Muutke küpsiste eelistusi

TCP/IP Protocol Suite 4th edition [Pehme köide]

  • Formaat: Paperback / softback, 928 pages, kõrgus x laius x paksus: 239x191x41 mm, kaal: 1660 g, Illustrations (some col.)
  • Ilmumisaeg: 16-Apr-2009
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0070166781
  • ISBN-13: 9780070166783
Teised raamatud teemal:
  • Pehme köide
  • Hind: 100,74 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 928 pages, kõrgus x laius x paksus: 239x191x41 mm, kaal: 1660 g, Illustrations (some col.)
  • Ilmumisaeg: 16-Apr-2009
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0070166781
  • ISBN-13: 9780070166783
Teised raamatud teemal:
In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.

TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp as well as many examples which help tie the material to the real-world.

The fourth edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Additionally, out-of-date material has been overhauled to reflect recent changes in technology
Preface xxxi
Trademarks xxx
Part 1 Introduction and Underlying Technologies
1(92)
Introduction
2(16)
A Brief History
3(4)
Arpanet
3(1)
Birth of the Internet
3(1)
Transmission Control Protocol/Internetworking Protocol (TCP/IP)
4(1)
Milnet
4(1)
Csnet
4(1)
Nsfnet
4(1)
Ansnet
5(1)
The Internet Today
5(1)
World Wide Web
6(1)
Time Line
6(1)
Growth of the Internet
7(1)
Protocols and Standards
7(1)
Protocol
7(1)
Standards
8(1)
Standards Organizations
8(2)
Standards Creation Committees
8(2)
Forums
10(1)
Regulatory Agencies
10(1)
Internet Standards
10(3)
Maturity Levels
11(1)
Requirement Levels
12(1)
Internet Administration
13(1)
Internet Society (ISOC)
13(1)
Internet Architecture Board (IAB)
13(1)
Internet Engineering Task Force (IETF)
13(1)
Internet Research Task Force (IRTF)
14(1)
Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN)
14(1)
Network Information Center (NIC)
14(1)
Further Reading
14(1)
Books and Papers
15(1)
Websites
15(1)
Key Terms
15(1)
Summary
15(1)
Practice Set
16(2)
Exercises
16(1)
Research Activities
17(1)
The OSI Model and the TCP/IP Protocol Suit
18(28)
Protocol Layers
19(1)
Hierarchy
20(1)
Services
20(1)
The OSI Model
20(8)
Layered Architecture
21(1)
Layer-to-Layer Communication
22(1)
Encapsulation
23(1)
Layers in the OSI Model
24(4)
Summary of OSI Layers
28(1)
TCP/IP Protocol Suite
28(7)
Comparison between OSI and TCP/IP Protocol Suite
28(2)
Layers in the TCP/IP Protocol Suit
30(5)
Addressing
35(5)
Physical Addresses
35(2)
Logical Addresses
37(2)
Port Addresses
39(1)
Application-Specific Addresses
40(1)
Further Reading
40(1)
Books
40(1)
RFCs
40(1)
Key Terms
41(1)
Summary
41(1)
Practice Set
42(4)
Exercises
42(2)
Research Activities
44(2)
Underlying Technologies
46(47)
Wired Local Area Networks
47(12)
IEEE Standards
47(1)
Frame Format
48(1)
Addressing
49(2)
Ethernet Evolution
51(1)
Standard Ethernet
51(4)
Fast Ethernet
55(1)
Gigabit Ethernet
56(3)
Ten-Gigabit Ethernet
59(1)
Wireless Lans
59(11)
IEEE 802.11
59(2)
MAC Sublayer
61(3)
Addressing Mechanism
