图书介绍
计算机网络 英文PDF|Epub|txt|kindle电子书版本网盘下载
![计算机网络 英文](https://www.shukui.net/cover/19/31426613.jpg)
- (美)LarryL.Peterson,BruceS.Davie著 著
- 出版社: 北京:机械工业出版社
- ISBN:7111075269
- 出版时间:2000
- 标注页数:748页
- 文件大小:38MB
- 文件页数:768页
- 主题词:
PDF下载
下载说明
计算机网络 英文PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1 Foundation2
Problem:Building a Network2
1.1 Requlrements4
1.1.1 Connectivity4
1.1.2 Cost-Effective Resource Sharing8
1.1.3 Support for Common Services12
1.1.4 Performance20
1.2 Network Architscture29
1.2.1 Layering and Protocols30
1.2.2 OSI Architecture36
1.2.3 Internet Architecture38
1.3 Implementing Network Software41
1.3.1 Application Programming Interface(Sockets)42
1.3.2 Example Application45
1.3.3 Protocol Implementation Issues48
1.4 Summary56
Open Issue:Ubiquitous Networking57
Further Reading58
Exercises60
2 Direct Link Networks68
Problem:Physically Connecting Hosts68
2.1 Hardware Bullding Blocks70
2.1.1 Nodes70
2.1.2 Links71
2.2 Encoding(NRZ,NRZI,Manchestor,4B/5B)80
2.3 Framing84
2.3.1 Byte-Oriented Protocols(BISYNC,PPP,DDCMP)84
2.3.2 Bit-Oriented Protocols(HDLC)87
2.3.3 Clock-Based Framing(SONET)89
2.4 Error Detection92
2.4.1 Two-Dimensional Parity94
2.4.2 Internet Checksum Algorlthm94
2.4.3 Cyclic Redundancy Check96
2.5 Reliable Transmission101
2.5.1 Stop-and-Wait103
2.5.2 Sliding Window105
2.5.3 Concurrent Logical Channels115
2.6 Ethernet(802.3)116
2.6.1 Physical Properties117
2.6.2 Access Protocol119
2.6.3 Experience with Ethernet124
2.7 Token Rigns(802.5.FDDI)125
2.7.1 Physical Properties126
2.7.2 Token Ring Media Access Control127
2.7.3 Token Ring Maintenance129
2.7.4 Frame Format131
2.7.5 FDDI132
2.8 Wireless(802.11)136
2.8.1 Physical Properties136
2.8.2 Collision Avoidance137
2.8.3 Distribution System139
2.8.4 Frame Format141
2.9 Network Adaptors142
2.9.1 Components142
2.9.2 View from the Host143
2.9.3 Device Drivers148
2.9.4 Memory Bottleneck151
2.10 Summary153
Open Issue:Does It Belong in Hardware?154
Further Reading155
Exercises156
3 Packet Switching170
Problem:Not All Networks Are Directly Connectad170
3.1 Switching and Forwarding172
3.1.1 Datagrams174
3.1.2 Virtual Circuit Switching176
3.1.3 Source Routing183
3.1.4 Impiementation and Performance185
3.2 Bridges and LAN Switches186
3.2.1 Learning Bridges187
3.2.2 Spanning Tree Algorithm190
3.2.3 Broadcast and Multicast195
3.2.4 Limitations of Bridges196
3.3 Cell Switching(ATM)198
3.3.1 Cells198
3.3.2 Segmentation and Reassembly203
3.3.3 Virtual Paths209
3.3.4 Physical Layers for ATM210
3.3.5 ATM in the LAN211
3.4 Switching Hardware215
3.4.1 Design Goals216
3.4.2 Ports and Fabrics219
3.4.3 Crossbar Switches221
3.4.4 Shared-Media Switches226
3.4.5 Self-Routing Fabrics227
3.5 Summary232
Open Issue:The Future of ATM233
Further Reading234
Exercises235
4 Internetworking246
Problem:There Is More Than One Network246
4.1 Simple Internetworking(IP)248
4.1.1 What Is an Internetwork?248
4.1.2 Service Model250
4.1.3 Global Addresses262
4.1.4 Datagram Forwarding in IP264
4.1.5 Address Translation(ARP)268
4.1.6 Host Configuration(DHCP)273
4.1.7 Error Reporting(ICMP)276
4.1.8 Virtual Networks and Tunnels277
4.2 Routing280
4.2.1 Network as a Graph282
4.2.2 Distance Vector(RIP)284
4.2.3 Link State(OSPF)292
4.2.4 Metrics301
4.2.5 Routing for Mobile Hosts304
4.3 Global Internet309
4.3.1 Subnetting311
4.3.2 Classless Routing(CIDR)316
4.3.3 Interdomain Routing(BGP)319
4.3.4 Routing Aress326
4.3.5 IP version 6(IPv6)328
4.4 Multicast340
