计算机网络(英文版,第2版)

作者
Larry L.Peterson
丛书名
计算机科学丛书
出版社
机械工业出版社
ISBN
9787111075264
简要
简介
内容简介书籍计算机书籍 Larry L.Peterson & Bruce S. Davie: Computer Networks,A Systems Approach. Second Edition. Copyright ?2000 by Morgan Kaufmann Publishers,Inc. Harcourt Asia Pte Ltd under special arrangement with Morgan Kaufmann authorizes China Machine Press to print and exclusively distribute this edition,which is the only authorized complete and unabridged reproduction of the latest American Edition published and priced for sale in China only,not including Hong Kong SAR and Taiwan. Unauthorized export of this edition is a violation of the Copyright Act. Violation of this Law is subjected to Civil and Criminal penalties.
目录
CONTENTS
Foreword
Foreword to the First Edition
Preface
1 Foundation
Problem: Building a Network
1. 1 Requirements
1. 1. 1 Connectivity
1.1.2 Cost-Effective Resource Sharing
1.1.3 Support for Common Services
1.1.4 Performance
1.2 Network Architecture
1.2.1 Layering and Protocols
1.2.2 OSI Architecture
1.2.3 Internet Architecture
1.3 Implementing Network Software
1.3.1 Application Programming Interface (Sockets)
1.3.2 Example Application
1.3.3 Protocol Implementation Issues
1.4 Summary Open Issue: Ubiquitous Networking Further Reading Exercises
2 Direct Link Networks
Problem: Physically Connecting Hosts
2.1 Hardware Building Blocks
2. 1.1 Nodes
2.1.2 Links
2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B)
2.3 Framing
2.3.1 Byte-Oriented Protocols (BISYNC, PPP, DDCMP)
2.3.2 Bit-Oriented Protocols (HDLC)
2.3.3 Clock-Based Framing (SONET)
2.4 Error Detection
2.4.1 Two-Dimensional Parity
2.4.2 Internet Checksum Algorithm
2.4.3 Cyclic Redundancy Check
2.5 Reliable Transmission
2.5.1 Stop-and-Wait
2.5.2 Sliding Window
2.5.3 Concurrent Logical Channels
2.6 Ethernet (802.3)
2.6.1 Physical Properties
2.6.2 Access Protocol
2.6.3 Experience with Ethernet
2.7 Token Rings (802.5, FDDI)
2.7.1 Physical Properties
2.7.2 Token Ring Media Access Control
2.7.3 Token Ring Maintenance
2.7.4 Frame Format
2.7.5 FDDI
2.8 Wireless (802.11)
2.8.1 Physical Properties
2.8.2 Collision Avoidance
2.8.3 Distribution Syste
2.8.4 Frame Format
2.9 Network Adaptors
2.9.1 Components
2.9.2 View from the Host
2.9.3 Device Drivers
2.9.4 Memory Bottleneck
2.10 Summary Open Issue: Does It Belong in Hardware? Further Reading Exercises
3 Packet Switching
Problem: Not All Networks Are Directly Connected
3.1 Switching and Forwarding
3.1.1 Datagrams
3.1.2 Virtual Circuit Switching
3.1.3 Source Routing
3.1.4 Implementation and Performance
3.2 Bridges and LAN Switches
3.2.1 Learning Bridges
3.2.2 Spanning Tres Algorithm
3.2.3 Broadcast and Multicast
3.2.4 Limitations of Bridges
3.3 Cell Switching (ATM)
3.3.1 Celia
3.3.2 Segmontation and Reassembly
3.3.3 Virtual Paths
3.3.4 Physical Layers for ATM
3.3.5 ATM in the LAN
3.4 Switching Hardware
3.4.1 Design Goals
3.4.2 Ports and Fabrics
3.4.3 Crossbar Switches
3.4.4 Shared-Media Switches
3.4.5 Self-Routing Fabrics
3.5 Summary Open Issue: The Future of ATM Further Reading Exercises
4 Internetworking
Problem: There Is More Than One Network
4.1 Simple Internetworking (IP)
4.1.1 What Is an Internetwork?
4.1.2 Service Model
4.1.3 Global Addresses
4.1.4 Datagram Forwarding in IP
4.1.5 Address Translation (ARP)
4.1.6 Host Configuration (DHCP)
4.1.7 Error Reporting (ICMP)
4.1 .8 Virtual Networks and Tunnels
4.2 Routing
4.2.1 Network as a Graph
