图书介绍

计算机网络 英文PDF|Epub|txt|kindle电子书版本网盘下载

计算机网络 英文
  • (美)LarryL.Peterson,BruceS.Davie著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111075269
  • 出版时间:2000
  • 标注页数:748页
  • 文件大小:38MB
  • 文件页数:768页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机网络 英文PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 Foundation2

Problem:Building a Network2

1.1 Requlrements4

1.1.1 Connectivity4

1.1.2 Cost-Effective Resource Sharing8

1.1.3 Support for Common Services12

1.1.4 Performance20

1.2 Network Architscture29

1.2.1 Layering and Protocols30

1.2.2 OSI Architecture36

1.2.3 Internet Architecture38

1.3 Implementing Network Software41

1.3.1 Application Programming Interface(Sockets)42

1.3.2 Example Application45

1.3.3 Protocol Implementation Issues48

1.4 Summary56

Open Issue:Ubiquitous Networking57

Further Reading58

Exercises60

2 Direct Link Networks68

Problem:Physically Connecting Hosts68

2.1 Hardware Bullding Blocks70

2.1.1 Nodes70

2.1.2 Links71

2.2 Encoding(NRZ,NRZI,Manchestor,4B/5B)80

2.3 Framing84

2.3.1 Byte-Oriented Protocols(BISYNC,PPP,DDCMP)84

2.3.2 Bit-Oriented Protocols(HDLC)87

2.3.3 Clock-Based Framing(SONET)89

2.4 Error Detection92

2.4.1 Two-Dimensional Parity94

2.4.2 Internet Checksum Algorlthm94

2.4.3 Cyclic Redundancy Check96

2.5 Reliable Transmission101

2.5.1 Stop-and-Wait103

2.5.2 Sliding Window105

2.5.3 Concurrent Logical Channels115

2.6 Ethernet(802.3)116

2.6.1 Physical Properties117

2.6.2 Access Protocol119

2.6.3 Experience with Ethernet124

2.7 Token Rigns(802.5.FDDI)125

2.7.1 Physical Properties126

2.7.2 Token Ring Media Access Control127

2.7.3 Token Ring Maintenance129

2.7.4 Frame Format131

2.7.5 FDDI132

2.8 Wireless(802.11)136

2.8.1 Physical Properties136

2.8.2 Collision Avoidance137

2.8.3 Distribution System139

2.8.4 Frame Format141

2.9 Network Adaptors142

2.9.1 Components142

2.9.2 View from the Host143

2.9.3 Device Drivers148

2.9.4 Memory Bottleneck151

2.10 Summary153

Open Issue:Does It Belong in Hardware?154

Further Reading155

Exercises156

3 Packet Switching170

Problem:Not All Networks Are Directly Connectad170

3.1 Switching and Forwarding172

3.1.1 Datagrams174

3.1.2 Virtual Circuit Switching176

3.1.3 Source Routing183

3.1.4 Impiementation and Performance185

3.2 Bridges and LAN Switches186

3.2.1 Learning Bridges187

3.2.2 Spanning Tree Algorithm190

3.2.3 Broadcast and Multicast195

3.2.4 Limitations of Bridges196

3.3 Cell Switching(ATM)198

3.3.1 Cells198

3.3.2 Segmentation and Reassembly203

3.3.3 Virtual Paths209

3.3.4 Physical Layers for ATM210

3.3.5 ATM in the LAN211

3.4 Switching Hardware215

3.4.1 Design Goals216

3.4.2 Ports and Fabrics219

3.4.3 Crossbar Switches221

3.4.4 Shared-Media Switches226

3.4.5 Self-Routing Fabrics227

3.5 Summary232

Open Issue:The Future of ATM233

Further Reading234

Exercises235

4 Internetworking246

Problem:There Is More Than One Network246

4.1 Simple Internetworking(IP)248

4.1.1 What Is an Internetwork?248

4.1.2 Service Model250

4.1.3 Global Addresses262

4.1.4 Datagram Forwarding in IP264

4.1.5 Address Translation(ARP)268

4.1.6 Host Configuration(DHCP)273

4.1.7 Error Reporting(ICMP)276

4.1.8 Virtual Networks and Tunnels277

4.2 Routing280

4.2.1 Network as a Graph282

4.2.2 Distance Vector(RIP)284

4.2.3 Link State(OSPF)292

4.2.4 Metrics301

4.2.5 Routing for Mobile Hosts304

4.3 Global Internet309

4.3.1 Subnetting311

4.3.2 Classless Routing(CIDR)316

4.3.3 Interdomain Routing(BGP)319

4.3.4 Routing Aress326

4.3.5 IP version 6(IPv6)328

4.4 Multicast340

