Skip to:Content
|
Bottom
Cover image for Internet architecture : an introduction to IP protocols
Title:
Internet architecture : an introduction to IP protocols
Personal Author:
Publication Information:
Upper Saddle River, NJ : Prentice Hall PTR, 2000
ISBN:
9780130199065

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010050833 TK5105.585 B534 2000 Open Access Book Book
Searching...
Searching...
30000010061247 TK5105.585 B534 2000 Open Access Book Book
Searching...

On Order

Summary

Summary

Internet Architecture: A Guide to IP Protocols is an expert application-oriented introduction to every Internet protocol networking professionals need to know about. Respected communications consultant Uyless Black begins with a detailed overview of how the Internet works, and how it has evolved, reviewing key elements such as backbones, metropolitan area exchanges, and private peering points. Black presents an architectural model that shows how TCP/IP and related protocols fit together; then introduces each protocol, in detail. Coverage includes: LANs and link protocols; addresses, names, DNS, ARP, and DHCP; IP and ICMP; TCP and UDP; PPP, L2TP, and more. Black also presents extensive coverage of VPNs and security, including IPSec; as well as network management via SNMP, RMON and MIBs. Finally, the book previews the emerging multiservice Internet, which will incorporate advanced protocols such as Voice over IP (VoIP), as well as QoS initiatives like Multiprotocol Label Switching and DiffServ.


Author Notes

UYLESS BLACK is a widely known and respected consultant and lecturer on computer networks and data communications. He is author of all the books in his Prentice Hall Series in Advanced Communications Technologies, including Voice Over IP, IP Routing Protocols, ATM: Foundations for Broadband Networks, and Emerging Communications Technologies . He resides in Front Royal, VA.


