1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu TCP/IP Tutorial and Technical Overview docx

1K 2.3K 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Current abstract on IBM Redbooks web site

  • Front cover

  • Contents

  • Notices

    • Trademarks

  • Preface

    • The team that wrote this redbook

    • Become a published author

    • Comments welcome

  • Part 1 Core TCP/IP protocols

  • Chapter 1. Architecture, history, standards, and trends

    • 1.1 TCP/IP architectural model

      • 1.1.1 Internetworking

      • 1.1.2 The TCP/IP protocol layers

      • 1.1.3 TCP/IP applications

    • 1.2 The roots of the Internet

      • 1.2.1 ARPANET

      • 1.2.2 NSFNET

      • 1.2.3 Commercial use of the Internet

      • 1.2.4 Internet2

      • 1.2.5 The Open Systems Interconnection (OSI) Reference Model

    • 1.3 TCP/IP standards

      • 1.3.1 Request for Comments (RFC)

      • 1.3.2 Internet standards

    • 1.4 Future of the Internet

      • 1.4.1 Multimedia applications

      • 1.4.2 Commercial use

      • 1.4.3 The wireless Internet

    • 1.5 RFCs relevant to this chapter

  • Chapter 2. Network interfaces

    • 2.1 Ethernet and IEEE 802 local area networks (LANs)

      • 2.1.1 Gigabit Ethernet

    • 2.2 Fiber Distributed Data Interface (FDDI)

    • 2.3 Serial Line IP (SLIP)

    • 2.4 Point-to-Point Protocol (PPP)

      • 2.4.1 Point-to-point encapsulation

    • 2.5 Integrated Services Digital Network (ISDN)

    • 2.6 X.25

    • 2.7 Frame relay

      • 2.7.1 Frame format

      • 2.7.2 Interconnect issues

      • 2.7.3 Data link layer parameter negotiation

      • 2.7.4 IP over frame relay

    • 2.8 PPP over SONET and SDH circuits

      • 2.8.1 Physical layer

    • 2.9 Multi-Path Channel+ (MPC+)

    • 2.10 Asynchronous transfer mode (ATM)

      • 2.10.1 Address resolution (ATMARP and InATMARP)

      • 2.10.2 Classical IP over ATM

      • 2.10.3 ATM LAN emulation

      • 2.10.4 Classical IP over ATM versus LAN emulation

    • 2.11 Multiprotocol over ATM (MPOA)

      • 2.11.1 Benefits of MPOA

      • 2.11.2 MPOA logical components

      • 2.11.3 MPOA functional components

      • 2.11.4 MPOA operation

    • 2.12 RFCs relevant to this chapter

  • Chapter 3. Internetworking protocols

    • 3.1 Internet Protocol (IP)

      • 3.1.1 IP addressing

      • 3.1.2 IP subnets

      • 3.1.3 IP routing

      • 3.1.4 Methods of delivery: Unicast, broadcast, multicast, and anycast

      • 3.1.5 The IP address exhaustion problem

      • 3.1.6 Intranets: Private IP addresses

      • 3.1.7 Network Address Translation (NAT)

      • 3.1.8 Classless Inter-Domain Routing (CIDR)

      • 3.1.9 IP datagram

    • 3.2 Internet Control Message Protocol (ICMP)

      • 3.2.1 ICMP messages

      • 3.2.2 ICMP applications

    • 3.3 Internet Group Management Protocol (IGMP)

    • 3.4 Address Resolution Protocol (ARP)

      • 3.4.1 ARP overview

      • 3.4.2 ARP detailed concept

      • 3.4.3 ARP and subnets

      • 3.4.4 Proxy-ARP or transparent subnetting

    • 3.5 Reverse Address Resolution Protocol (RARP)

      • 3.5.1 RARP concept

    • 3.6 Bootstrap Protocol (BOOTP)

      • 3.6.1 BOOTP forwarding

      • 3.6.2 BOOTP considerations

    • 3.7 Dynamic Host Configuration Protocol (DHCP)

      • 3.7.1 The DHCP message format

      • 3.7.2 DHCP message types

      • 3.7.3 Allocating a new network address

      • 3.7.4 DHCP lease renewal process

      • 3.7.5 Reusing a previously allocated network address

      • 3.7.6 Configuration parameters repository

      • 3.7.7 DHCP considerations

      • 3.7.8 BOOTP and DHCP interoperability

    • 3.8 RFCs relevant to this chapter

  • Chapter 4. Transport layer protocols

    • 4.1 Ports and sockets

      • 4.1.1 Ports

      • 4.1.2 Sockets

    • 4.2 User Datagram Protocol (UDP)

      • 4.2.1 UDP datagram format

      • 4.2.2 UDP application programming interface

    • 4.3 Transmission Control Protocol (TCP)

      • 4.3.1 TCP concept

      • 4.3.2 TCP application programming interface

      • 4.3.3 TCP congestion control algorithms

    • 4.4 RFCs relevant to this chapter

  • Chapter 5. Routing protocols

    • 5.1 Autonomous systems

    • 5.2 Types of IP routing and IP routing algorithms

      • 5.2.1 Static routing

      • 5.2.2 Distance vector routing

      • 5.2.3 Link state routing

      • 5.2.4 Path vector routing

      • 5.2.5 Hybrid routing

    • 5.3 Routing Information Protocol (RIP)