4.4.1 Link-State Multicast341

4.4.2 Dlatance-Vector Multicast344

4.4.3 Protocol Independent Multicast(PIM)348

4.5 Summary350

Open Issue:IP,ATM,and MPLS351

Further Reading352

Exercises354

5 End-to-End Protocols368

Problem:Getting Processes to Communicate368

5.1 Simple Demultiplexer(UDP)370

5.2 Reliable Byte Stream(TCP)371

5.2.1 End-to-End Issues373

5.2.2 Segment Format375

5.2.3 Connection Establishment and Termination378

5.2.4 Sliding Window Revisited383

5.2.5 Adaptive Retransmission389

5.2.6 Record Boundaries393

5.2.7 TCP Extensions394

5.2.8 Alternative Design Choices395

5.3 Remote Procedure Call397

5.3.1 Bulk Transfer(BLAST)400

5.3.2 Request/Reply(CHAN)407

5.3.3 Dispatcher(SELECT)417

5.3.4 Putting It All Together(SunRPC,DCE)420

5.4 Performance426

5.4.1 Experimental Method427

5.4.2 Latency428

5.4.3 Throughput430

5.5 Summary430

Open Issue:Application-Specific Protocois431

Further Reading432

Exerceses433

Problem:Allocating Resources445

6 Congestion Control and Resource Allocation445

6.1 Issues In Resource Allocation448

6.1.1 Network Model448

6.1.2 Taxonomy452

6.1.3 Evaluation Criteris454

6.2 Queuing Disciplines457

6.2.1 FIFO458

6.2.2 Fair Queuing459

6.3 TCP Congestion Control464

6.3.1 Additive Increase/Multiplicative Decrease465

6.3.2 Slow Start468

6.3.3 Fast Retransmit and Fast Recovery472

6.4.1 DECbit475

6.4 Congestion-Avoidance Mechanisms475

6.4.2 Random Early Detection(RED)476

6.4.3 Source-Based Congestion Avoldance482

6.5 Quality of Service488

6.5.1 Application Requirements489

6.5.2 Integrated Services(RSVP)494

6.5.3 Differentiated Services505

6.5.4 ATM Quality of Service509

6.6 Summary513

Open Issue:Inside versus Outslde the Network513

Further Reading514

Exercises516

7 End-to-End Data528

Problem:What Do We Do with the Data?528

7.1 Presentation Formatting530

7.1.1 Taxonomy531

7.1.2 Examples(XDR,ASN.1,NDR)535

7.2 Data Compression539

7.2.1 Lossless Compression Algorithms541

7.2.2 Image Compression(JPEG)543

7.2.3 Video Compression(MPEG)548

7.2.4 Transmitting MPEG over a Network553

7.2.5 Audio Compression(MP3)557

7.3 Summary559

Open Issue:Computer Networks Meet Conaumer Electronics559

Further Reading560

Exercises561

Problem:Securing the Data568

8 Network Security568

8.1 Cryptographic Algorithma570

8.1.1 Requirements572

8.1.2 The Data Encryption Standard(DES)573

8.1.3 RSA578

8.1.4 Message Digest 5(MD5)581

8.1.5 Implementation and Performance584

8.2 Security Mechanisms584

8.2.1 Authentication Protocols585

8.2.2 Message Integrity Protocols588

8.2.3 Public Key Distribution(X.509)591

8.3 Example Systems594

8.3.1 Privacy Enhanced Mail(PEM)594

8.3.2 Pretty Good Privacy(PGP)599

8.3.3 Transport Layer Security(TLS,SSL,HTTPS)601

8.3.4 IP Security(IPSEC)605

8.4 Firewalls608

8.4.1 Filter-Based Firewalls609

8.4.2 Proxy-Based Firewalls610

8.4.3 Limitations612

8.5 Summary613

Open Issue:Denial-of-Service Attacks614

Further Reading615

Exercises615

9 Applications622

Problem:Applications Need Their Own Protocols622

9.1 Name Service(DNS)624

9.1.1 Domain Hierarchy625

9.1.2 Name Servers626

9.1.3 Name Resolution630

9.2 Traditional Applications633

9.2.1 Electronic Mall(SMTP,MIME)634

9.2.2 World Wide Web(HTTP)640

9.2.3 Network Management(SNMP)646

9.3 Multimedia Applications649

9.3.1 Requirements651

9.3.2 Real-time Transport Protocol(RTP)653

9.3.3 Session Control and Call Control(H.323)660

9.4 Summary662

Open Issue:Programming the Network663

Further Reading664

Exercises665

Glossary673

References699

Index717

热门推荐