Sem resumo de edição |
Sem resumo de edição |
||
| Linha 9: | Linha 9: | ||
* Índice do livro: | * Índice do livro: | ||
Table of contents for Patterns in network architecture : a return to fundamentals / John Day. | * Table of contents for Patterns in network architecture : a return to fundamentals / John Day. | ||
* Bibliographic record and links to related information available from the Library of Congress catalog. | |||
Bibliographic | * Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding. | ||
* | |||
Note: | * Preface. The Seven Unanswered Questions | ||
* Chapter 1.Basic Concepts 1: A Theoretical Foundation | |||
Preface. The Seven Unanswered Questions | * 0 Introduction | ||
Chapter 1.Basic Concepts 1: A Theoretical Foundation | * 1 Beginning at the Beginning | ||
0 Introduction | * 2 Levels of Abstraction | ||
1 Beginning at the Beginning | * 3 Model | ||
2 Levels of Abstraction | * 4 Service | ||
3 Model | * 5 Protocol and Interface | ||
4 Service | * 6 Implementation | ||
5 Protocol and Interface | * 4. Specifying Protocols | ||
6 Implementation | * 4.1. Informal Specifications | ||
4. | * 4.2. Formal Description Techniques | ||
4.1. | * 5.0 Where to From Here? | ||
4.2. | * Chapter 2. Basic Concepts: Protocol Elements | ||
5.0 Where to From Here? | * 1. Introduction | ||
Chapter 2. Basic Concepts: Protocol Elements | * 2. Protocol Architecture | ||
1. Introduction | * 2.1. Elements of a Protocol | ||
2. Protocol Architecture | * 2.1.1. Protocol | ||
2.1. Elements of a Protocol | * 2.1.2. Associations, Connections, Flows and Bindings | ||
2.1.1. Protocol | * 2.1.3. Interfaces | ||
2.1.2. Associations, Connections, Flows and Bindings | * 2.1.4. Data Units | ||
2.1.3. Interfaces | * 2.1.5. Constructing Protocols | ||
2.1.4. Data Units | * 2.1.6. The Size of PDUs | ||
2.1.5. Constructing Protocols | * 2.1.7. Mechanism and Policy | ||
2.1.6. The Size of PDUs | * 2.1.8. QoS vs NoS | ||
2.1.7. Mechanism and Policy | * 3. A Short Catalog of Data Transfer Mechanisms | ||
2.1.8. QoS vs NoS | * 4. Phases of Operation | ||
3. A Short Catalog of Data Transfer Mechanisms | * 4.1. The Enrollment Phase | ||
4. Phases of Operation | * 4.2. The Establishment or Synchronization Phase | ||
4.1. The Enrollment Phase | * 4.3. The Data Transfer Phase | ||
4.2. The Establishment or Synchronization Phase | * 5. Conclusions | ||
4.3. The Data Transfer Phase | * Chapter 3 Basic Concepts: Patterns in Protocols | ||
5. Conclusions | * 1. Introduction | ||
Chapter 3 Basic Concepts: Patterns in Protocols | * 2. The Two Major Architecture Paradigms | ||
1. Introduction | * 2.1 The Layered Model | ||
2. The Two Major Architecture Paradigms | * 2.2 The Beads on a String Model | ||
2.1 The Layered Model | * 3. The Connectionless/Connection Debate | ||
2.2 The Beads on a String Model | * 3.1 Background | ||
3. The Connectionless/Connection Debate | * 3.2 Looking for a Synthesis | ||
3.1 Background | * 4. The Types of Mechanisms | ||
3.2 Looking for a Synthesis | * 5. How Many PDUs in a Protocol? | ||
4. The Types of Mechanisms | * 6. The Types of Protocols | ||
5. How Many PDUs in a Protocol? | * 7. The Architecture of Data Transfer PMs | ||
6. The Types of Protocols | * 8. Finding a Synthesis: The Hard Part. | ||
7. The Architecture of Data Transfer PMs | * 9. Conclusions | ||
8. Finding a Synthesis: The Hard Part. | * Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy | ||
9. Conclusions | * Chapter 4: Stalking the Upper Layer Architecture | ||
Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy | * 1. Introduction | ||
Chapter 4: Stalking the Upper Layer Architecture | * 2. A Bit of History | ||
1. Introduction | * 2.1. The Upper Layer(s) of the ARPANet | ||
2. A Bit of History | * 2.1.1. Early Elegance: Telnet, FTP, and RJE | ||
2.1. The Upper Layer(s) of the ARPANet | * 2.1.2. What Was Learned | ||
2.1.1. Early Elegance: Telnet, FTP, and RJE | * 2.2. The OSI Attempt or ?Green Side Up? | ||
2.1.2. What Was Learned | * 2.2.1. Session, Presentation, and Application | ||
2.2. The OSI Attempt or ?Green Side Up? | * 2.2.2. What Was Learned | ||
2.2.1. Session, Presentation, and Application | * 2.3 Network Management | ||
2.2.2. What Was Learned | * 2.4 HTTP and the Web | ||
2.3 Network Management | * 2.5 Directory or Name Resolution Protocols | ||
2.4 HTTP and the Web | * 2.5.1 Name Resolution Systems | ||
2.5 Directory or Name Resolution Protocols | * 2.5.2 Name Resolution System Structures | ||
2.5.1 Name Resolution Systems | * 3. What Distinguishes the Upper Layers | ||
2.5.2 Name Resolution System Structures | * 3.1. Semantic Significance. | ||
3. What Distinguishes the Upper Layers | * 3.2. Location Independence | ||
3.1. Semantic Significance. | * 4. Conclusions | ||
3.2. Location Independence | * Chapter 5: Background on Naming and Addressing | ||
4. Conclusions | * 1. Introduction | ||
Chapter 5: Background on Naming and Addressing | * 2. Why do we need Naming and Addressing? | ||
1. Introduction | * 3. How the Problem Arose | ||
2. Why do we need Naming and Addressing? | * 4. Background on Naming and Addressing | ||
3. How the Problem Arose | * 4.1. Foundations of Mathematics and Naming | ||
4. Background on Naming and Addressing | * 4.2. Naming and Addressing in Telephony | ||
4.1. Foundations of Mathematics and Naming | * 4.3. Naming in Operating Systems | ||
4.2. Naming and Addressing in Telephony | * 4.4. X.25 and the ITU | ||
4.3. Naming in Operating Systems | * 4.5. The Evolution of Addressing in the Internet: Early IP | ||
4.4. X.25 and the ITU | * 4.6. OSI and NSAPs | ||
4.5. The Evolution of Addressing in the Internet: Early IP | * 4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6 | ||
4.6. OSI and NSAPs | * 4.8. Addressing in IPv6 | ||
4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6 | * 4.8.1. The Various Address Types | ||
4.8. Addressing in IPv6 | * 4.8.2. IPv6 Unicast Addresses | ||
4.8.1. The Various Address Types | * 4.9. Looking Back over IPv6 | ||
4.8.2. IPv6 Unicast Addresses | * 4.10. "Upper Layer" or Application Addressing in OS | ||
4.9. Looking Back over IPv6 | * 4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet | ||
4.10. "Upper Layer" or Application Addressing in OS | * 5. Conclusions or What Have We Learned | ||
4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet | * Chapter 6: Basic Concepts: Layers | ||
5. Conclusions or What Have We Learned | * 1. Introduction | ||
Chapter 6: Basic Concepts: Layers | * 2. Putting Protocols Together | ||
1. Introduction | * 3. Listening to the Problem | ||
2. Putting Protocols Together | * 3.1 Introduction | ||
3. Listening to the Problem | * 3.2. Communications within a Single System | ||
3.1 Introduction | * 3.3. Communications between Two Systems | ||
3.2. Communications within a Single System | * 3.4. Simultaneous Communications Between Two Systems | ||
