PART ONE Architecture and Core Protocols CHAPTER 1 Introduction to TCP/IP-History,Architecture and Standards 1.1 Internet History-Where It All Came From 1.1.1 Internetworks 1.1.2 The Internet 1.1.3 ARPANET 1.1.4 NSFNET 1.1.5 Commercial Use of the Internet 1.1.6 Information Superhighway 1.1.7 Internet2 1.1.8 The Open Systems Interconnect(OSI)Model 1.2 TCP/IP Architectural Model-What It Is All About 1.2.1 Internetworking 1.2.2 The TCP/IP Protocol Stack 1.2.3 TCP/IP Applications 1.2.4 Bridges,Routers and Gateways 1.3 Finding Standards for TCP/IP and the Internet 1.3.1 Request For Comments(RFC) 1.3.2 Internet Standards 1.3.3 Major Internet Protocols 1.4 Future of the Internet 1.5 IBM and the Internet 1.5.1 The Network Computing Framework CHAPTER 2 Internetworking and Transport Layer Protocols 2.1 Internet Protocol(IP) 2.1.1 IP Addressing 2.1.2 IP Subnets 2.1.3 IP Routing 2.1.4 Methods of Delivery-Unicast,Broadcast,Multicast and Anycast 2.1.5 The IP Address Exhaustion Problem 2.1.6 Intranets(Private IP Addresses) 2.1.7 Classless Inter-Domain Routing(CIDR) 2.1.8 IP Datagram 2.2 Internet Control Message Protocol(ICMP) 2.2.1 ICMP Messages 2.2.2 ICMP Applications 2.3 Internet Group Management Protocol(IGMP) 2.4 Address Resolution Protocol(ARP) 2.4.1 ARP Overview 2.4.2 ARP Detailed Concept 2.4.3 ARP and Subnets 2.4.4 Proxy-ARP or Transparent Subnetting 2.5 Reverse Address Resolution Protocol(RARP) 2.5.1 RARP Concept 2.6 Ports and Sockets 2.6.1 Ports 2.6.2 Sockets 2.7 User Datagram Protocol(UDP) 2.7.1 UDP Datagram Format 2.7.2 UDP Application Programming Interface 2.8 Transmission Control Protocol(TCP) 2.8.1 TCP Concept 2.8.2 TCP Application Programming Interface 2.8.3 TCP Congestion Control Algorithms 2.9 References CHAPTER 3 Routing Protocols 3.1 Basic IP Routing 3.1.1 Routing Processes 3.1.2 Autonomous Systmes 3.2 Routing Algorithms 3.2.1 Static Routing 3.2.2 Distance Vector Routing 3.2.3 Link State Routing 3.3 Interior Gateway Protocols(IGP) 3.3.1 Routing Information Protocol(RIP) 3.3.2 Routing Information Protocol Version 2(RIP-2) 3.3.3 RIPng for IPv6 3.3.4 Open Shortest Path First(OSPF) 3.4 Exterior Routing Protocols 3.4.1 Exterior Gateway Protocol(EGP) 3.4.2 Border Gateway Protocol(BGP-4) 3.5 References CHAPTER 4 Application Protocols 4.1 Characteristics of Applications 4.1.1 Client/Server Model 4.2 Domain Name System(DNS) 4.2.1 The Hierarchical Namespace 4.2.2 Fully Qualified Domain Names(FQDNs) 4.2.3 Generic Domains 4.2.4 Country Domains 4.2.5 Mapping Domain Names to IP Addresses 4.2.6 Mapping IP Addresses to Domain Names-Pointer Queries 4.2.7 The Distributed Name Space 4.2.8 Domain Name Resolution 4.2.9 Domain Name System Resource Records 4.2.10 Domain Name System Messages 4.2.11 A Simple Scenario 4.2.12 Extended scenario 4.2.13 Transport 4.2.14 DNS Applications 4.2.15 References 4.3 TELNET 4.3.1 TELNET Operation 4.3.2 Terminal Emulation(Telnet 3270) 4.3.3 TN3270 Enhancements(TN3270E) 4.3.4 References 4.4 File Transfer Protocol(FTP) 4.4.1 Overview of FTP 4.4.2 FTP Operations 4.4.3 Reply Codes 4.4.4 FTP Scenario 4.4.5 A Sample FTP Session 4.4.6 Anonymous FTP 4.4.7 Remote Job Entry Using FTP 4.5 Trivial File Transfer Protocol(TFTP) 4.5.1 FTFP Usage 4.5.2 Protocol Description 4.5.3 TFTP Multicast Option 4.5.4 Security Issue 4.6 Remote Execution Command Protocol(REXEC and RSH) 4.6.1 Principle of Operation 4.7 Simple Mail Transfer Protocol(SMTP) 4.7.1 How SMTP Works 4.7.2 SMTP and the Domain Name System 4.7.3 References 4.8 Multipurpose Internet Mail Extensions(MIME) 4.8.1 How MIME Works 4.8.2 The Content-Type Field 4.8.3 The Content-Transfer-Encoding Field 4.8.4 Using Non-ASCII Characters in Message Headers 4.8.5 References 4.9 Post Office Protocol(POP) 4.9.1 POP3 Commands and Responses 4.9.2 References 4.10 Internet Message Access Protocol Version 4(IMAP4) 4.10.1 IMAP4 Underlying Electronic Mail Models 4.10.2 IMAP4 Commands and Responses 4.10.3 Message Numbers 4.10.4 IMAP4 States 4.10.5 Client Commands 4.10.6 References 4.11 Network Management 4.11.1 Standards 4.11.2 Bootstrap Protocol(BOOTP) 4.11.3 Structure and Identification of Management Information(SMI) 4.11.4 Management Information Base(MIB) 4.11.5 Simple Network Management Protocol(SNMP) 4.11.6 Simple Network Management Protocol Version 2(SNMPv2) 4.11.7 MIB for SNMPv2 4.11.8 Single Authentication and Privacy Protocol 4.11.9 The New Administrative Model 4.11.10 Simple Network Management Protocol Version 3(SNMPv3) 4.11.11 References 4.12 Remote Printing(LPR and LPD) 4.13 Network File System(NFS) 4.13.1 NFS Concept 4.13.2 WebNFS 4.13.3 References 4.14 X Window System 4.14.1 Functional Concept 4.14.2 Protocol 4.15 Finger Protocol 4.16 NETSTAT 4.17 Network Information System(NIS) 4.18 NetBIOS over TCP/IP 4.18.1 NetBIOS over TCP/IP in IBM OS/2 Warp 4 4.18.2 NetBIOS over TCP/IP in Microsoft Windows Systems 4.18.3 NetBIOS Name Server(NBNS)Implementations 4.19 Application Programming Interfaces(APIs) 4.19.1 The Socket API 4.19.2 Remote Procedure Call(RPC) 4.19.3 Windows sockets Version 2(Winsock V2.0) 4.19.4 SNMP Distributed Programming Interface(SNMP DPI) 4.19.5 FTP API 4.19.6 CICS Socket Interface 4.19.7 IMS Socket Interface 4.19.8 Sockets Extended 4.19.9 REXX Sockets PART TWO Special Purpose Protocols and New Technologies CHAPTER 5 TCP/IP Security Overview 5.1 Security Exposures and Solutions 5.1.1 Common Attacks Against Security 5.1.2 Solutions to Network Security Problems 5.1.3 Implementations of Security Solutions 5.1.4 Network Security Policy 5.2 A Short Introduction to Cryptography 5.2.1 Terminology 5.2.2 symmetric or Secret-Key Algorithms 5.2.3 Asymmetric or Public-Key Algorithms 5.2.4 Hash Functions 5.2.5 digital Certificates and Certification Authorities 5.2.6 Random-Number Generators 5.2.7 Export/Import Restrictions