9 О JYL PUTER SIXTH EDITION NETWORKING А Тор-Down Approach JAMES F. KUROSE University of Massachusetts, Amherst KEITH W. ROSS Polytechnic Institute of NYU International Edition contributions by Goutam Paul Jadavpur University, Kolkata PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Säo Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
9 О JYL P U T E R SIXTH EDITION
NETWORKING А Тор-Down Approach
J A M E S F. K U R O S E University of Massachusetts, Amherst
KEITH W. R O S S Polytechnic Institute of NYU
International Edition contributions by Goutam Paul Jadavpur University, Kolkata
PEARSON
Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto
Delhi Mexico City Säo Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
С О JYl PUTER SIXTH EDITION
NETWORKING A Top-Down Approach
J A M E S F. K U R O S E University of Massachusetts, Amherst
KEITH W. R O S S Polytechnic Institute of NYU
International Edition contributions by Goutam Paul Jadavpur University, Kolkata
PEARSON
Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto
Delhi Mexico City Säo Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Table of Contents
Computer Networks and the Internet l.i
1.2
1.3
1.4
1.5
1.6 1.7
1.8
What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? The Network Edge 1.2.1 Access Networks 1.2.2 Physical Media The Network Core 1.3.1 Packet S witching 1.3.2 Circuit Switching 1.3.3 A Network of Networks Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-Switched Networks 1.4.2 Queuing Delay and Packet Loss 1.4.3 End-to-End Delay 1.4.4 Throughput in Computer Networks Protocol Layers and Their Service Models 1.5.1 Layered Architecture 1.5.2 Encapsulation Networks Under Attack History of Computer Networking and the Internet 1.7.1 The Development of Packet Switching: 1961-1972 1.7.2 Proprietary Networks and Internetworking: 1972-1980 1.7.3 A Proliferation of Networks: 1980-1990 1.7.4 The Internet Explosion: The 1990s 1.7.5 The New Millennium Summary
Homework Problems and Questions Wireshark Lab Interview: Leonard Kleinrock
Chapter 2 Application Layer 109 2.1 Principles of Network Applications ПО
2.1.1 Network Application Architectures 112 2.1.2 Processes Communicating 114 2.1.3 Transport Services Available to Applications 117 2.1.4 Transport Services Provided by the Internet 119 2.1.5 Application-Layer Protocols 122 2.1.6 Network Applications Covered in This Book 123
2.2 The Web and HTTP 124 2.2.1 Overview of HTTP 124 2.2.2 Non-Persistent and Persistent Connections 126 2.2.3 HTTP Message Format 129 2.2.4 User-Server Interaction: Cookies 134 2.2.5 Web Caching 136 2.2.6 The Conditional GET 140
3.4 Principles of Reliable Data Transfer 230 3.4.1 Building a Reliable Data Transfer Protocol 232 3.4.2 Pipelined Reliable Data Transfer Protocols 241 3.4.3 Go-Back-N (GBN) 244 3.4.4 Selective Repeat (SR) 249
3.5 Connection-Oriented Transport: TCP 256 3.5.1 The TCP Connection 257 3.5.2 TCP Segment Structure 259 3.5.3 Round-Trip Time Estimation and Timeout 264 3.5.4 Reliable Data Transfer 268 3.5.5 Flow Control 276 3.5.6 TCP Connection Management 278
3.6 Principles of Congestion Control 285 3.6.1 The Causes and the Costs of Congestion 285 3.6.2 Approaches to Congestion Control 291 3.6.3 Network-Assisted Congestion-Control Example:
ATM ABR Congestion Control 292 3.7 TCP Congestion Control 295
Chapter 4 The Network Layer 331 4.1 Introduction 332
4.1.1 Forwarding and Routing 334 4.1.2 Network Service Models 336
4.2 Virtual Circuit and Datagram Networks 339 4.2.1 Virtual-Circuit Networks 340 4.2.2 Datagram Networks 343 4.2.3 Origins of VC and Datagram Networks 345
20 Table of Contents
4.3 What's Inside a Router? 346 4.3.1 Input Processing 348 4.3.2 Switching 350 4.3.3 Output Processing 352 4.3.4 Where Does Queuing Occur? 353 4.3.5 The Routing Control Plane 357
4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet 357 4.4.1 Datagram Format 358 4.4.2 IPv4 Addressing 364 4.4.3 Internet Control Message Protocol (ICMP) 379 4.4.4 IPv6 382 4.4.5 A Brief Foray into IP Security 388
4.6 Routing in the Internet 409 4.6.1 Intra-AS Routing in the Internet: RIP 410 4.6.2 Intra-AS Routing in the Internet: OSPF 414 4.6.3 Inter-AS Routing: BGP 416
5.3 Multiple Access Links and Protocols 471 5.3.1 Channel Partitioning Protocols 474 5.3.2 Random Access Protocols 475 5.3.3 Taking-Turns Protocols 485 5.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access 486
Table of Contents 21
5.4 Switched Local Area Networks 487 5.4.1 Link-Layer Addressing and ARP 488 5.4.2 Ethernet 495 5.4.3 Link-Layer Switches 502 5.4.4 Virtual Local Area Networks (VLANs) 508
5.5 Link Virtualization: A Network as a Link Layer 512 5.5.1 Multiprotocol Label Switching (MPLS) 513
5.6 Data Center Networking 516 5.7 Retrospective: A Day in the Life of a Web Page Request 521
5.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 521 5.7.2 Still Getting Started: DNS and ARP 523 5.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server 524 5.7.4 Web Client-Server Interaction: TCP and HTTP 525
5.8 Summary 526 Homework Problems and Questions 528 Wireshark Labs: Ethernet and ARP, DHCP 536 Interview: Simon S. Lam 537
Chapter 6 Wireless and Mobile Networks 539 ff.l Introduction 540 6.2 Wireless Links and Network Characteristics 545
6.2.1 CDMA 548 6.3 WiFi: 802.11 Wireless LANs 552
6.3.1 The 802.11 Architecture 553 6.3.2 The 802.11 MAC Protocol 557 6.3.3 The IEEE 802.11 Frame 563 6.3.4 Mobility in the Same IP Subnet 567 6.3.5 Advanced Features in 802.11 568 6.3.6 Personal Area Networks: Bluetooth and Zigbee 570
6.4 Cellular Internet Access 572 6.4.1 An Overview of Cellular Network Architecture 573 6.4.2 3G Cellular Data Networks: Extending the Internet to Cellular
Subscribers 576 6.4.3 On to 4G: LTE 579
6.5 Mobility Management: Principles 581 6.5.1 Addressing 583 6.5.2 Routing to a Mobile Node 585
6.6 Mobile IP 590 6.7 Managing Mobility in Cellular Networks 596
6.7.1 Routing Calls to a Mobile User 597 6.7.2 Handoffs in GSM 598
22 Table of Contents
6.8 Wireless and Mobility: Impact on Higher-Layer Protocols 601 6.9 Summary 604 Homework Problems and Questions 604 Wireshark Lab: IEEE 802.11 (WiFi) 609 Interview: Deborah Estrin 610
7.2.3 Adaptive Streaming and DASH 626 7.2.4 Content Distribution Networks 628 7.2.5 Case Studies: Netflix, YouTube, and Kankan 634
7.3 Voice-over-IP 638 7.3.1 Limitations of the Best-Effort IP Service 638 7.3.2 Removing Jitter at the Receiver for Audio 640 7.3.3 Recovering from Packet Loss 643 7.3.4 Case Study: VoIP with Skype 646
8.9 Operational Security: Firewalls and Intrusion Detection Systems 757 8.9.1 Firewalls ' 757 8.9.2 Intrusion Detection Systems 765
8.10 Summary 768 Homework Problems and Questions 770 Wireshark Lab: SSL 778 IPsec Lab 778 Interview: Steven M. Bellovin 779
Chapter 9 Network Management 781 9.1 What Is Network Management? 782 9.2 The Infrastructure for Network Management 786 9.3 The Internet-Standard Management Framework 790
9.3.1 Structure of Management Information: SMI 792 9.3.2 Management Information Base: MIB 796
24 Table of Contents
9.3.3 SNMP Protocol Operations and Transport Mappings 798 9.3.4 Security and Administration 801
9.4 ASN.l 804 9.5 Conclusion 809 Homework Problems and Questions 809 Interview: Jennifer Rexford 812