Vice President and Editorial Director, ECS: Project Editor, International Edition:

Similar documents
Table of Contents. Computer Networks and the Internet

NETWORKING KEITH W. ROSS. Polytechnic Institute of NYU. Addison-Wesley

Engineering Problem Solving with C++

CS 355 Fall 2015 Syllabus

PESIT Bangalore South Campus

Editorial Director, ECS: Publishing Administrator, International Edition: Editor-in-Chief:

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England. and Associated Companies throughout the world

L1/L2 NETWORK PROTOCOL TESTING

Data Communications and Networks Spring Syllabus and Reading Assignments

Digital Electronics A Practical Approach with VHDL William Kleitz Ninth Edition

Assignment - 1 Chap. 1 Wired LAN s

For Tricia: never dull, never boring, the smartest and bravest person I know

University of Southern California EE450: Introduction to Computer Networks

Editorial Director: Project Editor, International Edition: Executive Editor:

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Hands-On TCP/IP Networking

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

GLOBAL EDITION. Elementary Surveying. An Introduction to Geomatics FOURTEENTH EDITION. Charles D. Ghilani Paul R. Wolf

Pearson New International Edition. The 8051 Microcontroller and Embedded Systems Mazidi Mazidi McKinlay Second Edition

COMPUTER NETWORKING. A Top-Down Approach. James F. Kurose. Keith W. Ross. University of Massachusetts, Amherst. Polytechnic Institute of NYU

Programmable Logic Controllers. Second Edition

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

Java Software Solutions Foundations of Program Design

GLOBAL EDITION. Assembly Language. for x86 Processors SEVENTH EDITION. Kip R. Irvine

GO! with Microsoft Access 2010 Introductory Gaskin Mclellan Graviett First Edition

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England. and Associated Companies throughout the world

Elementary Number Theory. Kenneth H. Rosen Sixth Edition

Advanced Electronic Communications Systems Wayne Tomasi Sixth Edition

Technical Communication Today

Chapter 8 Network Security

ETSF10 Internet Protocols Transport Layer Protocols

Workplace Communications The Basics George J. Searles Fifth Edition

Study Guide. Module Two

Faculty of Science and IT Course title. Pre-requisite/corequisite

10CS64-Computer Networks-II Question Bank PART A

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

DATA AND COMPUTER COMMUNICATIONS

Sub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Lecture 14 Summary - flashback

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley

Engineering with Excel. Ronald W. Larsen Fourth Edition

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

LESSON PLAN. Sub Code & Name : CS2363 COMPUTER NETWORKS Unit: I Branch: EEE Semester :VI

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Solved MCQ of Computer networking. Set-1

VoIP / RoIP for Technicians

CompTIA Network+ Study Guide Table of Contents

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Introduction to Networking

UNIT I Review Computer Networks and the Internet

Numerical Analysis Timothy Sauer Second Edition

Computer Communications DIT 420 EDA343

Institute of Science and Technology 2067

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

COMS3200/7201 Computer Networks 1 (Version 1.0)

CSE 473s Introduction to Computer Networks

LESSON PLAN LP-CS 1302

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

QUESTION BANK UNIT-I

Course on Computer Communication and Networks. Lecture 16 Synthesis, Summary/flashback and Projection (related topics continuation of study)

MTA_98-366_Vindicator930

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

INTE-C5O44 - Internet

Computer Networks (Unit wise Questions)

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

IT4405 Computer Networks (Compulsory)

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

CSC317 Computer Networks

CS 3516: Advanced Computer Networks

CSIBridge: Computer Science for Digital Forensics and Cyber Security

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Networks Fall This exam consists of 10 problems on the following 13 pages.

