Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
TCP/IP: the ultimate protocol guide : data delivery and routing (vol. 1)
Miller P., Brown Walker Press (FL), Boca Raton, FL, 2009. 564 pp. Type: Book (9781599424910)
Date Reviewed: Oct 28 2009

This is Volume 1 of the two-volume set on transmission control protocol/Internet protocol (TCP/IP) [1]. It covers the bottom portion of the TCP/IP protocol stack. Miller divided the chapters by gathering related information on important functions.

Section A’s brief introduction provides necessary insight into TCP/IP history and standardization. The three chapters cover the underlying infrastructure (not part of TCP/IP), and provide a synthesis description of local area networks (LANs) standardized by IEEE, concentrating on the basics of main Ethernet (802.3) and wireless LAN (802.11) media access control (MAC) protocols, and adding an educational rather than practical overview of token ring (802.5). Fiber distributed data interface (FDDI) and fiber channel (FC) are not covered. Understandably, the author does not spend too much time on network technologies, limiting his descriptions to the core layer 1/2 protocols; therefore, the book does not cover the 802.11 amendments or the latest developments in the technologies, such as the 40/100 gigabit-per-second (Gbps) Ethernet. Also, wide area networks (WANs) are not covered until Volume 2. The relays deployed at the bottom layers, such as bridges and switches, are covered very briefly, without even mentioning the related IEEE 802.1 standards.

Section B, chapters 4 to 10, introduces the IP datagram protocol and its valuable companions, such as address resolution protocol/reverse address resolution protocol (ARP/RARP) and Internet control message protocol (ICMP). Obviously, the discussion starts with an extensive explanation of the addressing used in IP version 4 (IPv4) and IP version 6 (IPv6). This section briefly discusses the coexistence of IPv4 and IPv6, including transition scenarios. Also, network address translation (NAT) and network address port translation (NAPT) are described.

Section C moves rather quickly up the protocol stack and deals with data delivery--reliable-TCP and unreliable-user datagram protocol (UDP). Unfortunately, Volume 1 has no information on other transport protocols, which are very important for the popular traffic sensitive to delays and other quality of service (QoS) criteria, such as voice over Internet protocol (VoIP). Surprisingly, Section D moves the reader in this direction, talking about schemes to ensure QoS--differentiated services (DiffServ) and integrated services (IntServ)--and protocols--resource reservation protocol (RSVP). Section D, chapters 13 and 14, would be better placed in Volume 2, with the application protocols needed for specific network services.

Finally, Section E deals with routing, the function of the network layer. First, unicast routing protocols, for both IPv4 and IPv6 environments, are discussed; apart from standardized interior protocols, such as the routing information protocol (RIP) and open shortest path first (OSPF), the proprietary (enhanced) interior gateway routing protocol ((E)IGRP) is duly described. The widely used border gateway protocol (BGP) is not reviewed in all its complexity, but its main issues are properly covered. Some attention is also paid to high availability routing, performed with the help of the hot standby router protocol (HSRP) and the virtual router redundancy protocol (VRRP). Section F covers multicasting, introducing not only specific multicast addresses, but also specific protocols that support multicasting, such as group management and routing. Unfortunately, multiprotocol label switching (MPLS) is not discussed.

The volume ends with Appendices A to G. Appendix A, a glossary, is unnecessary, as the terms are easily located in the text with the help of a proper index. On the other hand, a list of abbreviations would have been useful. The rest of the appendices are practical; they cover protocol and port numbers, and multicast and anycast address allocations. Last but not least, Appendix G includes requests for comments (RFCs). While the bibliography consists exclusively of selected RFCs, there is no indication of where to find up-to-date information on an RFC’s status.

True to its title, this book focuses on protocol operation and message formats, with some examples (mostly trace scripts). The reader should not expect step-by-step guidance on the protocol selection process or implementation issues, but the text does provide some useful hints.

Network professionals and students need this reference. The consistent level of detail and the descriptive style are helpful, but the way the topics are divided between the two volumes may not fit the logical bottom-up approach for the systematic building of TCP/IP knowledge. The small print and soft cover are other factors that potential readers should consider. To increase its contemporary value, this volume needs more current references to RFCs and Internet drafts (works in progress).

Reviewer:  Rita Puzmanova Review #: CR137422 (1010-0968)
1) Miller, P. TCP/IP : the ultimate protocol guide: applications, access and data security (vol. 2). BrownWalker Press, Boca Raton, FL, 2009.
Bookmark and Share
  Featured Reviewer  
 
TCP/ IP (C.2.2 ... )
 
 
Data Communications (C.2.0 ... )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "TCP/IP": Date
Critical path analysis of TCP transactions
Barford P., Crovella M.  Data communication in Latin America and the Caribbean (, San Jose, Costa Rica, Apr 3-5, 2001)80-102, 2001. Type: Proceedings
Jun 6 2002
The simple book
Rose M. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780138126117)
May 1 1992
TCP/IP and related protocols
Black U., McGraw-Hill, Inc., New York, NY, 1992. Type: Book (9780070055537)
Feb 1 1993
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy