TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构PDF电子书下载
- 电子书积分:20 积分如何计算积分?
- 作 者:(美)Douglas E.Comer著
- 出 版 社:北京:人民邮电出版社
- 出版年份:2002
- ISBN:7115099200
- 页数:750 页
1.1 The Motivation For Internetworking 1
Chapter 1 Introduction And Overview 1
1.2 The TCP/IP Internet 2
1.3 Internet Services 3
1.4 History And Scope Of The Internet 6
1.5 The Internet Architecture Board 8
1.6 The IAB Reorganization 9
1.7 The Internet Society 11
1.8 Internet Request For Comments 11
1.10 Future Growth And Technology 12
1.9 Internet Protocols And Standardization 12
1.11 Organization Of The Text 13
1.12 Summary 14
Chapter 2 Review Of Underlying Network Technologies 17
2.1 Introduction 17
2.2 Two Approaches To Network Communication 18
2.3 Wide Area And Local Area Networks 19
2.4 Ethernet Iechnology 20
2.5 Fiber Distributed Data Interconnect (FDDI) 33
17.19 Consequences Of TRPF 35
2.6 Asynchronous Transfer Mode 37
2.7 WAN Technologies: ARPANET 38
2.8 National Science Foundation Networking 40
2.9 ANSNET 44
2.10 A Very High Speed Backbone (vBNS) 45
2.11 Other Technologies Over Which TCP/IP Has Been Used 46
2.12 Summary And Conclusion 50
Chapter 3 Internetworking Concept And Architectural Model 53
3.1 Introduction 53
3.2 Application-Level Interconnection 53
3.3 Network-Level Interconnection 54
3.4 Pronerties Of The Internet 55
3.5 Internet Architecture 56
3.6 Interconnection Through IP Routers 56
3.7 The User s View 58
3.8 All Networks Are Equal 58
3.9 The Unanswered Questions 59
3.10 Summary 60
Chapter 4 Classful Internet Addresses 63
4.1 Introduction 63
4.2 Universal Identifiers 63
4.3 The Original Classful Addressing Scheme 64
4.4 Addresses Specify Network Connections 65
4.5 Network And Directed Broadcast Addresses 65
4.6 Limited Broadcast 66
4.8 Subnet And Supernet Extensions 67
4.7 Interpreting Zero To Mean This 67
4.9 IP Multicast Addresses 68
4.10 Weakenesses In Internet Addressing 68
4.11 Dotted Decimal Notation 69
4.12 Loopback Address 70
4.13 Summary Of Special Address Conventions 70
4.14 Internet Addressing Authority 71
4.15 Reserved Address Prefixes 72
4.16 An ExAmple 72
4.17 Network Byte Order 74
4.18 Summary 75
5.2 The Address Resolution Problem 77
5.1 Introduction 77
Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP) 77
5.4 Resolution Through Direct Mapping 78
5.3 Two Types Of Physical Addresses 78
5.5 Resolution Through Dynamic Binding 79
5.6 The Address Resolution Cache 80
5.7 ARP Cache Timeout 81
5.8 ARP Refinements 82
5.9 Relationship Of ARP To Other Protocols 82
5.10 ARP Implementation 82
5.11 ARP Encapsulation And Identification 84
5.12 ARP Protocol Format 84
5.13 Summary 86
6.1 Introduction 89
Chapter 6 Determining An Internet Address At Startup (RARP) 89
6.2 Reverse Address Resolution Protocol (RARP) 90
6.3 Timing RARP Transactions 92
6.4 Primary And Backup RARP Servers 92
6.5 Summary 93
Chapter 7 Internet Protocol: Connectionless Datagram Delivery 95
7.1 Introduction 95
7.2 A Virtual Network 95
7.3 Internet Architecture And Philosophy 96
7.4 The Conceptual Service Organization 96
7.7 The Internet Datagram 97
7.5 Connectionless Delivery System 97
7.6 Purpose Of The Internet Protocot 97
7.8 Internet Datagram Options 107
