图书介绍
计算机网络 第4版PDF|Epub|txt|kindle电子书版本网盘下载
- 特南鲍姆(Tanenbaum,A.S.)著 著
- 出版社: 清华大学出版社
- ISBN:7302078157
- 出版时间:2004
- 标注页数:912页
- 文件大小:112MB
- 文件页数:40204176页
- 主题词:计算机网络-高等学校-教材-英文
PDF下载
下载说明
计算机网络 第4版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1 INTRODUCTION1
1.1 USES OF COMPUTER NETWORKS3
1.1.1 Business Applications3
1.1.2 Home Applications6
1.1.3 Mobile Users9
1.1.4 Social Issues12
1.2 NETWORK HARDWARE14
1.2.1 Local Area Networks16
1.2.2 Metropolitan Area Networks18
1.2.3 Wide Area Networks19
1.2.4 Wireless Networks21
1.2.5 Home Networks23
1.2.6Internetworks25
1.3 NETWORK SOFTWARE26
1.3.1 Protocol Hierarchies26
1.3.2 Design Issues for the Layers30
1.3.3 Connection-Oriented and Connectionless Services32
1.3.4 Service Primitives34
1.3.5 The Relationship of Services to Protocols36
1.4 REFERENCE MODELS37
1.4.1 The OSI Reference Model37
1.4.2 The TCP/IP Reference Model41
1.4.3 A Comparison of the OSI and TCP/IP Reference Models44
1.4.4 A Critique of the OSI Model and Protocols46
1.4.5 A Critique of the TCP/IP Reference Model48
1.5 EXAMPLE NETWORKS49
1.5.1 The Internet50
1.5.2 Connection-Oriented Networks: X.25, Frame Relay, and ATM59
1.5.3 Ethernet65
1.5.4 Wireless LANs: 802.1168
1.6 NETWORK STANDARDIZATION71
1.6.1 Who’s Who in the Telecommunications World71
1.6.2 Who’s Who in the International Standards World74
1.6.3 Who’s Who in the Internet Standards World75
1.7 METRIC UNITS77
1.8 OUTLINE OF THE REST OF THE BOOK78
1.9 SUMMARY79
2 THE PHYSICAL LAYER85
2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION85
2.1.1 Fourier Analysis86
2.1.2 Bandwidth-Limited Signals86
2.1.3 The Maximum Data Rate of a Channel89
2.2 GUIDED TRANSMISSION MEDIA90
2.2.1 Magnetic Media90
2.2.2 Twisted Pair91
2.2.3 Coaxial Cable92
2.2.4 Fiber Optics93
2.3 WIRELESS TRANSMISSION100
2.3.1 The Electromagnetic Spectrum100
2.3.2 Radio Transmission103
2.3.3 Microwave Transmission104
2.3.4 Infrared and Millimeter Waves106
2.3.5 Lightwave Transmission107
2.4 COMMUNICATION SATELLITES109
2.4.1 Geostationary Satellites109
2.4.2 Medium-Earth Orbit Satellites113
2.4.3 Low-Earth Orbit Satellites114
2.4.4 Satellites versus Fiber117
2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK118
2.5.1 Structure of the Telephone System119
2.5.2 The Politics of Telephones122
2.5.3 The Local Loop: Modems, ADSL, and Wireless124
2.5.4 Trunks and Multiplexing137
2.5.5 Switching146
2.6 THE MOBILE TELEPHONE SYSTEM152
2.6.1 First-Generation Mobile Phones: Analog Voice153
2.6.2 Second-Generation Mobile Phones: Digital Voice157
2.6.3 Third-Generation Mobile Phones: Digital Voice and Data166
2.7 CABLE TELEVISION169
2.7.1 Community Antenna Television169
2.7.2 Internet over Cable170
2.7.3 Spectrum Allocation172
2.7.4 Cable Modems173
2.7.5 ADSL versus Cable175
2.8 SUMMARY177
3 THE DATA LINK LAYER183
