图书介绍

计算机网络:自顶向下方法与Internet特色 第3版 影印版PDF|Epub|txt|kindle电子书版本网盘下载

计算机网络:自顶向下方法与Internet特色 第3版 影印版
  • JamesF.Kurose,KeithW.Ross著 著
  • 出版社: 北京:高等教育出版社
  • ISBN:7040122316
  • 出版时间:2002
  • 标注页数:821页
  • 文件大小:301MB
  • 文件页数:848页
  • 主题词:计算机网络-高等学校-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机网络:自顶向下方法与Internet特色 第3版 影印版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Computer Networks and the Internet1

1.1 What Is the Internet?2

1.1.1 A Nuts-and-Bolts Description2

1.1.2 A Service Description5

1.1.3 What Is a Protocol?6

1.2 The Network Edge9

1.2.1 End Systems,Clients,and Servers9

1.2.2 Connectionless and Connection-Oriented Service11

1.3 The Network Core14

1.3.1 Circuit Switching and Packet Switching14

1.3.2 Packet-Switched Networks:Datagram Networks and Virtual-Circuit Networks21

1.4 Access Networks and Physical Media24

1.4.1 Access Networks25

1.4.2 Physical Media31

1.5 ISPs and Internet Backbones34

1.6 Delay and Loss in Packet-Switched Networks37

1.6.1 Types of Delay37

1.6.2 Queuing Delay and Packet Loss40

1.6.3 Delay and Routes in the Internet43

1.7 Protocol Layers and Their Service Models44

1.7.1 Layered Architecture45

1.7.2 Layers,Messages,Segments,Datagrams,and Frames50

1.8 History of Computer Networking and the Internet52

1.8.1 The Development of Packet Switching:1961-197252

1.8.2 Proprietary Networks and Internetworking:1972-198053

1.8.3 A Proliferation of Networks:1980-199056

1.8.4 The Internet Explosion:The 1990s56

1.8.5 Recent Developments58

1.9 Summary59

Road-Mapping This Book60

Homework Problems and Questions61

Problems62

Discussion Questions68

Ethereal Lab 169

Interview:Leonard Kleinrock71

Chapter 2 Application Layer73

2.1 Principles of Network Applications74

2.1.1 Network Application Architectures75

2.1.2 Processes Communicating78

2.1.3 Application-Layer Protocols81

2.1.4 What Services Does an Application Need?82

2.1.5 Services Provided by the Internet Transport Protocols84

2.1.6 Network Applications Covered in This Book87

2.2 The Web and HTTP87

2.2.1 Overview of HTTP88

2.2.2 Nonpersistent and Persistent Connections90

2.2.3 HTTP Message Format93

2.2.4 User-Server Interaction:Cookies98

2.2.5 HTTP Content100

2.2.6 Web Caching100

2.2.7 The Conditional GET105

2.3 File Transfer:FTP106

2.3.1 FTP Commands and Replies108

2.4 Electronic Mail in the Internet109

2.4.1 SMTP112

2.4.2 Comparison with HTTP115

2.4.3 Mail Message Formats and MIME115

2.4.4 Mail Access Protocols118

2.5 DNS—The Internet’s Directory Service123

2.5.1 Services Provided by DNS123

2.5.2 Overview of How DNS Works126

2.5.3 DNS Records and Messages132

2.6 P2P File Sharing136

2.7 Socket Programming with TCP146

2.7.1 Socket Programming with TCP147

2.7.2 An Example Client/Server Application in Java149

2.8 Socket Programming with UDP156

2.9 Building a Simple Web Server164

2.9.1 Web Server Functions164

2.10 Summary169

Homework Problems and Questions170

Problems171

Discussion Questions177

Socket Programming Assignments178

Ethereal Labs180

Interview:Tim Berners-Lee181

Chapter 3 Transport Layer183

3.1 Introduction and Transport-Layer Services184

3.1.1 Relationship Between Transport and Network Layers184

3.1.2 Overview of the Transport Layer in the Internet187

3.2 Multiplexing and Demultiplexing189

3.3 Connectionless Transport:UDP196

3.3.1 UDP Segment Structure199

3.3.2 UDP Checksum200

3.4 Principles of Reliable Data Transfer201

3.4.1 Building a Reliable Data Transfer Protocol203

3.4.2 Pipelined Reliable Data Transfer Protocols214

3.4.3 Go-Back-N (GBN)217

3.4.4 Selective Repeat (SR)221

3.5 Connection-Oriented Transport:TCP228

3.5.1 The TCP Connection228

3.5.2 TCP Segment Structure231

3.5.3 Round-Trip Time Estimation and Timeout236

3.5.4 Reliable Data Transfer239

3.5.5 Flow Control246

3.5.6 TCP Connection Management249

3.6 Principles of Congestion Control254

3.6.1 The Causes and the Costs of Congestion254

3.6.2 Approaches to Congestion Control260

3.6.3 Network-Assisted Congestion-Control Example:ATM ABR Congestion Control261

3.7 TCP Congestion Control264

3.7.1 Fairness271

3.7.2 TCP Delay Modeling275

3.8 Summary284

Homework Problems and Questions285

Problems287

Discussion Questions294

Programming Assignments295

Ethereal Lab:Exploring TCP295

