图书介绍
TCP/IP网络互连技术 卷1 原理,协议和体系结构 英文版·第3版PDF|Epub|txt|kindle电子书版本网盘下载
![TCP/IP网络互连技术 卷1 原理,协议和体系结构 英文版·第3版](https://www.shukui.net/cover/43/31109708.jpg)
- (美)(D.E.科默)Douglas E.Comer著 著
- 出版社: 北京:清华大学出版社
- ISBN:7302029466
- 出版时间:1998
- 标注页数:613页
- 文件大小:20MB
- 文件页数:637页
- 主题词:
PDF下载
下载说明
TCP/IP网络互连技术 卷1 原理,协议和体系结构 英文版·第3版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction And Overview1
1.1 The Motivation For Internetworking1
1.2 The TCP/IP Internet2
1.3 Internet Services3
1.4 History And Scope Of The Internet6
1.5 The Internet Architecture Board8
1.6 The IAB Reorganization9
1.7 The Internet Society11
1.8 Internet Request For Comments11
1.9 Internet Protocols And Standardization12
1.10 Future Growth And Technology12
1.11 Organization Of The Text13
1.12 Summary14
Chapter 2 Review Of Underlying Network Technologies17
2.1 Introduction17
2.2 Two Approaches To Network Communication18
2.3 Wide Area And Local Area Networks19
2.4 Ethernet Technology20
2.5 Fiber Distributed Data Interconnect(FDDI)32
2.6 Asynchronous Transfer Mode36
2.7 ARPANET Technology37
2.8 National Science Foundation Networking39
2.9 ANSNET44
2.10 A Planned Wide Area Backbone44
2.11 Other Technologies Over Which TCP/IP Has Been Used44
2.12 Summary And Conclusion47
Chapter 3 Internetworking Concept And Architectural Model49
3.1 Introduction49
3.2 Application-Level Interconnection49
3.3 Network-Level Interconnection50
3.4 Properties Of The Internet51
3.5 Internet Architecture52
3.6 Interconnection Through IP Routers52
3.7 The User s View54
3.8 All Networks Are Equal54
3.9 The Unanswered Questions55
3.10 Summary56
Chapter 4 Internet Addresses59
4.1 Introduction59
4.2 Universal Identifiers59
4.3 Three Primary Classes Of IP Addresses60
4.4 Addresses Specify Network Connections61
4.5 Network And Broadcast Addresses61
4.6 Limited Broadcast62
4.7 Interpreting Zero To Mean This62
4.8 Weaknesses In Internet Addressing63
4.9 Dotted Decimal Notation65
4.10 Loopback Address65
4.11 Summary Of Special Address Conventions66
4.12 Internet Addressing Authority66
4.13 An Example67
4.14 Network Byte Order69
4.15 Summary70
Chapter 5 Mapping Internet Addresses To Physical Addresses(ARP)73
5.1 Introduction73
5.2 The Address Resolution Problem73
5.3 Two Types Of Physical Addresses74
5.4 Resolution Through Direct Mapping74
5.5 Resolution Through Dynamic Binding75
5.6 The Address Resolution Cache76
5.7 ARP Refinements77
5.8 Relationship Of ARP To Other Protocols77
5.9 ARP Implementation77
5.10 ARP Encapsulation And Identification79
5.11 ARP Protocol Format79
5.12 Summary81
Chapter 6 Determining An Internet Address At Startup(RARP)83
6.1 Introduction83
6.2 Reverse Address Resolution Protocol(RARP)84
6.3 Timing RARP Transactions86
6.4 Primary And Backup RARP Servers86
6.5 Summary87
Chapter 7 Internet Protocol:Connectionless Datagram Delivery89
7.1 Introduction89
7.2 A Virtual Network89
7.3 Internet Architecture And Philosophy90
7.4 The Concept Of Unreliable Delivery90
7.5 Connectionless Delivery System91
7.6 Purpose Of The Internet Protocol91
7.7 The Internet Datagram91
7.8 Internet Datagram Options100
7.9 Summary106
Chapter 8 Internet Protocol:Routing IP Datagrams109
8.1 Introduction109
8.2 Routing In An Internet109
8.3 Direct And Indirect Delivery111
8.4 Table-Driven IP Routing113
8.5 Next-Hop Routing113
