Sem resumo de edição
Sem resumo de edição
Linha 9: Linha 9:
* Índice do livro:
* Índice do livro:


Table of contents for Patterns in network architecture : a return to fundamentals / John Day.
* Table of contents for Patterns in network architecture : a return to fundamentals / John Day.
 
* Bibliographic record and links to related information available from the Library of Congress catalog.
Bibliographic record and links to related information available from the Library of Congress catalog.
* Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding. 
 
*
Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.  
* Preface. The Seven Unanswered Questions
Counter
* Chapter 1.Basic Concepts 1: A Theoretical Foundation
Preface. The Seven Unanswered Questions
* 0       Introduction
Chapter 1.Basic Concepts 1: A Theoretical Foundation
* 1       Beginning at the Beginning
0 Introduction
* 2       Levels of Abstraction
1 Beginning at the Beginning
* 3       Model
2 Levels of Abstraction
* 4       Service
3 Model
* 5       Protocol and Interface
4 Service
* 6       Implementation
5 Protocol and Interface
* 4.     Specifying Protocols
6 Implementation
* 4.1.   Informal Specifications
4. Specifying Protocols
* 4.2.   Formal Description Techniques
4.1. Informal Specifications
* 5.0     Where to From Here?
4.2. Formal Description Techniques
* Chapter 2. Basic Concepts: Protocol Elements
5.0 Where to From Here?
* 1. Introduction
Chapter 2. Basic Concepts: Protocol Elements
* 2. Protocol Architecture
1. Introduction
* 2.1. Elements of a Protocol
2. Protocol Architecture
* 2.1.1. Protocol
2.1. Elements of a Protocol
* 2.1.2. Associations, Connections, Flows and Bindings
2.1.1. Protocol
* 2.1.3. Interfaces
2.1.2. Associations, Connections, Flows and Bindings
* 2.1.4. Data Units
2.1.3. Interfaces
* 2.1.5. Constructing Protocols
2.1.4. Data Units
* 2.1.6. The Size of PDUs
2.1.5. Constructing Protocols
* 2.1.7. Mechanism and Policy
2.1.6. The Size of PDUs
* 2.1.8. QoS vs NoS
2.1.7. Mechanism and Policy
* 3. A Short Catalog of Data Transfer Mechanisms
2.1.8. QoS vs NoS
* 4. Phases of Operation
3. A Short Catalog of Data Transfer Mechanisms
* 4.1. The Enrollment Phase
4. Phases of Operation
* 4.2. The Establishment or Synchronization Phase
4.1. The Enrollment Phase
* 4.3. The Data Transfer Phase
4.2. The Establishment or Synchronization Phase
* 5.     Conclusions
4.3. The Data Transfer Phase
* Chapter 3 Basic Concepts: Patterns in Protocols
5. Conclusions
* 1. Introduction
Chapter 3 Basic Concepts: Patterns in Protocols
* 2.     The Two Major Architecture Paradigms
1. Introduction
* 2.1 The Layered Model
2. The Two Major Architecture Paradigms
* 2.2 The Beads on a String Model
2.1 The Layered Model
* 3.     The Connectionless/Connection Debate
2.2 The Beads on a String Model
* 3.1 Background
3. The Connectionless/Connection Debate
* 3.2 Looking for a Synthesis
3.1 Background
* 4. The Types of Mechanisms
3.2 Looking for a Synthesis
* 5. How Many PDUs in a Protocol?
4. The Types of Mechanisms
* 6. The Types of Protocols
5. How Many PDUs in a Protocol?
* 7. The Architecture of Data Transfer PMs
6. The Types of Protocols
* 8. Finding a Synthesis: The Hard Part.
