1.1 Growth Of Computer Networking, 1
Chapter Contents 1
Chapter 1 Introduction 1
1.1 Growth Of Computer Networking 1
1.2 Complexity In Network Systems, 2
1.3 Mastering The Complexity, 2
1.2 Complexity In Network Systems 2
1.3 Mastering The Complexity 2
1.4 Concepts And Terminology, 3
1.5 Organization Of The Text, 3
1.4 Concepts And Terminology 3
1.5 Organization Of The Text 3
1.6 Summary, 4
1.6 Summary 4
Chapter 2 Motivation And Tools 7
2.1 Introduction 7
2.2 Resource Sharing 7
2.3 Growth Of The Internet 8
2.4 Probing The Internet 11
2.5 Interpreting A Ping Response 12
2.6 Tracing A Route 14
2.7 Summary 15
Chapter 3 Network Programming And Applications 17
3.1 Introduction 17
3.2 Network Communication 18
3.3 Client-Server Computing 18
3.4 Communication Paradigm 19
3.5 An Example Application Program Interface 19
3.7 Definition Of The ApI 20
3.6 An Intuitive Look At The API 20
3.8 Code For An Echo Application 23
Preface 27
Contents 27
3.9 Code ForA Chat Application 29
3.10 Code For A Web Application 33
3.11 Summary 41
4.2 Copper Wires 45
4.1 Introduction 45
PART Ⅰ Data Transmission 45
Chapter 4 Transmission Media 45
4.3 Glass Fibers 47
4.4 Radio 48
4.5 Satellites 48
4.6 Geosynchronous Satellites 49
4.7 Low Earth Orbit Satellites 50
4.8 Low Earth Orbit Satellite Arrays 50
4.10 Infrared 51
4.9 Microwave 51
4.11 Light From A Laser 52
4.12 Summary 52
Chapter 5 Local Asynchronous Communication(RS-232) 55
5.1 Introduction 55
5.2 The Need For Asynchronous Communication 56
5.3 Using Electric Current To Send Bits 56
5.4 Standards For Communication 57
5.5 Baud Rate,Framing,And Errors 59
5.6 Full Duplex Asynchronous Communication 60
5.7 Limitations Of Real Hardware 61
5.8 Hardware Bandwidth And The Transmission Of Bits 62
5.9 The Effect OfNoise On Communication 62
5.10 Significance For Data Networking 63
5.11 Summary 64
6.1 Introduction 67
6.2 Sending Signals Across Long Distances 67
Modems) 67
Chapter 6 Long-Distance Communication(Carriers,Modulation,And 67
6.3 Modem Hardware Used For Modulation And Demodulation 70
6.4 Leased Analog Data Circuits 71
6.5 Optical,Radio Frequency,And Dialup Modems 72
6.6 Carrier Frequencies And Multiplexing 73
6.7 Baseband And Broadband Technologies 75
6.8 Wave Division Multiplexing 75
6.9 Spread Spectrum 76
6.10 Time Division Multiplexing 76
6.11 Summary 77
PART Ⅱ Packet Transmission 81
Chapter 7 Packets,Frames,And Error Detection 81
7.1 Introduction 81
7.2 The Concept Of Packets 81
7.3 Packets And Time-Division Multiplexing 83
7.4 Packets And Hardware Frames 84
7.5 Byte Stuffing 85
7.7 Parity Bits And parity Checking 87
7.6 Transmission Errors 87
7.8 Probability,Mathematics,And Error Detection 88
7.9 Detecting Errors With Checksums 89
7.10 Detecting Errors With Cyclic Redundancy Checks 90
7.11 Combining Building Blocks 92
7.12 Burst Errors 93
7.13 Frame Format And Error Detection Mechanisms 93
7.14 Summary 94
Chapter 8 LAN Technologies And Network Topology 99
8.1 Introduction 99
8.2 Direct Point-to-Point Communication 100
8.3 Shared Communication Channels 102
8.4 Significance Of LANs And Locality Of Reference 102
8.5 LAN Topologies 103
8.6 Example Bus Network:Ethernet 106
8.7 Carrier Sense On Multi-Access Networks(CSMA) 108
8.8 Collision Detection And Backoff With CSMA/CD 108
8.9 802.11 Wireless LANs And CSMA/CA 110
8.10 Another Example Bus Network:LocalTalk 111
8.11 Example Ring Network:IBM Token Ring 112
8.12 Another Example Ring Network:FDDI 114
8.13 Example Star Network:ATM 115
8.14 Summary 117
Chapter 9 Hardware Addressing And Frame Type Identification 121
9.1 Introduction 121
9.2 Specifying A Recipient 122
9.3 How LAN Hardware Uses Addresses To Filter Packets 122
9.4 Format Of A Physical Address 124
9.5 Broadcasting 125
9.6 Multicasting 126
9.7 Multicast Addressing 127
9.8 Identifying Packet Contents 128
9.9 Frame Headers And Frame Format 128
910 An Example Frame Format 129
9.11 Using Networks That Do Not Have Self-Identifying Frames 131
9.12 Network Analyzers,Physical Addresses,Frame Types 133
9.13 Summary 134
9.14 Ethernet Address Assignment 136
10.2 Speeds Of LANs And Computers 139
10.1 Introduction 139
Chapter 10 LAN Wiring,Physical Topology,And Interface Hardware 139
10.3 Network Interface Hardware 140
10.4 The Connection Between A NIC And A Network 142
10.5 Original Thick Ethernet Wiring 142
10.6 Connection Multiplexing 144
10.7 Thin Ethernet Wiring 145
10.8 Twisted Pair Ethernet 146
10.9 Advantages And Disadvantages Of Wiring Schemes 148
10.11 Network Interface Cards And Wiring Schemes 150
10.10 The Topology Paradox 150
10.12 Wiring Schemes And Other Network Technologies 152
10.13 Summary 153
Chapter 11 Extending LANs:Fiber Modems,Repeaters,Bridges,and 155
Switches 155
11.1 Introduction 155
11.2 Distance Limitation And LAN Design 155
11.3 Fiber Optic Extensions 156
11.4 Repeaters 157
11.5 Bridges 160
11.6 Frame Filtering 161
11.7 Startup And Steady State Behavior Of Bridged Networks 162
11.8 Planning A Bridged Network 162
11.9 Bridging Between Buildings 163
11.10 Bridging Across Longer Distances 164
11.11 A Cycle Of Bridges 166
11.12 Distributed Spanning Tree 167
11.13 Switching 168
11.15 Bridging And Switching With Other Technologies 169
11.14 Combining Switches And Hubs 169
11.16 Summary 170
Chapter 12 Long-Distance Digital Connection Technologies 173
12.1 Introduction 173
12.2 Digital Telephony 173
12.3 Synchronous Communication 175
12.4 Digital Circuits And DSU/CSUs 176
12.5 Telephone Standards 177
12.6 DS Terminology And Data Rates 178
12.7 Lower Capacity Circuits 179
12.8 Intermediate Capacity Digital Circuits 179
12.9 Highest Capacity Circuits 180
12.10 Optical Carner Standards 181
12.11 The C Suffix 181
12.12 Synchronous Optical NETwork(SONET) 181
12.13 The Local Subscriber Loop 183
12.14 ISDN 183
12.15 Asymmetric Digital Subscriber Line Technology 184
12.16 Other DSL Technologies 187
12.17 Cable Modem Technology 188
12.18 Upstream Communication 189
12.19 Hybrid Fiber Coax 190
12.20 Fiber To The Curb 191
12.21 Alternatives For Special Cases 191
12.22 Broadcast Satellite Systems 192
12.23 Summary 193
13.2 Large Networks And Wide Areas 197
13.1 Introduction 197
Chapter 13 WAN Technologies And Routing 197
13.3 Packet Switches 198
13.4 Forming A WAN 199
13.5 Store And Forward 200
13.6 Physical Addressing In A WAN 201
13.7 Next-Hop Forwarding 201
13.8 Source Independence 203
13.9 Relationship Of Hierarchical Addresses To Routing 203
13.10 Routing In A wAN 204
13.11 Use Of Default Routes 206
13.13 Shortest Path Computation In A Graph 207
13.12 Routing Table Computation 207
13.14 Distributed Route Computation 209
13.15 Distance Vector Routing 209
13.16 Link-State Routing(SPF) 212
13.17 Example WAN Technologies 212
13.18 Summary 214
14.1 Introduction 217
14.2 A Single,Global Network 217
Chapter 14 Connection-Oriented Networking And ATM 217
14.3 ISDN And ATM 218
14.4 ATM Design And Cells 218
14.5 Connection-Oriented Service 220
14.6 VPI/VCI 220
14.7 Labels And Label Switching 221
14.8 An Example Trip Through An ATM Network 222
14.9 Permanent Virtual Circuits 223
14.10 Switched Virtual Circuits 224
14.12 The Motivation For Cells And Label Switching 225
14.11 Quality Of Service 225
14.13 ATM Data Transmission And AAL5 226
14.14 Critique of ATM 227
14.15 Summary 228