3.1 DATA LINK LAYER DESIGN ISSUES184
3.1.1 Services Provided to the Network Layer184
3.1.2 Framing187
3.1.3 Error Control191
3.1.4 Flow Control192
3.2 ERROR DETECTION AND CORRECTION192
3.2.1 Error-Correcting Codes193
3.2.2 Error-Detecting Codes196
3.3 ELEMENTARY DATA LINK PROTOCOLS200
3.3.1 An Unrestricted Simplex Protocol204
3.3.2 A Simplex Stop-and-Wait Protocol206
3.3.3 A Simplex Protocol for a Noisy Channel208
3.4 SLIDING WINDOW PROTOCOLS211
3.4.1 A One-Bit Sliding Window Protocol214
3.4.2 A Protocol Using Go Back N216
3.4.3 A Protocol Using Selective Repeat223
3.5 PROTOCOL VERIFICATION229
3.5.1 Finite State Machine Models229
3.5.2 Petri Net Models232
3.6 EXAMPLE DATA LINK PROTOCOLS234
3.6.1 HDLC—High-Level Data Link Control234
3.6.2 The Data Link Layer in the Internet237
3.7 SUMMARY242
4 THE MEDIUM ACCESS CONTROL SUBLAYER247
4.1 THE CHANNEL ALLOCATION PROBLEM248
4.1.1 Static Channel Allocation in LANs and MANs248
4.1.2 Dynamic Channel Allocation in LANs and MANs249
4.2 MULTIPLE ACCESS PROTOCOLS251
4.2.1 ALOHA251
4.2.2 Carrier Sense Multiple Access Protocols255
4.2.3 Collision-Free Protocols259
4.2.4 Limited-Contention Protocols261
4.2.5 Wavelength Division Multiple Access Protocols265
4.2.6 Wireless LAN Protocols267
4.3 ETHERNET271
4.3.1 Ethernet Cabling271
4.3.2 Manchester Encoding274
4.3.3 The Ethernet MAC Sublayer Protocol275
4.3.4 The Binary Exponential Backoff Algorithm278
4.3.5 Ethernet Performance279
4.3.6 Switched Ethernet281
4.3.7 Fast Ethernet283
4.3.8 Gigabit Ethernet286
4.3.9 IEEE 802.2: Logical Link Control290
4.3.10 Retrospective on Ethernet291
4.4 WIRELESS LANS292
4.4.1 The 802.11 Protocol Stack292
4.4.2 The 802.11 Physical Layer293
4.4.3 The 802.11 MAC Sublayer Protocol295
4.4.4 The 802.11 Frame Structure299
4.4.5 Services301
4.5 BROADBAND WIRELESS302
4.5.1 Comparison of 802.11 with 802.16303
4.5.2 The 802.16 Protocol Stack305
4.5.3 The 802.16 Physical Layer306
4.5.4 The 802.16 MAC Sublayer Protocol307
4.5.5 The 802.16 Frame Structure309
4.6 BLUETOOTH310
4.6.1 Bluetooth Architecture311
4.6.2 Bluetooth Applications312
4.6.3 The Bluetooth Protocol Stack313
4.6.4 The Bluetooth Radio Layer315
4.6.5 The Bluetooth Baseband Layer315
4.6.6 The Bluetooth L2CAP Layer316
4.6.7 The Bluetooth Frame Structure316
4.7 DATA LINK LAYER SWITCHING318
4.7.1 Bridges from 802.x to 802.y320
4.7.2 Local Internetworking322
4.7.3 Spanning Tree Bridges324
4.7.4 Remote Bridges325
4.7.5 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways326
4.7.6 Virtual LANs329
4.8 SUMMARY337
5 THE NETWORK LAYER343
5.1 NETWORK LAYER DESIGN ISSUES343
5.1.1 Store-and-Forward Packet Switching344
5.1.2 Services Provided to the Transport Layer344
5.1.3 Implementation of Connectionless Service345
5.1.4 Implementation of Connection-Oriented Service347
