Patterns in Network Architecture: A Return to Fundamentals

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

I was involved in the design of the ARPAnet Protocols and worked on Internet protocols. For about a year I was the chair of of the ISO Presentation Layer committee. I have a lot of first-hand experience with where we are today and how we got here.I've just finished "Patterns in Network Architecture" and I'm impressed. While there are many things to argue over, the architecture Day describes sounds like it should work, and if it does work should be a vast improvement over the current ramshackle protocol structure. I haven't really done the hard work necessary to figure out if it really will work, and I don't expect to. And we know that the devil is always in the details. But I hope to hear sometime that an implementation has succeeded.Like many others in the field, John has strong opinions and axes to grind. Rather than a shortcoming, however, I think his strong opinions and sarcastic wit are a benefit; any reader can see clearly where John is coming from and can research the "other side" if it seems important.On page 79, Day writes:"... two types of protocols tend to alternate in architectures. The MAC layer does relaying and multiplexing, the data link layer does "end-to-end" error control; the network layer relays, the transport layer does end-to-end error control; mail protocols relay, hmm no end-to-end error control and sometimes mail is lost. ...we can make two observations:1. Relaying always creates the opportunity for PDUs to be lost. Therefore, to guarantee reliability, there must always be an error-control protocol on top of a relaying protocol.2. This would seem to indicate that there are really only three fundamental types of protocols:- Two data transfer protocols: Relaying and multiplexing protocols and error- and flow-control protocols with different policies- Application protocols"The rest of the book goes on to develop these thoughts, which in my view is a real breakthrough in clarity.This book ought to be used as a textbook! It is highly recommended to everyone working in the field. If only there weren't so many distracting editorial errors.

Author(s): John Day
Publisher: Prentice Hall
Year: 2008

Language: English
Pages: 462

Patterns in Network Architecture: A Return to Fundamentals......Page 1
Contents......Page 8
Preface: The Seven Unanswered Questions......Page 14
Introduction......Page 34
Beginning at the Beginning......Page 37
Levels of Abstraction......Page 40
Model......Page 43
Service......Page 44
Protocol and Interface......Page 47
Informal Specifications......Page 48
Formal Description Techniques......Page 49
Where to from Here......Page 52
Protocol Architecture......Page 56
Elements of a Protocol......Page 57
Data Units......Page 64
Constructing Protocol......Page 69
The Size of PDUs......Page 71
Mechanism and Policy......Page 72
QoS Versus NoS......Page 76
A Short Catalog of Data Transfer Mechanisms......Page 77
Initial State Synchronization......Page 78
Policy Selection......Page 79
Relaying......Page 80
Combining/Separation......Page 81
Data Corruption......Page 82
Retransmission Control or Acknowledgment......Page 83
Authentication......Page 84
Activity......Page 85
The Enrollment Phase......Page 86
The Data Transfer Phase......Page 88
Conclusions......Page 89
Introduction......Page 90
The Layered Model......Page 93
The Beads-on-a-String Model......Page 95
Background......Page 99
Finding for a Synthesis: The Easy Part......Page 105
The Types of Mechanisms......Page 108
How Many PDUs in a Protocol?......Page 109
The Types of Protocols......Page 111
The Architecture of Data Transfer PMs......Page 115
Finding a Synthesis: The Hard Part......Page 118
Conclusions......Page 127
Introduction......Page 130
The Upper Layer(s) of the ARPANET......Page 132
The OSI Attempt or “Green Side Up”......Page 143
Network Management......Page 156
HTTP and the Web......Page 162
Directory- or Name-Resolution Protocols......Page 165
What Distinguishes the Upper Layers......Page 169
Semantic Significance......Page 170
Location Independence......Page 171
Conclusions......Page 173
Introduction......Page 174
Why Do We Need Naming and Addressing?......Page 175
How the Problem Arose......Page 176
Foundations of Mathematics and Naming......Page 179
Naming and Addressing in Telephony......Page 184
Naming in Operating Systems......Page 185
The Evolution of Addressing in the Internet: Early IP......Page 187
OSI and NSAPs......Page 194
Addressing in IPv6......Page 201
Looking Back over IPv6......Page 207
“Upper-Layer” or Application Addressing in OSI......Page 211
URI, URL, URN, and So On: Upper-Layer Addressing in the Internet......Page 215
Conclusions......Page 216
Introduction......Page 218
What We Have Seen......Page 219
Introduction......Page 225
Communications Within a Single System......Page 227
Communications Between Two Systems......Page 232
Invalidated Assumptions......Page 236
New Elements Required......Page 237
Simultaneous Communications Between Two Systems......Page 238
Communications with N Systems......Page 243
Communication with N Systems on the Cheap......Page 247
Initial Conclusions......Page 252
Taking Stock......Page 256
The Network IPC Architecture (NIPCA)......Page 258
Organizing Layers......Page 261
Conclusions......Page 265
Introduction......Page 268
Definitions......Page 270
Description of the Basic System......Page 272
Definitions......Page 278
Definitions......Page 281
The (N)-IPC-Process......Page 283
The (N)-IPC-APM......Page 284
The IPC Management Task......Page 293
Network Management Protocol and Management Architecture......Page 296
The Nature of Layers......Page 297
Adding a New Member to an (N)-DIF......Page 299
Creating a New DIF......Page 301
Data Transfer......Page 302
Identifiers in an (N)-DIF......Page 304
The (N)-Port-ID......Page 305
(N)-Addresses......Page 306
IPC Structures......Page 310
Multiple (N)-DIFs of the Same Rank......Page 311
Implications for Security......Page 312
Conclusions......Page 314
Introduction......Page 316
Names and Addresses......Page 319
Definitions......Page 322
Topologies for Addressing......Page 326
The Role of Hierarchy in Addressing......Page 330
The Hierarchy of Layers......Page 331
The Hierarchical Topology of Address Spaces......Page 332
The Hierarchy of Networks......Page 334
Melding Address Spaces and the Hierarchy of Layers......Page 337
Hierarchical Addressing Architecture......Page 340
Single-Layer Hierarchical Address Topology......Page 341
Address Topology for a Hierarchy of Layers......Page 343
Addressing Topologies for Multiple Hierarchies of Layers......Page 346
Modeling the Public Internet......Page 347
Conclusions......Page 349
Introduction......Page 350
Multihoming......Page 351
Introduction to the Multicast Problem......Page 356
The Multicast Model......Page 359
Multicast “Addressing”......Page 360
Multicast Distribution......Page 362
Sentential Naming Operations and Their Resolution......Page 363
Multicast Distribution in a Recursive Architecture......Page 364
Multiplexing Multicast Groups......Page 366
Reliable Multicast......Page 367
Mobility......Page 371
Mobility in IP and Cellular Networks......Page 372
Mobility in NIPCA......Page 375
Ad Hoc Mobile Networking......Page 379
Mobile Application Processes......Page 380
Conclusions......Page 382
Introduction......Page 384
Consolidation and the Next Generation......Page 385
How Did This Happen?......Page 395
The Importance of Theory......Page 401
Finding a New Path......Page 406
The High Points......Page 408
Part I: Service Definitions......Page 418
Part II: Protocol Specifications......Page 419
Part III: Mechanism Specifications......Page 420
Bibliography......Page 422
A......Page 432
C......Page 435
D......Page 437
E......Page 439
G......Page 440
H......Page 441
I......Page 442
L......Page 443
M......Page 445
N......Page 446
O......Page 451
P......Page 452
Q-R......Page 456
S......Page 457
T......Page 459
U......Page 461
X-Y-Z......Page 462