ebook img

Advanced Internet Protocols, Services and Application PDF

307 Pages·7.041 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advanced Internet Protocols, Services and Application

Contents Cover Title Page Copyright Preface Audience Organization Acknowledgments About the Authors Chapter 1: Transmission Control Protocol/Internet Protocol Overview 1.1 Fundamental Architecture 1.2 Internet Protocol Basics 1.2.1 Packet Header 1.2.2 Internet Protocol Address 1.2.3 Internet Protocol Classification 1.2.4 Subnet and its Masking 1.2.5 Subnet Calculation 1.3 Routing 1.3.1 Routing Across Providers 1.3.2 Routing within Edge Networks 1.3.3 Routing Scalability References Chapter 2: Transport-Layer Protocols 2.1 Transmission Control Protocol 2.1.1 Transmission Control Protocol Header Structure 2.1.2 Three-Way Handshake 2.1.3 Transmission Control Protocol Flow Control and Congestion Control 2.1.4 Port Number 2.2 User Datagram Protocol 2.2.1 User Datagram Protocol Header Structure 2.3 Stream Control Transmission Protocol 2.3.1 Stream Control Transmission Protocol Packet Structure 2.3.2 Security: Prevention of SYN Attacks 2.4 Real-Time Transport Protocol 2.4.1 Real-Time Transport Protocol Header Structure References Chapter 3: Internet Architecture 3.1 Internet Exchange Point 3.2 History of Internet Exchange Points 3.3 Internet Service Provider Interconnection Relationships 3.4 Peering and Transit References Chapter 4: IP Routing Protocols 4.1 Overview of Routing Protocols 4.1.1 Interior Gateway Protocol 4.1.2 Exterior Gateway Protocol 4.2 Routing Information Protocol 4.2.1 Routing Information Protocol Header Format 4.2.2 Update of Routing Table in Routing Information Protocol 4.2.3 Maintenance of Routing Table in Routing Information Protocol 4.2.4 Split Horizon 4.2.5 Limitations of Routing Information Protocol 4.3 Open Shortest Path First 4.3.1 Shortest-Path Algorithm 4.3.2 Hierarchical Routing 4.3.3 Open Shortest Path First Packet Format 4.3.4 Comparison of Routing Information Protocol and Open Shortest Path First 4.4 Border Gateway Protocol 4.4.1 Border Gateway Protocol Message Flows 4.4.2 Border Gateway Protocol Policy Selection Attributes References Chapter 5: Multiprotocol Label Switching 5.1 Overview 5.2 Functions and Mechanisms 5.3 Applicabilities References Chapter 6: IP Quality Of Service 6.1 Introduction 6.2 Quality of Service in IP Version 4 6.3 Integrated Services 6.3.1 Packet Scheduler 6.3.2 Packet Classifier 6.3.3 Admission Control 6.3.4 Resource Reservation Protocol (RSVP) 6.4 Differentiated Services 6.5 Quality of Service with Nested Differentiated Services Levels 6.5.1 Drawbacks of Explicit Endpoint Admission Control with Path Selection 6.5.2 OSPF-Based Adaptive and Flexible Quality of Service Provisioning 6.5.3 Combination of Security and Quality of Service 6.5.4 Path Selection Algorithm Analysis References Chapter 7: IP Multicast and Anycast 7.1 Addressing 7.1.1 Multicast Addressing 7.1.2 Differences between Multicasting and Multiple Unicasting 7.2 Multicast Routing 7.2.1 Optimal Routing: Shortest-Path Trees 7.2.2 Unicast Routing 7.2.3 Multicast Routing 7.3 Routing Protocols 7.3.1 Multicast Open Shortest Path First (MOSPF) 7.3.2 Distance Vector Multicast Routing Protocol 7.3.3 Core-Based Tree (CBT) Protocol 7.3.4 Protocol-Independent Multicast 7.3.5 Simple Multicast Routing Protocol 7.4 Anycasting 7.4.1 Architectural Issues 7.4.2 Anycast Addresses 7.4.3 Differences between the Services Offered by IP Multicasting and IP Anycasting 7.5 IPv6 Anycast Routing