64(3)
Bluetooth
67(3)
Point-to-Point Wans
70(7)
56K Modems
70(1)
DSL Technology
71(1)
Cable Modem
72(3)
T Lines
75(1)
Sonet
75(1)
PPP
76(1)
Switched Wans
77(6)
X.25
77(1)
Frame Relay
78(1)
ATM
78(5)
Connecting Devices
83(5)
Repeaters
83(1)
Bridges
84(2)
Routers
86(2)
Further Reading
88(1)
Key Terms
88(1)
Summary
89(1)
Practice Set
89(4)
Exercises
89(1)
Research Activities
90(3)
Part 2 Network Layer
93(280)
Introduction to Network Layer
94(20)
Introduction
95(1)
Switching
96(1)
Circuit Switching
96(1)
Packet Switching
96(1)
Packet Switching at Network Layer
97(6)
Connectionless Service
97(2)
Connection-Oriented Service
99(4)
Network Layer Services
103(5)
An Example
103(1)
Logical Addressing
104(1)
Services Provided at the Source Computer
105(1)
Services Provided at Each Router
106(1)
Services Provided at the Destination Computer
107(1)
Other Network Layer Issues
108(3)
Error Control
108(1)
Flow Control
109(1)
Congestion Control
110(1)
Quality of Service
111(1)
Routing
111(1)
Security
111(1)
Further Reading
111(1)
Key Terms
112(1)
Summary
112(1)
Practice Set
112(2)
Exercises
112(2)
IPv4 Addresses
114(46)
Introduction
115(6)
Address Space
115(1)
Notation
115(2)
Range of Addresses
117(1)
Operations
118(3)
Classful Addressing
121(14)
Classes
121(2)
Classes and Blocks
123(3)
Two-Level Addressing
126(3)
An Example
129(2)
Three-Level Addressing: Subnetting
131(3)
Supernetting
134(1)
Classless Addressing
135(12)
Variable-Length Blocks
136(1)
Two-Level Addressing
136(5)
Block Allocation
141(1)
Subnetting
142(5)
Special Addresses
147(2)
Special Blocks
147(1)
Special Addresses in Each block
148(1)
NAT
149(3)
Address Translation
150(1)
Translation Table
150(2)
Further Reading
152(1)
Books
152(1)
RFCs
152(1)
Key Terms
153(1)
Summary
153(1)
Practice Set
154(6)
Exercise
154(6)
Delivery and Forwarding of IP Packets
160(26)
Delivery
161(1)
Direct Delivery
161(1)
Indirect Delivery
161(1)
Forwarding
162(16)
Forwarding Based on Destination Address
162(14)
Forwarding Based on Label
176(2)
Structure of a Router
178(3)
Components
178(3)
Further Reading
181(1)
Books
182(1)
RFCs
182(1)
Key Terms
182(1)
Summary
182(1)
Practice Set
183(3)
Exercises
183(1)
Research Activities
184(2)
Internet Protocol Version 4 (IPv4)
186(34)
Introduction
187(1)
Datagrams
187(5)
Fragmentation
192(5)
Maximum Transfer Unit (MTU)
192(1)
Fields Related to Fragmentation
193(4)
Options
197(8)
Format
197(1)
Option Types
198(7)
Checksum
205(2)
Checksum Calculation at the Sender
205(1)
Checksum Calculation at the Receiver
205(1)
Checksum in the IP Packet
206(1)
IP Over ATM
207(3)
ATM Wans
208(1)
Routing the Cells
208(2)
Security
210(1)
Security Issues
210(1)
IPSec
211(1)
IP Package
211(5)
Header-Adding Module
212(1)
Processing Module
213(1)
Queues
213(1)
Routing Table
214(1)
Forwarding Module
214(1)
MTU Table
214(1)
Fragmentation Module
214(1)
Reassembly Table
215(1)
Reassembly Module
215(1)
Further Reading
216(1)
Books
216(1)
RFCs
217(1)
Key Terms
217(1)
Summary
217(1)
Practice Set
218(2)
Exercises
218(1)
Research Activities
