Computer networking a top down approach 7th global edtion

856 989 1
Computer networking a top down approach 7th global edtion

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

GLOBAL EDITION Computer Networking A Top-Down Approach SEVENTH EDITION Kurose • Ross Digital Resources for Students Your new textbook provides 12-month access to digital resources that may include VideoNotes, interactive exercises, programming assignments, Wireshark labs, additional technical material, and more Refer to the preface in the textbook for a detailed list of resources Follow the instructions below to register for the Companion Website for Computer Networking: A Top-Down Approach, Seventh Edition Go to www.pearsonglobaleditions.com/kurose Find the title of your textbook Click Companion Website Click Register and follow the on-screen instructions to create a login name and password Use a coin to scratch of the coating and reveal your access code Do not use a sharp knife or other sharp object as it may damage the code Use the login name and password you created during registration to start using the digital resources that accompany your textbook IMPORTANT: This access code can only be used once This subscription is valid for 12 months upon activation and is not transferrable If the access code has already been revealed it may no longer be valid For technical support go to https://support.pearson.com/getsupport COMPUTER NETWORKING SEVENTH EDITION GLOBAL EDITION dumperina A Top-Down Approach J AMES F K UROSE University of Massachusetts, Amherst K EITH W R OSS NYU and NYU Shanghai Boston Columbus Indianapolis New York San Francisco Hoboken Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President, Editorial Director, ECS: Marcia Horton Acquisitions Editor: Matt Goldstein Editorial Assistant: Kristy Alaura Acquisitions Editor, Global Editions: Aditee Agarwal Vice President of Marketing: Christy Lesko Director of Field Marketing: Tim Galligan Product Marketing Manager: Bram Van Kempen Field Marketing Manager: Demetrius Hall Marketing Assistant: Jon Bryant Director of Product Management: Erin Gregg Team Lead, Program and Project Management: Scott Disanno Program Manager: Joanne Manning and Carole Snyder Project Manager: Katrina Ostler, Ostler Editorial, Inc Project Editor, Global Editions: K.K Neelakantan Senior Manufacturing Controller, Global Editions: Kay Holman Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia Cover Designer: Lumina Datamatics Manager, Rights and Permissions: Ben Ferrini Project Manager, Rights and Permissions: Jenny Hoffman, Aptara Corporation Inventory Manager: Ann Lam Cover Image: ISebyI/Shutterstock.com Media Project Manager: Steve Wright Media Production Manager, Global Editions: Vikram Kumar Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2017 The rights of James F Kurose and Keith W Ross to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Computer Networking: A Top-Down Approach, Seventh Edition, ISBN 978-0-13-359414-0, by James F Kurose and Keith W Ross published by Pearson Education © 2017 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 ISBN 10: 1-292-15359-8 ISBN 13: 978-1-292-15359-9 Typeset by Cenveo Publisher Services Printed and bound in Malaysia About the Authors Jim Kurose Jim Kurose is a Distinguished University Professor of Computer Science at the University of Massachusetts, Amherst He is currently on leave from the University of Massachusetts, serving as an Assistant Director at the US National Science Foundation, where he leads the Directorate of Computer and Information Science and Engineering Dr Kurose has received a number of recognitions for his educational activities including Outstanding Teacher Awards from the National Technological University (eight times), the University of Massachusetts, and the Northeast Association of Graduate Schools He received the IEEE Taylor Booth Education Medal and was recognized for his leadership of Massachusetts’ Commonwealth Information Technology Initiative He has won several conference best paper awards and received the IEEE Infocom Achievement Award and the ACM Sigcomm Test of Time Award Dr Kurose is a former Editor-in-Chief of IEEE Transactions on Communications and of IEEE/ACM Transactions on Networking He has served as Technical Program co-Chair for IEEE Infocom, ACM SIGCOMM, ACM Internet Measurement Conference, and ACM SIGMETRICS He is a Fellow of the IEEE and the ACM His research interests include network protocols and architecture, network measurement, multimedia communication, and