7.9 Summary 113
Chapter 8 Internet Protocol: Routing IP Datagrams 115
8.1 Introduction 115
8.2 Routing In An Internet 115
8.3 Direct And Indirect Delivery 117
8.4 Table-Driven IP Routing 119
8.5 Next-Hop Routing 119
8.6 Default Routes 121
8.7 Host-Specific Routes 121
8.8 The IP Routing Algorithm 121
8.9 Routing With IP Addresses 122
8.10 Handling Incoming Datagrams 124
8.11 Establishing Routing Tables 125
8.12 Summary 125
Chapter 9 Internet Protocol: Error And Control Messages (ICMP) 129
9.1 Introduction 129
9.2 The Internet Control Message Protocol 129
9.3 Error Reporting vs. Error Correction 130
9.4 ICMP Message Delivery 131
9.5 ICMP Message Format 132
9.6 Testing Destination Reachability And Status (Ping) 133
9.8 Reports Of Unreachable Destinations 134
9.7 Echo Request And Reply Message Format 134
9.10 Source Quench Format 136
9.9 Congestion And Datagram Flow Control 136
9.11 Route Change Requests From Routers 137
9.12 Detecting Circular Or Excessively Long Routes 139
9.14 Clock Synchronization And Transit Time Estimation 140
9.13 Reporting Other Problems 140
9.15 Information Request And Reply Messages 142
9.16 Obtaining A Subnet Mask 142
9.17 Router Discovery 143
9.18 Router Solicitation 144
9.19 Summary 145
Chapter 10 Classless And Subnet Address Extensions (CIDR) 147
10.1 Introduction 147
10.2 Review Of Relevant Facts 147
10.3 Minimizing Network Numbers 148
10.4 Transparent Routers 149
10.5 Proxy ARP 150
10.6 Subnet Addressing 152
10.7 Flexibility In Subnet Address Assignment 154
10.8 Variable-Length Subnets 155
10.9 Implementation Of Subnets With Masks 156
10.10 Subnet Mask Kepresentation 157
10.11 Routing In The Presence Of Subnets 158
10.12 The Subnet Routing Algorithm 159
10.13 A Unified Routing Algorithm 160
10.14 Maintenance Of Subnet Masks 161
10.15 Broadcasting To Subnets 161
10.16 Anonymous Point-To-Point Networks 162
10.17 Classless Addressing (Supernetting) 164
10.18 The Effect Of Supernetting On Routing 165
10.19 CIDR Address Blocks And Bit Masks 165
10.20 Address Blocks And CIDR Notation 166
10.21 A Classless Addressing Example 167
10.22 Data Structures And Algorithms For Classless Lookup 167
10.23 Longest-Match Routing And Mixtures Of Route Types 170
10.24 CIDR Blocks Reserved For Private Networks 172
10.25 Summary 173
11.1 Introduction 177
Chapter 11 Protocol Layering 177
11.2 The Need For Multiple Protocols 177
11.3 The Conceptual Layers Of Protocol Software 178
11.4 Functionality Of The Layers 181
11.5 X.25 And Its Relation To The ISO Model 182
11.6 Differences Between ISO And Internet Layering 185
11.7 The Protocol Layering Principle 187
11.8 Layering In The Presence Of Network Substructure 189
11.9 Two Important Boundaries In The TCP/IP Model 191
11.10 The Disadvantage Of Layering 192
11.11 The Basic Idea Behind Multiplexing And Demultiplexing 192
11.12 Summary 194
Chapter 12 User Datagram Protocol (UDP) 197
12.1 Introduction 197
12.2 Identifying The Ultimate Destination 197
12.3 The User Datagram Protocol 198
12.4 Format Of UDP Messages 199
12.5 UDP Pseudo-Header 200
12.6 UDP Encapsulation And Protocol Layering 201
12.7 Layering And The UDP Checksum Computation 203