219(1)
Address Resolution Protocol (ARP)
220(24)
Address Mapping
221(1)
Static Mapping
221(1)
Dynamic Mapping
222(1)
The ARP Protocol
222(6)
Packet Format
223(1)
Encapsulation
224(1)
Operation
224(2)
Proxy ARP
226(2)
Atmarp
228(5)
Packet Format
228(1)
Atmarp Operation
229(3)
Logical IP Subnet (LIS)
232(1)
ARP Package
233(7)
Cache Table
233(2)
Queues
235(1)
Output Module
235(1)
Input Module
236(1)
Cache-Control Module
237(1)
More Examples
238(2)
Further Reading
240(1)
Books
240(1)
RFCs
240(1)
Key Terms
240(1)
Summary
241(1)
Practice Set
241(3)
Exercises
241(3)
Internet Control Message Protocol Version 4 (ICMPv4)
244(24)
Introduction
245(1)
Messages
246(11)
Message Format
246(1)
Error Reporting Messages
246(7)
Query Messages
253(3)
Checksum
256(1)
Debugging Tools
257(5)
Ping
257(2)
Traceroute
259(3)
ICMP Package
262(2)
Input Module
263(1)
Output Module
263(1)
Further Reading
264(1)
Books
264(1)
RFCs
264(1)
Key Terms
264(1)
Summary
265(1)
Practice Set
265(3)
Exercises
265(2)
Research Activities
267(1)
Mobile IP
268(14)
Addressing
269(1)
Stationary Hosts
269(1)
Mobile Hosts
269(1)
Agents
270(1)
Home Agent
271(1)
Foreign Agent
271(1)
Three Phases
271(6)
Agent Discovery
271(2)
Registration
273(2)
Data Transfer
275(2)
Inefficiency in Mobile IP
277(1)
Double Crossing
277(1)
Triangle Routing
277(1)
Solution
277(1)
Further Reading
278(1)
Books
278(1)
RFCs
278(1)
Key Terms
278(1)
Summary
279(1)
Practice Set
279(3)
Exercises
279(1)
Research Activities
280(2)
Unicast Routing Protocols (RIP, OSPF, and BGP)
282(52)
Introduction
283(1)
Cost or Metric
283(1)
Static versus Dynamic Routing Tables
283(1)
Routing Protocol
283(1)
Intra- and Inter-Domain Routing
284(1)
Distance Vector Routing
285(8)
Bellman-Ford Algorithm
285(2)
Distance Vector Routing Algorithm
287(4)
Count to Infinity
291(2)
RIP
293(6)
RIP Message Format
294(1)
Requests and Responses
295(1)
Timers in RIP
296(1)
RIP Version 2
297(2)
Encapsulation
299(1)
Link State Routing
299(5)
Building Routing Tables
300(4)
OSPF
304(16)
Areas
304(1)
Metric
305(1)
Types of Links
305(2)
Graphical Representation
307(1)
OSPF Packets
307(2)
Link State Update Packet
309(8)
Other Packets
317(3)
Encapsulation
320(1)
Path Vector Routing
320(3)
Reachability
321(1)
Routing Tables
322(1)
BGP
323(6)
Types of Autonomous Systems
323(1)
Path Attributes
324(1)
BGP Sessions
324(1)
External and Internal BGP
324(1)
Types of Packets
325(1)
Packet Format
325(4)
Encapsulation
329(1)
Further Reading
329(1)
Books
329(1)
RFCs
330(1)
Key Terms
330(1)
Summary
330(1)
Practice Set
331(3)
Exercises
331(2)
Research Activities
333(1)
Multicasting and Multicast Routing Protocols
334(39)
Introduction
335(3)
Unicasting
335(1)
Multicasting
336(2)
Broadcasting
338(1)
Multicast Addresses
338(5)
Multicast Addresses in IPv4
339(2)
Selecting Multicast Address
341(1)
Delivery of Multicast Packets at Data Link Layer
342(1)
IGMP
343(12)
Group Management
344(1)
IGMP Messages
344(3)
IGMP Protocol Applied to Host
347(4)
IGMP Protocol Applied to Router
351(1)
Role of IGMP in Forwarding
