TY - BOOK AU - Day TI - Patterns In Network Architecture SN - 9788131735480 U1 - 005.71 23rd KW - Electronic books N1 - Cover -- Contents -- Preface: The Seven Unanswered Questions -- Chapter 1 Foundations for Network Architecture -- Introduction -- Beginning at the Beginning -- Levels of Abstraction -- Model -- Service -- Protocol and Interface -- Implementation -- Specifying Protocols -- Informal Specifications -- Formal Description Techniques -- Where to from Here -- Chapter 2 Protocol Elements -- Introduction -- Protocol Architecture -- Elements of a Protocol -- Data Units -- Constructing Protocol -- The Size of PDUs -- Mechanism and Policy -- QoS Versus NoS -- A Short Catalog of Data Transfer Mechanisms -- Delimiting -- Initial State Synchronization -- Policy Selection -- Addressing -- Flow or Connection Identifier -- Relaying -- Multiplexing -- Ordering -- Fragmentation/Reassembly -- Combining/Separation -- Data Corruption -- Lost and Duplicate Detection -- Flow Control -- Retransmission Control or Acknowledgment -- Compression -- Authentication -- Access Control -- Integrity -- Confidentiality -- Nonrepudiation -- Activity -- Phases of Operation -- The Enrollment Phase -- The Establishment or Synchronization Phase -- The Data Transfer Phase -- Conclusions -- Chapter 3 Patterns in Protocols -- Introduction -- The Two Major Architecture Paradigms -- The Layered Model -- The Beads-on-a-String Model -- The Connectionless/Connection Debate -- Background -- Finding for a Synthesis: The Easy Part -- The Types of Mechanisms -- How Many PDUs in a Protocol? -- The Types of Protocols -- The Architecture of Data Transfer PMs -- Finding a Synthesis: The Hard Part -- Conclusions -- Chapter 4 Stalking the Upper-Layer Architecture -- Introduction -- A Bit of History -- The Upper Layer(s) of the ARPANET -- The OSI Attempt or "Green Side Up" -- Network Management -- HTTP and the Web -- Directory- or Name-Resolution Protocols -- What Distinguishes the Upper Layers; Semantic Significance -- Location Independence -- Conclusions -- Chapter 5 Naming and Addressing -- Introduction -- Why Do We Need Naming and Addressing? -- How the Problem Arose -- Background on Naming and Addressing -- Foundations of Mathematics and Naming -- Naming and Addressing in Telephony -- Naming in Operating Systems -- X.25 and the ITU -- The Evolution of Addressing in the Internet: Early IP -- OSI and NSAPs -- Addressing in IPv6 -- Looking Back over IPv6 -- "Upper-Layer" or Application Addressing in OSI -- URI, URL, URN, and So On: Upper-Layer Addressing in the Internet -- Conclusions -- Chapter 6 Divining Layers -- Introduction -- Putting Protocols Together -- What We Have Seen -- Listening to the Problem -- Introduction -- Communications Within a Single System -- Communications Between Two Systems -- Invalidated Assumptions -- New Elements Required -- Simultaneous Communications Between Two Systems -- Communications with N Systems -- Communication with N Systems on the Cheap -- Initial Conclusions -- Taking Stock -- The Network IPC Architecture (NIPCA) -- Organizing Layers -- Conclusions -- Chapter 7 The Network IPC Model -- Introduction -- Basic Structure -- Definitions -- Description of the Basic System -- Naming Concepts for (N)-DIFs and Applications -- Definitions -- The (N)-Distributed IPC Facility -- Definitions -- The (N)-IPC-Process -- The (N)-IPC-APM -- The IPC Management Task -- Network Management Protocol and Management Architecture -- The Nature of Layers -- Operation of the DIF -- Adding a New Member to an (N)-DIF -- Creating a New DIF -- Data Transfer -- Identifiers in an (N)-DIF -- The (N)-Port-ID -- Application Process Names -- (N)-Addresses -- IPC Facilities -- IPC Structures -- Multiple (N)-DIFs of the Same Rank -- Implications for Security -- Conclusions -- Chapter 8 Making Addresses Topological -- Introduction; General Properties of Addressing -- Names and Addresses -- Introducing Topology to Addressing -- Definitions -- Topologies for Addressing -- The Role of Hierarchy in Addressing -- The Hierarchy of Layers -- The Hierarchical Topology of Address Spaces -- The Hierarchy of Networks -- Melding Address Spaces and the Hierarchy of Layers -- Hierarchical Addressing Architecture -- Single-Layer Address Topology -- Single-Layer Hierarchical Address Topology -- Address Topology for a Hierarchy of Layers -- Addressing Topologies for Multiple Hierarchies of Layers -- Modeling the Public Internet -- Conclusions -- Chapter 9 Multihoming, Multicast, and Mobility -- Introduction -- Multihoming -- Multicast Architecture -- Introduction to the Multicast Problem -- The Multicast Model -- Multicast "Addressing" -- Multicast Distribution -- Sentential Naming Operations and Their Resolution -- Multicast Distribution in a Recursive Architecture -- Multiplexing Multicast Groups -- Reliable Multicast -- Mobility -- Mobility in IP and Cellular Networks -- Mobility in NIPCA -- Ad Hoc Mobile Networking -- Mobile Application Processes -- Conclusions -- Chapter 10 Backing Out of a Blind Alley -- Introduction -- Consolidation and the Next Generation -- How Did This Happen? -- The Importance of Theory -- Finding a New Path -- The High Points -- Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy -- Part I: Service Definitions -- Part II: Protocol Specifications -- Part III: Mechanism Specifications -- Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J-K -- L -- M -- N -- O -- P -- Q-R -- S -- T -- U -- V -- W -- X-Y-Z UR - https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125901 ER -