      • 5.3.1 RIP packet types

      • 5.3.2 RIP packet format

      • 5.3.3 RIP modes of operation

      • 5.3.4 Calculating distance vectors

      • 5.3.5 Convergence and counting to infinity

      • 5.3.6 RIP limitations

    • 5.4 Routing Information Protocol Version 2 (RIP-2)

      • 5.4.1 RIP-2 packet format

      • 5.4.2 RIP-2 limitations

    • 5.5 RIPng for IPv6

      • 5.5.1 Differences between RIPng and RIP-2

      • 5.5.2 RIPng packet format

    • 5.6 Open Shortest Path First (OSPF)

      • 5.6.1 OSPF terminology

      • 5.6.2 Neighbor communication

      • 5.6.3 OSPF neighbor state machine

      • 5.6.4 OSPF route redistribution

      • 5.6.5 OSPF stub areas

      • 5.6.6 OSPF route summarization

    • 5.7 Enhanced Interior Gateway Routing Protocol (EIGRP)

      • 5.7.1 Features of EIGRP

      • 5.7.2 EIGRP packet types

    • 5.8 Exterior Gateway Protocol (EGP)

    • 5.9 Border Gateway Protocol (BGP)

      • 5.9.1 BGP concepts and terminology

      • 5.9.2 IBGP and EBGP communication

      • 5.9.3 Protocol description

      • 5.9.4 Path selection

      • 5.9.5 BGP synchronization

      • 5.9.6 BGP aggregation

      • 5.9.7 BGP confederations

      • 5.9.8 BGP route reflectors

    • 5.10 Routing protocol selection

    • 5.11 Additional functions performed by the router

    • 5.12 Routing processes in UNIX-based systems

    • 5.13 RFCs relevant to this chapter

  • Chapter 6. IP multicast

    • 6.1 Multicast addressing

      • 6.1.1 Multicasting on a single physical network

      • 6.1.2 Multicasting between network segments

    • 6.2 Internet Group Management Protocol (IGMP)

      • 6.2.1 IGMP messages

      • 6.2.2 IGMP operation

    • 6.3 Multicast delivery tree

    • 6.4 Multicast forwarding algorithms

      • 6.4.1 Reverse path forwarding algorithm

      • 6.4.2 Center-based tree algorithm

      • 6.4.3 Multicast routing protocols

    • 6.5 Distance Vector Multicast Routing Protocol (DVMRP)

      • 6.5.1 Protocol overview

      • 6.5.2 Building and maintaining multicast delivery trees

      • 6.5.3 DVMRP tunnels

    • 6.6 Multicast OSPF (MOSPF)

      • 6.6.1 Protocol overview

      • 6.6.2 MOSPF and multiple OSPF areas

      • 6.6.3 MOSPF and multiple autonomous systems

      • 6.6.4 MOSPF interoperability

    • 6.7 Protocol Independent Multicast (PIM)

      • 6.7.1 PIM dense mode

      • 6.7.2 PIM sparse mode

    • 6.8 Interconnecting multicast domains

      • 6.8.1 Multicast Source Discovery Protocol (MSDP)

      • 6.8.2 Border Gateway Multicast Protocol

    • 6.9 The multicast backbone

      • 6.9.1 MBONE routing

      • 6.9.2 Multicast applications

    • 6.10 RFCs relevant to this chapter

  • Chapter 7. Mobile IP

    • 7.1 Mobile IP overview

      • 7.1.1 Mobile IP operation

      • 7.1.2 Mobility agent advertisement extensions

    • 7.2 Mobile IP registration process

      • 7.2.1 Tunneling

      • 7.2.2 Broadcast datagrams

      • 7.2.3 Move detection

      • 7.2.4 Returning home

      • 7.2.5 ARP considerations

      • 7.2.6 Mobile IP security considerations

    • 7.3 RFCs relevant to this chapter

  • Chapter 8. Quality of service

    • 8.1 Why QoS?

    • 8.2 Integrated Services

      • 8.2.1 Service classes

      • 8.2.2 Controlled Load Service

      • 8.2.3 Guaranteed Service

      • 8.2.4 The Resource Reservation Protocol (RSVP)

      • 8.2.5 Integrated Services outlook

    • 8.3 Differentiated Services

      • 8.3.1 Differentiated Services architecture

      • 8.3.2 Organization of the DSCP

      • 8.3.3 Configuration and administration of DS with LDAP

    • 8.4 RFCs relevant to this chapter

  • Chapter 9. IP version 6

    • 9.1 IPv6 introduction

      • 9.1.1 IP growth

      • 9.1.2 IPv6 feature overview

    • 9.2 The IPv6 header format

      • 9.2.1 Extension headers

      • 9.2.2 IPv6 addressing

      • 9.2.3 Traffic class

      • 9.2.4 Flow labels

      • 9.2.5 IPv6 security

      • 9.2.6 Packet sizes

    • 9.3 Internet Control Message Protocol Version 6 (ICMPv6)

      • 9.3.1 Neighbor discovery

      • 9.3.2 Multicast Listener Discovery (MLD)

    • 9.4 DNS in IPv6

      • 9.4.1 Format of IPv6 resource records

    • 9.5 DHCP in IPv6

      • 9.5.1 DHCPv6 messages

    • 9.6 IPv6 mobility support

    • 9.7 IPv6 new opportunities

      • 9.7.1 New infrastructure

      • 9.7.2 New services

      • 9.7.3 New research and development platforms

    • 9.8 Internet transition: Migrating from IPv4 to IPv6

      • 9.8.1 Dual IP stack implementation: The IPv6/IPv4 node

      • 9.8.2 Tunneling

      • 9.8.3 Interoperability summary

    • 9.9 RFCs relevant to this chapter

  • Chapter 10. Wireless IP

    • 10.1 Wireless concepts

    • 10.2 Why wireless?