352(2)
Variables and Timers
354(1)
Encapsulation
355(1)
Compatibility with Older Versions
355(1)
Multicast Routing
355(3)
Optimal Routing: Shortest Path Trees
355(3)
Routing Protocols
358(9)
Multicast Link State Routing: MOSPF
358(2)
Multicast Distance Vector
360(4)
DVMRP
364(1)
CBT
364(2)
PIM
366(1)
Mbone
367(1)
Further Reading
368(1)
Books
368(1)
RFCs
368(1)
Key Terms
368(1)
Summary
369(1)
Practice Set
369(4)
Exercises
369(2)
Research Activities
371(2)
Part 3 Transport Layer
373(168)
Introduction to the Transport Layer
374(40)
Transport-Layer Services
375(14)
Process-to-Process Communication
375(1)
Addressing: Port Numbers
375(3)
Encapsulation and Decapsulation
378(1)
Multiplexing and Demultiplexing
379(1)
Flow Control
379(3)
Error Control
382(1)
Combination of Flow and Error Control
383(2)
Congestion Control
385(1)
Connectionless and Connection-Oriented Services
386(3)
Transport-Layer Protocols
389(20)
Simple Protocol
390(1)
Stop-and-Wait Protocol
391(4)
Go-Back-N Protocol
395(8)
Selective-Repeat Protocol
403(5)
Bidirectional Protocols: Piggybacking
408(1)
Further Reading
409(1)
Key Terms
409(1)
Summary
410(1)
Practice Set
411(3)
Exercises
411(2)
Research Activities
413(1)
User Datagram Protocol (UDP)
414(18)
Introduction
415(1)
User Datagram
416(1)
UDP Services
417(7)
Process-to-Process Communication
417(1)
Connectionless Services
418(1)
Flow Control
418(1)
Error Control
418(2)
Congestion Control
420(1)
Encapsulation and Decapsulation
420(1)
Queuing
421(2)
Multiplexing and Demultiplexing
423(1)
Comparison between UDP and Generic Simple Protocol
423(1)
UDP Applications
424(2)
UDP Features
424(2)
Typical Applications
426(1)
UDP Package
426(4)
Control-Block Table
426(1)
Input Queues
426(1)
Control-Block Module
426(2)
Input Module
428(1)
Output Module
428(1)
Examples
428(2)
Further Reading
430(1)
Books
430(1)
RFCs
430(1)
Key Terms
430(1)
Summary
430(1)
Practice Set
431(1)
Exercises
431(1)
Transmission Control Protocol (TCP)
432(70)
TCP Services
433(4)
Process-to-Process Communication
433(1)
Stream Delivery Service
434(2)
Full-Duplex Communication
436(1)
Multiplexing and Demultiplexing
436(1)
Connection-Oriented Service
436(1)
Reliable Service
436(1)
TCP Features
437(2)
Numbering System
437(1)
Flow Control
438(1)
Error Control
438(1)
Congestion Control
439(1)
Segment
439(3)
Format
439(2)
Encapsulation
441(1)
A TCP Connection
442(7)
Connection Establishment
442(2)
Data Transfer
444(2)
Connection Termination
446(2)
Connection Reset
448(1)
State Transition Diagram
449(8)
Scenarios
450(7)
Windows in TCP
457(2)
Send Window
457(1)
Receive Window
458(1)
Flow Control
459(6)
Opening and Closing Windows
460(2)
Shrinking of Windows
462(1)
Silly Window Syndrome
463(2)
Error Control
465(8)
Checksum
465(1)
Acknowledgment
465(1)
Retransmission
466(1)
Out-of-Order Segments
467(1)
FSMs for Data Transfer in TCP
467(1)
Some Scenarios
468(5)
Congestion Control
473(5)
Congestion Window
473(1)
Congestion Policy
474(4)
TCP Timers
478(4)
Retransmission Timer
478(3)
Persistence Timer