7. The Architecture of Data Transfer PMs
* 9. Conclusions
8. Finding a Synthesis: The Hard Part.
* Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy
9. Conclusions
* Chapter 4: Stalking the Upper Layer Architecture
Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy
* 1. Introduction
  Chapter 4: Stalking the Upper Layer Architecture
* 2. A Bit of History
  1. Introduction
* 2.1. The Upper Layer(s) of the ARPANet
  2. A Bit of History
* 2.1.1. Early Elegance: Telnet, FTP, and RJE
  2.1. The Upper Layer(s) of the ARPANet
* 2.1.2. What Was Learned
  2.1.1. Early Elegance: Telnet, FTP, and RJE
* 2.2. The OSI Attempt or ?Green Side Up?  
  2.1.2. What Was Learned
* 2.2.1. Session, Presentation, and Application
  2.2. The OSI Attempt or ?Green Side Up?  
* 2.2.2. What Was Learned
  2.2.1. Session, Presentation, and Application
* 2.3     Network Management
  2.2.2. What Was Learned
* 2.4 HTTP and the Web
2.3 Network Management
* 2.5 Directory or Name Resolution Protocols
  2.4 HTTP and the Web
* 2.5.1 Name Resolution Systems
  2.5 Directory or Name Resolution Protocols
* 2.5.2 Name Resolution System Structures
  2.5.1 Name Resolution Systems
* 3. What Distinguishes the Upper Layers
  2.5.2 Name Resolution System Structures
* 3.1. Semantic Significance.
  3. What Distinguishes the Upper Layers
* 3.2. Location Independence
  3.1. Semantic Significance.
* 4.     Conclusions
  3.2. Location Independence
* Chapter 5: Background on Naming and Addressing
  4. Conclusions
* 1. Introduction
Chapter 5: Background on Naming and Addressing
* 2. Why do we need Naming and Addressing?
1. Introduction
* 3. How the Problem Arose
2. Why do we need Naming and Addressing?
* 4. Background on Naming and Addressing
3. How the Problem Arose
* 4.1. Foundations of Mathematics and Naming
4. Background on Naming and Addressing
* 4.2. Naming and Addressing in Telephony
4.1. Foundations of Mathematics and Naming
* 4.3. Naming in Operating Systems
4.2. Naming and Addressing in Telephony
* 4.4. X.25 and the ITU
4.3. Naming in Operating Systems
* 4.5. The Evolution of Addressing in the Internet: Early IP
4.4. X.25 and the ITU
* 4.6. OSI and NSAPs
4.5. The Evolution of Addressing in the Internet: Early IP
* 4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6
4.6. OSI and NSAPs
* 4.8. Addressing in IPv6  
4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6
* 4.8.1. The Various Address Types
4.8. Addressing in IPv6  
* 4.8.2. IPv6 Unicast Addresses
4.8.1. The Various Address Types
* 4.9. Looking Back over IPv6
4.8.2. IPv6 Unicast Addresses
* 4.10. "Upper Layer" or Application Addressing in OS
4.9. Looking Back over IPv6
* 4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet
4.10. "Upper Layer" or Application Addressing in OS
* 5. Conclusions or What Have We Learned
4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet
* Chapter 6: Basic Concepts: Layers
5. Conclusions or What Have We Learned
* 1. Introduction
Chapter 6: Basic Concepts: Layers
* 2. Putting Protocols Together  
1. Introduction
* 3. Listening to the Problem
2. Putting Protocols Together  
* 3.1 Introduction
3. Listening to the Problem
* 3.2. Communications within a Single System
3.1 Introduction
* 3.3. Communications between Two Systems
3.2. Communications within a Single System
