内容简介
Chapter 1 Introduction 1
Protocols
1.1 PROTOCOLS AND STANDARDS
Chapter 1 Introduction
Standards Creation Committees
1.2 STANDARDS ORGANIZATIONS
Standards
1.3 Internet Standards
Regulatory Agencies
Forums
Maturity Levels
Requirement Levels
ISOC
1.4 INTERNET ADMINSTRATION
IANA and ICANN
IRTF
IAB
IETF
NIC
1.5 A BRIEF HISTORY
ARPANET
Birth of the Internet
TCP/IP Protocol
MILNET
CSNET
NSFNET
ANSNET
The Internet Today
Timeline
1.6 SUMMARY
Multiple Choice
1.7 PRACTICE SET
Exercises
Chapter 2 The OSI Model and the TCP/IP Protocol Suite
Chapter 2 The OSI Model and the TCP/IP Protocol Suite
2.1 THE OSI MODEL
Layered Architecture
Peer-to-Peer Processes
2.2 LAYERS IN THE OSI MODEL
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Physical and Data Link Layers
Network Layer
2.3 TCP/IP PROTOCOL SUITE
Transport Layer
Application Layer
2.4 ADDRESSING
Physical Address
Internet Address
Port Address
2.5 TCP/IP VERSIONS
Version 4
Version 5
Version 6
2.7 PRACTICE SET
2.6 SUMMARY
Multiple Choice
Exercises
Guided Media
Chapter 3 Underlying Technologies
3.1 TRANSMISSION MEDIA
Chapter 3 Underlying Technologies
Unguided Media
3.2 LOCAL AREA NETWORKS(LANS)
Ethernet
Token Ring
Fiber Distributed Data Interface(FDDI)
3.3 SWITCHING
Circuit Switching
Packet Switching
Message Switching
3.4 WIDE AREA NETWORKS(WANS)
Point-to-Point Protocol(PPP)
X.25
Frame Relay
Asynchronous Transfer Mode(ATM)
3.5 CONNECTING DEVICES
Repeaters
Bridges
Routers
3.6 SUMMARY
Gateways
3.7 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 4 IP Addressing
Chapter 4 IP Addressing
4.1 DECIMAL NOTATION
4.2 CLASSES
Class A
Class B
Class C
Class D
Class E
Determining the Class of an Address
Extracting Netid and Hostid
Multihomed Devices
Location Not Names
4.3 SPECIAL ADDRESSES
Network Address
Direct Broadcast Address
Limited Broadcast Address
Specific Host on This Network
Loopback Address
This Host On This Network
4.4 A SAMPLE INTERNET
4.5 UNICAST MULTICAST AND BROADCAST ADDRESSES
Unicast Addresses
Multicast Addresses
Broadcast Addresses
4.6 APPLYING FOR IP ADDRESSES
Class of Address
Netids and Hostids
4.8 SUMMARY
Authorities
4.7 PRIVATE NETWORKS
4.9 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
5.1 SUBNETTING
Chapter 5 Subnetting and Supernetting
Chapter 5 Subnetting and Supernetting
Three Levels of Hierarchy
5.2 MASKING
Special Addresses in Subnetting
Contiguous vs.Noncontiguous Mask
5.3 EXAMPLES OF SUBNETTING
Subnetting Class A
Subnetting Class B
Subnetting Class C
5.4 VARIABLE-LENGTH SUBNETTING
5.5 SUPERNETTING
Supernet Mask
Classless Interdomain Routing(CIDR)
5.6 SUMMARY
Multiple Choice
5.7 PRACTICE SET
Exercises
Chapter 6 Delivery and Routing of IP Packets
6.1 CONNECTION-ORIENTED VS.CONNECTIONESS SERVICES
Chapter 6 Delivery and Routing of IP Packets
6.2 DIRECT VS.INDIRECT DELIVERY
Direct Delivery
Indirect Delivery
6.3 ROUTING METHODS
Next-Hop Routing
Network-Specific Routing
Host-Specific Routing
Default Routing
6.4 STATIC VS.DYNAMIC ROUTING
Static Routing Table
Dynamic Routing Table
Routing Table
6.5 ROUTING MODULE AND ROUTING TABLE DESIGN
Examples
Routing Module