481(1)
Keepalive Timer
482(1)
Time-Wait Timer
482(1)
Options
482(7)
TCP Package
489(7)
Transmission Control Blocks (TCBs)
490(1)
Timers
491(1)
Main Module
491(4)
Input Processing Module
495(1)
Output Processing Module
496(1)
Further Reading
496(1)
Books
496(1)
RFCs
496(1)
Key Terms
496(1)
Summary
497(1)
Practice Set
498(4)
Exercises
498(3)
Research Activities
501(1)
Stream Control Transmission Protocol (SCTP)
502(39)
Introduction
503(1)
SCTP Services
504(2)
Process-to-Process Communication
504(1)
Multiple Streams
504(1)
Multihoming
505(1)
Full-Duplex Communication
506(1)
Connection-Oriented Service
506(1)
Reliable Service
506(1)
SCTP Features
506(4)
Transmission Sequence Number (TSN)
506(1)
Stream Identifier (SI)
506(1)
Stream Sequence Number (SSN)
507(1)
Packets
507(2)
Acknowledgment Number
509(1)
Flow Control
509(1)
Error Control
509(1)
Congestion Control
510(1)
Packet Format
510(9)
General Head
510(1)
Chunks
511(8)
An SCTP Association
519(6)
Association Establishment
519(2)
Data Transfer
521(3)
Association Termination
524(1)
Association Abortion
524(1)
State Transition Diagram
525(4)
Scenarios
526(3)
Flow Control
529(2)
Receiver Site
529(1)
Sender Site
530(1)
A Scenario
530(1)
Error Control
531(4)
Receiver Site
532(1)
Sender Site
532(2)
Sending Data Chunks
534(1)
Generating Sack Chunks
534(1)
Congestion Control
535(1)
Congestion Control and Multihoming
535(1)
Explicit Congestion Notification
535(1)
Further Reading
535(1)
Books
536(1)
RFCs
536(1)
Key Terms
536(1)
Summary
536(1)
Practice Set
537(4)
Exercises
537(2)
Research Activities
539(2)
Part 4 Application Layer
541(226)
Introduction to the Application Layer
542(26)
Client-Server Paradigm
543(21)
Server
544(1)
Client
544(1)
Concurrency
544(2)
Socket Interfaces
546(8)
Communication Using UDP
554(4)
Communication Using TCP
558(6)
Predefined Client-Server Applications
564(1)
Peer-to-Peer Paradigm
564(1)
Further Reading
565(1)
Key Terms
565(1)
Summary
565(1)
Practice Set
566(2)
Exercises
566(2)
Host Configuration: DHCP
568(14)
Introduction
569(1)
Previous Protocols
569(1)
DHCP
570(1)
DHCP Operation
570(6)
Same Network
570(1)
Different Networks
571(1)
UDP Ports
572(1)
Using TFTP
572(1)
Error Control
573(1)
Packet Format
573(3)
Configuration
576(3)
Static Address Allocation
576(1)
Dynamic Address Allocation
576(1)
Transition States
576(2)
Other Issues
578(1)
Exchanging Messages
579(1)
Further Reading
579(1)
Books and RFCs
579(1)
Key Terms
580(1)
Summary
580(1)
Practice Set
580(2)
Exercises
580(1)
Research Activities
581(1)
Domain Name System (DNS)
582(28)
Need For DNS
583(1)
Name Space
584(5)
Flat Name Space
584(1)
Hierarchical Name Space
584(1)
Domain Name Space
585(2)
Domain
587(1)
Distribution of Name Space
587(2)
DNS in the Internet
589(4)
Generic Domains
589(1)
Country Domains
590(1)
Inverse Domain
591(1)
Registrar
592(1)
Resolution
593(2)
Resolver
593(1)
Mapping Names to Addresses
593(1)
Mapping Addresses to Names
593(1)
Recursive Resolution
593(1)
Iterative Resolution
594(1)
Caching
594(1)
DNS Messages
595(3)
Header
596(2)
Types of Records
598(2)
Question Record
598(1)
Resource Record
599(1)
Compression
600(4)
Encapsulation
604(1)
Registrars
604(1)
DDNS
604(1)
Security of DNS
605(1)
Further Reading
605(1)
Books
606(1)
RFCs
606(1)
Key Terms
606(1)
Summary
606(1)
Practice Set
607(3)
Exercises
607(1)
Research Activities
608(2)
Remote Login: Telnet and SSH
610(20)
Telnet
611(13)
Concepts
611(1)
Time-Sharing Environment
611(2)
Network Virtual Terminal (NVT)
613(1)
Embedding
614(1)
Options
615(3)
Symmetry
618(1)
Suboption Negotiation
618(1)
Controlling the Server
618(2)
Out-of-Band Signaling
620(1)
Escape Character
620(1)
Modes of Operation
621(2)
User Interface
623(1)
Security Issue
624(1)
Secure Shell (SSH)
624(2)
Versions
624(1)
Components
624(1)
Port Forwarding
625(1)
Format of the SSH Packets
626(1)
Further Reading
626(1)
Books
626(1)
RFCs
627(1)
Key Terms
627(1)
Summary
627(1)
Practice Set
628(2)
Exercises
628(1)
Research Activities
629(1)
File Transfer: FTP and TFTP
630(26)
FTP
631(12)
Connections
631(2)
Communication
633(2)
Command Processing
635(4)
File Transfer
639(3)
Anonymous FTP
642(1)
Security for FTP
643(1)
The sftp Program
643(1)
TFTP
643(9)
Message
644(2)
Connection
646(1)
Data Transfer
647(2)
UDP Ports
649(1)
TFTP Example
650(1)
TFTP Options
650(1)
Security
651(1)
Applications
651(1)
Further Reading
652(1)
Books
652(1)
RFCs
652(1)
Key Terms
652(1)
Summary
653(1)
Practice Set
653(3)
Exercises
653(2)
Research Activities
655(1)
World Wide Web and HTTP
656(24)
Architecture
657(3)
Hypertext and Hypermedia
658(1)
Web Client (Browser)
658(1)
Web Server
659(1)
Uniform Resource Locator (URL)
659(1)
Web Documents
660(4)
Static Documents
660(1)
Dynamic Documents
660(3)
Active Documents
663(1)
HTTP
664(12)
HTTP Transaction
664(6)
Conditional Request
670(1)
Persistence
670(2)
Cookies
672(3)
Web Caching: Proxy Server
675(1)
HTTP Security
675(1)
Further Reading
676(1)
Books
676(1)
RFCs
676(1)
Key Terms
676(1)
Summary
676(1)
Practice Set
677(3)
Exercises
677(1)
Research Activities
678(2)
Electronic Mail: SMTP, POP, IMAP, and MIME
680(26)
Architecture
681(3)
First Scenario
681(1)
Second Scenario
682(1)
Third Scenario
682(1)
Fourth Scenario
683(1)
User Agent
684(3)
Services Provided by a User Agent
684(1)
User Agent Types
685(1)
Sending Mail
685(1)
Receiving Mail
686(1)
Addresses
686(1)
Mailing List or Group List
686(1)
Message Transfer Agent: SMTP
687(6)
Commands and Responses
687(4)
Mail Transfer Phases
691(2)
Message Access Agent: POP and IMAP
693(2)
POP3
694(1)
IMAP4
695(1)
MIME
695(5)
MIME Headers
695(5)
Web-Based Mail
700(1)
Case I
700(1)
Case II
701(1)
E-mail Security
701(1)
Further Reading
702(1)
Books
702(1)
RFCs
702(1)
Key Terms
702(1)
Summary
702(1)
Practice Set
703(3)
Exercises
703(1)
Research Activities
704(2)
Network Management: SNMP
706(22)
Concept
707(1)
Managers and Agents
707(1)
Management Components
708(3)
Role of SNMP
708(1)
Role of SMI
708(1)
Role of MIB
709(1)
An Analogy
709(1)
An Overview
710(1)
SMI
711(4)
Name
711(1)
Type
712(1)
Encoding Method
713(2)
MIB
715(4)
Accessing MIB Variables
716(2)
Lexicographic Ordering
718(1)
SNMP
719(5)
PUDs
719(2)
Format
721(1)
Messages
722(2)
UDP Ports
724(1)
Security
725(1)
Further Reading
725(1)
Books
725(1)
RFCs
725(1)
Key Terms
726(1)
Summary
726(1)
Practice Set
726(2)
Exercises
726(1)
Research Activity
727(1)
Multimedia
728(39)
Introduction
729(1)
Digitizing Audio and Video
730(1)
Digitizing Audio
730(1)
Digitizing Video
730(1)
Audio and Video Compression
731(5)
Audio Compression
731(1)
Video Compression
731(5)
Streaming Stored Audio/Video
736(3)
First Approach: Using a Web Server
736(1)
Second Approach: Using a Web Server with Metafile
737(1)
Third Approach: Using a Media Server
738(1)
Fourth Approach: Using a Media Server and RTSP
738(1)
Streaming Live Audio/Video
739(1)
Real-Time Interactive Audio/Video
740(4)
Characteristics
740(4)
RTP
744(2)
RTP Packet Format
745(1)
UDP Port
746(1)
RTCP
746(2)
Sender Report
746(1)
Receiver Report
747(1)
Source Description Message
747(1)
Bye Message
747(1)
Application-Specific Message
747(1)
UDP Port
747(1)
Voice Over IP
748(4)
SIP
748(2)
H.323
750(2)
Quality of Service
752(6)
Flow Characteristics
752(1)
Flow Classes
753(1)
Techniques to Improve QoS
753(4)
Resource Reservation
757(1)
Admission Control
758(1)
Integrated Services
758(4)
Signaling
758(1)
Flow Specification
758(1)
Admission
759(1)
Service Classes
759(1)
RSVP
759(3)
Problems with Integrated Services
762(1)
Differentiated Services
762(2)
DS Field
762(2)
Recommended Reading
764(1)
Books
764(1)
RFCs
764(1)
Key Terms
764(1)
Summary
765(1)
Practice Set
766(1)
Exercises
766(1)
Part 5 Next Generation
767(48)
IPv6 Addressing
768(18)
Introduction
769(4)
Notations
769(3)
Address Space
772(1)
Three Address Types
772(1)
Broadcasting and Multicasting
773(1)
Address Space Allocation
773(5)
Assigned and Reserved Blocks
775(3)
Global Unicast Addresses
778(3)
Three Levels of Hierarchy
779(2)
Autoconfiguration
781(1)
Renumbering
782(1)
Further Reading
782(1)
Books
782(1)
RFCs
782(1)
Key Terms
783(1)
Summary
783(1)
Practice Set
783(3)
Exercises
783(3)
IPv6 Protocol
786(14)
Introduction
787(1)
Rationale for Change
787(1)
Reason for Delay in Adoption
787(1)
Packet Format
788(8)
Base Header
788(1)
Flow Label
789(1)
Comparison between IPv4 and IPv6 Headers
790(1)
Extension Headers
790(5)
Comparison between IPv4 and IPv6
795(1)
Transition from IPv4 to IPv6
796(2)
Dual Stack
796(1)
Tunneling
797(1)
Header Translation
797(1)
Further Reading
798(1)
Books
798(1)
RFCs
798(1)
Key Terms
798(1)
Summary
799(1)
Practice Set
799(1)
Exercises
799(1)
Research Activity
799(1)
ICMPv6
800(15)
Introduction
801(1)
Error Messages
802(2)
Destination-Unreachable Message
802(1)
Packet-Too-Big Message
803(1)
Time-Exceeded Message
803(1)
Parameter-Problem Message
804(1)
Informational Messages
804(1)
Echo-Request Message
804(1)
Echo-Reply Message
805(1)
Neighbor-Discovery Messages
805(4)
Router-Solicitation Message
805(1)
Router-Advertisement Message
806(1)
Neighbor-Solicitation Message
806(1)
Neighbor-Advertisement Message