12.8 UDP Multiplexing, Demultiplexing, And Ports 203
12.9 Reserved And Available UDP Port Numbers 204
12.10 Summary 206
Chapter 13 Reliable Stream Transport Service (TCP) 209
13.1 Introduction 209
13.2 The Need For Stream Delivery 209
13.3 Properties Of The Reliable Delivery Service 210
13.4 Providing Reliability 211
13.5 The Idea Behind Sliding Windows 213
13.6 The Transmission Control Protocol 215
13.7 Ports, Connections, And Endpoints 216
13.8 Passive And Active Opens 218
13.9 Segments,Streams,And Sequence Numbers 219
13.10 Variable Window Size And Flow Control 220
13.11 TCP Segment Format 221
13.12 Out Of Band Data 222
13.13 Maximum Segment Size Option 223
13.14 TCP Checksum Computation 224
13.15 Acknowledgements And Retransmission 225
13.16 Timeout And Retransmission 226
13.17 Accurate Measurement Of Round Trip Samples 228
13.18 Karn s Algorithm And Timer Backoff 229
13.19 Responding To High Variance In Delay 230
13.20 Response To Congestion 232
13.21 Congestion, Tail Drop, And TCP 234
13.22 Random Early Discard (RED) 235
13.23 Establishing A TCP Connection 237
13.24 Initial Sequence Numbers 239
13.25 Closing a TCP Connection 239
13.26 TCP Connection Reset 241
13.27 TCP Performance 243
13.30 TCP Performance 243
13.28 Forcing Data Delivery 243
13.29 Reserved TCP Port Numbers 243
13.31 Silly Window Syndrome And Small Packets 245
13.32 Avoiding Silly Window Syndrome 246
13.33 Summary 249
Chapter 14 Routing: Cores, Peers, And Algorithms 253
14.1 Introduction 253
14.2 The Origin Of Routing Tables 254
14.3 Routing With Partial Information 255
14.4 Original Internet Architecture And Cores 256
14.5 Core Routers 257
14.6 Beyond The Core Architecture To Peer Backbones 260
14.7 Automatic Route Propagation 262
14.8 Distance Vector (Bellman-Ford) Routing 262
14.9 Gateway-To-Gateway Protocol (GGP) 264
14.11 Reliability And Routing Protocols 265
14.10 Distance Factoring 265
14.12 Link-State (SPF) Routing 266
14.13 Summary 267
Chapter 15 Routing: Exterior Gateway Protocols And Autonomous Systems(BGP) 269
15.1 Introduction 269
15.2 Adding Complexity To The Architectural Model 269
15.3 Determining A Practical Limit On Group Size 270
15.4 A Fundamental Idea: Extra Hops 271
15.5 Hidden Networks 273
15.6 Autonomous System Concept 274
15.7 Form A Core To Independent Autonomous Systems 275
15.8 An Exterior Gateway Protocol 276
15.9 BGP Characteristics 277
15.10 BGP Functionality And Message Types 278
15.11 BGP Message Header 278
15.12 BGP OPEN Message 279
15.13 BGP UPDATE Message 280
15.14 Compressed Mask-Address Pairs 281
15.15 BGP Path Attributes 282
15.16 Bap KEEPALIVE Message 283
15.17 Information From The Receiver s Perspective 284
15.18 The Key Restriction Of Exterior Gateway Protocols 285
15.19 The Internet Routing Arbiter System 287
15.20 BGP NOTIFICATION Message 288
15.21 Decentralization Of Internet Architecture 289
15.22 Summary 290
Chapter 16 Routing: In An Autonomous System (RIP, OSPF, HELLO) 293
16.1 Introduction 293
16.2 Static Vs, Dynamic Interior Routes 293
16.3 Routing Information Protocol (RIP) 296
16.4 The Hello Protocol 305
16.5 Delay Metrics And Oscillation 305
16.6 Combining RIP, Hello, And BGP 307
16.7 Inter-Autonomous System Routing 307