      • 10.2.1 Deployment and cost effectiveness

      • 10.2.2 Reachability

      • 10.2.3 Scalability

      • 10.2.4 Security

      • 10.2.5 Connectivity and reliability

    • 10.3 WiFi

    • 10.4 WiMax

    • 10.5 Applications of wireless networking

      • 10.5.1 Last mile connectivity in broadband services

      • 10.5.2 Hotspots

      • 10.5.3 Mesh networking

    • 10.6 IEEE standards relevant to this chapter

  • Part 2 TCP/IP application protocols

  • Chapter 11. Application structure and programming interfaces

    • 11.1 Characteristics of applications

      • 11.1.1 The client/server model

    • 11.2 Application programming interfaces (APIs)

      • 11.2.1 The socket API

      • 11.2.2 Remote Procedure Call (RPC)

      • 11.2.3 The SNMP distributed programming interface (SNMP DPI)

      • 11.2.4 REXX sockets

    • 11.3 RFCs relevant to this chapter

  • Chapter 12. Directory and naming protocols

    • 12.1 Domain Name System (DNS)

      • 12.1.1 The hierarchical namespace

      • 12.1.2 Fully qualified domain names (FQDNs)

      • 12.1.3 Generic domains

      • 12.1.4 Country domains

      • 12.1.5 Mapping domain names to IP addresses

      • 12.1.6 Mapping IP addresses to domain names: Pointer queries

      • 12.1.7 The distributed name space

      • 12.1.8 Domain name resolution

      • 12.1.9 Domain Name System resource records

      • 12.1.10 Domain Name System messages

      • 12.1.11 A simple scenario

      • 12.1.12 Extended scenario

      • 12.1.13 Transport

      • 12.1.14 DNS applications

    • 12.2 Dynamic Domain Name System

      • 12.2.1 Dynamic updates in the DDNS

      • 12.2.2 Incremental zone transfers in DDNS

      • 12.2.3 Prompt notification of zone transfer

    • 12.3 Network Information System (NIS)

    • 12.4 Lightweight Directory Access Protocol (LDAP)

      • 12.4.1 LDAP: Lightweight access to X.500

      • 12.4.2 The LDAP directory server

      • 12.4.3 Overview of LDAP architecture

      • 12.4.4 LDAP models

      • 12.4.5 LDAP security

      • 12.4.6 LDAP URLs

      • 12.4.7 LDAP and DCE

      • 12.4.8 The Directory-Enabled Networks (DEN) initiative

      • 12.4.9 Web-Based Enterprise Management (WBEM)

    • 12.5 RFCs relevant to this chapter

  • Chapter 13. Remote execution and distributed computing

    • 13.1 Telnet

      • 13.1.1 Telnet operation

      • 13.1.2 Network Virtual Terminal

      • 13.1.3 Telnet options

      • 13.1.4 Telnet command structure

      • 13.1.5 Option negotiation

      • 13.1.6 Telnet basic commands

      • 13.1.7 Terminal emulation (Telnet 3270)

      • 13.1.8 TN3270 enhancements (TN3270E)

      • 13.1.9 Device-type negotiation

    • 13.2 Remote Execution Command protocol (REXEC and RSH)

    • 13.3 Introduction to the Distributed Computing Environment (DCE)

      • 13.3.1 DCE directory service

      • 13.3.2 Authentication service

      • 13.3.3 DCE threads

      • 13.3.4 Distributed Time Service

      • 13.3.5 Additional information

    • 13.4 Distributed File Service (DFS)

      • 13.4.1 File naming

      • 13.4.2 DFS performance

    • 13.5 RFCs relevant to this chapter

  • Chapter 14. File-related protocols

    • 14.1 File Transfer Protocol (FTP)

      • 14.1.1 An overview of FTP

      • 14.1.2 FTP operations

      • 14.1.3 The active data transfer

      • 14.1.4 The passive data transfer

      • 14.1.5 Using proxy transfer

      • 14.1.6 Reply codes

      • 14.1.7 Anonymous FTP

      • 14.1.8 Using FTP with IPv6

      • 14.1.9 Securing FTP sessions

    • 14.2 Trivial File Transfer Protocol (TFTP)

      • 14.2.1 TFTP usage

      • 14.2.2 Protocol description

      • 14.2.3 TFTP packets

      • 14.2.4 Data modes

      • 14.2.5 TFTP multicast option

      • 14.2.6 Security issues

    • 14.3 Secure Copy Protocol (SCP) and SSH FTP (SFTP)

      • 14.3.1 SCP syntax and usage

      • 14.3.2 SFTP syntax and usage

      • 14.3.3 SFTP interactive commands

    • 14.4 Network File System (NFS)

      • 14.4.1 NFS concept

      • 14.4.2 File integrity

      • 14.4.3 Lock Manager protocol

      • 14.4.4 NFS file system

      • 14.4.5 NFS version 4

      • 14.4.6 Cache File System

      • 14.4.7 WebNFS

    • 14.5 The Andrew File System (AFS)

    • 14.6 Common Internet File System (CIFS)

