Cover
Copyright
Brief Contents
Contents
Preface
Part 1: Introduction and Underlying Technologies
1: Introduction
1.1 A BRIEF HISTORY
1.2 PROTOCOLS AND STANDARDS
1.3 STANDARDS ORGANIZATIONS
1.4 INTERNET STANDARDS
1.5 INTERNET ADMINISTRATION
1.6 FURTHER READING
1.7 KEY TERMS
1.8 SUMMARY
1.9 PRACTICE SET
2: The OSI Model and the TCP/IP Protocol Suite
2.1 PROTOCOL LAYERS
2.2 THE OSI MODEL
2.3 TCP/IP PROTOCOL SUITE
2.4 ADDRESSING
2.5 FURTHER READING
2.6 KEY TERMS
2.7 SUMMARY
2.8 PRACTICE SET
3: Underlying Technologies
3.1 WIRED LOCAL AREA NETWORKS
3.2 WIRELESS LANS
3.3 POINT-TO-POINT WANS
3.4 SWITCHED WANS
3.5 CONNECTING DEVICES
3.6 FURTHER READING
3.7 KEY TERMS
3.8 SUMMARY
3.9 PRACTICE SET
Part 2: Network Layer
4: Introduction to Network Layer
4.1 INTRODUCTION
4.2 SWITCHING
4.3 PACKET SWITCHING AT NETWORK LAYER
4.4 NETWORK LAYER SERVICES
4.5 OTHER NETWORK LAYER ISSUES
4.6 FURTHER READING
4.7 KEY TERMS
4.8 SUMMARY
4.9 PRACTICE SET
5: IPv4 Addresses
5.1 INTRODUCTION
5.2 CLASSFUL ADDRESSING
5.3 CLASSLESS ADDRESSING
5.4 SPECIAL ADDRESSES
5.5 NAT
5.6 FURTHER READING
5.7 KEY TERMS
5.8 SUMMARY
5.9 PRACTICE SET
6: Delivery and Forwarding of IP Packets
6.1 DELIVERY
6.2 FORWARDING
6.3 STRUCTURE OF A ROUTER
6.4 FURTHER READING
6.5 KEY TERMS
6.6 SUMMARY
6.7 PRACTICE SET
7: Internet Protocol Version 4 (IPv4)
7.1 INTRODUCTION
7.2 DATAGRAMS
7.3 FRAGMENTATION
7.4 OPTIONS
7.5 CHECKSUM
7.6 IP OVER ATM
7.7 SECURITY
7.8 IP PACKAGE
7.9 FURTHER READING
7.10 KEY TERMS
7.11 SUMMARY
7.12 PRACTICE SET
8: Address Resolution Protocol (ARP)
8.1 ADDRESS MAPPING
8.2 THE ARP PROTOCOL
8.3 ATMARP
8.4 ARP PACKAGE
8.5 FURTHER READING
8.6 KEY TERMS
8.7 SUMMARY
8.8 PRACTICE SET
9: Internet Control Message Protocol Version 4 (ICMPv4)
9.1 INTRODUCTION
9.2 MESSAGES
9.3 DEBUGGING TOOLS
9.4 ICMP PACKAGE
9.5 FURTHER READING
9.6 KEY TERMS
9.7 SUMMARY
9.8 PRACTICE SET
10: Mobile IP
10.1 ADDRESSING
10.2 AGENTS
10.3 THREE PHASES
10.4 INEFFICIENCY IN MOBILE IP
10.5 FURTHER READING
10.6 KEY TERMS
10.7 SUMMARY
10.8 PRACTICE SET
11: Unicast Routing Protocols (RIP, OSPF,and BGP)
11.1 INTRODUCTION
11.2 INTRA- AND INTER-DOMAIN ROUTING
11.3 DISTANCE VECTOR ROUTING
11.4 RIP
11.5 LINK STATE ROUTING
11.6 OSPF
11.7 PATH VECTOR ROUTING
11.8 BGP
11.9 FURTHER READING
11.10 KEY TERMS
11.11 SUMMARY
11.12 PRACTICE SET