modeling and performance evaluation He holds a PhD in Computer Science from Columbia University Keith Ross Keith Ross is the Dean of Engineering and Computer Science at NYU Shanghai and the Leonard J Shustek Chair Professor in the Computer Science and Engineering Department at NYU Previously he was at University of Pennsylvania (13 years), Eurecom Institute (5 years) and Polytechnic University (10 years) He received a B.S.E.E from Tufts University, a M.S.E.E from Columbia University, and a Ph.D in Computer and Control Engineering from The University of Michigan Keith Ross is also the co-founder and original CEO of Wimba, which develops online multimedia applications for e-learning and was acquired by Blackboard in 2010 Professor Ross’s research interests are in privacy, social networks, peer-to-peer networking, Internet measurement, content distribution networks, and stochastic modeling He is an ACM Fellow, an IEEE Fellow, recipient ABOUT THE AUTHORS of the Infocom 2009 Best Paper Award, and recipient of 2011 and 2008 Best Paper Awards for Multimedia Communications (awarded by IEEE Communications Society) He has served on numerous journal editorial boards and conference program committees, including IEEE/ACM Transactions on Networking, ACM SIGCOMM, ACM CoNext, and ACM Internet Measurement Conference He also has served as an advisor to the Federal Trade Commission on P2P file sharing To Julie and our three precious ones—Chris, Charlie, and Nina JFK A big THANKS to my professors, colleagues, and students all over the world KWR This page intentionally left blank Preface Welcome to the seventh edition of Computer Networking: A Top-Down Approach Since the publication of the first edition 16 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by over 100,000 students and practitioners worldwide We’ve heard from many of these readers and have been overwhelmed by the positive response What’s New in the Seventh Edition? We think one important reason for this success has been that our book continues to offer a fresh and timely approach to computer networking instruction We’ve made changes in this seventh edition, but we’ve also kept unchanged what we believe (and the instructors and students who have used our book have confirmed) to be the most important aspects of this book: its top-down approach, its focus on the Internet and a modern treatment of computer networking, its attention to both principles and practice, and its accessible style and approach toward learning about computer networking Nevertheless, the seventh edition has been revised and updated substantially Long-time readers of our book will notice that for the first time since this text was published, we’ve changed the organization of the chapters themselves The network layer, which had been previously covered in a single chapter, is now covered in Chapter (which focuses on the so-called “data plane” component of the network layer) and Chapter (which focuses on the network layer’s “control plane”) This expanded coverage of the network layer reflects the swift rise in importance of software-defined networking (SDN), arguably the most important and exciting advance in networking in decades Although a relatively recent innovation, SDN has been rapidly adopted in practice—so much so that it’s already hard to imagine an introduction to modern computer networking that doesn’t cover SDN The topic of network management, previously covered in Chapter 9, has now been folded into the new Chapter As always, we’ve also updated many other sections of the text to reflect recent changes in the dynamic field of networking since the sixth edition As always, material that has been retired from the printed text can always be found on this book’s Companion Website The most important updates are the following: • Chapter has been updated to reflect the ever-growing reach and use of the Internet • Chapter 2, which covers the application layer, has been significantly updated We’ve removed the material on the FTP protocol and distributed hash tables to PREFACE • • • • • • • • make room for a new section on application-level video streaming and content distribution networks, together with Netflix and YouTube case studies The socket programming sections have been updated from Python to Python Chapter 3, which covers the transport layer, has been modestly updated The material on asynchronous transport mode (ATM) networks has been replaced by more modern material on the Internet’s explicit congestion notification (ECN), which teaches