ebook img

The Illustrated Network: How TCP/IP Works in a Modern Network PDF

937 Pages·2017·8.95 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Illustrated Network: How TCP/IP Works in a Modern Network

The Illustrated Network This pageintentionallyleftblank The Illustrated Network How TCP/IP Works in a Modern Network Second Edition Walter Goralski MorganKaufmannisanimprintofElsevier 50HampshireStreet,5thFloor,Cambridge,MA02139,UnitedStates Copyright©2017,2009ElsevierInc.Allrightsreserved. Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,electronic ormechanical,includingphotocopying,recording,oranyinformationstorageandretrievalsystem, withoutpermissioninwritingfromthepublisher.Detailsonhowtoseekpermission,further informationaboutthePublisher’spermissionspoliciesandourarrangementswithorganizationssuch astheCopyrightClearanceCenterandtheCopyrightLicensingAgency,canbefoundatourwebsite: www.elsevier.com/permissions. Thisbookandtheindividualcontributionscontainedinitareprotectedundercopyrightbythe Publisher(otherthanasmaybenotedherein). Notices Knowledgeandbestpracticeinthisfieldareconstantlychanging.Asnewresearchandexperience broadenourunderstanding,changesinresearchmethods,professionalpractices,ormedicaltreatment maybecomenecessary. Practitionersandresearchersmustalwaysrelyontheirownexperienceandknowledgeinevaluating andusinganyinformation,methods,compounds,orexperimentsdescribedherein.Inusingsuch informationormethodstheyshouldbemindfuloftheirownsafetyandthesafetyofothers,including partiesforwhomtheyhaveaprofessionalresponsibility. Tothefullestextentofthelaw,neitherthePublishernortheauthors,contributors,oreditors,assume anyliabilityforanyinjuryand/ordamagetopersonsorpropertyasamatterofproductsliability, negligenceorotherwise,orfromanyuseoroperationofanymethods,products,instructions,orideas containedinthematerialherein. BritishLibraryCataloguing-in-PublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary LibraryofCongressCataloging-in-PublicationData AcatalogrecordforthisbookisavailablefromtheLibraryofCongress ISBN:978-0-12-811027-0 ForInformationonallMorganKaufmannpublications visitourwebsiteathttps://www.elsevier.com/books-and-journals Publisher:JonathanSimpson AcquisitionEditor:ToddGreen EditorialProjectManager:LindsayLawrence ProductionProjectManager:PunithavathyGovindaradjane CoverDesigner:MilesHitchen TypesetbyMPSLimited,Chennai,India Contents Aboutthe Author....................................................................................................xxi Foreword..............................................................................................................xxiii Preface...................................................................................................................xxv Acknowledgments...............................................................................................xxxv PART I NETWORKING BASICS CHAPTER 1 Protocols and Layers...................................................3 TheIllustrated Network................................................................7 Remote Access toNetworkDevices.......................................8 FileTransfer toa Router.......................................................10 CLI and GUI..........................................................................12 Wireshark and Packet Capture..............................................13 FirstExplorations inNetworking..........................................14 Protocols.....................................................................................15 Standards and Organizations.................................................16 Request for Comment and the InternetEngineering Task Force.............................................................................19 Internet Administration...............................................................21 Layers..........................................................................................23 Simple Networking................................................................23 Protocol Layers......................................................................25 TheTCP/IPProtocol Suite.........................................................25 TheTCP/IP Layers................................................................26 Protocols andInterfaces........................................................28 Encapsulation.........................................................................28 TheLayersof TCP/IP................................................................30 ThePhysical Layer................................................................31 TheData Link Layer.............................................................32 TheNetworkLayer...............................................................36 TheTransport Layer..............................................................38 TheApplication Layer...........................................................41 SessionSupport.....................................................................42 Internal Representation Conversion......................................42 Applications in TCP/IP.........................................................43 TheTCP/IPProtocol Suite.........................................................45 Questions for Readers.................................................................45 v vi Contents CHAPTER 2 TCP/IP Protocols and Devices...................................47 Protocol Stackson the Illustrated Network...............................50 Layers, Protocols,Ports,and Sockets........................................51 The TCP/IP Protocol Stack........................................................54 The Client(cid:1)ServerModel..........................................................55 TCP/IP Layers and Client(cid:1)Server.............................................55 The IPLayer...............................................................................57 The Transport Layer...................................................................59 TransmissionControlProtocol..............................................59 User Datagram Protocol........................................................59 The Application Layer................................................................60 Bridges, Routers, and Switches..................................................60 SegmentingLANs.................................................................61 Bridges...................................................................................63 Routers...................................................................................64 LAN Switches........................................................................65 Virtual LANs.........................................................................66 VLAN Frame Tagging..........................................................67 Questions for Readers.................................................................69 CHAPTER 3 Network Link Technologies.......................................71 Illustrated Network Connections................................................74 DisplayingEthernet Traffic...................................................74 DisplayingSONET Links......................................................76 DisplayingDSL Links...........................................................79 DisplayingWireless Links....................................................81 Frames and the Link Layer...................................................84 The Data Link Layer..................................................................84 The Evolution of Ethernet..........................................................85 Ethernet II and IEEE 802.3 Frames......................................86 MAC Addresses.....................................................................87 The Evolution of DSL................................................................89 PPP and DSL.........................................................................90 PPP Framing for Packets.......................................................91 DSL Encapsulation................................................................92 Forms ofDSL........................................................................93 The Evolution of SONET...........................................................94 ANote about Network Errors...............................................95 Packet over SONET/SDH.....................................................96 Wireless LANsand IEEE 802.11..............................................97 Wi-Fi......................................................................................99 Contents vii IEEE 802.11 MAC Layer Protocol.....................................100 TheIEEE 802.11 Frame......................................................102 Questions for Readers...............................................................104 CHAPTER 4 Packet