Suchen und Finden
Cover
1
Copyright Page
5
CONTENTS
12
Foreword
8
Foreword to the First Edition
10
Preface
20
Chapter 1. Foundation
30
Problem: Building a Network
30
1.1 Applications
32
1.2 Requirements
34
1.3 Network Architecture
47
1.4 Implementing Network Software
58
1.5 Performance
68
1.6 Summary
78
Open Issue: Ubiquitous Networking
79
Further Reading
80
Exercises
83
Chapter 2. Direct Link Networks
92
Problem: Physically Connecting Hosts
92
2.1 Hardware Building Blocks
94
2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B)
103
2.3 Framing
107
2.4 Error Detection
116
2.5 Reliable Transmission
125
2.6 Ethernet (802.3)
139
2.7 Token Rings (802.5, FDDI)
148
2.8 Wireless (802.11)
159
2.9 Network Adaptors
165
2.10 Summary
174
Open Issue: Does It Belong in Hardware?
175
Further Reading
176
Exercises
178
Chapter 3. Packet Switching
192
Problem: Not All Networks Are Directly Connected
192
3.1 Switching and Forwarding
194
3.2 Bridges and LAN Switches
208
3.3 Cell Switching (ATM)
220
3.4 Implementation and Performance
238
3.5 Summary
248
Open Issue: The Future of ATM
249
Further Reading
249
Exercises
251
Chapter 4. Internetworking
262
Problem: There Is More Than One Network
262
4.1 Simple Internetworking (IP)
264
4.2 Routing
299
4.3 Global Internet
327
4.4 Multicast
359
4.5 Multiprotocol Label Switching (MPLS)
368
4.6 Summary
380
Open Issue: Deployment of IPV6
381
Further Reading
382
Exercises
383
Chapter 5. End-to-End Protocols
402
Problem: Getting Processess to Communicate
402
5.1 Simple Demultiplexer (UDP)
404
5.2 Reliable Byte Stream (TCP)
406
5.3 Remote Procedure Call
433
5.4 Performance
459
5.5 Summary
462
Open Issue: Application-Specific Protocols
463
Further Reading
464
Exercises
465
Chapter 6. Congestion Control and Resource Allocation
478
Problem: Allocating Resources
478
6.1 Issues in Resource Allocation
480
6.2 Queuing Disciplines
489
6.3 TCP Congestion Control
496
6.4 Congestion-Avoidance Mechanisms
506
6.5 Quality of Service
520
6.6 Summary
546
Open Issue: Inside versus Outside the Network
547
Further Reading
548
Exercises
549
Chapter 7. End-to-End Data
562
Problem: What Do We Do with the Data?
562
7.1 Presentation Formatting
564
7.2 Data Compression
576
7.3 Summary
596
Open Issue: Computer Networks Meet Consumer Electronics
596
Further Reading
597
Exercises
598
Chapter 8. Network Security
606
Problem: Securing the Data
606
8.1 Cryptographic Algorithms
608
8.2 Security Mechanisms
622
8.3 Example Systems
632
8.4 Firewalls
645
8.5 Summary
650
Open Issue: Denial-of-Service Attacks
651
Further Reading
652
Exercises
653
Chapter 9. Applications
660
Problem: Applications Need Their Own Protocols
660
9.1 Name Service (DNS)
662
9.2 Traditional Applications
671
9.3 Multimedia Applications
688
9.4 Overlay Networks
708
9.5 Summary
732
Open Issue: New Network Artichitecture
732
Further Reading
733
Exercises
735
Glossary
743
Bibliography
771
Solutions to Selected Exercises
791
Index
805
About the Authors
838
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.