Computer networking : a top-down approach 7th ed., global ed. edition kurose All Chapters Instant Do

Page 1


Computernetworking:atop-downapproach7thed., globaled.EditionKurose

https://ebookmass.com/product/computer-networking-a-topdown-approach-7th-ed-global-ed-edition-kurose/

Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

Computer Networking: A Top-Down Approach 8th Edition James F. Kurose

https://ebookmass.com/product/computer-networking-a-top-downapproach-8th-edition-james-f-kurose/

ebookmass.com

Computer Networking: A Top-Down Approach (Solutions to Review Questions and Problems) 6th ed. Edition Jim Kurose

https://ebookmass.com/product/computer-networking-a-top-down-approachsolutions-to-review-questions-and-problems-6th-ed-edition-jim-kurose/

ebookmass.com

Reti di calcolatori e Internet, Un approccio top-down 8th Edition James F. Kurose

https://ebookmass.com/product/reti-di-calcolatori-e-internet-unapproccio-top-down-8th-edition-james-f-kurose/

ebookmass.com

Principles of Tissue Engineering Robert Lanza

https://ebookmass.com/product/principles-of-tissue-engineering-robertlanza/

ebookmass.com

From selfie to #sealfie: Nature 2.0 and the digital cultural politics of an internationally contested resource

https://ebookmass.com/product/from-selfie-to-sealfie-nature-2-0-andthe-digital-cultural-politics-of-an-internationally-contestedresource-roberta-hawkins-jennifer-j-silver/ ebookmass.com

Practical Soft Tissue Pathology. A Diagnostic Approach 2nd Edition

https://ebookmass.com/product/practical-soft-tissue-pathology-adiagnostic-approach-2nd-edition-jason-l-hornick/

ebookmass.com

Urban Ecology: An Introduction, 1st Edition – Ebook PDF Version

https://ebookmass.com/product/urban-ecology-an-introduction-1stedition-ebook-pdf-version/

ebookmass.com

Contexts for Music Learning and Participation: Developing and Sustaining Musical Possible Selves 1st ed. Edition

https://ebookmass.com/product/contexts-for-music-learning-andparticipation-developing-and-sustaining-musical-possible-selves-1sted-edition-andrea-creech/ ebookmass.com

Theatre, Brief Version 11th Edition Robert Cohen

https://ebookmass.com/product/theatre-brief-version-11th-editionrobert-cohen/ ebookmass.com

Making Empire : Ireland, Imperialism, and the Early Modern

https://ebookmass.com/product/making-empire-ireland-imperialism-andthe-early-modern-world-jane-ohlmeyer/

ebookmass.com

Digital Resources for Students

Your new textbook provides 12-month access to digital resources that may include VideoNotes, interactive exercises, programming assignments, Wireshark labs, additional technical material, and more. Refer to the preface in the textbook for a detailed list of resources.

Follow the instructions below to register for the Companion Website for Computer Networking: A Top-Down Approach, Seventh Edition.

1. Go to www.pearsonglobaleditions.com/kurose

2. Find the title of your textbook.

3. Click Companion Website

4. Click Register and follow the on-screen instructions to create a login name and password.

Use a coin to scratch of the coating and reveal your access code. Do not use a sharp knife or other sharp object as it may damage the code.

Use the login name and password you created during registration to start using the digital resources that accompany your textbook.

IMPORTANT:

This access code can only be used once. This subscription is valid for 12 months upon activation and is not transferrable. If the access code has already been revealed it may no longer be valid. For technical support go to https://support.pearson.com/getsupport

COMPUTER NETWORKING A Top-Down Approach

JAMES F. KUROSE

KEITH W. ROSS

Vice President, Editorial Director, ECS: Marcia Horton

Acquisitions Editor: Matt Goldstein

Editorial Assistant: Kristy Alaura

Acquisitions Editor, Global Editions: Aditee Agarwal

Vice President of Marketing: Christy Lesko

Director of Field Marketing: Tim Galligan

Product Marketing Manager: Bram Van Kempen

Field Marketing Manager: Demetrius Hall

Marketing Assistant: Jon Bryant

Director of Product Management: Erin Gregg

Team Lead, Program and Project Management: Scott Disanno

Program Manager: Joanne Manning and Carole Snyder

Project Manager: Katrina Ostler, Ostler Editorial, Inc.

