当前位置:首页 > 工业技术
TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构
TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构

TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构PDF电子书下载

工业技术

  • 电子书积分:20 积分如何计算积分?
  • 作 者:(美)Douglas E.Comer著
  • 出 版 社:北京:人民邮电出版社
  • 出版年份:2002
  • ISBN:7115099200
  • 页数:750 页
图书介绍:本书说详尽地讲解了网络互连的原理、网络体系结构、TCP/IP协议族以及近年来互联网发展的最新技术。本书包括了TCP/IP、网络互连各个组成部分的设计及其工作,以基工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP网络互连的经典图书,可读性极强,是任何一个想要了解网络互连技术的人所必不可少的参考书。本书适合为高等院样计算机专业网络相关课程的教材,也适合各类网络技术开发人员阅读。
《TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构》目录

1.1 The Motivation For Internetworking 1

Chapter 1 Introduction And Overview 1

1.2 The TCP/IP Internet 2

1.3 Internet Services 3

1.4 History And Scope Of The Internet 6

1.5 The Internet Architecture Board 8

1.6 The IAB Reorganization 9

1.7 The Internet Society 11

1.8 Internet Request For Comments 11

1.10 Future Growth And Technology 12

1.9 Internet Protocols And Standardization 12

1.11 Organization Of The Text 13

1.12 Summary 14

Chapter 2 Review Of Underlying Network Technologies 17

2.1 Introduction 17

2.2 Two Approaches To Network Communication 18

2.3 Wide Area And Local Area Networks 19

2.4 Ethernet Iechnology 20

2.5 Fiber Distributed Data Interconnect (FDDI) 33

17.19 Consequences Of TRPF 35

2.6 Asynchronous Transfer Mode 37

2.7 WAN Technologies: ARPANET 38

2.8 National Science Foundation Networking 40

2.9 ANSNET 44

2.10 A Very High Speed Backbone (vBNS) 45

2.11 Other Technologies Over Which TCP/IP Has Been Used 46

2.12 Summary And Conclusion 50

Chapter 3 Internetworking Concept And Architectural Model 53

3.1 Introduction 53

3.2 Application-Level Interconnection 53

3.3 Network-Level Interconnection 54

3.4 Pronerties Of The Internet 55

3.5 Internet Architecture 56

3.6 Interconnection Through IP Routers 56

3.7 The User s View 58

3.8 All Networks Are Equal 58

3.9 The Unanswered Questions 59

3.10 Summary 60

Chapter 4 Classful Internet Addresses 63

4.1 Introduction 63

4.2 Universal Identifiers 63

4.3 The Original Classful Addressing Scheme 64

4.4 Addresses Specify Network Connections 65

4.5 Network And Directed Broadcast Addresses 65

4.6 Limited Broadcast 66

4.8 Subnet And Supernet Extensions 67

4.7 Interpreting Zero To Mean This 67

4.9 IP Multicast Addresses 68

4.10 Weakenesses In Internet Addressing 68

4.11 Dotted Decimal Notation 69

4.12 Loopback Address 70

4.13 Summary Of Special Address Conventions 70

4.14 Internet Addressing Authority 71

4.15 Reserved Address Prefixes 72

4.16 An ExAmple 72

4.17 Network Byte Order 74

4.18 Summary 75

5.2 The Address Resolution Problem 77

5.1 Introduction 77

Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP) 77

5.4 Resolution Through Direct Mapping 78

5.3 Two Types Of Physical Addresses 78

5.5 Resolution Through Dynamic Binding 79

5.6 The Address Resolution Cache 80

5.7 ARP Cache Timeout 81

5.8 ARP Refinements 82

5.9 Relationship Of ARP To Other Protocols 82

5.10 ARP Implementation 82

5.11 ARP Encapsulation And Identification 84

5.12 ARP Protocol Format 84

5.13 Summary 86

6.1 Introduction 89

Chapter 6 Determining An Internet Address At Startup (RARP) 89

6.2 Reverse Address Resolution Protocol (RARP) 90

6.3 Timing RARP Transactions 92

6.4 Primary And Backup RARP Servers 92

6.5 Summary 93

Chapter 7 Internet Protocol: Connectionless Datagram Delivery 95

7.1 Introduction 95

7.2 A Virtual Network 95

7.3 Internet Architecture And Philosophy 96

7.4 The Conceptual Service Organization 96

7.7 The Internet Datagram 97

7.5 Connectionless Delivery System 97

7.6 Purpose Of The Internet Protocot 97

7.8 Internet Datagram Options 107

7.9 Summary 113

