Description
Efnisyfirlit
- Half Title
- Title Page
- Copyright
- Dedication
- Contents
- Preface
- 1. Introduction
- 1.1 Uses of Computer Networks
- 1.1.1 Access to Information
- 1.1.2 Person-to-Person Communication
- 1.1.3 Electronic Commerce
- 1.1.4 Entertainment
- 1.1.5 The Internet of Things
- 1.2 Types of Computer Networks
- 1.2.1 Broadband Access Networks
- 1.2.2 Mobile and Wireless Access Networks
- 1.2.3 Content Provider Networks
- 1.2.4 Transit Networks
- 1.2.5 Enterprise Networks
- 1.3 Network Technology, from Local to Global
- 1.3.1 Personal Area Networks
- 1.3.2 Local Area Networks
- 1.3.3 Home Networks
- 1.3.4 Metropolitan Area Networks
- 1.3.5 Wide Area Networks
- 1.3.6 Internetworks
- 1.4 Examples of Networks
- 1.4.1 The Internet
- 1.4.2 Mobile Networks
- 1.4.3 Wireless Networks (WiFi)
- 1.5 Network Protocols
- 1.5.1 Design Goals
- 1.5.2 Protocol Layering
- 1.5.3 Connections and Reliability
- 1.5.4 Service Primitives
- 1.5.5 The Relationship of Services to Protocols
- 1.6 Reference Models
- 1.6.1 The OSI Reference Model
- 1.6.2 The TCP/IP Reference Model
- 1.6.3 A Critique of the OSI Model and Protocols
- 1.6.4 A Critique of the TCP/IP Reference Model and Protocols
- 1.6.5 The Model Used in This Book
- 1.7 Standardization
- 1.7.1 Standardization and Open Source
- 1.7.2 Who’s Who in the Telecommunications World
- 1.7.3 Who’s Who in the International Standards World
- 1.7.4 Who’s Who in the Internet Standards World
- 1.8 Policy, Legal, and Social Issues
- 1.8.1 Online Speech
- 1.8.2 Net Neutrality
- 1.8.3 Security
- 1.8.4 Privacy
- 1.8.5 Disinformation
- 1.9 Metric Units
- 1.10 Outline of the Rest of the Book
- 1.11 Summary
- 2. The Physical Layer
- 2.1 Guided Transmission Media
- 2.1.1 Persistent Storage
- 2.1.2 Twisted Pairs
- 2.1.3 Coaxial Cable
- 2.1.4 Power Lines
- 2.1.5 Fiber Optics
- 2.2 Wireless Transmission
- 2.2.1 The Electromagnetic Spectrum
- 2.2.2 Frequency Hopping Spread Spectrum
- 2.2.3 Direct Sequence Spread Spectrum
- 2.2.4 Ultra-Wideband Communication
- 2.3 Using the Spectrum for Transmission
- 2.3.1 Radio Transmission
- 2.3.2 Microwave Transmission
- 2.3.3 Infrared Transmission
- 2.3.4 Light Transmission
- 2.4 From Waveforms to Bits
- 2.4.1 The Theoretical Basis for Data Communication
- 2.4.2 The Maximum Data Rate of a Channel
- 2.4.3 Digital Modulation
- 2.4.4 Multiplexing
- 2.5 The Public Switched Telephone Network
- 2.5.1 Structure of the Telephone System
- 2.5.2 The Local Loop: Telephone Modems, ADSL, and Fiber
- 2.5.3 Trunks and Multiplexing
- 2.5.4 Switching
- 2.6 Cellular Networks
- 2.6.1 Common Concepts: Cells, Handoff, Paging
- 2.6.2 First-Generation (1G) Technology: Analog Voice
- 2.6.3 Second-Generation (2G) Technology: Digital Voice
- 2.6.4 GSM: The Global System for Mobile Communications
- 2.6.5 Third-Generation (3G) Technology: Digital Voice and Data
- 2.6.6 Fourth-Generation (4G) Technology: Packet Switching
- 2.6.7 Fifth-Generation (5G) Technology
- 2.7 Cable Networks
- 2.7.1 A History of Cable Networks: Community Antenna Television
- 2.7.2 Broadband Internet Access Over Cable: HFC Networks
- 2.7.3 DOCSIS