on Cryptography 5.3 Firewalls 5.3.1 Firewall Concept 5.3.2 Components of A Firewall System 5.3.3 Packet-Filtering Router 5.3.4 Application Level Gateway(Proxy) 5.3.5 Circuit Level Gateway 5.3.6 Firewall Examples 5.4 Network Address Translation(NAT) 5.4.1 NAT Concept 5.4.2 Translation Mechanism 5.4.3 NAT Limitations 5.5 The IP Security Architecture(IPSec) 5.5.1 Concepts 5.5.2 Authentication Header(AH) 5.5.3 Encapsulating Security Payload(ESP) 5.5.4 Combining IPSec Protocols 5.5.5 The Internet Key Exchange Protocol(IKE) 5.5.6 References 5.6 SOCKS 5.6.1 SOCKS Version 5(SOCKSv5) 5.7 Secure Sockets Layer(SSL) 5.7.1 SSL Overview 5.7.2 SSL Protocol 5.8 Transport Layer Security(TLS) 5.9 Secure Multipurpose Internet Mail Extension(S-MIME) 5.10 Virtural Private Networks(VPN)Overview 5.10.1 VPN Introduction and Benefits 5.11 Kerberos Authentication and Authorization System 5.11.1 Assumptions 5.11.2 Naming 5.11.3 Kerberos Authentication Process 5.11.4 Kerberos Database Management 5.11.5 Kerberos Authorization Model 5.11.6 Kerberos Version 5 Enhancements 5.12 Remote Access Authentication Protocols 5.13 Layer 2 Tunneling Protocol(L2TP) 5.13.1 Terminology 5.13.2 Protocol Overview 5.13.3 L2TP Security Issues 5.14 Secure Electronic Transactions(SET) 5.14.1 SET Roles 5.14.2 SET Transactions 5.14.3 The SET Certificate Scheme 5.15 References CHAPTER 6 IP Version 6 6.1 IPv6 Overview 6.2 The IPv6 Header Format 6.2.1 Packet Sizes 6.2.2 Extension Headers 6.2.3 IPv6 Addressing 6.2.4 Priority 6.2.5 Flow Labels 6.3 Internet Control Message Protocol Version 6(ICMPv6) 6.3.1 Neighbor Discovery 6.3.2 Stateless Address Autoconfiguration 6.3.3 Multicast Listener Discovery(MLD) 6.4 DNS in IPv6 6.4.1 Format of IPv6 Resource Records 6.5 DHCP in IPv6 6.5.1 Differences between DHCPv6 and DHCPv4 6.5.2 DHCPv6 Messages 6.6 Mobility Support in IPv6 6.7 Internet Transition-Migrating from IPv4 to IPv6 6.7.1 Dual IP Stack Implementation-The IPv6/IPv4 Node 6.7.2 Tunneling 6.7.3 Header Translation 6.7.4 Interoperability Summary 6.8 The Drive Towards IPv6 6.9 References CHAPTER 7 Dynamic IP,Mobile IP and Network Computers 7.1 Bootstrap Protocol(BOOTP) 7.1.1 BOOTP Forwarding 7.1.2 BOOTP Considerations 7.2 Dynamic Host Configuration Protocol(DHCP) 7.2.1 The DHCP Message Types 7.2.2 Allocating a New Network Address 7.2.3 DHCP Lease Renewal Process 7.2.4 Reusing a Previously Allocated Network Address 7.2.5 Configuration Parameters Repository 7.2.6 DHCP Considerations 7.2.7 DHCP Considerations 7.2.8 BOOTP and DHCP Interoperability 7.3 Dynamic Domain Name System 7.3.1 The UPDATE DNS Message Format 7.3.2 IBM’s Implementation of DDNS 7.3.3 Proxy A Record Update(ProxyArec) 7.4 Mobile IP 7.4.1 Mobile IP Overview 7.4.2 Mobile IP Operation 7.4.3 Mobility Agent Advertisement Extemsions 7.4.4 Mobile IP Registration Process 7.4.5 Tunneling 7.4.6 Broadcast Datagrams 7.4.7 Move Detection 7.4.8 ARP