Book description
Radia Perlman's Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second Edition is expanded and updated to cover the newest developments in the field, including advances in switching and bridge technology, VLANs, Fast Ethernet, DHCP, ATM, and IPv6. Additional new topics include IPX, AppleTalk, and DECnet. You will gain a deeper understanding of the range of solutions possible and find valuable information on protocols for which documentation is not readily available elsewhere.
Written by the inventor of many of the algorithms that make switching and routing robust and efficient, Interconnections, Second Edition offers an expert's insight into how and why networks operate as they do. Perlman describes all of the major networking algorithms and protocols in use today in clear and concise terms, while exploring the engineering trade-offs that the different approaches represent.
The book contains extensive coverage of such topics as:
The spanning tree algorithm
The differences between bridges, routers, and switches
Virtual LANs (VLANs) and Fast Ethernet
Addressing and packet formats for IP, IPv6, IPX, CLNP, AppleTalk, and DECnet
Autoconfiguration of addresses; strategies in various protocol suites
Routing protocols, including RIP, IS-IS, OSPF, PNNI, NLSP, and BGP
Layer 3 multicast protocols, including IGMP, DVMRP, MOSPF, CBT, PIM, BGMP, Simple Multicast, and Express
Sabotage-proof routing
Protocol design folklore
0201634481B04062001
Table of contents
- Copyright
- Preface
- 1. Essential Networking Concepts
-
2. Data Link Layer Issues
- 2.1. Generic LANs
- 2.2. IEEE 802 LANs
- 2.3. Names, Addresses, Routes
- 2.4. LAN Addresses
- 2.5. Multicast versus Unicast Addresses
- 2.6. The Broadcast Address
- 2.7. Multiplexing Field
- 2.8. Bit Order
- 2.9. Logical Link Control
- 2.10. Issues in 802.3
- 2.11. Issues in 802.5
- 2.12. Packet Bursts
- 2.13. Reasons for Bridges
- 2.14. Point-to-Point Links
- 3. Transparent Bridges
-
4. Source Routing Bridges
- 4.1. Pure Source Routing
- 4.2. SR-TB Bridges
- 4.3. SRT Bridges
- 4.4. End-system Algorithms
- 4.5. Source Routing versus Transparent Bridging
- 4.6. Ideas for Improving Source Route Bridging
- 5. Hubs, Switches, Virtual LANs, and Fast Ethernet
- 6. Network Interface: Service Models
- 7. Connection-oriented Nets: X.25 and ATM
- 8. Generic Connectionless Service
-
9. Network Layer Addresses
- 9.1. Hierarchical Addresses with Fixed Boundaries
- 9.2. Hierarchical Addresses with Flexible Boundaries
- 9.3. Owning versus Renting Addresses
- 9.4. Types of Addresses
- 9.5. IP
- 9.6. IPX
- 9.7. IPX+
- 9.8. IPv6
- 9.9. CLNP Network Layer Addresses
- 9.10. AppleTalk Network Layer Addresses
- 9.11. DECnet Phases III and IV
- 9.12. NAT/NAPT
-
10. Connectionless Data Packet Formats
- 10.1. Pieces of a Connectionless Network Layer
- 10.2. Data Packets
- 10.3. Summary of Packet Formats for Easy Reference
-
10.4. Technical Issues and Comparisons in Data Packet Formats
- 10.4.1. Destination Address
- 10.4.2. Source Address
- 10.4.3. Destination and Source Sockets
- 10.4.4. Header Length
- 10.4.5. Packet Length
- 10.4.6. Header Checksum
- 10.4.7. Fragmentation Allowed
- 10.4.8. Packet Identifier
- 10.4.9. Fragment Offset
- 10.4.10. Prefragmentation Length
- 10.4.11. More Fragments Follow
- 10.4.12. Lifetime
- 10.4.13. Version
- 10.4.14. Padding
- 10.4.15. Protocol
- 10.4.16. Type
- 10.4.17. Error Report Requested
- 10.4.18. Congestion Feedback: Source Quench versus DEC Bit
- 10.4.19. Type of Service
- 10.4.20. Options
- 10.5. Source Routing
- 10.6. The Great IPX Frame Format Mystery
- 10.7. Error Reports and Other Network Feedback to the Endnode
-
11. Neighbor Greeting and Autoconfiguration
- 11.1. Endnodes Attached via Point-to-Point Links
-
11.2. Endnodes Attached via LANs