8.6 Default Routes115
8.7 Host-Specific Routes115
8.8 The IP Routing Algorithm116
8.9 Routing With IP Addresses116
8.10 Handling Incoming Datagrams118
8.11 Establishing Routing Tables119
8.12 Summary119
Chapter 9 Internet Protocol:Error And Control Messages(ICMP)123
9.1 Introduction123
9.2 The Internet Control Message Protocol123
9.3 Error Reporting vs.Error Correction124
9.4 ICMP Message Delivery125
9.5 ICMP Message Format126
9.6 Testing Destination Reachability And Status(Ping)127
9.7 Echo Request And Reply Message Format128
9.8 Reports Of Unreachable Destinations128
9.9 Congestion And Datagram Flow Control130
9.10 Source Quench Format130
9.11 Route Change Requests From Routers131
9.12 Detecting Circular Or Excessively Long Routes133
9.13 Reporting Other Problems134
9.14 Clock Synchronization And Transit Time Estimation134
9.15 Information Request And Reply Messages136
9.16 Obtaining A Subnet Mask136
9.17 Summary137
Chapter 10 Subnet And Supernet Address Extensions139
10.1 Introduction139
10.2 Review Of Relevant Facts139
10.3 Minimizing Network Numbers140
10.4 Transparent Routers141
10.5 Proxy ARP142
10.6 Subnet Addressing143
10.7 Flexibility In Subnet Address Assignment146
10.8 Implementation Of Subnets With Masks147
10.9 Subnet Mask Representation148
10.10 Routing In The Presence Of Subnets149
10.11 The Subnet Routing Algorithm150
10.12 A Unified Routing Algorithm151
10.13 Maintenance Of Subnet Masks152
10.14 Broadcasting To Subnets152
10.15 Supernet Addressing153
10.16 The Effect Of Supernetting On Routing154
10.17 Summary155
Chapter 11 Protocol Layering159
11.1 Introduction159
11.2 The Need For Multiple Protocols159
11.3 The Conceptual Layers Of Protocol Software160
11.4 Functionality Of The Layers163
11.5 X.25 And Its Relation To The ISO Model164
11.6 Differences Between X.25 And Internet Layering167
11.7 The Protocol Layering Principle169
11.8 Layering In The Presence Of Network Substructure171
11.9 Two Important Boundaries In The TCP/IP Model173
11.10 The Disadvantage Of Layering174
11.11 The Basic Idea Behind Multiplexing And Demultiplexing174
11.12 Summary176
Chapter 12 User Datagram Protocol(UDP)179
12.1 Introduction179
12.2 Identifying The Ultimate Destination179
12.3 The User Datagram Protocol180
12.4 Format Of UDP Messages181
12.5 UDP Pseudo-Header182
12.6 UDP Encapsulation And Protocol Layering183
12.7 Layering And The UDP Checksum Computation185
12.8 UDP Multiplexing,Demultiplexing,And Ports185
12.9 Reserved And Available UDP Port Numbers186
12.10 Summary188
Chapter 13 Reliable Stream Transport Service(TCP)191
13.1 Introduction191
13.2 The Need For Stream Delivery191
13.3 Properties Of The Reliable Delivery Service192
13.4 Providing Reliability193
13.5 The Idea Behind Sliding Windows195
13.6 The Transmission Control Protocol198
13.7 Ports,Connections,And Endpoints199
13.8 Passive And Active Opens201
13.9 Segments,Streams,And Sequence Numbers201
13.10 Variable Window Size And Flow Control202
13.11 TCP Segment Format203
13.12 Out Of Band Data205
13.13 Maximum Segment Size Option206
13.14 TCP Checksum Computation207
13.15 Acknowledgements And Retransmission208
13.16 Timeout And Retransmission209
13.17 Accurate Measurement Of Round Trip Samples211
13.18 Karn s Algorithm And Timer Backoff212
13.19 Responding To High Variance In Delay213
13.20 Response To Congestion214
13.21 Establishing A TCP Connection216
13.22 Initial Sequence Numbers217
13.23 Closing a TCP Connection217
13.24 TCP Connection Reset219
13.25 TCP State Machine219
13.26 Forcing Data Delivery221
13.27 Reserved TCP Port Numbers221
13.28 TCP Performance221
13.29 Silly Window Syndrome And Small Packets223
13.30 Avoiding Silly Window Syndrome224
13.31 Summary227
Chapter 14 Routing:Cores,Peers,And Algorithms(GGP)231
14.1 Introduction231
14.2 The Origin Of Routing Tables232
14.3 Routing With Partial Information233
14.4 Original Internet Architecture And Cores234
14.5 Core Routers235
14.6 Beyond The Core Architecture To Peer Backbones238
14.7 Automatic Route Propagation240
14.8 Vector Distance(Bellman-Ford)Routing240
14.9 Gateway-To-Gateway Protocol(GGP)242
14.10 GGP Message Formats243
14.11 Link-State(SPF)Routing245
14.12 SPF Protocols246
14.13 Summary246
Chapter 15 Routing:Autonomous Systems(EGP)249
15.1 Introduction249
15.2 Adding Complexity To The Architectural Model249
15.3 A Fundamental Idea:Extra Hops250
15.4 Autonomous System Concept252
15.5 Exterior Gateway Protocol(EGP)254
15.6 EGP Message Header255
15.7 EGP Neighbor Acquisition Messages256
15.8 EGP Neighbor Reachability Messages257
15.9 EGP Poll Request Messages258
15.10 EGP Routing Update Messages259
15.11 Measuring From The Receiver s Perspective261
15.12 The Key Restriction Of EGP262
15.13 Technical Problems264
15.14 Decentralization Of Internet Architecture264
15.15 Beyond Autonomous Systems264
15.16 Summary265
Chapter 16 Routing:In An Autonomous System(RIP,OSPF,HELLO)267
16.1 Introduction267
16.2 Static Vs.Dynamic Interior Routes267
16.3 Routing Information Protocol(RIP)270
16.4 The Hello Protocol276
16.5 Combining RIP,Hello,And EGP278
16.6 The Open SPF Protocol(OSPF)279
16.7 Routing With Partial Information286
16.8 Summary286
Chapter 17 Internet Multicasting(IGMP)289
17.1 Introduction289
17.2 Hardware Broadcast289
17.3 Hardware Multicast290
17.4 IP Multicast291
17.5 IP Multicast Addresses291
17.6 Mapping IP Multicast To Ethernet Multicast292
17.7 Extending IP To Handle Multicasting293
17.8 Internet Group Management Protocol294
17.9 IGMP Implementation294
17.10 Group Membership State Transitions295
17.11 IGMP Message Format296
17.12 Multicast Address Assignment297
17.13 Propagating Routing Information297
17.14 The Mrouted Program298
17.15 Summary300
Chapter 18 TCP/IP Over ATM Networks303
18.1 Introduction303
18.2 ATM Hardware304
18.3 Large ATM Networks304
18.4 The Logical View Of An ATM Network305
18.5 The Two ATM Connection Paradigms306
18.6 Paths,Circuits,And Identifiers307
18.7 ATM Cell Transport308
18.8 ATM Adaptation Layers308
18.9 AAL5 Convergence,Segmentation,And Reassembly311
18.10 Datagram Encapsulation And IP MTU Size311
18.11 Packer Type And Multiplexing312
18.12 IP Address Binding In An ATM Network313
18.13 Logical IP Subnet Concept314
18.14 Connection Management315
18.15 Address Binding Within An LIS316
18.16 ATMARP Packet Format316
18.17 Using ATMARP Packets To Determine An Address318
18.18 Obtaining Entries For A Server Database320
18.19 Timing Out ATMARP Information In A Server320
18.20 Timing Out ATMARP Information In A Host Or Router320
18.21 Summary321
Chapter 19 Client-Server Model Of Interaction325
19.1 Introduction325
19.2 The Client-Server Model325
