Details

Advanced Internet Protocols, Services, and Applications


Advanced Internet Protocols, Services, and Applications


1. Aufl.

von: Eiji Oki, Roberto Rojas-Cessa, Mallikarjun Tatipamula, Christian Vogt

98,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 15.02.2012
ISBN/EAN: 9781118180808
Sprache: englisch
Anzahl Seiten: 260

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. <p>This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.</p>
<p>Preface xi</p> <p>Acknowledgments xv</p> <p>About the Authors xvii</p> <p><b>1 Transmission Control Protocol/Internet Protocol Overview 1</b></p> <p>1.1 Fundamental Architecture / 1</p> <p>1.2 Internet Protocol Basics / 4</p> <p>1.2.1 Packet Header / 5</p> <p>1.2.2 Internet Protocol Address / 7</p> <p>1.2.3 Internet Protocol Classification / 7</p> <p>1.2.4 Subnet and its Masking / 9</p> <p>1.2.5 Subnet Calculation / 11</p> <p>1.3 Routing / 13</p> <p>1.3.1 Routing across Providers / 14</p> <p>1.3.2 Routing within Edge Networks / 15</p> <p>1.3.3 Routing Scalability / 16</p> <p>References / 18</p> <p><b>2 Transport-Layer Protocols 19</b></p> <p>2.1 Transmission Control Protocol / 19</p> <p>2.1.1 Transmission Control Protocol Header Structure / 19</p> <p>2.1.2 Three-Way Handshake / 20</p> <p>2.1.3 Transmission Control Protocol Flow Control and Congestion Control / 21</p> <p>2.1.4 Port Number / 24</p> <p>2.2 User Datagram Protocol / 25</p> <p>2.2.1 User Datagram Protocol Header Structure / 25</p> <p>2.3 Stream Control Transmission Protocol / 26</p> <p>2.3.1 Stream Control Transmission Protocol Packet Structure / 26</p> <p>2.3.2 Security: Prevention of SYN Attacks / 27</p> <p>2.4 Real-Time Transport Protocol / 29</p> <p>2.4.1 Real-Time Transport Protocol Header Structure / 29</p> <p>References / 30</p> <p><b>3 Internet Architecture 31</b></p> <p>3.1 Internet Exchange Point / 31</p> <p>3.2 History of Internet Exchange Points / 33</p> <p>3.3 Internet Service Provider Interconnection Relationships / 34</p> <p>3.4 Peering and Transit / 35</p> <p>References / 37</p> <p><b>4 IP Routing Protocols 39</b></p> <p>4.1 Overview of Routing Protocols / 40</p> <p>4.1.1 Interior Gateway Protocol / 41</p> <p>4.1.2 Exterior Gateway Protocol / 42</p> <p>4.2 Routing Information Protocol / 43</p> <p>4.2.1 Routing Information Protocol Header Format / 43</p> <p>4.2.2 Update of Routing Table in Routing Information Protocol / 44</p> <p>4.2.3 Maintenance of Routing Table in Routing Information Protocol / 46</p> <p>4.2.4 Split Horizon / 47</p> <p>4.2.5 Limitations of Routing Information Protocol / 47</p> <p>4.3 Open Shortest Path First / 48</p> <p>4.3.1 Shortest-Path Algorithm / 48</p> <p>4.3.2 Hierarchical Routing / 51</p> <p>4.3.3 Open Shortest Path First Packet Format / 51</p> <p>4.3.4 Comparison of Routing Information Protocol and Open Shortest Path First / 52</p> <p>4.4 Border Gateway Protocol / 53</p> <p>4.4.1 Border Gateway Protocol Message Flows / 53</p> <p>4.4.2 Border Gateway Protocol Policy Selection Attributes / 54</p> <p>References / 57</p> <p><b>5 Multiprotocol Label Switching 59</b></p> <p>5.1 Overview / 59</p> <p>5.2 Functions and Mechanisms / 63</p> <p>5.3 Applicabilities / 67</p> <p>References / 72</p> <p><b>6 IP Quality Of Service 75</b></p> <p>6.1 Introduction / 75</p> <p>6.2 Quality of Service in IP Version 4 / 75</p> <p>6.3 Integrated Services / 77</p> <p>6.3.1 Packet Scheduler / 77</p> <p>6.3.2 Packet Classifier / 77</p> <p>6.3.3 Admission Control / 78</p> <p>6.3.4 Resource Reservation Protocol (RSVP) / 79</p> <p>6.4 Differentiated Services / 81</p> <p>6.5 Quality Of Service with Nested Differentiated Services Levels / 82</p> <p>6.5.1 Drawbacks of Explicit Endpoint Admission Control with Path Selection / 84</p> <p>6.5.2 OSPF-Based Adaptive and Flexible Quality of Service Provisioning / 85</p> <p>6.5.3 Combination of Security and Quality of Service / 86</p> <p>6.5.4 Path Selection Algorithm Analysis / 87</p> <p>References / 90</p> <p><b>7 IP Multicast and Anycast 93</b></p> <p>7.1 Addressing / 93</p> <p>7.1.1 Multicast Addressing / 93</p> <p>7.1.2 Differences between Multicasting and