* 3.4. Simultaneous Communications Between Two Systems
3.3. Communications between Two Systems
* 3.5. Communications with N Systems
3.4. Simultaneous Communications Between Two Systems
* 3.6 Communication with N Systems Cheaply
3.5. Communications with N Systems
* 3.7 Initial Conclusions
3.6 Communication with N Systems Cheaply
* 4. Taking Stock
3.7 Initial Conclusions
* 5. The Network IPC Architecture (NIPCA)
4. Taking Stock
* 6. Organizing Layers
5. The Network IPC Architecture (NIPCA)
* 7. Conclusions
6. Organizing Layers
* Chapter 7 A Recursive IPC Model of Networking
7. Conclusions
* 1. Introduction
Chapter 7 A Recursive IPC Model of Networking
* 2. Basic Structure
1. Introduction
* 2.1     Definitions
2. Basic Structure
* 2.2     Description of the Basic System
2.1 Definitions
* 2.2.1 Introduction
2.2 Description of the Basic System
* 2.2.2   Basic Structures and their Principles
2.2.1 Introduction
* 2.2.3   The Structure of Applications and Protocols
2.2.2 Basic Structures and their Principles
* 2.2.4   Application-Protocol-Machines
2.2.3 The Structure of Applications and Protocols
* 3.     Naming Concepts for (N)-DIFs and Applications
2.2.4 Application-Protocol-Machines
* 3.1     Definitions
3. Naming Concepts for (N)-DIFs and Applications
* 3.2     Application Naming
3.1 Definitions
* 4.0     The (N)-Distributed IPC Facility
3.2 Application Naming
* 4.1   Definitions
4.0 The (N)-Distributed IPC Facility
* 4.2   The (N)-IPC-Process
  4.1 Definitions
* 4.3The (N)-IPC-APM
  4.2 The (N)-IPC-Process
* 4.3.1   The IPC API
  4.3The (N)-IPC-APM
* 4.3.2   The EFCP Protocol
4.3.1 The IPC API
* 4.3.3   Relaying and Multiplexing Task (RMT)  
4.3.2 The EFCP Protocol
* 4.3.4   PDU Protection
4.3.3 Relaying and Multiplexing Task (RMT)  
* 4.4 The IPC Management Task
4.3.4 PDU Protection
* 4.4.1   (N)-IPC Access Protocol (IAP)
4.4 The IPC Management Task
* 4.4.2   Resource Information Exchange Protocol (RIEP)
4.4.1 (N)-IPC Access Protocol (IAP)
* 4.4.3 Resource Information Base
4.4.2 Resource Information Exchange Protocol (RIEP)
* 4.4.4 The IPC Management Task
4.4.3 Resource Information Base
* 4.5     Network Management Protocol and Management Architecture
4.4.4 The IPC Management Task
* 5.0     The Nature of Layers
4.5 Network Management Protocol and Management Architecture
* 6.0     Operation of the DIF
5.0 The Nature of Layers
* 6.1 Adding a new member to a (N)-DIF.  
6.0 Operation of the DIF
* 6.2 Creating a New DIF
6.1 Adding a new member to a (N)-DIF.  
* 6.3 Data Transfer
6.2 Creating a New DIF
* 7.0     Identifiers in a (N)-DIF
6.3 Data Transfer
* 7.1 The (N)-Port-id
7.0 Identifiers in a (N)-DIF
* 7.2 Application Process Names
7.1 The (N)-Port-id
* 7.3 (N)-Addreses
7.2 Application Process Names
* 7.4 Taking Stock
7.3 (N)-Addreses
* 8.0 IPC-Facilities
7.4 Taking Stock
* 8.1     IPC Structures
8.0 IPC-Facilities
* 8.2     Multiple (N)-DIFs of the Same Rank
8.1 IPC Structures
* 8.3 Implications for Security
8.2 Multiple (N)-DIFs of the Same Rank
* 9. Conclusion
8.3 Implications for Security
* Chapter 8 Making Addresses Topological
9. Conclusion
* 1. Introduction
Chapter 8 Making Addresses Topological
* 2. General Properties of Addressing
1. Introduction
* 2.1. Names and Addresses
2. General Properties of Addressing
* 3.     Introducing Topology to Addressing.
2.1. Names and Addresses
* 3.1Definitions
3. Introducing Topology to Addressing.
* 3.2. Topologies for Addressing
3.1Definitions
* 4. The Role of Hierarchy in Addressing
3.2. Topologies for Addressing
* 4.1. The Hierarchy of Layers
4. The Role of Hierarchy in Addressing
* 4.2. The Hierarchical Topology of Address Spaces
4.1. The Hierarchy of Layers
* 4.3. The Hierarchy of Networks
4.2. The Hierarchical Topology of Address Spaces
* 4.4 Melding Address Spaces and the Hierarchy of Layers
4.3. The Hierarchy of Networks
* 5. Hierarchical Addressing Architecture
4.4 Melding Address Spaces and the Hierarchy of Layers
* 5.1     Single Layer Address Topology
5. Hierarchical Addressing Architecture
* 5.2     Single Layer Hierarchical Address Topology
5.1 Single Layer Address Topology
* 5.3     Address Topology for a Hierarchy of Layers
5.2 Single Layer Hierarchical Address Topology
* 5.4     Addressing Topologies for Multiple Hierarchies of Layers.
5.3 Address Topology for a Hierarchy of Layers
* 5.5 Modeling the Public Internet
5.4 Addressing Topologies for Multiple Hierarchies of Layers.
* 6.0 Conclusion
5.5 Modeling the Public Internet
* Chapter 9 Considering Multihoming, Multicast and Mobility
6.0 Conclusion
* 1.     Introduction
Chapter 9 Considering Multihoming, Multicast and Mobility
* 2.     Multihoming
1. Introduction
* 3.     Multicast Architecture
2. Multihoming
* 3.1     Introduction to the Multicast Problem
3. Multicast Architecture
* 3.2     The Multicast Model
3.1 Introduction to the Multicast Problem
* 3.2     Multicast ?Addressing?
3.2 The Multicast Model
* 3.3     Multicast Distribution
3.2 Multicast ?Addressing?
* 3.4 Sentential Naming Operations and their Resolution
3.3 Multicast Distribution
* 3.4.1 Multicast Distribution in a Recursive Architecture
3.4 Sentential Naming Operations and their Resolution
* 3.4.2   Multiplexing multicast groups
3.4.1 Multicast Distribution in a Recursive Architecture
* 3.5     Reliable Multicast
3.4.2 Multiplexing multicast groups
* 4.0     Mobility
3.5 Reliable Multicast
* 4.1 Mobility in IP and Cellular Networks
4.0 Mobility
* 4.2 Mobility in NIPCA
4.1 Mobility in IP and Cellular Networks
* 4.3 Ad Hoc Mobile Networking
4.2 Mobility in NIPCA
* 4.4 Mobile Applications
4.3 Ad Hoc Mobile Networking
* 5. Conclusions
4.4 Mobile Applications
* Chapter 10 Taking Stock
5. Conclusions
* 1.     Introduction
Chapter 10 Taking Stock
* 2.     Consolidation and the Next Generation
1. Introduction
* 3.     How Did This Happen
2. Consolidation and the Next Generation
* 4.     The Importance of Theory
3. How Did This Happen
* 5.     Finding a New Path
4. The Importance of Theory
* 6.     The High Points
5. Finding a New Path
* Library of Congress Subject Headings for this publication:
6. The High Points
* Computer network architectures.
Library of Congress Subject Headings for this publication:
* Computer networks -- Design.
 
* Computer networks -- Philosophy.
Computer network architectures.
* Internet -- History.
Computer networks -- Design.
Computer networks -- Philosophy.
Internet -- History.

Edição das 01h49min de 10 de julho de 2014

[1] John Day, Patterns in Network Architecture: A Return to Fundamentals, Prentice Hall, 2008.


Luiz Cláudio

http://www.sourceinnovation.com.br/index.php/ETArch_Pilot#RINA

  • Índice do livro:
  • Table of contents for Patterns in network architecture : a return to fundamentals / John Day.
  • Bibliographic record and links to related information available from the Library of Congress catalog.
  • Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding. 
  • Preface. The Seven Unanswered Questions
  • Chapter 1.Basic Concepts 1: A Theoretical Foundation
  • 0 Introduction
  • 1 Beginning at the Beginning
  • 2 Levels of Abstraction
  • 3 Model
  • 4 Service
  • 5 Protocol and Interface
  • 6 Implementation
  • 4. Specifying Protocols
  • 4.1. Informal Specifications
  • 4.2. Formal Description Techniques
  • 5.0 Where to From Here?
  • Chapter 2. Basic Concepts: Protocol Elements
  • 1. Introduction
  • 2. Protocol Architecture
  • 2.1. Elements of a Protocol
  • 2.1.1. Protocol
  • 2.1.2. Associations, Connections, Flows and Bindings
  • 2.1.3. Interfaces
  • 2.1.4. Data Units
  • 2.1.5. Constructing Protocols
  • 2.1.6. The Size of PDUs
  • 2.1.7. Mechanism and Policy
  • 2.1.8. QoS vs NoS
  • 3. A Short Catalog of Data Transfer Mechanisms
  • 4. Phases of Operation
  • 4.1. The Enrollment Phase
  • 4.2. The Establishment or Synchronization Phase
  • 4.3. The Data Transfer Phase
  • 5. Conclusions
  • Chapter 3 Basic Concepts: Patterns in Protocols
  • 1. Introduction
  • 2. The Two Major Architecture Paradigms
  • 2.1 The Layered Model
  • 2.2 The Beads on a String Model
  • 3. The Connectionless/Connection Debate
  • 3.1 Background
  • 3.2 Looking for a Synthesis
  • 4. The Types of Mechanisms
  • 5. How Many PDUs in a Protocol?
  • 6. The Types of Protocols
  • 7. The Architecture of Data Transfer PMs
  • 8. Finding a Synthesis: The Hard Part.
  • 9. Conclusions
  • Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy
  • Chapter 4: Stalking the Upper Layer Architecture
  • 1. Introduction
  • 2. A Bit of History
  • 2.1. The Upper Layer(s) of the ARPANet
  • 2.1.1. Early Elegance: Telnet, FTP, and RJE
  • 2.1.2. What Was Learned
  • 2.2. The OSI Attempt or ?Green Side Up?
  • 2.2.1. Session, Presentation, and Application
  • 2.2.2. What Was Learned
  • 2.3 Network Management
  • 2.4 HTTP and the Web
  • 2.5 Directory or Name Resolution Protocols
  • 2.5.1 Name Resolution Systems
  • 2.5.2 Name Resolution System Structures
  • 3. What Distinguishes the Upper Layers
  • 3.1. Semantic Significance.
  • 3.2. Location Independence
  • 4. Conclusions
  • Chapter 5: Background on Naming and Addressing
  • 1. Introduction
  • 2. Why do we need Naming and Addressing?
  • 3. How the Problem Arose
  • 4. Background on Naming and Addressing
  • 4.1. Foundations of Mathematics and Naming
  • 4.2. Naming and Addressing in Telephony
  • 4.3. Naming in Operating Systems
  • 4.4. X.25 and the ITU
  • 4.5. The Evolution of Addressing in the Internet: Early IP
  • 4.6. OSI and NSAPs
  • 4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6
  • 4.8. Addressing in IPv6
  • 4.8.1. The Various Address Types
  • 4.8.2. IPv6 Unicast Addresses
  • 4.9. Looking Back over IPv6
  • 4.10. "Upper Layer" or Application Addressing in OS
  • 4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet
  • 5. Conclusions or What Have We Learned
  • Chapter 6: Basic Concepts: Layers
  • 1. Introduction
  • 2. Putting Protocols Together
  • 3. Listening to the Problem
  • 3.1 Introduction
  • 3.2. Communications within a Single System
  • 3.3. Communications between Two Systems
  • 3.4. Simultaneous Communications Between Two Systems
  • 3.5. Communications with N Systems
  • 3.6 Communication with N Systems Cheaply
  • 3.7 Initial Conclusions
  • 4. Taking Stock
  • 5. The Network IPC Architecture (NIPCA)
  • 6. Organizing Layers
  • 7. Conclusions
  • Chapter 7 A Recursive IPC Model of Networking
