[1] John Day, Patterns in Network Architecture: A Return to Fundamentals, Prentice Hall, 2008.


Luiz Cláudio



  • Índice do livro:
  • Table of contents for Patterns in network architecture : a return to fundamentals / John Day.
  • Bibliographic record and links to related information available from the Library of Congress catalog.
  • Note: 
    • Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding. 


  • Preface. The Seven Unanswered Questions
  • Chapter 1.Basic Concepts 1: A Theoretical Foundation
  • 0 Introduction
  • 1 Beginning at the Beginning
  • 2 Levels of Abstraction
  • 3 Model
  • 4 Service
  • 5 Protocol and Interface
  • 6 Implementation
  • 4. Specifying Protocols
    • 4.1. Informal Specifications
    • 4.2. Formal Description Techniques
  • 5.0 Where to From Here?


  • Chapter 2. Basic Concepts: Protocol Elements
  • 1. Introduction
  • 2. Protocol Architecture
    • 2.1. Elements of a Protocol
      • 2.1.1. Protocol
      • 2.1.2. Associations, Connections, Flows and Bindings
      • 2.1.3. Interfaces
      • 2.1.4. Data Units
      • 2.1.5. Constructing Protocols
      • 2.1.6. The Size of PDUs
      • 2.1.7. Mechanism and Policy
      • 2.1.8. QoS vs NoS
  • 3. A Short Catalog of Data Transfer Mechanisms
  • 4. Phases of Operation
    • 4.1. The Enrollment Phase
    • 4.2. The Establishment or Synchronization Phase
    • 4.3. The Data Transfer Phase
  • 5. Conclusions


  • Chapter 3 Basic Concepts: Patterns in Protocols
  • 1. Introduction
  • 2. The Two Major Architecture Paradigms
    • 2.1 The Layered Model
    • 2.2 The Beads on a String Model
  • 3. The Connectionless/Connection Debate
    • 3.1 Background
    • 3.2 Looking for a Synthesis
  • 4. The Types of Mechanisms
  • 5. How Many PDUs in a Protocol?
  • 6. The Types of Protocols
  • 7. The Architecture of Data Transfer PMs
  • 8. Finding a Synthesis: The Hard Part.
  • 9. Conclusions
  • Appendix - Outline for Gedanken Experiment on Separating Mechanism and Policy


  • Chapter 4: Stalking the Upper Layer Architecture
  • 1. Introduction
  • 2. A Bit of History
    • 2.1. The Upper Layer(s) of the ARPANet
      • 2.1.1. Early Elegance: Telnet, FTP, and RJE
      • 2.1.2. What Was Learned
    • 2.2. The OSI Attempt or ?Green Side Up?
      • 2.2.1. Session, Presentation, and Application
      • 2.2.2. What Was Learned
    • 2.3 Network Management
    • 2.4 HTTP and the Web
    • 2.5 Directory or Name Resolution Protocols
      • 2.5.1 Name Resolution Systems
      • 2.5.2 Name Resolution System Structures
  • 3. What Distinguishes the Upper Layers
    • 3.1. Semantic Significance.
    • 3.2. Location Independence
  • 4. Conclusions


  • Chapter 5: Background on Naming and Addressing
  • 1. Introduction
  • 2. Why do we need Naming and Addressing?
  • 3. How the Problem Arose
  • 4. Background on Naming and Addressing
    • 4.1. Foundations of Mathematics and Naming
    • 4.2. Naming and Addressing in Telephony
    • 4.3. Naming in Operating Systems
    • 4.4. X.25 and the ITU
    • 4.5. The Evolution of Addressing in the Internet: Early IP
    • 4.6. OSI and NSAPs
    • 4.7. The Continued Evolution of Addressing in the Internet: CIDR and IPv6
    • 4.8. Addressing in IPv6
      • 4.8.1. The Various Address Types
      • 4.8.2. IPv6 Unicast Addresses
    • 4.9. Looking Back over IPv6
    • 4.10. "Upper Layer" or Application Addressing in OS
    • 4.11. URI, URL, URN, etc. Upper Layer Addressing in the Internet
  • 5. Conclusions or What Have We Learned


  • Chapter 6: Basic Concepts: Layers
  • 1. Introduction
  • 2. Putting Protocols Together
  • 3. Listening to the Problem
    • 3.1 Introduction
    • 3.2. Communications within a Single System
    • 3.3. Communications between Two Systems
    • 3.4. Simultaneous Communications Between Two Systems
    • 3.5. Communications with N Systems
    • 3.6 Communication with N Systems Cheaply
    • 3.7 Initial Conclusions
  • 4. Taking Stock
  • 5. The Network IPC Architecture (NIPCA)
  • 6. Organizing Layers
  • 7. Conclusions


  • Chapter 7 A Recursive IPC Model of Networking
  • 1. Introduction
  • 2. Basic Structure
    • 2.1 Definitions
    • 2.2 Description of the Basic System
      • 2.2.1 Introduction
      • 2.2.2 Basic Structures and their Principles
      • 2.2.3 The Structure of Applications and Protocols
      • 2.2.4 Application-Protocol-Machines
  • 3. Naming Concepts for (N)-DIFs and Applications
    • 3.1 Definitions
    • 3.2 Application Naming
  • 4.0 The (N)-Distributed IPC Facility
    • 4.1 Definitions
    • 4.2 The (N)-IPC-Process
    • 4.3The (N)-IPC-APM
      • 4.3.1 The IPC API
      • 4.3.2 The EFCP Protocol
      • 4.3.3 Relaying and Multiplexing Task (RMT)
      • 4.3.4 PDU Protection
    • 4.4 The IPC Management Task
      • 4.4.1 (N)-IPC Access Protocol (IAP)
      • 4.4.2 Resource Information Exchange Protocol (RIEP)
      • 4.4.3 Resource Information Base
      • 4.4.4 The IPC Management Task
    • 4.5 Network Management Protocol and Management Architecture
  • 5.0 The Nature of Layers
  • 6.0 Operation of the DIF
    • 6.1 Adding a new member to a (N)-DIF.
    • 6.2 Creating a New DIF
    • 6.3 Data Transfer
  • 7.0 Identifiers in a (N)-DIF
    • 7.1 The (N)-Port-id
    • 7.2 Application Process Names
    • 7.3 (N)-Addreses
    • 7.4 Taking Stock
  • 8.0 IPC-Facilities
    • 8.1 IPC Structures
    • 8.2 Multiple (N)-DIFs of the Same Rank
    • 8.3 Implications for Security
  • 9. Conclusion


  • Chapter 8 Making Addresses Topological
  • 1. Introduction
  • 2. General Properties of Addressing
    • 2.1. Names and Addresses
  • 3. Introducing Topology to Addressing.
    • 3.1Definitions
    • 3.2. Topologies for Addressing
  • 4. The Role of Hierarchy in Addressing
    • 4.1. The Hierarchy of Layers
    • 4.2. The Hierarchical Topology of Address Spaces
    • 4.3. The Hierarchy of Networks
    • 4.4 Melding Address Spaces and the Hierarchy of Layers
  • 5. Hierarchical Addressing Architecture
    • 5.1 Single Layer Address Topology
    • 5.2 Single Layer Hierarchical Address Topology
    • 5.3 Address Topology for a Hierarchy of Layers
    • 5.4 Addressing Topologies for Multiple Hierarchies of Layers.
    • 5.5 Modeling the Public Internet
  • 6.0 Conclusion


  • Chapter 9 Considering Multihoming, Multicast and Mobility
  • 1. Introduction
  • 2. Multihoming
  • 3. Multicast Architecture
    • 3.1 Introduction to the Multicast Problem
    • 3.2 The Multicast Model
    • 3.2 Multicast ?Addressing?
    • 3.3 Multicast Distribution
    • 3.4 Sentential Naming Operations and their Resolution
      • 3.4.1 Multicast Distribution in a Recursive Architecture
      • 3.4.2 Multiplexing multicast groups
    • 3.5 Reliable Multicast
  • 4.0 Mobility
    • 4.1 Mobility in IP and Cellular Networks
    • 4.2 Mobility in NIPCA
    • 4.3 Ad Hoc Mobile Networking
    • 4.4 Mobile Applications
  • 5. Conclusions


  • Chapter 10 Taking Stock
  • 1. Introduction
  • 2. Consolidation and the Next Generation
  • 3. How Did This Happen
  • 4. The Importance of Theory
  • 5. Finding a New Path
  • 6. The High Points