Contents Menu Expand Light mode Dark mode Auto light/dark mode
Computer Networks: A Systems Approach Version 6.2-dev documentation
Computer Networks: A Systems Approach Version 6.2-dev documentation

Table of Contents

  • Foreword
  • Foreword to the First Edition
  • Preface
  • Chapter 1: Foundation
    • Problem: Building a Network
    • 1.1 Applications
    • 1.2 Requirements
    • 1.3 Architecture
    • 1.4 Software
    • 1.5 Performance
    • Perspective: Feature Velocity
  • Chapter 2: Direct Links
    • Problem: Connecting to a Network
    • 2.1 Technology Landscape
    • 2.2 Encoding
    • 2.3 Framing
    • 2.4 Error Detection
    • 2.5 Reliable Transmission
    • 2.6 Multi-Access Networks
    • 2.7 Wireless Networks
    • 2.8 Access Networks
    • Perspective: Race to the Edge
  • Chapter 3: Internetworking
    • Problem: Not All Networks are Directly Connected
    • 3.1 Switching Basics
    • 3.2 Switched Ethernet
    • 3.3 Internet (IP)
    • 3.4 Routing
    • 3.5 Implementation
    • Perspective: Virtual Networks All the Way Down
  • Chapter 4: Advanced Internetworking
    • Problem: Scaling to Billions
    • 4.1 Global Internet
    • 4.2 IP Version 6
    • 4.3 Multicast
    • 4.4 Multiprotocol Label Switching
    • 4.5 Routing Among Mobile Devices
    • Perspective: The Cloud is Eating the Internet
  • Chapter 5: End-to-End Protocols
    • Problem: Getting Processes to Communicate
    • 5.1 Simple Demultiplexor (UDP)
    • 5.2 Reliable Byte Stream (TCP)
    • 5.3 Remote Procedure Call
    • 5.4 Transport for Real-Time (RTP)
    • Perspective: HTTP is the New Narrow Waist
  • Chapter 6: Congestion Control
    • Problem: Allocating Resources
    • 6.1 Issues in Resource Allocation
    • 6.2 Queuing Disciplines
    • 6.3 TCP Congestion Control
    • 6.4 Advanced Congestion Control
    • 6.5 Quality of Service
    • Perspective: Software-Defined Traffic Engineering
  • Chapter 7: End-to-End Data
    • Problem: What Do We Do with the Data?
    • 7.1 Presentation Formatting
    • 7.2 Multimedia Data
    • Perspective: Big Data and Analytics
  • Chapter 8: Network Security
    • Problem: Security Attacks
    • 8.1 Trust and Threats
    • 8.2 Cryptographic Building Blocks
    • 8.3 Key Predistribution
    • 8.4 Authentication Protocols
    • 8.5 Example Systems
    • Perspective: Is Security Getting Worse or Better?
  • Chapter 9: Applications
    • Problem: Applications Need Their Own Protocols
    • 9.1 Traditional Applications
    • 9.2 Multimedia Applications
    • 9.3 Infrastructure Applications
    • 9.4 Overlay Networks
    • Perspective: The Cloud is the New Internet
  • About This Book
  • Read the Latest!
  • Print Copies
Back to top

Chapter 2: Direct Links#

It is a mistake to look too far ahead. Only one link in the chain of destiny can be handled at a time.

—Winston Churchill

  • Problem: Connecting to a Network
  • 2.1 Technology Landscape
  • 2.2 Encoding
  • 2.3 Framing
    • 2.3.1 Byte-Oriented Protocols (PPP)
    • 2.3.2 Bit-Oriented Protocols (HDLC)
    • 2.3.3 Clock-Based Framing (SONET)
  • 2.4 Error Detection
    • 2.4.1 Internet Checksum Algorithm
    • 2.4.2 Cyclic Redundancy Check
  • 2.5 Reliable Transmission
    • 2.5.1 Stop-and-Wait
    • 2.5.2 Sliding Window
    • 2.5.3 Concurrent Logical Channels
  • 2.6 Multi-Access Networks
    • 2.6.1 Physical Properties
    • 2.6.2 Access Protocol
    • 2.6.3 Longevity of Ethernet
  • 2.7 Wireless Networks
    • 2.7.1 Basic Issues
    • 2.7.2 Wi-Fi (802.11)
    • 2.7.3 Bluetooth (802.15.1)
  • 2.8 Access Networks
    • 2.8.1 Passive Optical Network
    • 2.8.2 Cellular Network
  • Perspective: Race to the Edge
Next
Problem: Connecting to a Network
Previous
Perspective: Feature Velocity
Copyright © 2024
Made with Sphinx and @pradyunsg's Furo