<< Advanced Computer network >> (advaned computer Networks) Xu Ke Xu Mingwei Chen Wenrongmadong Super

Source: Internet
Author: User

Directory

1th Chapter Computer Network and INTERNET1

1.1 Introduction 1

1.2 Internet Development History 2

1.2.1 Main stage of Internet development 4

1.2.2 The development of Internet in China 5

1.2.3 Internet Major Innovation 5

1.3 Internet edge layer and core layer 10

1.3.1 Internet Edge Layer 10

1.3.2 Internet Core Layer 11

1.4 Internet Standardization Organization 11

1.5 Next Generation Internet development status 12

1.5.1 New generation of internet and IPv613

1.5.2 The basic research and exploration of the next Generation Internet Architecture 14

1.6 Introduction to emerging network patterns 16

1.6.1 Internet of Things 16

1.6.2 Cloud Computing 19

1.6.3 Data Center Network 20

1.7 Conclusions and further research work 22

References 23

Chapter 2nd Internet Unicast routing 26

2.1 Introduction 26

2.2 Internet routing architecture and routing algorithm 26

2.2.1 Internet Structure features 26

2.2.2 The routing structure of the Internet 27

2.2.3 Routing Algorithm Classification 30

2.3 Routing protocols in the Internet domain 33

2.3.1 Routing Information Protocol (RIP) 34

2.3.2 Open Shortest Path First Protocol (OSPF) 40

2.4 Internet inter-domain Routing protocol BGP54

2.4.1 Autonomous System-level network topology 55

2.4.2 Inter-autonomous system connection Relationship 57

2.4.3 Domestic ISP Interconnection situation 61

2.4.4 Border Gateway Protocol (BGP) Introduction 63

2.4.5 Policy Routing in BGP 71

2.4.6 BGP Routing Convergence problem 75

2.4.7 BGP Stable Path problem 81

2.4.8 BGP Routing Security Issue 86

2.5 Conclusions and further research work 90

References 91

3rd Chapter Internet Multicast 95

3.1 Introduction 95

3.1.1 Communication mode in computer network 95

The history, present situation and challenge of 3.1.2 Multicast Development 97

Advantages and disadvantages of 3.1.3 IP Multicast Technology 98

3.2 Multicast Address 100

3.2.1 IPV4 Multicast Address 100

3.2.2 Multicast MAC address 101

3.3 Internet Group Management Protocol IGMP102

3.4 Multicast Forwarding 103

3.4.1 Source Tree 103

3.4.2 Sharing Tree 104

3.4.3 Comparison of source tree and shared tree 105

3.4.4 Multicast Forwarding 105

3.5 Multicast Routing Protocol 107

Multicast routing protocol in 3.5.1 domain 109

3.5.2 inter-domain multicast Routing protocol 116

3.5.3 Analysis and comparison 125

3.6 IPV6 Multicast 131

3.6.1 IPV6 Multicast Address 131

3.6.2 IPV6 Group Membership Agreement 132

3.6.3 IPV6 Multicast Routing Protocol 132

3.6.4 CNGI Large-scale controllable multicast 133

3.7 Conclusions and further research work 134

References 136

4th Congestion Control 139

4.1 Introduction 139

4.2 Basic Concepts 140

4.2.1 congestion and congestion control 140

4.2.2 Why congestion occurs in the Internet 141

Target of 4.2.3 Congestion control 141

4.2.4 congestion control in IP multicast 143

Study on TCP congestion control mechanism in 4.3 143

4.3.1 network model for the Internet 143

4.3.2 Linear congestion Control mechanism 144

4.3.3 linear congestion control mechanism evaluation 145

4.4 Research on end-to-end congestion control algorithm 147

4.4.1 End-to-end congestion control algorithm design difficulty 148

An overview of 4.4.2 end-to-end congestion control algorithm 148

SOURCE algorithm for 4.4.3 congestion control 149

Link algorithm for 4.4.4 congestion control 153

4.5 Multicast congestion control algorithms and protocols 158

Target 158 of 4.5.1 multicast Congestion Control Protocol

Classification of 4.5.2 Multicast congestion control algorithm 159

4.6 Conclusions and further research work 161

References 162

5th. Service Quality Control 166

5.1 Introduction 166

5.2 Basic framework for QoS 168

5.2.1 Traffic classification and labeling 168

5.2.2 Traffic regulation and shaping 168

5.2.3 Queue Scheduling 172

5.3 Integrated services and differentiated services 174

5.3.1 Integration Services IntServ174

5.3.2 Differentiated Services DiffServ180

End-to-end QoS delivery mechanism for 5.3.3 Integration Services combined with Differentiated Services 188

5.3.4 Simple comparison of various service mechanisms 192

5.4 Packet Scheduling algorithm 193

5.4.1 Packet Scheduling Overview 193

5.4.2 Common scheduling algorithm 193

5.5 Dynamic grouping Status 200

5.5.1 Core stateless Network Architecture score Overview 201

Guaranteed service in 5.5.2-score 207

5.6 Conclusions and further research work 210

References 211

6th. High performance router architecture and key Technologies 216

6.1 Introduction 216

6.2 Development History of the router 216

6.3 Router hardware and software system composition 217

6.3.1 Router Basic Structure Unit 217

6.3.2 Router Software Architecture 219

6.4 Router Architecture 220

6.4.1 why a high-performance router is required 221

6.4.2 Single-unit centralized bus structure 221

6.4.3 Single-machine distributed bus architecture 223

6.4.4 single-machine distributed crossbar structure 223

6.4.5 Multi-machine interconnect cluster Structure 224

6.4.6 Scalable cluster Routers product brief 226

6.5 Router key Technology 228

6.5.1 Routing Lookup Algorithm 228

6.5.2 IP packet Classification algorithm 251

6.5.3 router switching structure and scheduling algorithm 262

6.6 New Router Architecture research Progress 280

6.6.1 Parallel Packet Switch PPS280

Research progress of 6.6.2 programmable routers 283

6.6.3 reconfigurable Router 287

6.7 Conclusions and further research work 290

References 290

7th. Cyber Security 300

7.1 Introduction 300

7.2 Computer network Security Fundamentals 301

7.2.1 Cyber Security Risk 301

7.2.2 Network security objectives, security services, and security mechanisms 302

7.3 Fundamentals of Cryptography and its application 303

7.3.1 History of Cryptography 304

7.3.2 Basic concepts of cryptography 310

7.3.3 symmetric key Algorithm Introduction 312

7.3.4 Asymmetric Cryptographic Algorithms Introduction 317

7.3.5 Information authentication and one-way hash function 321

7.4 IP layer Security mechanism IPSec326

7.4.1 IPSec protocol Family Structure 326

7.4.2 Summary 333

7.5 DDoS protection against distributed Denial of service attacks 333

7.5.1 Basic methods of DDoS attacks 335

7.5.2 existing DDoS attack prevention scenario 339

7.5.3 Summary 343

7.6 Malware and botnets 343

7.6.1 Traditional computer Virus 344

7.6.2 Worm 345

7.6.3 Trojan Horse 346

7.6.4 Zombie Network 348

7.6.5 Summary 348

7.7 Conclusions and further research work 349

Reference 350 the 8th chapter of the theory of peer system 354

8.1 Introduction 354

8.2-Peer Technology history 354

8.3-Peer Organizational structure 356

8.3.1-to-peer and application-layer network 357

8.3.2 Non-structured peer network 358

8.3.3 structured-to-peer network 362

8.4-to-peer applications and typical peer-to system analysis 371

8.4.1 BitTorrent371

8.4.2 CoolStreaming376

8.4.3 PPLive378

8.4.4 PPVA382

8.5 Conclusions and further research work 384

References 385

9th. Internet of Things 388

9.1 Introduction 388

9.2 The origin of the Internet of Things 388

9.2.1 The origin and development of the Internet of Things 388

9.2.2 Radio Frequency Identification technology 389

9.2.3 Wisdom of the Earth 391

9.2.4 Perception China 392

9.3 Common Application Scenarios 392

9.3.1 Intelligent Production Line 392

9.3.2 Smart Home 393

9.3.3 Intelligent Transportation 393

9.3.4 Wisdom Agriculture 395

9.3.5 Medical Internet of things 396

9.3.6 Security System 396

9.3.7 streetlight Control System 397

9.3.8 Expo Ticket 397

9.4 Introduction to Wireless sensor networks 398

9.4.1 concept and definition of wireless sensor networks 398

Technical features of 9.4.2 Wireless sensor network 398

Application of 9.4.3 sensor network 402

9.5 IoT Architecture 405

9.5.1 features of the Internet of Things 405

9.5.2 the difficulty of IoT development 406

9.5.3 IoT Architecture Design principles 406

9.5.4 an Internet of things application Reference Model 407

9.5.51 Hierarchical Internet of things architectures 408

9.5.6 converged IoT's next Generation Internet architecture and protocol stack 409

9.6 IoT typical Protocol 411

9.6.1 IEEE 802.15.4 Standard 411

9.6.2 ZigBee414

9.6.3 6lowpan414

9.6.4 Routing mechanism 419

9.6.5 simplification of the TCP/IP protocol stack 427

9.6.6 CoRE428

9.7 hardware platforms and operating systems 429

9.7.1 Crossbow Hardware Platform 430

9.7.2 Operating System 430

9.8 Major research issues in IoT architecture 433

9.8.1 New Scalable Hierarchical routing 434

9.8.2 Lightweight IPV6 protocol stack 434

9.8.3 IoT node and Internet connectivity issues 435

9.8.4 Internet of Things security 436

9.9 Conclusions and further research work 437

References 437

10th Chapter IPV6 and the next generation of Internet 441

10.1 Introduction 441

10.2 IPv6 Introduction 441

10.2.1 IETF441

10.2.2 History of the IPV6 protocol 442

10.2.3 IPV6 Agreement content 443

10.2.4 IPv6 Outlook 446

10.3 Key features of the next generation of Internet 447

10.3.1 Basic features of next generation Internet 447

10.3.2 key technical challenges for next-generation Internet 448

10.3.3 several important problems in the next generation Internet research 449

10.4 Major advances in the next generation of internet in China 451

10.4.1 Research on new Generation Internet architecture based on improved 451

10.4.2 research on the new generation of Internet architecture based on revolutionary style 454

10.4.3 China's next Generation Internet research and practice 458

10.4.4 Summary 461

10.5 Conclusions and further research work 463

References 463

Appendix A computer network Experiment System Netriver Introduction 467

A.1 Sliding Window Protocol Experiment 468

A.2 IPV4 Protocol Transceiver Experiment 472

A.3 IPV4 Protocol Forwarding experiment 475

A.4 IPSec Protocol Experiment 480

References 490

Appendix B NETFPGA Experimental Platform introduction 491

B.1 NETFPGA Development Board Introduction 491

B.2 NETFPGA Hardware System 491

B.3 NETFPGA Software System 492

B.4 NETFPGA using Model 493

References 495

Appendix C Planetlab Introduction 496

References 500

<< Advanced Computer network >> (advaned computer Networks) Xu Ke Xu Mingwei Chen Wenrongmadong Super

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.