Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/3282843

Cisco IP routing [Book Review]

Article  in  IEEE Network · April 2002


DOI: 10.1109/MNET.2002.993212 · Source: IEEE Xplore

CITATION READS

1 812

1 author:

Ioanis Nikolaidis
University of Alberta
209 PUBLICATIONS   1,439 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Fort McMurray Stony Mountain Plaza View project

Human Mobility and Location Privacy in Wireless Sensor Networks View project

All content following this page was uploaded by Ioanis Nikolaidis on 20 May 2014.

The user has requested enhancement of the downloaded file.


El NEW BOOKS and MULTIMEDIA/Edited by Ioanis Nikolaidis

The New Books and Multimedia column contains brief reviews of new books in the Cisco IP Routing
computer communications field. Each review includes a highly abstracted descrip-
Alex Zinin, 2002, Addison-Wesley,
tion of the contents, relying on the publisher’s descriptive materials, minus adver-
ISBN 0-201 -60473-6, 635 pages,
tising superlatives, and checked for accuracy against a copy of the book. The
hardcover.
reviews also comment on the structure and the target audience of each book.
Publishers wishing to have their books listed in this manner should send copies What Zinin’s book achieves that the
and appropriate advertising materials to Ioanis Nikolaidis at the address below, majority of books on vendor-oriented
with an indication that books are intended for the IEEE Network New Books and (and Cisco in particular) routing fail to
Multimedia column. Appropriate books will be reviewed in the column. capture is the description of what goes
Ioanis Nikolaidis on inside an actual router, in terms of
Computing Science Department, the algorithms and data structures used.
University of Alberta, Edmonton, Alberta, Canada T6G 2E8 Given the complicated nature of most
routing algorithms and relevant configu-
ration information, understanding the
Stream Contrcd Transmission present the mechanism for future exten- principle of operation does not imply a
sions, a proposed API (essentially a good understanding of what a specific
Profocol, A Reference Guide socket-based one, including some not sequence of commands (in the case of
Randall R. Stewart and Qiaobing Xie, yet finalized socket option flags), and Cisco, the 10s commands) will produce
2002, Addison-Wesley, ISBN 0-20 1- the SCTP Stream feature through cer- as results or side-effects. Compounding
7 2 1 86-4, 35 1 pages., hardcover, tain example applications (ftp-like the problem is the fact that several rout-
CD-ROM included transfer, call control, Web browser). ing algorithms may be used on a single
The book is complemented by a CD- router, their interaction and correspon-
The Stream Control Transmission Proto- ROM providing an open source SCTP dence being anything but trivial. Expla-
col (SCTP) is another transport layer reference implementation. nation of the internals is achieved in
protocol for IP, presented in RFC 2960.
SCTP’s particular feature is the conser-
vation of messa,ge boundaries (as
opposed to TCP’s lack of such a feature). EDITOR’S CHOICE
SCTP is motivated by the inconveniences Web Caching and Replication
of TCP’s ordered byte stream service
model. For example, contrary to TCP, Michael Rabinovich and Oliver Spatscheck, 2002, Addison-Wesley, ISBN 0-
SCTP allows reordering of the messages, 201-61570-3, 361 pages, softcover.
as long as integrity of the messages is Rabinovich and Spatscheck remind us that not only human users, but also an
maintained. Furthermore, the idea of increasing number of computer applications rely on the Web, demanding even
multihomed IP hosts (as exhibited by better performance from its services. Even if we ignore such computer applica-
IPv6) is not exploited by TCP, and TCP tions, the idea of even better Web use experience is pushing the envelope of per-
is also vulnerable to certain denial of ser- formance. Caching and replication are two widely used techniques for improving
vice attacks. SCTP essentially provides a performance in such client-server environments. These particular techniques gave
solution to these issues, while maintain- rise to new industries (equipment and services alike), and a good understanding,
ing the same congestion control logic as of what is achievable and why, becomes necessary for anyone wishing to purchase
TCP. The book is geared to protocol and integrate equipment and services into their Web infrastructure. The book
developers and implementers, but can be serves the purpose of properly calibrating the expectations from these two techniques.
read by anyone curious to know of The intended audience spans IT professionalslooking at improvingtheir own installed
SCTP’s features or wishing to discover infrastructure to graduate students and, in general, researchers in the area.
limitations of TCP and how they can be Indeed, the book provides a wide collection of research results, summarized and struc-
solved. It is not surprising that a chapter tured in concise fashion. It is demonstrated how even the last drop of perfor-
is dedicated to comparing and contrast- mance can be squeezed. For example, the oxymoron in the title “Caching the
ing TCP and SCTP. If we factor out the Uncacheable” illustrates how cookies (and other stateful information) and
TCP vs. SCTP chapter and the intro- dynamic content can be exploited. The book is organized in fiveerts; the first is,
ductory (mostly terminology) chapters, predictably, an introduction to some essential protocols (IP, TCP, and HTTP).
what is left is a detailed, down to the The description of HTTP is focused on extensions relevant to caching (conditional
last bit, description of SCTP. People requests, request redirection, cache-control header, cookies, expanded object
who enjoy understanding the low-level identifiers, learning of proxy chains).The part ends by reviewing resultsin measurement
details of protocols, from headers to and evaluation of object sizes, types, and popularity, arguing the general difficulty
underlying state machines, will certainly of staging a single representative experiment that can have globally valid results.
enjoy such detailed coverage. In the Thenexttwopartscoverthetwokeytopicsofthebooktitle. Cachingspanssevenchap-
order presented, the topics are: packet ters, covering reasonable expectations, deployment techniques (transparent, non-
formats and header information, setting transparent), cooperative proxy caching, cache consistency, replacement policies,
up SCTP associations (and underlying prefetching, and caching the uncacheable (dynamic content). The part on replica-
states), the data transfer stage (what are tion covers mechanisms for request distribution and how to implement them
called DATA chunkcs), the congestion (DNS-based, anycast, distributed file systems, redirection by applets and HTTP,
control mechanism (providing precise L7 switches), specialized content delivery networks (CDNs), and server selection
implementation guidelines), failure schemes. It is to be commended that the book ends with a review of the more
detection and recovery, dealing with exotic options and less established trends, such as transcoding, the Internet Con-
out-of-the-blue (OOTB) packets, and tent Adaptation Protocol (ICAP),watermarking, cooperative CDN, and forward prox-
closing/terminating a n association ies.
(graceful or not). Additional chapters

A IEEE Network March/April2002


2# NEW BOOKS and MULTIMEDIA
li

/
this book by providing the (C-like) pseu- cally the cryptographic techniques deployment. Part of the problem is
docode of what essentially happ’ens include DES, 3DES, IDEA, SAFER, purely the syntactical aspect of such
behind the scenes when certain c m-
mands are invoked (we are warned not
t
to expect that the pseudocode is a qne-
to-one reflection of the actual Ci co
Blowfish, CAST-128, RC2, RC4, RC5,
RC6, AES, RSA, Diffie-Hellman, EIGa-
mal, DSS, ECC, digital envelopes, key
protection, and pseudorandom
protocols (performance being the other
one) that allow, for example, SCSI com-
mands to be conveyed via IP. To this
extent, the book presents the SCSI
source code, but rather a summariz d
idea of the control flow). That beidg
l+ sequences, as well as certain legal issues.
The reader should be warned that the
Architecture Model (SAM-2), and SCSI
architecture in general (Chapter 4)
said, understanding the internals boil
down to understanding the pseudocode, P presentation of cryptographic techniques
I .

is severely condensed (the topics listed


which is key to understanding the rest.
A sequence of chapters ( 5 , 6, and 7 )
possibly alienating some readers n t
keen on reading code. Nevertheless, one sl’ above take less than 28 pages of the
book); if interested in the properties and
provide a review of IP, UDP, and TCP
for those unfamiliar with networking.
can approach the pseudocode on an hs limitations of a scheme, instead of just its The rest of the book centers around
needed basis, when the behavior of c Im- application, the reader is advised to seek IETF’s Fibre Channel over IP (FCIP),
mands is not exactly as intuitive as Xne other sources of information. From the Internet Fibre Channel Protocol
might expect. The reader is assumed to remaining parts, the second is devoted to (iFCP), and Internet SCSI (iSCSI).
be familiar with networking, but a short firewalls: packet filtering, SOCKS, appli- These protocols are described in detail,
review of IP addressing and its relation cation-level gateways, configuration of and they correspond to, respectively, FC
to routing is nevertheless provided in the firewalls, and in gcneral the architectural extensions to connect remote FC SANS
introduction. A chapter describes the elements of a potentially secured net- via IP (FCIP), mapping between IP and
routing information organization and work. The communications part pays FC end nodes (iFCP), and replacement
management inside Cisco routers, fol- attention to a handful of specific proto- of FC and devices with native IP storage
lowed by a chapter that describes the IP cols at different layers of the protocol devices (iSCSI). Another important fac-
forwarding process options present in stack, explaining their principles of oper- tor of IP SANs, especially in larger
Cisco routers: fast, optimum, distributed, ation. These include MS-PPTP, IPsec, installations, is their management; this is
NetFlow, and Cisco Express forwarding. SKIP, IDE, SSL, TLS, Kerberos, covered in Chapter 9 through presenta-
After the internal mechanisms and for- SESAME, PGP, and SWIME. The book tion of the Internet Storage Name Server
warding options come the chapters on ends with a discussion of PKI (certifi- (iSNS) protocol. To complete the pre-
actual routing protocols: static routing, cates and certificate authorities), and a sentation, security and quality of service
dynamic routing, distance vector proto- short overview of electronic commerce, of S A N S are presented, even though they
cols (RIP and IGRP), and link state pro- risk management policies and principles. are not as closely related to SANs alone
tocols (OSPF and IS-IS). A separate Overall, the book is written for an audi- per se, but rather to IP security and QoS.
chapter describes Enhanced IGRP, ence without necessarily a significant Arguments to convince the reader of the
Cisco’s proprietary protocol. The style is technical background who wish to quick- value of the application potential of
geared toward answering specific ques- ly rcview a broad introduction to the SANs can be found in Chapter 13, from
tions as to why things work in a particu- available techniques and protocols of obvious choices (backup) to perfor-
lar way, instead of just how. Consistent network security. mance-driven applications (server clus-
with the book’s scope, each chapter tering and massive data distribution).
includes several examples and is followed If‘ SANS,A Guide to iSCSI/ Appendices provide information about
by a Q-and-A section of the most fre- the Storage Networking Industry Associ- ‘
quently asked questions. iFCP, and FCIP, Protoco/s for ation (SNIA) and IP storage (and rela’t-
Storage Area Networks ed) vendors.
Internet and lntranet Sewrib Tom Clark, 2002, Addison-Wesley,
2nd Edition ISBN 0-201-75277-8, 288 pages, soft- java.rmi The Remote Method
cover. Invocation Guide
Rolf Opplinger, 2002, Artech House,
ISBN 1-58053-166-0, 403 pages, The objective of storage area networks Esmond Pitt and Kathleen McNiff,
hardcover. (SANs) is to produce logical storage 2001, Addison-Wesley, ISBN 0-201-
units that are in fact scalable collections 70043-3, 284 pages, softcover.
Rolf Opplinger’s book is an attempt to of storage devices over a network.
present security in networks (intra- and While storage devices are well appreci- The idea of distributed programming
internets) in a unified fashion. For a ated as scalable in terms of capacity at a across heterogeneous CPUs, OSs, lan-
long part of the book, networking and nearly exponential rate, the extent to guages, and data formats has galva-
cryptography are presented separately, which a specific network technology is nized researchers and software
coming together in the second half to be uscd and its shortcomings, in developers alike, producing, for exam-
(“Communications Security”). The con- terms of scalability, are still an issue for ple, RPC and CORBA. The emergence
tents cover not just cryptographic research and development. One prevail- of Java as a universal programming
aspects of security but also general-pur- ing school of thought advocates the use language led, naturally, to its use as a
pose security mechanisms that can be of IP as the network technology of step toward simplifying distributed sys-
used to enhance security, such as packet choice. The deployment of SANs over tems programming. The bulk of func-
filtering and firewalling. The first part IP requires the solution to a plethora of tionality in support of distributed
lays the foundations, including terminol- problems because of the need of a lega- applications under Java is known as the
ogy, basics of TCPIIP, types and nature cy general-purpose internetworking pro- Remote Method Invocation ( R M I )
of attacks, the OS1 security architecture, tocol (IP) to efficiently support API. RMI is already quite popular in
and a brief review of cryptographic relatively recent protocols, of special- the development of applications, but
techniques followed by authentication ized nature (SCSI, Fibre Channel), the range of information necessary
and key distribution techniques. Specifi- some not even intended for WAN (which goes beyond the Java RMI doc-
~

IEEE Network March/April2002 5

View publication stats

You might also like