16.9 The Open SPF Protocol (OSPF) 308
16.8 Gated: Inter-Autonomous System Communication 308
16.10 Routing With Partial Information 315
16.11 Summary 315
Chapter 17 Internet Multicasting 319
17.1 Introduction 319
17.2 Hardware Broadcast 319
17.3 Hardware Origins Of Multicast 320
17.4 Ethernet Multicast 321
17.5 IP Multicast 321
17.6 The Conceptual Pieces 322
17.7 IP Multicast Addresses 323
17.8 Multicast Address Semantics 325
17.9 Mapping IP Multicast To Ethernet Multicast 325
17.10 Hosts And Multicast Delivery 326
17.11 Multicast Scope 326
17.12 Extending Host Software To Handle Multicasting 327
17.13 Internet Group Management Protocol 328
17.14 IGMP Implementation 328
17.15 Group Membership State Transitions 329
17.16 IGMP Message Formal 331
17.17 Multicast Forwarding And Routing Information 332
17.18 Basic Multicast Routing Paradigms 334
17.20 Multicast Trees 337
17.21 The Essence Of Multicast Routing 338
17.22 Reverse Path Multicasting 338
17.23 Distance Vector Multicast Routing Protocol 339
17.24 The Mrouted Program 340
17.25 Alternative Protocols 343
17.26 Core Based Trees (CBT) 343
17.27 Protocol Independent Multicast (PIM) 344
17.28 Multicast Extensions To OSPF (MOSPF) 347
17.29 Reliable Multicast And ACK Implosions 347
17.30 Summary 349
Chapter 18 TCP/IP Over ATM Networks 353
18.1 Introduction 353
18.3 Large ATM Networks 354
18.2 ATM Hardware 354
18.4 The Logical View Of An ATM Network 355
18.5 The Two ATM Connection Paradigms 356
18.6 Paths, Circuits, And Identifiers 357
18.7 ATM Cell Transport 358
18.8 ATM Adaptation Layers 358
18.9 ATM Adaptation Layer5 360
18.11 Datagram Encapsulation And IP MTU Size 361
18.10 AAL5 Convergence, Segmentation, And Reassembly 361
18.12 Packet Type And Multiplexing 362
18.13 IP Address Binding In An ATM Network 363
18.14 Logical IP Subnet Concept 364
18.15 Connection Management 365
18.16 Address Binding Within An LIS 366
18.17 ATMARP Packet Format 366
18.18 Using ATMARP Packets To Determine An Address 369
18.20 Timing Out ATMARP Information In A Server 370
18.19 Obtaining Entries For A Server Database 370
18.21 Timing Out ATMARP Information In A Host Or Router 371
18.22 IP Switching Technologies 371
18.23 Switch Operation 372
18.24 Optimized IP Forwarding 372
18.25 Classification, Flows, And Higher Layer Switching 373
18.26 Applicability Of Switching Technology 374
18.27 Summary 374
Chapter 19 Mobile IP 377
19.1 Introduction 377
19.2 Mobility, Routing, and Addressing 377
19.3 Mobile IP Characteristics 378
19.4 Overview Of Mobile IP Operation 378
19.5 Mobile Addressing Details 379
19.6 Foreign Agent Discovery 380
19.7 Agent Registration 381
19.8 Registration Message Format 381
19.10 Datagram Transmission And Reception 383
19.9 Communication With A Foreign Agent 383
19.11 The Two-Crossing Problem 384
19.12 Communication With Computers On the Home Network 385
19.13 Summary 386
Chapter 20 Private Network Interconnection (NAT,VPN) 389
20.1 Introduction 389
20.2 Private And Hybrid Networks 389
20.3 A Virtual Private Network (VPN) 390
20.4 VPN Addressing And Routing 392
20.5 A VPN With Private Addresses 393
20.6 Network Address Translation (NAT) 394
20.7 NAT Translation Table Creation 395
20.8 Multi-Address NAT 396
20.9 Port-Mapped NAT 396
20.10 Interaction Between NAT And ICMP 398
20.11 Interaction Between NAT And Applications 398
20.13 Slirp And Masquerade 399
20.12 Conceptual Address Domains 399
20.14 Summary 400
Chapter 21 Client-Server Model Of Interaction 403
21.1 Introduction 403
21.2 The Client-Server Model 403
21.3 A Simple Example: UDP Echo Server 404
21.4 Time And Date Service 406
21.5 The Complexity of Servers 407
21.6 RARP Server 408
21.7 Alternatives To The Client-Server Model 409
21.8 Summary 410
Chapter 22 The Socket Interface 413
22.1 Introduction 413
22.2 The UNIX IIO Paradigm And Network IIO 414
22.3 Adding Network IIO to UNIX 414
22.4 The Socket Abstraction 415
22.5 Creating A Socket 415
22.6 Socket Inheritance And Termination 416
22.7 Specify A Local Address 417
22.8 Connecting Sockets To Destination Addresses 418
22.9 Sending Data Through A Socket 419
22.10 Receiving Data Through A Socket 421
22.14 How A Server Accepts Connections 421
22.11 Obtaining Local And Remote Socket Addresses 422
22.12 Obtaining And Setting Socket Options 423
22.13 Spectfying A Queue Length For A Server 424
22.15 Servers That Handle Multiple Services 425
22.16 Obtaining And Setting Host Names 426
22.18 Socket Library Calls 427
22.17 Obtaining And Setting The Internal Host Domain 427
22.19 Network Byte Order Conversion Routines 428
22.20 IP Address Manipulation Routines 429
22.21 Accessing The Domain Name System 431
22.22 Obtaining Information About Hosts 432
22.23 Obtaining Information About Networks 433
22.24 Obtaining Information About Protocols 434
22.25 Obtaining Information About Network Services 434
22.26 An Example Client 435
22.27 An Example Server 437
22.28 Summary 440
Chapter 23 Bootstrap And Autoconfiguration (BOOTP, DHCP) 443
23.1 Introduction 443
23.2 The Need For An Alternative To RARP 444
23.3 Using IP To Determine An IP Address 444
23.4 The BOOTP Retransmission Policy 445
23.5 The BOOTP Message Format 446
23.6 The Two-Step Bootstrap Procedure 447
23.7 Vendor-Specific Field 448
23.8 The Need For Dynamic Configuration 448
23.9 Dynamic Host Configuration 450
23.10 Dynamic IP Address Assignment 450
23.11 Obtaining Multiple Addresses 451
23.12 Address Acquisition States 452
23.13 Early Lease Termination 452
23.14 Lease Renewal States 454
23.15 DHCP Message Format 455
23.16 DHCP Options And Message Type 456
23.17 Option Overload 457
23.18 DHCP And Domain Names 457
23.19 Summary 458
Chapter 24 The Domain Name System (DNS) 461
24.1 Introduction 461
24.2 Names For Machines 462
24.3 Flat Namespace 462
24.4 Hierarchical Names 463
24.5 Delegation Of Authority For Names 464
24.6 Subset Authority 464
24.7 Internet Domain Names 465
24.8 Official And Unofficial Internet Domain Names 466
24.9 Named Items And Syntax Of Names 468
24.10 Mapping Domain Names To Addresses 469
24.11 Domain Name Resolution 471
24.12 Efficient Translation 472
24.13 Caching The Key To Efficiency 473
24.14 Domain Server Message Format 474
24.15 Compressed Name Format 477
24.16 Abbreviation Of Domain Names 477
24.17 Inverse Mappings 478
24.18 Pointer Queries 479
24.19 Object Types And Resource Record Contents 479
