You are on page 1of 41

The Illustrated Network: How TCP/IP

Works in a Modern Network - eBook


PDF
Visit to download the full and correct content document:
https://ebooksecure.com/download/the-illustrated-network-how-tcp-ip-works-in-a-mod
ern-network-ebook-pdf/
The Illustrated
Network
This page intentionally left blank
The Illustrated
Network
How TCP/IP Works
in a Modern Network
Second Edition

Walter Goralski
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2017, 2009 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical treatment
may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume
any liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-811027-0

For Information on all Morgan Kaufmann publications


visit our website at https://www.elsevier.com/books-and-journals

Publisher: Jonathan Simpson


Acquisition Editor: Todd Green
Editorial Project Manager: Lindsay Lawrence
Production Project Manager: Punithavathy Govindaradjane
Cover Designer: Miles Hitchen
Typeset by MPS Limited, Chennai, India
Contents
About the Author....................................................................................................xxi
Foreword .............................................................................................................. xxiii
Preface ...................................................................................................................xxv
Acknowledgments ...............................................................................................xxxv

PART I NETWORKING BASICS


CHAPTER 1 Protocols and Layers................................................... 3
The Illustrated Network................................................................ 7
Remote Access to Network Devices....................................... 8
File Transfer to a Router ....................................................... 10
CLI and GUI.......................................................................... 12
Wireshark and Packet Capture .............................................. 13
First Explorations in Networking.......................................... 14
Protocols ..................................................................................... 15
Standards and Organizations ................................................. 16
Request for Comment and the Internet Engineering
Task Force ............................................................................. 19
Internet Administration............................................................... 21
Layers.......................................................................................... 23
Simple Networking................................................................ 23
Protocol Layers...................................................................... 25
The TCP/IP Protocol Suite......................................................... 25
The TCP/IP Layers ................................................................ 26
Protocols and Interfaces ........................................................ 28
Encapsulation......................................................................... 28
The Layers of TCP/IP ................................................................ 30
The Physical Layer ................................................................ 31
The Data Link Layer ............................................................. 32
The Network Layer ............................................................... 36
The Transport Layer .............................................................. 38
The Application Layer........................................................... 41
Session Support ..................................................................... 42
Internal Representation Conversion ...................................... 42
Applications in TCP/IP ......................................................... 43
The TCP/IP Protocol Suite......................................................... 45
Questions for Readers................................................................. 45

v
vi Contents

CHAPTER 2 TCP/IP Protocols and Devices................................... 47


Protocol Stacks on the Illustrated Network ............................... 50
Layers, Protocols, Ports, and Sockets ........................................ 51
The TCP/IP Protocol Stack ........................................................ 54
The Client Server Model .......................................................... 55
TCP/IP Layers and Client Server............................................. 55
The IP Layer ............................................................................... 57
The Transport Layer ................................................................... 59
Transmission Control Protocol.............................................. 59
User Datagram Protocol ........................................................ 59
The Application Layer................................................................ 60
Bridges, Routers, and Switches.................................................. 60
Segmenting LANs ................................................................. 61
Bridges ................................................................................... 63
Routers ................................................................................... 64
LAN Switches........................................................................ 65
Virtual LANs ......................................................................... 66
VLAN Frame Tagging .......................................................... 67
Questions for Readers................................................................. 69

CHAPTER 3 Network Link Technologies....................................... 71


Illustrated Network Connections................................................ 74
Displaying Ethernet Traffic................................................... 74
Displaying SONET Links...................................................... 76
Displaying DSL Links........................................................... 79
Displaying Wireless Links .................................................... 81
Frames and the Link Layer ................................................... 84
The Data Link Layer .................................................................. 84
The Evolution of Ethernet .......................................................... 85
Ethernet II and IEEE 802.3 Frames ...................................... 86
MAC Addresses..................................................................... 87
The Evolution of DSL ................................................................ 89
PPP and DSL ......................................................................... 90
PPP Framing for Packets....................................................... 91
DSL Encapsulation ................................................................ 92
Forms of DSL ........................................................................ 93
The Evolution of SONET........................................................... 94
A Note about Network Errors ............................................... 95
Packet over SONET/SDH ..................................................... 96
Wireless LANs and IEEE 802.11 .............................................. 97
Wi-Fi ...................................................................................... 99
Contents vii

IEEE 802.11 MAC Layer Protocol ..................................... 100


The IEEE 802.11 Frame...................................................... 102
Questions for Readers............................................................... 104
CHAPTER 4 Packet Optical Networks and Forward Error
Correction ................................................................ 107
Packet Optical Networks and Error Correction ....................... 108
Packet Optical Networks and the Optical Transport
Network..................................................................................... 110
Standards for Packet Optical Networks and Forward
Error Correction........................................................................ 111
Handling Single Bit Errors and Burst Errors........................... 111
Hamming Distance and Hamming Codes........................... 113
A Better Hamming Code Method ....................................... 115
Hamming Code in Action ................................................... 117
Hamming Code Implementation ......................................... 121
Burst Errors and Interleaving .............................................. 123
Modern FEC Operation ............................................................ 124
FEC and SONET/SDH ............................................................. 126
FEC and OTN........................................................................... 129
The OTN Frame and FEC................................................... 131
Generic Framing Procedure................................................. 131
FEC Research and Development ............................................. 132
OTN for the Illustrated Network.............................................. 133
Questions for Readers............................................................... 135

PART II CORE PROTOCOLS


CHAPTER 5 IPv4 and IPv6 Addressing ....................................... 139
IP Addressing............................................................................ 139
The Network/Host Boundary ................................................... 147
The IPv4 Address ..................................................................... 147
Private IPv4 Addresses........................................................ 152
Understanding IPv4 Addresses............................................ 152
The IPv6 Address ..................................................................... 154
Features of IPv6 Addressing ............................................... 154
IPv6 Address Types and Notation ...................................... 155
IPv6 Address Prefixes ......................................................... 156
Subnetting and Supernetting .................................................... 157
Subnetting in IPv4 ............................................................... 157
Subnetting Basics ................................................................ 158
CIDR and VLSM................................................................. 162
viii Contents

IPv6 Addressing Details ...........................................................166


IP Address Assignment ....................................................... 168
Complete IPv4 and IPv6 Address Ranges .......................... 170
Questions for Readers...............................................................173

CHAPTER 6 Address Resolution Protocol................................... 175


ARP and LANs.........................................................................178
ARP Packets .............................................................................185
Example ARP Operation ..........................................................187
ARP Variations.........................................................................188
Proxy ARP ........................................................................... 189
Reverse ARP........................................................................ 190
ARPs on WANs................................................................... 190
ARP and IPv6 ...........................................................................191
Neighbor Discovery Protocol .............................................. 192
ND Address Resolution ....................................................... 193
Questions for Readers...............................................................195

CHAPTER 7 IPv4 and IPv6 Headers............................................ 197


Packet Headers and Addresses.................................................200
The IPv4 Packet Header...........................................................202
Fragmentation and IPv4 ...........................................................204
Fragmentation and MTU ..................................................... 206
Fragmentation and Reassembly................................................208
Path MTU Determination .................................................... 208
A Fragmentation Example........................................................209
Limitations of IPv4.............................................................. 211
The IPv6 Header Structure.................................................. 211
IPv4 and IPv6 Headers Compared ...........................................214
IPv6 Header Changes .......................................................... 214
IPv6 and Fragmentation ...........................................................216
Questions for Readers...............................................................219

CHAPTER 8 Internet Control Message Protocol ......................... 221


ICMP and Ping .........................................................................224
The ICMP Message Format .....................................................227
ICMP Message Fields.......................................................... 228
ICMP Types and Codes....................................................... 229
Sending ICMP Messages..........................................................235
When ICMP Must Be Sent.................................................. 235
When ICMP Must Not Be Sent........................................... 236
Contents ix

Ping ........................................................................................... 236


Traceroute ................................................................................. 237
Path MTU ................................................................................. 239
ICMPv6..................................................................................... 241
Basic ICMPv6 Messages ..................................................... 241
Time Exceeded .................................................................... 243
Neighbor Discovery and Autoconfiguration ....................... 243
Routers and Neighbor Discovery ........................................ 244
Interface Addresses.............................................................. 245
Neighbor Solicitation and Advertisement........................... 245
Questions for Readers............................................................... 246

CHAPTER 9 Routing ..................................................................... 247


Routers and Routing Tables ..................................................... 250
Hosts and Routing Tables ........................................................ 252
Direct and Indirect Delivery..................................................... 256
Routing................................................................................. 260
Direct Delivery Without Routing........................................ 260
Indirect Delivery and the Router......................................... 262
Questions for Readers............................................................... 266

CHAPTER 10 Forwarding IP Packets ............................................ 267


Router Architectures................................................................. 273
Basic Router Architectures.................................................. 274
Another Router Architecture .................................................... 276
Router Access ........................................................................... 278
The Console Port ................................................................. 279
The Auxiliary Port............................................................... 279
The Network ........................................................................ 279
Forwarding Table Lookups ...................................................... 280
Dual Stacks, Tunneling, and IPv6............................................ 282
Dual Protocol Stacks ........................................................... 282
Tunneling ............................................................................. 283
Tunneling Mechanisms............................................................. 285
Transition Considerations......................................................... 287
Questions for Readers............................................................... 288

CHAPTER 11 User Datagram Protocol .......................................... 289


UDP Ports and Sockets ............................................................ 292
What UDP Is For...................................................................... 296
x Contents

The UDP Header ......................................................................297


IPv4 and IPv6 Notes.................................................................299
Port Numbers ............................................................................300
Well-Known Ports ............................................................... 301
The Socket ........................................................................... 304
UDP Operation .........................................................................304
UDP Overflows ........................................................................304
Questions for Readers...............................................................306

CHAPTER 12 Transmission Control Protocol................................ 307


TCP and Connections ...............................................................310
The TCP Header .......................................................................310
TCP Mechanisms......................................................................313
Connections and the Three-Way Handshake ...........................314
Connection Establishment ................................................... 316
Data Transfer ....................................................................... 317
Closing the Connection ....................................................... 319
Flow Control.............................................................................320
TCP Windows...................................................................... 321
Flow Control and Congestion Control ................................ 322
Performance Algorithms...........................................................323
TCP Behaving Badly? ..............................................................324
TCP and FTP ............................................................................326
Questions for Readers...............................................................329

CHAPTER 13 Multiplexing and Sockets ....................................... 331


Layers and Applications...........................................................331
The Socket Interface.................................................................334
Socket Libraries ................................................................... 335
TCP Stream Service Calls................................................... 336
The Socket Interface: Good or Bad? .......................................337
The “Threat” of Raw Sockets ............................................. 338
Socket Libraries ................................................................... 339
The Windows Socket Interface ................................................340
TCP/IP and Windows .......................................................... 340
Sockets for Windows........................................................... 341
Sockets on Linux ................................................................. 341
Questions for Readers...............................................................348
Contents xi

PART III ROUTING AND ROUTING PROTOCOLS


CHAPTER 14 Routing and Peering ................................................ 351
Network Layer Routing and Switching ................................... 354
Connection-Oriented and Connectionless Networks ............... 355
Quality of Service................................................................ 356
Host Routing Tables ................................................................. 358
Routing Tables and FreeBSD.............................................. 359
Routing Tables and RedHat Linux ..................................... 360
Routing and Windows ......................................................... 361
The Internet and the Autonomous System............................... 363
The Internet Today ................................................................... 364
The Role of Routing Policies ................................................... 367
Peering ...................................................................................... 368
Picking a Peer ........................................................................... 371
Questions for Readers............................................................... 373

CHAPTER 15 IGPs: RIP, OSPF, and IS-IS ...................................... 375


Interior Routing Protocols ........................................................ 383
The Three Major IGPs.............................................................. 384
Routing Information Protocol .................................................. 385
Distance-Vector Routing ..................................................... 385
Broken Links ....................................................................... 387
Distance-Vector Consequences ........................................... 387
RIPv1 ................................................................................... 388
RIPv2 ................................................................................... 389
RIPng for IPv6..................................................................... 393
A Note on IGRP and EIGRP ................................................... 395
Open Shortest Path First...................................................... 395
Link States and Shortest Paths ............................................ 396
What OSPF Can Do ............................................................ 397
OSPF Router Types and Areas ........................................... 399
Non-backbone, Non-stub Areas .......................................... 400
OSPF Designated Router and Backup Designated
Router................................................................................... 401
OSPF Packets....................................................................... 401
OSPFv3 for IPv6 ................................................................. 402
Intermediate System-Intermediate System............................... 403
The IS-IS Attraction ............................................................ 404
IS-IS and OSPF ................................................................... 404
xii Contents

Similarities of OSPF and IS-IS ........................................... 405


Differences between OSPF and IS-IS ................................. 405
IS-IS for IPv6 ...................................................................... 406
Questions for Readers...............................................................407

CHAPTER 16 Border Gateway Protocol......................................... 409


BGP as a Routing Protocol ......................................................409
Configuring BGP ................................................................. 412
The Power of Routing Policy.............................................. 414
BGP and the Internet ................................................................416
EGP and the Early Internet ................................................. 416
The Birth of BGP ................................................................ 417
BGP as a Path-Vector Protocol................................................418
IBPG and EBGP .......................................................................419
IGP Next Hops and BGP Next Hops .................................. 420
BGP and the IGP ................................................................. 420
Other Types of BGP .................................................................421
BGP Attributes..........................................................................423
BGP and Routing Policy ..........................................................425
BGP Scaling......................................................................... 425
BGP Message Types.................................................................426
BGP Message Formats .............................................................427
The Open Message .............................................................. 427
The Update Message ........................................................... 427
The Notification Message ........................................................429
Questions for Readers...............................................................430

CHAPTER 17 Expanded Uses for BGP ........................................... 431


Introduction...............................................................................431
Optimal Route Reflection (ORR).............................................432
“Regular” Route Reflection ................................................ 433
ORR Considered.................................................................. 434
BGP and Flow Specification ....................................................435
BGP and DDoS.................................................................... 436
BGP Flow Spec Details....................................................... 439
BGP in the Very Large Data Center........................................441
Data Centers as CLOS Networks........................................ 441
Layer 2 and Layer 3 in a Folded CLOS Network
Data Center .......................................................................... 444
Use iBGP or eBGP? ............................................................ 445
Contents xiii

Let Data Center Use eBGP, Not an IGP ............................ 446


Example of BGP Use in the Data Center ........................... 447
Distributing Link-State Information with BGP ....................... 450
The IGP Limitations ............................................................ 451
The BGP Solution................................................................ 451
Implementing BGP for Link-State Protocols...................... 452
Juniper Network’s Implementation Details ........................ 454
Summary of Supported and Unsupported Features ............ 455
Configuring BGP-LS on the Illustrated Network .................... 455
Questions for Readers............................................................... 458

CHAPTER 18 Multicast .................................................................. 459


A First Look at IPv4 Multicast ................................................ 463
Multicast Terminology ............................................................. 465
Dense and Sparse Multicast ..................................................... 466
Dense-Mode Multicast ........................................................ 467
Sparse-Mode Multicast........................................................ 467
Multicast Notation .................................................................... 467
Multicast Concepts ................................................................... 468
Reverse-Path Forwarding .................................................... 468
The RPF Table..................................................................... 469
Populating the RPF Table ................................................... 469
Shortest-Path Tree ............................................................... 470
Rendezvous Point and Rendezvous-Point
Shared Trees ........................................................................ 471
Protocols for Multicast ............................................................. 471
Multicast Hosts and Routers ............................................... 472
Multicast Group Membership Protocols ............................. 473
Multicast Routing Protocols................................................ 474
Any-Source Multicast and SSM.......................................... 475
Multicast Source Discovery Protocol.................................. 476
Frames and Multicast .......................................................... 477
IPv4 Multicast Addressing .................................................. 478
IPv6 Multicast Addressing .................................................. 480
PIM-SM ............................................................................... 482
The Resource Reservation Protocol and PGM ................... 483
Multicast Routing Protocols................................................ 483
IPv6 Multicast...................................................................... 484
Questions for Readers............................................................... 486
xiv Contents

PART IV IP SWITCHING AND VPNs


CHAPTER 19 MPLS and IP Switching ........................................... 489
Converging What? ....................................................................493
Fast Packet Switching ......................................................... 493
Frame Relay..............................................................................494
Asynchronous Transfer Mode ............................................. 497
Why Converge on TCP/IP?................................................. 499
MPLS ........................................................................................500
Basic MPLS Terminology................................................... 504
Signaling and MPLS............................................................ 505
Label Stacking ..................................................................... 506
MPLS and VPNs ......................................................................507
MPLS Tables ....................................................................... 508
Configuring MPLS Using Static LSPS ....................................508
The Ingress Router .............................................................. 508
The Transit Routers ............................................................. 509
The Egress Router ............................................................... 509
Traceroute and LSPs ........................................................... 510
Questions for Readers...............................................................512

CHAPTER 20 MPLS-Based Virtual Private Networks ................... 513


PPTP for Privacy ......................................................................516
Types of VPNs .................................................................... 518
Security and VPNs .............................................................. 519
VPNs and Protocols............................................................. 520
PPTP .................................................................................... 520
L2TP .................................................................................... 521
PPTP and L2TP Compared ................................................. 522
Types of MPLS-Based VPNs...................................................523
Layer 3 VPNs ...................................................................... 523
Layer 2 VPNs ...................................................................... 525
VPLS: An MPLS-Based L2VPN .............................................527
Router-by-Router VPLS Configuration .............................. 527
P Router (P9) ....................................................................... 530
CE6 Router .......................................................................... 532
Does it Really Work? ...............................................................532
Questions for Readers...............................................................533
CHAPTER 21 EVPN and VXLAN ..................................................... 535
EVPN Overview .......................................................................536
L2VPNs and EVPN Compared ........................................... 540
Contents xv

EVPN Services Overview ................................................... 541


EVPN Control Plane Operation .......................................... 542
Layer 2 and Layer 3 and EVPN.......................................... 547
VXLAN and EVPN Data Planes......................................... 549
Configuring an EVPN with VXLAN on the Illustrated
Network..................................................................................... 557
Questions for Readers............................................................... 560

PART V APPLICATION LEVEL


CHAPTER 22 Dynamic Host Configuration Protocol..................... 563
DHCP and Addressing ............................................................. 566
DHCP Server Configuration................................................ 566
Router Relay Agent Configuration ..................................... 569
Getting Addresses on LAN2 ............................................... 569
Using DHCP on a Network................................................. 570
BOOTP ..................................................................................... 572
BOOTP Implementation...................................................... 573
BOOTP Messages................................................................ 574
BOOTP Relay Agents ......................................................... 575
BOOTP “Vendor-Specific Area” Options .......................... 575
Trivial File Transfer Protocol................................................... 576
TFTP Messages ................................................................... 577
TFTP Download .................................................................. 578
DHCP................................................................................... 578
DHCP Operation.................................................................. 580
DHCP Message Type Options ............................................ 582
DHCP and Routers ................................................................... 582
DHCPv6............................................................................... 583
DHCPv6 and Router Advertisements ................................. 584
DHCPv6 Operation.............................................................. 585
Questions for Readers............................................................... 585
CHAPTER 23 The Domain Name System....................................... 587
DNS Basics ............................................................................... 590
The DNS Hierarchy............................................................. 591
Root Name Servers.............................................................. 592
Root Server Operation......................................................... 592
Root Server Details ............................................................. 592
DNS in Theory: Name Server, Database, and Resolver.......... 593
Adding a New Host ............................................................. 594
Recursive and Iterative Queries .......................................... 595
xvi Contents