4.4.1 Link-State Multicast341
4.4.2 Dlatance-Vector Multicast344
4.4.3 Protocol Independent Multicast(PIM)348
4.5 Summary350
Open Issue:IP,ATM,and MPLS351
Further Reading352
Exercises354
5 End-to-End Protocols368
Problem:Getting Processes to Communicate368
5.1 Simple Demultiplexer(UDP)370
5.2 Reliable Byte Stream(TCP)371
5.2.1 End-to-End Issues373
5.2.2 Segment Format375
5.2.3 Connection Establishment and Termination378
5.2.4 Sliding Window Revisited383
5.2.5 Adaptive Retransmission389
5.2.6 Record Boundaries393
5.2.7 TCP Extensions394
5.2.8 Alternative Design Choices395
5.3 Remote Procedure Call397
5.3.1 Bulk Transfer(BLAST)400
5.3.2 Request/Reply(CHAN)407
5.3.3 Dispatcher(SELECT)417
5.3.4 Putting It All Together(SunRPC,DCE)420
5.4 Performance426
5.4.1 Experimental Method427
5.4.2 Latency428
5.4.3 Throughput430
5.5 Summary430
Open Issue:Application-Specific Protocois431
Further Reading432
Exerceses433
Problem:Allocating Resources445
6 Congestion Control and Resource Allocation445
6.1 Issues In Resource Allocation448
6.1.1 Network Model448
6.1.2 Taxonomy452
6.1.3 Evaluation Criteris454
6.2 Queuing Disciplines457
6.2.1 FIFO458
6.2.2 Fair Queuing459
6.3 TCP Congestion Control464
6.3.1 Additive Increase/Multiplicative Decrease465
6.3.2 Slow Start468
6.3.3 Fast Retransmit and Fast Recovery472
6.4.1 DECbit475
6.4 Congestion-Avoidance Mechanisms475
6.4.2 Random Early Detection(RED)476
6.4.3 Source-Based Congestion Avoldance482
6.5 Quality of Service488
6.5.1 Application Requirements489
6.5.2 Integrated Services(RSVP)494
6.5.3 Differentiated Services505
6.5.4 ATM Quality of Service509
6.6 Summary513
Open Issue:Inside versus Outslde the Network513
Further Reading514
Exercises516
7 End-to-End Data528
Problem:What Do We Do with the Data?528
7.1 Presentation Formatting530
7.1.1 Taxonomy531
7.1.2 Examples(XDR,ASN.1,NDR)535
7.2 Data Compression539
7.2.1 Lossless Compression Algorithms541
7.2.2 Image Compression(JPEG)543
7.2.3 Video Compression(MPEG)548
7.2.4 Transmitting MPEG over a Network553
7.2.5 Audio Compression(MP3)557
7.3 Summary559
Open Issue:Computer Networks Meet Conaumer Electronics559
Further Reading560
Exercises561
Problem:Securing the Data568
8 Network Security568
8.1 Cryptographic Algorithma570
8.1.1 Requirements572
8.1.2 The Data Encryption Standard(DES)573
8.1.3 RSA578
8.1.4 Message Digest 5(MD5)581
8.1.5 Implementation and Performance584
8.2 Security Mechanisms584
8.2.1 Authentication Protocols585
8.2.2 Message Integrity Protocols588
8.2.3 Public Key Distribution(X.509)591
8.3 Example Systems594
8.3.1 Privacy Enhanced Mail(PEM)594
8.3.2 Pretty Good Privacy(PGP)599
8.3.3 Transport Layer Security(TLS,SSL,HTTPS)601
8.3.4 IP Security(IPSEC)605
8.4 Firewalls608
8.4.1 Filter-Based Firewalls609
8.4.2 Proxy-Based Firewalls610
8.4.3 Limitations612
8.5 Summary613
Open Issue:Denial-of-Service Attacks614
Further Reading615
Exercises615
9 Applications622
Problem:Applications Need Their Own Protocols622
9.1 Name Service(DNS)624
9.1.1 Domain Hierarchy625
9.1.2 Name Servers626
9.1.3 Name Resolution630
9.2 Traditional Applications633
9.2.1 Electronic Mall(SMTP,MIME)634
9.2.2 World Wide Web(HTTP)640
9.2.3 Network Management(SNMP)646
9.3 Multimedia Applications649
9.3.1 Requirements651
9.3.2 Real-time Transport Protocol(RTP)653
9.3.3 Session Control and Call Control(H.323)660
9.4 Summary662
Open Issue:Programming the Network663
Further Reading664
Exercises665
Glossary673
References699
Index717