Optical Networks and Forward Error Correction................................................................107 Packet Optical Networks and Error Correction.......................108 Packet Optical Networks and the Optical Transport Network.....................................................................................110 Standards for Packet Optical Networks andForward Error Correction........................................................................111 Handling Single Bit Errors andBurst Errors...........................111 HammingDistance and HammingCodes...........................113 A Better HammingCode Method.......................................115 HammingCodeinAction...................................................117 HammingCodeImplementation.........................................121 Burst Errorsand Interleaving..............................................123 Modern FEC Operation............................................................124 FEC and SONET/SDH.............................................................126 FEC and OTN...........................................................................129 TheOTN Frame and FEC...................................................131 Generic FramingProcedure.................................................131 FEC Research and Development.............................................132 OTN for the Illustrated Network..............................................133 Questions for Readers...............................................................135 PART II CORE PROTOCOLS CHAPTER 5 IPv4 and IPv6 Addressing.......................................139 IP Addressing............................................................................139 TheNetwork/Host Boundary...................................................147 TheIPv4 Address.....................................................................147 Private IPv4Addresses........................................................152 Understanding IPv4 Addresses............................................152 TheIPv6 Address.....................................................................154 Features ofIPv6 Addressing...............................................154 IPv6 Address Types and Notation......................................155 IPv6 Address Prefixes.........................................................156 Subnetting and Supernetting....................................................157 Subnetting inIPv4...............................................................157 Subnetting Basics................................................................158 CIDR and VLSM.................................................................162 viii Contents IPv6Addressing Details...........................................................166 IPAddress Assignment.......................................................168 Complete IPv4 andIPv6 Address Ranges..........................170 Questions for Readers...............................................................173 CHAPTER 6 Address Resolution Protocol...................................175 ARP andLANs.........................................................................178 ARP Packets.............................................................................185 Example ARP Operation..........................................................187 ARP Variations.........................................................................188 ProxyARP...........................................................................189 Reverse ARP........................................................................190 ARPs on WANs...................................................................190 ARP andIPv6...........................................................................191 NeighborDiscovery Protocol..............................................192 NDAddress Resolution.......................................................193 Questions for Readers...............................................................195 CHAPTER 7 IPv4 and IPv6 Headers............................................197 Packet Headersand Addresses.................................................200 The IPv4Packet Header...........................................................202 Fragmentationand IPv4...........................................................204 Fragmentationand MTU.....................................................206 Fragmentationand Reassembly................................................208 Path MTU Determination....................................................208 AFragmentation Example........................................................209 Limitationsof IPv4..............................................................211 TheIPv6 Header Structure..................................................211 IPv4and IPv6 HeadersCompared...........................................214 IPv6Header Changes..........................................................214 IPv6and Fragmentation...........................................................216 Questions for Readers...............................................................219 CHAPTER 8 Internet Control Message Protocol.........................221 ICMP andPing.........................................................................224 The ICMPMessage Format.....................................................227 ICMPMessage Fields..........................................................228 ICMPTypes and Codes.......................................................229 Sending ICMP Messages..........................................................235 When ICMP Must Be Sent..................................................235 When ICMP Must Not Be Sent...........................................236 Contents ix Ping...........................................................................................236 Traceroute.................................................................................237 Path MTU.................................................................................239 ICMPv6.....................................................................................241 BasicICMPv6Messages.....................................................241 TimeExceeded....................................................................243 Neighbor Discovery and Autoconfiguration.......................243 Routersand NeighborDiscovery........................................244 Interface Addresses..............................................................245 Neighbor Solicitation andAdvertisement...........................245 Questions for Readers...............................................................246 CHAPTER 9 Routing.....................................................................247 Routersand RoutingTables.....................................................250 Hosts and Routing Tables........................................................252 Directand Indirect Delivery.....................................................256 Routing.................................................................................260 DirectDelivery Without Routing........................................260 Indirect Delivery and the Router.........................................262 Questions for Readers...............................................................266 CHAPTER 10 Forwarding IP Packets............................................267 Router Architectures.................................................................273 BasicRouter Architectures..................................................274 Another Router Architecture....................................................276 Router Access...........................................................................278 TheConsole Port.................................................................279 TheAuxiliary Port...............................................................279 TheNetwork........................................................................279 Forwarding Table Lookups......................................................280 DualStacks,Tunneling, and IPv6............................................282 DualProtocol Stacks...........................................................282 Tunneling.............................................................................283 Tunneling Mechanisms.............................................................285 Transition Considerations.........................................................287 Questions for Readers...............................................................288 CHAPTER 11 User Datagram Protocol..........................................289 UDP Portsand Sockets............................................................292 What UDPIs For......................................................................296

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.