Delegation and Referral....................................................... 595


Glue Records ....................................................................... 597
DNS in Practice: Resource Records and Message Formats ....598
DNS Message Header.......................................................... 600
DNSSec................................................................................ 601
DNS Tools: nslookup, dig, and drill ................................... 602
DNS in Action ..........................................................................602
Questions for Readers...............................................................611
CHAPTER 24 File Transfer Protocol.............................................. 613
Overview...................................................................................613
PORT and PASV ................................................................. 617
FTP and GUIS ..........................................................................619
FTP Basics ........................................................................... 621
FTP Commands and Reply Codes ...................................... 623
FTP Data Transfers.............................................................. 625
Passive and Port................................................................... 626
File Transfer Types ............................................................. 629
When Things Go Wrong ..................................................... 630
FTP Commands ........................................................................631
Variations on a Theme ........................................................ 633
A Note on NFS .................................................................... 634
Questions for Readers...............................................................635

CHAPTER 25 SMTP and Email ...................................................... 637


Architectures for Email ............................................................640
Sending Email Today .......................................................... 642
The Evolution of Email in Brief ......................................... 646
SMTP Authentication .......................................................... 647
Simple Mail Transfer Protocol............................................ 647
Multipurpose Internet Mail Extensions....................................650
MIME Media Types ............................................................ 650
MIME Encoding .................................................................. 651
An Example of a MIME Message ...................................... 652
Using POP3 to Access Email...................................................652
Headers and Email....................................................................654
Home Office Email ..................................................................658
Questions for Readers...............................................................659

CHAPTER 26 Hypertext Transfer Protocol .................................... 661


HTTP in Action ........................................................................661
Uniform Resources .............................................................. 667
URIs ..................................................................................... 667
Contents xvii

URLs .................................................................................... 668


URNs.................................................................................... 670
HTTP......................................................................................... 671
The Evolution of HTTP ...................................................... 672
HTTP Model........................................................................ 674
HTTP Messages................................................................... 675
Trailers and Dynamic Web Pages............................................ 675
HTTP Requests and Responses........................................... 675
HTTP Methods .................................................................... 677
HTTP Status Codes ............................................................. 678
HTTP Headers ..................................................................... 679
General Headers .................................................................. 679
Request Headers .................................................................. 680
Response Headers................................................................ 680
Entity Headers ..................................................................... 681
Cookies ................................................................................ 682
Questions for Readers............................................................... 684

CHAPTER 27 Securing Sockets with SSL ..................................... 685


SSL and Web Sites................................................................... 685
The Lock.............................................................................. 689
Secure Socket Layer ............................................................ 690
Privacy, Integrity, and Authentication ..................................... 691
Privacy ................................................................................. 691
Integrity................................................................................ 692
Authentication...................................................................... 693
Public Key Encryption ............................................................. 694
Pocket Calculator Encryption at the Client ........................ 694
Example ............................................................................... 695
Pocket Calculator Decryption at the Server........................ 695
Public Keys and Symmetrical Encryption ............................... 696
SSL as a Protocol ..................................................................... 697
SSL Protocol Stack.............................................................. 697
SSL Session Establishment ................................................. 698
SSL Data Transfer ............................................................... 699
SSL Implementation ............................................................ 700
SSL Issues and Problems .................................................... 701
SSL and Certificates............................................................ 702
Questions for Readers............................................................... 703
xviii Contents

PART VI NETWORK MANAGEMENT


CHAPTER 28 Simple Network Management Protocol .................. 707
SNMP Capabilities ...................................................................710
The SNMP Model.....................................................................714
The MIB and SMI ............................................................... 716
The SMI ............................................................................... 716
The MIB............................................................................... 718
RMON.................................................................................. 720
The Private MIB .................................................................. 721
SNMP Operation ......................................................................722
SNMPv2 Enhancements ...................................................... 726
SNMPv3............................................................................... 727
Questions for Readers...............................................................729

CHAPTER 29 Cloud, SDN, and NFV ............................................... 731


Cloud Computing and Networking Defined ............................732
Cloud Computing Service Models ...........................................734
Infrastructure as a Service (IaaS) ........................................ 735
Platform as a Service (PaaS)............................................... 736
Software as a Service (SaaS) .............................................. 737
Cloud Computing Models ................................................... 738
SDNs .........................................................................................740
Service Chaining.......................................................................742
Implementing SDNs .................................................................744
Contrail: An Example SDN Architecture ................................746
NFV...........................................................................................748
Virtio and SR-IOV .............................................................. 749
NFV and Service Chaining ................................................. 752
Cloud Networking and TCP/IP ................................................753
Clouds and Security..................................................................755
Questions for Readers...............................................................757