Chapter 15 Network Characteristics:Ownership,Service Paradigm, 231
And Performance 231
15.1 Introduction 231
15.2 Network Ownership 232
15.4 Advantages And Disadvantages 233
15.3 Privacy And Public Networks 233
15.5 Virtual Private Networks 234
15.6 Guaranteeing Absolute Privacy 235
15.7 Service Paradigm 235
15.8 Connection-Oriented Service Paradigm 236
15.9 Connectionless Service Paradigm 237
15.10 Interior And Exterior Service Paradigms 237
15.11 Comparison Of Service Paradigms 238
15.12 Examples Of Service Paradigms 238
15.13 Addresses And Connection Identifiers 239
15.14 Network Performance Characteristics 240
15.15 Jitter 244
15.16 Summary 244
Chapter 16 Protocols And Layering 247
16.1 Introduction 247
16.2 TheNeed ForProtocols 247
16.3 Protocol Suites 248
16.5 The Seven Layers 249
16.4 A Plan For Protocol Design 249
16.6 Stacks:Layered Software 251
16.7 How Layered Software Works 253
16.8 Multiple,Nested Headers 254
16.9 The Scientific Basis For Layering 254
16.10 Techniques Protocols Use 255
16.11 The Art Of Protocol Design 264
16.12 Summary 264
17.2 The Motivation For Internetworking 269
17.1 Introduction 269
Chapter 17 Internetworking:Concepts,Architecture,and Protocols 269
PART Ⅲ Internetworking 269
17.3 The Concept Of Universal Service 270
17.4 Universal Service In A Heterogeneous World 270
17.5 Internetworking 271
17.6 Physical Network Connection With Routers 271
17.7 Internet Architecture 272
17.8 Achieving Universal Service 273
17.9 A Virtual Network 273
17.11 Significance Of Internetworking And TCP/IP 275
17.10 Protocols For Internetworking 275
17.12 Layering And TCp/IP Protocols 276
17.13 Host Computers,Routers,And Protocol Layers 277
17.14 Summary 278
Chapter 18 IP:Internet ProtocoI Addresees 281
18.1 Introduction 281
18.2 Addresses For The Virtual Internet 281
18.3 The IP Addressing Scheme 282
18.5 Original Classes Of IP Addresses 283
18.4 The IP Address Hierarchy 283
18.6 Computing The Class of An Address 285
18.7 Dotted Decimal Notation 286
18.8 Classes And Dotted Decimal Notation 287
18.9 Division Of The Address Space 287
18.10 Authority For Addresses 288
18.11 A Classful Addressing Example 288
18.12 Subnet And Classless Addressing 289
18.13 Address Masks 290
18.14 CIDR Notation 291
18.15 A CIDR Address Block Example 291
18.16 CIDR Host Addresses 292
18.17 Special IP Addresses 293
18.18 Summary of Special IP Addresses 294
18.19 The Berkeley Broadcast Address Form 295
18.20 Routers And The IP Addressing Principle 295
18.21 Multi-Homed Hosts 297
18.22 Summary 297
19.1 Introduction 301
Chapter 19 Binding Protocol Addresses(ARP) 301
19.2 Protocol Addresses And Packet Delivery 302
19.3 Address Resolution 302
19.4 Address Resolution Techniques 303
19.5 Address Resolution With Table Lookup 304
19.6 Address Resolution With Closed-Form Computation 305
19.7 Address Resolution With Message Exchange 306
19.8 Address Resolution Protocol 307
19.9 ARP Message Delivery 308
19.10 ARP Message Format 309
19.11 Sending An ARP Message 310
19.12 Identifying ARP Frames 311
19.13 Caching ARP Responses 311
19.14 Processing An Incoming ARP Message 312
19.15 Layering,Address Resolution,Protocol Addresses 313
19.16 Summary 314
Chapter 20 IP Datagrams And Datagram Forwarding 317
20.1 Introduction 317
20.2 Connectionless Service 317
20.3 Virtual Packets 318
20.4 The IP Datagram 319
20.5 Forwarding An IP Datagram 320
20.6 IP Addresses And Routing Table Entries 321
20.7 The Mask Field And Datagram Forwarding 322
20.8 Destination And Next-Hop Addresses 322
20.9 Best-Effort Delivery 323
20.10 The IP Datagram Header Format 324
20.11 Summary 325
21.1 Introduction 329
21.2 Datagram Transmission And Frames 329