6.6 SUMMARY
Multiple Choice
6.7 PRACTICE SET
Exercises
Programming Exercises
Chapter 7 Internet Protocol(IP)
7.1 DATAGRAM
Chapter 7 Internet Protocol(IP)
Maximum Transfer Unit(MTU)
7.2 FRAGMENTATION
Fields Related to Fragmentation
7.3 OPTIONS
Format
Option Types
7.4 CHECKSUM
Checksum Calculation at the Sender
Checksum Calculation at the Receiver
Checksum in the IP Packet
Example
7.5 IP DESIGN
Header-Adding Module
Processing Module
Queues
Routing Table
Fragmentation Module
Routing Module
MTU Table
Reassembly Table
Reassembly Module
7.6 SUMMARY
7.7 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 8 ARP and RARP
Chapter 8 ARP and RARP
8.1 ARP
Packet Format
Encapsulation
Operation
Proxy ARP
8.2 ARP DESIGN
Cache Table
Output Module
Queues
Imput Module
Cache-Control Module
Examples of ARP
8.3 RARP
Packet Format
Encapsulation
Alternative Solutions to RARP
8.4 SUMMARY
8.5 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 9 Internet Control Message Protocol(ICMP)
Chapter 9 Internet Control Message Protocol(ICMP)
9.1 TYPES OF MESSAGES
9.2 MESSAGE FORMAT
9.3 ERROR REPORTING
Destination Unreachable
Source Quench
Time Exceeded
Parameter Problem
Redirection
9.4 QUERY
Echo Request and Reply
Timestamp Request and Reply
Address Mask Request and Reply
Router Solicitation and Advertisement
9.5 CHECKSUM
Checksum Calculation
Checksum Testing
Example
9.6 ICMP DESIGN
Input Module
Output Module
9.7 SUMMARY
9.8 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 10 Internet Group Management Protocol(IGMP)
10.1 MULTICASTING
Multicast Addresses
Chapter 10 Internet Group Management Protocol(IGMP)
Types of Messages
10.2 IGMP
Message Format
Operation of IGMP in a Single Network
Operation of IGMP in an Internet
Changing IP Addresses to Physical Addresses
10.3 ENCAPSULATION
10.4 MULTICAST BACKBONE(MBONE)
10.5 IGMP DESIGN
Group Table
Timers
Group-Joining Module
Group-Leaving Module
Input Module
Output Module
Examples of IGMP
10.6 SUMMARY
10.7 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 11 User Datagram Protocol(UDP)
Chapter 11 User Datagram Protocol(UDP)
11.1 PROCESS-TO-PROCESS COMMUNICATION
Port Numbers
Socket Addresses
11.2 USER DATAGRAM
11.3 CHECKSUM
Checksum Calculation at Sender
Checksum Calculation at Receiver
An Example
Optional Use of the Checksum
11.4 UDP OPERATION
Connectionless Services
Encapsulation and Decapsulation
Flow and Error Control
Queuing
Multiplexing and Demultiplexing
11.5 USE OF UDP
11.6 UDP DESIGN
Control-Block Table
Input Queues
Control-Block Module
Input Module
Output Module
Examples
11.7 SUMMARY
11.8 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 12 Transmission Control Protocol(TCP)
Chapter 12 Transmission Control Protocol(TCP)
12.1 PROCESS-TO-PROCESS COMMUNICATION
Port Addresses
Socket Addresses
12.2 TCP SERVICES
Stream Data Service
Full-Duplex Service
Reliable Service
12.3 SEGMENT
12.4 OPTIONS
12.5 CHECKSUM
12.6 FLOW CONTROL
Sliding Window
Window Management
Silly Window Syndrome
Error Detection and Conection
12.7 ERROR CONTROL
12.8 TCP TIMERS
Retransmission Timer
Persistence Timer
Keepalive Timer