Project Editor, Global Editions: K.K. Neelakantan

Senior Manufacturing Controller, Global Editions: Kay Holman

Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia

Cover Designer: Lumina Datamatics

Manager, Rights and Permissions: Ben Ferrini

Project Manager, Rights and Permissions: Jenny Hoffman, Aptara Corporation

Inventory Manager: Ann Lam

Cover Image: ISebyI/Shutterstock.com

Media Project Manager: Steve Wright

Media Production Manager, Global Editions: Vikram Kumar

Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text.

Pearson Education Limited

Edinburgh Gate Harlow

Essex CM20 2JE

England

and Associated Companies throughout the world

Visit us on the World Wide Web at: www.pearsonglobaleditions.com

© Pearson Education Limited 2017

The rights of James F. Kurose and Keith W. Ross to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.

Authorized adaptation from the United States edition, entitled Computer Networking: A Top-Down Approach, Seventh Edition, ISBN 978-0-13-359414-0, by James F. Kurose and Keith W. Ross published by Pearson Education © 2017.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS.

All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners.

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

10 9 8 7 6 5 4 3 2 1

ISBN 10: 1-292-15359-8

ISBN 13: 978-1-292-15359-9

Typeset by Cenveo Publisher Services

Printed and bound in Malaysia.

About the Authors

Jim Kurose

Jim Kurose is a Distinguished University Professor of Computer Science at the University of Massachusetts, Amherst. He is currently on leave from the University of Massachusetts, serving as an Assistant Director at the US National Science Foundation, where he leads the Directorate of Computer and Information Science and Engineering.

Dr. Kurose has received a number of recognitions for his educational activities including Outstanding Teacher Awards from the National Technological University (eight times), the University of Massachusetts, and the Northeast Association of Graduate Schools. He received the IEEE Taylor Booth Education Medal and was recognized for his leadership of Massachusetts’ Commonwealth Information Technology Initiative. He has won several conference best paper awards and received the IEEE Infocom Achievement Award and the ACM Sigcomm Test of Time Award.

Dr. Kurose is a former Editor-in-Chief of IEEE Transactions on Communications and of IEEE/ACM Transactions on Networking. He has served as Technical Program co-Chair for IEEE Infocom, ACM SIGCOMM, ACM Internet Measurement Conference, and ACM SIGMETRICS. He is a Fellow of the IEEE and the ACM. His research interests include network protocols and architecture, network measurement, multimedia communication, and modeling and performance evaluation. He holds a PhD in Computer Science from Columbia University.

Keith Ross

Keith Ross is the Dean of Engineering and Computer Science at NYU Shanghai and the Leonard J. Shustek Chair Professor in the Computer Science and Engineering Department at NYU. Previously he was at University of Pennsylvania (13 years), Eurecom Institute (5 years) and Polytechnic University (10 years). He received a B.S.E.E from Tufts University, a M.S.E.E. from Columbia University, and a Ph.D. in Computer and Control Engineering from The University of Michigan. Keith Ross is also the co-founder and original CEO of Wimba, which develops online multimedia applications for e-learning and was acquired by Blackboard in 2010.

Professor Ross’s research interests are in privacy, social networks, peer-to-peer networking, Internet measurement, content distribution networks, and stochastic modeling. He is an ACM Fellow, an IEEE Fellow, recipient

of the Infocom 2009 Best Paper Award, and recipient of 2011 and 2008 Best Paper Awards for Multimedia Communications (awarded by IEEE Communications Society). He has served on numerous journal editorial boards and conference program committees, including IEEE/ACM Transactions on Networking, ACM SIGCOMM, ACM CoNext, and ACM Internet Measurement Conference. He also has served as an advisor to the Federal Trade Commission on P2P file sharing.

To Julie and our three precious ones—Chris, Charlie, and Nina JFK

A big THANKS to my professors, colleagues, and students all over the world.

This page intentionally left blank

Preface

Welcome to the seventh edition of Computer Networking: A Top-Down Approach. Since the publication of the first edition 16 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by over 100,000 students and practitioners worldwide. We’ve heard from manyofthesereadersandhavebeenoverwhelmedbythepositiveresponse.