Chapter 8 Internet Protocol: Routing IP Datagrams 115

8.1 Introduction 115

8.2 Routing In An Internet 115

8.3 Direct And Indirect Delivery 117

8.4 Table-Driven IP Routing 119

8.5 Next-Hop Routing 119

8.6 Default Routes 121

8.7 Host-Specific Routes 121

8.8 The IP Routing Algorithm 121

8.9 Routing With IP Addresses 122

8.10 Handling Incoming Datagrams 124

8.11 Establishing Routing Tables 125

8.12 Summary 125

Chapter 9 Internet Protocol: Error And Control Messages (ICMP) 129

9.1 Introduction 129

9.2 The Internet Control Message Protocol 129

9.3 Error Reporting vs. Error Correction 130

9.4 ICMP Message Delivery 131

9.5 ICMP Message Format 132

9.6 Testing Destination Reachability And Status (Ping) 133

9.8 Reports Of Unreachable Destinations 134

9.7 Echo Request And Reply Message Format 134

9.10 Source Quench Format 136

9.9 Congestion And Datagram Flow Control 136

9.11 Route Change Requests From Routers 137

9.12 Detecting Circular Or Excessively Long Routes 139

9.14 Clock Synchronization And Transit Time Estimation 140

9.13 Reporting Other Problems 140

9.15 Information Request And Reply Messages 142

9.16 Obtaining A Subnet Mask 142

9.17 Router Discovery 143

9.18 Router Solicitation 144

9.19 Summary 145

Chapter 10 Classless And Subnet Address Extensions (CIDR) 147

10.1 Introduction 147

10.2 Review Of Relevant Facts 147

10.3 Minimizing Network Numbers 148

10.4 Transparent Routers 149

10.5 Proxy ARP 150

10.6 Subnet Addressing 152

10.7 Flexibility In Subnet Address Assignment 154

10.8 Variable-Length Subnets 155

10.9 Implementation Of Subnets With Masks 156

10.10 Subnet Mask Kepresentation 157

10.11 Routing In The Presence Of Subnets 158

10.12 The Subnet Routing Algorithm 159

10.13 A Unified Routing Algorithm 160

10.14 Maintenance Of Subnet Masks 161

10.15 Broadcasting To Subnets 161

10.16 Anonymous Point-To-Point Networks 162

10.17 Classless Addressing (Supernetting) 164

10.18 The Effect Of Supernetting On Routing 165

10.19 CIDR Address Blocks And Bit Masks 165

10.20 Address Blocks And CIDR Notation 166

10.21 A Classless Addressing Example 167

10.22 Data Structures And Algorithms For Classless Lookup 167

10.23 Longest-Match Routing And Mixtures Of Route Types 170

10.24 CIDR Blocks Reserved For Private Networks 172

10.25 Summary 173

11.1 Introduction 177

Chapter 11 Protocol Layering 177

11.2 The Need For Multiple Protocols 177

11.3 The Conceptual Layers Of Protocol Software 178

11.4 Functionality Of The Layers 181

11.5 X.25 And Its Relation To The ISO Model 182

11.6 Differences Between ISO And Internet Layering 185

11.7 The Protocol Layering Principle 187

11.8 Layering In The Presence Of Network Substructure 189

11.9 Two Important Boundaries In The TCP/IP Model 191

11.10 The Disadvantage Of Layering 192

11.11 The Basic Idea Behind Multiplexing And Demultiplexing 192

11.12 Summary 194

Chapter 12 User Datagram Protocol (UDP) 197

12.1 Introduction 197

12.2 Identifying The Ultimate Destination 197

12.3 The User Datagram Protocol 198

12.4 Format Of UDP Messages 199

12.5 UDP Pseudo-Header 200

12.6 UDP Encapsulation And Protocol Layering 201

12.7 Layering And The UDP Checksum Computation 203

12.8 UDP Multiplexing, Demultiplexing, And Ports 203

12.9 Reserved And Available UDP Port Numbers 204

12.10 Summary 206

Chapter 13 Reliable Stream Transport Service (TCP) 209

13.1 Introduction 209

13.2 The Need For Stream Delivery 209

13.3 Properties Of The Reliable Delivery Service 210

13.4 Providing Reliability 211

13.5 The Idea Behind Sliding Windows 213

13.6 The Transmission Control Protocol 215

13.7 Ports, Connections, And Endpoints 216

13.8 Passive And Active Opens 218

13.9 Segments,Streams,And Sequence Numbers 219

13.10 Variable Window Size And Flow Control 220

13.11 TCP Segment Format 221

13.12 Out Of Band Data 222

13.13 Maximum Segment Size Option 223

13.14 TCP Checksum Computation 224

13.15 Acknowledgements And Retransmission 225

13.16 Timeout And Retransmission 226

13.17 Accurate Measurement Of Round Trip Samples 228

13.18 Karn s Algorithm And Timer Backoff 229

13.19 Responding To High Variance In Delay 230

13.20 Response To Congestion 232

13.21 Congestion, Tail Drop, And TCP 234

13.22 Random Early Discard (RED) 235

13.23 Establishing A TCP Connection 237

13.24 Initial Sequence Numbers 239

13.25 Closing a TCP Connection 239

13.26 TCP Connection Reset 241

13.27 TCP Performance 243

13.30 TCP Performance 243

13.28 Forcing Data Delivery 243

13.29 Reserved TCP Port Numbers 243

13.31 Silly Window Syndrome And Small Packets 245

13.32 Avoiding Silly Window Syndrome 246

13.33 Summary 249

Chapter 14 Routing: Cores, Peers, And Algorithms 253

14.1 Introduction 253

14.2 The Origin Of Routing Tables 254

14.3 Routing With Partial Information 255

14.4 Original Internet Architecture And Cores 256

14.5 Core Routers 257

14.6 Beyond The Core Architecture To Peer Backbones 260

14.7 Automatic Route Propagation 262

14.8 Distance Vector (Bellman-Ford) Routing 262

14.9 Gateway-To-Gateway Protocol (GGP) 264

14.11 Reliability And Routing Protocols 265

14.10 Distance Factoring 265

14.12 Link-State (SPF) Routing 266

14.13 Summary 267

Chapter 15 Routing: Exterior Gateway Protocols And Autonomous Systems(BGP) 269

15.1 Introduction 269

15.2 Adding Complexity To The Architectural Model 269

15.3 Determining A Practical Limit On Group Size 270

15.4 A Fundamental Idea: Extra Hops 271

15.5 Hidden Networks 273

15.6 Autonomous System Concept 274

15.7 Form A Core To Independent Autonomous Systems 275

15.8 An Exterior Gateway Protocol 276

15.9 BGP Characteristics 277

15.10 BGP Functionality And Message Types 278

15.11 BGP Message Header 278

15.12 BGP OPEN Message 279

15.13 BGP UPDATE Message 280

15.14 Compressed Mask-Address Pairs 281

15.15 BGP Path Attributes 282

15.16 Bap KEEPALIVE Message 283

15.17 Information From The Receiver s Perspective 284

15.18 The Key Restriction Of Exterior Gateway Protocols 285

15.19 The Internet Routing Arbiter System 287

15.20 BGP NOTIFICATION Message 288

15.21 Decentralization Of Internet Architecture 289

15.22 Summary 290

Chapter 16 Routing: In An Autonomous System (RIP, OSPF, HELLO) 293

16.1 Introduction 293

16.2 Static Vs, Dynamic Interior Routes 293

16.3 Routing Information Protocol (RIP) 296

16.4 The Hello Protocol 305

16.5 Delay Metrics And Oscillation 305

16.6 Combining RIP, Hello, And BGP 307

16.7 Inter-Autonomous System Routing 307

16.9 The Open SPF Protocol (OSPF) 308

16.8 Gated: Inter-Autonomous System Communication 308

16.10 Routing With Partial Information 315

16.11 Summary 315

Chapter 17 Internet Multicasting 319

17.1 Introduction 319

17.2 Hardware Broadcast 319

17.3 Hardware Origins Of Multicast 320

17.4 Ethernet Multicast 321

17.5 IP Multicast 321

17.6 The Conceptual Pieces 322

17.7 IP Multicast Addresses 323

17.8 Multicast Address Semantics 325

17.9 Mapping IP Multicast To Ethernet Multicast 325

17.10 Hosts And Multicast Delivery 326

17.11 Multicast Scope 326

17.12 Extending Host Software To Handle Multicasting 327

17.13 Internet Group Management Protocol 328

17.14 IGMP Implementation 328

17.15 Group Membership State Transitions 329

17.16 IGMP Message Formal 331

17.17 Multicast Forwarding And Routing Information 332

17.18 Basic Multicast Routing Paradigms 334

17.20 Multicast Trees 337

17.21 The Essence Of Multicast Routing 338

17.22 Reverse Path Multicasting 338

17.23 Distance Vector Multicast Routing Protocol 339