- 11.2.1. ES-IS: The CLNP Solution
- 11.2.2. The IP Solution
- 11.2.3. The IPX Solution
- 11.2.4. The DECnet Solution
- 11.2.5. The AppleTalk Solution
- 11.2.6. The IPv6 Solution
-
11.2.7. Review and Comparisons
- 11.2.7.1. Endnodes Acquire a Layer 3 Address
- 11.2.7.2. Router Finds Out Layer 3 Addresses of Endnode Neighbors
- 11.2.7.3. Router Finds Out Layer 2 Addresses of Endnode Neighbors
- 11.2.7.4. Endnodes Find a Router
- 11.2.7.5. Endnode Neighbors Send Directly to Each Other
- 11.2.7.6. Finding the Best Router
- 11.2.7.7. Routerless LAN
- 11.2.8. Comparisons
- 11.3. Endnodes Attached via Nonbroadcast Multiaccess Media
- 11.4. Finding Things
- 12. Routing Algorithm Concepts
- 13. Fast Packet Forwarding
-
14. Specific Routing Protocols
- 14.1. A Brief History of Intradomain Routing Protocols
- 14.2. RIP
- 14.3. RTMP, IPX-RIP, and DECnet
-
14.4. IS-IS, OSPF, NLSP, and PNNI
- 14.4.1. Hierarchy
- 14.4.2. Area Addresses
- 14.4.3. LANs and Designated Routers
- 14.4.4. Reliable Propagation of LSPs on LANs
- 14.4.5. Parameter Synchronization
- 14.4.6. Destinations per Packet
- 14.4.7. LSP Database Overload
- 14.4.8. Authentication
- 14.4.9. IS-IS Details
- 14.4.10. OSPF
- 14.4.11. PNNI Details
- 14.5. Interdomain Routing Protocols
-
15. WAN Multicast
- 15.1. Introduction
-
15.2. Multicast in IP
- 15.2.1. Centralized versus Decentralized Multicast
- 15.2.2. Could We Do Without Layer 3 Multicast?
- 15.2.3. Mapping NL Multicast to DL Multicast
- 15.2.4. IGMP Protocol
- 15.2.5. IGMP Snooping
- 15.2.6. Reverse Path Forwarding
- 15.2.7. Distance Vector Multicast Routing Protocol
- 15.2.8. Multicast OSPF
- 15.2.9. Core-based Trees
- 15.2.10. PIM-DM
- 15.2.11. PIM-SM
- 15.2.12. BGMP/MASC
- 15.2.13. Multicast Source Distribution Protocol
-
15.2.14. Simplifying Multicast
- 15.2.14.1. Creating a Group in Simple Multicast: Choosing C
- 15.2.14.2. How Do Endnodes Discover C?
- 15.2.14.3. Isn't a Shared Tree Suboptimal?
- 15.2.14.4. Single Point of Failure?
- 15.2.14.5. Controlling Who Can Send
- 15.2.14.6. Policy
- 15.2.14.7. Specifying C in Join Messages
- 15.2.14.8. Specify Both C and G in Data Messages
- 15.2.14.9. Dense-mode Groups
- 15.2.14.10. Express
- 15.2.14.11. What Is Simpler About Simple Multicast?
- Homework
- 16. Sabotage-proof Routing
- 17. To Route, Bridge, or Switch: Is That the Question?
-
18. Protocol Design Folklore
- 18.1. Simplicity versus Flexibility versus Optimality
- 18.2. Knowing the Problem You're Trying to Solve
- 18.3. Overhead and Scaling
- 18.4. Operation Above Capacity
- 18.5. Compact IDs versus Object Identifiers
- 18.6. Optimizing for the Most Common or Important Case
- 18.7. Forward Compatibility
- 18.8. Migration: Routing Algorithms and Addressing
- 18.9. Parameters
- 18.10. Making Multiprotocol Operation Possible
- 18.11. Running over Layer 3 versus Layer 2
- 18.12. Robustness
- 18.13. Determinism versus Stability
- 18.14. Performance for Correctness
- 18.15. In Closing
- Glossary
Product information
- Title: Interconnections: Bridges, Routers, Switches and Internetworking Protocols, Second Edition
- Author(s):
- Release date: September 1999
- Publisher(s): Addison-Wesley Professional
- ISBN: 0201634481
You might also like
book
Troubleshooting IP Routing Protocols
The comprehensive, hands-on guide for resolving IP routing problems Understand and overcome common routing problems associated …
book
Cisco LAN Switching Fundamentals
The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit …
book
Wireless and Mobile Device Security
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on …
book
Internet Routing Architectures, Second Edition
The industry's leading resource for Internet routing solutions and scenarios Explore the functions, attributes, and applications …