Multiple Unicasting / 95</p> <p>7.2 Multicast Routing / 96</p> <p>7.2.1 Optimal Routing: Shortest-Path Trees / 96</p> <p>7.2.2 Unicast Routing / 96</p> <p>7.2.3 Multicast Routing / 96</p> <p>7.3 Routing Protocols / 97</p> <p>7.3.1 Multicast Open Shortest Path First (MOSPF) / 98</p> <p>7.3.2 Distance Vector Multicast Routing Protocol / 99</p> <p>7.3.3 Core-Based Tree (CBT) Protocol / 100</p> <p>7.3.4 Protocol-Independent Multicast / 101</p> <p>7.3.5 Simple Multicast Routing Protocol / 101</p> <p>7.4 Anycasting / 102</p> <p>7.4.1 Architectural Issues / 103</p> <p>7.4.2 Anycast Addresses / 103</p> <p>7.4.3 Differences between the Services Offered by IP Multicasting and IP Anycasting / 104</p> <p>7.5 IPv6 Anycast Routing Protocol: Protocol-Independent Anycast—Sparse Mode / 105</p> <p>References / 106</p> <p><b>8 Layer-2 Transport over Packet 109</b></p> <p>8.1 Draft-Martini Signaling and Encapsulation / 109</p> <p>8.1.1 Functionality / 110</p> <p>8.1.2 Encapsulation / 110</p> <p>8.1.3 Protocol-Specific Encapsulation / 111</p> <p>8.2 Layer-2 Tunneling Protocol / 114</p> <p>8.2.1 Layer-2 Tunneling Protocol Version 3 / 115</p> <p>8.2.2 Pseudowire Emulation Edge to Edge / 118</p> <p>References / 121</p> <p><b>9 Virtual Private Wired Service 123</b></p> <p>9.1 Types of Private Wire Services / 123</p> <p>9.1.1 Layer-2 Virtual Private Services: Wide Area Networks and Local Area Networks / 124</p> <p>9.1.2 Virtual Private Wire Service / 126</p> <p>9.1.3 Virtual Private Multicast Service / 127</p> <p>9.1.4 IP-Only Layer-2 Virtual Private Network / 128</p> <p>9.1.5 Internet Protocol Security / 129</p> <p>9.2 Generic Routing Encapsulation / 130</p> <p>9.3 Layer-2 Tunneling Protocol / 131</p> <p>9.4 Layer-3 Virtual Private Network 2547bis, Virtual Router / 131</p> <p>9.4.1 Virtual Router Redundancy Protocol / 133</p> <p>References / 136</p> <p><b>10 IP and Optical Networking 137</b></p> <p>10.1 IP/Optical Network Evolution / 138</p> <p>10.1.1 Where Networking Is Today / 138</p> <p>10.1.2 Where Networking Is Going / 139</p> <p>10.2 Challenges in Legacy Traditional IP/Optical Networks / 140</p> <p>10.2.1 Proprietary Network Management Systems / 140</p> <p>10.2.2 Complexity of Provisioning in Legacy IP/Optical Networks / 141</p> <p>10.3 Automated Provisioning in IP/Optical Networks / 142</p> <p>10.4 Control Plane Models for IP/Optical Networking / 144</p> <p>10.4.1 Optical Internetworking Forum’s Optical User Network Interface: Overlay Model / 145</p> <p>10.4.2 Internet EngineeringTask Force’s Generalized Multiprotocol Label Switching: Peer Model / 145</p> <p>10.5 Next-Generation MultiLayer Network Design Requirements / 147</p> <p>10.6 Benefits and Challenges in IP/Optical Networking / 148</p> <p>References / 149</p> <p><b>11 IP Version 6 151</b></p> <p>11.1 Addresses in IP Version 6 / 152</p> <p>11.1.1 Unicast IP Addresses / 152</p> <p>11.1.2 Multicast IP Addresses / 153</p> <p>11.2 IP Packet Headers / 154</p> <p>11.3 IP Address Resolution / 155</p> <p>11.4 IP Version 6 Deployment: Drivers and Impediments / 156</p> <p>11.4.1 Need for Backwards Compatibility / 157</p> <p>11.4.2 Initial Deployment Drivers / 158</p> <p>11.4.3 Reaching a Critical Mass / 160</p> <p>References / 161</p> <p><b>12 IP Traffic Engineering 163</b></p> <p>12.1 Models of Traffic Demands / 163</p> <p>12.2 Optimal Routing with Multiprotocol Label Switching / 165</p> <p>12.2.1 Overview / 165</p> <p>12.2.2 Applicability of Optimal Routing / 165</p> <p>12.2.3 Network Model / 166</p> <p>12.2.4 Optimal Routing Formulations with Three Models / 166</p> <p>12.3 Link-Weight Optimization with Open Shortest Path First / 169</p> <p>12.3.1 Overview / 169</p> <p>12.3.2 Examples of Routing Control with Link Weights / 170</p> <p>12.3.3 Link-Weight Setting Against Network Failure / 172</p> <p>12.4 Extended Shortest-Path-Based Routing Schemes / 173</p> <p>12.4.1 Smart–Open Shortest Path First / 174</p> <p>12.4.2 Two-Phase Routing / 174</p> <p>12.4.3 Fine Two-Phase Routing / 176</p> <p>12.4.4 Features of Routing Schemes / 177</p> <p>References / 177</p> <p><b>13 IP Network Security 181</b></p> <p>13.1 