      • 14.6.1 NetBIOS over TCP/IP

      • 14.6.2 SMB/CIFS specifics

    • 14.7 RFCs relevant to this chapter

  • Chapter 15. Mail applications

    • 15.1 Simple Mail Transfer Protocol

      • 15.1.1 How SMTP works

      • 15.1.2 SMTP and the Domain Name System

    • 15.2 Sendmail

      • 15.2.1 Sendmail as a mail transfer agent (MTA)

      • 15.2.2 How sendmail works

    • 15.3 Multipurpose Internet Mail Extensions (MIME)

      • 15.3.1 How MIME works

      • 15.3.2 The Content-Transfer-Encoding field

      • 15.3.3 Using non-ASCII characters in message headers

    • 15.4 Post Office Protocol (POP)

      • 15.4.1 Connection states

      • 15.4.2 POP3 commands and responses

    • 15.5 Internet Message Access Protocol (IMAP4)

      • 15.5.1 Fundamental IMAP4 electronic mail models

      • 15.5.2 IMAP4 states

      • 15.5.3 IMAP4 commands and response interaction

      • 15.5.4 IMAP4 messages

    • 15.6 RFCs relevant to this chapter

  • Chapter 16. The Web

    • 16.1 Web browsers

    • 16.2 Web servers

    • 16.3 Hypertext Transfer Protocol (HTTP)

      • 16.3.1 Overview of HTTP

      • 16.3.2 HTTP operation

    • 16.4 Content

      • 16.4.1 Static content

      • 16.4.2 Client-side dynamic content

      • 16.4.3 Server-side dynamic content

      • 16.4.4 Developing content with IBM Web application servers

    • 16.5 RFCs relevant to this chapter

  • Chapter 17. Network management

    • 17.1 The Simple Network Management Protocol (SNMP)

      • 17.1.1 The Management Information Base (MIB)

      • 17.1.2 The SNMP agent

      • 17.1.3 The SNMP manager

      • 17.1.4 The SNMP subagent

      • 17.1.5 The SNMP model

      • 17.1.6 SNMP traps

      • 17.1.7 SNMP versions

      • 17.1.8 Single authentication and privacy protocol

    • 17.2 The NETSTAT utility

      • 17.2.1 Common NETSTAT options

      • 17.2.2 Sample NETSTAT report output

    • 17.3 RFCs relevant to this chapter

  • Chapter 18. Wireless Application Protocol

    • 18.1 The WAP environment

    • 18.2 Key elements of the WAP specifications

    • 18.3 WAP architecture

    • 18.4 Client identifiers

    • 18.5 Multimedia messaging system (MMS)

    • 18.6 WAP push architecture

      • 18.6.1 Push framework

      • 18.6.2 Push proxy gateway (PPG)

      • 18.6.3 Push access control protocol (PAP)

      • 18.6.4 Service indication

      • 18.6.5 Push over-the-air protocol (OTA)

      • 18.6.6 Client-side infrastructure

      • 18.6.7 Security

    • 18.7 The Wireless Application Environment (WAE2)

    • 18.8 User Agent Profile (UAProf)

    • 18.9 Wireless protocols

      • 18.9.1 Wireless Datagram Protocol (WDP)

      • 18.9.2 Wireless Profiled Transmission Control Protocol (WP-TCP)

      • 18.9.3 Wireless Control Message Protocol (WCMP)

      • 18.9.4 Wireless Transaction Protocol (WTP)

      • 18.9.5 Wireless Session Protocol (WSP)

      • 18.9.6 Wireless profiled HTTP (W-HTTP)

    • 18.10 Wireless security

      • 18.10.1 Wireless Transport Layer Security (WTLS)

      • 18.10.2 Wireless Identity Module (WIM)

    • 18.11 Wireless Telephony Application (WTA)

    • 18.12 RFCs relevant to this chapter

    • 18.13 Specifications relevant to this chapter

  • Chapter 19. Presence over IP

    • 19.1 Overview of the presence service

    • 19.2 Presence Information Data Format (PIDF)

    • 19.3 Presence protocols

      • 19.3.1 Binding to TCP

      • 19.3.2 Address resolution

    • 19.4 RFCs relevant to this chapter

  • Part 3 Advanced concepts and new technologies

  • Chapter 20. Voice over Internet Protocol

    • 20.1 Voice over IP (VoIP) introduction

      • 20.1.1 Benefits and applications

      • 20.1.2 VoIP functional components

    • 20.2 Session Initiation Protocol (SIP) technologies

      • 20.2.1 SIP request and response

      • 20.2.2 Sample SIP message flow

      • 20.2.3 SIP protocol architecture

    • 20.3 Media Gateway Control Protocol (MGCP)

      • 20.3.1 MGCP architecture

      • 20.3.2 MGCP primitives

    • 20.4 Media Gateway Controller (Megaco)

      • 20.4.1 Megaco architecture

    • 20.5 ITU-T recommendation H.323

      • 20.5.1 H.323 architecture

      • 20.5.2 H.323 protocol stack

    • 20.6 Summary of VoIP protocols

    • 20.7 RFCs relevant to this chapter

  • Chapter 21. Internet Protocol Television

    • 21.1 IPTV overview

      • 21.1.1 IPTV requirements

      • 21.1.2 Business benefits and applications

    • 21.2 Functional components

      • 21.2.1 Content acquisition

      • 21.2.2 CODEC (encode and decode)

      • 21.2.3 Display devices and control gateway

      • 21.2.4 IP (TV) transport

    • 21.3 IPTV technologies

      • 21.3.1 Summary of protocol standards

      • 21.3.2 Stream Control Transmission Protocol

      • 21.3.3 Session Description Protocol

      • 21.3.4 Real-Time Transport Protocol (RTP)

      • 21.3.5 Real-Time Control Protocol

      • 21.3.6 Moving Picture Experts Group (MPEG) standards

      • 21.3.7 H.261

    • 21.4 RFCs relevant to this chapter

  • Chapter 22. TCP/IP security

    • 22.1 Security exposures and solutions

      • 22.1.1 Common attacks against security

      • 22.1.2 Solutions to network security problems

      • 22.1.3 Implementations of security solutions

      • 22.1.4 Network security policy

    • 22.2 A short introduction to cryptography

      • 22.2.1 Terminology

      • 22.2.2 Symmetric or secret-key algorithms

      • 22.2.3 Asymmetric or public key algorithms

      • 22.2.4 Hash functions

      • 22.2.5 Digital certificates and certification authorities

      • 22.2.6 Random-number generators

      • 22.2.7 Export/import restrictions on cryptography

    • 22.3 Firewalls

      • 22.3.1 Firewall concept

      • 22.3.2 Components of a firewall system

      • 22.3.3 Types of firewalls

    • 22.4 IP Security Architecture (IPSec)

      • 22.4.1 Concepts

      • 22.4.2 Authentication Header (AH)

      • 22.4.3 Encapsulating Security Payload (ESP)

      • 22.4.4 Combining IPSec protocols

      • 22.4.5 Internet Key Exchange (IKE) protocol

    • 22.5 SOCKS

      • 22.5.1 SOCKS Version 5 (SOCKSv5)

    • 22.6 Secure Shell (1 and 2)

      • 22.6.1 SSH overview

    • 22.7 Secure Sockets Layer (SSL)

      • 22.7.1 SSL overview

      • 22.7.2 SSL protocol

    • 22.8 Transport Layer Security (TLS)

    • 22.9 Secure Multipurpose Internet Mail Extension (S-MIME)

    • 22.10 Virtual private networks (VPNs) overview

      • 22.10.1 VPN introduction and benefits

    • 22.11 Kerberos authentication and authorization system

      • 22.11.1 Assumptions

      • 22.11.2 Naming

      • 22.11.3 Kerberos authentication process

      • 22.11.4 Kerberos database management

      • 22.11.5 Kerberos Authorization Model

      • 22.11.6 Kerberos Version 5 enhancements

    • 22.12 Remote access authentication protocols

    • 22.13 Extensible Authentication Protocol (EAP)

    • 22.14 Layer 2 Tunneling Protocol (L2TP)

      • 22.14.1 Terminology

      • 22.14.2 Protocol overview

      • 22.14.3 L2TP security issues

    • 22.15 Secure Electronic Transaction (SET)

      • 22.15.1 SET roles

      • 22.15.2 SET transactions

      • 22.15.3 The SET certificate scheme

    • 22.16 RFCs relevant to this chapter

  • Chapter 23. Port based network access control

    • 23.1 Port based network access control (NAC) overview

    • 23.2 Port based NAC component overview

    • 23.3 Port based network access control operation

      • 23.3.1 Port based network access control functional considerations

    • 23.4 RFCs relevant to this chapter

  • Chapter 24. Availability, scalability, and load balancing

    • 24.1 Availability

    • 24.2 Scalability

    • 24.3 Load balancing

    • 24.4 Clustering

    • 24.5 Virtualization

    • 24.6 Virtual Router Redundancy Protocol (VRRP)

      • 24.6.1 Introduction

      • 24.6.2 VRRP definitions

      • 24.6.3 VRRP overview

      • 24.6.4 Sample configuration

      • 24.6.5 VRRP packet format

    • 24.7 Round-robin DNS

    • 24.8 Alternative solutions to load balancing

      • 24.8.1 Network Address Translation

      • 24.8.2 Encapsulation

    • 24.9 RFCs relevant to this chapter

  • Appendix A. Multiprotocol Label Switching

    • A.1 MPLS: An introduction

      • A.1.1 Conventional routing versus MPLS forwarding mode

      • A.1.2 Benefits

      • A.1.3 Terminology

    • A.2 MPLS network processing

      • A.2.1 Label swapping

      • A.2.2 Label switched path (LSP)

      • A.2.3 Label stack and label hierarchies

      • A.2.4 MPLS stacks in a BGP environment

      • A.2.5 Label distribution protocols

      • A.2.6 Stream merge

    • A.3 Emulating Ethernet over MPLS networks

    • A.4 Generalized Multiprotocol Label Switching (GMPLS)

      • A.4.1 Benefits

      • A.4.2 MPLS and GMPLS comparison in OTN environment

      • A.4.3 How does GMPLS work?