3.3. Communications between Two Systems | * 3.5. Communications with N Systems | ||
3.4. Simultaneous Communications Between Two Systems | * 3.6 Communication with N Systems Cheaply | ||
3.5. Communications with N Systems | * 3.7 Initial Conclusions | ||
3.6 Communication with N Systems Cheaply | * 4. Taking Stock | ||
3.7 Initial Conclusions | * 5. The Network IPC Architecture (NIPCA) | ||
4. Taking Stock | * 6. Organizing Layers | ||
5. The Network IPC Architecture (NIPCA) | * 7. Conclusions | ||
6. Organizing Layers | * Chapter 7 A Recursive IPC Model of Networking | ||
7. Conclusions | * 1. Introduction | ||
Chapter 7 A Recursive IPC Model of Networking | * 2. Basic Structure | ||
1. Introduction | * 2.1 Definitions | ||
2. Basic Structure | * 2.2 Description of the Basic System | ||
2.1 Definitions | * 2.2.1 Introduction | ||
2.2 Description of the Basic System | * 2.2.2 Basic Structures and their Principles | ||
2.2.1 Introduction | * 2.2.3 The Structure of Applications and Protocols | ||
2.2.2 | * 2.2.4 Application-Protocol-Machines | ||
2.2.3 The Structure of Applications and Protocols | * 3. Naming Concepts for (N)-DIFs and Applications | ||
2.2.4 Application-Protocol-Machines | * 3.1 Definitions | ||
3. Naming Concepts for (N)-DIFs and Applications | * 3.2 Application Naming | ||
3.1 Definitions | * 4.0 The (N)-Distributed IPC Facility | ||
3.2 Application Naming | * 4.1 Definitions | ||
4.0 The (N)-Distributed IPC Facility | * 4.2 The (N)-IPC-Process | ||
4.1 Definitions | * 4.3The (N)-IPC-APM | ||
4.2 The (N)-IPC-Process | * 4.3.1 The IPC API | ||
4.3The (N)-IPC-APM | * 4.3.2 The EFCP Protocol | ||
4.3.1 The IPC API | * 4.3.3 Relaying and Multiplexing Task (RMT) | ||
4.3.2 The EFCP Protocol | * 4.3.4 PDU Protection | ||
4.3.3 Relaying and Multiplexing Task (RMT) | * 4.4 The IPC Management Task | ||
4.3.4 PDU Protection | * 4.4.1 (N)-IPC Access Protocol (IAP) | ||
4.4 The IPC Management Task | * 4.4.2 Resource Information Exchange Protocol (RIEP) | ||
4.4.1 (N)-IPC Access Protocol (IAP) | * 4.4.3 Resource Information Base | ||
4.4.2 Resource Information Exchange Protocol (RIEP) | * 4.4.4 The IPC Management Task | ||
4.4.3 Resource Information Base | * 4.5 Network Management Protocol and Management Architecture | ||
4.4.4 The IPC Management Task | * 5.0 The Nature of Layers | ||
4.5 Network Management Protocol and Management Architecture | * 6.0 Operation of the DIF | ||
5.0 The Nature of Layers | * 6.1 Adding a new member to a (N)-DIF. | ||
6.0 Operation of the DIF | * 6.2 Creating a New DIF | ||
6.1 Adding a new member to a (N)-DIF. | * 6.3 Data Transfer | ||
6.2 Creating a New DIF | * 7.0 Identifiers in a (N)-DIF | ||
6.3 Data Transfer | * 7.1 The (N)-Port-id | ||
7.0 Identifiers in a (N)-DIF | * 7.2 Application Process Names | ||
7.1 The (N)-Port-id | * 7.3 (N)-Addreses | ||
7.2 Application Process Names | * 7.4 Taking Stock | ||
7.3 (N)-Addreses | * 8.0 IPC-Facilities | ||
7.4 Taking Stock | * 8.1 IPC Structures | ||
8.0 IPC-Facilities | * 8.2 Multiple (N)-DIFs of the Same Rank | ||
8.1 IPC Structures | * 8.3 Implications for Security | ||
8.2 Multiple (N)-DIFs of the Same Rank | * 9. Conclusion | ||
8.3 Implications for Security | * Chapter 8 Making Addresses Topological | ||
9. Conclusion | * 1. Introduction | ||
Chapter 8 Making Addresses Topological | * 2. General Properties of Addressing | ||
1. Introduction | * 2.1. Names and Addresses | ||
2. General Properties of Addressing | * 3. Introducing Topology to Addressing. | ||
2.1. Names and Addresses | * 3.1Definitions | ||
3. Introducing Topology to Addressing. | * 3.2. Topologies for Addressing | ||
3.1Definitions | * 4. The Role of Hierarchy in Addressing | ||
3.2. Topologies for Addressing | * 4.1. The Hierarchy of Layers | ||
4. The Role of Hierarchy in Addressing | * 4.2. The Hierarchical Topology of Address Spaces | ||
4.1. The Hierarchy of Layers | * 4.3. The Hierarchy of Networks | ||
4.2. The Hierarchical Topology of Address Spaces | * 4.4 Melding Address Spaces and the Hierarchy of Layers | ||
4.3. The Hierarchy of Networks | * 5. Hierarchical Addressing Architecture | ||
4.4 Melding Address Spaces and the Hierarchy of Layers | * 5.1 Single Layer Address Topology | ||
5. Hierarchical Addressing Architecture | * 5.2 Single Layer Hierarchical Address Topology | ||
5.1 Single Layer Address Topology | * 5.3 Address Topology for a Hierarchy of Layers | ||
5.2 Single Layer Hierarchical Address Topology | * 5.4 Addressing Topologies for Multiple Hierarchies of Layers. | ||
5.3 Address Topology for a Hierarchy of Layers | * 5.5 Modeling the Public Internet | ||
5.4 Addressing Topologies for Multiple Hierarchies of Layers. | * 6.0 Conclusion | ||
5.5 Modeling the Public Internet | * Chapter 9 Considering Multihoming, Multicast and Mobility | ||
6.0 Conclusion | * 1. Introduction | ||
Chapter 9 Considering Multihoming, Multicast and Mobility | * 2. Multihoming | ||
1. Introduction | * 3. Multicast Architecture | ||
2. Multihoming | * 3.1 Introduction to the Multicast Problem | ||
3. Multicast Architecture | * 3.2 The Multicast Model | ||
3.1 Introduction to the Multicast Problem | * 3.2 Multicast ?Addressing? | ||
3.2 The Multicast Model | * 3.3 Multicast Distribution | ||
3.2 Multicast ?Addressing? | * 3.4 Sentential Naming Operations and their Resolution | ||
3.3 | * 3.4.1 Multicast Distribution in a Recursive Architecture | ||
3.4 Sentential Naming Operations and their Resolution | * 3.4.2 Multiplexing multicast groups | ||
3.4.1 Multicast Distribution in a Recursive Architecture | * 3.5 Reliable Multicast | ||
3.4.2 Multiplexing multicast groups | * 4.0 Mobility | ||
3.5 Reliable Multicast | * 4.1 Mobility in IP and Cellular Networks | ||
4.0 Mobility | * 4.2 Mobility in NIPCA | ||
4.1 Mobility in IP and Cellular Networks | * 4.3 Ad Hoc Mobile Networking | ||
4.2 Mobility in NIPCA | * 4.4 Mobile Applications | ||
4.3 Ad Hoc Mobile Networking | * 5. Conclusions | ||
4.4 Mobile Applications | * Chapter 10 Taking Stock | ||
5. Conclusions | * 1. Introduction | ||
Chapter 10 Taking Stock | * 2. Consolidation and the Next Generation | ||
1. Introduction | * 3. How Did This Happen | ||
2. Consolidation and the Next Generation | * 4. The Importance of Theory | ||
3. How Did This Happen | * 5. Finding a New Path | ||
4. The Importance of Theory | * 6. The High Points | ||
5. Finding a New Path | * Library of Congress Subject Headings for this publication: | ||
6. The High Points | * Computer network architectures. | ||
Library of Congress Subject Headings for this publication: | * Computer networks -- Design. | ||
* Computer networks -- Philosophy. | |||
Computer network architectures. | * Internet -- History. | ||
Computer networks -- Design. | |||
Computer networks -- Philosophy. | |||
Internet -- History. | |||
Edição das 01h49min de 10 de julho de 2014
[1] John Day, Patterns in Network Architecture: A Return to Fundamentals, Prentice Hall, 2008.
