Skip to:Content
|
Bottom
Cover image for Advanced Internet protocols, services, and applications
Title:
Advanced Internet protocols, services, and applications
Publication Information:
Hoboken, New Jersey : A John Wiley & Sons Publication, 2012
Physical Description:
xix, 240 pages ; 24 cm.
ISBN:
9780470499030
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010324800 TK5105.55 A38 2012 Open Access Book Book
Searching...

On Order

Summary

Summary

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility.

This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.


Author Notes

Mallikarjun Tatipamula is currently with Cisco Systems. Prior to Cisco Systems, he was with the ground systems division at Motorola, where he was involved in gateway systems design for satellite based telecom networks. He has also been a member of several international conference committees.

050


Table of Contents

Prefacep. xi
Acknowledgmentsp. xv
About the Authorsp. xvii
1 Transmission Control Protocol/Internet Protocol Overviewp. 1
1.1 Fundamental Architecturep. 1
1.2 Internet Protocol Basicsp. 4
1.2.1 Packet Headerp. 5
1.2.2 Internet Protocol Addressp. 7
1.2.3 Internet Protocol Classificationp. 7
1.2.4 Subnet and its Maskingp. 9
1.2.5 Subnet Calculationp. 11
1.3 Routingp. 13
1.3.1 Routing across Providersp. 14
1.3.2 Routing within Edge Networksp. 15
1.3.3 Routing Scalabilityp. 16
Referencesp. 18
2 Transport-Layer Protocolsp. 19
2.1 Transmission Control Protocolp. 19
2.1.1 Transmission Control Protocol Header Structurep. 19
2.1.2 Three-Way Handshakep. 20
2.1.3 Transmission Control Protocol Flow Control and Congestion Controlp. 21
2.1.4 Port Numberp. 24
2.2 User Datagram Protocolp. 25
2.2.1 User Datagram Protocol Header Structurep. 25
2.3 Stream Control Transmission Protocolp. 26
2.3.1 Stream Control Transmission Protocol Packet Structurep. 26
2.3.2 Security: Prevention of SYN Attacksp. 27
2.4 Real-Time Transport Protocolp. 29
2.4.1 Real-Time Transport Protocol Header Structurep. 29
Referencesp. 30
3 Internet Architecturep. 31
3.1 Internet Exchange Pointp. 31
3.2 History of Internet Exchange Pointsp. 33
3.3 Internet Service Provider Interconnection Relationshipsp. 34
3.4 Peering and Transitp. 35 References
4 IP Routing Protocolsp. 39
4.1 Overview of Routing Protocolsp. 40
4.1.1 Interior Gateway Protocolp. 41
4.1.2 Exterior Gateway Protocolp. 42
4.2 Routing Information Protocolp. 43
4.2.1 Routing Information Protocol Header Formatp. 43
4.2.2 Update of Routing Table in Routing Information Protocolp. 44
4.2.3 Maintenance of Routing Table in Routing Information Protocolp. 46
4.2.4 Split Horizonp. 47
4.2.5 Limitations of Routing Information Protocolp. 47
4.3 Open Shortest Path Firstp. 48
4.3.1 Shortest-Path Algorithmp. 48
4.3.2 Hierarchical Routingp. 51
4.3.3 Open Shortest Path First Packet Formatp. 51
4.3.4 Comparison of Routing Information Protocol and Open Shortest Path Firstp. 52
4.4 Border Gateway Protocolp. 53
4.4.1 Border Gateway Protocol Message Flowsp. 53
4.4.2 Border Gateway Protocol Policy Selection Attributesp. 54
Referencesp. 57
5 Multiprotocol Label Switchingp. 59
5.1 Overviewp. 59
5.2 Functions and Mechanismsp. 63
5.3 Applicabilitiesp. 67
Referencesp. 72
6 IP Quality Of Servicep. 75
6.1 Introductionp. 75
6.2 Quality of Service in IP Version 4/75
6.3 Integrated Servicesp. 77
6.3.1 Packet Schedulerp. 77
6.3.2 Packet Classifierp. 77
6.3.3 Admission Controlp. 78
6.3.4 Resource Reservation Protocol (RSVP)p. 79
6.4 Differentiated Servicesp. 81
6.5 Quality Of Service with Nested Differentiated Services Levelsp. 82
6.5.1 Drawbacks of Explicit Endpoint Admission Control with Path Selectionp. 84
6.5.2 OSPF-Based Adaptive and Flexible Quality of Service Provisioningp. 85
6.5.3 Combination of Security and Quality of Servicep. 86
6.5.4 Path Selection Algorithm Analysisp. 87
Referencesp. 90
7 IP Multicast and Anycastp. 93
7.1 Addressingp. 93
7.1.1 Multicast Addressingp. 93
7.1.2 Differences between Multicasting and Multiple Unicastingp. 95
7.2 Multicast Routingp. 96
7.2.1 Optimal Routing: Shortest-Path Treesp. 96
7.2.2 Unicast Routingp. 96
7.2.3 Multicast Routingp. 96
7.3 Routing Protocolsp. 97
7.3.1 Multicast Open Shortest Path First (MOSPF)p. 98
7.3.2 Distance Vector Multicast Routing Protocolp. 99
7.3.3 Core-Based Tree (CBT) Protocolp. 100
