1 option
The Real Internet Architecture : Past, Present, and Future Evolution.
- Format:
- Book
- Author/Creator:
- Zave, Pamela.
- Language:
- English
- Subjects (All):
- Internet.
- Physical Description:
- 1 online resource (257 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Princeton : Princeton University Press, 2024.
- Summary:
- "A new way to understand the architecture of today's Internet, based on an innovative general model of network architecture that is rigorous, realistic, and modularThis book meets the long-standing need for an explanation of how the Internet's architecture has evolved since its creation to support an ever-broader range of the world's communication needs. The authors introduce a new model of network architecture that exploits a powerful form of modularity to provide lucid, insightful descriptions of complex structures, functions, and behaviors in today's Internet. Countering the idea that the Internet's architecture is "ossified" or rigid, this model-which is presented through hundreds of examples rather than mathematical notation-encompasses the Internet's original or "classic" architecture, its current architecture, and its possible future architectures.For practitioners, the book offers a precise and realistic approach to comparing design alternatives and guiding the ongoing evolution of their applications, technologies, and security practices. For educators and students, the book presents patterns that recur in many variations and in many places in the Internet ecosystem. Each pattern tells a compelling story, with a common problem to be solved and a range of solutions for solving it. For researchers, the book suggests many directions for future research that exploit modularity to simplify, optimize, and verify network implementations without loss of functionality or flexibility"-- Provided by publisher.
- Contents:
- Cover
- Contents
- Preface
- 1. Introduction
- 1.1 What and for whom
- 1.2 A brief conventional history of the Internet
- 1.2.1 Fundamental concepts
- 1.2.2 The classic Internet architecture
- 1.2.3 Success and ossification
- 1.2.4 Teaching about networking
- 1.2.5 Networking research
- 1.3 An alternative view of the Internet
- 1.3.1 Past evolution
- 1.3.2 The current Internet
- 1.3.2.1 End-to-end communication
- 1.3.2.2 Assembling networks with bridging
- 1.3.2.3 More security
- 1.3.2.4 Assembling networks with layering
- 1.3.2.5 More layering
- 1.3.2.6 Assembling networks with subduction
- 1.3.2.7 Summary of the example
- 1.3.3 Future evolution
- 1.4 Purposes and a new approach
- 1.5 A new model of network architecture
- 1.5.1 Fundamental concepts
- 1.5.2 Brief comparison to the classic Internet architecture
- 1.5.3 Characteristics of the model
- 1.5.3.1 More on accuracy and precision
- 1.5.3.2 On terminology
- 1.5.3.3 Modularity, repetition, and patterns
- 1.5.3.4 More on generality and formality
- 1.6 Organization of the book
- 1.7 Bon voyage
- 2. Describing Networks and Services
- 2.1 Introduction
- 2.2 Basic concepts
- 2.2.1 Network services
- 2.2.2 Components of a network
- 2.2.2.1 Members
- 2.2.2.2 Names
- 2.2.2.3 Links
- 2.2.2.4 Network topology
- 2.2.2.5 Network views
- 2.2.3 Authority and management
- 2.2.4 Routing and forwarding
- 2.2.4.1 Routing
- 2.2.4.2 Forwarding
- 2.2.4.3 Implementing anycast, broadcast, and multicast
- 2.2.5 Sessions and session protocols
- 2.2.5.1 Session basics
- 2.2.5.2 Session endpoints and session state
- 2.2.5.3 Session services
- 2.2.5.4 Header formats and protocol embedding
- 2.3 Example: Ethernets
- 2.3.1 Physical links
- 2.3.2 Ethernet members and names
- 2.3.3 Ethernet routing and forwarding
- 2.3.4 Ethernet services.
- 2.4 Example: Internet Protocol networks
- 2.4.1 Hierarchical namespace
- 2.4.2 IP members and links
- 2.4.3 IP forwarding
- 2.4.4 IP routing
- 2.4.5 IP session protocols
- 2.4.6 IP services
- 2.5 Other network designs
- 2.5.1 Mobile ad-hoc networks
- 2.5.2 Named Data Networks
- 2.5.3 Resilient Overlay Networks
- 2.5.4 Multi-Protocol Label Switching networks
- 2.6 Properties of networks and services
- 2.6.1 Topological properties
- 2.6.2 Performance properties
- 2.6.2.1 Requirements and goals
- 2.6.2.2 Facts and assumptions
- 2.6.3 Logical properties
- 2.6.3.1 Requirements
- 2.6.3.2 Facts and assumptions
- 2.7 Conclusion
- 3. Composing Networks and Services
- 3.1 Introduction
- 3.2 Bridging
- 3.2.1 Definition of bridging
- 3.2.2 Example: Bridging networks in the Internet
- 3.2.2.1 The physical hierarchy
- 3.2.2.2 The business hierarchy
- 3.2.2.3 Routing among bridged networks of the Internet
- 3.2.3 Compound sessions
- 3.2.4 Example: Bridging private networks with the public Internet
- 3.2.4.1 The problem of private IP networks
- 3.2.4.2 A solution to the problem of private IP networks
- 3.2.5 Example: Interoperation of heterogeneous networks
- 3.3 Layering
- 3.3.1 Definition of layering
- 3.3.2 Details of layering
- 3.3.3 Example: Implementation of IP links between forwarders
- 3.3.4 Example: Ethernets as IP underlays
- 3.3.4.1 The IP edge network
- 3.3.4.2 Implementing IP links
- 3.3.4.3 IP-over-Ethernet control protocols
- 3.3.5 Example: Layering the World-Wide Web on the Internet
- 3.3.5.1 Members and names in the Web
- 3.3.5.2 Sessions in the Web
- 3.3.5.3 Links in the Web
- 3.3.5.4 The Domain Name System
- 3.3.5.5 Solutions to the problem of load balancing
- 3.4 Other examples of layering
- 3.4.1 Resilient Overlay Networks
- 3.4.2 Tor
- 3.4.3 Virtual local area networks.
- 3.4.4 Layered Multi-Protocol Label Switching networks
- 3.4.5 Cloud computing
- 3.4.5.1 Tenant networks
- 3.4.5.2 Data-center networks
- 3.4.5.3 Layering tenant networks on a data-center network: Topology and data structures
- 3.4.5.4 Layering tenant networks on a data-center network: Implementation of dynamic virtual links
- 3.5 Conclusion
- 4. The Real Internet Architecture
- 4.1 Introduction
- 4.2 Layering for reachability
- 4.2.1 The base Internet
- 4.2.2 Virtual local area networks
- 4.3 Layering for routing scalability and flexibility
- 4.3.1 How layering decomposes the routing problem
- 4.3.2 Example: Inter-network versus intra-network routing in the Internet
- 4.3.3 A quantitative view of layered routing
- 4.3.3.1 "Layering as optimization decomposition
- 4.3.3.2 Layered NUM problems
- 4.4 Layering for resource sharing or "slicing
- 4.5 Layering for enhanced Internet services
- 4.5.1 Virtual edge networks
- 4.5.2 Subduction
- 4.5.2.1 A first example of subduction
- 4.5.2.2 More examples of subduction
- 4.5.3 Example: Provenance of the AT&
- T packet
- 4.5.3.1 Part 1: Application and enterprise networks
- 4.5.3.2 Part 2: 4G or 5G mobile network and its underlays
- 4.5.3.3 Putting the two parts together
- 4.6 Present and future evolution
- 4.7 Principles of Internet design
- 4.7.1 The original end-to-end principle
- 4.7.2 The new end-to-end principle
- 4.7.3 The "tussle" principles
- 4.8 Evolution of the base Internet
- 4.8.1 Replacing IPv4 and IPv6
- 4.8.1.1 SCION
- 4.8.1.2 Sharing resources among old and new networks
- 4.8.1.3 Creating end-to-end paths of new networks
- 4.8.2 Private IP transit networks
- 4.9 Conclusion
- 5. Patterns for Enhanced Network Services
- 5.1 Introduction
- 5.2 Minimal definition of the base Internet
- 5.3 Obstacles and enhanced services
- 5.3.1 Endpoint limitations.
- 5.3.2 Network limitations
- 5.3.3 Insufficient security or privacy
- 5.3.4 Side-effects of beneficial network features
- 5.4 Session architecture
- 5.4.1 Session review
- 5.4.2 Broadcast and multicast sessions
- 5.4.2.1 Group communication
- 5.4.2.2 Allcast (broadcast or multicast) sessions
- 5.4.3 Compound sessions
- 5.4.4 Protocol embedding
- 5.4.4.1 An operational description of embedding
- 5.4.4.2 Subsessions
- 5.4.4.3 Protocol embedding and compound sessions
- 5.4.4.4 Constraints on embeddings
- 5.5 Comparison of mechanisms for adding services
- 5.5.1 Services requiring a session protocol
- 5.5.2 Services requiring middleboxes
- 5.5.2.1 Middleboxes inserted with compound sessions
- 5.5.2.2 Middleboxes inserted by routing and forwarding
- 5.5.3 Services requiring routing and forwarding
- 5.5.4 Services requiring layering
- 5.5.4.1 Who can add a layer?
- 5.5.4.2 Services requiring a namespace
- 5.5.4.3 Having it all
- 5.6 Example: Mobility
- 5.6.1 Definitions of mobility patterns
- 5.6.2 Uses of dynamic-routing mobility
- 5.6.3 Uses of session-location mobility
- 5.6.3.1 Session-location mobility for the World-Wide Web
- 5.6.3.2 Interoperation
- 5.7 Example: Inter-network multicast
- 5.8 Example: Security and privacy
- 5.8.1 Traffic filtering for security
- 5.8.1.1 Network-specific attacks
- 5.8.1.2 Network-specific traffic filtering
- 5.8.2 Layering for security and privacy
- 5.9 Example: Firewall traversal
- 5.9.1 The problem with firewalls
- 5.9.2 Helping sessions survive
- 5.9.3 Externally initiated sessions
- 5.10 Conclusion
- 6. Ideas for a Better Internet
- 6.1 Introduction
- 6.2 Internet standards
- 6.2.1 Session architecture
- 6.2.2 Layering and subduction
- 6.2.2.1 Algorithms and data
- 6.2.2.2 Varied implementations of the standard
- 6.3 Verification and security.
- 6.3.1 Example: Global private multicast
- 6.3.1.1 Multicast properties
- 6.3.1.2 Security properties
- 6.3.1.3 Link performance properties
- 6.3.1.4 Modular verification of the properties
- 6.3.2 Example: Secure enterprise network
- 6.3.2.1 Security properties
- 6.3.2.2 Modular verification of the properties
- 6.3.3 Example: Flow-affinity overlay
- 6.3.4 A research agenda for modular verification and security
- 6.4 Principles of network architecture
- 6.4.1 Middleboxes
- 6.4.2 Reliable delivery and mobility
- 6.4.3 Routing and congestion control
- 6.5 Implementation and optimization
- 6.5.1 A research agenda for modular implementation and optimization
- 6.5.2 Example: Optimization of a programmable pipeline
- 6.6 Thoughts on teaching networking
- 6.7 Conclusion
- Glossary
- Bibliography
- Index.
- Notes:
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 9780691261850
- 0691261857
- OCLC:
- 1436828897
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.