the same principles Chapter covers the “data plane” component of the network layer—the per-router forwarding function that determine how a packet arriving on one of a router’s input links is forwarded to one of that router’s output links We updated the material on traditional Internet forwarding found in all previous editions, and added material on packet scheduling We’ve also added a new section on generalized forwarding, as practiced in SDN There are also numerous updates throughout the chapter Material on multicast and broadcast communication has been removed to make way for the new material In Chapter 5, we cover the control plane functions of the network layer—the network-wide logic that controls how a datagram is routed along an end-to-end path of routers from the source host to the destination host As in previous editions, we cover routing algorithms, as well as routing protocols (with an updated treatment of BGP) used in today’s Internet We’ve added a significant new section on the SDN control plane, where routing and other functions are implemented in so-called SDN controllers Chapter 6, which now covers the link layer, has an updated treatment of Ethernet, and of data center networking Chapter 7, which covers wireless and mobile networking, contains updated material on 802.11 (so-called “WiFi) networks and cellular networks, including 4G and LTE Chapter 8, which covers network security and was extensively updated in the sixth edition, has only modest updates in this seventh edition Chapter 9, on multimedia networking, is now slightly “thinner” than in the sixth edition, as material on video streaming and content distribution networks has been moved to Chapter 2, and material on packet scheduling has been incorporated into Chapter Significant new material involving end-of-chapter problems has been added As with all previous editions, homework problems have been revised, added, and removed As always, our aim in creating this new edition of our book is to continue to provide a focused and modern treatment of computer networking, emphasizing both principles and practice www.downloadslide.net 840 INDEX pure ALOHA protocol, 486 push caching, 183–184 push protocol, 149 Python, 186 port numbers, 223 TCP connections, 194–197 UDP connections, 189–192, 223 Q Q2931b protocol, 753 QoS See quality of service QQ, 708 quality of service (QoS) call admission, 752 in 4G, 586 per-connection guarantees, 738, 751–754 resource reservation, 753 RTP and, 729 traffic policing and, 745 quantization, 706 query ARP, 500, 531 DNS chain, 161–162 DNS message, 531 queueing delays, 52–53, 63, 64, 67–69 network congestion and, 291 queuing FIFO, 353–354 input, 350 line speed and, 349–350 non-preemptive priority, 355 output, 351–352 priority, 353, 354–356 round-robin, 353, 356–357 in routers, 349–353 traffic load and, 350 transmission rate and, 349–350 WFQ, 356–357 work-conserving, 355, 356 QUIC protocol, 230, 231, 313 R RA See router agent radio access network 4G, 587–588 3G, 584–585 Radio Network Controller (RNC), 584, 586 RADIUS, 565, 677–678 Rand Institute, 88 random access protocols, 481, 483–492, 506, 565 random backoff, 567 Random Early Detection (RED), 352 rarest first, 174 rate adaptation, 575–576 RC4 stream cipher, 675 RCP See Routing Control Platform realm with private addresses, 373 real-time conversational applications See also Voice-over-IP protocols for, 728–736 RTP, 728–731 SIP, 731–736, 765 real-time measurements, 181 Real-Time Streaming Protocol (RTSP), 711 Real-Time Transport Protocol (RTP), 711, 728–730 audio and video payload types, 731 packet header fields, 730 reassembly IPv4 datagram, 361–362 IPv6 datagram, 379 receive buffer, 281, 282 receiver in CRC operation, 477 in parity bit operation, 474–476 receiver authentication, 655 receiver feedback, 238 receive window, 264, 281, 282 recursive queries, 161 www.downloadslide.net INDEX RED See Random Early Detection reduced-function devices, 578 regional ISP, 60–61 registrar, 166, 434 SIP, 735 registration with home agent, 600–602 in mobile IP, 602 registries, 369 relay peers, 726–727 relays, Skype, 726–727 reliable data transfer, 119, 220, 259–260 over channel with bit errors, 237–242 over lossy channel with bit errors, 242–245 over perfectly reliable channel, 236–237 principles of, 234–260 service implementation for, 235, 236 service model for, 234, 235 TCP, 272–379 reliable data transfer protocol, 234 building, 236–245 pipelined, 245, 247–249 reliable data transfer service, 272 reliable delivery service, link-layer, 470 repeater, 507 request line, 132 request messages, HTTP, 131–133 requests for comments (RFCs), 33 as protocol standards, 186 Request to Send (RTS), 568–570 resource records (RRs), 163–164, 532 resource reservation, 753 response messages, HTTP, 133–136 response time, cloud service performance, 303 retransmission, 238 congestion and, 292–293 CSMA/CA and, 567 CSMA/CD and, 567 duplicate packets from, 240 fast, 277–279 in random access protocols, 483 sequence numbers for handling, 240–241 in slotted ALOHA, 484 TCP timeout interval for, 270–271 TCP timer management for, 272–273 time-based, 244–245 Rexford, Jennifer, 464–466 RFC 2616, 186 RFCs See requests for comments RIP, 407, 414, 532 Rivest, Ron, 633, 640 RNC See Radio Network Controller roaming number, 604 Roberts, Lawrence, 88, 544 robustness, LS and DV algorithms, 419 root DNS servers, 159, 162 round-robin queuing, 353, 356–357 round-trip time (RTT), 130 buffer sizing and, 353 TCP estimation for, 269–271 TCP variable tracking, 297–298 route, 32 BGP, 427 BGP selection algorithm for, 429–430 route aggregation, 367 route information, advertising in BGP, 424–426 router agent (RA), 402 router discovery, 599 841 www.downloadslide.net 842 INDEX routers, 32, 51, 382 architecture of, 341 border, 422–423, 523 buffer sizing, 353 components of, 341–344 congestion and, 290–295 data plane, 341–357 destination-based forwarding, 343, 344–347 edge, 342 forwarding plane, 342–343 forwarding tables, 336, 337 gateway, 424 input port processing, 344–347 internal, 424 label-switched, 521 NAT-enabled, 373–375 output port processing, 349 per-router control, 402, 403 queuing in, 349–353 self-synchronization, 411 switches versus, 513–515 switching fabric, 347–349 route summarization, 367 routing, 336, 337 calls to mobile users, 604–605 direct, to mobile nodes, 596–597 hot potato, 428–429 indirect, in mobile IP, 599 indirect, to mobile nodes, 593–596 inter-area, 422–423 intra-ASs, 419–423, 433, 444 intra-domain, 531–532 intruder interference with, 624 among ISPs, 423–435 link weights in, 421 logically centralized, 338 to mobile nodes, 592–597 multicast, 422, 617 routing algorithms, 336, 337, 404–419 ARPAnet, 407, 414 centralized, 406–408 convergence speed, 419 decentralized, 406–407 distance-vector, 412–419 dynamic, 407 in interconnection networks, 527 link-state, 407–411 load sensitivity, 407 static, 407 routing controllers logically centralized, 338 SDN and, 339 Routing Control Platform (RCP), 464 routing loop, 417 routing policy, BGP, 431–434 routing processor, 342 routing protocols, 53–54 routing tables, 414 BGP, 429–430 RRs See resource records RSA algorithm, 633–638, 658 RST bit, 264 RSVP protocol, 753 RTP See Real-Time Transport Protocol RTP header, 729 RTP packet, 729 RTP session, 729 RTS See Request to Send RTSP See Real-Time Streaming Protocol RTT See round-trip time rwnd, 297–298 S SA See security association SAD See Security Association Database SAL See Service Abstraction Layer www.downloadslide.net INDEX SampleRTT, 270 satellite Internet access, 44, 467 satellite radio channels, 49 Scantlebury, Roger, 88 scheduling algorithms, 588 Schulzrinne, Henning, 728, 764–766 SCTP See Stream Control Transmission Protocol SDN See software-defined networking SDN controller, 438–440, 465 secure communication, 622 secure e-mail, 655–658 Secure Hash Algorithm (SHA-1), 641, 642 Secure Sockets Layer (SSL), 122, 212, 544, 659–665, 686 connection closure, 665 data transfer, 662–663 handshake, 661, 664–665 key derivation, 662 security, 701–702 datagram inspection, 376 DNS vulnerabilities, 167 e-mail, 654–659 firewalls, 376, 382, 623, 679–687 IDSs, 376, 623, 687–690 network layer, 340, 665–673 operational, 412, 623, 679–690 OSPF and, 422 switch poisoning, 513 SYN flood attacks, 288 transport protocol, 120–121 wireless LANs, 674–678 security association (SA), 668–669, 673 Security Association Database (SAD), 669 Security Parameter Index (SPI), 669 Security Policy Database (SPD), 672 segment replay attack, 664 segments, 79, 216, 219 acknowledged, 299 lost, 299 maximum size, 263, 264, 307 TCP, 263 TCP structure, 264–269 TCP SYN, 532, 681 transport-layer, 82 UDP, 529 UDP structure, 232 selective acknowledgment, 280 selective repeat (SR), 249, 254–260 events and actions, 256 operation of, 257 TCP as, 280 window size, 258, 259 self-clocking, 298 self-learning, 511–512, 530 self-replicating malware, 84 self-scalability, 115 self-synchronization, 411 send buffer, 263 sender authentication, 655, 656 senders in CRC operation, 477–478 in parity bit operation, 474 sending rate, 292 sequence number, 240 in 802.11 frames, 573 in GBN protocol, 249–250 jitter control with, 719 in pipelined protocols, 249 retransmission handling with, 240–241 RTP, 730 in SR protocol, 255, 258 in SSL MAC calculation, 663 TCP, 265–267 for TCP segment, 266 Telnet and, 267–269 sequence number field, 264 843 www.downloadslide.net 844 INDEX servers, 39, 114, 116 authoritative DNS, 160, 532 DNS, 155, 159–162, 160, 167 DNS root, 159, 162 enter-deep, 179 local DNS, 160 mail, 144–145, 156 managing, 450 network control, 441 processes, 116–117, 261 proxy, 686, 735, 138 TCP socket programming, 196–198 UDP socket programming, 191–192 user interaction with via cookies, 136–138 web, 91, 127, 227–228 Service Abstraction Layer (SAL), 444–445 service differentiation, 737, 747–751 Service Level Agreements (SLAs), 450 service model, 77 IP, 220 network, 339–340 reliable data transfer, 234, 235 services DNS, 155–157 flow-control, 280 full-duplex, 261 layering, 77 link layer, 470–471 network layer, 339–340 TCP, 220 transport layer, 118–123 UDP, 123 unreliable, 220 Service Set Identifier (SSID), 562 in beacon frames, 563 Serving Gateway (S-GW), 586 Serving GPRS Support Nodes (SGSNs), 584 Session Initiation Protocol (SIP), 731–736, 765 addresses, 733–734 call to known IP address, 732–733 messages, 734 name translation and user location, 734–736 session keys, 637, 655 SGSNs See Serving GPRS Support Nodes S-GW See Serving Gateway SHA-1 See Secure Hash Algorithm Shamir, Adi, 633 shared medium, 48 delays in, 71 shipping containers, 526–527 shortest path, 406 Short Inter-frame Spacing (SIFS), 566 SIFS See Short Inter-frame Spacing signal strength, 553 fading, 556 signal-to-noise ratio (SNR), 554–556 rate adaptation and, 575 signature-based systems, 689, 690 silent periods, 57 simple authentication, 422 Simple Mail Transfer Protocol (SMTP), 78, 125, 144, 146–148 HTTP comparison with, 149 mail access protocols and, 150–151 Simple Network Management Protocol (SNMP), 445, 452–454 single-hop, infrastructure-based wireless networks, 552 single-hop, infrastructure-less wireless networks, 552 SIP See Session Initiation Protocol SIP addresses, 733–734 SIP proxy, 735 www.downloadslide.net INDEX SIP registrar, 735 Skype, 703, 708, 725–728 audio and video quality, 725 control packets in, 725 P2P techniques in, 725–727 peer hierarchy, 726 relay peers, 726–727 TCP use by, 725 UDP use by, 123, 725 Slammer worm, 226 SLAs See Service Level Agreements sliding-window protocol, 250 slotted ALOHA backoff in, 544 collisions in, 484 efficiency of, 485–486 retransmission in, 484 slow start, 300–301 small office, home office (SOHO), subnets, 373 smart phones, 618 smart spaces, 108 SMI See Structure of Management Information SMTP See Simple Mail Transfer Protocol SNA, 89 sniffing, 86, 105, 513 SNMP See Simple Network Management Protocol Snort, 690 SNR See signal-to-noise ratio social networks, 93 socket interface, 34, 117 socket programming, 185–186 client-server architecture, 188 IP addresses, 187 port numbers, 187, 223–224 TCP, 192–198 UDP, 187–192 sockets, 221 port numbers, 223–224 simultaneous, 226 TCP, 530, 532 welcoming, 225 soft guarantees, 738 software agents, 108 software-defined networking (SDN), 334, 339, 464, 465, 618 architecture of, 436 control applications, 438–440 control plane, 343, 435–444 data plane, 436, 442–443 forwarding tables in, 342, 344 generalized forwarding and, 382–389 key characteristics of, 435–436 link state change in, 442–443 logically centralized control in, 402–403 packet forwarding and, 340 routing processor responsibilities in, 342 SOHO See small office, home office source port number, 264 source port number field, 222 source quench message, 447–448 spanning trees, 514 spatial redundancy, 705 SPD See Security Policy Database spectrum access rights, 551 SPI See Security Parameter Index split-connection approaches, 610 Spotify, 704 Sprint, 33 SR See selective repeat SRI See Stanford Research Institute SSID See Service Set Identifier SSL See Secure Sockets Layer SSL record, 663 845 www.downloadslide.net 846 INDEX SSRC See synchronization source identifier ssthresh, 301–304 Stanford Research Institute (SRI), 88, 107 StarBand, 44 stateful filters, 680, 682–684 stateless protocols, 128 state-management layer, SDN, 438 static routing algorithms, 407 status line, 134 stop-and-wait protocols, 239, 247, 248 store-and-forward transmission, 51–52 stream ciphers, 628, 675 Stream Control Transmission Protocol (SCTP), 313 streaming adaptive HTTP, 709 CDNs and, 180–181 DASH, 176–177, 183, 716 HTTP, 176–177, 709, 713–716 live, 709 live video, 709 Netflix platform, 182–184 P2P, 185 P2P live, 175 P2P video, 709 processing for, 182 RTSP, 711 stored audio and video, 707–708 TCP buffers in, 713–714 UDP, 709, 711 video, 175–176, 180–184 streetlamp wireless hotspots, 551 Structure of Management Information (SMI), 450 subnet mask, 364 subnets, 363–367 datagram transmission to, 501–502 mobility on, 574–575 obtaining blocks of IP addresses, 369 in OSPF, 420 SOHO, 373 successful slot, 485 super peers, 726 SWAN, 403 switch, 503 switched networks, topology of, 514 switches crossbar, 347–349 forwarding and filtering by, 509–510 layer 4, 343 layer 5, 343 link-layer, 32, 51, 341, 346, 509–515 non-blocking, 348 plug-and-play, 512 properties of, 512 routers versus, 513–515 self-learning, 511–512 top of rack, 523 VLANs and, 516 switch filtering, 509–510 switch forwarding, 509–510 switching, 340 in destination-based forwarding, 346 techniques for, 347–349 switching fabric, 342 bus, 348 crossbar, 347–349 interconnection network, 348–349 memory, 347–348 queuing and speed of, 349–350 switch poisoning, 513 switch table, 509 poisoning, 513 symmetric key cryptography, 626–632 block ciphers, 628–630 www.downloadslide.net INDEX cipher-block chaining, 630–632 nonce use with, 653 in PGP, 658 polyalphabetic encryption, 627–628 secure e-mail using, 655 in SSL handshake, 664 SYNACK segment, 283, 287 SYN bit, 265 synchronization source identifier (SSRC), 730 SYN cookies, 288 SYN flood attack, 288 T Tag Protocol Identifier (TPID), 517 taking-turns protocols, 481, 492–493, 565 TCAMs See Ternary Content Addressable Memories TCP See Transmission Control Protocol TCP ACK bits, 681–682 TCP congestion-control algorithm, 299–304 TCP connection, 121 TCP-Friendly Rate Control (TFRC), 313–314 TCP/IP, 33, 262 TCP Reno, 304, 305 TCP segments, 263 TCP services, 121–123 TCP socket, 530, 532 TCP splitting, 303 TCP states, 285–287 TCP SYN segment, 532, 681 TCP Tahoe, 304 TCP Vegas, 305 TDM See time-division multiplexing telco See telephone company Telenet, 89 telephone company (telco), 41 telephone networks, 519 Telnet, 148, 267–269, 651, 684–685 Temporal Key (TK), 678 temporal redundancy, 705 temporary IP addresses, 370 Ternary Content Addressable Memories (TCAMs), 346 terrestrial radio channels, 48–49 TFRC See TCP-Friendly Rate Control 3rd Generation Partnership Project (3GPP), 583, 585 Third Generation Partnership Program, 381 third-party CDNs, 178 3Com, 506 3G, 46, 548, 551 core network, 584 network architecture, 582–585 radio access network, 584–585 video over, 705 3GPP See 3rd Generation Partnership project three-way handshake, 130, 193, 262, 284–285, 532 throughput, 71–74, 119–120 average, 72 congestion and, 290–295 instantaneous, 72 per-connection, 290–291 TCP, 306 of transport layer, 119–120 tier-1 ISPs, 60–61 time-based retransmission, 244–245 time-division multiplexing (TDM), 56–58, 481–485, 582, 584 time frames, 482 847 www.downloadslide.net 848 INDEX timeout events in GBN protocol, 252 in SR protocol, 256 TCP, 270–271, 273, 274 timeout intervals doubling, 275–277 TCP, 270–271, 275–277 time slots, 482 in LTE, 587–588 timestamps, 719, 730 time-to-live (TTL), 359 TK See Temporal Key TLD See top-level domain TLS See Transport Layer Security token, 493 token-passing protocol, 493 token ring protocol, 493, 503 Tomlinson, Ray, 88 top-down approach, 78 top-level domain (TLD), DNS servers, 158, 159 Top of Rack switch (TOR switch), 523 TOR, 686 torrents, 172–174 TOR switch See Top of Rack switch TOS See type of service total nodal delay, 63 TPID See Tag Protocol Identifier Traceroute, 70–71, 448–449 trackers, 172–174 traditional packet filters, 680–682 traffic classes, 742 isolating, 743–744 traffic conditioning, 748 traffic engineering, 421 MPLS and, 522 traffic intensity, 67 traffic isolation, 515–516, 742 traffic load buffers and, 353 queuing and, 350 traffic policing, 743 leaky bucket, 744–747 traffic profiles, 749–750 Transmission Control Protocol (TCP), 33, 219 See also Secure Sockets Layer ACK bit, 681–682 ACK generation recommendation, 278 acknowledgment number, 265–267 buffers in streaming, 713–714 closing connection, 284–285 congestion avoidance, 301–302 congestion-control algorithm, 299–304 congestion control in, 297–311 congestion window, 298, 304 connection, 261–264 connection management, 283–287, 289 connection requests, 225 cumulative acknowledgement, 266 demultiplexing, 224–227 development of, 90 establishing connection, 283–284 fairness and, 307–310 fast recovery, 302–304 