- 2.7.4 Resource Sharing in DOCSIS Networks: Nodes and Minislots
- 2.8 Communication Satellites
- 2.8.1 Geostationary Satellites
- 2.8.2 Medium-Earth Orbit Satellites
- 2.8.3 Low-Earth Orbit Satellites
- 2.9 Comparing Different Access Networks
- 2.9.1 Terrestrial Access Networks: Cable, Fiber, and ADSL
- 2.9.2 Satellites Versus Terrestrial Networks
- 2.10 Policy at the Physical Layer
- 2.10.1 Spectrum Allocation
- 2.10.2 The Cellular Network
- 2.10.3 The Telephone Network
- 2.11 Summary
- 3. The Data Link Layer
- 3.1 Data Link Layer Design Issues
- 3.1.1 Services Provided to the Network Layer
- 3.1.2 Framing
- 3.1.3 Error Control
- 3.1.4 Flow Control
- 3.2 Error Detection and Correction
- 3.2.1 Error-Correcting Codes
- 3.2.2 Error-Detecting Codes
- 3.3 Elementary Data Link Protocols
- 3.3.1 Initial Simplifying Assumptions
- 3.3.2 Basic Transmission and Receipt
- 3.3.3 Simplex Link-Layer Protocols
- 3.4 Improving Efficiency
- 3.4.1 Goal: Bidirectional Transmission, Multiple Frames in Flight
- 3.4.2 Examples of Full-Duplex, Sliding Window Protocols
- 3.5 Data Link Protocols in Practice
- 3.5.1 Packet over SONET
- 3.5.2 ADSL (Asymmetric Digital Subscriber Loop)
- 3.5.3 Data Over Cable Service Interface Specification (DOCSIS)
- 3.6 Summary
- 4. The Medium Access Control Sublayer
- 4.1 The Channel Allocation Problem
- 4.1.1 Static Channel Allocation
- 4.1.2 Assumptions for Dynamic Channel Allocation
- 4.2 Multiple Access Protocols
- 4.2.1 ALOHA
- 4.2.2 Carrier Sense Multiple Access Protocols
- 4.2.3 Collision-Free Protocols
- 4.2.4 Limited-Contention Protocols
- 4.2.5 Wireless LAN Protocols
- 4.3 Ethernet
- 4.3.1 Classic Ethernet Physical Layer
- 4.3.2 Classic Ethernet MAC Sublayer Protocol
- 4.3.3 Ethernet Performance
- 4.3.4 Switched Ethernet
- 4.3.5 Fast Ethernet
- 4.3.6 Gigabit Ethernet
- 4.3.7 10-Gigabit Ethernet
- 4.3.8 40- and 100-Gigabit Ethernet
- 4.3.9 Retrospective on Ethernet
- 4.4 Wireless Lans
- 4.4.1 The 802.11 Architecture and Protocol Stack
- 4.4.2 The 802.11 Physical Layer
- 4.4.3 The 802.11 MAC Sublayer Protocol
- 4.4.4 The 802.11 Frame Structure
- 4.4.5 Services
- 4.5 Bluetooth
- 4.5.1 Bluetooth Architecture
- 4.5.2 Bluetooth Applications
- 4.5.3 The Bluetooth Protocol Stack
- 4.5.4 The Bluetooth Radio Layer
- 4.5.5 The Bluetooth Link Layers
- 4.5.6 The Bluetooth Frame Structure
- 4.5.7 Bluetooth 5
- 4.6 DOCSIS
- 4.6.1 Overview
- 4.6.2 Ranging
- 4.6.3 Channel Bandwidth Allocation
- 4.7 Data Link Layer Switching
- 4.7.1 Uses of Bridges
- 4.7.2 Learning Bridges
- 4.7.3 Spanning-Tree Bridges
- 4.7.4 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways
- 4.7.5 Virtual LANs
- 4.8 Summary
- 5. The Network Layer
- 5.1 Network Layer Design Issues
- 5.1.1 Store-and-Forward Packet Switching
- 5.1.2 Services Provided to the Transport Layer
- 5.1.3 Implementation of Connectionless Service
- 5.1.4 Implementation of Connection-Oriented Service
- 5.1.5 Comparison of Virtual-Circuit and Datagram Networks
- 5.2 Routing Algorithms in a Single Network
- 5.2.1 The Optimality Principle
- 5.2.2 Shortest Path Algorithm
- 5.2.3 Flooding
- 5.2.4 Distance Vector Routing
- 5.2.5 Link State Routing