24.20 Obtaining Authority For A Subdomain 480
24.21 Summary 481
25.2 Remote Interactive Computing 485
Chapter 25 Applications: Remote Login (TELNET, Riogin) 485
25.1 Introduction 485
25.3 TELNET Protocol 486
25.4 Accommodating Heterogeneity 488
25.5 Passing Commands That Control The Remote Side 490
25.6 Forcing The Server To Read A Control Function 492
25.7 TELNET Options 492
25.8 TELNET Option Negotiation 493
25.9 Rlogin (BSD UNIX) 494
25.10 Summary 495
Chapter 26 Applications: File Transfer And Access (FTP, TFTP, NFS) 497
26.1 Introduction 497
26.2 File Access And Transfer 497
26.3 On-line Shared Access 498
26.4 Sharing By File Transfer 499
26.5 FTP: The Major TCP/IP File Transfer Protocol 499
26.6 FTP Features 500
26.7 FTP Process Model 500
26.8 TCP Port Number Assignment 502
26.9 The User s View Of FTP 502
26.10 An Example Anonymous FTP Session 504
26.11 TFTP 505
26.12 NFS 507
26.13 NFS Implementation 507
26.14 Remote Procedure Call (RPC) 508
26.15 Summary 509
27.1 Introduction 511
27.2 Electronic Mail 511
Chapter 27 Applications: Electronic Mail (SMTP, POP, IMAP, MIME) 511
27.3 Mailbox Names And Aliases 513
27.4 Alias Expansion And Mail Forwarding 513
27.5 The Relationship Of Internetworking And Mail 514
27.6 TCP/IP Standards For Electronic Mail Service 516
27.7 Electronic Mail Addresses 516
27.9 Simple Mail Transfer Protocol (SMTP) 518
27.8 Pseudo Domain Addresses 518
27.10 Mail Retrieval And Mailbox Manipulation Protocols 521
27.11 The MIME Extension For Non-ASCII Data 522
27.12 MIME Multipart Messages 523
27.13 Summary 524
Chapter 28 Applications: World Wide Web (HTTP) 527
28.1 Introduction 527
28.2 Importance Of The Web 527
28.4 Uniform Resource Locators 528
28.3 Architectural Components 528
28.5 An Example Document 529
28.6 Hypertext Transfer Protocol 530
28.7 HTTP GET Request 530
28.8 Error Messages 531
28.9 Persistent Connections And Lengths 532
28.10 Data Length And Program Output 532
28.11 Length Encoding And Headers 533
28.12 Negotiation 534
28.13 Conditional Requests 535
28.14 Support For Proxy Servers 535
28.15 Caching 536
28.16 Summary 537
Chapter 29 Applications: Voice And Video Over IP (RTP) 539
29.1 Introduction 539
29.2 Audio Clips And Encoding Standards 539
29.3 Audio And Video Transmission And Reproduction 540
29.4 Jitter And Playback Delay 541
29.5 Real-Time Transport Protocol (RTP) 542
29.6 Streams, Mixing, And Multicasting 543
29.7 RTP Encapsulation 544
29.8 RTP Control Protocol (RTCP) 544
29.9 RTCP Operation 545
29.10 IP Telephony And Signaling 546
29.11 Resource Reservation And Quality Of Service 548
29.12 QoS Utilization And Capacity 549
29.13 RSVP 549
29.14 COPS 550
29.15 Summary 551
Chapter 30 Applications: Internet Management (SNMP) 553
30.1 Introduction 553
30.2 The Level Of Management Protocols 553
30.3 Architectural Model 554
30.4 Protocol Framework 556
30.5 Examples of MIB Variables 557
30.6 The Structure Of Management Information 558
30.8 Structure And Representation Of MIB Object Names 559
30.7 Formal Definitions Using ASN.1 559
30.9 Simple Network Management Protocol 564
30.10 SNMP Message Format 566
30.11 Example Encoded SNMP Message 569
30.12 New Features In SNMPv3 572
30.13 Summary 572
