiffServ And Per-Hop Behavior
28.16 Traffic Scheduling
28.17 Traffic Policing
Chapter 29 Network Management (SNMP)
29.1 Introduction
29.2 The Level Of Management Protocols
29.3 Architectural Model
29.4 Protocol Framework
29.5 Examples ofMlB Variables
29.6 The Structure Of Management Information
29.7 Formal Definitions Using ASN. 1
29.8 Structure And Representation OfMIB Object Names
29.9 Simple Network Management Protocol
29.10 SNMP Message Format
29.11 An Example Encoded SNMP Message
29.12 New Features In SNMPvS
Chapter 30 internet Security And Firewall Design (iPsec, SSL)
30.1 Introduction
30.2 Protecting Resources
30.3 Information Policy
30.4 Internet Security
30.5 IP Security (IPsec)
30.6 IPsec Authentication Header
30.7 Security Association
30.8 IPsec Encapsulating Security Payload
30.9 Authentication And Mutable Header Fields
30.10 IPsec Tunneling
30.11 Required Security Algorithms
30.12 Secure Sockets (SSL and TLS)
30.13 Firewalls And Internet Access
30.14 Multiple Connections And Weakest Links
30.15 Firewall Implementation And Packet Filters
30.16 Security And Packet Filter Specification
30.17 The Consequence Of Restricted Access For Clients
30.18 Stateful Firewalls
30.19 Content Protection And Proxies
30.20 Monitoring And Logging
Chapter 31 A Next Generation IP (IPv6)
31.1 Introduction
31.2 Why Change?
31.3 Beyond IPv4
31.4 The Road To A New Version Of IP
31.5 The Name Of The Next IP
31.6 Features Of IPv6
31.7 General Form Of An IPv6 Datagram
31.8 IPv6 Base Header Format
31.9 IPv6 Extension Headers
31.10 Parsing An IPv6 Datagram
31.11 IPv6 Fragmentation And Reassembly
31.12 The Consequence Of End-To-End Fragmentation
31.13 IPv6 Source Routing
31.14 IPv6 Options
31.15 Size Of The IPv6 Address Space
31.16 IPv6 Colon Hexadecimal Notation
31.17 Three Basic IPv6 Address Types
31.18 The Duality Of Broadcast And Multicast
31.19 An Engineering Choice And Simulated Broadcast
31.20 Proposed IPv6 Address Space Assignment
31.21 Embedded IPv4 Addresses And Transition
31.22 Unspecified And Loopback Addresses
31.23 Unicast Address Structure
31.24 Interface Identifiers
31.25 Local Addresses
31.26 Autoconfiguration And Renumbering

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha