注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络计算机科学理论与基础知识移动IP(英文影印版)

移动IP(英文影印版)

移动IP(英文影印版)

定 价:¥36.00

作 者: James D.Solomon
出版社: 清华大学出版社
丛编项: 网络新技术系列丛书(英文影印版)
标 签: 计算机网络通信/IP技术

购买这本书可以去


ISBN: 9787302010838 出版时间: 2000-01-01 包装:
开本: 787*1092 1/16 页数: 350 字数:  

内容简介

  由于移动计算和网络规模不断扩大的需要,移动IP处理成为Internet新的关键技术。本书是专门介绍移动IP原理和技术的权威著作,真内容分为四大部分:第一部分介绍了计算机网络的基本原理和为什么需要移动lP;第二部分在讨论移动IP的背景和应用对象的基础上详细阐述了移动IP的设计原理、代理发现、注册和分组路由方法等,并进一步对路由控制协议进行了深入剖析;第三部分介绍了移动lP的各种应用,包括安全性、校园范围局域移动应用、Internet广域移动性、业务提供者应用和其他应用;第四部分讨论了IPV6的移动性和未来的一些开放问题。该书作者James D.Sulomon是移动IP工作组的主席,是该领域的学术权威。他这本新颖、全面而又系统深入的菱作被誉为移动IP方面的“圣经”。本书适合于高等院校计算机与网络通信专业的研究生和高年级本科生阅读,又可作为从事计算机网络和Internet应用的广大科技人员的参考书。

作者简介

暂缺《移动IP(英文影印版)》作者简介

图书目录

List of Figures
Foreword
Preface
Acknowledgnents
P A R T 1 INTRODUCTION
C H A P T E R 1 IntroduCtion
1.1 What Is Driving Mobile Communications?
1.2 What Background Do I Need to Understand This Book?
1.3 Who Is the Target Audience of This Book?
1.4 What Is the Purpose of This Book?
1.5 What Notation Is Used throughout This Book?
1.6 Are We Talking about IPv4 or IPv6?
1.7 How Can I Obtain RFCs and Internet Drafts?
1.8 What Is the Roadmap for the Rest of This Book?
C H A P T E R Z Computer Networking Tutorial
2.1 How Do Computers Communicate?
2.1.1 What Is a Protocol Layer?
2.1.2 What Does Each Layer Do?
2.1.3 Which Layers Are Relevant to This Book?
2.1.4 What Does the Network Layer Look Like?
2.2 What Is the Internet Protocol (IP)?
2.2.1 What Is ICMP?
2.2.2 What Does IP Do?
2.2.3 What Does an IP Packet Look Like?
2.2.4 How Does a Node Obtain an IP Address?
2.3 How Does IP Routing Work?
2.3.1 What Is a Routing Table?
2.3.2 What If There Is More Than One Matching Entry?
2.3.3 Routing Examples
2.3.4 IP Routing Summary
2.4 How Are Routing-Table Entries Created?
2.5 Why is Routing Based on Network-Prefix?
2.6 How Can We Translate Names into Addresses?
2.7 How Can We Determine Link-Layer Addresses?
2.7.1 What Is the Address Resolution Protocol?
2.7.2 What Are Gratuitous and Proxy ARP?
2.8 Chapter Summary
C H A P T E R a The Need for Mobile IP
3.1 What Happens When a Node Changes Link?
3.2 Can‘t You Solve This Problem with Host-Specific Routes?
3.2.1 How Might Host-Routes Solve the Problem?
3.2.2 Is This Solution a Good One?
3.3 Why Not Just Change the Nod‘s lP Address?
3.3.1 Can Connections Survive a Changing IP address?
3.3.2 How Do We Find a Node Whose IP Address Keeps Changing?
3.4 Can‘t You Just Solve This at the Link Layer?
3.4.1 What Are Some Existing Link-Layer Solutions?
3.4.2 Why Aren‘t Link-Layer Solutions Sufficient?
3.5 What If I Only Need Nomadicity?
3.6 Chapter Summary
P A R T 2 MOBILE IP
C H A P T E R 4 Mobile IP Overview
4.1 Is Mobile IP an Official Standard?
4.2 What Problems Does Mobile IP Solve?
4.3 What Is the Scope of the Mobile IP Solution?
4.3.1 Over What Media Types Can Mobile IP Operate?
4.3.2 Is Mobile IP a Complete Mobility Solution?
4.4 What Ai.e the Requirements for Mobile IP?
4.5 What Are the Design Goals for Mobile IP?
4.6 What Assumptions Does Mobile IP Make?
4.7 Where Does Mobile IP Reside?
4.7.1 Can Agents Be Hosts or Must They Be Routers?
4.7.2 Who Owns the Mobile Nodes and the Agents?
4.8 At a 10,000-Foot Level, How Does Mobile IP Work?
4.9 Chapter Summary
C H A P T E R S Mobile IP: The Gory Details
5.1 What Is the Mobile IP Design Philosophy?
5.2 What Is Agent Discovery?
5.2.1 What Messages Comprise Agent Discovery?
5.2.2 How Does a Mobile Node Determine That It Has Moved?
5.2.3 What Does a Mobile Node Do If It Hears NO Advertisements?
5.2.4 Summary
5.3 What Is Registration?
5.3.1 What Messages Comprise Registration?
5.3.2 How Do Nodes Process Registrations?
5.3.3 How Can a Mobile Node Learn the Address of a Home Agent?
5.3.4 How Does a Node Know Who Really Sent a
Registration Message?
5.3.5 How Can a Mobile Node Provide Additional
Information to a Foreign Agent or its Home Agent?
5.3.6 What If the Mobile Node Is Ping-Ponging Back-n-FOrth
Between Wreless Cells?
5.3.7 What‘s the Deal with the Bit?
5.4 How Are Packets Routed to and from Mobile Nodes?
5.4.1 How Are Packets Routed When a Mobile Node Is at Home?
5.4.2 How Are Packets Routed to a Mobile Node on a
Foreign Link?
5.4.3 How Do Mobile Nodes Send Packets?
5.4.4 Doesn‘t This Assume That IP Packets Are Routed
without Regard to Their Source Address?
5.4.5 Why Use Tunneling Instead of Source Routing?
5.4.6 Why the Triangle Route?
5.4.7 Can Mobile Nodes SendfReceive BroadcastsMulticasts?
5.4.8 How Does Van Jacobson Compression WOrk?
5.5 Chapter Summary
C H A P T E R 6 Tunneling
6.1 What Is IP Fragnentation?
6.1.1 How Does FragInentation Work?
6.1.2 How Does IPv4 Path MTU Discovery WOrk?
6.2 What Is IP in IP Encapsulation?
6.2.1 Building an Encapsulated Packet
6.2.2 Relaring ICMP Messages
6.2.3 Preventing Recursive Encapsulation
6.2.4 Summary
6.3 What Is Minimal Encapsulation?
6.3.1 Building an Encapsulated Packet
6.3.2 FragInentation
6.3.3 Time to Live l1nd Tunnel Length
6.3.4 Relaytng ICMP Messages
6.3.5 Preventing Recursive Encapsulation
6.3.6 Summary
6.4 What Is Generic;Routing Encapsulation (GRE)?
6.4.1 Multiprotocol Encapsulation
6.4.2 Preventing Recursive Encapsulation
6.4.3 Summary
6.5 Chapter Summary
P A R T 3 APPmNG MOBILE IP
C H A P T E R 7 SeCUrity Primer
7.1 What Do We Mean by Security?
7.2 What Is Cryptography?
7.2.1 CryPtographic Systems
7.2.2 Secret-Key versus Public-Key Algorithms
7.3 What Do We Mean by COnfidentiality?
7.3.1 Secret-Key EncryPtion
7.3.2 Public-Key EncryPtion
7.4 What Do We Mean by Authenticatton, Integrity Checking, and NOn-RePudiation?
7.4.1 What Is Authorization?
7.4.2 What Is Authentication?
7.4.3 Strength of Anthentication Systems
7.4.4 Secret-Key Authentication
7.4.5 Public-Key Authentication
7.5 How Can We Manage Keys Securely?
7.5.1 Challenges in Public-Key Management
7.5.2 Manual Methods
7.5.3 Trusted Third Parties
7.6 What Security Protocols Ai.e Used in the Internet?
7.6.1 What Is a Security Association?
7.6.2 What Is the IP Authentication Header?
7.6.3 What Is the IP Encapsulating Security Payload?
7.6.4 Other Security Protocols in the Internet
7.6.5 What Is ISAKMPlOakley?
7.6.6 What Is SKIP?
7.7 What Ai.e Firewalls?
7.7.1 What Is the Hhehly Abridged Histofry of Firewalls1
7.7.2 What Is a Packet-Filtering Router?
7.7.3 What Is an Application-Layer Relay?
7.7.4 What Is a Secure Tunneler?
7.8 Chapter Summary
C H A P T E R S Campus Mobility:
A Simple Mobile IP APplication
8.1 What Is the Model for This Application?
8.1.1 What Is a Campus Intranet?
8.1.2 How Is Mobile IP Deployed?
8.1.3 Why Should I Harass My Network Administrators Deploy Mobile IP In This Way?
8.1.4 What Is the Security Model for This Chapter?
8.2 Insider Attacks
8.3 Mobile Node Denial-Of Seryvice
8.3.1 What Is a Denial-of Service Attack?
8.3.2 What bee of Denial-of Service Attacks Does Mobile IP Prevent?
8.3.3 How Does Mobile IP Prevent This Denial-of Service Attack?
8.3.4 What about Replay Attacks?
8.3.5 Summary
8.4 Theft of Information: Passive Eavesdropping
8.4.1 Nature of the Threat
8.4.2 Link-Layer EncryPtion
8.4.3 End-to-End EncryPtion
8.5 Theft of Information: Session-Stealing (Takeover) Attac
8.5.1 Session-Stealing on the Foreign Link
8.5.2 Session-Stealing Elsewhere
8.6 Other Active Attacks
8.7 Summary/Conclusions
C H A P T E R o Internet-Wide Mobility:
A More Complicated APplication
9.1 What Is the Model for This Application?
9.1.1 What Are Our Assumptions and Requirements?
9.1.2 How Can Mobile IP Be Deployed to FulfilI These Requirements?
9.1.3 Why Is It Done This Way?
9.2 Which Threats Ai.e Largely the Same As BefOre?
9.3 How Do We Protect a Mobile Node That Is Outside the
9.3.1 VPNs Revisited
9.3.2 Mobile Nodes as a Special Case of VPNs
9.4 How Can Mobile Nodes Traverse the Flrewall without Compromising the Corporate Network?
9.4.1 What Are the Assumptions and Requirements for Firewall Traversal?
9.4.2 Firewall Traversal Using SKIP
9.4.3 Firewall Traversal Using ISAKMP/Oakley
9.5 Summary/Conclusions
C H A P T E R l o APplying Mobile IP:
A Service-Provider Perspective
10.1 What Is the Model for Commercial, Mobile IP Service?
10.2 What Is Theft-Of-Servlce?
10.2.1 What is Cellular“Cloning” Fraud?
10.2.2 How Might an Internet Service Provider Prevent Theft-of Service with Mobile IP?
10.3 Denial-of Service Revisited
10.3.1 How Does the Flooding Attack Work?
10.3.2 What Are Service Providers Doing about This Attack?
10.3.3 How Does Ingress Filtering ffect Mobile IP?
10.3.4 What Does Mobile IP Do about Ingress Filtering?
10.4 Motorola‘s iDENTM: A Case Study
10.4.1 What Services Does iDEN Provide?
10.4.2 What Is iDEN Packet Data?
10.4.3 How Does iDEN Packet Data Work?
10.5 Chapter Summary
C H A P T E R l l Other APplications fOr Mobile IP
11.1 Support for Other Protocols within the Mobile IP Framework
11.1.1 Why Support Other Protocols?
11.1.2 What Do We Mean by Other Protocols?
11.1.3 Requirements and Assumptions
11.1.4 The Integrated Mobility Extension
11.1.5 Registration with Other Protocols
11.1.6 Routing Packets of Other ProtOcols to Mobile Nodes
11.1.7 Why Use GRE?
11.1.8 Why Use Tunneling?
11.1.9 Summary
11.2 Mobile Networks (as Opposed to Mobile HOsts)
11.2.1 Mobile Router on Its Home Link
11.2.2 Mobile Routers on a Visited Link
11.2.3 Routing Tables for Mobile Networks
11.2.4 What‘s the Deal with Section 4.5 of RFC 2002?
11.2.5 Summary
11.3 Mobile IP as a Layer-2, Tunnel-Establishment Protocol
11.3.1 What Is Remote Dial-in?
11.3.2 How Does the Virtual Tunneling Protocol Work?
11.3.3 What Are the Security Considerations of the Virtual Tunneling Protocol?
11.3.4 Why Not Just Use Mobile IP?
11.3.5 How Does L2TP Differ from VTP?
11.3.6 Summary
11.4 Chapter Summary
P A R T 4 FUTURE TOPICS
C H A P T E R 1 2 Mobility for IP Ver8ion 6
12.1 How Does IPv6 Differ from IPv4?
12.1.1 IPv6 Base Header
12.1.2 IPv6 Extension Headers
12.1.3 IPv6 Address TyPes
12.2 Which of These Differences Is Relevant to the Design of Mobile IPv6?
12.2.1 How Do Larger Addresses Help?
12.2.2 How Does the New Routing Header Help?
12.2.3 How Does the Authentication Header Help?
12.3 Doesn‘t Address AutoconfigUration Eliminate the Need for Mobile IPv6?
12.4 How Does Mobile IPv6 Work?
12.4.1 What Are the Mobile IPv6 Components?
12.4.2 What Is IPv6 Neighbor Discovery?
12.5 How Does a Mobile Node Determine Its Location?
12.5.1 What Is ICMPv6 Router Discovery?
12.5.2 How Does a Mobile Node Obtain a Care-of Address?
12.6 How Does a Mobile Node InfOrm Other Nodes of Its Care-of Address?
12.6.1 What Is Notification?
12.6.2 What Are the Common Notification Scenarios?
12.6.3 What Is the Notification Protocol?
12.6.4 What Messages Are Used in Notification?
12.6.5 How Does the Mobile Node Know the Address of Its Home Agent?
12.6.6 When Should Mobile Nodes Send Binding Updates?
12.7 How Ai.e Packets Routed to and from Mobile Nodes?
12.7.1 How Do Correspondents That Know the Care-of Address Send Packets to a Mobile Node?
12.7.2 How Do Correspondents That Do Not Know the Care-of Address Send Packets to a Mobile Node?
12.7.3 How Do Mobile Nodes Send Packets?
12.8 Chapter Summary
C H A P T E R l s Open Issues
13.1 TCP Performance and Mobility
13.1.1 What Is TCP?
13.1.2 How Does TCP work?
13.1.3 Are TCP‘s Assumptions Regarding Congestion Correct?
13.1.4 How Can TCP PerfOrmance Be Improved for Mobile Nodes?
13.1.5 Summary
13.2 RSVP and Real-Time Traffic
13.2.1 What Is Real-Time Traffic?
13.2.2 Why is IP Not Well Suited to Real-Time Traffic?
13.2.3 What Is RSVP?
13.2.4 How Does Mobile IP Affct Real-Time Traffic?
13.2.5 Summary
13.3 Service Location
13.3.1 What Does the Service Location Protocol Accomplish?
13.3.2 How Does the Service Location Protocol Work?
13.3.3 Security Considerations of Service Location
13.3.4 Service Location and Mobility
13.3.5 Summary
13.4 Chapter Summary
C H A P T E R 14 Summary and Final Thoughts
14.1 Mobile IP Summary
14.1.1 Background, Context, and Motivation
14.1.2 Terminology and Operation
14.1.3 APplytng Mobile IP
14.1.4 Work in Progress and Open Issues
14.2 The Future of Mobile IP
Glossary
References
Index

本目录推荐