19.3 A Simple Example:UDP Echo Server326
19.4 Time And Date Service328
19.5 The Complexity Of Servers329
19.6 RARP Server330
19.7 Alternatives To The Client-Server Model331
19.8 Summary332
Chapter 20 The Socket Interface335
20.1 Introduction335
20.2 The UNIX I/O Paradigm And Network I/O336
20.3 Adding Network I/O to UNIX336
20.4 The Socket Abstraction337
20.5 Creating A Socket337
20.6 Socket Inheritance And Termination338
20.7 Specifying A Local Address339
20.8 Connecting Sockets To Destination Addresses340
20.9 Sending Data Through A Socket341
20.10 Receiving Data Through A Socket343
20.11 Obtaining Local And Remote Socket Addresses344
20.12 Obtaining And Setting Socket Options345
20.13 Specifying A Queue Length For A Server346
20.14 How A Server Accepts Connections346
20.15 Servers That Handle Multiple Services347
20.16 Obtaining And Setting Host Names348
20.17 Obtaining And Setting The Internal Host Domain349
20.18 BSD UNIX Network Library Calls349
20.19 Network Byte Order Conversion Routines350
20.20 IP Address Manipulation Routines351
20.21 Accessing The Domain Name System352
20.22 Obtaining Information About Hosts354
20.23 Obtaining Information About Networks355
20.24 Obtaining Information About Protocols355
20.25 Obtaining Information About Network Services356
20.26 An Example Client357
20.27 An Example Server359
20.28 Summary362
Chapter 21 Bootstrap And Autoconfiguration(BOOTP,DHCP)365
21.1 Introduction365
21.2 The Need For An Alternative To RARP366
21.3 Using IP To Determine An IP Address366
21.4 The BOOTP Retransmission Policy367
21.5 The BOOTP Message Format368
21.6 The Two-Step Bootstrap Procedure369
21.7 Vendor-Specific Field370
21.8 The Need For Dynamic Configuration370
21.9 Dynamic Host Configuration372
21.10 Dynamic IP Address Assignment372
21.11 Obtaining Multiple Addresses373
21.12 Address Acquisition States374
21.13 Early Lease Termination374
21.14 Lease Renewal States376
21.15 DHCP Message Format377
21.16 DHCP Options And Message Type378
21.17 Option Overload379
21.18 DHCP And Domain Names379
21.19 Summary380
Chapter 22 The Domain Name System(DNS)383
22.1 Introduction383
22.2 Names For Machines384
22.3 Flat Namespace384
22.4 Hierarchical Names385
22.5 Delegation Of Authority For Names386
22.6 Subset Authority386
22.7 TCP/IP Internet Domain Names387
22.8 Official And Unofficial Internet Domain Names388
22.9 Items Named And Syntax Of Names390
22.10 Mapping Domain Names To Addresses391
22.11 Domain Name Resolution393
22.12 Efficient Translation394
22.13 Caching:The Key To Efficiency395
22.14 Domain Server Message Format396
22.15 Compressed Name Format399
22.16 Abbreviation Of Domain Names399
22.17 Inverse Mappings400
22.18 Pointer Queries401
22.19 Object Types And Resource Record Contents401
22.20 Obtaining Authority For A Subdomain402
22.21 Summary403
Chapter 23 Applications:Remote Login(TELNET,Rlogin)407
23.1 Introduction407
23.2 Remote Interactive Computing407
23.3 TELNET Protocol408
23.4 Accommodating Heterogeneity410
23.5 Passing Commands That Control The Remote Side412
23.6 Forcing The Server To Read A Control Function414
23.7 TELNET Options414
23.8 TELNET Option Negotiation415
23.9 Rlogin(BSD UNIX)416
23.10 Summary417
Chapter 24 Applications:File Transfer And Access(FTP,TFTP,NFS)419
24.1 Introduction419
24.2 File Access And Transfer419