Chapter 21 IP Encapsulation,Fragmentation,And Reassembly 329
21.3 Encapsulation 330
21.4 Transmission Across An Internet 331
21.5 MTU,Datagram Size,And Encapsulation 332
21.6 Reassembly 334
21.7 Identifying A Datagram 334
21.8 Fragment Loss 335
21.9 Fragmenting A Fragment 335
21.10 Summary 336
22.2 The Success Of IP 339
Chapter 22 The Future IP(IPv6) 339
22.1 Introduction 339
22.3 The Motivation For Change 340
22.4 A Name And A Version Number 341
22.5 IPv6 Features 341
22.6 IPv6 Datagram Format 342
22.7 IPv6 Base Header Format 342
22.8 How IPv6 Handles Multiple Headers 344
22.9 Fragmentation,Reassembly,And Path MTU 345
22.10 The Purpose Of Multiple Headers 346
22.11 IPv6 Addressing 347
22.12 IPv6 Colon Hexadecimal Notation 348
22.13 Summary 349
Chapter 23 An Error Reporting Mechanism(ICMP) 351
23.1 Introduction 351
23.2 Best-Effort Semantics And Error Detection 351
23.3 Internet Control Message Protocol 352
23.4 ICMP Message Transport 355
23.6 Using ICMP To Trace A Route 356
23.5 Using ICMP Messages To Test Reachability 356
23.7 The Last Address Printed By Traceroute 357
23.8 Using ICMP For Path MTU Discovery 358
23.9 Summary 359
Chapter 24 TCP:Reliable Transport Service 361
24.1 Introduction 361
24.2 The Need For Reliable Transport 361
24.3 The Transmission Control Protocol 362
24.4 The Service TCP Provides To Applications 362
24.5 End-To-End Service And Datagrams 363
24.6 Achieving Reliability 364
24.7 Packet Loss And Retransmission 365
24.8 Adaptive Retransmission 366
24.9 Comparison Of Retransmission Times 367
24.10 Buffers,Flow Control,And Windows 367
24.11 Three-Way Handshake 369
24.12 Congestion Control 370
24.13 TCP Segment Format 370
24.14 Summary 371
25.1 Introduction 375
25.2 Static Vs.Dynamic Routing 375
Chapter 25 Internet Routing 375
25.3 Static Routing In Hosts And A Default Route 376
25.4 Dynamic Routing And Routers 377
25.5 Routing In The Global Internet 378
25.6 Autonomous System Concept 379
25.7 The Two Types Of Internet Routing Protocols 380
25.9 The Border Gateway Protocol(BGP) 382
25.8 Routes And Data Traffic 382
25.10 The Routing Information Protocol (RIP) 384
25.11 RIP Packet Format 385
25.12 The Open Shortest Path First Protocol(OSPF) 386
25.13 An Example OSPF Graph 387
25.14 OSPF Areas 388
25.15 Multicast Routing 388
25.16 Summary 392
26.1 Introduction 397
Chapter 26 Client-Server Interaction 397
PART Ⅳ Network Applications 397
26.2 The Functionality Application Software Provides 398
26.3 The Functionality An Internet Provides 398
26.4 Making Contact 399
26.5 The Client-Server Paradigm 399
26.6 Characteristics Of Clients And Servers 400
26.7 Server Programs And Server-Class Computers 400
26.9 Transport Protocols and Client-Server Interaction 401
26.8 Requests,Responses,And Direction Of Data Flow 401
26.10 Multiple Services On One Computer 402
26.11 Identifying A Particular Service 403
26.12 Multiple Copies Of A Server For A Single Service 403
26.13 Dynamic Server Creation 404
26.14 Transport Protocols And Unambiguous Communication 404
26.15 Connection-Oriented And Connectionless Transport 405
26.16 A Service Reachable Through Multiple Protocols 406
26.17 Complex Client-Server Interactions 406
26.19 Summary 407
26.18 Interactions And Circular Dependencies 407
Chapter 27 The Socket Interface 411
27.1 Introduction 411
27.2 Application Program Interface 411
27.3 The Socket ApI 412
27.4 Sockets And Socket Libraries 412
27.5 Socket Communication And UNIX I/O 413
27.6 Sockets,Descriptors,And Network I/O 414
27.7 Parameters And The Socket API 414
27.8 Procedures That Implement The Socket API 415
27.9 Read And Write With Sockets 421