What’s New in the Seventh Edition?

We think one important reason for this success has been that our book continues to offer a fresh and timely approach to computer networking instruction. We’ve made changesinthisseventhedition,butwe’vealsokeptunchangedwhatwebelieve(and theinstructorsandstudentswhohaveusedourbookhaveconfirmed)tobethemost importantaspectsofthisbook:itstop-downapproach,itsfocusontheInternetanda modern treatment of computer networking, its attention to both principles and practice,anditsaccessiblestyleandapproachtowardlearningaboutcomputernetworking.Nevertheless,theseventheditionhasbeenrevisedandupdatedsubstantially. Long-time readers of our book will notice that for the first time since this text waspublished,we’vechangedtheorganizationofthechaptersthemselves.Thenetwork layer, which had been previously covered in a single chapter, is now covered in Chapter 4 (which focuses on the so-called “data plane” component of the network layer) and Chapter 5 (which focuses on the network layer’s “control plane”). This expanded coverage of the network layer reflects the swift rise in importance of software-defined networking (SDN), arguably the most important and exciting advance in networking in decades. Although a relatively recent innovation, SDN has been rapidly adopted in practice—so much so that it’s already hard to imagine an introduction to modern computer networking that doesn’t cover SDN. The topic ofnetworkmanagement,previouslycoveredinChapter9,hasnowbeenfoldedinto the new Chapter 5. As always, we’ve also updated many other sections of the text to reflect recent changes in the dynamic field of networking since the sixth edition. As always, material that has been retired from the printed text can always be found onthisbook’sCompanionWebsite.Themostimportantupdatesarethefollowing:

• Chapter 1 has been updated to reflect the ever-growing reach and use of the Internet.

• Chapter 2, which covers the application layer, has been significantly updated. We’ve removed the material on the FTP protocol and distributed hash tables to

make room for a new section on application-level video streaming and content distribution networks, together with Netflix and YouTube case studies. The socketprogrammingsectionshavebeenupdatedfromPython2toPython3.

• Chapter 3, which covers the transport layer, has been modestly updated. The materialonasynchronoustransportmode(ATM)networkshasbeenreplacedby more modern material on the Internet’s explicit congestion notification (ECN), whichteachesthesameprinciples.

• Chapter4coversthe“dataplane”componentofthenetworklayer—the per-router forwarding function that determine how a packet arriving on one of a router’s inputlinksisforwardedtooneofthatrouter’soutputlinks.Weupdatedthematerial on traditional Internet forwarding found in all previous editions, and added material on packet scheduling. We’ve also added a new section on generalized forwarding,aspracticedinSDN.Therearealsonumerousupdatesthroughoutthe chapter.Materialonmulticastandbroadcastcommunicationhasbeenremovedto makewayforthenewmaterial.

• In Chapter 5, we cover the control plane functions of the network layer—the network-wide logic that controls how a datagram is routed along an end-to-end pathofroutersfromthesourcehosttothedestinationhost.Asinpreviouseditions, we cover routing algorithms, as well as routing protocols (with an updated treatment of BGP) used in today’s Internet. We’ve added a significant new section ontheSDNcontrolplane,whereroutingandotherfunctionsareimplementedin so-calledSDNcontrollers.

• Chapter6,whichnowcoversthelinklayer,hasanupdatedtreatmentofEthernet, andofdatacenternetworking.

• Chapter 7, which covers wireless and mobile networking, contains updated material on 802.11 (so-called “WiFi) networks and cellular networks, including 4GandLTE.

• Chapter 8, which covers network security and was extensively updated in the sixthedition,hasonlymodestupdatesinthisseventhedition.

• Chapter9,onmultimedianetworking,isnowslightly“thinner”thaninthesixthedition, as material on video streaming and content distribution networks has been moved to Chapter 2, and material on packet scheduling has been incorporated intoChapter4.

• Significant new material involving end-of-chapter problems has been added. As with all previous editions, homework problems have been revised, added, and removed.

As always, our aim in creating this new edition of our book is to continue to provideafocusedandmoderntreatmentofcomputernetworking,emphasizingboth principlesandpractice.

