You are previewing Advanced Internet Protocols, Services, and Applications.
O'Reilly logo
Advanced Internet Protocols, Services, and Applications

Book Description

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility.

This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright
  4. CONTENTS
  5. PREFACE
  6. ACKNOWLEDGMENTS
  7. ABOUT THE AUTHORS
  8. CHAPTER 1: TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL OVERVIEW
    1. 1.1 FUNDAMENTAL ARCHITECTURE
    2. 1.2 INTERNET PROTOCOL BASICS
    3. 1.3 ROUTING
    4. REFERENCES
  9. CHAPTER 2: TRANSPORT-LAYER PROTOCOLS
    1. 2.1 TRANSMISSION CONTROL PROTOCOL
    2. 2.2 USER DATAGRAM PROTOCOL
    3. 2.3 STREAM CONTROL TRANSMISSION PROTOCOL
    4. 2.4 REAL-TIME TRANSPORT PROTOCOL
    5. REFERENCES
  10. CHAPTER 3: INTERNET ARCHITECTURE
    1. 3.1 INTERNET EXCHANGE POINT
    2. 3.2 HISTORY OF INTERNET EXCHANGE POINTS
    3. 3.3 INTERNET SERVICE PROVIDER INTERCONNECTION RELATIONSHIPS
    4. 3.4 PEERING AND TRANSIT
    5. REFERENCES
  11. CHAPTER 4: IP ROUTING PROTOCOLS
    1. 4.1 OVERVIEW OF ROUTING PROTOCOLS
    2. 4.2 ROUTING INFORMATION PROTOCOL
    3. 4.3 OPEN SHORTEST PATH FIRST
    4. 4.4 BORDER GATEWAY PROTOCOL
    5. REFERENCES
  12. CHAPTER 5: MULTIPROTOCOL LABEL SWITCHING
    1. 5.1 OVERVIEW
    2. 5.2 FUNCTIONS AND MECHANISMS
    3. 5.3 APPLICABILITIES
    4. REFERENCES
  13. CHAPTER 6: IP QUALITY OF SERVICE
    1. 6.1 INTRODUCTION
    2. 6.2 QUALITY OF SERVICE IN IP VERSION 4
    3. 6.3 INTEGRATED SERVICES
    4. 6.4 DIFFERENTIATED SERVICES
    5. 6.5 QUALITY OF SERVICE WITH NESTED DIFFERENTIATED SERVICES LEVELS
    6. REFERENCES
  14. CHAPTER 7: IP MULTICAST AND ANYCAST
    1. 7.1 ADDRESSING
    2. 7.2 MULTICAST ROUTING
    3. 7.3 ROUTING PROTOCOLS
    4. 7.4 ANYCASTING
    5. 7.5 IPV6 ANYCAST ROUTING PROTOCOL: PROTOCOL-INDEPENDENT ANYCAST—SPARSE MODE
    6. REFERENCES
  15. CHAPTER 8: LAYER-2 TRANSPORT OVER PACKET
    1. 8.1 DRAFT-MARTINI SIGNALING AND ENCAPSULATION
    2. 8.2 LAYER-2 TUNNELING PROTOCOL
    3. REFERENCES
  16. CHAPTER 9: VIRTUAL PRIVATE WIRED SERVICE
    1. 9.1 TYPES OF PRIVATE WIRE SERVICES
    2. 9.2 GENERIC ROUTING ENCAPSULATION
    3. 9.3 LAYER-2 TUNNELING PROTOCOL
    4. 9.4 LAYER-3 VIRTUAL PRIVATE NETWORK 2547BIS, VIRTUAL ROUTER
    5. REFERENCES
  17. CHAPTER 10: IP AND OPTICAL NETWORKING
    1. 10.1 IP/OPTICAL NETWORK EVOLUTION
    2. 10.2 CHALLENGES IN LEGACY TRADITIONAL IP/OPTICAL NETWORKS
    3. 10.3 AUTOMATED PROVISIONING IN IP/OPTICAL NETWORKS
    4. 10.4 CONTROL PLANE MODELS FOR IP/OPTICAL NETWORKING
    5. 10.5 NEXT-GENERATION MULTILAYER NETWORK DESIGN REQUIREMENTS
    6. 10.6 BENEFITS AND CHALLENGES IN IP/OPTICAL NETWORKING
    7. REFERENCES
  18. CHAPTER 11: IP VERSION 6
    1. 11.1 ADDRESSES IN IP VERSION 6
    2. 11.2 IP PACKET HEADERS
    3. 11.3 IP ADDRESS RESOLUTION
    4. 11.4 IP VERSION 6 DEPLOYMENT: DRIVERS AND IMPEDIMENTS
    5. REFERENCES
  19. CHAPTER 12: IP TRAFFIC ENGINEERING
    1. 12.1 MODELS OF TRAFFIC DEMANDS
    2. 12.2 OPTIMAL ROUTING WITH MULTIPROTOCOL LABEL SWITCHING
    3. 12.3 LINK-WEIGHT OPTIMIZATION WITH OPEN SHORTEST PATH FIRST
    4. 12.4 EXTENDED SHORTEST-PATH-BASED ROUTING SCHEMES
    5. REFERENCES
  20. CHAPTER 13: IP NETWORK SECURITY
    1. 13.1 INTRODUCTION
    2. 13.2 DETECTION OF DENIAL-OF-SERVICE ATTACK
    3. 13.3 IP TRACEBACK
    4. 13.4 EDGE SAMPLING SCHEME
    5. 13.5 ADVANCED MARKING SCHEME
    6. REFERENCES
  21. CHAPTER 14: MOBILITY SUPPORT FOR IP
    1. 14.1 MOBILITY MANAGEMENT APPROACHES
    2. 14.2 SECURITY THREATS RELATED TO IP MOBILITY
    3. 14.3 MOBILITY SUPPORT IN IPV6
    4. 14.4 REACTIVE VERSUS PROACTIVE MOBILITY SUPPORT
    5. 14.5 RELATION TO MULTIHOMING
    6. 14.6 PROTOCOLS SUPPLEMENTING MOBILITY
    7. REFERENCES
  22. INDEX