Considerations 7.4.9 Mobile IP Security Considerations 7.5 IP Masquerading 7.6 The Network Computer 7.7 References CHAPTER 8 Internet Protocols and Applications 8.1 The World Wide Web(WWW) 8.1.1 Web Browsers 8.1.2 Web Servers 8.1.3 Web Server Application Technologies 8.2 Hypertext Rtansfer Protocol(HTTP) 8.2.1 Overview of HTTP 8.2.2 HTTP Operation 8.3 Hypertext Markup Language(HTML) 8.4 The Extensible Markup Language(XML) 8.5 Java 8.5.1 Java Components Overview 8.5.2 JavaScript 8.5.3 Java in the World Wide Web 8.5.4 Java Security 8.5.5 Distributed Objects 8.6 Accessing Legacy Applications from the Web 8.6.1 Business Requirements 8.6.2 Technical Issues 8.6.3 Security Issues 8.6.4 IBM e-business Solutions 8.7 Network News Transfer Protocol(NNTP) 8.8 Gopher 8.9 Internet2 8.9.1 Mission 8.9.2 Project Description 8.9.3 Internet2 and NGI CHAPTER 9 Multicast and Multimedia 9.1 Multicasting 9.2 Internet Group Management Protocol(IGMP) 9.2.1 IGMP Operation 9.3 Multicast Routing Protocols 9.3.1 distance Vector Multicast Routing Protocol(DVMRP) 9.3.2 Multicast OSPF(MOSPF) 9.3.3 Protocol Independent Multicast(PIM) 9.4 The Multicast Backbone 9.4.1 MBONE Routing 9.4.2 MBONE Applications 9.5 The Real-Time Protocols RTP and RTCP 9.5.1 The Real-Time Transport Protocol(RTP) 9.5.2 The Real-Time Control Protocol 9.5.3 RTP Translators and Mixers 9.5.4 Real-Time Applications 9.6 Voice over IP 9.6.1 ITU-T Recommendation H.323 9.6.2 Voice Compression(G.723.1 and G.729) 9.6.3 The VoIP Protocol Stack 9.7 References CHAPTER 10 Quality of Service 10.1 Why QoS 10.2 Integrated Services 10.2.1 Service Classes 10.2.2 The Reservation Protocol(RSVP) 10.2.3 The Future of Integrated Services 10.3 Differentiated Services 10.3.1 Differentiated Services Architecture 10.3.2 Using RSVP with Differentiated Services 10.3.3 Configuration and Administration of DS Components with LDAP 10.3.4 Using Differentiated Services with IPSec 10.3.5 Internet Drafts on Differentiated Services 10.4 References CHAPTER 11 Availability,Scalability and Load Balancing 11.1 Virtual Router Redundancy Protocol(VRRP) 11.1.1 Introduction 11.1.2 VRRP Definitions 11.1.3 VRRP Overview 11.1.4 Sample Configuration 11.1.5 VRRP Packet Format 11.2 Round-Robin DNS 11.3 IMB eNetwork Dispatcher 11.3.1 eNetwork Dispatcher Components 11.3.2 Load Balancing with Weights 11.3.3 High Availability 11.3.4 Server Affinity 11.3.5 Rules-Based Balancing 11.3.6 Wide Area Network Dispatcher 11.3.7 Combining ISS and Dispatcher 11.3.8 Advisors and Custom Advisors 11.3.9 SNMP Support 11.3.10 Co-Location Option 11.3.11 ISP Configuration 11.3.12 OS/390 Parallel Sysplex Support 11.4 Alternative Solutions to Load Balancing 11.4.1 Network Address Translation 11.4.2 Encapsulation 11.4.3 HTTP Redirection 11.5 TCP/IP for OS/390 Using Workload Manager(WLM) 11.5.1 Related Terminology and Products 11.5.2 Overview of WLM 11.6 OSPF Equal-Cost Multipath 