Lecture 16: Network Layer Overview, Internet Protocol

ICS 351: Networking Protocols

Chapter 09 Network Protocols

Understanding Networking Fundamentals

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England. and Associated Companies throughout the world

The Diffie-Hellman Key Exchange

TCP/IP THE TCP/IP ARCHITECTURE

Network Model. Why a Layered Model? All People Seem To Need Data Processing

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Java Foundations John Lewis Peter DePasquale Joe Chase Third Edition

Hands-On Troubleshooting IPTV with WireShark

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Chapter 4 Network Layer: The Data Plane

Transcription:

Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Publisher, International Edition: Angshuman Chakraborty Acquisitions Editor, International Edition: Somnath Basu Publishing Assistant, International Edition: Shokhi Shah Print and Media Editor, International Edition: Ashwitha Jayakumar Project Editor, International Edition: Jayashree Arunachalam Publishing Administrator, International Edition: Hema Mehta Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/Theurer Briggs Design Art Studio: Patrice Rossi Calkin/Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Cover Printer: Lehigh-Phoenix Color Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsoninternationaleditions.com Pearson Education Limited 2013 The rights of James M. Kurose and Keith W. Ross to be identified as authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988. Authorized adaptation from the United States edition, entitled Computer Networking, 6th edition, ISBN 978-0-13-285620-1 by James F. Kurose and Keith W. Ross published by Pearson Education 2012. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a licence permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6 10 Kirby Street, London EC1N 8TS. All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners. Microsoft and Windows are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. ISBN 10: 0-273-76896-4 ISBN 13: 978-0-273-76896-8 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 9 8 7 6 5 4 3 2 1 14 13 12 11 10 Typeset in Times Roman, by PreMediaGlobal Printed and bound by Courier Westford in The United States of America The publisher's policy is to use paper manufactured from sustainable forests.

Computer Networking: A Top-Down Approach: International Edition - PDF - PDF - PDF Table of Contents Cover Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1 Access Networks 1.2.2 Physical Media 1.3 The Network Core 1.3.1 Packet Switching 1.3.2 Circuit Switching 1.3.3 A Network of Networks 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-Switched Networks 1.4.2 Queuing Delay and Packet Loss 1.4.3 End-to-End Delay 1.4.4 Throughput in Computer Networks 1.5 Protocol Layers and Their Service Models 1.5.1 Layered Architecture 1.5.2 Encapsulation 1.6 Networks Under Attack 1.7 History of Computer Networking and the Internet 1.7.1 The Development of Packet Switching: 19611972 1.7.2 Proprietary Networks and Internetworking: 19721980 1.7.3 A Proliferation of Networks: 19801990 1.7.4 The Internet Explosion: The 1990s 1.7.5 The New Millennium 1.8 Summary Wireshark Lab Interview: Leonard Kleinrock Chapter 2 Application Layer 2.1 Principles of Network Applications 2.1.1 Network Application Architectures

2.1.2 Processes Communicating 2.1.3 Transport Services Available to Applications 2.1.4 Transport Services Provided by the Internet 2.1.5 Application-Layer Protocols 2.1.6 Network Applications Covered in This Book 2.2 The Web and HTTP 2.2.1 Overview of HTTP 2.2.2 Non-Persistent and Persistent Connections 2.2.3 HTTP Message Format 2.2.4 User-Server Interaction: Cookies 2.2.5 Web Caching 2.2.6 The Conditional GET 2.3 File Transfer: FTP 2.3.1 FTP Commands and Replies 2.4 Electronic Mail in the Internet 2.4.1 SMTP 2.4.2 Comparison with HTTP 2.4.3 Mail Message Format 2.4.4 Mail Access Protocols 2.5 DNSThe Internets Directory Service 2.5.1 Services Provided by DNS 2.5.2 Overview of How DNS Works 2.5.3 DNS Records and Messages 2.6 Peer-to-Peer Applications 2.6.1 P2P File Distribution 2.6.2 Distributed Hash Tables (DHTs) 2.7 Socket Programming: Creating Network Applications 2.7.1 Socket Programming with UDP 2.7.2 Socket Programming with TCP 2.8 Summary Socket Programming Assignments Wireshark Labs: HTTP, DNS Interview: Marc Andreessen Chapter 3 Transport Layer 3.1 Introduction and Transport-Layer Services 3.1.1 Relationship Between Transport and Network Layers 3.1.2 Overview of the Transport Layer in the Internet 3.2 Multiplexing and Demultiplexing 3.3 Connectionless Transport: UDP