- 5.2.6 Hierarchical Routing within a Network
- 5.2.7 Broadcast Routing
- 5.2.8 Multicast Routing
- 5.2.9 Anycast Routing
- 5.3 Traffic Management at the Network Layer
- 5.3.1 The Need for Traffic Management: Congestion
- 5.3.2 Approaches to Traffic Management
- 5.4 Quality of Service and Application QoE
- 5.4.1 Application QoS Requirements
- 5.4.2 Overprovisioning
- 5.4.3 Packet Scheduling
- 5.4.4 Integrated Services
- 5.4.5 Differentiated Services
- 5.5 Internetworking
- 5.5.1 Internetworks: An Overview
- 5.5.2 How Networks Differ
- 5.5.3 Connecting Heterogeneous Networks
- 5.5.4 Connecting Endpoints Across Heterogeneous Networks
- 5.5.5 Internetwork Routing: Routing Across Multiple Networks
- 5.5.6 Supporting Different Packet Sizes: Packet Fragmentation
- 5.6 Software-Defined Networking
- 5.6.1 Overview
- 5.6.2 The SDN Control Plane: Logically Centralized Software Control
- 5.6.3 The SDN Data Plane: Programmable Hardware
- 5.6.4 Programmable Network Telemetry
- 5.7 The Network Layer in the Internet
- 5.7.1 The IP Version 4 Protocol
- 5.7.2 IP Addresses
- 5.7.3 IP Version 6
- 5.7.4 Internet Control Protocols
- 5.7.5 Label Switching and MPLS
- 5.7.6 OSPF—An Interior Gateway Routing Protocol
- 5.7.7 BGP—The Exterior Gateway Routing Protocol
- 5.7.8 Internet Multicasting
- 5.8 Policy at the Network Layer
- 5.8.1 Peering Disputes
- 5.8.2 Traffic Prioritization
- 5.9 Summary
- 6. The Transport Layer
- 6.1 The Transport Service
- 6.1.1 Services Provided to the Upper Layers
- 6.1.2 Transport Service Primitives
- 6.1.3 Berkeley Sockets
- 6.1.4 An Example of Socket Programming: An Internet File Server
- 6.2 Elements of Transport Protocols
- 6.2.1 Addressing
- 6.2.2 Connection Establishment
- 6.2.3 Connection Release
- 6.2.4 Error Control and Flow Control
- 6.2.5 Multiplexing
- 6.2.6 Crash Recovery
- 6.3 Congestion Control
- 6.3.1 Desirable Bandwidth Allocation
- 6.3.2 Regulating the Sending Rate
- 6.3.3 Wireless Issues
- 6.4 The Internet Transport Protocols: UDP
- 6.4.1 Introduction to UDP
- 6.4.2 Remote Procedure Call
- 6.4.3 Real-Time Transport Protocols
- 6.5 The Internet Transport Protocols: TCP
- 6.5.1 Introduction to TCP
- 6.5.2 The TCP Service Model
- 6.5.3 The TCP Protocol
- 6.5.4 The TCP Segment Header
- 6.5.5 TCP Connection Establishment
- 6.5.6 TCP Connection Release
- 6.5.7 TCP Connection Management Modeling
- 6.5.8 TCP Sliding Window
- 6.5.9 TCP Timer Management
- 6.5.10 TCP Congestion Control
- 6.5.11 TCP CUBIC
- 6.6 Transport Protocols and Congestion Control
- 6.6.1 QUIC: Quick UDP Internet Connections
- 6.6.2 BBR: Congestion Control Based on Bottleneck Bandwidth
- 6.6.3 The Future of TCP
- 6.7 Performance Issues
- 6.7.1 Performance Problems in Computer Networks
- 6.7.2 Network Performance Measurement
- 6.7.3 Measuring Access Network Throughput
- 6.7.4 Measuring Quality of Experience
- 6.7.5 Host Design for Fast Networks
- 6.7.6 Fast Segment Processing
- 6.7.7 Header Compression
- 6.7.8 Protocols for Long Fat Networks
- 6.8 Summary
- 7. The Application Layer
- 7.1 The Domain Name System (DNS)
- 7.1.1 History and Overview
- 7.1.2 The DNS Lookup Process
- 7.1.3 The DNS Name Space and Hierarchy
- 7.1.4 DNS Queries and Responses
- 7.1.5 Name Resolution
- 7.1.6 Hands on with DNS
- 7.1.7 DNS Privacy
- 7.1.8 Contention Over Names
- 7.2 Electronic Mail
- 7.2.1 Architecture and Services
- 7.2.2 The User Agent
- 7.2.3 Message Formats
- 7.2.4 Message Transfer
- 7.2.5 Final Delivery
- 7.3 The World Wide Web
- 7.3.1 Architectural Overview
- 7.3.2 Static Web Objects
- 7.3.3 Dynamic Web Pages and Web Applications
- 7.3.4 HTTP and HTTPS
- 7.3.5 Web Privacy
- 7.4 Streaming Audio and Video
- 7.4.1 Digital Audio
- 7.4.2 Digital Video
- 7.4.3 Streaming Stored Media
- 7.4.4 Real-Time Streaming
- 7.5 Content Delivery
- 7.5.1 Content and Internet Traffic
- 7.5.2 Server Farms and Web Proxies
- 7.5.3 Content Delivery Networks
- 7.5.4 Peer-to-Peer Networks
- 7.5.5 Evolution of the Internet
- 7.6 Summary
- 8. Network Security
- 8.1 Fundamentals of Network Security
- 8.1.1 Fundamental Security Principles
- 8.1.2 Fundamental Attack Principles
- 8.1.3 From Threats to Solutions
- 8.2 The Core Ingredients of an Attack
- 8.2.1 Reconnaissance
- 8.2.2 Sniffing and Snooping (with a Dash of Spoofing)
- 8.2.3 Spoofing (beyond ARP)
- 8.2.4 Disruption
- 8.3 Firewalls and Intrusion Detection Systems
- 8.3.1 Firewalls
- 8.3.2 Intrusion Detection and Prevention
- 8.4 Cryptography
- 8.4.1 Introduction to Cryptography
- 8.4.2 Two Fundamental Cryptographic Principles
- 8.4.3 Substitution Ciphers
- 8.4.4 Transposition Ciphers
- 8.4.5 One-Time Pads
- 8.5 Symmetric-Key Algorithms
- 8.5.1 The Data Encryption Standard
- 8.5.2 The Advanced Encryption Standard
- 8.5.3 Cipher Modes
- 8.6 Public-Key Algorithms
- 8.6.1 RSA
- 8.6.2 Other Public-Key Algorithms
- 8.7 Digital Signatures
- 8.7.1 Symmetric-Key Signatures
- 8.7.2 Public-Key Signatures
- 8.7.3 Message Digests
- 8.7.4 The Birthday Attack
- 8.8 Management of Public Keys
- 8.8.1 Certificates
- 8.8.2 X.509
- 8.8.3 Public Key Infrastructures
- 8.9 Authentication Protocols
- 8.9.1 Authentication Based on a Shared Secret Key
- 8.9.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange
- 8.9.3 Authentication Using a Key Distribution Center
- 8.9.4 Authentication Using Kerberos
- 8.9.5 Authentication Using Public-Key Cryptography
- 8.10 Communication Security
- 8.10.1 IPsec
- 8.10.2 Virtual Private Networks
- 8.10.3 Wireless Security
- 8.11 Email Security
- 8.11.1 Pretty Good Privacy
- 8.11.2 S/MIME
- 8.12 Web Security
- 8.12.1 Threats
- 8.12.2 Secure Naming and DNSSEC
- 8.12.3 Transport Layer Security
- 8.12.4 Running Untrusted Code
- 8.13 Social Issues
- 8.13.1 Confidential and Anonymous Communication
- 8.13.2 Freedom of Speech
- 8.13.3 Copyright
- 8.14 Summary
- 9. Reading List and Bibliography
- 9.1 Suggestions for Further Reading
- 9.1.1 Introduction and General Works
- 9.1.2 The Physical Layer
- 9.1.3 The Data Link Layer
- 9.1.4 The Medium Access Control Sublayer
- 9.1.5 The Network Layer
- 9.1.6 The Transport Layer
- 9.1.7 The Application Layer
- 9.1.8 Network Security
- 9.2 Alphabetical Bibliography
- Index
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- X
- Z
- About the authors
Reviews
There are no reviews yet.