Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Internet Technology Handbook Optimizing the IP Network
Mark A. Miller
A JOHN WILEY & SONS, INC., PUBLICATION
This Page Intentionally Left Blank
Internet Technology Handbook
This Page Intentionally Left Blank
Internet Technology Handbook Optimizing the IP Network
Mark A. Miller
A JOHN WILEY & SONS, INC., PUBLICATION
Copyright 0 2004 by Mark A. Miller. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 ofthe 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 1 1 1 River Street, Hoboken, NJ 07030, (201) 748-601 1, fax (201) 748-6008.
Limit of LiabilityiDisclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993 or fax 3 17-572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print, however, may not be available in electronic format.
Library of Congress CataIoging-in-Publication Data is available.
ISBN 0-471-48050-9
Printed in the United States of America.
I 0 9 8 7 6 5 4 3 2 1
To Boomeq our faithful sentry
This Page Intentionally Left Blank
Contents at a Glance Preface ................................................... xxvii
Part I . Introduction Chapter 1: The Challenge of the Internet . . . . . . . . . . . . . . . . . . . 1
Part II . Packet Transport Chapter 2: Analyzing the IP Network .................... 15 Chapter 3: Datagram Addressing and Delivery . . . . . . . . . . . . . . . 63 Chapter 4: Routing and Intranetwork Communication . . . . . . . 101
Chapter 6: The Next Generation: IPv6 ...................... 175 Chapter 7: Case Studies in Packet Transport . . . . . . . . . . . . . . . . . 273
Chapter 5: End-to-End Reliability ......................... 143
Part I11 -Application Support Chapter 8: Data Transport .............................. 381 Chapter 9: Converged Networks and Multimedia Transport . . . 425 Chapter 10: Case Studies in Application Support . . . . . . . . . . . . 491
Part IV . Network and Performance Management Chapter 11 : Network Management Architectures . . . . . . . . . . . . 623 Chapter 12: Network Management System Components . . . . . . 639 Chapter 13: CaseStudiesinNetworkandPdomanceManagement . 785
Part V . Reference Appendices Appendix A: Acronyms and Abbreviations . . . . . . . . . . . . . . . . . 871 Appendix B: Sources of Internet Information . . . . . . . . . . . . . . . 895 Appendix C: Addresses of Standards Organizations . . . . . . . . . . 907 Appendix D: Trademarks ................................ 913
Index ....................................................... 915
vii
This Page Intentionally Left Blank
Contents Preface .................................................................................................. xxvii
Chapter 1: The Challenge of the Internet .............................................. 1 1.1 A Brief History of the Internet ............................................................... 1
1.3 The Protocols ofthe Internet ................................................................. 8 1.4 Outline of This Book ........................................................................... 11
1.2 Governing and Documenting the Internet ............................................. 6
1.5 Looking Ahead ..................................................................................... 12 1.6 References ........................................................................................... 13
2.1 Standardizing Internetwork Architectures ........................................... 16 2.2 Connectionless vs . Connection-Oriented ............................................. 32 2.3 Internetwork Analysis .......................................................................... 34
2.6 References ........................................................................................... 61
3.2 Internetwork Addressing ...................................................................... 72 3.3 Address Resolution .............................................................................. 83 3.4 Workstation Booting and Configuration .............................................. 91
3.6 Looking Ahead ..................................................................................... 98 3.7 References ........................................................................................... 98 Chapter 4: Routing and Intranetwork Communication ................... 101 4.1 Datagram Routing .............................................................................. 101 4.2 Internet Control Message Protocol .................................................... 127 4.3 Intranetwork Tools: PING and TRACEROUTE ............................... 132
4.6 Looking Ahead ................................................................................... 140 4.7 References ......................................................................................... 140
5.1 The Host-to-Host Connection ............................................................ 143 5.2 Port Addresses ................................................................................... 146 5.3 User Datagram Protocol .................................................................... 150 5.4 Transmission Control Protocol .......................................................... 151
Chapter 2: Analyzing the IP Network ................................................... 15
2.4 Analyzing the ARPA Architecture ....................................................... 36 2.5 Looking Ahead ..................................................................................... 60
Chapter 3: Datagram Addressing and Delivery ................................... 63 3.1 Internet Protocol .................................................................................. 64
3.5 The Domain Name System .................................................................. 95
4.4 Internet Group Management Protocol ............................................... 134 4.5 Resource Reservation Protocol .......................................................... 136
Chapter 5: End-to-End Reliability ...................................................... 143
ix
X Contents
5.5 TCP Functions ................................................................................... 155 5.6 TCP Network Optimization ............................................................... 166 5.7 Stream Control Transport Protocol .................................................... 167 5.8 Looking Ahead ................................................................................... 173 5.9 References ......................................................................................... 173 Chapter 6: The Next Generation IPv6 ................................................ 175 6.1 IPng Development ............................................................................. 175 6.2 The IPv6 Header ................................................................................ 180 6.3 Extension Headers ............................................................................. 189 6.4 IPv6 Addressing ................................................................................. 202 6.5 Intranetwork Communication ............................................................ 219 6.6 Station Configuration ........................................................................ 225 6.7 Routing Enhancements ...................................................................... 237 6.8 Upper Layer Protocol and Host Issues .............................................. 242 6.9 IPv4 to IpV6 Transition Strategies ..................................................... 247
6.11 References ........................................................................................ 268 6.10 Looking Ahead ................................................................................. 268
Chapter 7: Case Studies in Packet Transport .................................... 273 7.1 Login to a Remote Host ..................................................................... 273 7.2 Fragmenting Long Messages ............................................................. 282 7.3 Duplicate IP Addresses ...................................................................... 287 7.4 Incorrect Address Mask ..................................................................... 295 7.5 Using ICMP Echo Messages ............................................................. 299 7.6 Misdirected Datagrams ...................................................................... 303 7.7 Using OSPF and BGP ........................................................................ 310 7.8 Examining BOOTP with UDP Transport ........................................... 327 7.9 Establishing and Terminating TCP Connections ............................... 332
7.11 Using the Finger User Information Protocoal .................................. 344 7.12 Optimizing the TCP Window Size ................................................... 349 7.13 Data Transport Using IPv6 .............................................................. 363 7.14 Looking Ahead ................................................................................. 380 7.15 References ....................................................................................... 380 Chapter 8: Data Transport .................................................................. 381 8.1 The Process/Application Connection ................................................ 381 8.2 File Transfers using TFTP ................................................................. 384 8.3 File Transfers using FTP ................................................................... 388 8.4 Terminal Emulation ........................................................................... 392 8.5 Electronic Mail .................................................................................. 396
7.10 Reset TCP Connection .................................................................... 339
Contents xi
8.6 NetBIOS ............................................................................................ 407 8.7 Hypertext Transfer Protocol .............................................................. 414 8.8 Looking Ahead ................................................................................... 422 8.9 References ......................................................................................... 422 Chapter 9: Converged Networks and Multimedia Transport .......... 425 9.1 Voice and Data Network Characteristics ........................................... 426 9.2 Converged Network Architecture and Applications ......................... 435 9.3 ARPA Protocols Supporting Converged Networks ........................... 439 9.4 Signaling Processes and Protocols .................................................... 456
9.6 The Voice over IP Packet ................................................................... 484
9.8 References ......................................................................................... 486 Chapter 10: Case Studies in Application Support ............................. 491
10.2 Collaborative Efforts of FTP, ARP, and TFTP ................................. 499
9.5 Quality of Service .............................................................................. 478
9.7 Looking Ahead ................................................................................... 486
10.1 Using TFTP ..................................................................................... 491
10.3 TCP/IP Incompatible Terminal Type ............................................... 513 10.4 Selecting the Proper Terminal Option for TELNET ........................ 520 10.5 TELNET over ATM ......................................................................... 532 10.6 SMTP Interoperability Problems ..................................................... 553 10.7 NetBIOS and TCP Interactions ........................................................ 559 10.8 Web Page Access Using HTTP ........................................................ 572 10.9 Measuring WAN Response Times ................................................... 584 10.10 Analyzing SIP Phone Connections ................................................ 605 10.1 1 Looking Ahead ............................................................................... 621 Chapter 11: Network Management Architectures ............................. 623 11.1 The Challenge of Network Management ......................................... 623 11.2 The System Being Managed ............................................................ 625 1 1.3 The OSI Network Management Model ............................................ 627 11.4 Elements ofa Network Management Architecture .......................... 630 11.5 The Internet Network Management Framework .............................. 632 1 1.6 Web-based Network Management ................................................... 636 11.7 Looking ehead ................................................................................. 638 1 1.8 References ........................................................................................ 638 Chapter 12: Network Management System Components ................. 639 12.1 The SMI Defined for SNMPv 1 ........................................................ 640 12.2 The MIB Defined for SNMPv1 ....................................................... 671 12.3 Remote Monitoring ( W O N ) MIB .................................................. 688 12.4 SNMP version 1 ............................................................................... 698
xii Contents
12.5 SNMP version 2 ............................................................................... 722 12.6 SNMP version 3 ............................................................................... 739
12.8 References ....................................................................................... 780 Chapter 13: Case Studies in Network and Performance Management ........................................................................................... 785 13.1 SNMPvl PDUs ................................................................................ 785
13.3 Using SNMPvl with UDP and IP .................................................... 804 13.4 Communicating Device and Link Status with Traps ....................... 812 13.5 Incompatible Private Enterprise MIBs ............................................ 816 13.6 Proper Handling of an Invalid Object Identifier (OD) ................... 820 13.7 Comparing TELNET and SNMP for Network Management ........... 823 13.8 Supporting the RMON MU3 with a Network Monitor .................... 838
13.10 Encrypting Management Information with SNMPv3 .................... 859
12.7 Looking Ahead ................................................................................. 779
13.2 Accessing a MIB .............................................................................. 800
13.9 Event Notification Using RMON .................................................... 848
13.11 Looking Back ................................................................................. 870
Appendix A: Acronyms and Abbreviations ........................................ 871
Appendix B: Sources of Internet Information ................................... 895
Appendix C: Addresses of Standards Organizations ......................... 907
Appendix D: 'kademarks .................................................................... 913
Index ....................................................................................................... 915
Table of Illustrations
Figure 1-1
Figure 1-2
Figure 1-3
Figure 1-4
Figure 1-5
Figure 1-6
Figure 2-1
Figure 2-2a
Figure 2-2b
Figure 2-3
Figure 2-4
Figure 2-5
Figure 2-6
Figure 2-7
Figure 2-8
Figure 2-9
Figure 2-10
Figure 2-1 1
Figure 2-12
Figure 2-13
Figure 2-14a
Internet Development Timeline
Internet Hosts
WWW Networks Growth
ARPA Core Protocols
ARPA Control, Routing, and Address Resolution Protocols
ARPA Multimedia Protocols
Traditional Distributed Processing
Local PC to Host Connection
Remote PC to Host Connection
Connectivity with Ethernet / IEEE 8023
Connectivity with Token Ring / IEEE 8025
Internetworking and Interoperability within the OSI Framework
Communications and Host Functions within the OSI Framework
Building a Frame for Transmission
Comparing a Repeater to OSI
Comparing a Bridge to OSI
Comparing a Router to OSI
Comparing a Gateway to OSI
Networks Connected with Gateways to Form an Internetwork
Comparing OSI and ARPA Models
Connection-oriented Network
X i i i
xiv Table of Illustrations
Figure 2-14b
Figure 2-1 5
Figure 2- 16
Figure 2- 17a
Figure 2- 17b
Figure 2- 17c
Figure 2- 18
Figure 2-19
Figure 3-la
Figure 3-lb
Figure 3-lc
Figure 3-ld
Figure 3-2
Figure 3-3
Figure 3-4
Figure 3-5
Figure 3-6a
Figure 3-6b
Figure 3-7a
Figure 3-7b
Figure 3-8a
Figure 3-8b
Connectionless Network
Layered Protocol Control Information within a Data Link Layer Frame
LAN and WAN Analysis
The Network Interface Connection
ARPA Network Interface Layer Protocols
The Internet Transmission Frame
EthernetlIEEE 802.3 Network with Novel1 NetWare and TCPnP
TCPAP over Frame Relay
The Internet Connection
ARPA Internet Layer Protocols
Internet Routing, Control, and Address Resolution Protocols
The Internet Transmission Frame and IP Header Position
Internet Protocol (IPv4) Header Format
P v 4 Address Formats
Network Address Translation Example
CIDR Addressing
Addressing Functions - Local Delivery
Addressing Functions - Remote Delivery
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP) Packet Formats
ATM Address Resolution Protocol (ATMARP) and Inverse ATM Address Resolution Protocol (InATMARP) Packet Formats
Bootstrap Protocol (BOOTP) Packet Format
Dynamic Host Configuration Protocol (DHCP) Message Format
Table of Illustrations xv
Figure 3-9
Figure 4- 1 a
Figure 4-lb
Figure 4-lc
Figure 4-ld
Figure 4-le
Figure 4-lf
Figure 4-2a
Figure 4-2b
Figure 4-2c
Figure 4-2d
Figure 4-2e
Figure 4-2f
Figure 4-2g
Figure 4-2h
Figure 4-2i
Figure 4-2j
Figure 4-2k
Figure 4-21
Figure 4-3
Figure 4 4 a
Figure 44b
Figure 4 4 c
Figure 4-4d
Domain Name System (DNS) Message Format
Routing Information Protocol (RIP) Packet Format
Routing Information Protocol Version 2 (RIPv2) Packet Format
Authenticated RIPv2 Packet Format
Update Header Location within the RIP and RIPv2 Packet
Update Request Header for RIP and RIPv2
Update Response and Acknowledge Headers for RIP and RIPv2
Open Shortest Path First (OSPF) Packet Header Format
OSPF Packet Header Authentication Field (Cryptographic Authentication)
OSPF Hello Packet Format
OSPF Database Description Packet Format
OSPF Link State Request Packet Format
OSPF Link State Update Packet Format
OSPF Link State Advertisement Header Format
OSPF Router Links Advertisement Packet Format
OSPF Network Links Advertisement Packet Format
OSPF Summary Links Advertisement Packet Format
OSPF External Links Advertisement Packet Format
OSPF Link State Acknowledgment Packet Format
EGP Message Format
BGP4 Message Header
BGP OPEN Message Format
BGP UPDATE Message Format
BGP NOTIFICATION Message Format
XVi Table of Illustrations
Figure 4 4 e
Figure 4-5
Figure 4-6
Figure 4-7
Figure 4-8
Figure 5-la
Figure 5-lb
Figure 5-lc
Table 5-1 a
Table 5-lb
Figure 5-2
Figure 5-3
Figure 5 4
Figure 5-5
Figure 5-6
Figure 5-7
Figure 5-8
Figure 5-9a
Figure 5-9b
Figure 5-10
Figure 5-1 1
Figure 5-12
Figure 5-13
Figure 5-14
BGP KEEPALIVE Message Format
Internet Control Message Protocol (ICMP) Message Formats
Internet Group Management Protocol (IGMP) Message Format
RSVP Protocol Operation
RSVP Message Format
The Host-to-Host Connection
ARPA Host-to-Host Layer Protocols
The Internet Transmission Frame and UDP/TCP Header Position
Port Assignments
Port Assignments (continued)
User Datagram Protocol (UDP) Header
UDP Pseudo Header
Transmission Control Protocol (TCP) Header
TCP Pseudo Header
TCP Data Retransmissions
TCP Data Transfer (Window Size Varying)
TCP Connection Establishment, Data Transfer, and Termination Events
TCP Connection State Diagram
TCP Connection States
An SCTP Association
Functional View of the SCTP Transport Service
SCTP Packet Format and Chunk Values
SCTP Data Chunk Format
SCTP INIT Chunk Format
Table of Nustrations
Figure 6-23 Authentication Header Format
Figure 6-1
Figure 6-2
Figure 6-3
Figure 6-4a
Figure 6-4b
Figure 6-5
Figure 6-6
Figure 6-7
Figure 6-8
Figure 6-9
Figure 6-10
Figure 6-1 1
Figure 6- 12
Figure 6-1 3
Figure 6- 14
Figure 6- 15
Figure 6-16
Figure 6-17
Figure 6- 18
Figure 6- 19a
Figure 6- 19b
Figure 6-20
Figure 6-21
Figure 6-22a
Figure 6-22b
Internet Transmission Frame with IPv6
IPv6 Header Format
Version Field
Traffic Class Field
Differentiated Services Field
Flow Label Field
Payload Length Field
Next Header Field
Next Header Field Operation
Hop Limit Field
Source Address Field
Destination Address Field
IPv6 Packet Format with Optional Extension Headers
TLV Encoded Options Format
Pad1 Option Format
PadN Option Format
Hop-by-Hop Options Header Format
Jumbo Payload Option Format
Destination Options Header Format
Routing Header Format
Routing Header Format (Type 0)
Routing Header Usage
Fragment Header Format
Original Packet Requiring Fragmentation
Fragment Packets
XVii
xviii Table of Illustrations
Figure 6-24
Figure 6-25
Figure 6-26
Figure 6-27
Figure 6-28
Figure 6-29
Figure 6-30
Figure 6-3 1
Figure 6-32
Figure 6-33
Figure 6-34
Figure 6-35
Figure 6-36
Figure 6-37
Figure 6-38
Figure 6-39
Figure 6-40
Figure 6-41
Figure 6-42
Figure 6-43
Figure 6-44
Figure 6-45
Figure 6-46
Figure 6-47
Figure 6-48
Encapsulating Security Payload Header Format
No Next Header Format
Unicast Addressing
Anycast Addressing
Multicast Addressing
IPv6 Addressing Architecture
Unicast Address without Internal Structure
Unicast Address with Subnet
IEEE EUI-64 Address
IEEE EUI-64 Address (Universal)
IEEE EUI-64 Address (Local)
IEEE EUI-64 Address (48- to 64-bit Compatibility)
IEEE EUI-64 Address (With Nonglobal Identifiers)
Unspecified Address
Loopback Address
Aggregatable Global Unicast Address
IPv4-Compatible IPv6 Address
IPv4-Mapped IPv6 Address
Unicast Link-Local Address
Unicast Site-Local Address
Testing Address
Subnet-Router Anycast Address (Required)
Multicast Address
ICMPv6, Multicast Listener Discovery, and Neighbor Discovery Messages
Path MTU Discovery
Table of Illustrations xix
Figure 6-49a
Figure 6-49b
Figure 6-50
Figure 6-5 1
Figure 6-52
Figure 6-53
Figure 6-54
Figure 6-55a
Figure 6-55b
Figure 6-56
Figure 6-57
Figure 6-58
Figure 6-59
Figure 6-60
Figure 6-61
Figure 6-62a
Figure 6-62b
Figure 6-63
Figure 6-64a
Figure 6-64b
Figure 6-65
Figure 6-66
Figure 6-67
Figure 6-68
Figure 6-69
Figure 6-70
The Stateless Autoconfiguration Process
The Stateless Autoconfiguration Process, continued
Ethernet Frame with IPv6 Packet
Link-Local Address for Ethernet
Ethernet Multicast Address Mapping
PPP Frame with IPv6 or IPV6CP Packet
Link-Local Address for PPP
Frame Relay Frame with IPv6 Packet
Frame Relay Address Field Formats
Link-Local Address for Frame Relay
NPng Packet Format
Route Table Entry Format
Next Hop RTE Format
OSPF for IPv6 Header
BGP-4 Message Header
Pseudo Header Position and Checksum Range
Pseudo Header for Use with IPv6
Dual IP Stack Architecture
Encapsulating IPv6 in IPv4
Decapsulating IPv6 from IPv4
Router-to-Router Configured Tunnel
Host-to-Router Configured Tunnel
IPv4-compatible IPv6 Address
Host-to-Host Automatic Tunnel
Router-to-Host Automatic Tunnel
Automatic Tunneling Combinations
XX Table of Illustrations
Figure 6-7 1 a
Figure 6-7 1 b
Figure 6-71c
Figure 6-7 Id
Figure 6-7 le
Figure 6-7 1 f
Figure 7-1
Figure 7-2
Figure 7-3
Figure 7-4
Figure 7-5
Figure 7-6
Figure 7-7
Figure 7-8
Figure 7-9
Figure 8- 1 a
Figure 8-lb
Figure 8-lc
Figure 8-2
Figure 8-3
Figure 8-4
Figure 8-5
Figure 8-6
Routing Example
Routing Example: IPv4 Datagram from H, to H, (via IPv4 Forwarding)
Routing Example: IPv4 Datagram from H, to H, (via IPv4 Forwarding)
Routing Example: IPv6 Packet fkom H, to H, (via Router-to-Host Tunnel)
Routing Example: IPv6 Packet from H, to H, (via Host-to-Host Automatic Tunnel)
Routing Example: IPv6 Packet from H, to H, (via Host-to-Router Configured Tunnel)
Login to Remote Host
IPv4 Fragments
Misdirected Datagram Topology
Router Communication Using OSPF and BGP
Booting Remote Bridge Using BOOTP
TCP Connection EstablishmentlTermination
TCP Connection Reset
Finger User Information Protocol Operation
Host-to-Host Connections via WAN Bridges
The Process/Application Connection
ARPA Process/Application Layer Protocols
The Internet Transmission Frame and Application Data Position
Trivial File Transfer Protocol (TFTP) Packet Formats
TFTP Connection, Data Transfer, and Termination
File Transfer Protocol (FTP) Model
TELNET Network Virtual Terminal Operation
Simple Mail Transfer Protocol (SMTP) Model
Table of Illustrations XXi
Figure 8-7a
Figure 8-7b
Figure 8-7c
Figure 8-8
Figure 8-9a
Figure 8-9b
Figure 8-9c
Figure 9-1
Figure 9-2
Figure 9-3
Figure 9-4
Figure 9-5
Figure 9-6
Figure 9-7
Figure 9-8
Figure 9-9
Figure 9- 10
Figure 9- 1 1
Figure 9-12
Figure 9-13
Figure 9-14
Figure 9-15
Figure 9- 16
Figure 9- 17
Figure 9-18
NetBIOS Name Service Header
NetBIOS Session Service Header
NetBIOS Datagram Header
TCP and NetBIOS Connection EstablishmentDisconnect Events
HTTP Communication with Single Connection
HTTP Communication with Intermediary Connection
HTTP Communication with Shortened RequestResponse Chain
Public Switched Telephone Network
Private Voice Network
Public Data Network
Private Data Network
Integrated Voicemata Network
Typical Voice and Data Network Growth Patterns
Voice over IP Network Elements
Voice over IP Protocols
IP Multicast Operation
Real-Time Transport Protocol (RTP) Message Header
Resource Reservation Protocol (RSVP) Operation
Resource Reservation Protocol (RSVP) Message Header
PSTN Call Processing and Protocol Flows
VoIP Call Processing and Protocol Flows
H.323 Components and Architecture
H.323 Related Protocols
SIP Agent and Server Communication
SIP-related Protocols
X x i i
Figure 9-19
Figure 9-20
Figure 9-21
Figure 9-22
Figure 9-23
Figure 9-24
Figure 9-25
Figure 10-1
Figure 10-2
Figure 10-3
Figure 10-4
Figure 10-5
Figure 10-6
Figure 10-7
Figure 10-8
Figure 10-9
Figure 10-10a
Figure 10-lob
Figure 10-1Oc
Figure 10-10d
Figure 11-1
Figure 11-2
Figure 11-3
Figure 11-4
Figure I1 -5
Figure 11-6
Table of Illustrations
SIP Call Signaling
SIP Call Setup Using Proxy Server
SIP Registration
SIP Call Setup Using Redirect Server
Decomposed Gateway Architecture
Sources of Delays with the VoIP Network
Voice over IP Packet Format
TFTP File Transfers
File Transfer of Bridge Boot Image
TCP/IP Incompatible Terminal 'Qpe
TELNET Access to IBM Using TN3270
TELNET Connection via ATM
Mail Delivery Incompatibilities
Workstation Communication Using NetBIOS
Web Page Access Using HTTP
Local and WAN Connections
SIP Phone-to-Phone Connection
SIP Control Message Flow
SIP Control Message Details
Voice over IP Packet Format with G.7 1 1 Encoded Audio Data
Evolution in Distributed Systems
The Scope of Network Management Systems
The WAN Bottleneck Challenge
OSI Network Management Functional Areas
Network Managed Agent Relationships
Network ManagerIAgent Realization
Table of Illustrations XXiii
Figure 11-7
Figure 11-8
Figure 12-1
Figure 12-2
Figure 12-3
Figure 12-4
Figure 12-5
Figure 12-6
Figure 12-7
Figure 12-8
Figure 12-9
Figure 12-10
Figure 12-11
Figure 12-12
Figure 12-13
Figure 12-14
Figure 12-15
Figure 12-16
Figure 12-17
Figure 12-18
Figure 12-19
Figure 12-20
Figure 12-21
Fimre 12-22
S N M P Architecture (81990, IEEE)
Web-based Management Architecture
Internal and External Data Representations
BER Bit Ordering, as Defined in IS0 8825-1
Type-Length-Value (TLV) Encoding
Type Field Encoding as Defined in IS0 8825-1
Length Field Encoding
Encoding for the INTEGER Type, Value = “75”
Encoding for the OCTET STRING Type, Value = “BBM’
Encoding for OBJECT IDENTIFIER Type, Value = { 1.3.6.1.2.1.1 }
Encoding for the NULL Type, Value = NULL
Encoding for the SEQUENCE Type, a Variable Binding (VarBind)
Encoding for the IpAddress Type, Value = “128.150.161.8”
Encoding for the Counter Type, Value = “1 901 05”
Encoding for the Gauge Type, Value = “32”
Encoding for the TimeTicks Type, Value = “263691156”
Encoding for the Context-specific Types Used with SNMP
The Root Node and ITU-T-assigned OBJECT IDENTIFIER Component Values
The Root Node and ISO-assigned OBJECT IDENTIFIER Component Values
Internet-assigned OBJECT IDENTIFIER Component Values
The Internet OID Tree
The System Group
The Interfaces Group
The Address Translation Grouu ”
xxiv Table of Illustrations
Figure 12-23 The IP Group
Figure 12-24 The ICMP Group
Figure 12-25 The TCP Group
Figure 12-26 The UDP Group
Figure 12-27 The EGP Group
Figure 12-28 The Transmission Group
Figure 12-29 The SNMP Group
Figure 12-30
Figure 12-3 1
Figure 12-32
Figure 12-33
Figure 12-34
Figure 12-35
Figure 12-36a RMON2 OID Tree
Figure 12-36b RMON2 OID Tree, Continued
Figure 12-36c RMON2 OID Tree, Continued
Figure 12-37a Comparing the SNMP Architecture with the OSI and ARPA Models
Figure 1 2-3 7b Application-to-application Connection
Figure 12-38 SNMP Architecture
Figure 12-39 Network Management Relationships
Figure 1240a The IP Address Table within the OID Tree
Figure 1240b Object Instance in the IP Address Tables
Figure 1241 SNMP Message within a Transmission Frame
Figure 12-42 The SNMP GeRequest, GetNextRequest, GetResponse, and SetRequest PDU Structures
Figure 1243 GetRequesVGetResponse PDU Transmission (with No Errors)
Single Segment Network Monitoring
Distributed Segment Network Monitoring Using RMON
RMON MIB Position in the Internet OID Tree
The Ethernet RMON MIB
The Token Ring RMON MIB
RMONl and RMON2 Object Trees
Table of Illustrations xxv
Figure 12-44 GetNextRequestlGetResponse PDU Transmission
Figure 12-45 SetRequestlGetResponse PDU Transmission (with No Errors)
Figure 12-46 SNMP Trap PDU Structure
(with No Errors)
Figure 12-47
Figure 12-48
Figure 12-49
Figure 12-50
Figure 12-51a
Figure 12-51b
Figure 12-52
Figure 12-53
Trap PDU Operation
TLV Encoding of a (non-Trap) SNMP PDU
SNMPv2 Elements within the OID Tree
SNMPv2 PDU Structure
The system and snmp Groups Implemented for SNMPv2
The snmpMIl3 Group for SNMPv2
SNMPvl/SNMPv2 Proxy Agent Operation
SNMPv 1, SNMPv2, and SNMPv3
Figure 12-54 SNMPv3 Document Set
Figure 12-55
Figure 12-56
Figure 12-57 SNMPv3 Security Subsystem
Figure 12-58
Figure 12-59a SNMPv3 Manager
Figure 12-59b SNMPv3 Agent
Figure 12-60a Command Generator Scenario
Figure 12-60b Command Responder Scenario
Figure 12-61 SNMP Message Format
Figure 12-62
Figure 12-63
Figure 12-64
SNMPv3 Entity and its Components
SNMPv3 Message Processing Subsystem
SNMPv3 Access Control Subsystem
SNMP Framework MIB Module
SNMP Message Processing and Dispatching ME3 Module
SNMP Target ME3 Module
xxvi Table of Illustrations
Figure 12-65
Figure 12-66
Figure 12-67
Figure 12-68
Figure 12-69
Figure 13-1
Figure 13-2
Figure 13-3
Figure 13-4
Figure 13-5
Figure 13-6
Figure 13-7
Figure 13-8
Figure 13-9
Figure 13-10
SNMP Notification MIB Module
SNMP Proxy MU3 Module
SNMP User-based Security Model MIB Module
SNMP View-based Access Control Model MIB Module
SNMP Community MIB Module
SNMPvl Traps from a Network Analyzer
Expansion of the SNMP GetRequest PDU within an Ethernet Frame
Communicating Device and Link Status Information
Incompatible Private Enterprise MIBs
Invalid Object Identifier (OD)
Remote Device Configuration Using TELNET and SNMP
Retrieving Remote Information Using the RMON MIB
RMON Event Notification
SNMPv3 Agenmanager Interaction
SNMPv3 Message Format for User-Based Security Model (USM) with Encryption
Preface
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fun- damental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it - how many other worldwide systems do we have today that have been serving us for several decades, and in much the same form? This is a true credit to the original architects of the Internet, as they clearly took the time to do their homework and designed a very solid system that benefits millions of us everyday.
But all systems require a tuneup or remodeling job over time, and the Internet is no exception. In the last few years we have seen the explosive growth of the World Wide Web, and the transport of multimedia signals, such as voice and video, over the Internet. As a result, new protocols to support real-time traffic have been developed. We have also seen the growth of elec- tronic commerce, which has brought issues of network security to the fore- front. And perhaps the biggest issue of all - the overall growth of the Internet - has inspired the development of a new protocol called Internet Protocol version 6, or IPv6, that addresses all three of the above challenges: multime- dia support, enhanced security, and addressing shortages.
These and many other issues are addressed in this book. My objec- tive has been to provide a comprehensive foundation of information that ex- plains the underlying protocols of the Internet, such as the Transmission Control Protocol (TCP) and the Internet Protocol (IP), while still looking forward to newer technologies such as Voice over Internet Protocol (Vow).
In working towards that objective, I had the support of a great team. My technical editor, Dr. John Thompson, made many constructive comments on the manuscript, and my copy editor, Annette Devlin, made sure that no grammatical rules were violated in the process. My assistant, Donna Mullen, produced all of the figures in the book, researched the appendices, and handled the final layout. My colleagues at John Wiley & Sons, George Telecki and Brendan Codey, provided great logistical support. And I would be remiss not to mention my support from the home front: Holly, Nathan, and Nicholas, with assistance from Boomer and Baron.
xxvii
xxviii Preface
I trust that you will find the information in this text to be helpful. Drop me a note if you have any comments or suggestions for the next edition.
[email protected] March 2004