807(1)
Redirection Message
808(1)
Inverse-Neighbor-Solicitation Message
808(1)
Inverse-Neighbor-Advertisement Message
808(1)
Group Membership Messages
809(3)
Membership-Query Message
809(1)
Membership-Report Message
810(1)
Functionality
810(2)
Further Reading
812(1)
Books
812(1)
RFCs
812(1)
Key Terms
812(1)
Summary
812(1)
Practice Set
813(2)
Exercises
813(1)
Research Activities
813(2)
Part 6 Security
815(76)
Cryptography and Network Security
816(42)
Introduction
817(3)
Security Goals
817(1)
Attacks
818(1)
Services
819(1)
Techniques
819(1)
Traditional Ciphers
820(6)
Key
821(1)
Substitution Ciphers
821(3)
Transposition Ciphers
824(1)
Stream and Block Ciphers
825(1)
Modern Ciphers
826(5)
Modern Block Ciphers
826(2)
Data Encryption Standard (DES)
828(2)
Modern Stream Ciphers
830(1)
Asymmetric-Key Ciphers
831(5)
Keys
832(1)
General Idea
832(2)
RSA Cryptosystem
834(2)
Applications
836(1)
Message Integrity
836(1)
Message and Message Digest
836(1)
Hash Functions
837(2)
Message Authentication
838(1)
HMAC
838(1)
Digital Signature
839(5)
Comparison
839(1)
Process
840(1)
Signing the Digest
841(1)
Services
842(1)
RSA Digital Signature Scheme
843(1)
Digital Signature Standard (DSS)
844(1)
Entity Authentication
844(3)
Entity versus Message Authentication
844(1)
Verification Categories
845(1)
Passwords
845(1)
Challenge-Response
845(2)
Key Management
847(6)
Symmetric-Key Distribution
847(3)
Symmetric-Key Agreement
850(1)
Public-Key Distribution
851(2)
Further Reading
853(1)
Key Terms
853(1)
Summary
854(1)
Practice Set
855(3)
Exercises
855(1)
Research Activities
856(2)
Internet Security
858(33)
Network Layer Security
859(10)
Two Modes
859(2)
Two Security Protocols
861(3)
Services Provided by IPSec
864(1)
Security Association
865(3)
Internet Key Exchange (IKE)
868(1)
Virtual Private Network (VPN)
868(1)
Transport Layer Security
869(6)
SSL Architecture
869(3)
Four Protocols
872(3)
Application Layer Security
875(10)
E-mail Security
875(1)
Pretty Good Privacy (PGP)
876(2)
Key Rings
878(1)
PGP Certificates
878(3)
S/MIME
881(4)
Applications of S/MIME
885(1)
Firewalls
885(2)
Packet-Filter Firewall
885(1)
Proxy Firewall
886(1)
Recommended Reading
887(1)
Key Terms
887(1)
Summary
888(1)
Practice Set
888(3)
Exercises
888(1)
Research Activities
889(2)
Part 7 Appendices
891(44)
Appendix A Unicode
892(4)
Appendix B Positional Numbering Systems
896(8)
Appendix C Error Detection Codes
904(10)
Appendix D Checksum
914(6)
Appendix E HTML, XHTML, XML, and XSL
920(6)
Appendix F Client-Server Programming in Java
926(6)
Appendix G Miscellaneous Information
932(3)
Glossary 935(20)
References 955(2)
Index 957
Behrouz A. Forouzan is a Professor at DeAnza College where he is involved in the development of Computer Information System courses. In addition he provides system development consulting with several companies. In addition to C and C++ books, Forouzan is the author of several other successful books, including Computer Networks: A Top-Down Approach, TCP/IP Protocol Suite, and Local Area Networks.