27.10 Other Socket Procedures 421
27.11 Sockets,Threads,And Inheritance 422
27.12 Summary 422
Chapter 28 Example Of A Client And A Server 425
28.1 Introduction 425
28.2 Connection-Oriented Communication 425
28.4 Command-Line Arguments For The Example Programs 426
28.5 Sequence Of Socket Procedure Calls 426
28.3 An Example Service 426
28.6 Code For Example Client 428
28.7 Code For Example Server 431
28.8 Stream Service And Muhiple Recv Calls 433
28.9 Socket procedures And Blocking 434
28.10 Size Of The Code And Error Reporting 434
28.11 Using The Example Client With Another Service 435
28.12 Using Another Client To Test The Server 435
28.13 Summary 436
Chapter 29 Naming With The Domain Name System 439
29.1 Introduction 439
29.2 Structure Of Computer Names 440
29.3 Geographic Structure 442
29.4 Domain Names Within An Organization 442
29.5 The DNS Client-Server Model 444
29.6 The DNS Server Hierarchy 444
29.7 Server Architectures 445
29.10 Resolving A Name 447
29.9 Links Among Servers 447
29.8 Locality Of Reference And Multiple Servers 447
29.11 Optimization Of DNS Performance 449
29.12 Types Of DNS Entries 450
29.13 Aliases Using The CNAME Type 450
29.14 An Important Consequence Of Multiple Types 451
29.15 Abbreviations And The DNS 451
29.16 Summary 452
30.1 Introduction 455
30.2 The Electronic Mail Paradigm 455
Chapter 30 Electronic Mail Representation And Transfer 455
30.3 Electronic Mailboxes And Addresses 456
30.4 Electronic Mail Message Format 457
30.5 Carbon Copies 459
30.6 Multipurpose Internet Mail Extensions 459
30.7 E-mail And Application Programs 461
30.8 Mail Transfer 461
30.9 The Simple Mail Transfer Protocol 462
30.10 Optimizing For Multiple Recipients On A Computer 462
30.11 Mail Exploders,Lists,And Forwarders 462
30.12 Mail Gateways 463
30.13 Automated Mailing Lists 464
30.14 Mail Relays And E-mail Addresses 465
30.15 Mailbox Access 466
30.16 Dialup Connections And POP 468
30.17 Summary 468
Chapter 31 File Transfer And Remote File Access 471
31.1 Introduction 471
31.2 Data Transfer And Distributed Computation 471
31.4 Generalized File Transfer 472
31.3 Saving Intermediate Results 472
31.5 Interactive And Batch Transfer Paradigms 473
31.6 The File Transfer Protocol 474
31.7 FTP General Model And User Interface 474
31.8 FTP Commands 475
31.9 Connections,Authorization,And File Permissions 476
31.10 Anonymous File Access 477
31.11 File Transfer In Either Direction 477
31.14 Changing Directories And Listing Contents 478
31.13 File Name Translation 478
31.12 Wildcard Expansion In File Names 478
31.15 File Types And Transfer Modes 479
31.16 Example Of Using FTP 480
31.17 Verbose Output 482
31.18 Client-Server Interaction In FTP 482
31.19 Control And Data Connections 483
31.20 Data Connections And End Of File 484
31.21 Trivial File Transfer Protocol 484
31.22 Network File System 485
31.23 Summary 486
Chapter 32 World Wide Web Pages And Browsing 489
32.1 Introduction 489
32.2 Browser Interface 489
32.3 Hypertext And Hypermedia 490
32.4 Document Representation 490
32.5 HTML Format And Representation 491
32.6 Example HTML Formatting Tags 493
32.7 Headings 493
32.9 Embedding Graphics Images In A Web Page 494
32.8 Lists 494
32.10 Identifying A Page 495
32.11 Hypertext Links From One Document To Another 496
32.12 Client-Server Interaction 497
32.13 Web Document Transfer And HTTP 498
32.14 Browser Architecture 499
32.15 Optional Clients 500
32.16 Caching In Web Browsers 501
32.17 HTTP Support For Caching 502
32.19 Other Markup Languages 503
32.18 Alternative Transfer Protocols 503
32.20 Summary 504
Chapter 33 Dynamic Web Document Technologies(CGI,ASP,JSP, 509
PHP,ColdFusion) 509