PART VII SECURITY


CHAPTER 30 Secure Shell (Remote Access) ............................... 761
Using SSH ................................................................................761
SSH Basics........................................................................... 764
SSH Features ....................................................................... 765
SSH Architecture ................................................................. 766
SSH Keys............................................................................. 767
Another random document with
no related content on Scribd:
Nakaam 140. 146. 147. 148. 152. 159. 160. 177. 183. 184.
243. 291.
Namagone 414. 415.
Namaputa 265.
Nambunga 382.
Namenwechsel 340.
Nangadi-See 405. 418. 419.
Nangoo 72. 153.
Nasenpflock 68. 165. 166. 279. 416.
Nasomba, Fluß 256.
Natura 351. 352.
Naturvölker VII. 11. 402. 403;
Unterschätzung 117;
Verschwinden 512.
Naunge 260.
Nawalowe 390. 391. 393. 394.
Nchichira 405. 407. 410. 415 416. 417. 424. 486.
Ndondosha 399.
Neger, Aberglauben 230. 231. 232. 263. 264. 265. 353.
484;
Abneigung gegen Störung 71. 72. 137;
Abwanderung 71. 72;
Achtung der Eltern 236;
Altersangaben 371;
Altersklassen 369;
Angst vor Photographieren 391. 392. 393;
als Arbeiter 509;
Beerdigung 481. 482;
Benehmen 344;
Beredsamkeit 180;
Bier s. Pombe;
Erziehung 357;
Fallen 125;
Feldbauer 510;
Frauen 203. 273;
Tätigkeit 208;
Frohsinn 84;
Gebräuche 342;
Geruch 185. 250;
Geschlechtsleben 365;
Habitus 325;
Handel 133. 134;
Hautfarbe 72;
Heimat VIII;
Heirat 342;
Heiratsfähigkeit 375. 376;
Hochzeit 374. 375;
Hütte 115. 116. 164;
Jäger 126;
Jagd 249. 250;
Kinder 85. 86. 342. 344. 345. 346. 356;
Kinderleben 360;
Kinderliebe 357;
Kindheit 197. 198;
Kleidung 335;
Kraftentfaltung 57. 58;
Krankenpflege 242;
Krankheiten 114. 115. 357. 358. 359. 360;
Kultur VIII;
Kulturpflanzen 92. 256. 505;
Landwirtschaft 117. 118;
Leben 352;
Leben nach dem Tode 396;
Mädchen 357;
Mannbarkeitsfest s. Unyago;
Medizin 396;
Nahrung 208. 209;
Namen 141. 142;
Rechtsgefühl 44. 45;
Schutz durch Deutschland 426;
Seele 398. 399;
Siedelungen 119;
Soldaten 467. 468;
Spiele 200. 203;
Sprachen 325, s. a. Sprachstudien;
Stammesgeschichte 181;
Stammwechsel 148. 149;
Tabakgenuß 185;
Taktgefühl 429. 513;
Tanzlust 84;
Telephon 354. 355. 356;
Therapie 396. 397. 398;
Treue 373. 374;
Unterricht 344;
Verhalten bei Aufnahmen durch Photograph,
Phonograph, Kino 50. 51;
Verhältnis zu Christentum und Islam 94;
Volksfeste 456. 457;
Vorratsbehälter 117. 118. 173;
Waffen 248;
Wegbau 80;
Wohnungen 110;
Zähne 180;
Zeichenkunst 53. 54. 55. 56. 96. 130. 131. 211. 447. 448;
Zeitbestimmung 300. 301;
Zeitrechnung 181. 182. 183;
Zeremoniell 233;
Zukunft 509. 512.
Nembo, Körperverunstaltung 317. 318.
Newala 179. 180. 254. 278. 284. 298. 305. 306. 311. 319.
323. 334. 338. 388. 398. 403. 405;
Klima 298. 299. 395;
Missionsstation 391.
Newalasandstein 304.
Ngalla, Muschel 382.
Ngoma, Tanz 84.
Ngurumahamba 66. 490.
Nigulila s. Lippenpflock.
Nihimmu 377.
Niltal, Fruchtbarkeit 502. 503.
Ningachi 446. 460. 462.
Niuchi 284. 291. 356.
Nkunya 179.
Nyangao 70. 73. 74. 75. 83. 88;
Missionsstation 69.
Nyassa 66. 67. 149. 150. 151. 177. 380. 406. 412.

Oehler, Eduard 18.


Omari 34. 53. 209. 210. 211. 212. 262. 451.
Omuramben 190.
Ostafrika, Bau des Landes 504;
Bewässerung 505;
Bodenbeschaffenheit 92;
Eisenbahnen 3. 499. 514;
Flüsse 505;
Kultivierung 503. 504;
Südgebiet 32. 66. 505.
Ostafrikalinie 487.

Palmen 256.
Pangani 504.
Panganischnellen 70.
Papassi 138.
Pelele s. Lippenscheibe.
Persischer Golf 10.
Personennamen 339–342.
Pesa mbili 47. 57. 107. 108. 333. 339. 406. 472. 473.
Peschel, Oskar 110.
Pfahlbauten 423. 424. 426. 427.
Phonograph VII. 50. 51. 52. 196. 197. 216. 217. 389. 390.
392. 465. 466.
Photographieren VI. 124. 125. 465. 469;
Angst vor 391. 392. 393.
Pombe 119. 120. 121. 122. 123. 213.
Pori 66. 82. 83. 88. 92. 163. 266;
Abbrennen 81. 82. 83.
Porter, Reverend 65.
Portugiesen 4.
„Prinzregent“ 2.

Quarzite 92.

Raseneisenstein 325.
Ratzel, Friedrich 9. 23.
Reichspost in Ostafrika 143.
Reichstagsabgeordnete in Ostafrika 68. 102. 499.
Reisekalender 401. 402.
Rindenstoffe 335;
Herstellung 335. 336. 337.
Rinder 175.
Rondoplateau 69. 318. 464.
Roscher 66.
Rotes Meer 9. 10. 11. 23. 24. 29.
Rovuma 66. 83. 89. 151. 177. 178. 241. 254. 256. 257.
258. 260. 261. 279. 311. 315. 316. 318. 325. 380. 382.
405. 409. 414. 419. 424. 487. 504. 505;
Ufer 422;
Wasserstand 258. 259.
—, Dampfer 33. 34. 35. 36. 37.
— -Ebene 417. 418.
Ruangwa 44.
Rückfallfieber 138. 139. 241.
Rufidyi 35. 70. 504. 505.
—, Dampfer 33. 34. 35. 36. 37. 39. 40. 112. 487.
Rugaruga 48.
Runsewe 412. 413.
Runsewe-Wangoni 126, s. a. Wangoni, echte.
Rupienwährung 131. 132.
Ruvu 454.

Saadani 504.
Sagen 72.
Saidi Kapote 489.
Sakalaven 315.
Salim Matola 134. 135. 144. 145. 328. 333. 349. 445. 452.
455. 456.
Salz 335.
Sambesi 151. 412.
Sammeln von Ethnographica 338. 349. 442. 443.
Sammlungsstücke 466.
Sanda 121. 465.
Sandfloh 114. 306. 307.
Sansibar 2. 3. 29;
Sultan 178.
— -Vertrag 14.
Schabruma 143. 150.
Schamgefühl, Verlagerung 166. 167.
Schauri von Nkunya 179.
Schiffe, deutsche 12. 14.
Schirasi 315.
Schire 177.
Schirwasee 380.
Schlafender Löwe 22. 27. 28.
Schläfenschnitte 442.
Schlafkrankheit 241.
Schmuck aus Messing 327. 328.
Schnitzereien 443. 444.
Schule 460. 461. 462. 500.
Schumewald 425.
Schwangerschaft 384. 387.
Schwarzwasserfieber 241.
Schwiegermutter, Stellung zur 342. 343.
Seelenbäume 396.
Sefu, Akide 283. 286. 287. 291. 292. 297. 311. 376. 390.
391. 462.
Seliman Mamba 44. 45. 46. 222.
Sese, Monochord 351.
Seyfried, Hauptmann 33. 48. 61. 63. 97. 192.
Simba Uranga 35. 36. 37.
Sippennamen 381. 382.
Sklavenhandel 93.
Sodorapparat 193.
Somal 28.
Speicher 173. 174.
Spiegel, Leutnant 489.
Spiele 347.
Spielzeug 348. 356;
Jahreszeiten 348.
Sprachstudien 420. 462. 463. 464.
Ssongo, Schlange 199. 200.
Stamburi 359. 449.
Stämmemischung 93.
Stammesunterschiede 72.
Stamm-Mimikry 151.
Stationsleben 112. 115. 128. 130. 132. 133. 204. 205. 206.
261. 299. 300–303. 309. 310.
Staudamm von Assuan 502. 503.
Steinen, Karl von den 247.
Stelzen 290. 291.
Stiefel 94. 95.
Stiller Ozean 10.
Strandes, Justus 4.
Straßenbau 293. 407. 408. 490.
Stuhlmann, Dr. Franz 61.
Stürme 161. 162. 165. 187. 188. 261. 262. 303.
Sudanneger 24.
Südwestafrika 60. 508.
Suez, Landenge 24.
Suezkanal 8. 9. 11.
Sulila, Barde 214. 215. 216. 217. 218. 219.
Sulu 149. 151;
Wanderungen 150.
Sumni 133.
Susa, 163. 164. 172. 177. 319. 382. 392.
Swastika 146. 147.

Tabora 455.
Täler, alte 41.
Tanga 2. 44. 499. 500.
Tanganyika 150. 412.
Tänze 85. 222. 223. 224. 225. 226. 228. 432. 433;
der Frauen 277. 278. 285. 286.
Tanzmasken 444.
Tatoga 20.
Taubenschlag 118. 119.
Taubenzucht 118.
Tauschverkehr 131.
Tembe 111.
Tertiärmensch 25.
Tins, Petroleumgefäße 112.
Töpferei 328–331. 333. 334.
Totemismus 380. 381.
Träger 108. 255. 256. 469. 478. 493. 494;
Last 112.
Trinkwasser 190. 191;
Filtrieren 191.
Trommeln 277.
Tschaka 151.
Tylor 244.

Ububa 411.
Ugali 110. 208. 209.
Ugandabahn 3.
Ugogo 505.
Uhehe 111.
Ulimba 351.
Umbekuru 66. 89.
Ungurue 73. 242.
Universities Mission 194.
Unyago 213. 232. 236. 266. 337. 356. 361–365. 366. 367.
368. 369;
Name 270;
Tänze 226;
der Knaben 233. 234. 270. 297;
der Mädchen 270. 272–278. 283. 284–292. 294. 296.
370. 371;
bei Yao 366. 370;
bei Makonde 366. 370;
bei Matambwe 370;
bei Makua 366. 370.
Unyamwesi 111. 412.
Unyanyembe 488.
Upupu 293.
Ural-Altaier 25.
Urrassen 25.
Usagara 70.
Usambara 425.
Usambarabahn 499.
Usanye 264.

Vasco da Gama 4.
Vegetation 70. 82. 83. 88. 92. 256. 292. 488.
Verwaltung in Ostafrika 80.
Vohsen, Konsul 262.
Völkerinsel in Südostafrika 66.
Völkerkunde, Aufgabe 21. 22. 23.
Völkerwanderung 67. 68. 149. 150. 151.
Vollmond 231.

Waburunge 20.
Wadi 190.
Wadschagga 151.
Wafiomi 20.
Wagogo 151.
Wagueno 151.
Wairaku 20.
Wairangi 20.
Wakindiga 19.
Wakwama 414.
Wald 424. 425;
Brennen 312;
Verwüstung 424. 425.
Waldschule 229. 366.
Waldteufel 351.
Wali von Mahuta 429. 430. 434. 486. 487.
Wamakonde 316.
Wamatambwe s. Matambwe.
Wamatanda, Urstamm der Makonde 316.
Wamatschonde 150. 406.
Wambugwe 20.
Wamburru 20.
Wamhole 382.
Wamidjira 267. 362.
Wamuera 32. 44. 63. 66. 68. 72. 73. 84;
Frauen 75;
Hautfarbe 72;
Hütten 75;
Lippenscheibe 76;
Sprache 463;
Ziernarben 77. 78;
Unruhen 463. 464.
Wamueraplateau 89.
Wamunga 382.
Wamwembe 380.
Wanduwandu 480. 481. 484. 485.
Wanege 19.
Wangindo 93. 176.
Wangoni 67. 150. 176. 178. 179. 258. 304. 406. 407. 410.
426;
Geschichte 406. 407;
echte 126. 412. 414. 415. 416;
unechte (von Nchichira) 150. 151. 412. 413. 416. 442;
Wanderung 414.
Wangoni-Affen 150. 151.
Wantanda 382.
Wanyamwesi 34. 46. 47. 54. 59. 86. 105. 106. 218. 255.
454. 471. 473. 509. 510;
Hütten 111.
Wanyassa 93. 218.
Wanyaturu 20.
Wapare 151.
Wari 229. 362. 363.
Wassandaui 19;
Sprache 20.
Wasserlöcher 189. 279.
Wataturu 20;
Sprache 20.
Watuta 412.
Wa-Uassi 20.
Wayao s. Yao.
Weihnachten an Bord 500. 501.
Werther, Hauptmann 19.
Westafrika 370.
Wild in Ostafrika 110.
Wildschweine 256.
Wirtschaftsformen, Einteilungsprinzip 116. 117.
Wurfschlinge 349.
Wurfstock 349.
Wurmkrankheit 241.
Wutende 382.

Xylophon 351.

Yao 72. 93. 152. 176. 218. 258. 269. 304. 314. 379. 380.
399. 406. 416. 442. 506;
Aberglauben 230;
Äußeres 68;
Charakter 366;
Ehegesetze 236;
Einteilung 183;
Geschichte 176. 177. 178. 179;
Geschlechtsverband 380;
Gräber 266;
Gruppen 380;
Häuser 319;
Hausfresken 266;
Hautfarbe 72;
Heimat 184;
Heirat 372. 373;
keine Kaffern 177;
Kleidung 68;
Krankenpflege 242;
Namen 340. 341;
Tänze 226;
Wanderung 66. 67. 151;
Zwillinge 344.
Zähne, Verunstaltung 180.
Zauberer 70. 399.
Zaubermittel 231.
Zauberwasser-Idee 69. 70.
Zecken 138. 139.
Zeichenkunst 53. 54. 55. 56. 96. 130. 131. 211. 447. 448.
Zeitbestimmung 300. 301.
Ziernarben 77. 78. 278. 439. 440. 441. 442.
Zitronenbäume 305.
Zopfträger 445.
Zwillinge 344.
Druck von F. A. Brockhaus in Leipzig.
F. A. Brockhaus’ Geogr.-artist. Anstalt, Leipzig..
Westlicher Teil
Östlicher Teil
Rückseite des Original-Einbandes

You might also like