Directory
1th Chapter Computer Network and INTERNET1
1.1 Introduction 1
1.2 Internet Development History 2
1.2.1 Main stage of Internet development 4
1.2.2 The development of Internet in China 5
1.2.3 Internet Major Innovation 5
1.3 Internet edge layer and core layer 10
1.3.1 Internet Edge Layer 10
1.3.2 Internet Core Layer 11
1.4 Internet Standardization Organization 11
1.5 Next Generation Internet development status 12
1.5.1 New generation of internet and IPv613
1.5.2 The basic research and exploration of the next Generation Internet Architecture 14
1.6 Introduction to emerging network patterns 16
1.6.1 Internet of Things 16
1.6.2 Cloud Computing 19
1.6.3 Data Center Network 20
1.7 Conclusions and further research work 22
References 23
Chapter 2nd Internet Unicast routing 26
2.1 Introduction 26
2.2 Internet routing architecture and routing algorithm 26
2.2.1 Internet Structure features 26
2.2.2 The routing structure of the Internet 27
2.2.3 Routing Algorithm Classification 30
2.3 Routing protocols in the Internet domain 33
2.3.1 Routing Information Protocol (RIP) 34
2.3.2 Open Shortest Path First Protocol (OSPF) 40
2.4 Internet inter-domain Routing protocol BGP54
2.4.1 Autonomous System-level network topology 55
2.4.2 Inter-autonomous system connection Relationship 57
2.4.3 Domestic ISP Interconnection situation 61
2.4.4 Border Gateway Protocol (BGP) Introduction 63
2.4.5 Policy Routing in BGP 71
2.4.6 BGP Routing Convergence problem 75
2.4.7 BGP Stable Path problem 81
2.4.8 BGP Routing Security Issue 86
2.5 Conclusions and further research work 90
References 91
3rd Chapter Internet Multicast 95
3.1 Introduction 95
3.1.1 Communication mode in computer network 95
The history, present situation and challenge of 3.1.2 Multicast Development 97
Advantages and disadvantages of 3.1.3 IP Multicast Technology 98
3.2 Multicast Address 100
3.2.1 IPV4 Multicast Address 100
3.2.2 Multicast MAC address 101
3.3 Internet Group Management Protocol IGMP102
3.4 Multicast Forwarding 103
3.4.1 Source Tree 103
3.4.2 Sharing Tree 104
3.4.3 Comparison of source tree and shared tree 105
3.4.4 Multicast Forwarding 105
3.5 Multicast Routing Protocol 107
Multicast routing protocol in 3.5.1 domain 109
3.5.2 inter-domain multicast Routing protocol 116
3.5.3 Analysis and comparison 125
3.6 IPV6 Multicast 131
3.6.1 IPV6 Multicast Address 131
3.6.2 IPV6 Group Membership Agreement 132
3.6.3 IPV6 Multicast Routing Protocol 132
3.6.4 CNGI Large-scale controllable multicast 133
3.7 Conclusions and further research work 134
References 136
4th Congestion Control 139
4.1 Introduction 139
4.2 Basic Concepts 140
4.2.1 congestion and congestion control 140
4.2.2 Why congestion occurs in the Internet 141
Target of 4.2.3 Congestion control 141
4.2.4 congestion control in IP multicast 143
Study on TCP congestion control mechanism in 4.3 143
4.3.1 network model for the Internet 143
4.3.2 Linear congestion Control mechanism 144
4.3.3 linear congestion control mechanism evaluation 145
4.4 Research on end-to-end congestion control algorithm 147
4.4.1 End-to-end congestion control algorithm design difficulty 148
An overview of 4.4.2 end-to-end congestion control algorithm 148
SOURCE algorithm for 4.4.3 congestion control 149
Link algorithm for 4.4.4 congestion control 153
4.5 Multicast congestion control algorithms and protocols 158
Target 158 of 4.5.1 multicast Congestion Control Protocol
Classification of 4.5.2 Multicast congestion control algorithm 159
4.6 Conclusions and further research work 161
References 162
5th. Service Quality Control 166
5.1 Introduction 166
5.2 Basic framework for QoS 168
5.2.1 Traffic classification and labeling 168
5.2.2 Traffic regulation and shaping 168
5.2.3 Queue Scheduling 172
5.3 Integrated services and differentiated services 174
5.3.1 Integration Services IntServ174
5.3.2 Differentiated Services DiffServ180
End-to-end QoS delivery mechanism for 5.3.3 Integration Services combined with Differentiated Services 188
5.3.4 Simple comparison of various service mechanisms 192
5.4 Packet Scheduling algorithm 193
5.4.1 Packet Scheduling Overview 193
5.4.2 Common scheduling algorithm 193
5.5 Dynamic grouping Status 200
5.5.1 Core stateless Network Architecture score Overview 201
Guaranteed service in 5.5.2-score 207
5.6 Conclusions and further research work 210
References 211
6th. High performance router architecture and key Technologies 216
6.1 Introduction 216
6.2 Development History of the router 216
6.3 Router hardware and software system composition 217
6.3.1 Router Basic Structure Unit 217
6.3.2 Router Software Architecture 219
6.4 Router Architecture 220
6.4.1 why a high-performance router is required 221
6.4.2 Single-unit centralized bus structure 221
6.4.3 Single-machine distributed bus architecture 223
6.4.4 single-machine distributed crossbar structure 223
6.4.5 Multi-machine interconnect cluster Structure 224
6.4.6 Scalable cluster Routers product brief 226
6.5 Router key Technology 228
6.5.1 Routing Lookup Algorithm 228