17.24 The Mrouted Program 340

17.25 Alternative Protocols 343

17.26 Core Based Trees (CBT) 343

17.27 Protocol Independent Multicast (PIM) 344

17.28 Multicast Extensions To OSPF (MOSPF) 347

17.29 Reliable Multicast And ACK Implosions 347

17.30 Summary 349

Chapter 18 TCP/IP Over ATM Networks 353

18.1 Introduction 353

18.3 Large ATM Networks 354

18.2 ATM Hardware 354

18.4 The Logical View Of An ATM Network 355

18.5 The Two ATM Connection Paradigms 356

18.6 Paths, Circuits, And Identifiers 357

18.7 ATM Cell Transport 358

18.8 ATM Adaptation Layers 358

18.9 ATM Adaptation Layer5 360

18.11 Datagram Encapsulation And IP MTU Size 361

18.10 AAL5 Convergence, Segmentation, And Reassembly 361

18.12 Packet Type And Multiplexing 362

18.13 IP Address Binding In An ATM Network 363

18.14 Logical IP Subnet Concept 364

18.15 Connection Management 365

18.16 Address Binding Within An LIS 366

18.17 ATMARP Packet Format 366

18.18 Using ATMARP Packets To Determine An Address 369

18.20 Timing Out ATMARP Information In A Server 370

18.19 Obtaining Entries For A Server Database 370

18.21 Timing Out ATMARP Information In A Host Or Router 371

18.22 IP Switching Technologies 371

18.23 Switch Operation 372

18.24 Optimized IP Forwarding 372

18.25 Classification, Flows, And Higher Layer Switching 373

18.26 Applicability Of Switching Technology 374

18.27 Summary 374

Chapter 19 Mobile IP 377

19.1 Introduction 377

19.2 Mobility, Routing, and Addressing 377

19.3 Mobile IP Characteristics 378

19.4 Overview Of Mobile IP Operation 378

19.5 Mobile Addressing Details 379

19.6 Foreign Agent Discovery 380

19.7 Agent Registration 381

19.8 Registration Message Format 381

19.10 Datagram Transmission And Reception 383

19.9 Communication With A Foreign Agent 383

19.11 The Two-Crossing Problem 384

19.12 Communication With Computers On the Home Network 385

19.13 Summary 386

Chapter 20 Private Network Interconnection (NAT,VPN) 389

20.1 Introduction 389

20.2 Private And Hybrid Networks 389

20.3 A Virtual Private Network (VPN) 390

20.4 VPN Addressing And Routing 392

20.5 A VPN With Private Addresses 393

20.6 Network Address Translation (NAT) 394

20.7 NAT Translation Table Creation 395

20.8 Multi-Address NAT 396

20.9 Port-Mapped NAT 396

20.10 Interaction Between NAT And ICMP 398

20.11 Interaction Between NAT And Applications 398

20.13 Slirp And Masquerade 399

20.12 Conceptual Address Domains 399

20.14 Summary 400

Chapter 21 Client-Server Model Of Interaction 403

21.1 Introduction 403

21.2 The Client-Server Model 403

21.3 A Simple Example: UDP Echo Server 404

21.4 Time And Date Service 406

21.5 The Complexity of Servers 407

21.6 RARP Server 408

21.7 Alternatives To The Client-Server Model 409

21.8 Summary 410

Chapter 22 The Socket Interface 413

22.1 Introduction 413

22.2 The UNIX IIO Paradigm And Network IIO 414

22.3 Adding Network IIO to UNIX 414

22.4 The Socket Abstraction 415

22.5 Creating A Socket 415

22.6 Socket Inheritance And Termination 416

22.7 Specify A Local Address 417

22.8 Connecting Sockets To Destination Addresses 418

22.9 Sending Data Through A Socket 419

22.10 Receiving Data Through A Socket 421

22.14 How A Server Accepts Connections 421

22.11 Obtaining Local And Remote Socket Addresses 422

22.12 Obtaining And Setting Socket Options 423

22.13 Spectfying A Queue Length For A Server 424

22.15 Servers That Handle Multiple Services 425

22.16 Obtaining And Setting Host Names 426

22.18 Socket Library Calls 427

22.17 Obtaining And Setting The Internal Host Domain 427

22.19 Network Byte Order Conversion Routines 428

22.20 IP Address Manipulation Routines 429

22.21 Accessing The Domain Name System 431