Audience

This textbook is for a first course on computer networking. It can be used in both computer science and electrical engineering departments. In terms of programming languages,thebookassumesonlythatthestudenthasexperiencewithC,C++,Java, or Python (and even then only in a few places). Although this book is more precise andanalyticalthanmanyotherintroductorycomputernetworkingtexts,itrarelyuses anymathematicalconceptsthatarenottaughtinhighschool.Wehavemadeadeliberate effort to avoid using any advanced calculus, probability, or stochastic process concepts(althoughwe’veincludedsomehomeworkproblemsforstudentswiththis advancedbackground).Thebookisthereforeappropriateforundergraduatecourses and for first-year graduate courses. It should also be useful to practitioners in the telecommunicationsindustry.

What Is Unique About This Textbook?

The subject of computer networking is enormously complex, involving many concepts, protocols, and technologies that are woven together in an intricate manner. To cope with this scope and complexity, many computer networking texts are often organizedaroundthe“layers”ofanetworkarchitecture.Withalayeredorganization, students can see through the complexity of computer networking—they learn about the distinct concepts and protocols in one part of the architecture while seeing the bigpictureofhowallpartsfittogether.Fromapedagogicalperspective,ourpersonal experience has been that such a layered approach indeed works well. Nevertheless, wehavefoundthatthetraditionalapproachofteaching—bottomup;thatis,fromthe physical layer towards the application layer—is not the best approach for a modern courseoncomputernetworking.

A Top-Down Approach

Our book broke new ground 16 years ago by treating networking in a top-down manner—that is, by beginning at the application layer and working its way down towardthephysicallayer.Thefeedbackwereceivedfromteachersandstudentsalike have confirmed that this top-down approach has many advantages and does indeed work well pedagogically. First, it places emphasis on the application layer (a “high growth area” in networking). Indeed, many of the recent revolutions in computer networking—including the Web, peer-to-peer file sharing, and media streaming— have taken place at the application layer. An early emphasis on application-layer issues differs from the approaches taken in most other texts, which have only a small amount of material on network applications, their requirements, applicationlayer paradigms (e.g., client-server and peer-to-peer), and application programming

interfaces. Second, our experience as instructors (and that of many instructors who have used this text) has been that teaching networking applications near the beginningofthecourseisapowerfulmotivationaltool.Studentsarethrilledtolearnabout hownetworkingapplicationswork—applicationssuchase-mailandtheWeb,which most students use on a daily basis. Once a student understands the applications, the student can then understand the network services needed to support these applications.Thestudentcanthen,inturn,examinethevariouswaysinwhichsuchservices mightbeprovidedandimplementedinthelowerlayers.Coveringapplicationsearly thusprovidesmotivationfortheremainderofthetext.

Third, a top-down approach enables instructors to introduce network application development at an early stage. Students not only see how popular applications and protocols work, but also learn how easy it is to create their own network applicationsandapplication-levelprotocols.Withthetop-downapproach,students get early exposure to the notions of socket programming, service models, and protocols—importantconceptsthatresurfaceinallsubsequentlayers.Byproviding socket programming examples in Python, we highlight the central ideas without confusing students with complex code. Undergraduates in electrical engineering andcomputerscienceshouldnothavedifficultyfollowingthePythoncode.

An Internet Focus

Although we dropped the phrase “Featuring the Internet” from the title of this book withthefourthedition,thisdoesn’tmeanthatwedroppedourfocusontheInternet. Indeed,nothingcouldbefurtherfromthecase!Instead,sincetheInternethasbecome so pervasive, we felt that any networking textbook must have a significant focus on theInternet,andthusthisphrasewassomewhatunnecessary.Wecontinuetousethe Internet’s architecture and protocols as primary vehicles for studying fundamental computer networking concepts. Of course, we also include concepts and protocols from other network architectures. But the spotlight is clearly on the Internet, a fact reflectedinourorganizingthebookaroundtheInternet’sfive-layerarchitecture:the application,transport,network,link,andphysicallayers.

Another benefit of spotlighting the Internet is that most computer science and electricalengineeringstudentsareeagertolearnabouttheInternetanditsprotocols. TheyknowthattheInternethasbeenarevolutionaryanddisruptivetechnologyand can see that it is profoundly changing our world. Given the enormous relevance of the Internet, students are naturally curious about what is “under the hood.” Thus, it iseasyforaninstructortogetstudentsexcitedaboutbasicprincipleswhenusingthe Internetastheguidingfocus.

Teaching Networking Principles

Two of the unique features of the book—its top-down approach and its focus on the Internet—have appeared in the titles of our book. If we could have squeezed a third

phrase into the subtitle, it would have contained the word principles. The field of networking is now mature enough that a number of fundamentally important issues canbeidentified.Forexample,inthetransportlayer,thefundamentalissuesinclude reliable communication over an unreliable network layer, connection establishment/ teardownandhandshaking,congestionandflowcontrol,andmultiplexing.Threefundamentallyimportantnetwork-layerissuesaredetermining“good”pathsbetweentwo routers,interconnectingalargenumberofheterogeneousnetworks,andmanagingthe complexityofamodernnetwork.Inthelinklayer,afundamentalproblemissharinga multipleaccesschannel.Innetworksecurity,techniquesforprovidingconfidentiality, authentication, and message integrity are all based on cryptographic fundamentals. This text identifies fundamental networking issues and studies approaches towards addressing these issues. The student learning these principles will gain knowledge with a long “shelf life”—long after today’s network standards and protocols have becomeobsolete,theprinciplestheyembodywillremainimportantandrelevant.We believethatthecombinationofusingtheInternettogetthestudent’sfootinthedoor andthenemphasizingfundamentalissuesandsolutionapproacheswillallowthestudenttoquicklyunderstandjustaboutanynetworkingtechnology.

The Website

Each new copy of this textbook includes twelve months of access to a Companion Websiteforallbookreadersathttp://www.pearsonglobaleditions.com/kurose,which includes:

• Interactive learning material. The book’s Companion Website contains VideoNotes—video presentations of important topics throughout the book done by the authors, as well as walkthroughs of solutions to problems similar to those at the end of the chapter. We’ve seeded the Web site with VideoNotes and online problems for chapters 1 through 5 and will continue to actively add and update this material over time. As in earlier editions, the Web site contains the interactiveJavaappletsthatanimatemanykeynetworkingconcepts.Thesitealso hasinteractivequizzesthatpermitstudentstochecktheirbasicunderstandingof the subject matter. Professors can integrate these interactive features into their lecturesorusethemasminilabs.

• Additional technical material. Aswehaveaddednewmaterialineacheditionof ourbook,we’vehadtoremovecoverageofsomeexistingtopicstokeepthebook at manageable length. For example, to make room for the new material in this edition,we’veremovedmaterialonFTP,distributedhashtables,andmulticasting, Materialthatappearedinearliereditionsofthetextisstillofinterest,andthuscan befoundonthebook’sWebsite.

• Programming assignments. The Web site also provides a number of detailed programming assignments, which include building a multithreaded Web server,

building an e-mail client with a GUI interface, programming the sender and receiver sides of a reliable data transport protocol, programming a distributed routingalgorithm,andmore.

• Wireshark labs. One’s understanding of network protocols can be greatly deepened by seeing them in action. The Web site provides numerous Wireshark assignments that enable students to actually observe the sequence of messages exchanged between two protocol entities. The Web site includes separate WiresharklabsonHTTP,DNS,TCP,UDP,IP,ICMP,Ethernet,ARP,WiFi,SSL,and ontracingallprotocolsinvolvedinsatisfyingarequesttofetchaWebpage.We’ll continuetoaddnewlabsovertime.

In addition to the Companion Website, the authors maintain a public Web site, http://gaia.cs.umass.edu/kurose_ross/interactive, containing interactive exercises that create (and present solutions for) problems similar to selected end-of-chapter problems.Sincestudentscangenerate(andviewsolutionsfor)anunlimitednumber ofsimilarprobleminstances,theycanworkuntilthematerialistrulymastered.

Pedagogical Features

Wehaveeachbeenteachingcomputernetworkingformorethan30years.Together, we bring more than 60 years of teaching experience to this text, during which time we have taught many thousands of students. We have also been active researchers incomputernetworkingduringthistime.(Infact,JimandKeithfirstmeteachother as master’s students in a computer networking course taught by Mischa Schwartz in 1979 at Columbia University.) We think all this gives us a good perspective on where networking has been and where it is likely to go in the future. Nevertheless, we have resisted temptations to bias the material in this book towards our own pet researchprojects.WefigureyoucanvisitourpersonalWebsitesifyouareinterested in our research. Thus, this book is about modern computer networking—it is about contemporaryprotocolsandtechnologiesaswellastheunderlyingprinciplesbehind theseprotocolsandtechnologies.Wealsobelievethatlearning(andteaching!)about networkingcanbefun.Asenseofhumor,useofanalogies,andreal-worldexamples inthisbookwillhopefullymakethismaterialmorefun.

Supplements for Instructors

We provide a complete supplements package to aid instructors in teaching this course. This material can be accessed from Pearson’s Instructor Resource Center (http://www.pearsonglobaleditions.com/kurose). Visit the Instructor Resource Centerforinformationaboutaccessingtheseinstructor’ssupplements.

• PowerPoint® slides. We provide PowerPoint slides for all nine chapters. The slides have been completely updated with this seventh edition. The slides cover eachchapterindetail.Theyusegraphicsandanimations(ratherthanrelyingonly onmonotonoustextbullets)tomaketheslidesinterestingandvisuallyappealing. WeprovidetheoriginalPowerPointslidessoyoucancustomizethemtobestsuit your own teaching needs. Some of these slides have been contributed by other instructorswhohavetaughtfromourbook.

• Homework solutions. We provide a solutions manual for the homework problems in the text, programming assignments, and Wireshark labs. As noted earlier, we’veintroducedmanynewhomeworkproblemsinthefirstsixchapters ofthebook.

Chapter Dependencies

The first chapter of this text presents a self-contained overview of computer networking.Introducingmanykeyconceptsandterminology,thischaptersetsthestage fortherestofthebook.Alloftheotherchaptersdirectlydependonthisfirstchapter. After completing Chapter 1, we recommend instructors cover Chapters 2 through 6 in sequence, following our top-down philosophy. Each of these five chapters leverages material from the preceding chapters. After completing the first six chapters, the instructor has quite a bit of flexibility. There are no interdependencies among the last three chapters, so they can be taught in any order. However, each of the last threechaptersdependsonthematerialinthefirstsixchapters.Manyinstructorsfirst teachthefirstsixchaptersandthenteachoneofthelastthreechaptersfor“dessert.”

One Final Note: We’d Love to Hear from You

We encourage students and instructors to e-mail us with any comments they might have about our book. It’s been wonderful for us to hear from so many instructors andstudentsfromaroundtheworldaboutourfirstfiveeditions.We’veincorporated manyofthesesuggestionsintolatereditionsofthebook.Wealsoencourageinstructorstosendusnewhomeworkproblems(andsolutions)thatwouldcomplementthe current homework problems. We’ll post these on the instructor-only portion of the Website.WealsoencourageinstructorsandstudentstocreatenewJavaappletsthat illustratetheconceptsandprotocolsinthisbook.Ifyouhaveanappletthatyouthink wouldbeappropriateforthistext,pleasesubmitittous.Iftheapplet(includingnotation and terminology) is appropriate, we’ll be happy to include it on the text’s Web site,withanappropriatereferencetotheapplet’sauthors.

So,asthesayinggoes,“Keepthosecardsandletterscoming!”Seriously,please do continue to send us interesting URLs, point out typos, disagree with any of our

claims,andtelluswhatworksandwhatdoesn’twork.Telluswhatyouthinkshould or shouldn’t be included in the next edition. Send your e-mail to kurose@cs.umass .eduandkeithwross@nyu.edu.

Acknowledgments

Since we began writing this book in 1996, many people have given us invaluable help and have been influential in shaping our thoughts on how to best organize and teach a networking course. We want to say A BIG THANKS to everyone who has helpedusfromtheearliestfirstdraftsofthisbook,uptothisseventhedition.Weare also very thankfultothemanyhundredsofreadersfromaroundtheworld—students, faculty, practitioners—who have sent us thoughts and comments on earlier editions ofthebookandsuggestionsforfutureeditionsofthebook.Specialthanksgooutto:

AlAho(ColumbiaUniversity)

HishamAl-Mubaid(UniversityofHouston-ClearLake)

PratimaAkkunoor(ArizonaStateUniversity)

PaulAmer(UniversityofDelaware)

ShamiulAzom(ArizonaStateUniversity)

LichunBao(UniversityofCaliforniaatIrvine)

PaulBarford(UniversityofWisconsin)

BobbyBhattacharjee(UniversityofMaryland)

StevenBellovin(ColumbiaUniversity)

PravinBhagwat(Wibhu)

SupratikBhattacharyya(previouslyatSprint)

ErnstBiersack(EurécomInstitute)

ShahidBokhari(UniversityofEngineering&Technology,Lahore)

JeanBolot(TechnicolorResearch)

DanielBrushteyn(formerUniversityofPennsylvaniastudent)

KenCalvert(UniversityofKentucky)

EvandroCantu(FederalUniversityofSantaCatarina)

JeffCase(SNMPResearchInternational)

JeffChaltas(Sprint)

VintonCerf(Google)

ByungKyuChoi(MichiganTechnologicalUniversity)

BramCohen(BitTorrent,Inc.)

ConstantineCoutras(PaceUniversity)

JohnDaigle(UniversityofMississippi)

EdmundoA.deSouzaeSilva(FederalUniversityofRiodeJaneiro)

PhilippeDecuetos(EurécomInstitute)

ChristopheDiot(TechnicolorResearch)

PrithulaDhunghel(Akamai)

DeborahEstrin(UniversityofCalifornia,LosAngeles)

MichalisFaloutsos(UniversityofCaliforniaatRiverside)

Wu-chiFeng(OregonGraduateInstitute)

SallyFloyd(ICIR,UniversityofCaliforniaatBerkeley)

PaulFrancis(MaxPlanckInstitute)

DavidFullager(Netflix)

LixinGao(UniversityofMassachusetts)

JJGarcia-Luna-Aceves(UniversityofCaliforniaatSantaCruz)

MarioGerla(UniversityofCaliforniaatLosAngeles)

DavidGoodman(NYU-Poly)

YangGuo(Alcatel/LucentBellLabs)

TimGriffin(CambridgeUniversity)

MaxHailperin(GustavusAdolphusCollege)

BruceHarvey(FloridaA&MUniversity,FloridaStateUniversity)

CarlHauser(WashingtonStateUniversity)

RachelleHeller(GeorgeWashingtonUniversity)

PhillippHoschka(INRIA/W3C)

WenHsin(ParkUniversity)

AlbertHuang(formerUniversityofPennsylvaniastudent)

ChengHuang(MicrosoftResearch)

EstherA.Hughes(VirginiaCommonwealthUniversity)

VanJacobson(XeroxPARC)

PinakJain(formerNYU-Polystudent)

JobinJames(UniversityofCaliforniaatRiverside)

SugihJamin(UniversityofMichigan)

ShivkumarKalyanaraman(IBMResearch,India)

JussiKangasharju(UniversityofHelsinki)

SnehaKasera(UniversityofUtah)

ParvizKermani(formerlyofIBMResearch)

HyojinKim(formerUniversityofPennsylvaniastudent)

LeonardKleinrock(UniversityofCaliforniaatLosAngeles)

DavidKotz(DartmouthCollege)

BeshanKulapala(ArizonaStateUniversity)

RakeshKumar(Bloomberg)

MiguelA.Labrador(UniversityofSouthFlorida)

SimonLam(UniversityofTexas)

SteveLai(OhioStateUniversity)

TomLaPorta(PennStateUniversity)

Tim-BernersLee(WorldWideWebConsortium)

ArnaudLegout(INRIA)

LeeLeitner(DrexelUniversity)

BrianLevine(UniversityofMassachusetts)

ChunchunLi(formerNYU-Polystudent)

YongLiu(NYU-Poly)

WilliamLiang(formerUniversityofPennsylvaniastudent)

WillisMarti(TexasA&MUniversity)

NickMcKeown(StanfordUniversity)

JoshMcKinzie(ParkUniversity)

DeepMedhi(UniversityofMissouri,KansasCity)

BobMetcalfe(InternationalDataGroup)