Chapter 31 Summary Of Protocol Dependencies 575
31.1 Introduction 575
31.2 Protocol Dependencies 575
31.3 The Hourglass Model 577
31.4 Application Program Access 578
31.5 Summary 579
Chapter 32 Internet Security And Firewall Design (IPsec) 581
32.1 Introduction 581
32.2 Protecting Resources 582
32.3 Information Policy 583
32.4 Internet Security 583
32.6 IPsec Authentication Header 584
32.5 IP Security (IPsec) 584
32.7 Security Association 585
32.8 IPsec Encapsulating Security Payload 586
32.9 Authentication And Mutable Header Fields 587
32.10 IPsec Tunneling 588
32.11 Required Security Algorithms 588
32.12 Secure Sockets 589
32.13 Firewalls And Internet Access 589
32.14 Multiple Connections And Weakest Links 589
32.15 Firewall Implementation 590
32.16 Packet-Level Filters 590
32.17 Security And Packet Filter Specification 591
32.18 The Consequence Of Restricted Access For Clients 592
32.19 Proxy Access Through A Firewall 592
32.20 The Details Of Firewall Architeetare 593
32.21 Stub Network 594
32.22 An Alternative Firewall Implementation 595
32.24 Summary 596
32.23 Monitoring And Logging 596
Chapter 33 The Future Of TCP/IP (IPv6) 599
33.1 Introduction 599
33.2 Why Change? 600
33.3 New Policies 600
33.4 Motivation For Changing IPv4 600
33.5 The Road To A New Version Of IP 601
33.7 Features Of IPv6 602
33.6 The Name Of The Next IP 602
33.8 General Form Of An IPv6 Datagram 603
33.9 IPv6 Base Header Format 603
33.10 IPv6 Extension Headers 605
33.11 Parsing An IPv6 Datagram 606
33.12 IPv6 Fragmentation And Reassembly 607
33.13 The Consequence Of End-To-End Fragmentation 607
33.14 IPv6 Source Routing 608
33.15 IPv6 Options 609
33.17 IPv6 Colon Hexadecimal Notation 610
33.16 Size Of The IPv6 Address Space 610
33.18 Three Basic IPv6 Address Types 612
33.19 The Duality Of Broadcast And Multicast 612
33.20 An Engineering Choice And Simulated Broadcast 613
33.21 Proposed IPv6 Address Space Assignment 613
33.22 Embedded IPv4 Addresses And Transition 614
33.23 Unspecified And Loopback Addresses 616
33.24 Unicast Address Hierarchy 616
33.25 Aggregatable Global Unicast Address Structure 617
33.26 Interface Identifiers 618
33.27 Additional Hierarchy 619
33.28 Local Addresses 619
33.29 Autoconfiguration And Renumbering 620
33.30 Summary 620
Appendix 1 A Guide to RFCs 623
Appendix 2 Glossary Of Internetworking Terms And Abbreviations 673
Bibliography 721
Index 729
- 《联吡啶基钌光敏染料的结构与性能的理论研究》李明霞 2019
- 《异质性条件下技术创新最优市场结构研究 以中国高技术产业为例》千慧雄 2019
- 《卓有成效的管理者 中英文双语版》(美)彼得·德鲁克许是祥译;那国毅审校 2019
- 《AutoCAD 2018自学视频教程 标准版 中文版》CAD/CAM/CAE技术联盟 2019
- 《跟孩子一起看图学英文》张紫颖著 2019
- 《柏里曼人体结构绘画教学描摹本 第2册 头手足结构》杨建飞主编 2019
- 《AutoCAD机械设计实例精解 2019中文版》北京兆迪科技有限公司编著 2019
- 《认知语言学视野的抽象方位结构研究》曹爽著 2019
- 《国内外辐射环境监测体系对比研究》上海市辐射环境监督站 2019
- 《复分析 英文版》(中国)李娜,马立新 2019
- 《指向核心素养 北京十一学校名师教学设计 英语 七年级 上 配人教版》周志英总主编 2019
- 《办好人民满意的教育 全国教育满意度调查报告》(中国)中国教育科学研究院 2019
- 《北京生态环境保护》《北京环境保护丛书》编委会编著 2018
- 《人民院士》吴娜著 2019
- 《指向核心素养 北京十一学校名师教学设计 英语 九年级 上 配人教版》周志英总主编 2019
- 《中国人民的心》杨朔著;夕琳编 2019
- 《高等院校旅游专业系列教材 旅游企业岗位培训系列教材 新编北京导游英语》杨昆,鄢莉,谭明华 2019
- 《中华人民共和国成立70周年优秀文学作品精选 短篇小说卷 上 全2册》贺邵俊主编 2019
- 《指向核心素养 北京十一学校名师教学设计 数学 九年级 上 配人教版》周志英总主编 2019
- 《中华人民共和国成立70周年优秀文学作品精选 中篇小说卷 下 全3册》洪治纲主编 2019