6.5.2 IP packet Classification algorithm 251
6.5.3 router switching structure and scheduling algorithm 262
6.6 New Router Architecture research Progress 280
6.6.1 Parallel Packet Switch PPS280
Research progress of 6.6.2 programmable routers 283
6.6.3 reconfigurable Router 287
6.7 Conclusions and further research work 290
References 290
7th. Cyber Security 300
7.1 Introduction 300
7.2 Computer network Security Fundamentals 301
7.2.1 Cyber Security Risk 301
7.2.2 Network security objectives, security services, and security mechanisms 302
7.3 Fundamentals of Cryptography and its application 303
7.3.1 History of Cryptography 304
7.3.2 Basic concepts of cryptography 310
7.3.3 symmetric key Algorithm Introduction 312
7.3.4 Asymmetric Cryptographic Algorithms Introduction 317
7.3.5 Information authentication and one-way hash function 321
7.4 IP layer Security mechanism IPSec326
7.4.1 IPSec protocol Family Structure 326
7.4.2 Summary 333
7.5 DDoS protection against distributed Denial of service attacks 333
7.5.1 Basic methods of DDoS attacks 335
7.5.2 existing DDoS attack prevention scenario 339
7.5.3 Summary 343
7.6 Malware and botnets 343
7.6.1 Traditional computer Virus 344
7.6.2 Worm 345
7.6.3 Trojan Horse 346
7.6.4 Zombie Network 348
7.6.5 Summary 348
7.7 Conclusions and further research work 349
Reference 350 the 8th chapter of the theory of peer system 354
8.1 Introduction 354
8.2-Peer Technology history 354
8.3-Peer Organizational structure 356
8.3.1-to-peer and application-layer network 357
8.3.2 Non-structured peer network 358
8.3.3 structured-to-peer network 362
8.4-to-peer applications and typical peer-to system analysis 371
8.4.1 BitTorrent371
8.4.2 CoolStreaming376
8.4.3 PPLive378
8.4.4 PPVA382
8.5 Conclusions and further research work 384
References 385
9th. Internet of Things 388
9.1 Introduction 388
9.2 The origin of the Internet of Things 388
9.2.1 The origin and development of the Internet of Things 388
9.2.2 Radio Frequency Identification technology 389
9.2.3 Wisdom of the Earth 391
9.2.4 Perception China 392
9.3 Common Application Scenarios 392
9.3.1 Intelligent Production Line 392
9.3.2 Smart Home 393
9.3.3 Intelligent Transportation 393
9.3.4 Wisdom Agriculture 395
9.3.5 Medical Internet of things 396
9.3.6 Security System 396
9.3.7 streetlight Control System 397
9.3.8 Expo Ticket 397
9.4 Introduction to Wireless sensor networks 398
9.4.1 concept and definition of wireless sensor networks 398
Technical features of 9.4.2 Wireless sensor network 398
Application of 9.4.3 sensor network 402
9.5 IoT Architecture 405
9.5.1 features of the Internet of Things 405
9.5.2 the difficulty of IoT development 406
9.5.3 IoT Architecture Design principles 406
9.5.4 an Internet of things application Reference Model 407
9.5.51 Hierarchical Internet of things architectures 408
9.5.6 converged IoT's next Generation Internet architecture and protocol stack 409
9.6 IoT typical Protocol 411
9.6.1 IEEE 802.15.4 Standard 411
9.6.2 ZigBee414
9.6.3 6lowpan414
9.6.4 Routing mechanism 419
9.6.5 simplification of the TCP/IP protocol stack 427
9.6.6 CoRE428
9.7 hardware platforms and operating systems 429
9.7.1 Crossbow Hardware Platform 430
9.7.2 Operating System 430
9.8 Major research issues in IoT architecture 433
9.8.1 New Scalable Hierarchical routing 434
9.8.2 Lightweight IPV6 protocol stack 434
9.8.3 IoT node and Internet connectivity issues 435
9.8.4 Internet of Things security 436
9.9 Conclusions and further research work 437
References 437
10th Chapter IPV6 and the next generation of Internet 441
10.1 Introduction 441
10.2 IPv6 Introduction 441
10.2.1 IETF441
10.2.2 History of the IPV6 protocol 442
10.2.3 IPV6 Agreement content 443
10.2.4 IPv6 Outlook 446
10.3 Key features of the next generation of Internet 447
10.3.1 Basic features of next generation Internet 447
10.3.2 key technical challenges for next-generation Internet 448
10.3.3 several important problems in the next generation Internet research 449
10.4 Major advances in the next generation of internet in China 451
10.4.1 Research on new Generation Internet architecture based on improved 451
10.4.2 research on the new generation of Internet architecture based on revolutionary style 454
10.4.3 China's next Generation Internet research and practice 458
10.4.4 Summary 461
10.5 Conclusions and further research work 463
References 463
Appendix A computer network Experiment System Netriver Introduction 467
A.1 Sliding Window Protocol Experiment 468
A.2 IPV4 Protocol Transceiver Experiment 472
A.3 IPV4 Protocol Forwarding experiment 475
A.4 IPSec Protocol Experiment 480
References 490
Appendix B NETFPGA Experimental Platform introduction 491
B.1 NETFPGA Development Board Introduction 491
B.2 NETFPGA Hardware System 491
B.3 NETFPGA Software System 492
B.4 NETFPGA using Model 493
References 495
Appendix C Planetlab Introduction 496
References 500
<< Advanced Computer network >> (advaned computer Networks) Xu Ke Xu Mingwei Chen Wenrongmadong Super