Time-Waited Timer
12.9 CONNECTION
Connection Establishment
Connection Termination
Connection Resetting
12.10 STATE TRANSITION DIAGRAM
Client Diagram
Server Diagram
12.11 CONGESTION CONTROL
Pushing Data
Encapsulation and Decapsulation
Queuing
Multiplexing and Demultiplexing
12.12 TCP OPERATION
Urgent Data
12.13 TCP DESIGN
Transmission Control Blocks(TCBs)
Timers
Main Module
Input Processing Module
Output Processing Module
12.14 SUMMARY
12.15 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 13 Routing Protocols(RIP,OSPF,and BGP)
Chapter 13 Routing Protocols(RIP,OSPF,and BGP)
13.1 INTERIOR AND EXTERIOR ROUTING
13.2 RIP
Distance Vector Routing
RIP Message Format
Requests and Responses
Timers in RIP
Slow Convergence
Instability
Some Remedies for Instability
RIP Version 2
Authentication
Encapsulation
13.3 OSPF
Areas
Link State Routing
Metric
Packet Format
Types of Packets
Encapsulation
13.4 BGP
Path Vector Routing
Types of Packets
Packet Format
Encapsulation
13.5 MULTICAST ROUTING
DVMRP
MOSPF
13.6 SUMMARY
Multiple Choice
13.7 PRACTICE SET
Exercises
Programming Exercises
Chapter 14 Application Layer and Client-Server Model
Chapter 14 Application Layer and Client-Server Model
14.1 CLIENT-SERVER MODEL
Client
Concurrency in Servers
Concurrency in Clients
14.2 CONCURRENCY
Server
14.3 PROCESSES
Concept
Process Identification
Process Creation
14.4 SUMMARY
14.5 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 15 BOOTP and DHCP
15.1 BOOTP
Packet Format
Chapter 15 BOOTP and DHCP
Operation
Using TFTP
UDP Ports
Relay Agent
15.2 DYNAMIC HOST CONFIGURATION PROTOCOL(DHCP)
Leasing
DHCP Operation
Packet Format
15.3 SUMMARY
15.4 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 16 Domain Name System(DNS)
16.1 NAME SPACE
Chapter 16 Domain Name System(DNS)
Flat Name Space
Hierarchical Name Space
16.2 DOMAIN NAME SPACE
Label
Domain Name
Domain
16.3 DISTRIBUTION OF NAME SPACE
Hierarchy of Name Servers
Zone
Root Server
16.4 DNS IN THE INTERNET
Primary and Secondary Servers
Generic Domains
Inverse Domain
Country Domains
16.5 RESOLUTION
Resolver
Mapping Names to Addresses
Mapping Addresses to Names
Recursive Resolution
Iterative Resolution
Caching
16.6 DNS MESSAGES
Header
16.7 TYPES OF RECORDS
Question Record
Resource Record
16.8 COMPRESSION
16.9 EXAMPLES
16.10 DDNS
16.11 ENCAPSULATION
16.12 SUMMARY
16.13 PRACTICE SET
Multiple Choice
Exercises
Chapter 17 TELNET and Rlogin
17.1 CONCEPT
Timesharing Environment
Chapter 17 TELNET and Rlogin
Login
17.2 NETWORK VIRTUAL TERMINAL(NVT)
17.3 NVT CHARACTER SET
Data Characters
Remote Control Characters
17.4 EMBEDDING
17.5 OPTIONS
17.6 OPTION NEGOTIATION
Enabling an Option
Disabling an Option
Example
Symmetry
17.7 SUBOPTION NEGOTIATION
17.8 CONTROLLING THE SERVER
17.9 OUT-OF-BAND SIGNALING
17.10 ESCAPE CHARACTER
Default Mode
Character Mode
Line Mode
17.11 MODE OF OPERATION
Default Mode
Character Mode
Line Mode
17.12 EXAMPLES
17.13 USER INTERFACE
17.14 RLOGIN(REMOTELOGIN)
TCP Port
Connection
Flow Control
Commands
Mode
17.15 SECURITY ISSUE
17.16 SUMMARY
17.17 PRACTICE SET
Multiple Choice
Exercises
