图书介绍
计算机网络 自顶向下方法与Internet特色 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- (美)JamesF.Kurose,(美)KeithW.Ross著 著
- 出版社: 北京:高等教育出版社
- ISBN:7040101009
- 出版时间:2001
- 标注页数:712页
- 文件大小:96MB
- 文件页数:738页
- 主题词:
PDF下载
下载说明
计算机网络 自顶向下方法与Internet特色 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Computer Networks and the Internet1
1.1 What Is the Internet?1
1.1.1 A Nuts and Bolts Description1
1.1.2 A Service Description4
1.1.3 Some Good Hyperlinks5
1.2 What Is a Protocol?6
1.2.1 A Human Analogy7
1.2.2 Network Protocols8
1.3 The Network Edge9
1.3.1 End Systems,Clients,and Servers9
1.3.2 Connectionless and Connection-Oriented Services11
1.4 The Network Core13
1.4.1 Circuit Switching,Packet Switching,and Message Switching13
1.4.2 Routing in Data Networks24
1.5 Access Networks and Physical Media29
1.5.1 Access Networks29
1.5.2 Physical Media34
1.6 Delay and Loss in Packet-Switched Network38
1.6.1 Types of Delay38
1.7 Protocol Layers and Their Service Models44
1.7.1 Layered Architecture45
1.7.2 The Internet Protocol Stack49
1.7.3 Network Entities and Layers53
1.8 Internet Backbones,NAPs, and ISPs53
1.9 A Brief History of Computer Networking and the Internet56
1.9.1 Development and Demonstration of Early Packet Switching Principles:1961-197256
1.9.2 Internetworking, and New and Proprietary Networks:1972-198057
1.9.3 A Proliferation of Networks:1980-199060
1.9.4 Commercialization and the Web:The 1990s61
1.10 Summary62
Homework Problems and Questions64
Problems66
Discussion Questions68
Interview:Leonard Kleinrock70
Chapter 2 Application Layer72
2.1 Principles of Application Layer Protocols72
2.1.1 Application-Layer Protocols73
2.1.2 What Services Does an Application Need?78
2.1.3 Services Provided by the Intemet Transport Protocols80
2.1.4 Network Applications Covered in this Book83
2.2 The World Wide Web:HTTP84
2.2.1 Overview of HTTP85
2.2.2 Nonpersistent and Persistent Connections87
2.2.3 HTTP Message Format90
2.2.4 User-Server Interaction:Authentication and Cookies94
2.2.5 The Conditional GET96
2.2.6 Web Caches97
2.3 File Transfer:FTP104
2.3.1 FTP Commands and Replies105
2.4 Electronic Mail in the Internet106
2.4.1 SMTP109
2.4.2 Comparison with HTTP111
2.4.3 Mail Message Formats and MIME112
2.4.4 Mail Access Protocols118
2.4.5 Continuous Media E-mail123
2.5 DNS-The Internet s Directory Service124
2.5.1 Services Provided by DNS124
2.5.2 Overview of How DNS Works127
2.5.3 DNS Records132
2.5.4 DNS Messages134
2.6 Socket Programming with TCP136
2.6.1 Socket Programming with TCP137
2.6.2 An Example Client/Server Application in Java139
2.7 Socket Programming with UDP146
2.8 Building a Simple Web Server154
2.8.1 Web Server Functions154
2.9 Summary158
Homework Problems and Questions159
Problems161
Discussion Questions162
Programming Assignments163
Interview:Tim Berners-Lee165
Chapter 3 Transport Layer167
3.1 Transport-Layer Services and Principles167
3.1.1 Relationship between Transport and Network Layers169
3.1.2 Overview of the Transport Layer in the Internet171
3.2 Multiplexing and Demultiplexing Applications172
3.3 Connectionless Transport:UDP177
3.3.1 UDP Segment Structure180
3.3.2 UDP Checksum181
3.4 Principles of Reliable Data Transfer182
3.4.1 Building a Reliable Data Transfer Protocol184
3.4.2 Pipelined Reliable Data Transfer Protocols193
3.4.3 Go-Back-N(GBN)196
3.4.4. Selective Repeat(SR)201
3.5 Connection-Oriented Transport:TCP207
3.5.1 The TCP Connection207
3.5.2 TCP Segment Structure210
3.5.3 Sequence Numbers and Acknowledgment Numbers211
3.5.4 Telnet: A Case Study for Sequence and Acknowledgment Numbers213
3.5.5 Reliable Data Transfer215
3.5.6 Flow Control221
3.5.7 Round Trip Time and Timeout224
3.5.8 TCP Connection Management226
3.6 Principles of Congestion Control231
3.6.1 The Causes and the Costs of Congestion231
3.6.2 Approaches toward Congestion Control237
3.6.3 ATM ABR Congestion Control239
3.7 TCP Congestion Control240
3.7.1 Overview of TCP Congestion Control241
3.7.2 Modeling Latency:Static Congestion Window249
3.7.3 Modeling Latency:Dynamic Congestion Window253
3.8 Summary258
Homework Problems and Questions260
Problems261
Discussion Question268
Programming Assignment268
Interview:Sally Floyd269
Chapter 4 Network Layer and Routing271
4.1 Introduction and Network Service Models271
4.1.1 Network Service Model273
4.1.2 Origins of Datagram and Virtual Circuit Service279
4.2 Routing Principles280
4.2.1 A Link State Routing Algorithm282
4.2.2 A Distance Vector Routing Algorithm286
4.2.3 Other Routing Algorithms295
4.3 Hierarchical Routing297
4.4 Internet Protocol300
4.4.1 IPv1 Addressing302
4.4.2 Transporting a Datagram from Source to Destination:Addressing and Routing310
4.4.3 Datagram Format314
4.4.4 IP Fragmentation and Reassembly317
4.4.5 ICMP: Internet Control Message Protocol319
4.5 Routing in the Intenet321
4.5.1 Intra-Autonomous System Routing in the Internet322
4.5.2 Inter-Autonomous System Routing329
4.6 What s Inside a Router?332
4.6.1 Input Ports333
4.6.2 Switching Fabrics336
4.6.3 Output Ports338
4.6.4 Where Does Queuing Occur?338
4.7 IPv6341
4.7.1 IPv6 Packet Format342
4.7.2 Transitioning from IPv4 to IPv6345
4.8 Multicast Routing348
4.8.1 Introduction: The Internet Multicast Abstraction and Multicast Groups348
4.8.2 The IGMP Protocol350
4.8.3 Multicast Routing: The General Case355
4.8.4 Multicast Routing in the Internet362
4.9 Summary367
Homework Problems and Questions368
Problems370
Discussion Questions374
Programming Assignment375
Interview:José Joaquin Garcia-Luna-Aceves377
Chapter 5 Link Layer and Local Area Networks379
5.1 The Data Link Layer: Introduction, Services379
5.1.1 The Services Provided by the Link Layer380
5.1.2 Adapters Communicating383
5.2 Error Detection and Correction Techniques385
5.2.1 Parity Checks386
5.2.2 Checksumming Methods389
5.2.3 Cyclic Redundancy Check (CRC)389
5.3 Multiple Access Protocols and LANs391
5.3.1 Channel Partitioning Protocols394
5.3.2 Random Access Protocols398
5.3.3 Taking-Turns Protocols406
5.3.4 Local Area Networks(LANs)407
5.4 LAN Addresses and ARP409
5.4.1 LAN Addresses409
5.4.2 Address Resolution Protocol411
5.5 Ethernet415
5.5.1 Ethernet Basics417
5.5.2 CSMA/CD:Ethernet s Multiple Access Protocol421
5.5.3 Ethernet Technologies423
5.6 Hubs,Bridges, and Switches427
5.6.1 Hubs427
5.6.2 Bridges429
5.6.3 Switches437
5.7 IEEE 802.11 LANs441
5.7.1 802.11 LAN Architecture441
5.7.2 802.11 Media Access Protocols442
5.8 PPP: The Point-to-Point Protocol447
5.8.1 PPP Data Framing449
5.8.2 PPP Link Control Protocol (LCP) and Network Control Protocols451
5.9 Asynchronous Transfer Mode(ATM)453
5.9.1 Principle Characteristics of ATM454
5.9.2 ATM Physical Layer456
5.9.3 ATM Layer458
5.9.4 ATM Adaptation Layer459
5.9.5 IP Over ATM461
5.9.6 ARP and ATM464
5.10 X.25 and Frame Relay465
5.10.1 A Few Words About X.25466
5.10.2 Frame Relay467
5.11 Summary471
Homework Problems and Questions472
Problems474
Discussion Questions480
Interview: Robert Metcalfe481
Chapter 6 Multimedia Networking483
6.1 Multimedia Networking Applications484
6.1.1 Examples of Multimedia Applications484
6.1.2 Hurdles for Multimedia in Today s Internet487
6.1.3 How Should the Internet Evolve to Better Support Multimedia?488
6.1.4 Audio and Video Compression489
6.2 Streaming Stored Audio and Video491
6.2.1 Accessing Audio and Video from a Web Server493
6.2.2 Sending Multimedia from a Streaming Server to a Helper Application495
6.2.3 Real Time Streaming Protocol(RTSP)497
6.3 Making the Best of the Best-Effort Service: An Internet Phone Example501
6.3.1 The Limitations of a Best-Effort Service501
6.3.2 Removing Jitter at the Receiver for Audio503
6.3.3 Recovering from Packet Loss506
6.3.4 Streaming Stored Audio and Video510
6.4 RTP510
6.4.1 RTP Basics510
6.4.2 RTP Packet Header Fields513
6.4.3 RTP Control Protocol(RTCP)514
6.4.4 H.323517
6.5 Beyond Best-Effort522
6.5.1 Scenario 1:A 1 Mbps Ardio Application and an FTP Transfer523
6.5.2 Scenario 2:A 1 Mbps Audio Application and a High Prionity FTP Transfer524
6.5.3 Scenario 3:A Misbehaving Audio Application and an FTP Transfer525
6.5.4 Scenario 4:Two 1 Mbps Audio Applications Over an Overloaded 1.5 Mbps Link526
6.6 Scheduling and Policing Mechanisms528
6.6.1 Scheduling Mechanisms528
6.6.2 Policing: The Leaky Bucket533
6.7 Integrated Services536
6.7.1 Guaranteed Quality of Service538
6.7.2 Controlled-Load Network Service539
6.8 RSVP539
6.8.1 The Essence of RSVP540
6.8.2 A Few Simple Examples542
6.8.3 Path Messages544
6.8.4 Reservation Styles544
6.8.5 Transport of Reservation Messages548
6.9 Differentiated Services549
6.9.1 Differentiated Services: A Simple Scenario550
6.9.2 Traffic Classification and Conditioning552
6.9.3 Per-Hop Behavior554
6.9.4 A Beginning556
6.10 Summary556
Homework Problems and Questions558
Problems559
Discussion Questions561
Interview: Henning Schulzrinne563
Chapter 7 Security in Computer Networks565
7.1 What is Network Security?565
7.1.1 Secure Communication565
7.1.2 Network Security Considerations in the Internet567
7.2 Principles of Cryptography569
7.2.1 Symmetric Key Cryptography571
7.2.2 Public Key Encryption575
7.3 Authentication: Who are You?581
7.3.1 Authentication Protocol ap1.0581
7.3.2 Authentication Protocol ap2.0582
7.3.3 Authentication Protocol ap3.0583
7.3.4 Authentication Protocol ap3.1583
7.3.5 Authentication Protocol ap4.0584
7.3.6 Authentication Protocol ap5.0586
7.4 Integrity588
7.4.1 Generating Digital Signatures589
7.4.2 Message Digests590
7.4.3 Hash Function Algorithms593
7.5 Key Distribution and Certification595
7.5.1 The Key Distribution Center595
7.5.2 Public Key Certification598
7.6 Secure E-Mail602
7.6.1 Principles of Secure E-Mail603
7.6.2 PGP605
7.7 Internet Commerce608
7.7.1 Internet Commerce Using SSL609
7.7.2 Internet Commerce Using SET613
7.8 Network Layer Security:IPsec616
7.8.1 Authentication Header (AH) Protocol617
7.8.2 The ESP Protocol618
7.8.3 SA and Key Management619
7.9 Summary620
Homework Problems and Questions621
Problems622
Discussion Questions623
Interview: Philip Zimmermann624
Chapter 8 Network Management626
8.1 What Is Network Management?626
8.2 The Infrastructure for Network Management631
8.3 The Internet Network-Management Framework634
8.3.1 Structure of Management Information:SMI635
8.3.2 Management Information Base:MIB638
8.3.3 SNMP Protocol Operations and Transport Mappings641
8.3.4 Security and Administration644
8.4 ASN.1648
8.5 Firewalls653
8.5.1 Packet Filtering654
8.5.2 Application Gateways655
8.6 Summary657
Homework Problems and Questions658
Problems659
Discussion Questions659
Interview:Jeff Case660
References663
Index689
热门推荐
- 2949151.html
- 1756595.html
- 717852.html
- 3235276.html
- 1989202.html
- 439741.html
- 508630.html
- 2610279.html
- 3190138.html
- 937632.html
- http://www.ickdjs.cc/book_858144.html
- http://www.ickdjs.cc/book_1668848.html
- http://www.ickdjs.cc/book_3227813.html
- http://www.ickdjs.cc/book_4040.html
- http://www.ickdjs.cc/book_1391142.html
- http://www.ickdjs.cc/book_1388979.html
- http://www.ickdjs.cc/book_995542.html
- http://www.ickdjs.cc/book_3102550.html
- http://www.ickdjs.cc/book_1084623.html
- http://www.ickdjs.cc/book_979008.html