12: Multicasting and Multicast Routing Protocols
12.1 INTRODUCTION
12.2 MULTICAST ADDRESSES
12.3 IGMP
12.4 MULTICAST ROUTING
12.5 ROUTING PROTOCOLS
12.6 MBONE
12.7 FURTHER READING
12.8 KEY TERMS
12.9 SUMMARY
12.10 PRACTICE SET
Part 3: Transport Layer
13: Introduction to the Transport Layer
13.1 TRANSPORT-LAYER SERVICES
13.2 TRANSPORT-LAYER PROTOCOLS
13.3 FURTHER READING
13.4 KEY TERMS
13.5 SUMMARY
13.6 PRACTICE SET
14: User Datagram Protocol (UDP)
14.1 INTRODUCTION
14.2 USER DATAGRAM
14.3 UDP SERVICES
14.4 UDP APPLICATIONS
14.5 UDP PACKAGE
14.6 FURTHER READING
14.7 KEY TERMS
14.8 SUMMARY
14.9 PRACTICE SET
15: Transmission Control Protocol (TCP)
15.1 TCP SERVICES
15.2 TCP FEATURES
15.3 SEGMENT
15.4 A TCP CONNECTION
15.5 STATE TRANSITION DIAGRAM
15.6 WINDOWS IN TCP
15.7 FLOW CONTROL
15.8 ERROR CONTROL
15.9 CONGESTION CONTROL
15.10 TCP TIMERS
15.11 OPTIONS
15.12 TCP PACKAGE
15.13 FURTHER READING
15.14 KEY TERMS
15.15 SUMMARY
15.16 PRACTICE SET
16: Stream Control Transmission Protocol (SCTP)
16.1 INTRODUCTION
16.2 SCTP SERVICES
16.3 SCTP FEATURES
16.4 PACKET FORMAT
16.5 AN SCTP ASSOCIATION
16.6 STATE TRANSITION DIAGRAM
16.7 FLOW CONTROL
16.8 ERROR CONTROL
16.9 CONGESTION CONTROL
16.10 FURTHER READING
16.11 KEY TERMS
16.12 SUMMARY
16.13 PRACTICE SET
Part 4: Application Layer
17: Introduction to the Application Layer
17.1 CLIENT-SERVER PARADIGM
17.2 PEER-TO-PEER PARADIGM
17.3 FURTHER READING
17.4 KEY TERMS
17.5 SUMMARY
17.6 PRACTICE SET
18: Host Configuration: DHCP
18.1 INTRODUCTION
18.2 DHCP OPERATION
18.3 CONFIGURATION
18.4 FURTHER READING
18.5 KEY TERMS
18.6 SUMMARY
18.7 PRACTICE SET
19: Domain Name System (DNS)
19.1 NEED FOR DNS
19.2 NAME SPACE
19.3 DNS IN THE INTERNET
19.4 RESOLUTION
19.5 DNS MESSAGES
19.6 TYPES OF RECORDS
19.7 COMPRESSION
19.8 ENCAPSULATION
19.9 REGISTRARS
19.10 DDNS
19.11 SECURITY OF DNS
19.12 FURTHER READING
19.13 KEY TERMS
19.14 SUMMARY
19.15 PRACTICE SET
20: Remote Login: TELNET and SSH
20.1 TELNET
20.2 SECURE SHELL (SSH)
20.3 FURTHER READING
20.4 KEY TERMS
20.5 SUMMARY
20.6 PRACTICE SET
21: File Transfer: FTP and TFTP
21.1 FTP
21.2 TFTP
21.3 FURTHER READING
21.4 KEY TERMS
21.5 SUMMARY
21.6 PRACTICE SET
22: World Wide Web and HTTP
22.1 ARCHITECTURE
22.2 WEB DOCUMENTS
22.3 HTTP
22.4 FURTHER READING
22.5 KEY TERMS
22.6 SUMMARY