  • 1. Introduction
  • 2. Basic Structure
  • 2.1 Definitions
  • 2.2 Description of the Basic System
  • 2.2.1 Introduction
  • 2.2.2 Basic Structures and their Principles
  • 2.2.3 The Structure of Applications and Protocols
  • 2.2.4 Application-Protocol-Machines
  • 3. Naming Concepts for (N)-DIFs and Applications
  • 3.1 Definitions
  • 3.2 Application Naming
  • 4.0 The (N)-Distributed IPC Facility
  • 4.1 Definitions
  • 4.2 The (N)-IPC-Process
  • 4.3The (N)-IPC-APM
  • 4.3.1 The IPC API
  • 4.3.2 The EFCP Protocol
  • 4.3.3 Relaying and Multiplexing Task (RMT)
  • 4.3.4 PDU Protection
  • 4.4 The IPC Management Task
  • 4.4.1 (N)-IPC Access Protocol (IAP)
  • 4.4.2 Resource Information Exchange Protocol (RIEP)
  • 4.4.3 Resource Information Base
  • 4.4.4 The IPC Management Task
  • 4.5 Network Management Protocol and Management Architecture
  • 5.0 The Nature of Layers
  • 6.0 Operation of the DIF
  • 6.1 Adding a new member to a (N)-DIF.
  • 6.2 Creating a New DIF
  • 6.3 Data Transfer
  • 7.0 Identifiers in a (N)-DIF
  • 7.1 The (N)-Port-id
  • 7.2 Application Process Names
  • 7.3 (N)-Addreses
  • 7.4 Taking Stock
  • 8.0 IPC-Facilities
  • 8.1 IPC Structures
  • 8.2 Multiple (N)-DIFs of the Same Rank
  • 8.3 Implications for Security
  • 9. Conclusion
  • Chapter 8 Making Addresses Topological
  • 1. Introduction
  • 2. General Properties of Addressing
  • 2.1. Names and Addresses
  • 3. Introducing Topology to Addressing.
  • 3.1Definitions
  • 3.2. Topologies for Addressing
  • 4. The Role of Hierarchy in Addressing
  • 4.1. The Hierarchy of Layers
  • 4.2. The Hierarchical Topology of Address Spaces
  • 4.3. The Hierarchy of Networks
  • 4.4 Melding Address Spaces and the Hierarchy of Layers
  • 5. Hierarchical Addressing Architecture
  • 5.1 Single Layer Address Topology
  • 5.2 Single Layer Hierarchical Address Topology
  • 5.3 Address Topology for a Hierarchy of Layers
  • 5.4 Addressing Topologies for Multiple Hierarchies of Layers.
  • 5.5 Modeling the Public Internet
  • 6.0 Conclusion
  • Chapter 9 Considering Multihoming, Multicast and Mobility
  • 1. Introduction
  • 2. Multihoming
  • 3. Multicast Architecture
  • 3.1 Introduction to the Multicast Problem
  • 3.2 The Multicast Model
  • 3.2 Multicast ?Addressing?
  • 3.3 Multicast Distribution
  • 3.4 Sentential Naming Operations and their Resolution
  • 3.4.1 Multicast Distribution in a Recursive Architecture
  • 3.4.2 Multiplexing multicast groups
  • 3.5 Reliable Multicast
  • 4.0 Mobility
  • 4.1 Mobility in IP and Cellular Networks
  • 4.2 Mobility in NIPCA
  • 4.3 Ad Hoc Mobile Networking
  • 4.4 Mobile Applications
  • 5. Conclusions
  • Chapter 10 Taking Stock
  • 1. Introduction
  • 2. Consolidation and the Next Generation
  • 3. How Did This Happen
  • 4. The Importance of Theory
  • 5. Finding a New Path
  • 6. The High Points
  • Library of Congress Subject Headings for this publication:
  • Computer network architectures.
  • Computer networks -- Design.
  • Computer networks -- Philosophy.
  • Internet -- History.