Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Preface
Audience Organization
Acknowledgments About the Authors Chapter 1: Transmission Control Protocol/Internet Protocol Overview
1.1 Fundamental Architecture 1.2 Internet Protocol Basics
1.2.1 Packet Header 1.2.2 Internet Protocol Address 1.2.3 Internet Protocol Classification 1.2.4 Subnet and its Masking 1.2.5 Subnet Calculation
1.3 Routing
1.3.1 Routing Across Providers 1.3.2 Routing within Edge Networks 1.3.3 Routing Scalability
References
Chapter 2: Transport-Layer Protocols
2.1 Transmission Control Protocol
2.1.1 Transmission Control Protocol Header Structure 2.1.2 Three-Way Handshake 2.1.3 Transmission Control Protocol Flow Control and Congestion Control 2.1.4 Port Number
2.2 User Datagram Protocol
2.2.1 User Datagram Protocol Header Structure
2.3 Stream Control Transmission Protocol
2.3.1 Stream Control Transmission Protocol Packet Structure 2.3.2 Security: Prevention of SYN Attacks
2.4 Real-Time Transport Protocol
2.4.1 Real-Time Transport Protocol Header Structure
References
Chapter 3: Internet Architecture
3.1 Internet Exchange Point 3.2 History of Internet Exchange Points 3.3 Internet Service Provider Interconnection Relationships 3.4 Peering and Transit References
Chapter 4: IP Routing Protocols
4.1 Overview of Routing Protocols
4.1.1 Interior Gateway Protocol 4.1.2 Exterior Gateway Protocol
4.2 Routing Information Protocol
4.2.1 Routing Information Protocol Header Format 4.2.2 Update of Routing Table in Routing Information Protocol 4.2.3 Maintenance of Routing Table in Routing Information Protocol 4.2.4 Split Horizon 4.2.5 Limitations of Routing Information Protocol
4.3 Open Shortest Path First
4.3.1 Shortest-Path Algorithm 4.3.2 Hierarchical Routing 4.3.3 Open Shortest Path First Packet Format 4.3.4 Comparison of Routing Information Protocol and Open Shortest Path First
4.4 Border Gateway Protocol
4.4.1 Border Gateway Protocol Message Flows 4.4.2 Border Gateway Protocol Policy Selection Attributes
References
Chapter 5: Multiprotocol Label Switching
5.1 Overview 5.2 Functions and Mechanisms 5.3 Applicabilities References
Chapter 6: IP Quality Of Service
6.1 Introduction 6.2 Quality of Service in IP Version 4 6.3 Integrated Services
6.3.1 Packet Scheduler 6.3.2 Packet Classifier 6.3.3 Admission Control 6.3.4 Resource Reservation Protocol (RSVP)
6.4 Differentiated Services 6.5 Quality of Service with Nested Differentiated Services Levels
6.5.1 Drawbacks of Explicit Endpoint Admission Control with Path Selection 6.5.2 OSPF-Based Adaptive and Flexible Quality of Service Provisioning 6.5.3 Combination of Security and Quality of Service 6.5.4 Path Selection Algorithm Analysis
References
Chapter 7: IP Multicast and Anycast
7.1 Addressing
7.1.1 Multicast Addressing 7.1.2 Differences between Multicasting and Multiple Unicasting
7.2 Multicast Routing
7.2.1 Optimal Routing: Shortest-Path Trees 7.2.2 Unicast Routing 7.2.3 Multicast Routing
7.3 Routing Protocols
7.3.1 Multicast Open Shortest Path First (MOSPF) 7.3.2 Distance Vector Multicast Routing Protocol 7.3.3 Core-Based Tree (CBT) Protocol 7.3.4 Protocol-Independent Multicast 7.3.5 Simple Multicast Routing Protocol
7.4 Anycasting
7.4.1 Architectural Issues 7.4.2 Anycast Addresses 7.4.3 Differences between the Services Offered by IP Multicasting and IP Anycasting
7.5 IPv6 Anycast Routing Protocol: Protocol-Independent Anycast—Sparse Mode References
Chapter 8: Layer-2 Transport over Packet
8.1 Draft-Martini Signaling and Encapsulation
8.1.1 Functionality 8.1.2 Encapsulation 8.1.3 Protocol-Specific Encapsulation
8.2 Layer-2 Tunneling Protocol
8.2.1 Layer-2 Tunneling Protocol Version 3 8.2.2 Pseudowire Emulation Edge to Edge
References
Chapter 9: Virtual Private Wired Service
9.1 Types of Private Wire Services
9.1.1 Layer-2 Virtual Private Services: Wide Area Networks and Local Area Networks 9.1.2 Virtual Private Wire Service 9.1.3 Virtual Private Multicast Service 9.1.4 IP-Only Layer-2 Virtual Private Network 9.1.5 Internet Protocol Security
9.2 Generic Routing Encapsulation 9.3 Layer-2 Tunneling Protocol 9.4 Layer-3 Virtual Private Network 2547bis, Virtual Router
9.4.1 Virtual Router Redundancy Protocol
References
Chapter 10: IP and Optical Networking
10.1 IP/Optical Network Evolution
10.1.1 Where Networking is Today 10.1.2 Where Networking is Going
10.2 Challenges in Legacy Traditional IP/Optical Networks
10.2.1 Proprietary Network Management Systems 10.2.2 Complexity of Provisioning in Legacy IP/Optical Networks
10.3 Automated Provisioning in IP/Optical Networks 10.4 Control Plane Models for IP/Optical Networking
10.4.1 Optical Internetworking Forum's Optical User Network Interface: Overlay Model 10.4.2 Internet Engineering Task Force's Generalized Multiprotocol Label Switching: Peer Model
10.5 Next-Generation MultiLayer Network Design Requirements 10.6 Benefits and Challenges in IP/Optical Networking References
Chapter 11: IP Version 6
11.1 Addresses in IP Version 6
11.1.1 Unicast IP Addresses 11.1.2 Multicast IP Addresses
11.2 IP Packet Headers 11.3 IP Address Resolution 11.4 IP Version 6 Deployment: Drivers and Impediments
11.4.1 Need for Backwards Compatibility 11.4.2 Initial Deployment Drivers 11.4.3 Reaching a Critical Mass
References
Chapter 12: IP Traffic Engineering
12.1 Models of Traffic Demands 12.2 Optimal Routing with Multiprotocol Label Switching
12.2.1 Overview 12.2.2 Applicability of Optimal Routing 12.2.3 Network Model 12.2.4 Optimal Routing Formulations with Three Models
12.3 Link-Weight Optimization with Open Shortest Path First
12.3.1 Overview 12.3.2 Examples of Routing Control with Link Weights 12.3.3 Link-Weight Setting Against Network Failure
12.4 Extended Shortest-Path-Based Routing Schemes
12.4.1 Smart–Open Shortest Path First 12.4.2 Two-Phase Routing 12.4.3 Fine Two-Phase Routing 12.4.4 Features of Routing Schemes
References
Chapter 13: IP Network Security
13.1 Introduction 13.2 Detection of Denial-of-Service Attack
13.2.1 Backscatter Analysis 13.2.2 Multilevel Tree or Online Packet Statistics
13.3 IP Traceback
13.3.1 IP Traceback Solutions
13.4 Edge Sampling Scheme 13.5 Advanced Marking Scheme References
Chapter 14: Mobility Support for IP
14.1 Mobility Management Approaches
14.1.1 Host Routes 14.1.2 Tunneling 14.1.3 Route Optimization
14.2 Security Threats Related to IP Mobility
14.2.1 Impersonation 14.2.2 Redirection-Based Flooding 14.2.3 Possible Solutions
14.3 Mobility Support in IPv6 14.4 Reactive Versus Proactive Mobility Support 14.5 Relation to Multihoming 14.6 Protocols Supplementing Mobility
14.6.1 Router and Subnet Prefix Discovery 14.6.2 Movement Detection 14.6.3 IP Address Configuration 14.6.4 Neighbor Unreachability Detection 14.6.5 Internet Control Message Protocol for IP Version 6 14.6.6 Optimizations 14.6.7 Media-Independent Handover Services
References
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion