1.1
| Basic Facts Do Not Tell The Story   5
|
1.2
| Imagine Life Without The Internet   5
|
1.3
| Why You Should Understand Internet Technology   6
|
1.4
| Learning About The Internet   6
|
1.5
| Understanding The Big Picture   7
|
1.6
| Terminology And Technology   7
|
1.7
| Growth And Adaptability   8
|
1.8
| The Impact Of The Internet   8
|
1.9
| Organization Of The Book   8
|
1.10
| A Personal Note   9
|
3.1
| Introduction   23
|
3.2
| Sound, Vibrations, And Analog Recording   23
|
3.3
| Analog Electronic Devices   24
|
3.4
| Many Electronic Devices Are Analog   25
|
3.5
| The First Analog Communication   25
|
3.6
| Sending An Analog Signal Across A Wire   26
|
3.7
| Analog Is Simple But Inaccurate   27
|
3.8
| A Definition Of Digital   27
|
3.9
| Digital Music   28
|
3.10
| Recording Sound As Numbers   28
|
3.11
| Converting Between Analog And Digital Forms   31
|
3.12
| Why Did Digital Music Take Over?   32
|
3.13
| Summary   33
|
4.1
| Introduction   37
|
4.2
| The World Was Previously Digital   37
|
4.3
| A Telegraph Was Digital   38
|
4.4
| Morse Code   38
|
4.5
| Letters And Digits In Morse Code   39
|
4.6
| Telegraph Users Did Not Encounter Morse Code   40
|
4.7
| Virtually Instant Communication   40
|
4.8
| Speed Is Relative   40
|
4.9
| The Telephone Eventually Became Digital   41
|
4.10
| Relevance To The Internet   41
|
4.11
| Binary Encoding Of Data On The Internet   42
|
4.12
| Why Use Two Symbols?   42
|
4.13
| Summary   42
|
6.1
| Introduction   55
|
6.2
| The Digital Revolution   55
|
6.3
| The Move To Multiple Computers   56
|
6.4
| Removable Media And Manual Transfer   56
|
6.5
| Early Computers Used Circuit Boards   57
|
6.6
| LANs   58
|
6.7
| The LAN Approach   58
|
6.8
| LAN Hardware   59
|
6.9
| Wireless LAN (WLAN) Connections   60
|
6.10
| Wired And Wireless LAN Technologies   60
|
6.11
| Wireless PAN Technology   61
|
6.12
| Connecting A Device To An Ethernet   61
|
6.13
| Connecting A Device To A Wi-Fi Network   62
|
6.14
| Wi-Fi Security   63
|
6.15
| The Importance Of LAN Technology   63
|
6.16
| Relationship To The Internet   64
|
| Exercises   64
|
7.1
| A Proliferation Of LANs   69
|
7.2
| No Technology Solves All Problems   70
|
7.3
| Wide Area Network Technologies   70
|
7.4
| Can We Build A Global WAN?   71
|
7.5
| U.S. Department Of Defense Networking Research   72
|
7.6
| Experimental Research   72
|
7.7
| The Internet Emerges   72
|
7.8
| The ARPANET Backbone   73
|
7.9
| Internet Software   73
|
7.10
| The Name Is TCP\^/\^IP   74
|
7.11
| The Surprising Choice Of Open Standards   74
|
7.12
| Open Communication Systems Win   75
|
7.13
| Placing Internet Technical Documentation Online   75
|
7.14
| The U.S. Military Adopted TCP\^/\^IP   76
|
7.15
| Summary   77
|
| Exercises   77
|
8.1
| Introduction   81
|
8.2
| Stimulating Adoption   81
|
8.3
| Meanwhile, Back In Computer Science   82
|
8.4
| The Internet Meets Unix   82
|
8.5
| The U.S. Military Makes A Commitment   83
|
8.6
| The Internet Doubled In Size In One Year   83
|
8.7
| Internet For Every Computer Science Department   84
|
8.8
| Graduate Student Volunteers Contribute   85
|
8.9
| Internet Governance: The IAB And IETF   85
|
8.10
| NSF Led Internet Expansion   86
|
8.11
| NSF Target: All Of Science And Engineering   87
|
8.12
| The NSFNET Backbone   87
|
8.13
| On To The ANS Backbone   88
|
8.14
| Commercialization   89
|
8.15
| Exponential Growth   89
|
8.16
| When Will Growth End?   91
|
| Exercises   91
|
9.1
| Introduction   97
|
9.2
| Sharing To Reduce Cost   97
|
9.3
| Sharing By Taking Turns   98
|
9.4
| Avoiding Long Delays   98
|
9.5
| Long Messages And Short Packets   99
|
9.6
| Each Packet Contains Extra Information   99
|
9.7
| Devices Have Addresses   100
|
9.8
| Packet Size   100
|
9.9
| To Humans, Packet Transmission Seems Instantaneous   101
|
9.10
| Sharing Occurs On Demand   101
|
9.11
| Relevance To The Internet   102
|
9.12
| Summary   102
|
| Exercises   102
|
10.1
| Introduction   107
|
10.2
| Building A Global Network   107
|
10.3
| Two Fundamental Concepts   108
|
10.4
| Using A Specialized Computer To Interconnect Networks   109
|
10.5
| Internet Terminology: Routers And Hosts   110
|
10.6
| Building A Large Virtual Network   111
|
10.7
| The Internet Includes Multiple Types Of Networks   113
|
10.8
| Ownership, ISPs, And Transit Traffic   113
|
10.9
| A Hierarchy Of ISPs   114
|
10.10
| Peering Arrangements At The Center Of The Internet   115
|
10.11
| An Example Trip Through The Internet   116
|
10.12
| The Internet Approach Revolutionized Networking   116
|
10.13
| Summary   117
|
11.1
| Introduction   121
|
11.2
| Access Technologies For The Last Mile   121
|
11.3
| Dial-up Internet Access   122
|
11.4
| Narrowband And Broadband Access   122
|
11.5
| Leased Data Circuit Access   123
|
11.6
| Digital Subscriber Line (DSL) Access   123
|
11.7
| Cable Modem Access   124
|
11.8
| Wireless Access Technologies   125
|
11.9
| Cellular Wireless Access (4G and 5G)   126
|
| 11.9.1
| Mobile Cellular Modems (4G or 5G)   127
|
| 11.9.2
| Fixed Cellular Modems   128
|
11.10
| Summary   128
|
| Exercises   128
|
13.1
| Introduction   145
|
13.2
| Protocol: An Agreement For Communication   145
|
13.3
| Basic Functionality: The Internet Protocol   146
|
13.4
| Packets Arrive Unchanged   146
|
13.5
| Internet Software On Your Device   147
|
13.6
| Internet Packets Are Called Datagrams   147
|
13.7
| Providing The Illusion Of A Giant Network   147
|
13.8
| The Internet's Internal Structure   148
|
13.9
| Datagrams Travel Inside Network Packets   149
|
13.10
| Internet Addresses   150
|
13.11
| IPv4 And IPv6   150
|
13.12
| Permanent And Temporary IP Addresses   151
|
13.13
| Summary   152
|
| Exercises   152
|
16.1
| Introduction   171
|
16.2
| Computer Names   171
|
16.3
| Computer Names Past And Present   172
|
16.4
| A Computer's Name Must Be Unique   173
|
16.5
| Using Suffixes To Make Each Name Unique   173
|
16.6
| Domain Names With More Than Three Labels   174
|
16.7
| Top-Level Domains Before And After ICANN   174
|
16.8
| Domain Names Outside The US   175
|
16.9
| Translating A Name To An IP Address   176
|
16.10
| Many Domain Name Servers   176
|
16.11
| Looking Up A Domain Name   177
|
16.12
| A Personal Story About A DNS Problem   178
|
16.13
| Summary   178
|
| Exercises   178
|
19.1
| Introduction   199
|
19.2
| Functionality And Significance   199
|
19.3
| Mailboxes And Email Addresses   200
|
19.4
| Sending An Email Message Directly   200
|
19.5
| Personal Computers And Email Providers   200
|
19.6
| An Example Email Exchange   201
|
19.7
| Email Delays And Retry Attempts   202
|
19.8
| Providers, Fees, And Access   202
|
19.9
| Mailing Lists   203
|
19.10
| Undisclosed Recipients   203
|
19.11
| Summary   204
|
| Exercises   204
|
20.1
| Introduction   207
|
20.2
| Browsers And Web Servers   207
|
20.3
| URLs And Their Meaning   208
|
20.4
| Web Pages With Links To Other Pages   208
|
20.5
| Linking Across Web Servers   209
|
20.6
| Hypermedia   210
|
20.7
| A Page With Multimedia Items   211
|
20.8
| Fetching A Page That Contains Multiple Items   212
|
20.9
| Inside A Browser   212
|
20.10
| Plugins And Other Add-on Software Modules   213
|
20.11
| Historical Notes   214
|
20.12
| Summary   214
|
22.1
| Introduction   227
|
22.2
| Conventional Web Pages And Static Content   227
|
22.3
| How A Browser Accesses A Static Web Page   228
|
22.4
| Accessing A Page That Has Changeable Content   229
|
22.5
| Frames Within A Browser Window   230
|
22.6
| Advertising And Frames   231
|
22.7
| Personalized Web Pages And Dynamic Content   231
|
22.8
| Pop-Ups And Pop-Up Blockers   232
|
22.9
| User Interaction With Forms   232
|
22.10
| Shopping Carts And Cookies   233
|
22.11
| Should You Accept Cookies?   234
|
22.12
| Animated Web Pages   234
|
22.13
| Animation With A Browser Script   235
|
22.14
| Java, JavaScript, And HTML5   236
|
22.15
| Summary   237
|
| Exercises   237
|
24.1
| Introduction   247
|
24.2
| Connected Devices Without Human Operators   247
|
24.3
| Sensors   248
|
24.4
| Actuators   248
|
24.5
| Embedded Computer Systems   249
|
24.6
| The Internet Of Things   249
|
24.7
| Gadgets And Wireless Network Connections   250
|
24.8
| Centralized And Mesh IoT Networks In A Home   250
|
24.9
| A Wireless IoT Mesh In A Home   251
|
24.10
| Smart Homes, Buildings, And Factories   252
|
24.11
| Civil And Power Infrastructure: Bridges And Grids   253
|
24.12
| Summary   253
|
| Exercises   254
|
26.1
| Introduction   267
|
26.2
| Real-Time Information   267
|
26.3
| The Two Types Of Real-Time Transfer   268
|
26.4
| Streaming Real-Time Data Over The Internet   268
|
26.5
| Real-Time Streams, Packets, And Jitter   269
|
26.6
| A Playback Buffer   270
|
26.7
| Accommodating Low Throughput   271
|
26.8
| The User's View Of A Playback Buffer   271
|
26.9
| The Effect Of Pausing Playback   273
|
26.10
| The Effect Of Network Congestion   273
|
26.11
| How To Overcome A Start-Stop Cycle   274
|
26.12
| Teleconferencing Services   275
|
26.13
| Using Internet Technology For Telephone Service   276
|
26.14
| VoIP Telephones   276
|
26.15
| Summary   276
|
29.1
| Introduction   297
|
29.2
| A Brief History Of Computing   297
|
29.3
| Maintaining Computers   299
|
29.4
| Data Inconsistencies   299
|
29.5
| Data Synchronization With A Direct Connection   299
|
29.6
| Selecting Data Items For Synchronization   300
|
29.7
| Synchronization Problems And Internet Synchronization   300
|
29.8
| Cloud Terminology   303
|
29.9
| Types Of Cloud Services   303
|
29.10
| Cloud Applications And The Internet of Things   304
|
29.11
| Generalized Cloud Computing   305
|
29.12
| Cloud Computing From A Company's Perspective   306
|
29.13
| Public, Private, And Hybrid Cloud   307
|
29.14
| Cloud Data Centers And Racks Of Computers   307
|
29.15
| Generalized Cloud Computing For An Individual   308
|
29.16
| The Disadvantage Of Using The Cloud   309
|
29.17
| Virtualization Technology Used For Cloud Computing   310
|
29.18
| Summary   310
|
| Exercises   311
|
30.1
| Introduction   317
|
30.2
| Cybercrime And Cyber Security   317
|
30.3
| The Unsecure Internet   318
|
30.4
| Keeping Conversations Confidential   319
|
30.5
| Computer Encryption And Mathematics   319
|
30.6
| Confidential Web Browsing   320
|
30.7
| No Network Is Absolutely Secure   321
|
30.8
| Encryption Keys   321
|
30.9
| Two Keys Means Never Having To Trust Anyone   322
|
30.10
| Authentication: User IDs And Passwords   324
|
30.11
| Two-Factor Authentication   324
|
30.12
| Using Encryption For Authentication   325
|
30.13
| Wireless Network Security   325
|
30.14
| Network Firewall: Protection From Unwanted Packets   326
|
30.15
| Packet Filtering In A Firewall   327
|
30.16
| Trojan Horses And Firewall Protection   327
|
30.17
| Residential And Individual Firewalls   328
|
30.18
| Other Recommended Precautions   329
|
30.19
| Summary   330
|
| Exercises   330
|
32.1
| Introduction   341
|
32.2
| An Employee At A Remote Location   341
|
32.3
| Secure Remote Desktop   342
|
32.4
| Using A Leased Circuit For Secure Telecommuting   343
|
32.5
| VPN Technology: Secure, Low-Cost Remote Access   343
|
32.6
| VPN From An Employee's Perspective   344
|
32.7
| How A VPN Works   344
|
32.8
| The Illusion Of A Direct Connection   345
|
32.9
| Obtaining A Corporate IP Address   346
|
32.10
| Exchanging Packets With The VPN Server   347
|
32.11
| The Significance Of VPNs   348
|
32.12
| Summary   349
|
| Exercises   349
|
33.1
| Introduction   353
|
33.2
| The ISP Hierarchy   353
|
33.3
| Network Capacity And Router Hardware   355
|
33.4
| Service Provider Fee Structures   355
|
33.5
| Receiver Pays   356
|
33.6
| ISP Revenue   357
|
33.7
| Peering Arrangements Among Tier 1 ISPs   358
|
33.8
| Security Technology And E-commerce   358
|
33.9
| Digital Signatures   359
|
33.10
| Certificates Contain Public Keys   359
|
33.11
| Digital Money   360
|
33.12
| How Digital Cash Works   360
|
33.13
| Business And E-commerce   361
|
33.14
| The Controversy Over Net Neutrality   361
|
33.15
| Summary   362
|
34.1
| Introduction   365
|
34.2
| What Is A Library?   365
|
34.3
| Is The Internet A Digital Library?   366
|
34.4
| New Services Replace Old Services   366
|
34.5
| Digital Formats, Standards, And Archival Storage   367
|
34.6
| Organizing A Library   368
|
34.7
| The Disadvantage Of Imposing Structure   369
|
34.8
| Searching An Unstructured Collection   369
|
34.9
| What Is The Internet?   370
|
34.10
| A Personal Note   370
|