fast retransmit, 277–279 flow control, 280–282 full-duplex service, 261 high-bandwidth paths and, 306– 307 Internet checksum in, 476 multimedia applications using, 230 parallel browser connections, 129–130 parallel connection fairness, 310 pipelining, 271 www.downloadslide.net INDEX point-to-point connections, 261 receive window, 281, 282 reliable data transfer, 272–379 retransmission timeout interval, 270–271 RTT estimation, 269–271 securing, 122 segment structure, 264–269 selective acknowledgment, 280 self-clocking, 298 sequence number, 265–267 services provided by, 220 simultaneous connection sockets, 226 Skype use of, 725 slow start, 300–301 SMTP using, 147 socket client, 194–196 socket programming, 186, 192–198 socket server, 196–198 steady-state behavior of, 306 three-way handshake, 130, 193, 262, 284–285, 532 throughput, 306 timeout events, 270–271, 273, 274 timeout intervals, 270–271, 275–277 timer management, 272–273 transition to, 90–91 variables, 297–298, 301, 304 Web servers and, 227–228 wireless networks and, 609 transmission delay, 63, 64–67 transmission power, 555 transmission rate, 32 BER and, 555 queuing and, 349–350 transparent, 509 transport layer, 79 application services, 118–121 fragment reassembly and, 362–363 in Internet, 219–221 network layer relationship to, 216–219 reliable data transfer and, 119 security, 120–121 throughput of, 119–120 timing guarantees, 120 transport-layer multiplexing and demultiplexing, 220 transport-layer protocols, 216 Transport Layer Security (TLS), 659 transport-layer segment, 82 transport mode, 669 transport services application availability of, 118–121 Internet, 121–123 network application requirements, 121 triangle routing problem, 596 triple-DES, 658 3DES, 630, 669 TTL See time-to-live tunnel, 380 tunneling, 380 in 4G networks, 586 tunnel mode, 669 twisted-pair copper wire, 47–48 two-dimensional parity, 475 2G cellular networks, 581–582 Tymnet, 89 type numbers, 505 type of service (TOS), 359, 741, 742 U ubiquitous WiFi, 551, 580 UCLA, 107, 399 UDP See User Datagram Protocol UDP segment, 529 UDP services, 123 849 www.downloadslide.net 850 INDEX UDP socket programming, 186, 187–192 client, 189–191 port numbers, 223–224 server, 191–192 UDP streaming, 709, 711 UMTS (Universal Mobile Telecommunications Service), 583, 584 unchoked peers, 174 undetected bit errors, 473 unguided media, 47 unidirectional data transfer, 236 unlicensed spectrum, 551 unreliable services, 220 unshielded twisted pair (UTP), 47 URG bit, 265 urgent data pointer field, 265 URLs, SIP, 733–734 user agents, 144 User Datagram Protocol (UDP), 219, 220, 228–234 advantages of, 229–230 checksum, 232–234 connectionless nature of, 229 DNS using, 229 fairness and, 309–310 Internet checksum in, 476 multimedia applications using, 230–231 multiplexing and demultiplexing, 223–224 reliability with, 231–232 RTP and, 728–729 segment structure, 232 Skype use of, 123, 725 in VoIP, 717 user state, cookies, 136–138 utilization, 247 UTP See unshielded twisted pair V VANET See vehicular ad hoc network VC networks See virtual-circuit networks vehicular ad hoc network (VANET), 553 Verisign Global Registry Services, 159 video properties of, 704–705 RTP payloads, 731 Skype quality adaptation for, 725 streaming, 175–176, 180–184, 707–709 video compression, 705 video conferencing, 728 video streaming, 175–176 CDNs and, 180–181 live, 709 Netflix platform, 182–184 P2P, 709 prefetching, 712–713 processing for, 182 repositioning, 715–716 stored video, 707–708 virtual-circuit networks (VC networks), 520 virtual local area networks (VLANs), 515–519 in data center networks, 525 mobility within, 576 virtual private networks (VPNs), 522, 665, 666–667 mobility within, 576 viruses, 84 visited network, 590, 603 visitor location register (VLR), 603 call routing and, 605 VLANs See virtual local area networks www.downloadslide.net INDEX VLAN tags, 517, 518 VLAN trunking, 517, 518 VLR See visitor location register Voice-over-IP (VoIP), 71, 548, 708, 725–728, 764 best-effort IP service limitations and, 716–717 end-to-end delay, 718 jitter removal, 719–722 packet jitter, 718–719 packet loss, 717–718 privacy concerns, 727 RTP, 728–731 SIP, 731–736 VoIP See Voice-over-IP VPNs See virtual private networks vulnerability attacks, 84 W web-based e-mail, 154 Web browsers, 91–92, 116–117, 127 conditional GET and, 143–144 cookies, 136–138 email access via, 154 GET requests, 132 header lines from, 135–136 parallel connections, 129–130, 310 SSL support, 659 web caches and, 138–141 Web caching, 138–144 