Introduction / 181</p> <p>13.2 Detection of Denial-of-Service Attack / 182</p> <p>13.2.1 Backscatter Analysis / 182</p> <p>13.2.2 Multilevel Tree or Online Packet Statistics / 184</p> <p>13.3 IP Traceback / 187</p> <p>13.3.1 IP Traceback Solutions / 189</p> <p>13.4 Edge Sampling Scheme / 189</p> <p>13.5 Advanced Marking Scheme / 193</p> <p>References / 196</p> <p><b>14 Mobility Support for IP 197</b></p> <p>14.1 Mobility Management Approaches / 199</p> <p>14.1.1 Host Routes / 200</p> <p>14.1.2 Tunneling / 201</p> <p>14.1.3 Route Optimization / 203</p> <p>14.2 Security Threats Related to IP Mobility / 205</p> <p>14.2.1 Impersonation / 205</p> <p>14.2.2 Redirection-Based Flooding / 208</p> <p>14.2.3 Possible Solutions / 210</p> <p>14.3 Mobility Support in IPv6 / 213</p> <p>14.4 Reactive Versus Proactive Mobility Support / 218</p> <p>14.5 Relation to Multihoming / 219</p> <p>14.6 Protocols Supplementing Mobility / 220</p> <p>14.6.1 Router and Subnet Prefix Discovery / 220</p> <p>14.6.2 Movement Detection / 221</p> <p>14.6.3 IP Address Configuration / 222</p> <p>14.6.4 Neighbor Unreachability Detection / 223</p> <p>14.6.5 Internet Control Message Protocol for IP Version 6 / 224</p> <p>14.6.6 Optimizations / 224</p> <p>14.6.7 Media-Independent Handover Services / 227</p> <p>References / 231</p> <p>Index 235</p>
<p><b>EIJI OKI, P<small>H</small>D,</b> is an Associate Professor at the University of Electro-Communications in Tokyo and was the recipient of the IEEE's 2001 Asia-Pacific Outstanding Young Researcher Award. <p><b>ROBERTO ROJAS-CESSA, P<small>H</small>D,</b> is an Associate Professor in the Department of Electrical and Computer Engineering at New Jersey Institute of Technology. <p><b>MALLIKARJUN TATIPAMULA, P<small>H</small>D,</b> is Head of Packet Technologies Research at Ericsson Silicon Valley. He has over twenty years of experience in the telecommunications/networking industry, with more than 100 published papers and patents. <p><b>CHRISTIAN VOGT</b> is a Senior Marketing Manager at Ericsson Silicon Valley.
<p>Explains how advanced Internet protocols will support the next-generation networks <p>Most messages or transactions sent over the web are dependent on an infrastructure based on advanced Internet protocols. These protocols ensure that public and private networks operate at maximum performance, security, and flexibility. <p><i>Advanced Internet Protocols, Services, and Applications</i> fully examines all the core concepts underlying advanced Internet protocols, explaining both their current applications and their applicability to the design and deployment of the next-generation networks. The book begins with an introduction to Internet working technologies, architectures, and protocols and then progressively builds to discussions of new and emerging advanced Internet protocols and their applications. Key topics include: <ul> <li>Transport layer protocols, including transmission control, user datagram, stream control transmission, and real-time transport protocols</li> <li>Internet architecture and routing protocols</li> <li>Layer-2 encapsulation protocols that allow Layer-2 connectivity through non-adjacent networks</li> <li>Point-to-point virtual connectivity and virtual broadcast access connectivity</li> <li>Key differences between IPv4 and IPv6</li> <li>Common threats to networks and countermeasures to protect them</li> </ul> <p>With its comprehensive technical overview, survey of advanced Internet protocols, and examples of real-world networks, services, and applications, this is an ideal book for both students and professionals in software, hardware, systems engineering, telecommunications, and networking.

Diese Produkte könnten Sie auch interessieren:

From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
von: Thierry Priol, Marco Vanneschi
PDF ebook
96,29 €
Grid Computing
Grid Computing
von: Sergei Gorlatch, Paraskevi Fragopoulou, Thierry Priol
PDF ebook
149,79 €
Autonomic Communication
Autonomic Communication
von: Athanasios V. Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
PDF ebook
149,79 €