24.3 On-line Shared Access420
24.4 Sharing By File Transfer421
24.5 FTP:The Major TCP/IP File Transfer Protocol421
24.6 FTP Features422
24.7 FTP Process Model422
24.8 TCP Port Number Assignment424
24.9 The User s View Of FTP424
24.10 An Example Anonymous FTP Session426
24.11 TFTP427
24.12 NFS429
24.13 NFS Implementation429
24.14 Remote Procedure Call(RPC)430
24.15 Summary431
Chapter 25 Applications:Electronic Mail(822,SMTP,MIME)433
25.1 Introduction433
25.2 Electronic Mail433
25.3 Mailbox Names And Aliases435
25.4 Alias Expansion And Mail Forwarding435
25.5 The Relationship Of Internetworking And Mail436
25.6 TCP/IP Standards For Electronic Mail Service438
25.7 Electronic Mail Addresses438
25.8 Pseudo Domain Addresses440
25.9 Simple Mail Transfer Protocol(SMTP)440
25.10 The MIME Extension For Non-ASCII Data443
25.11 MIME Multipart Messages444
25.12 Summary445
Chapter 26 Applications:Internet Management(SNMP,SNMPv2)447
26.1 Introduction447
26.2 The Level Of Management Protocols447
26.3 Architectural Model448
26.4 Protocol Architecture450
26.5 Examples of MIB Variables451
26.6 The Structure Of Management Information452
26.7 Formal Definitions Using ASN.I453
26.8 Structure And Representation Of MIB Object Names453
26.9 Simple Network Management Protocol458
26.10 SNMP Message Format460
26.11 Example Encoded SNMP Message462
26.12 Summary463
Chapter 27 Summary Of Protocol Dependencies465
27.1 Introduction465
27.2 Protocol Dependencies465
27.3 Application Program Access467
27.4 Summary468
Chapter 28 Internet Security And Firewall Design471
28.1 Introduction471
28.2 Protecting Resources472
28.3 The Need For An Information Policy472
28.4 Communication,Cooperation,And Mutual Mistrust474
28.5 Mechanisms For Internet Security475
28.6 Firewalls And Internet Access476
28.7 Multiple Connections And Weakest Links477
28.8 Firewall Implementation And High-Speed Hardware478
28.9 Packet-Level Filters479
28.10 Security And Packet Filter Specification480
28.11 The Consequence Of Restricted Access For Clients481
28.12 Accessing Services Through A Firewall481
28.13 The Details Of Firewall Architecture483
28.14 Stub Network484
28.15 An Alternative Firewall Implementation484
28.16 Monitoring And Logging485
28.17 Summary486
Chapter 29 The Future Of TCP/IP(IPng,IPv6)489
29.1 Introduction489
29.2 Why Change TCP/IP And The Internet?490
29.3 Motivation For Changing IPv4491
29.4 The Road To A New Version Of IP492
29.5 The Name Of The Next IP492
29.6 Features Of IPv6493
29.7 General Form Of An IPv6 Datagram494
29.8 IPv6 Base Header Format494
29.9 IPv6 Extension Headers496
29.10 Parsing An IPv6 Datagram497
29.11 IPv6 Fragmentation And Reassembly498
29.12 The Consequence Of End-To-End Fragmentation498
29.13 IPv6 Source Routing500
29.14 IPv6 Options500
29.15 Size Of The IPv6 Address Space502
29.16 IPv6 Colon Hexadecimal Notation502
29.17 Three Basic IPv6 Address Types503
29.18 The Duality Of Broadcast And Multicast504
29.19 An Engineering Choice And Simulated Broadcast504
29.20 Proposed IPv6 Address Space Assignment504
29.21 Ipv6 Address Encoding And Transition506
29.22 Providers,Subscribers,And Address Hierarchy506
29.23 Additional Hierarchy507
29.24 Summary508
Appendix 1 A Guide To RFCs511
Appendix 2 Glossary Of Internetworking Terms And Abbreviations557
Bibliography591
Index599