      • A.4.4 Link Management Protocol (LMP)

      • A.4.5 Signaling for route selection and path setup

      • A.4.6 GMPLS considerations

      • A.4.7 GMPLS examples

    • A.5 RFCs relevant to this chapter

  • Abbreviations and acronyms

  • Related publications

    • IBM Redbooks

    • Other publications

    • Online resources

    • How to get IBM Redbooks

    • Help from IBM

  • Index

  • Back cover

Nội dung

ibm.com/redbooks TCP/IP Tutorial and Technical Overview Lydia Parziale David T. Britt Chuck Davis Jason Forrester Wei Liu Carolyn Matthews Nicolas Rosselot Understand networking fundamentals of the TCP/IP protocol suite Introduces advanced concepts and new technologies Includes the latest TCP/IP protocols Front cover TCP/IP Tutorial and Technical Overview December 2006 International Technical Support Organization GG24-3376-07 © Copyright International Business Machines Corporation 1989-2006. All rights reserved. Note to U.S. Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Eighth Edition (December 2006) Note: Before using this information and the product it supports, read the information in “Notices” on page xvii. © Copyright IBM Corp. 1989-2006. All rights reserved. iii Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Part 1. Core TCP/IP protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1. Architecture, history, standards, and trends . . . . . . . . . . . . . . . 3 1.1 TCP/IP architectural model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.1 Internetworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.2 The TCP/IP protocol layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1.3 TCP/IP applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.2 The roots of the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.2.1 ARPANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2.2 NSFNET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.2.3 Commercial use of the Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.2.4 Internet2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 1.2.5 The Open Systems Interconnection (OSI) Reference Model . . . . . . 20 1.3 TCP/IP standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 1.3.1 Request for Comments (RFC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 1.3.2 Internet standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 1.4 Future of the Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 1.4.1 Multimedia applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 1.4.2 Commercial use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 1.4.3 The wireless Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 1.5 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2. Network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2.1 Ethernet and IEEE 802 local area networks (LANs) . . . . . . . . . . . . . . . . . 30 2.1.1 Gigabit Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.2 Fiber Distributed Data Interface (FDDI). . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.3 Serial Line IP (SLIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4 Point-to-Point Protocol (PPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 2.4.1 Point-to-point encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 2.5 Integrated Services Digital Network (ISDN) . . . . . . . . . . . . . . . . . . . . . . . 38 2.6 X.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 iv TCP/IP Tutorial and Technical Overview 2.7 Frame relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.7.1 Frame format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.7.2 Interconnect issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 2.7.3 Data link layer parameter negotiation . . . . . . . . . . . . . . . . . . . . . . . . 43 2.7.4 IP over frame relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 2.8 PPP over SONET and SDH circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 2.8.1 Physical layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 2.9 Multi-Path Channel+ (MPC+) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 2.10 Asynchronous transfer mode (ATM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 2.10.1 Address resolution (ATMARP and InATMARP) . . . . . . . . . . . . . . . 47 2.10.2 Classical IP over ATM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 2.10.3 ATM LAN emulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 2.10.4 Classical IP over ATM versus LAN emulation. . . . . . . . . . . . . . . . . 59 2.11 Multiprotocol over ATM (MPOA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 2.11.1 Benefits of MPOA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 2.11.2 MPOA logical components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 2.11.3 MPOA functional components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 2.11.4 MPOA operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 2.12 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Chapter 3. Internetworking protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 3.1 Internet Protocol (IP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.1.1 IP addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.1.2 IP subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 3.1.3 IP routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 3.1.4 Methods of delivery: Unicast, broadcast, multicast, and anycast . . . 84 3.1.5 The IP address exhaustion problem . . . . . . . . . . . . . . . . . . . . . . . . . 86 3.1.6 Intranets: Private IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 3.1.7 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . 89 3.1.8 Classless Inter-Domain Routing (CIDR) . . . . . . . . . . . . . . . . . . . . . . 95 3.1.9 IP datagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 3.2 Internet Control Message Protocol (ICMP) . . . . . . . . . . . . . . . . . . . . . . . 109 3.2.1 ICMP messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 3.2.2 ICMP applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 3.3 Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . . . . . 119 3.4 Address Resolution Protocol (ARP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 3.4.1 ARP overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 3.4.2 ARP detailed concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 3.4.3 ARP and subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 3.4.4 Proxy-ARP or transparent subnetting . . . . . . . . . . . . . . . . . . . . . . . 123 3.5 Reverse Address Resolution Protocol (RARP) . . . . . . . . . . . . . . . . . . . . 124 3.5.1 RARP concept. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 3.6 Bootstrap Protocol (BOOTP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Contents v 3.6.1 BOOTP forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 3.6.2 BOOTP considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3.7 Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . . . . . . . . . . . 130 3.7.1 The DHCP message format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 3.7.2 DHCP message types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 3.7.3 Allocating a new network address. . . . . . . . . . . . . . . . . . . . . . . . . . 134 3.7.4 DHCP lease renewal process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.7.5 Reusing a previously allocated network address . . . . . . . . . . . . . . 138 3.7.6 Configuration parameters repository. . . . . . . . . . . . . . . . . . . . . . . . 139 3.7.7 DHCP considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 3.7.8 BOOTP and DHCP interoperability. . . . . . . . . . . . . . . . . . . . . . . . . 140 3.8 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Chapter 4. Transport layer protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4.1 Ports and sockets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 4.1.1 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 4.1.2 Sockets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 4.2 User Datagram Protocol (UDP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4.2.1 UDP datagram format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 4.2.2 UDP application programming interface . . . . . . . . . . . . . . . . . . . . . 