• Protocols and Layers
✔ The Illustrated Network
✔ Remote Access to Network Devices
✔ File Transfer to a Router
✔ CLI and GUI
✔ Wireshark and Packet Capture
✔ First Explorations in Networking
✔ Protocols
✔ Standards and Organizations
✔ Request for Comment and the Internet Engineering
✔ Task Force
✔ Internet Administration
✔ Layers
✔ Simple Networking
✔ Protocol Layers
✔ The TCP/IP Protocol Suite
✔ The TCP/IP Layers
✔ Protocols and Interfaces
✔ Encapsulation
✔ The Layers of TCP/IP
✔ The Physical Layer
✔ The Data Link Layer
✔ The Network Layer
✔ The Transport Layer
✔ The Application Layer
✔ Session Support
✔ Internal Representation Conversion
✔ Applications in TCP/IP
✔ The TCP/IP Protocol Suite
• TCP/IP Protocols and Devices
✔ Protocol Stacks on the Illustrated Network
✔ Layers, Protocols, Ports, and Sockets
✔ The TCP/IP Protocol Stack
✔ The Client—Server Model
✔ TCP/IP Layers and Client—Server
✔ The IP Layer
✔ The Transport Layer
✔ Transmission Control Protocol
✔ User Datagram Protocol
✔ The Application Layer
✔ Bridges, Routers, and Switches
✔ Segmenting LANs
✔ Bridges
✔ Routers
✔ LAN Switches
✔ Virtual LANs
✔ VLAN Frame Tagging
✔ •Network Link Technologies
✔ Illustrated Network Connections
✔ Displaying Ethernet Traffic
✔ Displaying SONET Links
✔ Displaying DSL Links
✔ Displaying Wireless Links
✔ Frames and the Link Layer
✔ The Data Link Layer
✔ The Evolution of Ethernet
✔ Ethernet II and IEEE 802 3 Frames
✔ MAC Addresses
✔ The Evolution of DSL
✔ PPP and DSL
✔ PPP Framing for Packets
✔ DSL Encapsulation
✔ Forms of DSL
✔ The Evolution of SONET
✔ A Note about Network Errors
✔ Packet over SONET/SDH
✔ Wireless LANs and IEEE 802 11
✔ Wi-Fi
✔ IEEE 802 11 MAC Layer Protocol
✔ The IEEE 802 11 Frame
• Packet Optical Networks and Forward Error
✔ Correction
✔ Packet Optical Networks and Error Correction
✔ Packet Optical Networks and the Optical Transport
✔ Network
✔ Standards for Packet Optical Networks and Forward
✔ Error Correction
✔ Handling Single Bit Errors and Burst Errors
✔ Hamming Distance and Hamming Codes
✔ A Better Hamming Code Method
✔ Hamming Code in Action
✔ Hamming Code Implementation
✔ Burst Errors and Interleaving
✔ Modern FEC Operation
✔ FEC and SONET/SDH
✔ FEC and OTN
✔ The OTN Frame and FEC
✔ Generic Framing Procedure
✔ FEC Research and Development
✔ OTN for the Illustrated Network
• IPv4 and IPv6 Addressing
✔ IP Addressing
✔ The Network/Host Boundary
✔ The IPv4 Address
✔ Private IPv4 Addresses
✔ Understanding IPv4 Addresses
✔ The IPv6 Address
✔ Features of IPv6 Addressing
✔ IPv6 Address Types and Notation
✔ IPv6 Address Prefixes
✔ Subnetting and Supernetting
✔ Subnetting in IPv4
✔ Subnetting Basics
✔ CIDR and VLSM
✔ IPv6 Addressing Details
✔ IP Address Assignment
✔ Complete IPv4 and IPv6 Address Ranges
• Address Resolution Protocol
✔ ARP and LANs
✔ ARP Packets
✔ Example ARP Operation
✔ ARP Variations
✔ Proxy ARP
✔ Reverse ARP
✔ ARPs on WANs
✔ ARP and IPv6
✔ Neighbor Discovery Protocol
✔ ND Address Resolution
• IPv4 and IPv6 Headers
✔ Packet Headers and Addresses
✔ The IPv4 Packet Header
✔ Fragmentation and IPv4
✔ Fragmentation and MTU
✔ Fragmentation and Reassembly
✔ Path MTU Determination
✔ A Fragmentation Example
✔ Limitations of IPv4
✔ The IPv6 Header Structure
✔ IPv4 and IPv6 Headers Compared
✔ IPv6 Header Changes
✔ IPv6 and Fragmentation
• Internet Control Message Protocol
✔ ICMP and Ping
✔ The ICMP Message Format
✔ ICMP Message Fields
✔ ICMP Types and Codes
✔ Sending ICMP Messages
✔ When ICMP Must Be Sent
✔ When ICMP Must Not Be Sent
✔ Ping
✔ Traceroute
✔ Path MTU
✔ ICMPv6
✔ Basic ICMPv6 Messages
✔ Time Exceeded
✔ Neighbor Discovery and Autoconfiguration
✔ Routers and Neighbor Discovery
✔ Interface Addresses
✔ Neighbor Solicitation and Advertisement
• Routing
✔ Routers and Routing Tables
✔ Hosts and Routing Tables
✔ Direct and Indirect Delivery
✔ Routing
✔ Direct Delivery Without Routing
✔ Indirect Delivery and the Router
• Forwarding IP Packets
✔ Router Architectures
✔ Basic Router Architectures
✔ Another Router Architecture
✔ Router Access
✔ The Console Port
✔ The Auxiliary Port
✔ The Network
✔ Forwarding Table Lookups
✔ Dual Stacks, Tunneling, and IPv6
✔ Dual Protocol Stacks
✔ Tunneling
✔ Tunneling Mechanisms
✔ Transition Considerations
• User Datagram Protocol
✔ UDP Ports and Sockets
✔ What UDP Is For
✔ The UDP Header
✔ IPv4 and IPv6 Notes
✔ Port Numbers
✔ Well-Known Ports
✔ The Socket
✔ UDP Operation
✔ UDP Overflows
• Transmission Control Protocol
✔ TCP and Connections
✔ The TCP Header
✔ TCP Mechanisms
✔ Connections and the Three-Way Handshake
✔ Connection Establishment
✔ Data Transfer
✔ Closing the Connection
✔ Flow Control
✔ TCP Windows
✔ Flow Control and Congestion Control
✔ Performance Algorithms
✔ TCP Behaving Badly?
✔ TCP and FTP
• Multiplexing and Sockets
✔ Layers and Applications
✔ The Socket Interface
✔ Socket Libraries
✔ TCP Stream Service Calls
✔ The Socket Interface: Good or Bad?
✔ The “Threat” of Raw Sockets
✔ Socket Libraries
✔ The Windows Socket Interface
✔ TCP/IP and Windows
✔ Sockets for Windows
✔ Sockets on Linux
• ROUTING AND ROUTING PROTOCOLS
• Routing and Peering
✔ Network Layer Routing and Switching
✔ Connection-Oriented and Connectionless Networks
✔ Quality of Service
✔ Host Routing Tables
✔ Routing Tables and FreeBSD
✔ Routing Tables and RedHat Linux
✔ Routing and Windows
✔ The Internet and the Autonomous System
✔ The Internet Today
✔ The Role of Routing Policies
✔ Peering
✔ Picking a Peer
• IGPs: RIP, OSPF, and IS-IS
✔ Interior Routing Protocols
✔ The Three Major IGPs
✔ Routing Information Protocol
✔ Distance-Vector Routing
✔ Broken Links
✔ Distance-Vector Consequences
✔ RIPv1
✔ RIPv2
✔ RIPng for IPv6
✔ A Note on IGRP and EIGRP
✔ Open Shortest Path First
✔ Link States and Shortest Paths
✔ What OSPF Can Do
✔ OSPF Router Types and Areas
✔ Non-backbone, Non-stub Areas
✔ OSPF Designated Router and Backup Designated
✔ Router
✔ OSPF Packets
✔ OSPFv3 for IPv6
✔ Intermediate System-Intermediate System
✔ The IS-IS Attraction
✔ IS-IS and OSPF
✔ Similarities of OSPF and IS-IS
✔ Differences between OSPF and IS-IS
✔ IS-IS for IPv6
• Border Gateway Protocol
✔ BGP as a Routing Protocol
✔ Configuring BGP
✔ The Power of Routing Policy
✔ BGP and the Internet
✔ EGP and the Early Internet
✔ The Birth of BGP
✔ BGP as a Path-Vector Protocol
✔ IBPG and EBGP
✔ IGP Next Hops and BGP Next Hops
✔ BGP and the IGP
✔ Other Types of BGP
✔ BGP Attributes
✔ BGP and Routing Policy
✔ BGP Scaling
✔ BGP Message Types
✔ BGP Message Formats
✔ The Open Message
✔ The Update Message
✔ The Notification Message
• Expanded Uses for BGP
✔ Introduction
✔ Optimal Route Reflection (ORR)
✔ “Regular” Route Reflection
✔ ORR Considered
✔ BGP and Flow Specification
✔ BGP and DDoS
✔ BGP Flow Spec Details
✔ BGP in the Very Large Data Center
✔ Data Centers as CLOS Networks
✔ Layer 2 and Layer 3 in a Folded CLOS Network
✔ Data Center
✔ Use iBGP or eBGP?
✔ Let Data Center Use eBGP, Not an IGP
✔ Example of BGP Use in the Data Center
✔ Distributing Link-State Information with BGP
✔ The IGP Limitations
✔ The BGP Solution
✔ Implementing BGP for Link-State Protocols
✔ Juniper Network’s Implementation Details
✔ Summary of Supported and Unsupported Features
✔ Configuring BGP-LS on the Illustrated Network
• Multicast
✔ A First Look at IPv4 Multicast
✔ Multicast Terminology
✔ Dense and Sparse Multicast
✔ Dense-Mode Multicast
✔ Sparse-Mode Multicast
✔ Multicast Notation
✔ Multicast Concepts
✔ Reverse-Path Forwarding
✔ The RPF Table
✔ Populating the RPF Table
✔ Shortest-Path Tree
✔ Rendezvous Point and Rendezvous-Point
✔ Shared Trees
✔ Protocols for Multicast
✔ Multicast Hosts and Routers
✔ Multicast Group Membership Protocols
✔ Multicast Routing Protocols
✔ Any-Source Multicast and SSM
✔ Multicast Source Discovery Protocol
✔ Frames and Multicast
✔ IPv4 Multicast Addressing
✔ IPv6 Multicast Addressing
✔ PIM-SM
✔ The Resource Reservation Protocol and PGM
✔ Multicast Routing Protocols
✔ IPv6 Multicast
• MPLS and IP Switching
✔ Converging What?
✔ Fast Packet Switching
✔ Frame Relay
✔ Asynchronous Transfer Mode
✔ Why Converge on TCP/IP?
✔ MPLS
✔ Basic MPLS Terminology
✔ Signaling and MPLS
✔ Label Stacking
✔ MPLS and VPNs
✔ MPLS Tables
✔ Configuring MPLS Using Static LSPS
✔ The Ingress Router
✔ The Transit Routers
✔ The Egress Router
✔ Traceroute and LSPs
• MPLS-Based Virtual Private Networks
✔ PPTP for Privacy
✔ Types of VPNs
✔ Security and VPNs
✔ VPNs and Protocols
✔ PPTP
✔ L2TP
✔ PPTP and L2TP Compared
✔ Types of MPLS-Based VPNs
✔ Layer 3 VPNs
✔ Layer 2 VPNs
✔ VPLS: An MPLS-Based L2VPN
✔ Router-by-Router VPLS Configuration
✔ P Router (P9)
✔ CE6 Router
✔ Does it Really Work?
• EVPN and VXLAN
✔ EVPN Overview
✔ L2VPNs and EVPN Compared
✔ EVPN Services Overview
✔ EVPN Control Plane Operation
✔ Layer 2 and Layer 3 and EVPN
✔ VXLAN and EVPN Data Planes
✔ Configuring an EVPN with VXLAN on the Illustrated
✔ Network
• Dynamic Host Configuration Protocol
✔ DHCP and Addressing
✔ DHCP Server Configuration
✔ Router Relay Agent Configuration
✔ Getting Addresses on LAN2
✔ Using DHCP on a Network
✔ BOOTP
✔ BOOTP Implementation
✔ BOOTP Messages
✔ BOOTP Relay Agents
✔ BOOTP “Vendor-Specific Area” Options
✔ Trivial File Transfer Protocol
✔ TFTP Messages
✔ TFTP Download
✔ DHCP
✔ DHCP Operation
✔ DHCP Message Type Options
✔ DHCP and Routers
✔ DHCPv6
✔ DHCPv6 and Router Advertisements
✔ DHCPv6 Operation
• The Domain Name System
✔ DNS Basics
✔ The DNS Hierarchy
✔ Root Name Servers
✔ Root Server Operation
✔ Root Server Details
✔ DNS in Theory: Name Server, Database, and Resolver
✔ Adding a New Host
✔ Recursive and Iterative Queries
✔ Delegation and Referral
✔ Glue Records
✔ DNS in Practice: Resource Records and Message Formats
✔ DNS Message Header
✔ DNSSec
✔ DNS Tools: nslookup, dig, and drill
✔ DNS in Action
• File Transfer Protocol
✔ Overview
✔ PORT and PASV
✔ FTP and GUIS
✔ FTP Basics
✔ FTP Commands and Reply Codes
✔ FTP Data Transfers
✔ Passive and Port
✔ File Transfer Types
✔ When Things Go Wrong
✔ FTP Commands
✔ Variations on a Theme
✔ A Note on NFS
• SMTP and Email
✔ Architectures for Email
✔ Sending Email Today
✔ The Evolution of Email in Brief
✔ SMTP Authentication
✔ Simple Mail Transfer Protocol
✔ Multipurpose Internet Mail Extensions
✔ MIME Media Types
✔ MIME Encoding
✔ An Example of a MIME Message
✔ Using POP3 to Access Email
✔ Headers and Email
✔ Home Office Email
• Hypertext Transfer Protocol
✔ HTTP in Action
✔ Uniform Resources
✔ URIs
✔ URLs
✔ URNs
✔ HTTP
✔ The Evolution of HTTP
✔ HTTP Model
✔ HTTP Messages
✔ Trailers and Dynamic Web Pages
✔ HTTP Requests and Responses
✔ HTTP Methods
✔ HTTP Status Codes
✔ HTTP Headers
✔ General Headers
✔ Request Headers
✔ Response Headers
✔ Entity Headers
✔ Cookies
• Securing Sockets with SSL
✔ SSL and Web Sites
✔ The Lock
✔ Secure Socket Layer
✔ Privacy, Integrity, and Authentication
✔ Privacy
✔ Integrity
✔ Authentication
✔ Public Key Encryption
✔ Pocket Calculator Encryption at the Client
✔ Example
✔ Pocket Calculator Decryption at the Server
✔ Public Keys and Symmetrical Encryption
✔ SSL as a Protocol
✔ SSL Protocol Stack
✔ SSL Session Establishment
✔ SSL Data Transfer
✔ SSL Implementation
✔ SSL Issues and Problems
✔ SSL and Certificates
• Simple Network Management Protocol
✔ SNMP Capabilities
✔ The SNMP Model
✔ The MIB and SMI
✔ The SMI
✔ The MIB
✔ RMON
✔ The Private MIB
✔ SNMP Operation
✔ SNMPv2 Enhancements
✔ SNMPv3
• Cloud, SDN, and NFV
✔ Cloud Computing and Networking Defined
✔ Cloud Computing Service Models
✔ Infrastructure as a Service (IaaS)
✔ Platform as a Service (PaaS)
✔ Software as a Service (SaaS)
✔ Cloud Computing Models
✔ SDNs
✔ Service Chaining
✔ Implementing SDNs
✔ Contrail: An Example SDN Architecture
✔ NFV
✔ Virtio and SR-IOV
✔ NFV and Service Chaining
✔ Cloud Networking and TCP/IP
✔ Clouds and Security
• Secure Shell (Remote Access)
✔ Using SSH
✔ SSH Basics
✔ SSH Features
✔ SSH Architecture
✔ SSH Keys
✔ SSH Protocol Operation
✔ Transport Layer Protocol
✔ Authentication Protocol
✔ The Connection Protocol
✔ The File Transfer Protocol
✔ SSH in Action
✔ Questions For Readers
• Network Address Translation
✔ Using NAT
✔ Advantages and Disadvantages of NAT
✔ Four Types of NAT
✔ NAT in Action
✔ Questions For Readers
• Firewalls
✔ What Firewalls Do
✔ A Router Packet Filter
✔ Stateful Inspection on a Router
✔ Types of Firewalls
✔ Packet Filters
✔ Application Proxy
✔ Stateful Inspection
✔ DMZ
• IP Security
✔ IPSEC in Action
✔ CE0
✔ CE6
✔ Introduction to IPSec
✔ IPSec RFCs
✔ IPSec Implementation
✔ IPSec Transport and Tunnel Mode
✔ Security Associations and More
✔ Security Policies
✔ Authentication Header
✔ Encapsulating Security Payload
✔ Internet Key Exchange
• Voice over Internet Protocol
✔ VoIP in Action
✔ The Attraction of VoIP
✔ What Is “Voice”?
✔ The Problem of Delay
✔ Packetized Voice
✔ Protocols for VoIP
✔ RTP for VoIP Transport
✔ Signaling
✔ H 323, the International Standard
✔ SIP, the Internet Standard
✔ MGCP and Megaco/H
✔ Putting It All Together