22.22 Obtaining Information About Hosts 432

22.23 Obtaining Information About Networks 433

22.24 Obtaining Information About Protocols 434

22.25 Obtaining Information About Network Services 434

22.26 An Example Client 435

22.27 An Example Server 437

22.28 Summary 440

Chapter 23 Bootstrap And Autoconfiguration (BOOTP, DHCP) 443

23.1 Introduction 443

23.2 The Need For An Alternative To RARP 444

23.3 Using IP To Determine An IP Address 444

23.4 The BOOTP Retransmission Policy 445

23.5 The BOOTP Message Format 446

23.6 The Two-Step Bootstrap Procedure 447

23.7 Vendor-Specific Field 448

23.8 The Need For Dynamic Configuration 448

23.9 Dynamic Host Configuration 450

23.10 Dynamic IP Address Assignment 450

23.11 Obtaining Multiple Addresses 451

23.12 Address Acquisition States 452

23.13 Early Lease Termination 452

23.14 Lease Renewal States 454

23.15 DHCP Message Format 455

23.16 DHCP Options And Message Type 456

23.17 Option Overload 457

23.18 DHCP And Domain Names 457

23.19 Summary 458

Chapter 24 The Domain Name System (DNS) 461

24.1 Introduction 461

24.2 Names For Machines 462

24.3 Flat Namespace 462

24.4 Hierarchical Names 463

24.5 Delegation Of Authority For Names 464

24.6 Subset Authority 464

24.7 Internet Domain Names 465

24.8 Official And Unofficial Internet Domain Names 466

24.9 Named Items And Syntax Of Names 468

24.10 Mapping Domain Names To Addresses 469

24.11 Domain Name Resolution 471

24.12 Efficient Translation 472

24.13 Caching The Key To Efficiency 473

24.14 Domain Server Message Format 474

24.15 Compressed Name Format 477

24.16 Abbreviation Of Domain Names 477

24.17 Inverse Mappings 478

24.18 Pointer Queries 479

24.19 Object Types And Resource Record Contents 479

24.20 Obtaining Authority For A Subdomain 480

24.21 Summary 481

25.2 Remote Interactive Computing 485

Chapter 25 Applications: Remote Login (TELNET, Riogin) 485

25.1 Introduction 485

25.3 TELNET Protocol 486

25.4 Accommodating Heterogeneity 488

25.5 Passing Commands That Control The Remote Side 490

25.6 Forcing The Server To Read A Control Function 492

25.7 TELNET Options 492

25.8 TELNET Option Negotiation 493

25.9 Rlogin (BSD UNIX) 494

25.10 Summary 495

Chapter 26 Applications: File Transfer And Access (FTP, TFTP, NFS) 497

26.1 Introduction 497

26.2 File Access And Transfer 497

26.3 On-line Shared Access 498

26.4 Sharing By File Transfer 499

26.5 FTP: The Major TCP/IP File Transfer Protocol 499

26.6 FTP Features 500

26.7 FTP Process Model 500

26.8 TCP Port Number Assignment 502

26.9 The User s View Of FTP 502

26.10 An Example Anonymous FTP Session 504

26.11 TFTP 505

26.12 NFS 507

26.13 NFS Implementation 507

26.14 Remote Procedure Call (RPC) 508

26.15 Summary 509

27.1 Introduction 511

27.2 Electronic Mail 511

Chapter 27 Applications: Electronic Mail (SMTP, POP, IMAP, MIME) 511

27.3 Mailbox Names And Aliases 513

27.4 Alias Expansion And Mail Forwarding 513

27.5 The Relationship Of Internetworking And Mail 514

27.6 TCP/IP Standards For Electronic Mail Service 516

27.7 Electronic Mail Addresses 516

27.9 Simple Mail Transfer Protocol (SMTP) 518

27.8 Pseudo Domain Addresses 518

27.10 Mail Retrieval And Mailbox Manipulation Protocols 521

27.11 The MIME Extension For Non-ASCII Data 522

27.12 MIME Multipart Messages 523

27.13 Summary 524

Chapter 28 Applications: World Wide Web (HTTP) 527

28.1 Introduction 527

28.2 Importance Of The Web 527

28.4 Uniform Resource Locators 528

28.3 Architectural Components 528

28.5 An Example Document 529

28.6 Hypertext Transfer Protocol 530

28.7 HTTP GET Request 530

28.8 Error Messages 531

28.9 Persistent Connections And Lengths 532

28.10 Data Length And Program Output 532