Chapter 18 File Transfer Protocol(FTP)
Chapter 18 File Transfer Protocol(FTP)
Data Connection
Control Connection
18.1 CONNECTIONS
18.2 COMMUNICATION
Communication over Control Connection
Communication over Data Connection
18.3 COMMAND PROCESSING
Commands
Responses
18.4 FILE TRANSFER
18.5 USER INTERFACE
18.6 ANONYMOUS FTP
18.7 SUMMARY
18.8 PRACTICE SET
Multiple Choice
Exercises
19.1 MESSAGES
Chapter 19 Trivial File Transfer Protocol(TFTP)
Chapter 19 Trivial File Transfer Protocol(TFTP)
WRQ
DATA
RRQ
ACK
ERROR
19.2 CONNECTION
Connection Establishment
Connection Termination
19.3 DATA TRANSFER
Flow Control
Error Control
Sorcerer s Apprentice Bug
19.4 UDP PORTS
19.5 TETP EXAMPLE
19.6 TFTP OPTIONS
19.7 SECURITY
19.8 APPLICATIONS
19.9 SUMMARY
19.10 PRACTICE SET
Multiple Choice
Exercises
Chapter 20 Simple Mail Transfer Protocol(SMTP)
Chapter 20 Simple Mail Transfer Protocol(SMTP)
20.1 USER AGENT(UA)
Sending Mail
20.2 ADDRESSES
Local Part
Receiving Mail
Domain Name
20.3 DELAYED DELIVERY
Sender-Site Delay
Receiver-Site Delay
One-to-Many Expansion
20.4 ALIASES
Intermediate Delay
20.5 MAIL TRANSFER AGENT(MTA)
Many-to-One Expansion
20.6 COMMANDS AND RESPONSES
Commands
Responses
20.7 MAIL TRANSFER PHASES
Connection Establishment
Message Transfer
Connection Termination
20.8 MULTIPURPOSE INTERNET MAIL EXTENSIONS(MIME)
MIME-Version
Content-Type
Content-Transfer-Encoding
Content-Id
Content-Description
20.9 POST OFFICE PROTOCOL(POP)
20.10 SUMMARY
20.11 PRACTICE SET
Multiple Choice
Exercises
21.1 CONCEPT
Chapter 21 Simple Network Management Protocol(SNMP)
Chapter 21 Simple Network Management Protocol(SNMP)
Managers and Agents
21.2 SMI
Components
Name
Type
Encoding Method
21.3 MIB
Accessing MIB Variables
Lexicographic Ordering
21.4 SNMP
Messages
Format
Encoding
21.5 EXAMPLES
21.6 UDP PORTS
21.7 SUMMARY
21.8 PRACTICE SET
Multiple Choice
Exercises
Chapter 22 Hypertext Transfer Protocol(HTTP)
Chapter 22 Hypertext Transfer Protocol(HTTP)
22.1 HTTP TRANSACTION
Messages
22.2 REQUEST MESSAGES
Request Line
Methods
22.3 RESPONSE MESSAGE
Status Line
22.4 HEADER
General Header
Request Header
Response Header
Entity Header
22.5 EXAMPLES
22.6 PRACTICE SET
Multiple Choice
Exercises
23.1 HYPERTEXT AND HYPERMEDIA
Chapter 23 World Wide Web(WWW)
Chapter 23 World Wide Web(WWW)
23.2 BROWSER ARCHITECTURE
23.3 STATIC DOCUMENTS
23.4 HTML
Structure of a Web Page
Tags
Examples
23.5 DYNAMIC DOCUMENTS
23.6 COMMON GATEWAY INTERFACE(CGI)
CGI Program
Input
Environment Variables
Output
Examples
23.7 ACTIVE DOCUMENTS
Creation Compilation and Execution
23.8 JAVA
Classes and Objects
Instantiation
Inheritance
Packages
Skeleton of an Applet
Creation and Compilation
HTML Document
Examples
23.9 SUMMARY
23.10 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
24.1 SOME DEFINTIONS
Data Types Defined
Chapter 24 Socket Interface
Chapter 24 Socket Interface
Internet Address Structure
Internet Socket Address Structure
24.2 SOCKETS
Socket Types
24.3 BYTE ORDERING
Little-Endian Byte Order
Big-Endian Byte Order
Network Byte Order
Byte-Order Transformation
24.4 ADDRESS TRANSFORMATION