web of trust, 659 Web page, 126 web page requests, 528–533 Web servers, 91, 127 TCP and, 227–228 Wechat, 703, 727 weighted fair queuing (WFQ), 356–357, 744–747 welcoming socket, 225 well-known application protocols, 223 well-known port numbers, 222 WEP See Wired Equivalent Privacy WFQ See weighted fair queuing wide-area wireless Internet access, 46 WiFi, 32, 33, 471, 548, 560 address fields, 571–573 architecture, 561–565 enterprise usage of, 44–45 frames, 570–573 link layer implementation, 471 MAC addresses in, 571–573 MAC protocol, 565–570 mobility on same IP subnet, 574–575 packet sniffing, 86 payload and CRC fields, 571 power management, 576 public, 92, 551 rate adaptation, 575–576 sequence number, duration, and frame control fields, 573 ubiquitous, 551, 580 wide-area wireless versus, 46 WiFi jungle, 563 wildcards, in flow table entries, 385 WiMAX (World Interoperability for Microwave Access), 588, 764 window scaling factor, 264 window size, 250 in SR, 258, 259 Wired Equivalent Privacy (WEP), 674–676 wireless communication links, 549, 553–556 differences from wired links, 553 dynamic selection of modulation techniques, 555–556 interference, 553 modulation techniques, 554–556 multipath propagation, 553 851 www.downloadslide.net 852 INDEX wireless communication links (continued) signal strength, 553 transmission power, 555 transmission rate, 555 wireless hops, 552–553 wireless hosts, 548 wireless Internet devices, 547–548 wireless LANs, 45, 467 authentication, 564–565 broadcast, 479 CDMA in, 556 4G versus, 580 infrastructure, 562 securing, 674–678 wireless mesh networks, 552 wireless networks, 618 ad hoc, 562 elements of, 548–552 handoff in, 552 higher-layer protocols and, 608–610 infrastructure and, 550–551, 552–553 mobile ad hoc, 552–553, 590 packet sniffing, 86 types of, 552–553 vehicular ad hoc, 553 wireless personal area networks (WPANs), 577–578 Wireless Philadelphia, 551 Wireshark, 86, 105–106, 515 work-conserving queuing, 355, 356 World Wide Web, 111, 126 worms, 84, 226 WPANs See wireless personal area networks X X.25 protocol suite, 91, 545 X.509, 648 Xerox Palo Alto Research Center (Xerox PARC), 506 XTP, 476 Y Yahoo, 92 web-based e-mail, 154 Youku, 175, 703 YouTube, 175, 707 CDNs, 184 data centers, 179 Z zeroconf, 370 Zigbee, 578–579 Zimmerman, Phil, 658 www.downloadslide.net This page intentionally left blank www.downloadslide.net GLOBAL EDITION For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version This is a special edition of an established title widely used by colleges and universities throughout the world Pearson published this exclusive edition for the benefit of students outside the United States and Canada If you purchased this book within the United States or Canada, you should be aware that it has been imported without the approval of the Publisher or Author Pearson Global Edition Kurose • Ross ... Neelakantan Senior Manufacturing Controller, Global Editions: Kay Holman Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia Cover Designer: Lumina Datamatics Manager, Rights and... networking A Top- Down Approach Our book broke new ground 16 years ago by treating networking in a top- down manner—that is, by beginning at the application layer and working its way down toward the... streaming— have taken place at the application layer An early emphasis on application-layer issues differs from the approaches taken in most other texts, which have only a small amount of material on

Ngày đăng: 25/04/2019, 14:45

Từ khóa liên quan

Mục lục

  • Cover

  • Title

  • Copyright

  • About the Authors

  • Preface

  • Contents (direct linkking)

  • 1. Computer Networks and the Internet

    • 1.1. What Is the Internet?

      • 1.1.1. A Nuts-and-Bolts Description

      • 1.1.2. A Services Description

      • 1.1.3. What Is a Protocol?

      • 1.2. The Network Edge

        • 1.2.1. Access Networks

        • 1.2.2. Physical Media

        • 1.3. The Network Core

          • 1.3.1. Packet Switching

          • 1.3.2. Circuit Switching

          • 1.3.3. A Network of Networks

          • 1.4. Delay, Loss, and Throughput in Packet-Switched Networks

            • 1.4.1. Overview of Delay in Packet-Switched Networks

            • 1.4.2. Queuing Delay and Packet Loss

            • 1.4.3. End-to-End Delay

            • 1.4.4. Throughput in Computer Networks

            • 1.5. Protocol Layers and Their Service Models

              • 1.5.1. Layered Architecture

              • 1.5.2. Encapsulation

Tài liệu cùng người dùng

Tài liệu liên quan