Luiz Cláudio
http://www.sourceinnovation.com.br/index.php/ETArch_Pilot#RINA
- Índice do livro:
- Table of contents for Patterns in network architecture : a return to fundamentals / John Day.
- Bibliographic record and links to related information available from the Library of Congress catalog.
- Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.
- Preface. The Seven Unanswered Questions
- Chapter 1.Basic Concepts 1: A Theoretical Foundation
- 0 Introduction
- 1 Beginning at the Beginning
- 2 Levels of Abstraction
- 3 Model
- 4 Service
- 5 Protocol and Interface
- 6 Implementation
- 4. Specifying Protocols
- 4.1. Informal Specifications
- 4.2. Formal Description Techniques
- 5.0 Where to From Here?
- Chapter 2. Basic Concepts: Protocol Elements
- 1. Introduction
- 2. Protocol Architecture
- 2.1. Elements of a Protocol
- 2.1.1. Protocol
- 2.1.2. Associations, Connections, Flows and Bindings
- 2.1.3. Interfaces
- 2.1.4. Data Units
- 2.1.5. Constructing Protocols
- 2.1.6. The Size of PDUs
- 2.1.7. Mechanism and Policy
- 2.1.8. QoS vs NoS
- 3. A Short Catalog of Data Transfer Mechanisms
- 4. Phases of Operation
- 4.1. The Enrollment Phase
- 4.2. The Establishment or Synchronization Phase
- 4.3. The Data Transfer Phase
- 5. Conclusions
- Chapter 3 Basic Concepts: Patterns in Protocols
- 1. Introduction
- 2. The Two Major Architecture Paradigms
- 2.1 The Layered Model
- 2.2 The Beads on a String Model
- 3. The Connectionless/Connection Debate
- 3.1 Background
- 3.2 Looking for a Synthesis
- 4. The Types of Mechanisms
- 5. How Many PDUs in a Protocol?
- 6. The Types of Protocols
- 7. The Architecture of Data Transfer PMs
- 8. Finding a Synthesis: The Hard Part.
- 9. Conclusions
- Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy
- Chapter 4: Stalking the Upper Layer Architecture
- 1. Introduction
- 2. A Bit of History
- 2.1. The Upper Layer(s) of the ARPANet
- 2.1.1. Early Elegance: Telnet, FTP, and RJE
- 2.1.2. What Was Learned
- 2.2. The OSI Attempt or ?Green Side Up?
- 2.2.1. Session, Presentation, and Application
- 2.2.2. What Was Learned
- 2.3 Network Management
- 2.4 HTTP and the Web
- 2.5 Directory or Name Resolution Protocols
- 2.5.1 Name Resolution Systems
- 2.5.2 Name Resolution System Structures
- 3. What Distinguishes the Upper Layers
- 3.1. Semantic Significance.
- 3.2. Location Independence
- 4. Conclusions
- Chapter 5: Background on Naming and Addressing
- 1. Introduction
- 2. Why do we need Naming and Addressing?
