High speed networks and internets 2nd edition William Stallings 2024 scribd download

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

Download the full version of the ebook at ebookname.

com

High speed networks and internets 2nd edition


William Stallings

https://ebookname.com/product/high-speed-networks-and-
internets-2nd-edition-william-stallings/

OR CLICK BUTTON

DOWNLOAD EBOOK

Download more ebook instantly today at https://ebookname.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Network Security Essentials 2nd Edition William Stallings

https://ebookname.com/product/network-security-essentials-2nd-edition-
william-stallings/

ebookname.com

Computer Networks and Internets 5th Edition Douglas Comer

https://ebookname.com/product/computer-networks-and-internets-5th-
edition-douglas-comer/

ebookname.com

Quality of Service Control in High Speed Networks 1st


Edition H. Jonathan Chao

https://ebookname.com/product/quality-of-service-control-in-high-
speed-networks-1st-edition-h-jonathan-chao/

ebookname.com

C Suetoni Tranquilli Divus Augustus Suetonius

https://ebookname.com/product/c-suetoni-tranquilli-divus-augustus-
suetonius/

ebookname.com
New Deal Banking Reforms and Keynesian Welfare State
Capitalism 1st Edition Ellen Russell

https://ebookname.com/product/new-deal-banking-reforms-and-keynesian-
welfare-state-capitalism-1st-edition-ellen-russell/

ebookname.com

The Jew in Medieval Iberia 1100 1500 Jonathan Ray

https://ebookname.com/product/the-jew-in-medieval-
iberia-1100-1500-jonathan-ray/

ebookname.com

World Film Locations Marseilles Marseilles 1st Edition


Marcelline Block

https://ebookname.com/product/world-film-locations-marseilles-
marseilles-1st-edition-marcelline-block/

ebookname.com

Strengthening The Retirement System Beyond Social Security


1st Edition Kala E. Upshaw

https://ebookname.com/product/strengthening-the-retirement-system-
beyond-social-security-1st-edition-kala-e-upshaw/

ebookname.com

The Tell Tale Brain A Neuroscientist s Quest for What


Makes Us Human 1st Edition V. S. Ramachandran

https://ebookname.com/product/the-tell-tale-brain-a-neuroscientist-s-
quest-for-what-makes-us-human-1st-edition-v-s-ramachandran/

ebookname.com
Finite sample econometrics First Edition Aman Ullah

https://ebookname.com/product/finite-sample-econometrics-first-
edition-aman-ullah/

ebookname.com
Performance and
Quality of Service
Second Edition

WILLIAM STALLINGS
THE WILLIAM STALLINGS BOOKS ON COMPUTER

DATA AND COMPUTER COMMUNICATIONS, SIXTH EDITION


A comprehensive survey that has become the standard in the field, covering (1) data
communications, including transmission, media, signal encoding, link control, and
multiplexing; (2) communication networks, including circuit-and packet-switched, frame
relay, ATM, and LANs; (3) the TCP/IP protocol suite, including IPv6, TCP, MIME, and
HTTP; as well as a detailed treatment of network security. Received the 2000 Text and
Academic Authors Association (TAA) award for long-term excellence in a computer
science textbook. ISBN 0-13-084370-9

CRYPTOGRAPHY AND NETWORK SECURITY, SECOND EDITION


A tutorial and survey on network security technology. Each of the basic building blocks of
network security, including conventional and public-key cryptography, authentication, and
digital signatures, are covered. The book covers important network security tools and
applications, including S/MIME, IP Security, Kerberos, SSL/TLS, SET, and X509v3. In
addition, methods for countering hackers and viruses are explored. Received the TAA
award for the best computer science and engineering textbook of 1999.
ISBN 0-13-869017-0

OPERATING SYSTEMS, FOURTH EDITION


A state-of-the art survey of operating system principles. Covers fundamental technology as
well as contemporary design issues, such as threads, microkernels, SMPs, real-time systems,
multiprocessor scheduling, distributed systems, clusters, security, and object-oriented design.
Third edition received the TAA award for the best computer science and engineering
textbook of 1998. ISBN 0-13-031999-6

COMPUTER ORGANIZATION AND ARCHITECTURE, FIFTH EDITION


A unified view of this broad field. Covers fundamentals such as CPU, control unit,
microprogramming, instruction set, I/O, and memory. Also covers advanced topics such as
RISC, superscalar, and parallel organization. Received the TAA award for the best
computer science and engineering textbook of 2000. ISBN 0-13-081294-3

Prentice Hall www.prenhall.com/stallings telephone: 800-526-0485


AND DATA COMMUNICATIONS TECHNOLOGY

WIRELESS COMMUNICATIONS AND NETWORKS


A comprehensive, state-of-the art survey. Covers fundamental wireless communications topics,
including antennas and propagation, signal encoding techniques, spread spectrum, and error
correction techniques. Examines satellite, cellular, wireless local loop networks and wireless
LANs, including Bluetooth and 802.11. Covers Mobile IP and WAP. ISBN 0-13-040864-6

LOCAL AND METROPOLITAN AREA NETWORKS, SIXTH EDITION


An in-depth presentation of the technology and architecture of local and metropolitan area
networks. Covers topology, transmission media, medium access control, standards,
internetworking, and network management. Provides an up-to-date coverage of LAN/MAN
systems, including Fast Ethernet, Fibre Channel, and wireless LANs, plus LAN QoS.
Received the 2001 TAA award for long-term excellence in a computer science textbook.
ISBN 0-13-012939-9

ISDN AND BROADBAND ISDN, WITH FRAME RELAY AND ATM:


FOURTH EDITION
An in-depth presentation of the technology and architecture of integrated services digital
networks (ISDN). Covers the integrated digital network (IDN), xDSL, ISDN services and
architecture, and signaling system no. 7 (SS7) and provides detailed coverage of the ITU-T
protocol standards. Also provides detailed coverage of protocols and congestion control
strategies for both frame relay and ATM. ISBN 0-13-973744-8

BUSINESS DATA COMMUNICATIONS, FOURTH EDITION


A comprehensive presentation of data communications and telecommunications from a
business perspective. Covers voice, data, image, and video communications and applications
technology and includes a number of case studies. ISBN 0-13-088263-1

NETWORK SECURITY ESSENTIALS


A tutorial and survey on network security technology. The book covers important network
security tools and applications, including S/MIME, IP Security, Kerberos, SSL/TLS, SET,
and X509v3. In addition, methods for countering hackers and viruses are explored.
ISBN 0-13-016093-8

Prentice Hall www.prenhall.com/stallings telephone: 800-526-0485


Digitized by the Internet Archive
in 2019 with funding from
Kahle/Austin Foundation

https://archive.org/details/highspeednetworkOOOOstal
High-Speed Networks
and Internets:
Performance
and Quality of Service
Second Edition
High-Speed Networks
and Internets:
Performance
and Quality of Service
Second Edition

William Stallings

Prentice Hall
Upper Saddle River, New Jersey 07458
Library of Congress Cataloging-in-Publication Data

Stallings, William.
High-speed Networks and Internets 2/e / William Stallings,
p. cm.
Includes bibliographical references.
ISBN 0-13-032221-0
1. Wireless networks. 2. Communications. I. Title.

TK5106.3.L28 2001
005.8—dc21 2001036764
CIP

Vice-President and Editorial Director, ECS: Marcia J. Horton


Publisher: Alan R. Apt
Associate Editor: Toni D. Holm
Editorial Assistant: Patrick Lindner
Vice President and Director of Production and Manufacturing, ESM: David W. Riccardi
Executive Managing Editor: Vince O'Brien
Managing Editor: David A. George
Production Editor: Rose Kernan
Composition: V&M Graphics
Director of Creative Services: Paul Belfanti
Creative Director: Carole Anson
Art Director and Cover Designer: Heather Scott
Art Editor: Greg Dulles
Manufacturing Manager: Trudy Pisciotti
Manufacturing Buyer: Lisa McDowell
Senior Marketing Manager: Jennie Burger

© 2002 by Prentice-Hall, Inc.


Upper Saddle River, New Jersey 07458

All right reserved. No part of this book may be reproduced, in any form or by any means,
without permission in writing from the publisher.

The author and publisher of this book have used their best efforts in preparing this book. These efforts include the
development, research, and testing of the theories and programs to determine their effectiveness. The author and
publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation
contained in this book. The author and publisher shall not be liable in any event for incidental or consequential
damages in connection with, or arising out of, the furnishing, performance, or use of these programs.

Printed in the United States of America


10 987654321

ISBN D-13-D32EE1-Q
Pearson Education Ltd., London
Pearson Education Australia Pty.. Limited, Sydney
Pearson Education Singapore, Pte. Ltd.
Pearson Education North Asia Ltd., Hong Kong
Pearson Education Canada, Ltd., Toronto
Pearson Education de Mexico, S.A. de C.V.
Pearson Education—Japan, Tokyo
Pearson Education Malaysia, Pte. Ltd.
Pearson Education, Upper Saddle River, New Jersey
For A.
My wife and friend
Contents

Preface xiii

PART ONE BACKGROUND 1

CHAPTER 1 Introduction 3

1.1 A Brief Networking History 4


1.2 The Need for Speed and Quality of Service 13
1.3 Advanced TCP/IP and ATM Networks 18
1.4 Outline of the Book 21
Appendix 1A Internet and Web Resources 23

CHAPTER 2 Protocols and the TCP/IP Suite 27

2.1 The Need for a Protocol Architecture 27


2.2 The TCP/IP Protocol Architecture 28
2.3 The QSI Model 36
2.4 Internetworking 37
2.5 Recommended Reading and Web Site 44
2.6 Problems 44

CHAPTER 3 TCP and IP 47

3.1 Transmission Control Protocol (TCP) 47


3.2 User Datagram Protocol 50
3.3 The Internet Protocol (IP) 51
3.4 IPv6 59
3.5 Recommended Reading and Web Sites 68
3.6 Problems 69

PART TWO HIGH-SPEED NETWORKS 71

CHAPTER 4 Frame Relay 73

4.1 Packet-Switching Networks 73


4.2 Frame Relay Networks 82
4.3 Recommended Reading and Web Sites 88
4.4 Problems 89

CELAPTER 5 Asynchronous Transfer Mode 91


5.1 ATM Protocol Architecture 92
5.2 ATM Logical Connections 93
5.3 ATM Cells 98
Vlll CONTENTS

5.4 ATM Service Categories 104


5.5 ATM Adaptation Layer (AAL) 107
5.6 Recommended Reading and Web Sites 118
5.7 Problems 118

CHAPTER 6 High-Speed LANs 121

6.1 The Emergence of High-Speed LANs 122


6.2 Ethernet 123
6.3 Fibre Channel 140
6.4 Wireless LANs 144
6.5 Recommended Reading and Web Sites 152
6.6 Problems 153

PART THREE PERFORMANCE MODELING


AND ESTIMATION 155
CHAPTER 7 Overview of Probability and Stochastic Process 159

7.1 Probability 159


7.2 Random Variables 164
7.3 Stochastic Processes 170
7.4 Recommended Reading and Web Site 179
7.5 Problems 179

CHAPTER 8 Queuing Analysis 183

8.1 How Queues Behave—A Simple Example 184


8.2 Why Queuing Analysis 188
8.3 Queuing Models 189
8.4 Single-Server Queues 197
8.5 Multiserver Queues 199
8.6 Examples 200
8.7 Queues with Priorities 205
8.8 Networks of Queues 206
8.9 Other Queuing Models 210
8.10 Estimating Model Parameters 211
8.11 Recommended Reading and Web Site 214
8.12 Problems 215

CHAPTER 9 Self-Similar Traffic 219

9.1 Self-Similarity 220


9.2 Self-Similar Data Traffic 223
9.3 Examples of Self-Similar Data Traffic 232
9.4 Performance Implications of Self-Similarity 237
9.5 Modeling and Estimation of Self-Similar Data Traffic 241
9.6 Recommended Reading and Web Site 244
9.7 Problems 245
Appendix 9A The Hurst Self-Similarity Parameter 245
CONTENTS IX

PART FOUR CONGESTION AND TRAFFIC


MANAGEMENT 249
CHAPTER 10 Congestion Control in Data Networks and Internets 253

10.1 Effects of Congestion 254


10.2 Congestion and Control 259
10.3 Traffic Management 262
10.4 Congestion Control in Packet-Switching Networks 264
10.5 Frame Relay Congestion Control 264
10.6 Recommended Reading and Web Sites 270
10.7 Problems 271

CHAPTER 11 Link-Level Flow and Error Control 275

11.1 The Need for Flow and Error Control 276


11.2 Link Control Mechanisms 279
11.3 ARQ Performance 288
11.4 Recommended Reading 299
11.5 Problems 300
Appendix 11A High-Level Data Link Control 302

CHAPTER 12 TCP Traffic Control 309

12.1 TCP Flow Control 309


12.2 TCP Congestion Control 322
12.3 Performance of TCP Over ATM 340
12.4 Recommended Reading and Web Sites 352
12.5 Problems 353

CHAPTER 13 Traffic and Congestion Control in ATM Networks 355

13.1 Requirements for ATM Traffic and


Congestion Control 356
13.2 ATM Traffic-Related Attributes 361
13.3 Traffic Management Framework 366
13.4 Traffic Control 367
13.5 ABR Traffic Management 380
13.6 GFR Traffic Management 391
13.7 Recommended Reading 395
13.8 Problems 396

PART FIVE INTERNET ROUTING 397


CHAPTER 14 Overview of Graph Theory and Least-Cost Paths 401

14.1 Elementary Concepts of Graph Theory 402


14.2 Shortest Path Length Determination 409
14.3 Recommended Reading 415
14.4 Problems 415
X CONTENTS

CHAPTER 15 Interior Routing Protocols 419

15.1 Internet Routing Principles 419


15.2 Distance-Vector Protocol: RIP 426
15.3 Link-State Protocol: OSPF 433
15.4 Recommended Reading and Web Site 441
15.5 Problems 442

CHAPTER 16 Exterior Routing Protocols and Multicast 443

16.1 Path-Vector Protocols: BGP and IDRP 443


16.2 Multicasting 450
16.3 Recommended Reading and Web Site 465
16.4 Problems 465

PART SIX QUALITY OF SERVICE


IN IP NETWORKS 467

CHAPTER 17 Integrated and Differentiated Services 469

17.1 Integrated Services Architecture (ISA) 470


17.2 Queuing Discipline 477
17.3 Random Early Detection 485
17.4 Differentiated Services 492
17.5 Recommended Reading and Web Sites 500
17.6 Problems 502
Appendix 17A Real-Time Traffic 503

CHAPTER 18 Protocols for QoS Support 507

18.1 Resource Reservation: RSVP 508


18.2 Multiprotocol Label Switching 521
18.3 Real-Time Transport Protocol (RTP) 533
18.4 Recommended Reading and Web Sites 544
18.5 Problems 545

PART SEVEN COMPRESSION 547

CHAPTER 19 Overview of Information Theory 549

19.1 Information and Entropy 549


19.2 Coding 554
19.3 Recommended Reading 561
19.4 Problems 561

CHAPTER 20 Lossless Compression 563

20.1 Run-Length Encoding Techniques 564


20.2 Facsimile Compression 567
CONTENTS XI

20.3 Arithmetic Coding 574


20.4 String-Matching Algorithms 581
20.5 Recommended Reading and Web Site 587
20.6 Problems 588

CHAPTER 21 Lossy Compression 591

21.1 Discrete Cosine Transform 592


21.2 Wavelet Compression 598
21.3 JPEG Image Compression 608
21.4 MPEG Video Compression 619
21.5 Recommended Reading and Web Sites 625
21.6 Problems 627

APPENDICES

APPENDIX A Standards and Standards-Setting Organizations 629

A.l The Importance of Standards 629


A.2 Standards and Regulation 630
A.3 Internet Standards and the Internet
Society 631
A.4 The International Telecommunications
Union 635
A. 5 IEEE 802 Standards 636

APPENDIX B Sockets 639

B. l Versions of Sockets 640


B.2 Sockets, Socket Descriptors, Ports, and Connection 641
B.3 The Client/Server Model of Communication 642
B.4 Sockets Elements 644
B.5 Stream and Datagram Sockets 660
B.6 Run-Time Program Control 665
B.7 Remote Execution of a Windows Console Application 669

GLOSSARY 679

REFERENCES 687

INDEX 701
Preface

This book aims at helping to disentangle from an immense mass of material the crucial
issues and cardinal decisions. Throughout I have set myself to explain faithfully and to
the best of my ability what happened and why.

—The World Crisis, Winston Churchill

High-speed networks now dominate both the wide-area network (WAN) and
local area network (LAN) markets. In the WAN market, two related trends
have appeared. Public and private data networks have evolved from packet-
switching networks in the 10s and 100s of kbps, to frame relay networks oper¬
ating at up to 2 Mbps, and now to asynchronous transfer mode (ATM)
networks operating at 155 Mbps or more. For the Internet and private cor¬
porate internets, data rates have also soared, with one noteworthy milestone
being the construction of a 155-Mbps backbone in 1996.
For many years, the most common LAN was the 10-Mbps shared
Ethernet. Then came the switched Ethernet, which offers a dedicated 10
Mbps to each end system. This was followed by Fast Ethernet at 100 Mbps
and now Gigabit Ethernet and 10-Gbps Ethernet. Recent years have also
seen the introduction of Fibre Channel LANs with speeds up to 3.2 Gbps and
wireless LANs with speeds up to 54 Mbps.
This rapid introduction of high-speed networks has spurred the devel¬
opment of new applications and has in turn been driven by the popularity of
those applications. Key driving forces have been the increasing use of still
image and video data in applications and the popularity of the World Wide Web.

gPffg gig|SJ4wMfifmmiS-

High-speed networks, including gigabit networks, form the focus of the book.
Design issues related to two types of networks occupy our attention: inter¬
nets based on the Internet Protocol (IP) and the entire TCP/IP protocol
suite, and ATM (asynchronous transfer mode) networks. These two net-
XIV PREFACE

working technologies dominate the high-speed scene and share many common
design approaches.
The objective of this book is to provide an up-to-date survey of developments
in this area. Central problems that confront the network designer are the need to
support multimedia and real-time traffic, the need to control congestion, and the
need to provide different levels of quality of service (QoS) to different applications.

INTENDED AUDIENCE

This book is intended for both a professional and an academic audience. For the
professional interested in this field, the book serves as a basic reference volume and
is suitable for self-study.
As a textbook, it is suitable for an advanced undergraduate or graduate course.
The book treats a number of advanced topics and provides a brief survey of the
required elementary topics. After Parts One and Two, the parts are relatively in¬
dependent. Fewer parts could be covered for a shorter course, and the parts can be
covered in any order.

PLAN OF THE BOOK

The book is divided into seven parts:

Part One. Background: Provides a brief survey of fundamental principles,


with coverage of TCP/IP and internetworking.
Part Two. High-Speed Networks: Provides an overview of frame relay net¬
works, ATM networks, and high-speed LANs.
Part Three. Performance Modeling and Estimation: The modeling of traffic
flow is important both for network design and configuration and for the
request of network services. This part provides a tutorial on the use of queu¬
ing analysis to model throughput, delay, and buffer requirements. There is
increasing evidence that much of the traffic on high-speed networks is self¬
similar, for which the traditional queuing analysis does not apply. The nature
of self-similar traffic, and modeling approaches, are examined.
Part Four. Congestion and Traffic Management: Begins with a discussion of
congestion control issues and design approaches for networks and internets.
The relatively simple case of link level flow control is used to introduce issues
of end-to-end flow control. This part then discusses end-to-end performance
parameters and techniques used by TCP to achieve high throughput and to
manage congestion. Finally, the part deals with traffic management and con¬
gestion control in ATM networks
Part Five. Internet Routing: Covers the major approaches to routing, includ¬
ing distance-vector, link-state, and path-vector routing, and examines multi¬
cast routing.
PREFACE XV

Part Six. Quality of Service in IP Networks: Within an IP-based network,


techniques are needed to control congestion and to provide the desired QoS
to active applications. This part surveys those techniques, beginning with a dis¬
cussion of integrated and differentiated services. Then, important protocols
that relate to QoS are examined, including RSVP, MLPS, and RTP.
Part Seven. Compression: Covers both lossless and lossy compression
techniques.

In addition, the book includes an extensive glossary, a list of frequently used


acronyms, and a bibliography. Each chapter includes problems, suggestions for fur¬
ther reading, and pointers to relevant Web sites.

INTERNET SERVICES FOR INSTRUCTORS AND STUDENTS

There is a Web page for this book that provides support for students and in¬
structors. The page includes links to relevant sites, transparency masters of
figures and tables in the book in PDF (Adobe Acrobat) format, PowerPoint slides,
and sign-up information for the book's internet mailing list. The Web page is at
WilliamStallings.com/HsNet2e.html; see Chapter 1 for more details. An Internet
mailing list has been set up so that instructors using this book can exchange infor¬
mation, suggestions, and questions with each other and with the author. As soon as
typos or other errors are discovered, an errata list for this book will be available at
WilliamStallings.com. Finally, I maintain the Computer Science Student Resource
Site at WilliamStallings.com/StudentSupport.html.

SOCKETS PROGRAMMING

The book includes a description of Sockets (Appendix B), and the instructor’s
manual includes a set of programming projects. The appendix includes a concise
overview of Sockets, a discussion of the importance of this facility and a short primer
on how to use Sockets, as well as pointers for getting more information on the Web.
Sockets programming is an “easy” topic and one that can result in very satisfying
hands-on projects for students.

WHAT’S NEW IN THE SECOND EDITION

In the four years since the first edition of this book was published, the field has seen
continued innovations and improvements. In this edition, I try to capture these
changes while maintaining a broad and comprehensive coverage of the entire field.
To begin the process of revision, the first edition of this book was extensively
reviewed by a number of professors who teach the subject and by professionals
XVI PREFACE

working in the field. The result is that, in many places, the narrative has been clar¬
ified and tightened, and illustrations have been improved. Also, a number of new
“field-tested” problems have been added.
Beyond these refinements to improve pedagogy and user friendliness, the
technical content of the book has been updated throughout, to reflect the ongoing
changes in this exciting field. In addition, the book has been reorganized to provide
a better grouping of topics. Some of the most noteworthy changes are the following:

• Congestion control: A separate chapter is now devoted to this topic. This uni¬
fied presentation clarifies the issues involved.
• Differentiated services: There have been substantial developments since the
publication of the first edition in enhancements to the Internet to support a
variety of multimedia and time-sensitive traffic. The most important develop¬
ment, and perhaps the most important vehicle for providing QoS in IP-based
networks is differentiated services (DS). This edition provides thorough cov¬
erage of DS.
• Guaranteed frame rate (GFR): Since the first edition, a new ATM service has
been standardized: GFR. GFR is designed specifically to support IP backbone
subnetworks. This edition provides an explanation of GFR and examines the
mechanisms underlying the GFR service.
• Multiprotocol label switching (MPLS): MPLS has emerged as a fundamentally
important technology in the Internet and is covered in this edition.
• TCP/IP details: A new background chapter on TCP and IP has been added,
pulling together material scattered throughout the first edition. This material
is vital to an understanding of QoS and performance issues in IP-based net¬
works.
• High-speed LANs: The chapter on high-speed LANs has been extensively
updated and revised. The material on Ethernet now includes 10-Gbps Ether¬
net. The chapter now covers Fibre Channel and high-speed wireless LANs.
• Frame relay: Despite the importance and growing acceptance of ATM, frame
relay remains the most widely used high-speed WAN technology. Accord¬
ingly, the coverage of the frame relay protocol and frame relay congestion con¬
trol is expanded in this edition.
• Wavelet compression: Wavelet compression has become increasingly popular
and is covered in this edition.

ACKNOWLEDGMENTS

This new edition has benefited from review by a number of people, who gave gen¬
erously of their time and expertise. The following people reviewed all or a large part
of the manuscript: Chunming Qiao (SUNY-Buffalo), Ken Christensen (U. of South
Florida), George Polyzoa (UC-San Diego), Ying Sun (U. of Rhode Island), and
George Scheets (Oklahoma State).
Thanks also to the many people who provided detailed technical reviews of
a single chapter: David Bunde, Dan Li, Ian Sutherland, Wei Zhou, Marc Timme,
PREFACE XVII

Brian Borchers, Balbir Singh, Dean Newton, Paul A. Watters, Peter Rabinovitch,
Stephen Campbell-Robson, Roger L. Bagula, Diet Ostry, Lars Kristensen, San
Skulrattanakulchai, Lieven Marchand, Robert Kolter, Chris Pollett, and Stefan
Katzenbeisser.
Thanks also to Dean Newton, who developed the PowerPoint slides for the
book, and Zornitza Genova, who provided the material on Sockets and the Sockets
programming projects.
Also, I would like to acknowledge those who contributed homework problems:
Ahmed A-G Helmy (University of Southern California) and Franklin Mendivil
(University of Waterloo).
Finally, I would like to thank the many people responsible for the publication
of the book, all of whom did their usual excellent job. This includes the staff at
Prentice Hall, particularly my editors Toni Holm and Alan Apt and production
manager Rose Kernan. Also, Jake Warde of Warde Publishers managed the sup¬
plements and reviews: Joanna V. Pomeranz, at V&M managed the book’s printing;
and Patricia M. Daly did the copy editing.
With all this assistance, little remains for which I can take full credit. However,
I am proud to say that, with no help whatsoever, I selected all of the quotations.
High-Speed Networks
and Internets:
Performance
and Quality of Service

Second Edition
PART
ONE Background

The purpose of Part One is to provide a background and context for the re¬
mainder of this book. The fundamental concepts of computer-communication
protocols are presented.

sisaissssspplfl
Hp 3 T ! >

Chapter 1: Introduction
Chapter 1 provides an overview of the entire book, giving the “big picture.”
In essence, the book deals with two themes: performance and Quality of Ser¬
vice (QoS) for communications networks. Performance and QoS are the key
design requirements for high-speed networks, including communications net¬
works such as frame relay and Asynchronous Transfer Mode (ATM) and
internetworks such as the Internet and intranets. Chapter 1 provides a pre¬
view of these topics.

Chapter 2: Protocols and Architecture


Data network communication and distributed applications rely on underly¬
ing communications software that is independent of application and relieves
the application of much of the burden of reliably exchanging data. This com¬
munications software is organized into a protocol architecture, the most
important incarnation of which is the TCP/IP protocol suite. Chapter 2 intro¬
duces the concept of a protocol architecture and provides an overview of
Random documents with unrelated
content Scribd suggests to you:
Belinda's hair is golden, her eyes a lovely blue,
Her dress is soft and frilly, and tied with ribbon too,
She has a pretty bonnet, and shoes and gloves and fan,
For she's Belinda Bella and not Eliza Ann.

Eliza's hair is browny, one eye has gone away,


She has a flannel nighty and wears it all the day,
Her face is scratched and battered, just like our wat'ring-can;
She's not Belinda Bella, but just Eliza Ann.

I know Belinda Bella is beautiful to see,


And when I go out walking Belinda comes with me;
But when in bed I cuddle as closely as I can
I do not have Belinda, but dear Eliza Ann.

I do not mind the scratches upon Eliza's face,


I'd rather have her nighty than yards of frilly lace.
Just come and I will whisper as softly as I can—
I like Belinda Bella, but I LOVE Eliza Ann!

Tibby

Four black legs and four white paws,


Pinky pads and curving claws,
Making marks on people's doors,
That's Tibby.

Little shirt-front, snowy-white,


Two green eyes so round and bright,
Velvet body strong and light,
That's Tibby.
Pinky tongue that washes fur,
Every part except his purr,
Sometimes much too bored to stir,
That's Tibby.

Walking so he won't be heard,


Hiding 'neath the ferns preferred,
Watching for a dicky-bird,
Oh, Tibby!

Stretching on the kitchen mat,


Long and lovely, sleek and fat,
Quite a yard of pussy-cat,
My Tibby!

Take what pretty things you see—


Take the cake I've made for tea—
Take my doll, but leave to me
My Tibby!

The Thin Cat

He walked upon our garden wall,


He hadn't got a home at all,
The thin cat, the thin cat,
The little homeless thin cat!

I don't believe he ever purr'd,


He never knew a loving word,
The thin cat, the thin cat,
The little homeless thin cat!
But Mother said, "Go, bring him in,
I cannot bear to see him thin,"
The thin cat, the thin cat,
The little homeless thin cat!

So now he purrs upon the mat,


His coat is soft—he's warm and fat,
The fat cat, the fat cat,
The little cared-for fat cat!

Pussy Language

Only one word has Tabby,


Only one word has she,
For breakfast and dinner and supper,
And in between dinner and tea.

"Me-ow" stands for milk and for pudding,


"Me-ow" stands for fish and for meat,
"Me-ow" as she waits on the carpet,
And pats with her two little feet.

"Me-ow" for the mouse in the cupboard,


"Me-ow" for the sparrow outside,
"Me-ow" for the bed warm and cosy,
And everything comfy beside.

Only one word has Tabby,


Think, little children, of that.
You'd never be bothered with grammar
If you were a nice little cat!
Estella

Estella is as good as gold—


She always does as she is told—
Her pinafore is always clean,
Her shoes the shiniest I've seen.

Her nose is straight, so is her hair,


She's not untidy anywhere,
And if she knocks against me, she
Bows low and whispers, "Pardon me."

Her lessons they are always done


Before she has her play and fun;
And everything is put away—
Estella says it's part of play.

She hates to play and make a noise:


She says that we are girls, not boys.
She will not even ride a bike—
You see, it's so unladylike.

And when she comes to Sunday tea


She never eats as much as me;
She says it is an ugly sight
To see a vulgar appetite.

Estella says, "I want to grow


As noble as Mamma, you know,"
And Mother says to me, "My dear,
I'm glad to have Estella here."
The very thought gives me a fright,
It is a nightmare in the night.
However can I go and tell her
I simply hate and loathe Estella?

Dreams

In Nursery Land when lights are low,


And shadows hurry to and fro,
The Dream Man comes when day is done
And gives a dream to every one!

One dream will make you float in air


Instead of climbing up the stair,
Another gives you spreading wings
Instead of legs and other things!

And one will make you seem so small


You cannot feel yourself at all,
Another, you may walk a mile
By stepping only once a while!

Another makes you, oh, so high,


You very nearly touch the sky;
You turn and give a monster jump,
And wake in time to miss the bump!
IV

STORIES

The Pixies on the Moor

Come, my little darling, and shut the oaken door,


This is the time when Pixie-folk are peeking on the moor;
They're very naughty Pixie-folk, and up to awful tricks,
So shut the door, my darling, for the clock is striking six.

They steal the milk from Cushy-cow, they suck the bantam's eggs,
They harry all the mother sheep, and run them off their legs;
They sip the cream from out the pans, and leave it thin and poor,
So 'ware the naughty Pixie-folk that peek upon the moor.

They sit upon the handle when Nanette is at the churn,


And, lo, when she has worked for hours the butter will not 'turn';
And once when she was in the field they came along to stare,
They pulled her apron-strings undone, and left her standing there.

They steal the new-born lambs, they do, and lure the foals away,
They play their tricks in mowing-fields, and trample new-mown
hay;
They worry girls on market-day, as cheeky as can be,
And once they mixed a pound of rice in Aunt Eliza's tea.

And once there was a traveller upon the lonesome wild,


He left his horse because he heard the crying of a child;
He found he was mistaken, and then, alack-a-day,
He saw the Pixies on his horse a-galloping away.

And once there was a naughty girl who stole her mother's jam,
She said she didn't do it, and she blamed it on to Sam;
The Pixie-folk were passing, on their journey to the South,
They tied her hands behind her back and plastered up her mouth.

And once again a cruel boy was breaking up a nest,


He turned the baby robins out and wouldn't let them rest;
The Pixies came and chased him far, and left him in a bog,
They splashed the mud upon his face and wrapped him in a fog.

So when I come to think of it, the Pixies aren't all bad,


And if they punish naughty folk, why, then I'm very glad,
But I am still afraid of them and all their funny tricks,
So shut the door, my darling, for the clock is striking six.

Jerry

The True Story of a Little Boy who Ran Away

Jerry was sick of school and play,


So Jerry determined to run away;
He made a pack from an ancient sack,
And fastened it on to his strong young back.
A frying-pan and a kettle of tin,
A boot-box to keep his rations in.
Sing ho! for adventure, bold and merry,
There's none so brave in the world as Jerry.

Jerry's face was a great big smile


When he found himself at the second mile;
But he couldn't hurry the way he ought,
For the road was long and Jerry was short.
And the awkward pack was loose and slack,
And bobbed and rattled across his back;
Sing ho! for adventure, bold and merry,
There's none so brave in the world as Jerry.

The dust of the road was upon his face


When Jerry came to his camping-place;
A bush of gorse and a hawthorn-tree,
A glimpse of the far-off restless sea,
A broken boulder, and there, oh, joy!
A cave the size of a little boy.
Sing ho! for adventure, bold and merry,
There's none so brave in the world as Jerry.

The cave was found to be dark and damp,


So Jerry arranged for an outside camp;
He lit a fire and made him tea,
And drank it under the hawthorn-tree.
True it was queer and made him choke
(One part water and three parts smoke).
Sing ho! for adventure, bold and merry,
There's none so brave in the world as Jerry.

The day drew in as the night came by,


And thousands of stars shone in the sky.
"Squeak" went the bat and "Hoot" the owl,
And a farmhouse dog gave a long-drawn howl.
Jerry sat up and shivered and shook,
And peeped in the cave with a terrified look.
Sing ho! for adventure, bold and merry,
But there's none so scared in the world as Jerry.

What cared Jerry for camping-grounds


When night was giving her awful sounds?
What cared Jerry for kettle and pan?
Jerry took to his heels and ran,
Swift as an arrow from the bow,
Swift as a runner of long ago.
Sing ho! for adventure, bold and merry,
There's none so scared in the world as Jerry.

In at the little well-worn gate,


Just as the clock was striking eight.
Jerry who ran away, it's plain,
Was Jerry who ran right home again!
And Mother, who knew a thing or two,
Knew how to keep a secret true.
Sing ho! for adventure, bold and merry,
There's none so glad in the world as Jerry.

The Toys in the Cupboard

The toys in the cupboard were terribly angry,


The toys in the cupboard were mad as could be,
For Patty had jumbled them roughly together,
And left them from breakfast till afternoon tea.

Said Doll, "It's disgraceful, I shall not endure it,


I've lain on the engine along with the top."
Said Duck, "It's prepost'rous, I'll send a complaint in,
I lay on the ball and the rubber went pop."

Said Horse, "Here's a pickle, I sat on Eliza,


Her face is all scratched and her eye is pushed in."
Said Lamb, "Here's a muddle, my tail's in the tea-pot,
I can't get it out, and it pricks like a pin."

Said Cow, "It is shocking, my horn's in the trumpet,


And Sambo is squashed underneath me, I know."
Said Book, "I am lying all twisted and crumpled,
A drum is on top and the ink-pot below."

When Patty came in she was terribly frightened,


The cupboard was moving about, she was sure,
She heard angry voices, "It's perfectly awful,
It's simply disgraceful—I cannot endure."

She straightened the cupboard, put toys in their places,


She brushed out the Doll's hair, and smoothed down the Horse,
She took the soft tail of the Lamb from the teapot,
And tenderly cared for the others, of course.

The toys in the cupboard were pleased and contented,


No longer they grumbled, no longer they wept,
For Patty had learned a most wonderful lesson,
And now the toy cupboard is splendidly kept.

The Pencil's Story

I am a little pencil, and my name is H and B,


I lie upon the mantelpiece for every one to see;
I'm handled forty times a day, it is a weary life,
And when my wits are rather dull I'm sharpened with a knife!

I scrawl when Tommy has me, and I draw all sorts of things,
From submarines and aeroplanes to cabbages and kings;
I write a lovely letter when Miss Phyllis is about,
And if by chance I make mistakes Miss Phyllis rubs them out.

And if I slip and tumble down I'm certain to be missed,


For Mother wants me badly when she does the washing-list,
And Father makes me keep the score when he begins to play—
I'm just a little pencil, but I have a busy day.

I really never am allowed to grow up as I ought,


I'm getting shorter every day (it's awful to be short),
And when the knife begins on me I ache in every joint,
I put it in that way because you're sure to see the point.

I'm very glad I'm useful, though my speech is always dark,


But every time they handle me I always make my mark!
But sorrow seems to follow me in spite of many a friend,
For when I'm meditating I am bitten at the end.

I am a little pencil, and my name is H and B,


I lie upon the mantelpiece for every one to see;
I'm getting shorter every day, and every day I'm older,
And when my last few hours have come they'll put me in a holder!

New Year

The Old Year sat in his armchair warm,


And his eyes were fixed on the floor,
When suddenly out of the winter storm
Came a little tap-tap at the door.

The wind went tearing around and about


All with a terrible din;
The blind blew in as the lamp blew out,
And the little New Year walked in.

He lit the lamp and he closed the door


As the Old Year slipped away,
Then he opened his treasure upon the floor
And took out another day!

Brother Francis

He walks the streets of London Town,


A little Brother dressed in brown.

Up Ludgate Hill he goes and calls


The pigeons flying round St Paul's.

He walks across Trafalgar Square,


Because he knows the pigeons there.

And sitting 'neath the Temple trees


The starlings flutter to his knees.

His sandall'd feet tread softly on


The garden-ways of Kensington,

And furry brethren understand


The pressure of his gentle hand.

Our little Brother—gentle—free—


Benedice ... Domine![1]

[1] This means "Bless, O Lord."


*** END OF THE PROJECT GUTENBERG EBOOK THE LITTLE
WHITE GATE ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

You might also like