5.1.5 Comparison of Virtual-Circuit and Datagram Subnets348
5.2 ROUTING ALGORITHMS350
5.2.1 The Optimality Principle352
5.2.2 Shortest Path Routing353
5.2.3 Flooding355
5.2.4 Distance Vector Routing357
5.2.5 Link State Routing360
5.2.6 Hierarchical Routing366
5.2.7 Broadcast Routing368
5.2.8 Multicast Routing370
5.2.9 Routing for Mobile Hosts372
5.2.10 Routing in Ad Hoc Networks373
5.2.11 Node Lookup in Peer-to-Peer Networks380
5.3 CONGESTION CONTROL ALGORITHMS384
5.3.1 General Principles of Congestion Control386
5.3.2 Congestion Prevention Policies388
5.3.3 Congestion Control in Virtual-Circuit Subnets389
5.3.4 Congestion Control in Datagram Subnets391
5.3.5 Load Shedding394
5.3.6 Jitter Control395
5.4 QUALITY OF SERVICE397
5.4.1 Requirements397
5.4.2 Techniques for Achieving Good Quality of Service398
5.4.3 Integrated Services409
5.4.4 Differentiated Services412
5.4.5 Label Switching and MPLS415
5.5INTERNETWORKING418
5.5.1 How Networks Differ419
5.5.2 How Networks Can Be Connected420
5.5.3 Concatenated Virtual Circuits422
5.5.4 Connectionless Internetworking423
5.5.5 Tunneling425
5.5.6 Internetwork Routing426
5.5.7 Fragmentation427
5.6 THE NETWORK LAYER IN THE INTERNET431
5.6.1 The IP Protocol433
5.6.2 IP Addresses436
5.6.3 Internet Control Protocols449
5.6.4 OSPF—The Interior Gateway Routing Protocol454
5.6.5 BGP—The Exterior Gateway Routing Protocol459
5.6.6 Internet Multicasting461
5.6.7 Mobile IP462
5.6.8IPv6464
5.7 SUMMARY473
6 THE TRANSPORT LAYER481
6.1 THE TRANSPORT SERVICE481
6.1.1 Services Provided to the Upper Layers481
6.1.2 Transport Service Primitives483
6.1.3 Berkeley Sockets487
6.1.4 An Example of Socket Programming: An Internet File Server488
6.2 ELEMENTS OF TRANSPORT PROTOCOLS492
6.2.1 Addressing493
6.2.2 Connection Establishment496
6.2.3 Connection Release502
6.2.4 Flow Control and Buffering506
6.2.5 Multiplexing510
6.2.6 Crash Recovery511
6.3 A SIMPLE TRANSPORT PROTOCOL513
6.3.1 The Example Service Primitives513
6.3.2 The Example Transport Entity515
6.3.3 The Example as a Finite State Machine522
6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP524
6.4.1 Introduction to UDP525
6.4.2 Remote Procedure Call526
6.4.3 The Real-Time Transport Protocol529
6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP532
6.5.1 Introduction to TCP532
6.5.2 The TCP Service Model533
6.5.3 The TCP Protocol535
6.5.4 The TCP Segment Header536
6.5.5 TCP Connection Establishment539
6.5.6 TCP Connection Release541
6.5.7 Modeling TCP Connection Management541
6.5.8 TCP Transmission Policy543
6.5.9 TCP Congestion Control547
6.5.10 TCP Timer Management550
6.5.11 Wireless TCP and UDP553
6.5.12 Transactional TCP555
6.6 PERFORMANCE ISSUES557
6.6.1 Performance Problems in Computer Networks557
6.6.2 Network Performance Measurement560