- 3. How the Problem Arose
- 4. Background on Naming and Addressing
- 4.1. Foundations of Mathematics and Naming
- 4.2. Naming and Addressing in Telephony
- 4.3. Naming in Operating Systems
- 4.4. X.25 and the ITU
- 4.5. The Evolution of Addressing in the Internet: Early IP
- 4.6. OSI and NSAPs
- 4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6
- 4.8. Addressing in IPv6
- 4.8.1. The Various Address Types
- 4.8.2. IPv6 Unicast Addresses
- 4.9. Looking Back over IPv6
- 4.10. "Upper Layer" or Application Addressing in OS
- 4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet
- 5. Conclusions or What Have We Learned
- Chapter 6: Basic Concepts: Layers
- 1. Introduction
- 2. Putting Protocols Together
- 3. Listening to the Problem
- 3.1 Introduction
- 3.2. Communications within a Single System
- 3.3. Communications between Two Systems
- 3.4. Simultaneous Communications Between Two Systems
- 3.5. Communications with N Systems
- 3.6 Communication with N Systems Cheaply
- 3.7 Initial Conclusions
- 4. Taking Stock
- 5. The Network IPC Architecture (NIPCA)
- 6. Organizing Layers
- 7. Conclusions
- Chapter 7 A Recursive IPC Model of Networking
- 1. Introduction
- 2. Basic Structure
- 2.1 Definitions
- 2.2 Description of the Basic System
- 2.2.1 Introduction
- 2.2.2 Basic Structures and their Principles
- 2.2.3 The Structure of Applications and Protocols
- 2.2.4 Application-Protocol-Machines
- 3. Naming Concepts for (N)-DIFs and Applications
- 3.1 Definitions
- 3.2 Application Naming
- 4.0 The (N)-Distributed IPC Facility
- 4.1 Definitions
- 4.2 The (N)-IPC-Process
- 4.3The (N)-IPC-APM
- 4.3.1 The IPC API
- 4.3.2 The EFCP Protocol
- 4.3.3 Relaying and Multiplexing Task (RMT)
- 4.3.4 PDU Protection
- 4.4 The IPC Management Task
- 4.4.1 (N)-IPC Access Protocol (IAP)
- 4.4.2 Resource Information Exchange Protocol (RIEP)
- 4.4.3 Resource Information Base
- 4.4.4 The IPC Management Task
- 4.5 Network Management Protocol and Management Architecture
- 5.0 The Nature of Layers
- 6.0 Operation of the DIF
- 6.1 Adding a new member to a (N)-DIF.
- 6.2 Creating a New DIF
- 6.3 Data Transfer
- 7.0 Identifiers in a (N)-DIF
- 7.1 The (N)-Port-id
- 7.2 Application Process Names
- 7.3 (N)-Addreses
- 7.4 Taking Stock
- 8.0 IPC-Facilities
- 8.1 IPC Structures
- 8.2 Multiple (N)-DIFs of the Same Rank
- 8.3 Implications for Security
- 9. Conclusion
- Chapter 8 Making Addresses Topological
- 1. Introduction
- 2. General Properties of Addressing
- 2.1. Names and Addresses
- 3. Introducing Topology to Addressing.
- 3.1Definitions
- 3.2. Topologies for Addressing
- 4. The Role of Hierarchy in Addressing
- 4.1. The Hierarchy of Layers
- 4.2. The Hierarchical Topology of Address Spaces
- 4.3. The Hierarchy of Networks
- 4.4 Melding Address Spaces and the Hierarchy of Layers
- 5. Hierarchical Addressing Architecture
- 5.1 Single Layer Address Topology
- 5.2 Single Layer Hierarchical Address Topology
- 5.3 Address Topology for a Hierarchy of Layers
- 5.4 Addressing Topologies for Multiple Hierarchies of Layers.
- 5.5 Modeling the Public Internet
- 6.0 Conclusion
- Chapter 9 Considering Multihoming, Multicast and Mobility
- 1. Introduction
- 2. Multihoming
- 3. Multicast Architecture
- 3.1 Introduction to the Multicast Problem
- 3.2 The Multicast Model
- 3.2 Multicast ?Addressing?
- 3.3 Multicast Distribution
- 3.4 Sentential Naming Operations and their Resolution
- 3.4.1 Multicast Distribution in a Recursive Architecture
- 3.4.2 Multiplexing multicast groups
- 3.5 Reliable Multicast
- 4.0 Mobility
- 4.1 Mobility in IP and Cellular Networks
- 4.2 Mobility in NIPCA
- 4.3 Ad Hoc Mobile Networking
- 4.4 Mobile Applications
- 5. Conclusions
- Chapter 10 Taking Stock
- 1. Introduction
- 2. Consolidation and the Next Generation
- 3. How Did This Happen
- 4. The Importance of Theory
- 5. Finding a New Path
- 6. The High Points
- Library of Congress Subject Headings for this publication:
- Computer network architectures.
- Computer networks -- Design.
- Computer networks -- Philosophy.
- Internet -- History.