Preface |
|
xix | |
Trademark |
|
xxv | |
|
|
1 | (28) |
|
|
2 | (3) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
5 | (1) |
|
1.2.2 Physical Structures |
|
|
5 | (3) |
|
|
8 | (5) |
|
|
8 | (1) |
|
1.3.2 Wide Area Network (WAN) |
|
|
8 | (2) |
|
|
10 | (2) |
|
1.3.4 Accessing the Internet |
|
|
12 | (1) |
|
|
13 | (4) |
|
|
13 | (3) |
|
1.4.2 Principles of Protocol Layering |
|
|
16 | (1) |
|
1.4.3 Logical Connections |
|
|
16 | (1) |
|
1.5 TCP/IP Protocol Suite |
|
|
17 | (4) |
|
1.5.1 Layered Architecture |
|
|
17 | (1) |
|
1.5.2 Brief Description of Layers |
|
|
18 | (2) |
|
1.5.3 Description of Each Layer |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
21 | (1) |
|
1.6.2 Lack of OSI Model's Success |
|
|
22 | (1) |
|
1.7 End-Of-Chapter Materials |
|
|
23 | (1) |
|
1.7.1 Recommended Reading |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (5) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (3) |
|
|
29 | (34) |
|
|
31 | (4) |
|
|
31 | (2) |
|
|
33 | (2) |
|
|
35 | (5) |
|
2.2.1 Attenuation and Amplification |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (2) |
|
|
38 | (2) |
|
|
40 | (2) |
|
2.3.1 Digital-to-Digital Conversion |
|
|
40 | (1) |
|
2.3.2 Analog-to-Digital Conversion |
|
|
41 | (1) |
|
|
42 | (5) |
|
2.4.1 Digital-to-Analog Conversion |
|
|
42 | (3) |
|
2.4.2 Analog-to-Analog Conversion |
|
|
45 | (2) |
|
|
47 | (2) |
|
2.5.1 Frequency-Division Multiplexing |
|
|
48 | (1) |
|
2.5.2 Time-Division Multiplexing |
|
|
48 | (1) |
|
|
49 | (6) |
|
|
50 | (3) |
|
2.6.2 Unguided Media: Wireless |
|
|
53 | (2) |
|
2.7 End-Of-Chapter Materials |
|
|
55 | (1) |
|
2.7.1 Recommended Reading |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (7) |
|
|
56 | (1) |
|
|
56 | (2) |
|
|
58 | (5) |
|
Chapter 3 Data-Link Layer |
|
|
63 | (52) |
|
|
64 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (22) |
|
|
66 | (4) |
|
|
70 | (10) |
|
|
80 | (8) |
|
3.3 Media Access Protocols |
|
|
88 | (16) |
|
|
88 | (13) |
|
|
101 | (3) |
|
3.4 Link-Layer Addressing |
|
|
104 | (3) |
|
3.4.1 Three Types of Addresses |
|
|
106 | (1) |
|
3.4.2 Address Resolution Protocol (ARP) |
|
|
107 | (1) |
|
3.5 End-Of-Chapter Materials |
|
|
107 | (1) |
|
3.5.1 Recommended Reading |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (7) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (5) |
|
Chapter 4 Local Area Networks: Lans |
|
|
115 | (34) |
|
|
116 | (10) |
|
4.1.1 Standard Ethernet (10 Mbps) |
|
|
117 | (4) |
|
4.1.2 Fast Ethernet (100 Mbps) |
|
|
121 | (2) |
|
4.1.3 Gigabit Ethernet (1000 Mbps) |
|
|
123 | (3) |
|
4.1.4 10 Gigabit Ethernet |
|
|
126 | (1) |
|
4.2 Wifi, IEEE802.11 Project |
|
|
126 | (12) |
|
|
127 | (1) |
|
|
128 | (5) |
|
4.2.3 Addressing Mechanism |
|
|
133 | (2) |
|
|
135 | (3) |
|
|
138 | (7) |
|
|
138 | (2) |
|
|
140 | (5) |
|
4.4 End-Of-Chapter Materials |
|
|
145 | (1) |
|
4.4.1 Recommended Reading |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (3) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (2) |
|
Chapter 5 Wide Area Networks: Wans |
|
|
149 | (38) |
|
|
150 | (9) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (3) |
|
5.1.4 Services Provided by Telephone Networks |
|
|
155 | (1) |
|
|
156 | (2) |
|
5.1.6 Digital Subscriber Line (DSL) |
|
|
158 | (1) |
|
|
159 | (3) |
|
5.2.1 Traditional Cable Networks |
|
|
160 | (1) |
|
5.2.2 Hybrid Fiber-Coaxial (HFC) Network |
|
|
160 | (1) |
|
5.2.3 Cable TV for Data Transfer |
|
|
161 | (1) |
|
|
162 | (13) |
|
|
163 | (2) |
|
5.3.2 First Generation (1G) |
|
|
165 | (1) |
|
5.3.3 Second Generation (2G) |
|
|
166 | (7) |
|
5.3.4 Third Generation (3G) |
|
|
173 | (1) |
|
5.3.5 Fourth Generation (4G) |
|
|
174 | (1) |
|
|
175 | (7) |
|
|
175 | (3) |
|
|
178 | (1) |
|
|
178 | (3) |
|
|
181 | (1) |
|
5.5 End-Of-Chapter Materials |
|
|
182 | (2) |
|
5.5.1 Recommended Reading |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (3) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (2) |
|
Chapter 6 Connecting Devices And Virtual Lans |
|
|
187 | (16) |
|
|
188 | (8) |
|
|
188 | (1) |
|
6.1.2 Link-Layer Switches |
|
|
189 | (6) |
|
|
195 | (1) |
|
|
196 | (4) |
|
|
198 | (1) |
|
|
198 | (1) |
|
6.2.3 Communication among Switches |
|
|
199 | (1) |
|
|
199 | (1) |
|
6.3 End-Of-Chapter Materials |
|
|
200 | (1) |
|
6.3.1 Recommended Reading |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
Chapter 7 Network Layer: Data Transfer |
|
|
203 | (82) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
7.2.1 Datagram Approach: Connectionless Service |
|
|
207 | (1) |
|
7.2.2 Virtual-Circuit Approach: Connection-Oriented Service |
|
|
207 | (1) |
|
|
207 | (3) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
7.4 Internet Protocol Version 4 |
|
|
210 | (46) |
|
|
210 | (9) |
|
7.4.2 Main and Auxiliary Protocols |
|
|
219 | (10) |
|
|
229 | (2) |
|
|
231 | (6) |
|
|
237 | (10) |
|
7.4.6 Forwarding of IP Packets |
|
|
247 | (9) |
|
7.5 Next Generation IP (IPV6) |
|
|
256 | (17) |
|
|
257 | (7) |
|
|
264 | (5) |
|
7.5.3 The ICMPv6 Protocol |
|
|
269 | (4) |
|
7.6 Transition From IPV4 TO IPV6 |
|
|
273 | (2) |
|
7.7 End-Of-Chapter Materials |
|
|
275 | (1) |
|
7.7.1 Recommended Reading |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (9) |
|
|
276 | (1) |
|
|
277 | (2) |
|
|
279 | (6) |
|
Chapter 8 Network Layer: Routing Of Packets |
|
|
285 | (56) |
|
|
286 | (2) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
288 | (13) |
|
8.2.1 Distance-Vector Routing |
|
|
288 | (6) |
|
|
294 | (3) |
|
8.2.3 Path-Vector Routing |
|
|
297 | (4) |
|
8.3 Unicast Routing Protocols |
|
|
301 | (21) |
|
|
301 | (2) |
|
8.3.2 Routing Information Protocol (RIP) |
|
|
303 | (5) |
|
8.3.3 Open Shortest Path First (OSPF) |
|
|
308 | (5) |
|
8.3.4 Border Gateway Protocol Version 4(BGP4) |
|
|
313 | (9) |
|
|
322 | (9) |
|
|
322 | (1) |
|
|
323 | (1) |
|
8.4.3 Distance Vector Multicast Routing Protocol |
|
|
324 | (3) |
|
8.4.4 Multicast Open Shortest Path First |
|
|
327 | (1) |
|
8.4.5 Protocol Independent Multicast (PIM) |
