|
Computer Networks and the Internet |
|
|
1 | (71) |
|
|
1 | (5) |
|
A Nuts and Bolts Description |
|
|
1 | (3) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (3) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (4) |
|
End Systems, Clients, and Servers |
|
|
9 | (2) |
|
Connectionless and Connection-Oriented Services |
|
|
11 | (2) |
|
|
13 | (16) |
|
Circuit Switching, Packet Switching, and Message Switching |
|
|
13 | (11) |
|
|
24 | (5) |
|
Access Networks and Physical Media |
|
|
29 | (9) |
|
|
29 | (5) |
|
|
34 | (4) |
|
Delay and Loss in Packet-Switched Networks |
|
|
38 | (6) |
|
|
38 | (6) |
|
Protocol Layers and Their Service Models |
|
|
44 | (9) |
|
|
45 | (4) |
|
The Internet Protocol Stack |
|
|
49 | (4) |
|
Network Entities and Layers |
|
|
53 | (1) |
|
Internet Backbones, NAPs, and ISPs |
|
|
53 | (3) |
|
A Brief History of Computer Networking and the Internet |
|
|
56 | (6) |
|
Development and Demonstration of Early Packet Switching Principles: 1961--1972 |
|
|
56 | (1) |
|
Internetworking, and New and Proprietary Networks: 1972--1980 |
|
|
57 | (3) |
|
A Proliferation of Networks: 1980--1990 |
|
|
60 | (1) |
|
Commercialization and the Web: The 1990s |
|
|
61 | (1) |
|
|
62 | (10) |
|
Homework Problems and Questions |
|
|
64 | (2) |
|
|
66 | (2) |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
|
|
|
|
72 | (95) |
|
Principles of Application Layer Protocols |
|
|
72 | (12) |
|
Application-Layer Protocols |
|
|
73 | (5) |
|
What Services Does an Application Need? |
|
|
78 | (2) |
|
Services Provided by the Internet Transport Protocols |
|
|
80 | (3) |
|
Network Applications Covered in this Book |
|
|
83 | (1) |
|
|
84 | (20) |
|
|
85 | (2) |
|
Nonpersistent and Persistent Connections |
|
|
87 | (3) |
|
|
90 | (4) |
|
User-Server Interaction: Authentication and Cookies |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (7) |
|
|
104 | (2) |
|
|
105 | (1) |
|
Electronic Mail in the Internet |
|
|
106 | (18) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Mail Message Formats and MIME |
|
|
112 | (6) |
|
|
118 | (5) |
|
|
123 | (1) |
|
DNS---The Internet's Directory Service |
|
|
124 | (12) |
|
|
124 | (3) |
|
Overview of How DNS Works |
|
|
127 | (5) |
|
|
132 | (2) |
|
|
134 | (2) |
|
Socket Programming with TCP |
|
|
136 | (10) |
|
Socket Programming with TCP |
|
|
137 | (2) |
|
An Example Client/Server Application in Java |
|
|
139 | (7) |
|
Socket Programming with UDP |
|
|
146 | (8) |
|
Building a Simple Web Server |
|
|
154 | (4) |
|
|
154 | (4) |
|
|
158 | (9) |
|
Homework Problems and Questions |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
165 | (2) |
|
|
|
|
|
|
167 | (104) |
|
Transport-Layer Services and Principles |
|
|
167 | (5) |
|
Relationship between Transport and Network Layers |
|
|
169 | (2) |
|
Overview of the Transport Layer in the Internet |
|
|
171 | (1) |
|
Multiplexing and Demultiplexing Applications |
|
|
172 | (5) |
|
Connectionless Transport: UDP |
|
|
177 | (5) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Principles of Reliable Data Transfer |
|
|
182 | (25) |
|
Building a Reliable Data Transfer Protocol |
|
|
184 | (9) |
|
Pipelined Reliable Data Transfer Protocols |
|
|
193 | (3) |
|
|
196 | (5) |
|
|
201 | (6) |
|
Connection-Oriented Transport: TCP |
|
|
207 | (24) |
|
|
207 | (3) |
|
|
210 | (1) |
|
Sequence Numbers and Acknowledgment Numbers |
|
|
211 | (2) |
|
Telnet: A Case Study for Sequence and Acknowledgment Numbers |
|
|
213 | (2) |
|
|
215 | (6) |
|
|
221 | (3) |
|
Round Trip Time and Timeout |
|
|
224 | (2) |
|
TCP Connection Management |
|
|
226 | (5) |
|
Principles of Congestion Control |
|
|
231 | (9) |
|
The Causes and the Costs of Congestion |
|
|
231 | (6) |
|
Approaches toward Congestion Control |
|
|
237 | (2) |
|
ATM ABR Congestion Control |
|
|
239 | (1) |
|
|
240 | (18) |
|
Overview of TCP Congestion Control |
|
|
241 | (8) |
|
Modeling Latency: Static Congestion Window |
|
|
249 | (4) |
|
Modeling Latency: Dynamic Congestion Window |
|
|
253 | (5) |
|
|
258 | (13) |
|
Homework Problems and Questions |
|
|
260 | (1) |
|
|
261 | (7) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (2) |
|
|
|
|
|
Network Layer and Routing |
|
|
271 | (108) |
|
Introduction and Network Service Models |
|
|
271 | (9) |
|
|
273 | (6) |
|
Origins of Datagram and Virtual Circuit Service |
|
|
279 | (1) |
|
|
280 | (17) |
|
A Link State Routing Algorithm |
|
|
282 | (4) |
|
A Distance Vector Routing Algorithm |
|
|
286 | (9) |
|
|
295 | (2) |
|
|
297 | (3) |
|
|
300 | (21) |
|
|
302 | (8) |
|
Transporting a Datagram from Source to Destination: Addressing and Routing |
|
|
310 | (4) |
|
|
314 | (3) |
|
IP Fragmentation and Reassembly |
|
|
317 | (2) |
|
ICMP: Internet Control Message Protocol |
|
|
319 | (2) |
|
|
321 | (11) |
|
Intra-Autonomous System Routing in the Internet |
|
|
322 | (7) |
|
Inter-Autonomous System Routing |
|
|
329 | (3) |
|
|
332 | (9) |
|
|
333 | (3) |
|
|
336 | (2) |
|
|
338 | (1) |
|
Where Does Queuing Occur? |
|
|
338 | (3) |
|
|
341 | (7) |
|
|
342 | (3) |
|
Transitioning from IPv4 to IPv6 |
|
|
345 | (3) |
|
|
348 | (19) |
|
Introduction: The Internet Multicast Abstraction and Multicast Groups |
|
|
348 | (2) |
|
|
350 | (5) |
|
Multicast Routing: The General Case |
|
|
355 | (7) |
|
Multicast Routing in the Internet |
|
|
362 | (5) |
|
|
367 | (12) |
|
Homework Problems and Questions |
|
|
368 | (2) |
|
|
370 | (4) |
|
|
374 | (1) |
|
|
375 | (2) |
|
|
377 | (2) |
|
Jose Joaquin Garcia-Luna-Aceves |
|
|
|
|
|
Link Layer and Local Area Networks |
|
|
379 | (104) |
|
The Data Link Layer: Introduction, Services |
|
|
379 | (6) |
|
The Services Provided by the Link Layer |
|
|
380 | (3) |
|
|
383 | (2) |
|
Error Detection and Correction Techniques |
|
|
385 | (6) |
|
|
386 | (3) |
|
|
389 | (1) |
|
Cyclic Redundancy Check (CRC) |
|
|
389 | (2) |
|
Multiple Access Protocols and LANs |
|
|
391 | (18) |
|
Channel Partitioning Protocols |
|
|
394 | (4) |
|
|
398 | (8) |
|
|
406 | (1) |
|
Local Area Networks (LANs) |
|
|
407 | (2) |
|
|
409 | (6) |
|
|
409 | (2) |
|
Address Resolution Protocol |
|
|
411 | (4) |
|
|
415 | (12) |
|
|
417 | (4) |
|
CSMA/CD: Ethernet's Multiple Access Protocol |
|
|
421 | (2) |
|
|
423 | (4) |
|
Hubs, Bridges, and Switches |
|
|
427 | (14) |
|
|
427 | (2) |
|
|
429 | (8) |
|
|
437 | (4) |
|
|
441 | (6) |
|
|
441 | (1) |
|
802.11 Media Access Protocols |
|
|
442 | (5) |
|
PPP: The Point-to-Point Protocol |
|
|
447 | (6) |
|
|
449 | (2) |
|
PPP Link Control Protocol (LCP) and Network Control Protocols |
|
|
451 | (2) |
|
Asynchronous Transfer Mode (ATM) |
|
|
453 | (12) |
|
Principle Characteristics of ATM |
|
|
454 | (2) |
|
|
456 | (2) |
|
|
458 | (1) |
|
|
459 | (2) |
|
|
461 | (3) |
|
|
464 | (1) |
|
|
465 | (6) |
|
|
466 | (1) |
|
|
467 | (4) |
|
|
471 | (12) |
|
Homework Problems and Questions |
|
|
472 | (2) |
|
|
474 | (6) |
|
|
480 | (1) |
|
|
481 | (2) |
|
|
|
|
|
|
483 | (82) |
|
Multimedia Networking Applications |
|
|
484 | (7) |
|
Examples of Multimedia Applications |
|
|
484 | (3) |
|
Hurdles for Multimedia in Today's Internet |
|
|
487 | (1) |
|
How Should the Internet Evolve to Better Support Multimedia? |
|
|
488 | (1) |
|
Audio and Video Compression |
|
|
489 | (2) |
|
Streaming Stored Audio and Video |
|
|
491 | (10) |
|
Accessing Audio and Video from a Web Server |
|
|
493 | (2) |
|
Sending Multimedia from a Streaming Server to a Helper Application |
|
|
495 | (2) |
|
Real Time Streaming Protocol (RTSP) |
|
|
497 | (4) |
|
Making the Best of the Best-Effort Service: An Internet Phone Example |
|
|
501 | (9) |
|
The Limitations of a Best-Effort Service |
|
|
501 | (2) |
|
Removing Jitter at the Receiver for Audio |
|
|
503 | (3) |
|
Recovering from Packet Loss |
|
|
506 | (4) |
|
Streaming Stored Audio and Video |
|
|
510 | (1) |
|
|
510 | (12) |
|
|
510 | (3) |
|
|
513 | (1) |
|
RTP Control Protocol (RTCP) |
|
|
514 | (3) |
|
|
517 | (5) |
|
|
522 | (6) |
|
A 1 Mbps Audio Application and an FTP Transfer |
|
|
523 | (1) |
|
A 1 Mbps Audio Application and a High Priority FTP Transfer |
|
|
524 | (1) |
|
A Misbehaving Audio Application and an FTP Transfer |
|
|
525 | (1) |
|
Two 1 Mbps Audio Applications Over an Overloaded 1.5 Mbps Link |
|
|
526 | (2) |
|
Scheduling and Policing Mechanisms |
|
|
528 | (8) |
|
|
528 | (5) |
|
Policing: The Leaky Bucket |
|
|
533 | (3) |
|
|
536 | (3) |
|
Guaranteed Quality of Service |
|
|
538 | (1) |
|
Controlled-Load Network Service |
|
|
539 | (1) |
|
|
539 | (10) |
|
|
540 | (2) |
|
|
542 | (2) |
|
|
544 | (1) |
|
|
544 | (4) |
|
Transport of Reservation Messages |
|
|
548 | (1) |
|
|
549 | (7) |
|
Differentiated Services: A Simple Scenario |
|
|
550 | (2) |
|
Traffic Classification and Conditioning |
|
|
552 | (2) |
|
|
554 | (2) |
|
|
556 | (1) |
|
|
556 | (9) |
|
Homework Problems and Questions |
|
|
558 | (1) |
|
|
559 | (2) |
|
|
561 | (2) |
|
|
563 | (2) |
|
|
|
|
|
Security in Computer Networks |
|
|
565 | (61) |
|
What is Network Security? |
|
|
565 | (4) |
|
|
565 | (2) |
|
Network Security Considerations in the Internet |
|
|
567 | (2) |
|
Principles of Cryptography |
|
|
569 | (12) |
|
Symmetric Key Cryptography |
|
|
571 | (4) |
|
|
575 | (6) |
|
Authentication: Who are You? |
|
|
581 | (7) |
|
Authentication Protocol ap1.0 |
|
|
581 | (1) |
|
Authentication Protocol ap2.0 |
|
|
582 | (1) |
|
Authentication Protocol ap3.0 |
|
|
583 | (1) |
|
Authentication Protocol ap3.1 |
|
|
583 | (1) |
|
Authentication Protocol ap4.0 |
|
|
584 | (2) |
|
Authentication Protocol ap5.0 |
|
|
586 | (2) |
|
|
588 | (7) |
|
Generating Digital Signatures |
|
|
589 | (1) |
|
|
590 | (3) |
|
|
593 | (2) |
|
Key Distribution and Certification |
|
|
595 | (7) |
|
The Key Distribution Center |
|
|
595 | (3) |
|
|
598 | (4) |
|
|
602 | (6) |
|
Principles of Secure E-Mail |
|
|
603 | (2) |
|
|
605 | (3) |
|
|
608 | (8) |
|
Internet Commerce Using SSL |
|
|
609 | (4) |
|
Internet Commerce Using SET |
|
|
613 | (3) |
|
Network Layer Security: IPsec |
|
|
616 | (4) |
|
Authentication Header (AH) Protocol |
|
|
617 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (6) |
|
Homework Problems and Questions |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
624 | (2) |
|
|
|
|
|
|
626 | (37) |
|
What Is Network Management? |
|
|
626 | (5) |
|
The Infrastructure for Network Management |
|
|
631 | (3) |
|
The Internet Network-Management Framework |
|
|
634 | (14) |
|
Structure of Management Information: SMI |
|
|
635 | (3) |
|
Management Information Base: MIB |
|
|
638 | (3) |
|
SNMP Protocol Operations and Transport Mappings |
|
|
641 | (3) |
|
Security and Administration |
|
|
644 | (4) |
|
|
648 | (5) |
|
|
653 | (4) |
|
|
654 | (1) |
|
|
655 | (2) |
|
|
657 | (6) |
|
Homework Problems and Questions |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (3) |
|
|
|
|
References |
|
663 | (26) |
Index |
|
689 | |