33.1 Introduction 509
33.2 Three Basic Types of Web Documents 510
33.3 Advantages And Disadvantages Of Each Document Type 510
33.4 Implementation Of Dynamic Documents 512
33.6 Output From A CGI Program 513
33.5 The CGI Standard 513
33.7 An Example CGI Program 514
33.8 Parameters And Environment Variables 516
33.9 State Information And Cookies 517
33.10 A CGI Script With Long-Term State Information 517
33.11 A CGl Script With Short-Term State Information 519
33.12 Forms And Interaction 522
33.13 Server-Side Scripting Technologies 523
33.14 Summary 524
34.1 Introduction 527
Chapter 34 Technology For Active Web Documents(Java, 527
JavaScript) 527
34.2 An Early Form Of Continuous Update 528
34.3 Active Documents And Server Overhead 529
34.4 Active Document Representation And Translation 529
34.5 Java Technology 531
34.6 The Java Programming Language 531
34.7 The Java Run-Time Environment 533
34.8 The Java Library 534
34.9 A Graphics Toolkit 535
34.10 Using Java Graphics On A Particular Computer 536
34.11 Java Interpreters And Browsers 537
34.12 Compiling A Java Program 537
34.13 An Example Applet 538
34.14 Invoking An Applet 540
34.15 Example Of Interaction With A Browser 541
34.17 JavaScript Technology 543
34.16 Errors And Exception Handling 543
34.18 Alternatives 545
34.19 Summary 546
Chapter 35 RPC and Middleware 549
35.1 Introduction 549
35.2 Programming Clients And Servers 549
35.3 Remote Procedure Call Paradigm 550
35.4 RPC Paradigm 552
35.5 Communication Stubs 554
35.6 External Data Representation 555
35.7 Middleware And Object-Oriented Middleware 556
35.8 Summary 558
Chapter 36 Network Management(SNMP) 561
36.1 Introduction 561
36.2 Managing An Internet 561
36.3 The Danger Of Hidden Failures 562
36.4 Network Management Software 563
36.5 Clients,Servers,Managers,And Agents 563
36.7 Fetch-Store Paradigm 564
36.6 Simple Network Management Protocol 564
36.8 The MIB And Object Names 565
36.9 The Variety Of MIB Variables 566
36.10 MIB Variables That Correspond To Arrays 566
36.11 Summary 567
Chapter 37 Network Security 569
37.1 Introduction 569
37.2 Secure Networks And Policies 569
37.3 Aspects Of Security 570
37.5 Integrity Mechanisms 571
37.4 Responsibility And Control 571
37.6 Access Control And Passwords 572
37.7 Encryption And Confidentiality 572
37.8 Public Key Encryption 573
37.9 Authentication With Digital Signatures 573
37.10 Internet Firewall Concept 574
37.11 Packet Filtering 576
37.12 Using Packet Filters To Create A Firewall 577
37.13 Virtual Private Networks 578
37.14 Tunneling 579
37.15 Summary 580
Chapter 38 Initialization(Configuration) 583
38.1 Introduction 583
38.2 Bootstrapping 583
38.3 Starting Protocol Software 584
38.4 Protocol Parameters 584
38.5 Protocol Configuration 585
38.6 Examples Of Items That Need To Be Configured 585
38.7 Example Configuration:Using A Disk File 586
38.8 The Need To Automate Protocol Configuration 587
38.9 Methods For Automated Protocol Configuration 587
38.10 The Address Used To Find An Address 588
38.11 A Sequence Of Protocols Used During Bootstrap 589
38.12 Bootstrap Protocol(BOOTP) 589
38.13 Automatic Address Assignment 591
38.14 Dynamic Host Configuration Protocol(DHCP) 592
38.15 Optimizations In DHCP 593
38.16 DHCP Message Format 593
38.17 DHCP And Domain Names 594
38.18 Summary 595
Appendix 1 Glossary Of Networking Terms And Abbreviations 597
Appendix 2 The ASCII Character Set 637
Appendix 3 Address Masks In Dotted Decimal 639
Appendix 4 How To Use The CD-ROM Included With This Book 641
Appendix 5 Building A Network At Home With NAT 647
Appendix 6 The Undergrad Networking Lab At Purdue 653
Bibliography 659
Index 667