3.3.1 UDP Segment Structure 3.3.2 UDP Checksum 3.4 Principles of Reliable Data Transfer 3.4.1 Building a Reliable Data Transfer Protocol 3.4.2 Pipelined Reliable Data Transfer Protocols 3.4.3 Go-Back-N (GBN) 3.4.4 Selective Repeat (SR) 3.5 Connection-Oriented Transport: TCP 3.5.1 The TCP Connection 3.5.2 TCP Segment Structure 3.5.3 Round-Trip Time Estimation and Timeout 3.5.4 Reliable Data Transfer 3.5.5 Flow Control 3.5.6 TCP Connection Management 3.6 Principles of Congestion Control 3.6.1 The Causes and the Costs of Congestion 3.6.2 Approaches to Congestion Control 3.6.3 Network-Assisted Congestion-Control Example: ATM ABR Congestion Control 3.7 TCP Congestion Control 3.7.1 Fairness 3.8 Summary Programming Assignments Wireshark Labs: TCP, UDP Interview: Van Jacobson Chapter 4 The Network Layer 4.1 Introduction 4.1.1 Forwarding and Routing 4.1.2 Network Service Models 4.2 Virtual Circuit and Datagram Networks 4.2.1 Virtual-Circuit Networks 4.2.2 Datagram Networks 4.2.3 Origins of VC and Datagram Networks 4.3 Whats Inside a Router? 4.3.1 Input Processing 4.3.2 Switching 4.3.3 Output Processing 4.3.4 Where Does Queuing Occur? 4.3.5 The Routing Control Plane 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet

4.4.1 Datagram Format 4.4.2 IPv4 Addressing 4.4.3 Internet Control Message Protocol (ICMP) 4.4.4 IPv6 4.4.5 A Brief Foray into IP Security 4.5 Routing Algorithms 4.5.1 The Link-State (LS) Routing Algorithm 4.5.2 The Distance-Vector (DV) Routing Algorithm 4.5.3 Hierarchical Routing 4.6 Routing in the Internet 4.6.1 Intra-AS Routing in the Internet: RIP 4.6.2 Intra-AS Routing in the Internet: OSPF 4.6.3 Inter-AS Routing: BGP 4.7 Broadcast and Multicast Routing 4.7.1 Broadcast Routing Algorithms 4.7.2 Multicast 4.8 Summary Programming Assignments Wireshark Labs: IP, ICMP Interview: Vinton G. Cerf Chapter 5 The Link Layer: Links, Access Networks, and LANs 5.1 Introduction to the Link Layer 5.1.1 The Services Provided by the Link Layer 5.1.2 Where Is the Link Layer Implemented? 5.2 Error-Detection and -Correction Techniques 5.2.1 Parity Checks 5.2.2 Checksumming Methods 5.2.3 Cyclic Redundancy Check (CRC) 5.3 Multiple Access Links and Protocols 5.3.1 Channel Partitioning Protocols 5.3.2 Random Access Protocols 5.3.3 Taking-Turns Protocols 5.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access 5.4 Switched Local Area Networks 5.4.1 Link-Layer Addressing and ARP 5.4.2 Ethernet 5.4.3 Link-Layer Switches 5.4.4 Virtual Local Area Networks (VLANs) 5.5 Link Virtualization: A Network as a Link Layer

5.5.1 Multiprotocol Label Switching (MPLS) 5.6 Data Center Networking 5.7 Retrospective: A Day in the Life of a Web Page Request 5.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 5.7.2 Still Getting Started: DNS and ARP 5.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server 5.7.4 Web Client-Server Interaction: TCP and HTTP 5.8 Summary Wireshark Labs: Ethernet and ARP, DHCP Interview: Simon S. Lam Chapter 6 Wireless and Mobile Networks 6.1 Introduction 6.2 Wireless Links and Network Characteristics 6.2.1 CDMA 6.3 WiFi: 802.11 Wireless LANs 6.3.1 The 802.11 Architecture 6.3.2 The 802.11 MAC Protocol 6.3.3 The IEEE 802.11 Frame 6.3.4 Mobility in the Same IP Subnet 6.3.5 Advanced Features in 802.11 6.3.6 Personal Area Networks: Bluetooth and Zigbee 6.4 Cellular Internet Access 6.4.1 An Overview of Cellular Network Architecture 6.4.2 3G Cellular Data Networks: Extending the Internet to Cellular Subscribers 6.4.3 On to 4G: LTE 6.5 Mobility Management: Principles 6.5.1 Addressing 6.5.2 Routing to a Mobile Node 6.6 Mobile IP 6.7 Managing Mobility in Cellular Networks 6.7.1 Routing Calls to a Mobile User 6.7.2 Handoffs in GSM 6.8 Wireless and Mobility: Impact on Higher-Layer Protocols 6.9 Summary Wireshark Lab: IEEE 802.11 (WiFi) Interview: Deborah Estrin Chapter 7 Multimedia Networking

7.1 Multimedia Networking Applications 7.1.1 Properties of Video 7.1.2 Properties of Audio 7.1.3 Types of Multimedia Network Applications 7.2 Streaming Stored Video 7.2.1 UDP Streaming 7.2.2 HTTP Streaming 7.2.3 Adaptive Streaming and DASH 7.2.4 Content Distribution Networks 7.2.5 Case Studies: Netflix, YouTube, and Kankan 7.3 Voice-over-IP 7.3.1 Limitations of the Best-Effort IP Service 7.3.2 Removing Jitter at the Receiver for Audio 7.3.3 Recovering from Packet Loss 7.3.4 Case Study: VoIP with Skype 7.4 Protocols for Real-Time Conversational Applications 7.4.1 RTP 7.4.2 SIP 7.5 Network Support for Multimedia 7.5.1 Dimensioning Best-Effort Networks 7.5.2 Providing Multiple Classes of Service 7.5.3 Diffserv 7.5.4 Per-Connection Quality-of-Service (QoS) Guarantees: Resource Reservation and Call Admission 7.6 Summary Programming Assignment Interview: Henning Schulzrinne Chapter 8 Security in Computer Networks 8.1 What Is Network Security? 8.2 Principles of Cryptography 8.2.1 Symmetric Key Cryptography 8.2.2 Public Key Encryption 8.3 Message Integrity and Digital Signatures 8.3.1 Cryptographic Hash Functions 8.3.2 Message Authentication Code 8.3.3 Digital Signatures 8.4 End-Point Authentication 8.4.1 Authentication Protocol ap1.0 8.4.2 Authentication Protocol ap2.0

8.4.3 Authentication Protocol ap3.0 8.4.4 Authentication Protocol ap3.1 8.4.5 Authentication Protocol ap4.0 8.5 Securing E-Mail 8.5.1 Secure E-Mail 8.5.2 PGP 8.6 Securing TCP Connections: SSL 8.6.1 The Big Picture 8.6.2 A More Complete Picture 8.7 Network-Layer Security: IPsec and Virtual Private Networks 8.7.1 IPsec and Virtual Private Networks (VPNs) 8.7.2 The AH and ESP Protocols 8.7.3 Security Associations 8.7.4 The IPsec Datagram 8.7.5 IKE: Key Management in IPsec 8.8 Securing Wireless LANs 8.8.1 Wired Equivalent Privacy (WEP) 8.8.2 IEEE 802.11i 8.9 Operational Security: Firewalls and Intrusion Detection Systems 8.9.1 Firewalls 8.9.2 Intrusion Detection Systems 8.10 Summary Wireshark Lab: SSL IPsec Lab Interview: Steven M. Bellovin Chapter 9 Network Management 9.1 What Is Network Management? 9.2 The Infrastructure for Network Management 9.3 The Internet-Standard Management Framework 9.3.1 Structure of Management Information: SMI 9.3.2 Management Information Base: MIB 9.3.3 SNMP Protocol Operations and Transport Mappings 9.3.4 Security and Administration 9.4 ASN.1 9.5 Conclusion Interview: Jennifer Rexford References

Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z