Table of Contents

Prefacep. xvii
Chapter 1 Introductionp. 1
Introductionp. 1
Terms and Conceptsp. 1
How the Internet is Managedp. 3
Request for Comments (RFCs)p. 4
A Bit of Historyp. 5
The Gatewayp. 6
Accounting for Trafficp. 6
The Internet Todayp. 8
Global Diffusion of the Internetp. 10
Choosing an Internet Service Providerp. 10
The TCP/IP Modelp. 12
The Physical Layerp. 12
Device Driversp. 13
The Data Link Layerp. 13
IP and ICMPp. 13
Route Discoveryp. 14
Address Resolutionp. 14
The Transport Layerp. 15
Application Layerp. 15
How the Layered Model Operatesp. 16
Peer Layer Communicationsp. 17
Example of an Invocationp. 17
Naming and Addressingp. 18
Link (Physical) Addressesp. 20
IEEE LAN Addressesp. 20
Network Layer Addresses (IP Addresses)p. 22
The IP Address Formatp. 24
Special Rules for Addressesp. 26
IP Address Spacep. 26
Example of the IP Address Assignmentp. 26
Examples of Internet Protocolsp. 28
Router Operations Revisitedp. 31
Relationship of Addressesp. 39
Other Identifiersp. 40
Address Resolution (Mapping)p. 42
The Address Resolution Protocolsp. 43
ARPp. 44
Proxy ARPp. 46
Reverse ARPp. 47
Bootstrap Protocol (BOOTP)p. 48
DHCPp. 49
Introduction to Subnets and Subnet Addressingp. 50
Introduction to the Domain Name System (DNS)p. 52
DNS Serversp. 54
Examples of DNS Namesp. 54
How the Servers Interworkp. 56
Number of Hosts Advertised in the DNSp. 57
The DNS Configurationp. 57
Summaryp. 62
Chapter 2 Error Recovery Operationsp. 63
Introductionp. 63
Data Transfer Across Linksp. 63
Where the Link Protocol Operatesp. 65
The Basic Operationsp. 66
Relationship of the Link Layer to the OSI Modelp. 67
Link Layer Primitives (Service Definitions)p. 68
The Link Timersp. 70
State Variables and Sequence Numbersp. 72
Transmit and Receive Windowsp. 73
Example of Sliding Window Operationsp. 74
The High Level Data Link Control (HDLC)p. 79
The HDLC Framep. 79
The FCS Checkp. 83
Error-Checking Examplep. 84
Options on Retransmissionsp. 85
Example of Link Error Recoveryp. 87
End-to-End Error Recovery by TCPp. 88
Summaryp. 90
Chapter 3 Internet Local Area Networks (LANs)p. 91
Introductionp. 91
What is a LAN?p. 91
Notations to Describe LANsp. 92
Topologiesp. 92
IEEE Standardsp. 93
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) LANsp. 95
CSMA/CD Protocol Stacksp. 96
Ethernetp. 97
CSMA/CD Framesp. 98
Subnetwork Access Protocol (SNAP)p. 99
CSMA/CD in Actionp. 100
Ethernet Layersp. 101
The Various CSMA/CD Standardsp. 102
The Token Ring Networkp. 103
The Ring Configurationp. 103
FDDIp. 105
FDDI Configurationp. 106
The FDDI Layersp. 108
Example of FDDI Operationsp. 109
FDDI Backbonesp. 112
Switched LANsp. 113
Fast Ethernetp. 114
Comparing Ethernet and Fast Ethernetp. 116
Fast Ethernet and the Layered Modelp. 117
Auto-Negotiationp. 123
Gigabit Ethernetp. 124
Summaryp. 125
Chapter 4 Internet Wide Area Networks (WANs)
Introductionp. 127
Typical Functions of a WAN Network Layerp. 127
WAN Interfacesp. 128
Placement of Functionsp. 129
Connection-Oriented and Connectionless Networksp. 130
Examples of Connection-Oriented and Connectionless Protocolsp. 132
Relaying Data through the WANp. 133
Circuit Switchingp. 134
Message Switchingp. 134
Packet Switchingp. 135
Frame Relayp. 136
Cell Relayp. 137
Comparing WAN Technologiesp. 138
X.25, Frame Relay, and ATM Virtual Circuitsp. 140
Mapping IP Addresses to "Labels": Label or Tag Switchingp. 141
Summaryp. 142
Chapter 5 IP and ICMPp. 143
Introductionp. 143
Attributes of IPp. 143
Processing the Datagramp. 144
Example of a Routing Tablep. 145
Adding and Removing Entries in the Routing Tablep. 147
Secondary Addresses in the Tablep. 147
The IP Headerp. 148
The Type of Service (TOS) Fieldp. 149
The Fragmentation Fieldsp. 150
The Time-to-Live Fieldp. 151
The Protocol ID Fieldp. 152
The Header Checksump. 152
The IP Addressesp. 153
More Information on the Options Fieldp. 153
Subnettingp. 156
Address Aggregationp. 157
CIDRp. 159
Variable Length Submasks (VLSMs)p. 160
Address Processing Overheadp. 161
Fragmentation Examplesp. 165
ICMPp. 169
Time-to-Livep. 170
Destination Unreachablep. 170
Redirectp. 171
Router Discoveryp. 172
Pingsp. 173
IPv6p. 173
Design Intent for IPv6p. 173
Hierarchical Addressp. 175
Format of IPv6 Datagramp. 177
Extension Headersp. 178
ICMP and IPv6p. 179
Transition to IPv6p. 180
Summaryp. 183
Appendix to Chapter 5p. 183
IPv6-Related RFCsp. 183
Chapter 6 TCP and UDPp. 188
Introductionp. 188
Protocol Placement of TCP and UDPp. 188
TCP: End-to-End Communicationsp. 189