24.5 BYTE MANIPULATION FUNCTIONS
24.6 INFORMATION ABOUT REMOTE HOST
24.7 SOCKET SYSTEM CALLS
Socket
Bind
Connect
Listen
Sendto
Accept
Recvfrom
Read
Write
Close
24.8 CONNECTIONLESS ITERATIVE SERVER
Server
Client
24.9 UDP CLIENT-SERVER PROGRAMS
Server Porogram
Client Program
24.10 CONNECTION-ORIENTED CONCURRENT SERVER
Server
Client
24.11 TCP CLIENT-SERVER PROGRAMS
Server Program
Client Program
24.12 SUMMARY
24.13 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Chapter 25 Next Generation:Ipv6 and ICMPv6
Chapter 25 Next Generation:Ipv6 and ICMPv6
25.1 IPV6
25.2 IPV6 ADDRESSES
Hexadecimal Colon Notation
Address Space Assignment
Categories of Addresses
Base Header
25.3 IPV6 PACKET FORMAT
Priority
Flow Label
Comparison between Ipv4 and Ipv6 Headers
Extension Headers
Comparison between Ipv4 and Ipv6
Error Reporting
25.4 ICMPV6
Query
25.5 TRANSITION FROM IPV4 TO IPV6
Dual Stack
Tunneling
Header Translation
25.6 SUMMARY
25.7 PRACTICE SET
Multiple Choice
Exercises
Programming Exercises
Appendix A ASCII Code
Appendix A ASCII Code
Appendix B Numbering Systems and Transformation
Appendix B Numbering Systems and Transformation
B.1 NUMBERING SYSTEMS
Binary Numbers
Decimal Numbers
Octal Numbers
Hexadecimal Numbers
B.2 TRANSFORMATION
From Other Systems to Decimal
From Decimal to Other Systems
From Binary to Octal or Hexadecimal
From Octal or Hexadecimal to Binary
Appendix C Representation of Binary Numbers
C.1 UNSIGNED NUMBERS
Appendix C Representation of Binary Numbers
C.2 SIGNED NUMBERS
Sign-and-Magnitude
One s Complemet
Two s Complement
C.3 MORE ABOUT ONE S COMPLEMENT
Finding the Complement
Adding Two Numbers
Appendix D Error Detection
Appendix D Error Detection
D.1 TYPES OF ERRORS
Single-Bit Error
Multiple-Bit Error
Burst Error
D.2 DETECTION
Redundancy
Vertical Redundancy Check(VRC)
Longitudinal Redundancy Check(LRC)
Cyclic Redundancy Check(CRC)
Checksum
Appendix E Encryption/Decryption
Appendix E Encryption/Decryption
E.1 CONVENTIONAL METHODS
DES
E.2 PUBLIC KEY METHODS
RSA Encyption
E.3 AUTHENTICATION
Appendix F MIB Objects
F.1 SYSTEM GROUP
F.2 INTERFACE GROUP
Appendix F MIB Objects
F.3 IP GROUP
F.4 ICMP GROUP
F.5 TCP GROUP
F.6 UDP GROUP
Appendix G High-Level Data Link Control(HDLC)
Appendix G High-Level Data Link Control(HDLC)
G.1 STATION TYPES
G.2 CONFIGURATIONS
G.3 MODES OF COMMUNICATION
NRM
ARM
ABM
G.4 FRAMES
G.5 MORE ABOUT FRAMES
I-frames
S-frames
U-frames
G.6 LINK ACCESS PROCEDURES(LAPS)
LAPB
LAPD
LAPM
Appendix H Project 802
Appendix H Project 802
H.1 PROJECT 802.1
H.2 PROJECT 802.2
LLC
MAC
Appendix I ASN.1
Appendix I ASN.1
1.1 DATA TYPES AND VALUES
Simple Type
Structured Type
Tags
Subtyping
Values
1.2 MODULES AND MACROS
Modules
Macros
Appendix J Spanning Tree
Appendix J Spanning Tree
J.1 SPANNING TREES AND BRIDGES
Algorithm
Forming the Spanning Tree
Example
J.2 SPANNING GREES AND MULTICAST ROUTING
Appendix K Contact Addresses
Appendix K Contact Addresses
Appendix L RFCs
Appendix L RFCs
Appendix M UDP and TCP Ports
Appendix M UDP and TCP Ports
Solutions
Solutions
Acronyms
Acronyms
Glossary
Glossary
References
References
Index
Index