22.7 PRACTICE SET
23: Electronic Mail: SMTP, POP, IMAP, and MIME
23.1 ARCHITECTURE
23.2 USER AGENT
23.3 MESSAGE TRANSFER AGENT: SMTP
23.4 MESSAGE ACCESS AGENT: POP AND IMAP
23.5 MIME
23.6 WEB-BASED MAIL
23.7 E-MAIL SECURITY
23.8 FURTHER READING
23.9 KEY TERMS
23.10 SUMMARY
23.11 PRACTICE SET
24: Network Management: SNMP
24.1 CONCEPT
24.2 MANAGEMENT COMPONENTS
24.3 SMI
24.4 MIB
24.5 SNMP
24.6 UDP PORTS
24.7 SECURITY
24.8 FURTHER READING
24.9 KEY TERMS
24.10 SUMMARY
24.11 PRACTICE SET
25: Multimedia
25.1 INTRODUCTION
25.2 DIGITIZING AUDIO AND VIDEO
25.3 AUDIO AND VIDEO COMPRESSION
25.4 STREAMING STORED AUDIO/VIDEO
25.5 STREAMING LIVE AUDIO/VIDEO
25.6 REAL-TIME INTERACTIVE AUDIO/VIDEO
25.7 RTP
25.8 RTCP
25.9 VOICE OVER IP
25.10 QUALITY OF SERVICE
25.11 INTEGRATED SERVICES
25.12 DIFFERENTIATED SERVICES
25.13 RECOMMENDED READING
25.14 KEY TERMS
25.15 SUMMARY
25.16 PRACTICE SET
Part 5: Next Generation
26: IPv6 Addressing
26.1 INTRODUCTION
26.2 ADDRESS SPACE ALLOCATION
26.3 GLOBAL UNICAST ADDRESSES
26.4 AUTOCONFIGURATION
26.5 RENUMBERING
26.6 FURTHER READING
26.7 KEY TERMS
26.8 SUMMARY
26.9 PRACTICE SET
27: IPv6 Protocol
27.1 INTRODUCTION
27.2 PACKET FORMAT
27.3 TRANSITION FROM IPv4 TO IPv6
27.4 FURTHER READING
27.5 KEY TERMS
27.6 SUMMARY
27.7 PRACTICE SET
28: ICMPv6
28.1 INTRODUCTION
28.2 ERROR MESSAGES
28.3 INFORMATIONAL MESSAGES
28.4 NEIGHBOR-DISCOVERY MESSAGES
28.5 GROUP MEMBERSHIP MESSAGES
28.6 FURTHER READING
28.7 KEY TERMS
28.8 SUMMARY
28.9 PRACTICE SET
Part 6: Security
29: Cryptography and Network Security
29.1 INTRODUCTION
29.2 TRADITIONAL CIPHERS
29.3 MODERN CIPHERS
29.4 ASYMMETRIC-KEY CIPHERS
29.5 MESSAGE INTEGRITY
29.6 MESSAGE AUTHENTICATION
29.7 DIGITAL SIGNATURE
29.8 ENTITY AUTHENTICATION
29.9 KEY MANAGEMENT
29.10 FURTHER READING
29.11 KEY TERMS
29.12 SUMMARY
29.13 PRACTICE SET
30: Internet Security
30.1 NETWORK LAYER SECURITY
30.2 TRANSPORT LAYER SECURITY
30.3 APPLICATION LAYER SECURITY
30.4 FIREWALLS
30.5 RECOMMENDED READING
30.6 KEY TERMS
30.7 SUMMARY
30.8 PRACTICE SET
Part 7: Appendices
Appendix A: Unicode
Appendix B: Positional Numbering Systems
Appendix C: Error Detection Codes
Appendix D: Checksum
Appendix E: HTML, XHTML, XML, and XSL
Appendix F: Client-Server Programming in Java
Appendix G: Miscellaneous Information
Glossary
References
Index