Internet Traffic Characteristicsp. 191
Arrival of Trafficp. 191
Bulk and Interactive Trafficp. 192
Internet Portsp. 194
Internet Portsp. 195
Examples of Port Operationsp. 196
Socketsp. 198
TCP and Interactive Trafficp. 199
TCP and Bulk Trafficp. 200
The TCP Header (Segment)p. 201
The TCP Openp. 205
TCP Data Transfer Operationsp. 206
TCP Closep. 207
Another Look at Bulk and Interactive Trafficp. 208
TCP Traffic Management Examplesp. 208
TCP Timerp. 214
Round Trip Time (RTT)p. 215
Nagle's Algorithm ReExaminedp. 215
The Slow Startp. 217
Congestion Window and Threshold Sizep. 218
The User Datagram Protocol (UDP)p. 219
The UDP Headerp. 220
Interfaces to TCP and UDPp. 221
Example of Socket Callsp. 221
Summaryp. 223
Chapter 7 The Point-to-Point Protocol (PPP) and The Layer 2 Tunneling Protocol (L2TP)p. 224
Introductionp. 224
Why PPP Was Implementedp. 224
PPP and Associated Protocolsp. 225
Major Functions of LCPp. 226
HDLC Formatsp. 227
Key Termsp. 228
PPP Frame Formatp. 230
Auto-Detect Operationsp. 230
The PPP Phasesp. 231
Link Dead (Physical Layer Not Ready)p. 232
Link Establishment Phasep. 232
Authentication Phasep. 232
Network Layer Protocol Phasep. 232
Link Termination Phasep. 233
The PPP Protocol Data Unitp. 234
The LCP Packetsp. 235
LCP Optionsp. 236
IPCP for IP Supportp. 236
PPP Authenticationp. 238
PAPp. 238
CHAPp. 239
IPv6CPp. 239
L2TPp. 241
L2TP Terms and Conceptsp. 242
L2TP Configurationp. 242
L2TP Tunnelsp. 243
L2TP Protocol Stackp. 243
Examples of L2TP Operationsp. 245
Other Information on PPP and L2TPp. 247
Summaryp. 247
Chapter 8 Routing Protocolsp. 248
Introductionp. 248
The Routing Domainp. 248
Multiple Routing Domainsp. 250
Routing and Forwardingp. 250
Example of a Routing Tablep. 251
Protocol Stacksp. 252
A Confusing Term: Gatewayp. 253
Types of Routing Protocolsp. 254
Distance Vectorp. 254
Link State Metricp. 254
Design Goalsp. 255
Static, Stub, and Default Routesp. 256
Distance Vector Protocolsp. 257
Link State Metric Protocolsp. 258
Shortest Path First Operationsp. 260
Autonomous Systems (ASs)p. 265
AS Number Assignmentsp. 266
EGPs and IGPsp. 266
Multiple Routing Protocolsp. 268
Summary of Routing Protocolsp. 268
How the Internet Operates with the Routing Protocolsp. 269
Levels of Accessp. 270
Peering Through the Routing Protocolsp. 271
Summaryp. 274
Chapter 9 Internet Securityp. 275
Introductionp. 275
The Security Problemp. 275
Security Definitionsp. 276
IPSecp. 277
Types of SAs: Transport Mode and Tunnel Modep. 279
IPSec Casesp. 281
Placement of IPSecp. 283
Types of Internet Security Servicesp. 283
Types of Security Problemsp. 285
Virusp. 285
Wormp. 285
Trojan Horsep. 286
Bombp. 286
Trap Doorp. 287
Salami Attackp. 287
Firewallsp. 288
Firewall Implementationsp. 288
NCSA Guidancep. 291
Managed Firewall Services (MFWS)p. 292
IPSec and Firewallsp. 294
Security Mechanismsp. 295
Hash Operationsp. 295
Public Keysp. 297
Session Keyp. 300
Key Certificationp. 300
RADIUSp. 304
Problems with RADIUSp. 305
DIAMETERp. 306
Summaryp. 306
Chapter 10 Network Managementp. 307
Introductionp. 307
Importance of Standardsp. 307
Key Termsp. 308
Placement of Network Management Componentsp. 309
The Layered Internet Management Modelp. 309
Object Identifiers (OIDs)p. 310
OID Examplesp. 311
Examples of Network Management Operationsp. 312
GETp. 313
GET RESPONSEp. 313
SETp. 313
NOTIFY (the TRAP)p. 315
The MIBp. 316
The MIB-based Messagep. 316
MIB Registrationsp. 318
Example of SNMP Use of OIDsp. 319
SNMPv1 and SNMPv2p. 320
SNMPv1 and SNMPv2 Message Exchangesp. 321
SNMPv1 Table Accessp. 321
SNMPv2 Table Accessp. 323
MIB Object Groupsp. 324
Examples of SNMP Messagesp. 326
RMONp. 328
Summaryp. 330
Chapter 11 Voice over IP (VoIP)p. 331
Introductionp. 331
Internet Telephony and Packetized Voicep. 331
Why Internet Telephony?p. 331
The Business Casep. 332
Universal Presence of IPp. 335
Maturation of Technologiesp. 336
The Shift to Data Networksp. 336
Why Use IP for Telephony Traffic?p. 337
Barriers to Successful Deployment of IP Telephonyp. 337
VoIP in the Internet and in Private Internetsp. 338
The Question: Not If, But How?p. 338
Configuration Optionsp. 339
Problems with the Configurationsp. 342
Private VoIP Networksp. 342
The Next Stepp. 344
E-com and IP-based Call Centersp. 345
Configuration and Topology Choicesp. 348
Summaryp. 349
Appendix A Basics of the Layered Modelp. 350
Appendix B Basics of the Dynamic Host Configuration Protocol (DHCP)p. 360
Abbreviationsp. 366
Indexp. 369
Go to:Top of Page