28.11 Length Encoding And Headers 533

28.12 Negotiation 534

28.13 Conditional Requests 535

28.14 Support For Proxy Servers 535

28.15 Caching 536

28.16 Summary 537

Chapter 29 Applications: Voice And Video Over IP (RTP) 539

29.1 Introduction 539

29.2 Audio Clips And Encoding Standards 539

29.3 Audio And Video Transmission And Reproduction 540

29.4 Jitter And Playback Delay 541

29.5 Real-Time Transport Protocol (RTP) 542

29.6 Streams, Mixing, And Multicasting 543

29.7 RTP Encapsulation 544

29.8 RTP Control Protocol (RTCP) 544

29.9 RTCP Operation 545

29.10 IP Telephony And Signaling 546

29.11 Resource Reservation And Quality Of Service 548

29.12 QoS Utilization And Capacity 549

29.13 RSVP 549

29.14 COPS 550

29.15 Summary 551

Chapter 30 Applications: Internet Management (SNMP) 553

30.1 Introduction 553

30.2 The Level Of Management Protocols 553

30.3 Architectural Model 554

30.4 Protocol Framework 556

30.5 Examples of MIB Variables 557

30.6 The Structure Of Management Information 558

30.8 Structure And Representation Of MIB Object Names 559

30.7 Formal Definitions Using ASN.1 559

30.9 Simple Network Management Protocol 564

30.10 SNMP Message Format 566

30.11 Example Encoded SNMP Message 569

30.12 New Features In SNMPv3 572

30.13 Summary 572

Chapter 31 Summary Of Protocol Dependencies 575

31.1 Introduction 575

31.2 Protocol Dependencies 575

31.3 The Hourglass Model 577

31.4 Application Program Access 578

31.5 Summary 579

Chapter 32 Internet Security And Firewall Design (IPsec) 581

32.1 Introduction 581

32.2 Protecting Resources 582

32.3 Information Policy 583

32.4 Internet Security 583

32.6 IPsec Authentication Header 584

32.5 IP Security (IPsec) 584

32.7 Security Association 585

32.8 IPsec Encapsulating Security Payload 586

32.9 Authentication And Mutable Header Fields 587

32.10 IPsec Tunneling 588

32.11 Required Security Algorithms 588

32.12 Secure Sockets 589

32.13 Firewalls And Internet Access 589

32.14 Multiple Connections And Weakest Links 589

32.15 Firewall Implementation 590

32.16 Packet-Level Filters 590

32.17 Security And Packet Filter Specification 591

32.18 The Consequence Of Restricted Access For Clients 592

32.19 Proxy Access Through A Firewall 592

32.20 The Details Of Firewall Architeetare 593

32.21 Stub Network 594

32.22 An Alternative Firewall Implementation 595

32.24 Summary 596

32.23 Monitoring And Logging 596

Chapter 33 The Future Of TCP/IP (IPv6) 599

33.1 Introduction 599

33.2 Why Change? 600

33.3 New Policies 600

33.4 Motivation For Changing IPv4 600

33.5 The Road To A New Version Of IP 601

33.7 Features Of IPv6 602

33.6 The Name Of The Next IP 602

33.8 General Form Of An IPv6 Datagram 603

33.9 IPv6 Base Header Format 603

33.10 IPv6 Extension Headers 605

33.11 Parsing An IPv6 Datagram 606

33.12 IPv6 Fragmentation And Reassembly 607

33.13 The Consequence Of End-To-End Fragmentation 607

33.14 IPv6 Source Routing 608

33.15 IPv6 Options 609

33.17 IPv6 Colon Hexadecimal Notation 610

33.16 Size Of The IPv6 Address Space 610

33.18 Three Basic IPv6 Address Types 612

33.19 The Duality Of Broadcast And Multicast 612

33.20 An Engineering Choice And Simulated Broadcast 613

33.21 Proposed IPv6 Address Space Assignment 613

33.22 Embedded IPv4 Addresses And Transition 614

33.23 Unspecified And Loopback Addresses 616

33.24 Unicast Address Hierarchy 616

33.25 Aggregatable Global Unicast Address Structure 617

33.26 Interface Identifiers 618

33.27 Additional Hierarchy 619

33.28 Local Addresses 619

33.29 Autoconfiguration And Renumbering 620

33.30 Summary 620

Appendix 1 A Guide to RFCs 623

Appendix 2 Glossary Of Internetworking Terms And Abbreviations 673

Bibliography 721

Index 729

返回顶部