|
|
327 | (4) |
|
|
331 | (2) |
|
|
331 | (1) |
|
8.5.2 Propagation of Membership Information |
|
|
332 | (1) |
|
|
333 | (1) |
|
8.6 End-Of-Chapter Materials |
|
|
333 | (2) |
|
8.6.1 Recommended Reading |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (6) |
|
|
335 | (1) |
|
|
335 | (2) |
|
|
337 | (4) |
|
Chapter 9 Transport Layer |
|
|
341 | (96) |
|
9.1 Transport-Layer Services |
|
|
342 | (14) |
|
9.1.1 Process-to-Process Communication |
|
|
342 | (1) |
|
9.1.2 Addressing: Port Numbers |
|
|
343 | (2) |
|
9.1.3 Encapsulation and Decapsulation |
|
|
345 | (1) |
|
9.1.4 Multiplexing and Demultiplexing |
|
|
346 | (1) |
|
|
346 | (3) |
|
|
349 | (1) |
|
9.1.7 Combination of Flow and Error Control |
|
|
350 | (2) |
|
|
352 | (1) |
|
9.1.9 Connectionless and Connection-Oriented Protocols |
|
|
352 | (4) |
|
9.2 Transport-Layer Protocols |
|
|
356 | (2) |
|
|
356 | (1) |
|
|
357 | (1) |
|
9.3 User Datagram Protocol (UDP) |
|
|
358 | (5) |
|
|
359 | (3) |
|
|
362 | (1) |
|
9.4 Transmission Control Protocol |
|
|
363 | (49) |
|
|
364 | (3) |
|
|
367 | (1) |
|
|
368 | (3) |
|
|
371 | (7) |
|
9.4.5 State Transition Diagram |
|
|
378 | (2) |
|
|
380 | (3) |
|
|
383 | (6) |
|
|
389 | (9) |
|
9.4.9 TCP Congestion Control |
|
|
398 | (10) |
|
|
408 | (4) |
|
|
412 | (1) |
|
|
412 | (15) |
|
|
412 | (2) |
|
|
414 | (2) |
|
|
416 | (2) |
|
9.5.4 An SCTP Association |
|
|
418 | (3) |
|
|
421 | (2) |
|
|
423 | (4) |
|
9.6 End-Of-Chapter Materials |
|
|
427 | (2) |
|
9.6.1 Recommended Reading |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (8) |
|
|
429 | (1) |
|
|
429 | (3) |
|
|
432 | (5) |
|
Chapter 10 Application Layer |
|
|
437 | (106) |
|
|
438 | (5) |
|
10.1.1 Providing Services |
|
|
439 | (1) |
|
10.1.2 Application-Layer Paradigms |
|
|
440 | (3) |
|
10.2 Client/Server Paradigm |
|
|
443 | (5) |
|
10.2.1 Application Programming Interface |
|
|
443 | (4) |
|
10.2.2 Using Services of the Transport Layer |
|
|
447 | (1) |
|
10.3 Standard Applications |
|
|
448 | (50) |
|
10.3.1 World Wide Web and HTTP |
|
|
449 | (15) |
|
|
464 | (4) |
|
|
468 | (13) |
|
|
481 | (3) |
|
10.3.5 Secure Shell (SSH) |
|
|
484 | (2) |
|
10.3.6 Domain Name System (DNS) |
|
|
486 | (12) |
|
10.4 Peer-To-Peer Paradigm |
|
|
498 | (23) |
|
|
498 | (2) |
|
10.4.2 Distributed Hash Table (DHT) |
|
|
500 | (3) |
|
|
503 | (7) |
|
|
510 | (5) |
|
|
515 | (3) |
|
10.4.6 A Popular P2P Network: BitTorrent |
|
|
518 | (3) |
|
10.5 Socket Interface Programming |
|
|
521 | (14) |
|
10.5.1 Data Structure for Socket |
|
|
521 | (1) |
|
|
522 | (1) |
|
10.5.3 Iterative Communication Using UDP |
|
|
522 | (6) |
|
10.5.4 Communication Using TCP |
|
|
528 | (7) |
|
10.6 End-Of-Chapter Materials |
|
|
535 | (2) |
|
10.6.1 Recommended Reading |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (6) |
|
|
537 | (1) |
|
|
537 | (2) |
|
|
539 | (4) |
|
|
543 | (62) |
|
|
544 | (16) |
|
11.1.1 Lossless Compression |
|
|
544 | (10) |
|
|
554 | (6) |
|
|
560 | (8) |
|
|
560 | (1) |
|
|
560 | (4) |
