Professional Documents
Culture Documents
Cisco IP Routing (Book Review) : IEEE Network April 2002
Cisco IP Routing (Book Review) : IEEE Network April 2002
net/publication/3282843
CITATION READS
1 812
1 author:
Ioanis Nikolaidis
University of Alberta
209 PUBLICATIONS 1,439 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Human Mobility and Location Privacy in Wireless Sensor Networks View project
All content following this page was uploaded by Ioanis Nikolaidis on 20 May 2014.
The New Books and Multimedia column contains brief reviews of new books in the Cisco IP Routing
computer communications field. Each review includes a highly abstracted descrip-
Alex Zinin, 2002, Addison-Wesley,
tion of the contents, relying on the publisher’s descriptive materials, minus adver-
ISBN 0-201 -60473-6, 635 pages,
tising superlatives, and checked for accuracy against a copy of the book. The
hardcover.
reviews also comment on the structure and the target audience of each book.
Publishers wishing to have their books listed in this manner should send copies What Zinin’s book achieves that the
and appropriate advertising materials to Ioanis Nikolaidis at the address below, majority of books on vendor-oriented
with an indication that books are intended for the IEEE Network New Books and (and Cisco in particular) routing fail to
Multimedia column. Appropriate books will be reviewed in the column. capture is the description of what goes
Ioanis Nikolaidis on inside an actual router, in terms of
Computing Science Department, the algorithms and data structures used.
University of Alberta, Edmonton, Alberta, Canada T6G 2E8 Given the complicated nature of most
routing algorithms and relevant configu-
ration information, understanding the
Stream Contrcd Transmission present the mechanism for future exten- principle of operation does not imply a
sions, a proposed API (essentially a good understanding of what a specific
Profocol, A Reference Guide socket-based one, including some not sequence of commands (in the case of
Randall R. Stewart and Qiaobing Xie, yet finalized socket option flags), and Cisco, the 10s commands) will produce
2002, Addison-Wesley, ISBN 0-20 1- the SCTP Stream feature through cer- as results or side-effects. Compounding
7 2 1 86-4, 35 1 pages., hardcover, tain example applications (ftp-like the problem is the fact that several rout-
CD-ROM included transfer, call control, Web browser). ing algorithms may be used on a single
The book is complemented by a CD- router, their interaction and correspon-
The Stream Control Transmission Proto- ROM providing an open source SCTP dence being anything but trivial. Expla-
col (SCTP) is another transport layer reference implementation. nation of the internals is achieved in
protocol for IP, presented in RFC 2960.
SCTP’s particular feature is the conser-
vation of messa,ge boundaries (as
opposed to TCP’s lack of such a feature). EDITOR’S CHOICE
SCTP is motivated by the inconveniences Web Caching and Replication
of TCP’s ordered byte stream service
model. For example, contrary to TCP, Michael Rabinovich and Oliver Spatscheck, 2002, Addison-Wesley, ISBN 0-
SCTP allows reordering of the messages, 201-61570-3, 361 pages, softcover.
as long as integrity of the messages is Rabinovich and Spatscheck remind us that not only human users, but also an
maintained. Furthermore, the idea of increasing number of computer applications rely on the Web, demanding even
multihomed IP hosts (as exhibited by better performance from its services. Even if we ignore such computer applica-
IPv6) is not exploited by TCP, and TCP tions, the idea of even better Web use experience is pushing the envelope of per-
is also vulnerable to certain denial of ser- formance. Caching and replication are two widely used techniques for improving
vice attacks. SCTP essentially provides a performance in such client-server environments. These particular techniques gave
solution to these issues, while maintain- rise to new industries (equipment and services alike), and a good understanding,
ing the same congestion control logic as of what is achievable and why, becomes necessary for anyone wishing to purchase
TCP. The book is geared to protocol and integrate equipment and services into their Web infrastructure. The book
developers and implementers, but can be serves the purpose of properly calibrating the expectations from these two techniques.
read by anyone curious to know of The intended audience spans IT professionalslooking at improvingtheir own installed
SCTP’s features or wishing to discover infrastructure to graduate students and, in general, researchers in the area.
limitations of TCP and how they can be Indeed, the book provides a wide collection of research results, summarized and struc-
solved. It is not surprising that a chapter tured in concise fashion. It is demonstrated how even the last drop of perfor-
is dedicated to comparing and contrast- mance can be squeezed. For example, the oxymoron in the title “Caching the
ing TCP and SCTP. If we factor out the Uncacheable” illustrates how cookies (and other stateful information) and
TCP vs. SCTP chapter and the intro- dynamic content can be exploited. The book is organized in fiveerts; the first is,
ductory (mostly terminology) chapters, predictably, an introduction to some essential protocols (IP, TCP, and HTTP).
what is left is a detailed, down to the The description of HTTP is focused on extensions relevant to caching (conditional
last bit, description of SCTP. People requests, request redirection, cache-control header, cookies, expanded object
who enjoy understanding the low-level identifiers, learning of proxy chains).The part ends by reviewing resultsin measurement
details of protocols, from headers to and evaluation of object sizes, types, and popularity, arguing the general difficulty
underlying state machines, will certainly of staging a single representative experiment that can have globally valid results.
enjoy such detailed coverage. In the Thenexttwopartscoverthetwokeytopicsofthebooktitle. Cachingspanssevenchap-
order presented, the topics are: packet ters, covering reasonable expectations, deployment techniques (transparent, non-
formats and header information, setting transparent), cooperative proxy caching, cache consistency, replacement policies,
up SCTP associations (and underlying prefetching, and caching the uncacheable (dynamic content). The part on replica-
states), the data transfer stage (what are tion covers mechanisms for request distribution and how to implement them
called DATA chunkcs), the congestion (DNS-based, anycast, distributed file systems, redirection by applets and HTTP,
control mechanism (providing precise L7 switches), specialized content delivery networks (CDNs), and server selection
implementation guidelines), failure schemes. It is to be commended that the book ends with a review of the more
detection and recovery, dealing with exotic options and less established trends, such as transcoding, the Internet Con-
out-of-the-blue (OOTB) packets, and tent Adaptation Protocol (ICAP),watermarking, cooperative CDN, and forward prox-
closing/terminating a n association ies.
(graceful or not). Additional chapters
/
this book by providing the (C-like) pseu- cally the cryptographic techniques deployment. Part of the problem is
docode of what essentially happ’ens include DES, 3DES, IDEA, SAFER, purely the syntactical aspect of such
behind the scenes when certain c m-
mands are invoked (we are warned not
t
to expect that the pseudocode is a qne-
to-one reflection of the actual Ci co
Blowfish, CAST-128, RC2, RC4, RC5,
RC6, AES, RSA, Diffie-Hellman, EIGa-
mal, DSS, ECC, digital envelopes, key
protection, and pseudorandom
protocols (performance being the other
one) that allow, for example, SCSI com-
mands to be conveyed via IP. To this
extent, the book presents the SCSI
source code, but rather a summariz d
idea of the control flow). That beidg
l+ sequences, as well as certain legal issues.
The reader should be warned that the
Architecture Model (SAM-2), and SCSI
architecture in general (Chapter 4)
said, understanding the internals boil
down to understanding the pseudocode, P presentation of cryptographic techniques
I .