Computer Networking: Principles, Protocols and Practice © Olivier Bonaventure

Total Page:16

File Type:pdf, Size:1020Kb

Computer Networking: Principles, Protocols and Practice © Olivier Bonaventure Computer Networking: Principles, Protocols and Practice © Olivier Bonaventure Printing History May 2015: Adopted in Open Textbooks System (http://www.opentextbooks.org.hk) This work is licensed under a Creative Commons-ShareAlike 4.0 International License Original source: Multimedia Educational Resource for Learning and Online Teaching http://www.merlot.org/merlot/viewMaterial.htm?id=656489 Contents Chapter 1 Preface ..........................................................................................................1 Chapter 2 Introduction ..................................................................................................3 2.1 Services and protocols.....................................................................................................10 2.2 The reference models .....................................................................................................21 2.2.1 The five layers reference model ..........................................................................22 2.2.2 The TCP/IP reference model ...............................................................................26 2.2.3 The OSI reference model......................................................................................26 2.3 Organisation of the book ................................................................................................28 Chapter 3 The application Layer ................................................................................30 3.1 Principles ...........................................................................................................................30 3.1.1 The peer-to-peer model ......................................................................................34 3.1.2 The transport services ..........................................................................................34 3.2 Application-level protocols .............................................................................................36 3.2.1 The Domain Name System...................................................................................36 3.2.2 Electronic mail .......................................................................................................44 3.2.3 The HyperText Transfer Protocol ........................................................................60 3.3 Writing simple networked applications ........................................................................73 3.4 Summary ..........................................................................................................................81 3.5 Exercises ...........................................................................................................................81 3.5.1 The Domain Name System ..................................................................................81 3.5.2 Internet email protocols ......................................................................................83 3.5.3 The HyperText Transfer Protocol .......................................................................86 Chapter 4 The transport layer.....................................................................................88 4.1 Principles of a reliable transport protocol ....................................................................89 4.1.1 Reliable data transfer on top of a perfect network service..............................89 4.1.2 Reliable data transfer on top of an imperfect network service.......................92 4.2 The User Datagram Protocol........................................................................................ 114 4.3 The Transmission Control Protocol............................................................................. 116 4.3.1 TCP connection establishment ......................................................................... 119 Denial of Service attacks .................................................................................... 123 Retransmitting the first SYN segment .............................................................. 124 4.3.2 TCP connection release ..................................................................................... 125 4.3.3 TCP reliable data transfer.................................................................................. 128 4.4 Summary ....................................................................................................................... 152 4.5 Exercises ........................................................................................................................ 152 4.5.1 Principles ............................................................................................................. 152 4.6 Practice ........................................................................................................................... 158 Chapter 5 The network layer ....................................................................................170 5.1 Principles ........................................................................................................................ 170 5.1.1 Organisation of the network layer ................................................................... 173 5.1.2 The control plane ............................................................................................... 177 5.2 Internet Protocol............................................................................................................ 189 5.2.1 IP version 4.......................................................................................................... 190 5.2.2 ICMP version 4 .................................................................................................... 203 5.2.3 IP version 6.......................................................................................................... 213 5.2.4 ICMP version 6 .................................................................................................... 223 5.2.5 Middleboxes........................................................................................................ 227 5.3 Routing in IP networks .................................................................................................. 232 5.3.1 Intradomain routing........................................................................................... 233 5.3.2 Interdomain routing........................................................................................... 240 5.4 Summary ....................................................................................................................... 266 5.5 Exercises ........................................................................................................................ 266 5.5.1 Principles ............................................................................................................. 266 5.5.2 Practice ................................................................................................................ 276 Chapter 6 The datalink layer and the Local Area Networks ................................287 6.1 Principles ........................................................................................................................ 287 6.1.1 Framing................................................................................................................ 288 6.1.2 Error detection ................................................................................................... 291 6.2 Medium Access Control ................................................................................................ 293 6.2.1 Static allocation methods.................................................................................. 294 6.2.2 ALOHA.................................................................................................................. 296 6.2.3 Carrier Sense Multiple Access .......................................................................... 298 6.2.4 Carrier Sense Multiple Access with Collision Detection ................................ 300 6.2.5 Carrier Sense Multiple Access with Collision Avoidance ............................... 306 6.2.6 Deterministic Medium Access Control algorithms......................................... 310 6.3 Datalink layer technologies ......................................................................................... 314 6.3.1 The Point-to-Point Protocol............................................................................... 314 6.3.2 Ethernet............................................................................................................... 316 6.3.3 802.11 wireless networks .................................................................................. 333 6.4 Summary ....................................................................................................................... 340 6.5 Exercises ......................................................................................................................... 341 Chapter 7 Glossary .....................................................................................................343 Chapter 8 Bibliography ..............................................................................................350 1 Chapter 1 Preface Available under Creative Commons-ShareAlike 4.0 International License (http://creativecommon s.org/licenses/by-sa/4.0/). This textbook came from a frustration of its main author. Many authors chose to write a textbook because there are
Recommended publications
  • On IP Networking Over Tactical Links
    On IP Networking over Tactical Links Claude Bilodeau The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada √ Ottawa TECHNICAL REPORT DRDC Ottawa TR 2003-099 Communications Research Centre CRC-RP-2003-008 August 2003 On IP networking over tactical links Claude Bilodeau Communications Research Centre The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada - Ottawa Technical Report DRDC Ottawa TR 2003-099 Communications Research Centre CRC RP-2003-008 August 2003 © Her Majesty the Queen as represented by the Minister of National Defence, 2003 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2003 Abstract This report presents a cross section or potpourri of the numerous issues that surround the tech- nical development of military IP networking over disadvantaged network links. In the first sec- tion, multi-media services are discussed with regard to three aspects: applications, operational characteristics and service models. The second section focuses on subnetworks and bearers; mainly impairments caused by characteristics of the wireless environment. An overview of the Iris tactical bearers is provided as an example of a tactical IP environment. The last section looks at how IP can integrate these two elements i.e. multi-media services and impaired sub- network links. These three sections are unified by a common theme, quality of service, which runs in the background of the discussions. Résumé Ce rapport présente une coupe transversale ou pot-pourri de questions reliées au développe- ment technique des réseaux militaires IP pour des liaisons défavorisées.
    [Show full text]
  • Computer Networking : Principles, Protocols and Practice Release 0.25
    Computer Networking : Principles, Protocols and Practice Release 0.25 Olivier Bonaventure October 30, 2011 Saylor URL: http://www.saylor.org/courses/cs402/ The Saylor Foundation Saylor URL: http://www.saylor.org/courses/cs402/ The Saylor Foundation Contents 1 Preface 3 2 Introduction 5 2.1 Services and protocols........................................ 11 2.2 The reference models ........................................ 20 2.3 Organisation of the book ....................................... 25 3 The application Layer 27 3.1 Principles ............................................... 27 3.2 Application-level protocols ..................................... 32 3.3 Writing simple networked applications ............................... 55 3.4 Summary ............................................... 61 3.5 Exercises ............................................... 61 4 The transport layer 67 4.1 Principles of a reliable transport protocol .............................. 67 4.2 The User Datagram Protocol ..................................... 87 4.3 The Transmission Control Protocol ................................. 89 4.4 Summary ...............................................113 4.5 Exercises ...............................................114 5 The network layer 127 5.1 Principles ...............................................127 5.2 Internet Protocol ...........................................140 5.3 Routing in IP networks ........................................170 5.4 Summary ...............................................195 5.5 Exercises ...............................................195
    [Show full text]
  • End-To-End Arguments in the Internet: Principles, Practices, and Theory
    End-to-End Arguments in the Internet: Principles, Practices, and Theory vorgelegt von Matthias Bärwolff Von der Fakultät IV Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr. Ing.) genehmigte Dissertation Promotionsausschuss: Prof. Dr. Anja Feldmann (Vorsitzende) Prof. Dr. Bernd Lutterbeck (Berichter) Dr. David D. Clark (Berichter) Tag der wissenschaftlichen Aussprache: 22. Oktober 2010 Berlin 2010 D 83 Dissertation submitted to the Department of Electrical Engineering and Computer Science at Technische Universität Berlin in partial fulfillment of the requirements for the degree of Dr. Ing. Advisers: Prof. em. Dr. iur. Bernd Lutterbeck, Technische Universität Berlin Dr. David D. Clark, Massachusetts Institute of Technology I gratefully acknowledge the financial support of the German Academic Exchange Service (Deutscher Akademischer Auslandsdienst, DAAD) who have given me a scholarship for a stay at MIT in early 2009. Diese Doktorarbeit wurde mit finanzieller Unterstützung des Deutschen Akademischen Auslandsdiensts (DAAD) in Form eines dreimonatigen Doktorandenstipendiums im Jahr 2009 angefertigt. © Copyright 2010 by Matthias Bärwolff www.bärwolff.de [email protected] +49 30 20238852 rinciples are often more effective guides for action when they appear as no more than an unreasoned prejudice, Pa general feeling that certain things simply “are not done”; while as soon as they are explicitly stated speculation begins about their correctness and their validity. [ . ] Once the instinctive certainty is lost, perhaps as a result of unsuccessful attempts to put into words principles that had been observed “intuitively”, there is no way of regaining such guidance other than to search for a correct statement of what before was known implicitly.
    [Show full text]
  • An Introduction to Computer Networks Stanford Univ CS144 Fall 2012
    An Introduction to Computer Networks Stanford Univ CS144 Fall 2012 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 09 Oct 2012 17:42:20 UTC Contents Articles --WEEK ONE-- 1 Introduction 2 Internet 2 What the Internet is 20 Internet protocol suite 20 OSI model 31 Internet Protocol 39 Transmission Control Protocol 42 User Datagram Protocol 59 Internet Control Message Protocol 65 Hypertext Transfer Protocol 68 Skype protocol 75 BitTorrent 81 Architectural Principles 95 Encapsulation (networking) 95 Packet switching 96 Hostname 100 End-to-end principle 102 Finite-state machine 107 --END WEEK ONE-- 118 References Article Sources and Contributors 119 Image Sources, Licenses and Contributors 124 Article Licenses License 125 1 --WEEK ONE-- 2 Introduction Internet Routing paths through a portion of the Internet as visualized by the Opte Project General Access · Censorship · Democracy Digital divide · Digital rights Freedom · History · Network neutrality Phenomenon · Pioneers · Privacy Sociology · Usage Internet governance Internet Corporation for Assigned Names and Numbers (ICANN) Internet Engineering Task Force (IETF) Internet Governance Forum (IGF) Internet Society (ISOC) Protocols and infrastructure Domain Name System (DNS) Hypertext Transfer Protocol (HTTP) IP address Internet exchange point Internet Protocol (IP) Internet Protocol Suite (TCP/IP) Internet service provider (ISP) Simple Mail Transfer Protocol (SMTP) Services Blogs · Microblogs · E-mail Fax · File sharing · File transfer Instant messaging · Gaming Podcast · TV · Search Shopping · Voice over IP (VoIP) Internet 3 World Wide Web Guides Outline Internet portal The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide.
    [Show full text]