计算机网络 英文PDF电子书下载
- 电子书积分:20 积分如何计算积分?
- 作 者:(美)LarryL.Peterson,BruceS.Davie著
- 出 版 社:北京:机械工业出版社
- 出版年份:2000
- ISBN:7111075269
- 页数:748 页
1 Foundation 2
Problem:Building a Network 2
1.1 Requlrements 4
1.1.1 Connectivity 4
1.1.2 Cost-Effective Resource Sharing 8
1.1.3 Support for Common Services 12
1.1.4 Performance 20
1.2 Network Architscture 29
1.2.1 Layering and Protocols 30
1.2.2 OSI Architecture 36
1.2.3 Internet Architecture 38
1.3 Implementing Network Software 41
1.3.1 Application Programming Interface(Sockets) 42
1.3.2 Example Application 45
1.3.3 Protocol Implementation Issues 48
1.4 Summary 56
Open Issue:Ubiquitous Networking 57
Further Reading 58
Exercises 60
2 Direct Link Networks 68
Problem:Physically Connecting Hosts 68
2.1 Hardware Bullding Blocks 70
2.1.1 Nodes 70
2.1.2 Links 71
2.2 Encoding(NRZ,NRZI,Manchestor,4B/5B) 80
2.3 Framing 84
2.3.1 Byte-Oriented Protocols(BISYNC,PPP,DDCMP) 84
2.3.2 Bit-Oriented Protocols(HDLC) 87
2.3.3 Clock-Based Framing(SONET) 89
2.4 Error Detection 92
2.4.1 Two-Dimensional Parity 94
2.4.2 Internet Checksum Algorlthm 94
2.4.3 Cyclic Redundancy Check 96
2.5 Reliable Transmission 101
2.5.1 Stop-and-Wait 103
2.5.2 Sliding Window 105
2.5.3 Concurrent Logical Channels 115
2.6 Ethernet(802.3) 116
2.6.1 Physical Properties 117
2.6.2 Access Protocol 119
2.6.3 Experience with Ethernet 124
2.7 Token Rigns(802.5.FDDI) 125
2.7.1 Physical Properties 126
2.7.2 Token Ring Media Access Control 127
2.7.3 Token Ring Maintenance 129
2.7.4 Frame Format 131
2.7.5 FDDI 132
2.8 Wireless(802.11) 136
2.8.1 Physical Properties 136
2.8.2 Collision Avoidance 137
2.8.3 Distribution System 139
2.8.4 Frame Format 141
2.9 Network Adaptors 142
2.9.1 Components 142
2.9.2 View from the Host 143
2.9.3 Device Drivers 148
2.9.4 Memory Bottleneck 151
2.10 Summary 153
Open Issue:Does It Belong in Hardware? 154
Further Reading 155
Exercises 156
3 Packet Switching 170
Problem:Not All Networks Are Directly Connectad 170
3.1 Switching and Forwarding 172
3.1.1 Datagrams 174
3.1.2 Virtual Circuit Switching 176
3.1.3 Source Routing 183
3.1.4 Impiementation and Performance 185
3.2 Bridges and LAN Switches 186
3.2.1 Learning Bridges 187
3.2.2 Spanning Tree Algorithm 190
3.2.3 Broadcast and Multicast 195
3.2.4 Limitations of Bridges 196
3.3 Cell Switching(ATM) 198
3.3.1 Cells 198
3.3.2 Segmentation and Reassembly 203
3.3.3 Virtual Paths 209
3.3.4 Physical Layers for ATM 210
3.3.5 ATM in the LAN 211
3.4 Switching Hardware 215
3.4.1 Design Goals 216
3.4.2 Ports and Fabrics 219
3.4.3 Crossbar Switches 221
3.4.4 Shared-Media Switches 226
3.4.5 Self-Routing Fabrics 227
3.5 Summary 232
Open Issue:The Future of ATM 233
Further Reading 234
Exercises 235
4 Internetworking 246
Problem:There Is More Than One Network 246
4.1 Simple Internetworking(IP) 248
4.1.1 What Is an Internetwork? 248
4.1.2 Service Model 250
4.1.3 Global Addresses 262
4.1.4 Datagram Forwarding in IP 264
4.1.5 Address Translation(ARP) 268
4.1.6 Host Configuration(DHCP) 273
4.1.7 Error Reporting(ICMP) 276
4.1.8 Virtual Networks and Tunnels 277
4.2 Routing 280
4.2.1 Network as a Graph 282
4.2.2 Distance Vector(RIP) 284
4.2.3 Link State(OSPF) 292
4.2.4 Metrics 301
4.2.5 Routing for Mobile Hosts 304
4.3 Global Internet 309
4.3.1 Subnetting 311
4.3.2 Classless Routing(CIDR) 316
4.3.3 Interdomain Routing(BGP) 319
4.3.4 Routing Aress 326
4.3.5 IP version 6(IPv6) 328
4.4 Multicast 340
4.4.1 Link-State Multicast 341
4.4.2 Dlatance-Vector Multicast 344
4.4.3 Protocol Independent Multicast(PIM) 348
4.5 Summary 350
Open Issue:IP,ATM,and MPLS 351
Further Reading 352
Exercises 354
5 End-to-End Protocols 368
Problem:Getting Processes to Communicate 368
5.1 Simple Demultiplexer(UDP) 370
5.2 Reliable Byte Stream(TCP) 371
5.2.1 End-to-End Issues 373
5.2.2 Segment Format 375
5.2.3 Connection Establishment and Termination 378
5.2.4 Sliding Window Revisited 383
5.2.5 Adaptive Retransmission 389
5.2.6 Record Boundaries 393
5.2.7 TCP Extensions 394
5.2.8 Alternative Design Choices 395
5.3 Remote Procedure Call 397
5.3.1 Bulk Transfer(BLAST) 400
5.3.2 Request/Reply(CHAN) 407
5.3.3 Dispatcher(SELECT) 417
5.3.4 Putting It All Together(SunRPC,DCE) 420
5.4 Performance 426
5.4.1 Experimental Method 427
5.4.2 Latency 428
5.4.3 Throughput 430
5.5 Summary 430
Open Issue:Application-Specific Protocois 431
Further Reading 432
Exerceses 433
Problem:Allocating Resources 445
6 Congestion Control and Resource Allocation 445
6.1 Issues In Resource Allocation 448
6.1.1 Network Model 448
6.1.2 Taxonomy 452
6.1.3 Evaluation Criteris 454
6.2 Queuing Disciplines 457
6.2.1 FIFO 458
6.2.2 Fair Queuing 459
6.3 TCP Congestion Control 464
6.3.1 Additive Increase/Multiplicative Decrease 465
6.3.2 Slow Start 468
6.3.3 Fast Retransmit and Fast Recovery 472
6.4.1 DECbit 475
6.4 Congestion-Avoidance Mechanisms 475
6.4.2 Random Early Detection(RED) 476
6.4.3 Source-Based Congestion Avoldance 482
6.5 Quality of Service 488
6.5.1 Application Requirements 489
6.5.2 Integrated Services(RSVP) 494
6.5.3 Differentiated Services 505
6.5.4 ATM Quality of Service 509
6.6 Summary 513
Open Issue:Inside versus Outslde the Network 513
Further Reading 514
Exercises 516
7 End-to-End Data 528
Problem:What Do We Do with the Data? 528
7.1 Presentation Formatting 530
7.1.1 Taxonomy 531
7.1.2 Examples(XDR,ASN.1,NDR) 535
7.2 Data Compression 539
7.2.1 Lossless Compression Algorithms 541
7.2.2 Image Compression(JPEG) 543
7.2.3 Video Compression(MPEG) 548
7.2.4 Transmitting MPEG over a Network 553
7.2.5 Audio Compression(MP3) 557
7.3 Summary 559
Open Issue:Computer Networks Meet Conaumer Electronics 559
Further Reading 560
Exercises 561
Problem:Securing the Data 568
8 Network Security 568
8.1 Cryptographic Algorithma 570
8.1.1 Requirements 572
8.1.2 The Data Encryption Standard(DES) 573
8.1.3 RSA 578
8.1.4 Message Digest 5(MD5) 581
8.1.5 Implementation and Performance 584
8.2 Security Mechanisms 584
8.2.1 Authentication Protocols 585
8.2.2 Message Integrity Protocols 588
8.2.3 Public Key Distribution(X.509) 591
8.3 Example Systems 594
8.3.1 Privacy Enhanced Mail(PEM) 594
8.3.2 Pretty Good Privacy(PGP) 599
8.3.3 Transport Layer Security(TLS,SSL,HTTPS) 601
8.3.4 IP Security(IPSEC) 605
8.4 Firewalls 608
8.4.1 Filter-Based Firewalls 609
8.4.2 Proxy-Based Firewalls 610
8.4.3 Limitations 612
8.5 Summary 613
Open Issue:Denial-of-Service Attacks 614
Further Reading 615
Exercises 615
9 Applications 622
Problem:Applications Need Their Own Protocols 622
9.1 Name Service(DNS) 624
9.1.1 Domain Hierarchy 625
9.1.2 Name Servers 626
9.1.3 Name Resolution 630
9.2 Traditional Applications 633
9.2.1 Electronic Mall(SMTP,MIME) 634
9.2.2 World Wide Web(HTTP) 640
9.2.3 Network Management(SNMP) 646
9.3 Multimedia Applications 649
9.3.1 Requirements 651
9.3.2 Real-time Transport Protocol(RTP) 653
9.3.3 Session Control and Call Control(H.323) 660
9.4 Summary 662
Open Issue:Programming the Network 663
Further Reading 664
Exercises 665
Glossary 673
References 699
Index 717
- 《计算机网络与通信基础》谢雨飞,田启川编著 2019
- 《大学计算机实验指导及习题解答》曹成志,宋长龙 2019
- 《中国铁路人 第三届现实主义网络文学征文大赛一等奖》恒传录著 2019
- 《计算机辅助平面设计》吴轶博主编 2019
- 《计算机组成原理解题参考 第7版》张基温 2017
- 《云计算节能与资源调度》彭俊杰主编 2019
- 《Helmholtz方程的步进计算方法研究》李鹏著 2019
- 《计算机组成原理 第2版》任国林 2018
- 《大学计算机信息技术教程 2018版》张福炎 2018
- 《计算机自适应英语语用能力测试系统设计与效度验证 以TEM4词汇与语法题为例》张一鑫著 2019
- 《SQL与关系数据库理论》(美)戴特(C.J.Date) 2019
- 《魔法销售台词》(美)埃尔默·惠勒著 2019
- 《看漫画学钢琴 技巧 3》高宁译;(日)川崎美雪 2019
- 《优势谈判 15周年经典版》(美)罗杰·道森 2018
- 《社会学与人类生活 社会问题解析 第11版》(美)James M. Henslin(詹姆斯·M. 汉斯林) 2019
- 《海明威书信集:1917-1961 下》(美)海明威(Ernest Hemingway)著;潘小松译 2019
- 《迁徙 默温自选诗集 上》(美)W.S.默温著;伽禾译 2020
- 《上帝的孤独者 下 托马斯·沃尔夫短篇小说集》(美)托马斯·沃尔夫著;刘积源译 2017
- 《巴黎永远没个完》(美)海明威著 2017
- 《剑桥国际英语写作教程 段落写作》(美)吉尔·辛格尔顿(Jill Shingleton)编著 2019
- 《指向核心素养 北京十一学校名师教学设计 英语 七年级 上 配人教版》周志英总主编 2019
- 《北京生态环境保护》《北京环境保护丛书》编委会编著 2018
- 《高等教育双机械基础课程系列教材 高等学校教材 机械设计课程设计手册 第5版》吴宗泽,罗圣国,高志,李威 2018
- 《指向核心素养 北京十一学校名师教学设计 英语 九年级 上 配人教版》周志英总主编 2019
- 《高等院校旅游专业系列教材 旅游企业岗位培训系列教材 新编北京导游英语》杨昆,鄢莉,谭明华 2019
- 《中国十大出版家》王震,贺越明著 1991
- 《近代民营出版机构的英语函授教育 以“商务、中华、开明”函授学校为个案 1915年-1946年版》丁伟 2017
- 《新工业时代 世界级工业家张毓强和他的“新石头记”》秦朔 2019
- 《智能制造高技能人才培养规划丛书 ABB工业机器人虚拟仿真教程》(中国)工控帮教研组 2019
- 《AutoCAD机械设计实例精解 2019中文版》北京兆迪科技有限公司编著 2019