Protocol: Protocol- Independent Anycast—Sparse Mode References Chapter 8: Layer-2 Transport over Packet 8.1 Draft-Martini Signaling and Encapsulation 8.1.1 Functionality 8.1.2 Encapsulation 8.1.3 Protocol-Specific Encapsulation 8.2 Layer-2 Tunneling Protocol 8.2.1 Layer-2 Tunneling Protocol Version 3 8.2.2 Pseudowire Emulation Edge to Edge References Chapter 9: Virtual Private Wired Service 9.1 Types of Private Wire Services 9.1.1 Layer-2 Virtual Private Services: Wide Area Networks and Local Area Networks 9.1.2 Virtual Private Wire Service 9.1.3 Virtual Private Multicast Service 9.1.4 IP-Only Layer-2 Virtual Private Network 9.1.5 Internet Protocol Security 9.2 Generic Routing Encapsulation 9.3 Layer-2 Tunneling Protocol 9.4 Layer-3 Virtual Private Network 2547bis, Virtual Router 9.4.1 Virtual Router Redundancy Protocol References Chapter 10: IP and Optical Networking 10.1 IP/Optical Network Evolution 10.1.1 Where Networking is Today 10.1.2 Where Networking is Going 10.2 Challenges in Legacy Traditional IP/Optical Networks 10.2.1 Proprietary Network Management Systems 10.2.2 Complexity of Provisioning in Legacy IP/Optical Networks 10.3 Automated Provisioning in IP/Optical Networks 10.4 Control Plane Models for IP/Optical Networking 10.4.1 Optical Internetworking Forum's Optical User Network Interface: Overlay Model 10.4.2 Internet Engineering Task Force's Generalized Multiprotocol Label Switching: Peer Model 10.5 Next-Generation MultiLayer Network Design Requirements 10.6 Benefits and Challenges in IP/Optical Networking References Chapter 11: IP Version 6 11.1 Addresses in IP Version 6 11.1.1 Unicast IP Addresses 11.1.2 Multicast IP Addresses 11.2 IP Packet Headers 11.3 IP Address Resolution 11.4 IP Version 6 Deployment: Drivers and Impediments 11.4.1 Need for Backwards Compatibility 11.4.2 Initial Deployment Drivers 11.4.3 Reaching a Critical Mass References Chapter 12: IP Traffic Engineering 12.1 Models of Traffic Demands 12.2 Optimal Routing with Multiprotocol Label Switching 12.2.1 Overview 12.2.2 Applicability of Optimal Routing 12.2.3 Network Model 12.2.4 Optimal Routing Formulations with Three Models 12.3 Link-Weight Optimization with Open Shortest Path First 12.3.1 Overview 12.3.2 Examples of Routing Control with Link Weights 12.3.3 Link-Weight Setting Against Network Failure 12.4 Extended Shortest-Path-Based Routing Schemes 12.4.1 Smart–Open Shortest Path First 12.4.2 Two-Phase Routing 12.4.3 Fine Two-Phase Routing 12.4.4 Features of Routing Schemes References Chapter 13: IP Network Security 13.1 Introduction 13.2 Detection of Denial-of-Service Attack 13.2.1 Backscatter Analysis 13.2.2 Multilevel Tree or Online Packet Statistics 13.3 IP Traceback 13.3.1 IP Traceback Solutions 13.4 Edge Sampling Scheme 13.5 Advanced Marking Scheme References Chapter 14: Mobility Support for IP 14.1 Mobility Management Approaches 14.1.1 Host Routes 14.1.2 Tunneling 14.1.3 Route Optimization 14.2 Security Threats Related to IP Mobility 14.2.1 Impersonation 14.2.2 Redirection-Based Flooding 14.2.3 Possible Solutions 14.3 Mobility Support in IPv6 14.4 Reactive Versus Proactive Mobility Support 14.5 Relation to Multihoming 14.6 Protocols Supplementing Mobility 14.6.1 Router and Subnet Prefix Discovery 14.6.2 Movement Detection 14.6.3 IP Address Configuration 14.6.4 Neighbor Unreachability Detection 14.6.5 Internet Control Message Protocol for IP Version 6 14.6.6 Optimizations 14.6.7 Media-Independent Handover Services References Index

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.