4.2.2 Distance Vector (RIP)
4.2.3 Link State (OSPF)
4.2.4 Metrics
4.2.5 Routing for Mobile Hosts
4.3 Global Internet
4.3.1 Subnetting
4.3.2 Classless Routing (CIDR)
4.3.3 Interdomain Routing (BGP)
4.3.4 Routing Areas
4.3.5 IP version 6 (IPv6)
4.4 Multicast
4.4.1 Link-State Multicast
4.4.2 Distance-Vector Multicast
4.4.3 Protocol Independent Multicast (PIM)
4.5 Summary Open Issue: IP, ATM, and MPLS Further Reading Exercises
5 End-to-End Protocols
Problem: Getting Processes to Communicate
5.1 Simple Demultiplexer (UDP)
5.2 Reliable Byte Stream (TCP)
5.2.1 End-to-End Issues
5.2.2 Segment Format
5.2.3 Connection Establishment and Termination
5.2.4 Sliding Window Revisited
5.2.5 Adaptive Retransmission
5.2.6 Record Boundaries
5.2.7 TCP Extensions
5.2.8 Alternative Design Choice*
5.3 Remote Procedure Call
5.3.1 Bulk Transfer (BLAST)
5.3.2 Request/Reply (CHAN)
5.3.3 Dispatcher (SELECT)
5.3.4 Putting It All Together (SunRPC, DCE)
5.4 Performance
5.4.1 Experimental Method
5.4.2 Latency
5.4.3 Throughput
5.5 Summary Open Issue: Application-Specific Protocols Further Reading Exercises
5 Congestion Control and Resource Allocation
Problem: Allocating Resources
6. 1 Issues in Resource Allocation
6.1.1 Network Model
6.1.2 Taxonomy
6.1.3 Evaluation Criteria
6.2 Queuing Disciplines
6.2.1 FIFO
6.2.2 Fair Queuing
6.3 TCP Congestion Control
6.3.1 Additive Increase/Multiplicative Decrease
6.3.2 Slow Start
6.3.3 Fast Retransmit and Fast Recovery
6.4 Congestion-Avoidance Mechanisms
6.4.1 DECbit
6.4.2 Random Early Detection (RED)
6.4.3 Source-Based Congestion Avoidance
6.5 Quality of Service
6.5.1 Application Requirements
6.5.2 Integrated Services (RSVP)
6.5.3 Differentiated Services
6.5.4 ATM Quality of Service
6.6 Summary Open Issue: Inside versus Outside the Network
Further Reading
Exercises
7 End-to-End Data Problem: What Do We Do with the Data?
7.1 Presentation Formatting
7. 1.1 Taxonomy
7.1.2 Examples (XDR, ASN.1, NDR)
7.2 Data Compression
7.2.1 Lossless Compression Algorithms
7.2.2 Image Compression (JPEG)
7.2.3 Video Compression (MPEG)
7.2.4 Transmitting MPEG over a Network
7.2.5 Audio Compression (MP3)
7.3 Summary Open Issue: Computer Networks Meet Consumer Electronics Further Reading Exercises
8 Network Security
Problem: Securing the Data
8.1 Cryptographic Algorithms
8. 1.1 Requirements
8.1.2 The Data Encryption Standard (DES)
8.1.3 RSA
8.1.4 Message Digest 5 (MD5)
8.1.5 Implementation and Performance
8.2 Security Mechanisms
8.2.1 Authentication Protocols
8.2.2 Message Integrity Protocols
8.2.3 Public Key Distribution (X.509)
8.3 Example Systems
8.3.1 Privacy Enhanced Mail (PEM)
8.3.2 Pretty Good Privacy (PGP)
8.3.3 Transport Layer Security (TLS, SSL, HTTPS)
8.3.4 IP Security (IPSEC)
8.4 Firewalls
8.4.1 Filter-Based Firewalls
8.4.2 Proxy-Based Firewalls
8.4.3 Limitations
8.5 Summary Open Issue: Denial-of-Service Attacks Further Reading Exercises
9 Applications
Problem: Applications Need Their Own Protocols
9.1 Name Service (DNS)
9.1.1 Domain Hierarchy
9.1.2 Name Servers
9.1.3 Name Resolution
9.2 Traditional Applications
9.2.1 Electronic Mail (SMTP, MIME)
9.2.2 World Wide Web (HTTP)
9.2.3 Network Management (SNMP)
9.3 Multimedia Applications
9.3.1 Requirements
9.3.2 Real-time Transport Protocol (RTP)
9.3.3 Session Control and Call Control (H.323)
9.4 Summary Open Issue: Programming the Network Further Reading Exercises
Glossary
References
Index


推荐

车牌查询
桂ICP备20004708号-3