도서 정보
도서 상세설명
1 Foundation
1.1 Applications
1.1.1 Classes of Applications
1.2 Requirements
1.2.1 Perspectives
1.2.2 Scalable Connectivity
1.2.3 Cost-Effective Resource Sharing
1.2.4 Support for Common Services
1.2.5 Manageability
1.3 Network Architecture
1.3.1 Layering and Protocols
1.3.2 Internet Architecture
1.4 Implementing Network Software
1.4.1 Application Programming Interface (Sockets)
1.4.2 Example Application
1.5 Performance
1.5.1 Bandwidth and Latency
1.5.2 Delay × Bandwidth Product
1.5.3 High-Speed Networks
1.5.4 Application Performance Needs
1.6 Summary
2 Getting Connected
2.1 Perspectives on Connecting
2.1.1 Classes of Links
2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B)
2.3 Framing
2.3.1 Byte-Oriented Protocols (BISYNC, PPP, DDCMP)
2.3.2 Bit-Oriented Protocols (HDLC)
2.3.3 Clock-Based Framing (SONET)
2.4 Error Detection
2.4.1 Two-Dimensional Parity
2.4.2 Internet Checksum Algorithm
2.4.3 Cyclic Redundancy Check
2.5 Reliable Transmission
2.5.1 Stop-and-Wait
2.5.2 Sliding Window
2.5.3 Concurrent Logical Channels
2.6 Ethernet and Multiple Access Networks(802.3)
2.6.1 Physical Properties
2.6.2 Access Protocol
2.6.3 Experience with Ethernet
2.7 Wireless
2.7.1 802.11/Wi-Fi
2.7.2 Bluetooth/802.15.1
2.7.3 Cell Phone Technologies
2.8 Summary
3 Internetworking
3.1 Switching and Bridging
3.1.1 Datagrams
3.1.2 Virtual Circuit Switching
3.1.3 Source Routing
3.1.4 Bridges and LAN Switches
3.2 Basic Internetworking (IP)
3.2.1 What Is an Internetwork?
3.2.2 Service Model
3.2.3 Global Addresses
3.2.4 Datagram Forwarding in IP
3.2.5 Subnetting and Classless Addressing
3.2.6 Address Translation (ARP)
3.2.7 Host Configuration (DHCP)
3.2.8 Error Reporting (ICMP)
3.2.9 Virtual Networks and Tunnels
3.3 Routing
3.3.1 Network as a Graph
3.3.2 Distance Vector (RIP)
3.3.3 Link State (OSPF)
3.3.4 Metrics
3.4 Implementation and Performance
3.4.1 Switch Basics
3.4.2 Ports
3.4.3 Fabrics
3.4.4 Router Implementation
3.5 Summary
4 Advanced Internetworking
4.1 The Global Internet
4.1.1 Routing Areas
4.1.2 Interdomain Routing (BGP)
4.1.3 IP version 6 (IPv6)
4.2 Multicast
4.2.1 Multicast Addresses
4.2.2 Multicast Routing (DVMRP, PIM, MSDP)
4.3 Multiprotocol Label Switching (MPLS)
4.3.1 Destination-Based Forwarding
4.3.2 Explicit Routing
4.3.3 Virtual Private Networks and Tunnels
4.4 Routing among mobile devices
4.4.1 Challenges for Mobile Networking
4.4.2 Routing to Mobile Hosts (MobileIP)
4.5 Summary
5 End-to-End Protocols
5.1 Simple Demultiplexer (UDP)
5.2 Reliable Byte Stream (TCP)
5.2.1 End-to-End Issues
5.2.2 Segment Format
5.2.3 Connection Establishment and Termination
5.2.4 SlidingWindow Revisited
5.2.5 Triggering Transmission
5.2.6 Adaptive Retransmission
5.2.7 Record Boundaries
5.2.8 TCP Extensions
5.2.9 Performance
5.2.10 Alternative Design Choices
5.3 Remote Procedure Call
5.3.1 RPC Fundamentals
5.3.2 RPC Implementations (SunRPC, DCE)
5.4 Transport for Real-Time Applications (RTP)
5.4.1 Requirements
5.4.2 RTP Design
5.4.3 Control Protocol
5.5 Summary
6 Congestion Control and Resource Allocation
6.1 Issues in Resource Allocation
6.1.1 Network Model
6.1.2 Taxonomy
6.1.3 Evaluation Criteria
6.2 Queuing Disciplines
6.2.1 FIFO
6.2.2 Fair Queuing
6.3 TCP Congestion Control
6.3.1 Additive Increase/Multiplicative Decrease
6.3.2 Slow Start
6.3.3 Fast Retransmit and Fast Recovery
6.4 Congestion-Avoidance Mechanisms
6.4.1 DECbit
6.4.2 Random Early Detection (RED)
6.4.3 Source-Based Congestion Avoidance
6.5 Quality of Service
6.5.1 Application Requirements
6.5.2 Integrated Services (RSVP)
6.5.3 Differentiated Services (EF, AF)
6.5.4 Equation-Based Congestion Control
6.6 Summary
7 End-to-End Data
7.1 Presentation Formatting
7.1.1 Taxonomy
7.1.2 Examples (XDR, ASN.1, NDR)
7.1.3 Markup Languages (XML)
7.2 Multimedia Data
7.2.1 Lossless Compression Techniques
7.2.2 Image Representation and Compression (GIF, JPEG)
7.2.3 Video Compression (MPEG)
7.2.4 Transmitting MPEG over a Network
7.2.5 Audio Compression (MP3)
7.3 Summary
8 Network Security
8.1 Cryptographic Building Blocks
8.1.1 Principles of Ciphers
8.1.2 Symmetric-Key Ciphers
8.1.3 Public-Key Ciphers
8.1.4 Authenticators
8.2 Key Pre-Distribution
8.2.1 Pre-Distribution of Public Keys
8.2.2 Pre-Distribution of Symmetric Keys
8.3 Authentication Protocols
8.3.1 Originality and Timeliness Techniques
8.3.2 Public-Key Authentication Protocols
8.3.3 Symmetric-key Authentication Protocols
8.3.4 Diffie-Hellman Key Agreement
8.4 Example Systems
8.4.1 Pretty Good Privacy (PGP)
8.4.2 Secure Shell (SSH)
8.4.3 Transport Layer Security (TLS, SSL, HTTPS)
8.4.4 IP Security (IPsec)
8.4.5 Wireless Security (802.11i)
8.5 Firewalls
8.5.1 Strengths and Weaknesses of Firewalls
8.6 Summary
9 Applications
9.1 Traditional Applications
9.1.1 Electronic Mail (SMTP, MIME, IMAP)
9.1.2 World Wide Web (HTTP)
9.1.3 Web Services
9.2 Multimedia Applications
9.2.1 Session Control and Call Control (SDP, SIP, H.323)
9.2.2 Resource Allocation for Multimedia Applications
9.3 Infrastructure Services
9.3.1 Name Service (DNS)
9.3.2 Network Management (SNMP)
9.4 Overlay Networks
9.4.1 Routing Overlays
9.4.2 Peer-to-Peer Networks
9.4.3 Content Distribution Networks
9.5 Summary