Foreword |
Foreword to the First Edition |
Preface / Chapter 1: |
Foundation |
Direct Link Networks / 1: |
Problem: Building a Network / Chapter 3: |
Packet Switching |
Internetworking / 1.1: |
Applications |
End-to-End Protocols / Chapter 5: |
Requirements / Chapter 6: |
Congestion Control & Resource Allocation |
End-to-end Data / 1.2.1: |
Connectivity |
Security / Chapter 8: |
Cost-Effective Resource Sharing / Chapter 9: |
Support for Common Services / 1.2.3: |
Network Architecture / 1.3: |
Layering and Protocols / 1.3.1: |
OSI Architecture / 1.3.2: |
Internet Architecture / 1.3.3: |
Implementing Network Software / 1.4: |
Application Programming Interface (Sockets) / 1.4.1: |
Example Application / 1.4.2: |
Protocol Implementation Issues / 1.4.3: |
Performance / 1.5: |
Bandwidth and Latency / 1.5.1: |
Delay x Bandwidth Product / 1.5.2: |
High-Speed Networks / 1.5.3: |
Application Performance Needs / 1.5.4: |
Summary / 1.6: |
Open Issue: Ubiquitous Networking |
Further Reading |
Exercises |
Problem: Physically Connecting Hosts / 2: |
Hardware Building Blocks / 2.1: |
Nodes / 2.1.1: |
Links / 2.1.2: |
Encoding (NRZ, NRZI, Manchester, 4B/5B) / 2.2: |
Framing / 2.3: |
Byte-Oriented Protocols (BISYNC, PPP, DDCMP) / 2.3.1: |
Bit-Oriented Protocols (HDLC) / 2.3.2: |
Clock-Based Framing (SONET) / 2.3.3: |
Error Detection / 2.4: |
Two-Dimensional Parity / 2.4.1: |
Internet Checksum Algorithm / 2.4.2: |
Cyclic Redundancy Check / 2.4.3: |
Reliable Transmission / 2.5: |
Stop-and-Wait / 2.5.1: |
Sliding Window / 2.5.2: |
Concurrent Logical Channels / 2.5.3: |
Ethernet (802.3) / 2.6: |
Physical Properties / 2.6.1: |
Access Protocol / 2.6.2: |
Experience with Ethernet / 2.6.3: |
Token Rings (802.5, FDDI) / 2.7: |
Token Ring Media Access Control / 2.7.1: |
Token Ring Maintenance / 2.7.3: |
Frame Format / 2.7.4: |
FDDI / 2.7.5: |
Wireless (802.11) / 2.8: |
Collision Avoidance / 2.8.1: |
Distribution System / 2.8.3: |
Network Adaptors / 2.8.4: |
Components / 2.9.1: |
View from the Host / 2.9.2: |
Memory Bottleneck / 2.9.3: |
Open Issue: Does It Belong in Hardware? / 2.10: |
Problem: Not All Networks Are Directly Connected / 3: |
Switching and Forwarding / 3.1: |
Datagrams / 3.1.1: |
Virtual Circuit Switching / 3.1.2: |
Source Routing / 3.1.3: |
Bridges and LAN Switches / 3.2: |
Learning Bridges / 3.2.1: |
Spanning Tree Algorithm / 3.2.2: |
Broadcast and Multicast / 3.2.3: |
Limitations of Bridges / 3.2.4: |
Cell Switching (ATM) / 3.3: |
Cells / 3.3.1: |
Segmentation and Reassembly / 3.3.2: |
Virtual Paths / 3.3.3: |
Physical Layers for ATM / 3.3.4: |
ATM in the LAN / 3.3.5: |
Implementation and Performance / 3.4: |
Ports / 3.4.1: |
Fabrics / 3.4.2: |
Open Issue: The Future of ATM / 3.5: |
Problem: There Is More Than One Network / 4: |
Simple Internetworking (IP) / 4.1: |
What Is an Internetwork? / 4.1.1: |
Service Model / 4.1.2: |
Global Addresses / 4.1.3: |
Datagram Forwarding in IP / 4.1.4: |
Address Translation (ARP) / 4.1.5: |
Host Configuration (DHCP) / 4.1.6: |
Error Reporting (ICMP) / 4.1.7: |
Virtual Networks and Tunnels / 4.1.8: |
Routing / 4.2: |
Network as a Graph / 4.2.1: |
Distance Vector (RIP) / 4.2.2: |
Link State (OSPF) / 4.2.3: |
Metrics / 4.2.4: |
Routing for Mobile Hosts / 4.2.5: |
Global Internet / 4.3: |
Subnetting / 4.3.1: |
Classless Routing (CIDR) / 4.3.2: |
Interdomain Routing (BGP) / 4.3.3: |
Routing Areas / 4.3.4: |
IP Version 6 (IPv6) / 4.3.5: |
Multicast / 4.4: |
Link-State Multicast / 4.4.1: |
Distance-Vector Multicast / 4.4.2: |
Protocol Independent Multicast (PIM) / 4.4.3: |
Multiprotocol Label Switching (MPLS) / 4.5: |
Destination-Based Forwarding / 4.5.1: |
Explicit Routing / 4.5.2: |
Virtual Private Networks and Tunnels / 4.5.3: |
Open Issue: Deployment of IPV6 / 4.6: |
Problem: Getting Processess to Communicate / 5: |
Simple Demultiplexer (UDP) / 5.1: |
Reliable Byte Stream (TCP) / 5.2: |
End-to-End Issues / 5.2.1: |
Segment Format / 5.2.2: |
Connection Establishment and Termination / 5.2.3: |
Sliding Window Revisited / 5.2.4: |
Triggering Transmission / 5.2.5: |
Adaptive Retransmission / 5.2.6: |
Record Boundaries / 5.2.7: |
TCP Extensions / 5.2.8: |
Alternative Design Choices / 5.2.9: |
Remote Procedure Call / 5.3: |
Bulk Transfer (BLAST) / 5.3.1: |
Request/Reply (CHAN) / 5.3.2: |
Dispatcher (SELECT) / 5.3.3: |
Putting It All Together (SunRPC, DCE) / 5.3.4: |
Open Issue: Application-Specific Protocols / 5.4: |
Congestion Control and Resource Allocation / 6: |
Problem: Allocating Resources |
Issues in Resource Allocation / 6.1: |
Network Model / 6.1.1: |
Taxonomy / 6.1.2: |
Evaluation Criteria / 6.1.3: |
Queuing Disciplines / 6.2: |
FIFO / 6.2.1: |
Fair Queuing / 6.2.2: |
TCP Congestion Control / 6.3: |
Additive Increase/Multiplicative Decrease / 6.3.1: |
Slow Start / 6.3.2: |
Fast Retransmit and Fast Recovery / 6.3.3: |
Congestion-Avoidance Mechanisms / 6.4: |
DECbit / 6.4.1: |
Random Early Detection (RED) / 6.4.2: |
Source-Based Congestion Avoidance / 6.4.3: |
Quality of Service / 6.5: |
Application Requirements / 6.5.1: |
Integrated Services (RSVP) / 6.5.2: |
Differentiated Services (EF, AF) / 6.5.3: |
ATM Quality of Service / 6.5.4: |
Equation-Based Congestion Control / 6.5.5: |
Open Issue: Inside versus Outside the Network / 6.6: |
End-to-End Data / 7: |
Problem: What Do We Do with the Data? |
Presentation Formatting / 7.1: |
Examples (XDR, ASN. 1, NDR) / 7.1.1: |
Markup Languages (XML) / 7.1.3: |
Data Compression / 7.2: |
Lossless Compression Algorithms / 7.2.1: |
Image Compression (JPEG) / 7.2.2: |
Video Compression (MPEG) / 7.2.3: |
Transmitting MPEG over a Network / 7.2.4: |
Audio Compression (MP3) / 7.2.5: |
Open Issue: Computer Networks Meet Consumer Electronics / 7.3: |
Network Security / 8: |
Problem: Securing the Data |
Cryptographic Algorithms / 8.1: |
Secret Key Encryption (DES) / 8.1.1: |
Public Key Encryption (RSA) / 8.1.3: |
Message Digest Algorithms (MD5) / 8.1.4: |
Security Mechanisms / 8.1.5: |
Authentication Protocols / 8.2.1: |
Message Integrity Protocols / 8.2.2: |
Public Key Distribution (X.509) / 8.2.3: |
Example Systems / 8.3: |
Pretty Good Privacy (PGP) / 8.3.1: |
Secure Shell (SSH) / 8.3.2: |
Transport Layer Security (TLS, SSL, HTTPS) / 8.3.3: |
IP Security (IPSEC) / 8.3.4: |
Firewalls / 8.4: |
Filter-Based Firewalls / 8.4.1: |
Proxy-Based Firewalls / 8.4.2: |
Limitations / 8.4.3: |
Open Issue: Denial-of-Service Attacks / 8.5: |
Problem: Applications Need Their Own Protocols / 9: |
Name Service (DNS) / 9.1: |
Domain Hierarchy / 9.1.1: |
Name Servers / 9.1.2: |
Name Resolution / 9.1.3: |
Traditional Applications / 9.2: |
Electronic Mail (SMTP, MIME, IMAP) / 9.2.1: |
World Wide Web (HTTP) / 9.2.2: |
Network Management (SNMP) / 9.2.3: |
Multimedia Applications / 9.3: |
Real-time Transport Protocol (RTP) / 9.3.1: |
Session Control and Call Control (SDP, SIP, H.323) / 9.3.2: |
Overlay Networks / 9.4: |
Routing Overlays / 9.4.1: |
Peer-to-Peer Networks / 9.4.2: |
Content Distribution Networks / 9.4.3: |
Open Issue: New Network Artichitecture / 9.5: |
Glossary |
Bibliography |
Solutions to Selected Exercises |
Index |
About the Authors |
Foreword |
Foreword to the First Edition |
Preface / Chapter 1: |