SueMoon(KAIST)

JenniMoyer(Comcast)

ErichNahum(IBMResearch)

ChristosPapadopoulos(ColoradoSateUniversity)

CraigPartridge(BBNTechnologies)

RadiaPerlman(Intel)

JitendraPadhye(MicrosoftResearch)

VernPaxson(UniversityofCaliforniaatBerkeley)

KevinPhillips(Sprint)

GeorgePolyzos(AthensUniversityofEconomicsandBusiness)

SriramRajagopalan(ArizonaStateUniversity)

RamachandranRamjee(MicrosoftResearch)

KenReek(RochesterInstituteofTechnology)

MartinReisslein(ArizonaStateUniversity)

JenniferRexford(PrincetonUniversity)

LeonReznik(RochesterInstituteofTechnology)

PabloRodrigez(Telefonica)

SumitRoy(UniversityofWashington)

DanRubenstein(ColumbiaUniversity)

AviRubin(JohnsHopkinsUniversity)

DouglasSalane(JohnJayCollege)

DespinaSaparilla(CiscoSystems)

JohnSchanz(Comcast)

HenningSchulzrinne(ColumbiaUniversity)

MischaSchwartz(ColumbiaUniversity)

ArdashSethi(UniversityofDelaware)

HarishSethu(DrexelUniversity)

K.SamShanmugan(UniversityofKansas)

PrashantShenoy(UniversityofMassachusetts)

ClayShields(GeorgetownUniversity)

SubinShrestra(UniversityofPennsylvania)

BojieShu(formerNYU-Polystudent)

MihailL.Sichitiu(NCStateUniversity)

PeterSteenkiste(CarnegieMellonUniversity)

TatsuyaSuda(UniversityofCaliforniaatIrvine)

KinSunTam(StateUniversityofNewYorkatAlbany)

DonTowsley(UniversityofMassachusetts)

DavidTurner(CaliforniaStateUniversity,SanBernardino)

NitinVaidya(UniversityofIllinois)

MicheleWeigle(ClemsonUniversity)

DavidWetherall(UniversityofWashington)

IraWinston(UniversityofPennsylvania)

DiWu(SunYat-senUniversity)

ShirleyWynn(NYU-Poly)

RajYavatkar(Intel)

YechiamYemini(ColumbiaUniversity)

DianYu(NYUShanghai)

MingYu(StateUniversityofNewYorkatBinghamton)

EllenZegura(GeorgiaInstituteofTechnology)

HonggangZhang(SuffolkUniversity)

HuiZhang(CarnegieMellonUniversity)

LixiaZhang(UniversityofCaliforniaatLosAngeles)

MengZhang(formerNYU-Polystudent)

ShuchunZhang(formerUniversityofPennsylvaniastudent)

XiaodongZhang(OhioStateUniversity)

ZhiLiZhang(UniversityofMinnesota)

PhilZimmermann(independentconsultant)

MikeZink(UniversityofMassachusetts)

CliffC.Zou(UniversityofCentralFlorida)

We also want to thank the entire Pearson team—in particular, Matt Goldstein and Joanne Manning—who have done an absolutely outstanding job on this seventh edition (and who have put up with two very finicky authors who seem congenitally unable to meet deadlines!). Thanks also to our artists, Janet Theurer and Patrice Rossi Calkin, for their work on the beautiful figures in this and earlier editions of ourbook,andtoKatieOstlerandherteamatCenveofortheirwonderfulproduction work on this edition. Finally, a most special thanks go to our previous two editors at Addison-Wesley—Michael Hirsch and Susan Hartman. This book would not be what it is (and may well not have been at all) without their graceful management, constantencouragement,nearlyinfinitepatience,goodhumor,andperseverance.

Acknowledgments for the Global Edition

Pearson would like to thank and acknowledge the following people for their contributionstotheGlobalEdition.

Contributors

MarioDeFrancesco(AaltoUniversity)

Reviewers

ArifAhmed(NationalInstituteofTechnologySilchar) KaushikGoswami(St.Xavier’sCollegeKolkata) MoumitaMitraManna(BangabasiCollege)

7.3.6

7.4

7.7

Chapter8SecurityinComputerNetworks

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.