6.6.3 System Design for Better Performance562
6.6.4 Fast TPDU Processing566
6.6.5 Protocols for Gigabit Networks569
6.7 SUMMARY573
7 THE APPLICATION LAYER579
7.1 DNS—THE DOMAIN NAME SYSTEM579
7.1.1 The DNS Name Space580
7.1.2 Resource Records582
7.1.3 Name Servers586
7.2 ELECTRONIC MAIL588
7.2.1 Architecture and Services590
7.2.2 The User Agent591
7.2.3 Message Formats594
7.2.4 Message Transfer602
7.2.5 Final Delivery605
7.3 THE WORLD WIDE WEB611
7.3.1 Architectural Overview612
7.3.2 Static Web Documents629
7.3.3 Dynamic Web Documents643
7.3.4 HTTP—The HyperText Transfer Protocol651
7.3.5 Performance Enhancements656
7.3.6 The Wireless Web662
7.4 MULTIMEDIA674
7.4.1 Introduction to Digital Audio674
7.4.2 Audio Compression676
7.4.3 Streaming Audio679
7.4.4 Internet Radio683
7.4.5 Voice over IP685
7.4.6 Introduction to Video692
7.4.7 Video Compression696
7.4.8 Video on Demand704
7.4.9 The MBone—The Multicast Backbone711
7.5 SUMMARY714
8 NETWORK SECURITY721
8.1 CRYPTOGRAPHY724
8.1.1 Introduction to Cryptography725
8.1.2 Substitution Ciphers727
8.1.3 Transposition Ciphers729
8.1.4 One-Time Pads730
8.1.5 Two Fundamental Cryptographic Principles735
8.2 SYMMETRIC-KEY ALGORITHMS737
8.2.1 DES—The Data Encryption Standard738
8.2.2 AES—The Advanced Encryption Standard741
8.2.3 Cipher Modes745
8.2.4 Other Ciphers750
8.2.5 Cryptanalysis750
8.3 PUBLIC-KEY ALGORITHMS752
8.3.1 RSA753
8.3.2 Other Public-Key Algorithms755
8.4 DIGITAL SIGNATURES755
8.4.1 Symmetric-Key Signatures756
8.4.2 Public-Key Signatures757
8.4.3 Message Digests759
8.4.4 The Birthday Attack763
8.5 MANAGEMENT OF PUBLIC KEYS765
8.5.1 Certificates765
8.5.2 X.509767
8.5.3 Public Key Infrastructures768
8.6 COMMUNICATION SECURITY772
8.6.1IPsec772
8.6.2 Firewalls776
8.6.3 Virtual Private Networks779
8.6.4 Wireless Security780
8.7 AUTHENTICATION PROTOCOLS785
8.7.1 Authentication Based on a Shared Secret Key786
8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange791
8.7.3 Authentication Using a Key Distribution Center793
8.7.4 Authentication Using Kerberos796
8.7.5 Authentication Using Public-Key Cryptography798
8.8 E-MAIL SECURITY799
8.8.1 PGP—Pretty Good Privacy799
8.8.2 PEM—Privacy Enhanced Mail803
8.8.3 S/MIME804
8.9 WEB SECURITY805
8.9.1 Threats805
8.9.2 Secure Naming806
8.9.3 SSL—The Secure Sockets Layer813
8.9.4 Mobile Code Security816
8.10 SOCIAL ISSUES819
8.10.1 Privacy819
8.10.2 Freedom of Speech822
8.10.3 Copyright826
8.11 SUMMARY828
9 READING LIST AND BIBLIOGRAPHY835
9.1 SUGGESTIONS FOR FURTHER READING835
9.1.1 Introduction and General Works836
9.1.2 The Physical Layer838
9.1.3 The Data Link Layer840
9.1.4 The Medium Access Control Sublayer840
9.1.5 The Network Layer842
9.1.6 The Transport Layer844
9.1.7 The Application Layer844
9.1.8 Network Security846
9.2 ALPHABETICAL BIBLIOGRAPHY848
INDEX869