11.7 OS/390 VIPA Connection Recovery CHAPTER 12 Directory Protocols and Distributed Computing 12.1 Introduction to the Distributed Computing Environment(DCE) 12.1.1 DCE Directory Service 12.1.2 DCE Security Service 12.1.3 DCE Threads 12.1.4 DCE Remote Procedure Call 12.1.5 Distributed Time Service 12.1.6 Distributed File Service(DFS) 12.2 The Andrew File System(AFS) 12.3 Lightweight Directory Access Protocol(LDAP) 12.3.1 LDAP-Lightweight Access to X.500 12.3.2 The LDAP Directory Server 12.3.3 Overview of LDAP Architecture 12.3.4 LDAP Models 12.3.5 LDAP Security 12.3.6 LDAP URLs 12.3.7 LDAP and DCE 12.3.8 The Directory-Enabled Networks Initiative(DEN) 12.3.9 References PART THREE Connection Protocols and Platform Implementations CHAPTER 13 Connection Protocols 13.1 Ethernet and IEEE 802.x Local Area Networks(LANs) 13.2 Fiber Distributed Data Interface() 13.3 Asynchronous Transfer Mode(ATM) 13.3.1 Address Resolution(ATMARP and InATMARP) 13.3.2 Classical IP over ATM 13.3.3 ATM LAN Emulation 13.3.4 Classical IP over ATM versus LAN Emulation 13.4 Data Link Switching:Switch-to-switch Protocol 13.4.1 Introduction 13.4.2 Functional Description 13.5 Serial Line IP(SLIP) 13.6 Point-to-Point Protocol(PPP) 13.6.1 Point-to-Point Encapsulation 13.7 Integrated Services Digital Network(ISDN) 13.8 TCP/IP and X.25 13.9 Frame Relay 13.9.1 Frame Format 13.9.2 Interconnect Issues 13.9.3 Data Link Layer Parameter Negotiation 13.9.4 IP over Frame Relay 13.10 PPP over SONET and SDH Circuits 13.10.1 Physical Layer 13.11 Multiprotocol Label Switching(MPLS) 13.11.1 Forwarding Methods 13.11.2 MPLS Usefulness 13.12 Enterprise Extender 13.12.1 Performance and Recovery 13.13 Multiprotocol Transport Network(MPTN) 13.13.1 Requirements for Mixed-Protocol Networking 13.13.2 MPTN Architecture 13.13.3 MPTN Methodology 13.13.4 MPTN Major Components 13.14 Multi-Path Channel+(MPC+) 13.15 S/390 Open Systems Adapter 2 13.15.1 OSA-2 Modes 13.15.2 S/390 Unit Addresses Correlate with OSA-2 LAN Port Numbers 13.15.3 Open Systems Adapter/Support Facility(OSA/SF) 13.16 Multiprotocol over ATM(MPOA) 13.16.1 Benefits of MPOA 13.16.2 MPOA Logical Components 13.16.3 MPOA Functional Components 13.16.4 MPOA Operation 13.17 Private Network-to-Network Interface(PNNI) 13.17.1 PNNI Overview 13.17.2 PNNI Routing 13.17.3 PNNI Signalling 13.18 References CHAPTER 14 Platform Implementations 14.1 Software Operating System Implementations 14.1.1 IBM OS/390 V2R6 14.1.2 IBM TCP/IP V2R4 for VM 14.1.3 IBM OS/400 V4R3 14.1.4 IBM AIX 4.3 14.1.5 IBM TCP/IP 4.1 for OS/2 14.1.6 Functional Comparisons 14.2 IBM Hardware Platform Implementations 14.2.1 The IBM Nways Router Family 14.2.2 The IBM Multiprotocol Switch Hub Family 14.2.3 The IBM Workgroup Hubs and Workgroup Switches 14.2.4 The IBM High Performance Controllers 14.2.5 The IBM Nways Wide Area Switches 14.2.6 Functional Comparisons APPENDIX A Special Notices