7.3.4 Protocol-Independent Multicastp. 101
7.3.5 Simple Multicast Routing Protocolp. 101
7.4 Anycastingp. 102
7.4.1 Architectural Issuesp. 103
7.4.2 Anycast Addressesp. 103
7.4.3 Differences between the Services Offered by IP Multicasting and IP Anycastingp. 104
7.5 IPv6 Anycast Routing Protocol: Protocol-Independent Anycast-Sparse Modep. 105
Referencesp. 106
8 Layer-2 Transport over Packetp. 109
8.1 Draft-Martini Signaling and Encapsulationp. 109
8.1.1 Functionalityp. 110
8.1.2 Encapsulationp. 110
8.1.3 Protocol-Specific Encapsulationp. 111
8.2 Layer-2 Tunneling Protocolp. 114
8.2.1 Layer-2 Tunneling Protocol Version 3p. 115
8.2.2 Pseudowire Emulation Edge to Edgep. 118
Referencesp. 121
9 Virtual Private Wired Servicep. 123
9.1 Types of Private Wire Servicesp. 123
9.1.1 Layer-2 Virtual Private Services: Wide Area Networks and Local Area Networksp. 124
9.1.2 Virtual Private Wire Servicep. 126
9.1.3 Virtual Private Multicast Servicep. 127
9.1.4 IP-Only Layer-2 Virtual Private Networkp. 128
9.1.5 Internet Protocol Securityp. 129
9.2 Generic Routing Encapsulationp. 130
9.3 Layer-2 Tunneling Protocolp. 131
9.4 Layer-3 Virtual Private Network 2547bis, Virtual Routerp. 131
9.4.1 Virtual Router Redundancy Protocolp. 133
Referencesp. 136
10 IP and Optical Networkingp. 137
10.1 IP/Optical Network Evolutionp. 138
10.1.1 Where Networking Is Todayp. 138
10.1.2 Where Networking Is Goingp. 139
10.2 Challenges in Legacy Traditional IP/Optical Networksp. 140
10.2.1 Proprietary Network Management Systemsp. 140
10.2.2 Complexity of Provisioning in Legacy IP/Optical Networksp. 141
10.3 Automated Provisioning in IP/Optical Networksp. 142
10.4 Control Plane Models for IP/Optical Networkingp. 144
10.4.1 Optical Internetworking Forum's Optical User Network Interface: Overlay Modelp. 145
10.4.2 Internet Engineering Task Force's Generalized Multiprotocol Label Switching: Peer Modelp. 145
10.5 Next-Generation MultiLayer Network Design Requirementsp. 147
10.6 Benefits and Challenges in IP/Optical Networkingp. 148
Referencesp. 149
11 IP Version 6p. 151
11.1 Addresses in EP Version 6p. 152
11.1.1 Unicast IP Addressesp. 152
11.1.2 Multicast IP Addressesp. 153
11.2 IP Packet Headersp. 154
11.3 IP Address Resolutionp. 155
11.4 IP Version 6 Deployment: Drivers and Impedimentsp. 156
11.4.1 Need for Backwards Compatibilityp. 157
11.4.2 Initial Deployment Driversp. 158
11.4.3 Reaching a Critical Massp. 160
Referencesp. 161
12 IP Traffic Engineeringp. 163
12.1 Models of Traffic Demandsp. 163
12.2 Optimal Routing with Multiprotocol Label Switchingp. 165
12.2.1 Overviewp. 165
12.2.2 Applicability of Optimal Routingp. 165
12.2.3 Network Modelp. 166
12.2.4 Optimal Routing Formulations with Three Modelsp. 166
12.3 Link-Weight Optimization with Open Shortest Path Firstp. 169
12.3.1 Overviewp. 169
12.3.2 Examples of Routing Control with Link Weightsp. 170
12.3.3 Link-Weight Setting Against Network Failurep. 172
12.4 Extended Shortest-Path-Based Routing Schemesp. 173
12.4.1 Smart-Open Shortest Path Firstp. 174
12.4.2 Two-Phase Routingp. 174
12.4.3 Fine Two-Phase Routingp. 176
12.4.4 Features of Routing Schemesp. 177
Referencesp. 177
13 IP Network Securityp. 181
13.1 Introductionp. 181
13.2 Detection of Denial-of-Service Attackp. 182
13.2.1 Backscatter Analysisp. 182
13.2.2 Multilevel Tree or Online Packet Statisticsp. 184
13.3 IP Tracebackp. 187
13.3.1 IP Traceback Solutionsp. 189
13.4 Edge Sampling Schemep. 189
13.5 Advanced Marking Schemep. 193
Referencesp. 196
14 Mobility Support for IPp. 197
14.1 Mobility Management Approachesp. 199
14.1.1 Host Routesp. 200
14.1.2 Tunnelingp. 201
14.1.3 Route Optimizationp. 203
14.2 Security Threats Related to IP Mobilityp. 205
14.2.1 Impersonationp. 205
14.2.2 Redirection-Based Hoodingp. 208
14.2.3 Possible Solutionsp. 210
14.3 Mobility Support in IPv6p. 213
14.4 Reactive Versus Proactive Mobility Supportp. 218
14.5 Relation to Multihomingp. 219
14.6 Protocols Supplementing Mobilityp. 220
14.6.1 Router and Subnet Prefix Discoveryp. 220
14.6.2 Movement Detectionp. 221
14.6.3 IP Address Configurationp. 222
14.6.4 Neighbor Unreachability Detectionp. 223
14.6.5 Internet Control Message Protocol for IP Version 6p. 224
14.6.6 Optimizationsp. 224
14.6.7 Media-Independent Handover Servicesp. 227
Referencesp. 231
Indexp. 235
Go to:Top of Page