149 4.3 Transmission Control Protocol (TCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 4.3.1 TCP concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 4.3.2 TCP application programming interface . . . . . . . . . . . . . . . . . . . . . 164 4.3.3 TCP congestion control algorithms . . . . . . . . . . . . . . . . . . . . . . . . . 165 4.4 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Chapter 5. Routing protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 5.1 Autonomous systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 5.2 Types of IP routing and IP routing algorithms . . . . . . . . . . . . . . . . . . . . . 174 5.2.1 Static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 5.2.2 Distance vector routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 5.2.3 Link state routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 5.2.4 Path vector routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 5.2.5 Hybrid routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 5.3 Routing Information Protocol (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 5.3.1 RIP packet types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 5.3.2 RIP packet format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 5.3.3 RIP modes of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 5.3.4 Calculating distance vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 5.3.5 Convergence and counting to infinity . . . . . . . . . . . . . . . . . . . . . . . 185 5.3.6 RIP limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 5.4 Routing Information Protocol Version 2 (RIP-2) . . . . . . . . . . . . . . . . . . . 189 5.4.1 RIP-2 packet format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 vi TCP/IP Tutorial and Technical Overview 5.4.2 RIP-2 limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 5.5 RIPng for IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 5.5.1 Differences between RIPng and RIP-2 . . . . . . . . . . . . . . . . . . . . . . 193 5.5.2 RIPng packet format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 5.6 Open Shortest Path First (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 5.6.1 OSPF terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 5.6.2 Neighbor communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 5.6.3 OSPF neighbor state machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 5.6.4 OSPF route redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 5.6.5 OSPF stub areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 5.6.6 OSPF route summarization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 5.7 Enhanced Interior Gateway Routing Protocol (EIGRP). . . . . . . . . . . . . . 212 5.7.1 Features of EIGRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 5.7.2 EIGRP packet types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 5.8 Exterior Gateway Protocol (EGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 5.9 Border Gateway Protocol (BGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 5.9.1 BGP concepts and terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 5.9.2 IBGP and EBGP communication . . . . . . . . . . . . . . . . . . . . . . . . . . 218 5.9.3 Protocol description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 5.9.4 Path selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 5.9.5 BGP synchronization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 5.9.6 BGP aggregation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 5.9.7 BGP confederations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 5.9.8 BGP route reflectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 5.10 Routing protocol selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 5.11 Additional functions performed by the router. . . . . . . . . . . . . . . . . . . . . 234 5.12 Routing processes in UNIX-based systems . . . . . . . . . . . . . . . . . . . . . 235 5.13 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Chapter 6. IP multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 6.1 Multicast addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 6.1.1 Multicasting on a single physical network . . . . . . . . . . . . . . . . . . . . 238 6.1.2 Multicasting between network segments . . . . . . . . . . . . . . . . . . . . 240 6.2 Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . . . . . 241 6.2.1 IGMP messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 6.2.2 IGMP operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 6.3 Multicast delivery tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 6.4 Multicast forwarding algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 6.4.1 Reverse path forwarding algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 252 6.4.2 Center-based tree algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 6.4.3 Multicast routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 6.5 Distance Vector Multicast Routing Protocol (DVMRP) . . . . . . . . . . . . . . 254 6.5.1 Protocol overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Contents vii 6.5.2 Building and maintaining multicast delivery trees . . . . . . . . . . . . . . 256 6.5.3 DVMRP tunnels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 6.6 Multicast OSPF (MOSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 6.6.1 Protocol overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 6.6.2 MOSPF and multiple OSPF areas . . . . . . . . . . . . . . . . . . . . . . . . . 260 6.6.3 MOSPF and multiple autonomous systems . . . . . . . . . . . . . . . . . . 260 6.6.4 MOSPF interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 6.7 Protocol Independent Multicast (PIM) . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 6.7.1 PIM dense mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 6.7.2 PIM sparse mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 6.8 Interconnecting multicast domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 6.8.1 Multicast Source Discovery Protocol (MSDP). . . . . . . . . . . . . . . . . 266 6.8.2 Border Gateway Multicast Protocol. . . . . . . . . . . . . . . . . . . . . . . . . 269 6.9 The multicast backbone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 6.9.1 MBONE routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 6.9.2 Multicast applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 6.10 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Chapter 7. Mobile IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 7.1 Mobile IP overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 7.1.1 Mobile IP operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 7.1.2 Mobility agent advertisement extensions . . . . . . . . . . . . . . . . . . . . 278 7.2 Mobile IP registration process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 7.2.1 Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 7.2.2 Broadcast datagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 7.2.3 Move detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 7.2.4 Returning home. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 7.2.5 ARP considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 7.2.6 Mobile IP security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . 286 7.3 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Chapter 8. Quality of service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 8.1 Why QoS?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 8.2 Integrated Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 8.2.1 Service classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 8.2.2 Controlled Load Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 8.2.3 Guaranteed Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 8.2.4 The Resource Reservation Protocol (RSVP) . . . . . . . . . . . . . . . . . 296 8.2.5 Integrated Services outlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 8.3 Differentiated Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 8.3.1 Differentiated Services architecture . . . . . . . . . . . . . . . . . . . . . . . . 310 8.3.2 Organization of the DSCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 8.3.3 Configuration and administration of DS with LDAP. . . . . . . . . . . . . 322 viii TCP/IP Tutorial and Technical Overview 8.4 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Chapter 9. IP version 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 9.1 IPv6 introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 9.1.1 IP growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 9.1.2 IPv6 feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 9.2 The IPv6 header format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 9.2.1 Extension headers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 9.2.2 IPv6 addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 9.2.3 Traffic class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 9.2.4 Flow labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 9.2.5 IPv6 security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 9.2.6 Packet sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 9.3 Internet Control Message Protocol Version 6 (ICMPv6) . . . . . . . . . . . . . 352 9.3.1 Neighbor discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 9.3.2 Multicast Listener Discovery (MLD) . . . . . . . . . . . . . . . . . . . . . . . . 365 9.4 DNS in IPv6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 9.4.1 Format of IPv6 resource records. . . . . . . . . . . . . . . . . . . . . . . . . . . 368 9.5 DHCP in IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 9.5.1 DHCPv6 messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 9.6 IPv6 mobility support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 9.7 IPv6 new opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 9.7.1 New infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 9.7.2 New services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 9.7.3 New research and development platforms . . . . . . . . . . . . . . . . . . . 378 9.8 Internet transition: Migrating from IPv4 to IPv6 . . . . . . . . . . . . . . . . . . . . 379 9.8.1 Dual IP stack implementation: The IPv6/IPv4 node . . . . . . . . . . . . 380 9.8.2 Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 9.8.3 Interoperability summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 9.9 RFCs relevant to this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Chapter 10. Wireless IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 10.1 Wireless concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 10.2 Why wireless? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 10.2.1 Deployment and cost effectiveness . . . . . . . . . . . . . . . . . . . . . . . 395 10.2.2 Reachability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 10.2.3 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 10.2.4 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 10.2.5 Connectivity and reliability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 10.3 WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 10.4 WiMax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 10.5 Applications of wireless networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 10.5.1 Last mile connectivity in broadband services . . . . . . . . . . . . . . . . 402 [...]... others xviii TCP/IP Tutorial and Technical Overview Preface The TCP/IP protocol suite has become a staple of today's international society and global economy Continually evolving standards provide a wide and flexible foundation on which an entire infrastructure of applications are built Through these we can seek entertainment, conduct business, make financial transactions, deliver services, and much,... Business Partners, and Clients Your efforts will help increase product acceptance and client satisfaction As a bonus, you'll develop a network of contacts in IBM development labs, and increase your productivity and marketability Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html xxii TCP/IP Tutorial and Technical Overview Comments... IBM Corporation, International Technical Support Organization Dept HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 Preface xxiii xxiv TCP/IP Tutorial and Technical Overview Part 1 Part 1 Core TCP/IP protocols The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become the industry-standard method of interconnecting hosts, networks, and the Internet As such, it is... other standard protocols exist that might not necessarily be required in every implementation of the TCP/IP protocol suite However, there are those that can be very useful given certain operational needs of the implementation Such protocols include IP version 6, quality of service protocols, and wireless IP 2 TCP/IP Tutorial and Technical Overview 1 Chapter 1 Architecture, history, standards, and trends... X.25 (which is reliable in itself), ATM, FDDI, and even SNA We discuss some physical networks and interfaces in Chapter 2, “Network interfaces” on page 29 TCP/IP specifications do not describe or standardize any network-layer protocols per se; they only standardize ways of accessing those protocols from the internetwork layer 8 TCP/IP Tutorial and Technical Overview A more detailed layering model is included... Internet and networks worldwide Although TCP/IP supports a host of applications, both standard and nonstandard, these applications could not exist without the foundation of a set of core protocols Additionally, in order to understand the capability of TCP/IP applications, an understanding of these core protocols must be realized With this in mind, Part I begins with providing a background of TCP/IP, ... However, because TCP/IP continues to develop and grow in order to meet the changing needs of our communities, it might sometimes be hard to keep track of new functionality or identify new possibilities For this reason, the TCP/IP Tutorial and Technical Overview provides not only an introduction to the TCP/IP protocol suite, but also serves as a reference for advanced users seeking to keep their TCP/IP skills... provide applications with reliable, in-order, data stream delivery 6 TCP/IP Tutorial and Technical Overview Figure 1-2 shows how the TCP/IP protocols are modeled in four layers Transport Internetwork Applications Applications TCP/UDP ICMP IP ARP/RARP Network Interface and Hardware Network Interface and Hardware Figure 1-2 The TCP/IP protocol stack: Each layer represents a package of functions... about TCP/IP on various platforms, so the following Web sites might assist you in further researching this topic: TCP/IP and System z: http://www.ibm.com/servers/eserver/zseries/zos/bkserv/ © Copyright IBM Corp 1989-2006 All rights reserved xix TCP/IP and System p: http://www.ibm.com/systems/p/library/index.html TCP/IP and System i: http://www.ibm.com/servers/eserver/iseries/tcpip/index.html TCP/IP and. .. current standards It is our hope that both the novice and the expert will find useful information in this publication In Part I, you will find an introduction to the core concepts and history upon which TCP/IP is founded Included is an introduction to the history of TCP/IP and an overview of its current architecture We also provide detailed discussions about the protocols that comprise the suite, and how . the TCP/IP protocol suite Introduces advanced concepts and new technologies Includes the latest TCP/IP protocols Front cover TCP/IP Tutorial and Technical. ibm.com/redbooks TCP/IP Tutorial and Technical Overview Lydia Parziale David T. Britt Chuck Davis Jason Forrester Wei Liu Carolyn Matthews Nicolas Rosselot Understand

Ngày đăng: 27/01/2014, 08:20

TỪ KHÓA LIÊN QUAN