|
|
564 | (2) |
|
|
566 | (2) |
|
11.3 Multimedia In The Internet |
|
|
568 | (9) |
|
11.3.1 Streaming Stored Audio/video |
|
|
568 | (3) |
|
11.3.2 Streaming Live Audio/video |
|
|
571 | (1) |
|
11.3.3 Real-Time Interactive Audio/video |
|
|
572 | (5) |
|
11.4 Real-Time Interactive Protocols |
|
|
577 | (20) |
|
11.4.1 Rationale for New Protocols |
|
|
578 | (3) |
|
|
581 | (2) |
|
|
583 | (4) |
|
11.4.4 Session Initialization Protocol (SIP) |
|
|
587 | (7) |
|
|
594 | (3) |
|
11.5 End-Of-Chapter Materials |
|
|
597 | (1) |
|
11.5.1 Recommended Reading |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
598 | (7) |
|
|
598 | (1) |
|
|
598 | (2) |
|
|
600 | (5) |
|
Chapter 12 Network Management |
|
|
605 | (32) |
|
|
606 | (4) |
|
12.1.1 Configuration Management |
|
|
606 | (2) |
|
|
608 | (1) |
|
12.1.3 Performance Management |
|
|
609 | (1) |
|
12.1.4 Security Management |
|
|
609 | (1) |
|
12.1.5 Accounting Management |
|
|
610 | (1) |
|
|
610 | (17) |
|
12.2.1 Managers and Agents |
|
|
611 | (1) |
|
12.2.2 Management Components |
|
|
611 | (2) |
|
|
613 | (1) |
|
|
614 | (4) |
|
|
618 | (4) |
|
|
622 | (5) |
|
|
627 | (5) |
|
|
628 | (1) |
|
|
629 | (3) |
|
|
632 | (1) |
|
12.4 End-Of-Chapter Materials |
|
|
632 | (1) |
|
12.4.1 Recommended Reading |
|
|
632 | (1) |
|
|
632 | (1) |
|
|
632 | (1) |
|
|
633 | (4) |
|
|
633 | (1) |
|
|
633 | (1) |
|
|
634 | (3) |
|
Chapter 13 Cryptography And Network Security |
|
|
637 | (76) |
|
|
638 | (3) |
|
|
638 | (1) |
|
|
639 | (2) |
|
13.1.3 Services and Techniques |
|
|
641 | (1) |
|
|
641 | (17) |
|
13.2.1 Symmetric-Key Ciphers |
|
|
641 | (12) |
|
13.2.2 Asymmetric-Key Ciphers |
|
|
653 | (5) |
|
13.3 Other Aspects Of Security |
|
|
658 | (16) |
|
|
658 | (1) |
|
13.3.2 Message Authentication |
|
|
659 | (1) |
|
|
660 | (6) |
|
13.3.4 Entity Authentication |
|
|
666 | (2) |
|
|
668 | (6) |
|
13.4 Network-Layer Security |
|
|
674 | (11) |
|
|
675 | (1) |
|
13.4.2 Two Security Protocols |
|
|
676 | (4) |
|
13.4.3 Services Provided by IPSec |
|
|
680 | (1) |
|
13.4.4 Security Association |
|
|
680 | (4) |
|
13.4.5 Internet Key Exchange (IKE) |
|
|
684 | (1) |
|
13.4.6 Virtual Private Network (VPN) |
|
|
684 | (1) |
|
13.5 Transport-Layer Security |
|
|
685 | (6) |
|
|
686 | (3) |
|
|
689 | (2) |
|
13.6 Application-Layer Security |
|
|
691 | (11) |
|
|
691 | (2) |
|
13.6.2 Pretty Good Privacy (PGP) |
|
|
693 | (5) |
|
|
698 | (4) |
|
|
702 | (3) |
|
13.7.1 Packet-Filter Firewall |
|
|
703 | (1) |
|
|
704 | (1) |
|
13.8 End-Of-Chapter Materials |
|
|
705 | (2) |
|
13.8.1 Recommended Reading |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
706 | (1) |
|
|
707 | (6) |
|
|
707 | (1) |
|
|
707 | (2) |
|
|
709 | (4) |
|
|
|
|
713 | (6) |
|
Appendix B Positional Numbering System |
|
|
719 | (8) |
|
Appendix C HTML, CSS, XML, andXSL |
|
|
727 | (10) |
|
Appendix D A Touch of Probability |
|
|
737 | (6) |
|
|
743 | (8) |
|
|
751 | (10) |
Glossary |
|
761 | (44) |
References |
|
805 | (6) |
Index |
|
811 | |