Interview:Sally Floyd297

Chapter 4 The Network Layer299

4.1 Introduction300

4.1.1 Forwarding and Routing301

4.1.2 Network Service Models304

4.2 Virtual Circuit and Datagram Networks307

4.2.1 Virtual-Circuit Networks307

4.2.2 Datagram Networks310

4.2.3 Origins of VC and Datagram Networks313

4.3 What’s Inside a Router?314

4.3.1 Input Ports315

4.3.2 Switching Fabric318

4.3.3 Output Ports320

4.3.4 Where Does Queuing Occur?320

4.4 The Internet Protocol (IP):Forwarding and Addressing in the Internet323

4.4.1 Datagram Format325

4.4.2 IPv4 Addressing331

4.4.3 Internet Control Message Protocol (ICMP)342

4.4.4 IPv6344

4.5 Routing Algorithms351

4.5.1 The Link-State (LS) Routing Algorithm354

4.5.2 The Distance-Vector (DV) Routing Algorithm358

4.5.3 Hierarchical Routing366

4.6 Routing in the Internet370

4.6.1 Intra-AS Routing in the Internet:RIP371

4.6.2 Intra-AS Routing in the Internet:OSPF374

4.6.3 Inter-Autonomous System Routing:BGP378

4.7 Broadcast and Multicast Routing384

4.7.1 Broadcast Routing Algorithms385

4.7.2 Multicast391

4.8 Summary399

Homework Problems and Questions400

Problems403

Discussion Questions412

Programming Assignment412

Ethereal Lab413

Interview:Vinton G.Cerf414

Chapter 5 The Link Layer and Local Area Networks417

5.1 Link Layer:Introduction and Services419

5.1.1 The Services Provided by the Link Layer419

5.1.2 Adapters Communicating422

5.2 Error-Detection and -Correction Techniques423

5.2.1 Parity Checks425

5.2.2 Checksumming Methods427

5.2.3 Cyclic Redundancy Check (CRC)428

5.3 Multiple Access Protocols430

5.3.1 Channel Partitioning Protocols433

5.3.2 Random Access Protocols435

5.3.3 Taking-Turns Protocols442

5.3.4 Local Area Networks (LANs)443

5.4 Link-Layer Addressing445

5.4.1 MAC Addresses445

5.4.2 Address Resolution Protocol (ARP)447

5.4.3 Dynamic Host Configuration Protocol451

5.5 Ethernet455

5.5.1 Ethernet Frame Structure456

5.5.2 CSMA/CD:Ethernet’s Multiple Access Protocol460

5.5.3 Ethernet Technologies463

5.6 Interconnections:Hubs and Switches465

5.6.1 Hubs465

5.6.2 Link-Layer Switches467

5.7 PPP:The Point-to-Point Protocol477

5.7.1 PPP Data Framing479

5.7.2 PPP Link-Control Protocol (LCP) and Network-Control Protocols480

5.8 Link Virtualization:A Network as a Link Layer482

5.8.1 Asynchronous Transfer Mode (ATM) Networks483

5.8.2 Multiprotocol Label Switching (MPLS)488

5.9 Summary491

Homework Problems and Questions493

Problems494

Discussion Questions498

Ethereal Lab499

Interview:Simon S.Lam500

Chapter 6 Wireless and Mobile Networks503

6.1 Introduction504

6.2 Wireless Links and Network Characteristics508

6.2.1 CDMA509

6.3 Wi-Fi:802.11 Wireless LANs513

6.3.1 The 802.11 Architecture514

6.3.2 The 802.11 MAC Protocol517

6.3.3 The IEEE 802.11 Frame523

6.3.4 Mobility in the Same IP Subnet526

6.3.5 802.15 and Bluetooth528

6.4 Cellular Internet Access529

6.4.1 An Overview of Cellular Architecture531

6.4.2 Cellular Standards and Technologies:A Brief Survey532

6.5 Mobility Management:Principles536

6.5.1 Addressing538

6.5.2 Routing to a Mobile Node540

6.6 Mobile IP546

6.7 Managing Mobility in Cellular Networks551

6.7.1 Routing Calls to a Mobile User552

6.7.2 Handoffs in GSM553

6.8 Wireless and Mobility:Impact on Higher-layer Protocols556

6.9 Summary559

Homework Problems and Questions559

Problems560

Discussion Questions562

Ethereal Lab562

Interview:Charlie Perkins563

Chapter 7 Multimedia Networking565

7.1 Multimedia Networking Applications566

7.1.1 Examples of Multimedia Applications566

7.1.2 Hurdles for Multimedia in Today’s Internet569

7.1.3 How Should the Internet Evolve to Support Multimedia Better?571

7.1.4 Audio and Video Compression572

7.2 Streaming Stored Audio and Video574

7.2.1 Accessing Audio and Video Through a Web Server576

7.2.2 Sending Multimedia from a Streaming Server to a Helper Application578

7.2.3 Real-Time Streaming Protocol (RTSP)580

7.3 Making the Best of the Best-Effort Service:An Internet Phone Example584

7.3.1 The Limitations of a Best-Eggort Service585

7.3.2 Removing Jitter at the Receiver for Audio587

7.3.3 Recovering from Packet Loss590

7.3.4 Streaming Stored Audio and Video594

7.4 Protocols for Real-Time Interactive Applications594

7.4.1 RTP594

7.4.2 RTP Control Protocol (RTCP)599

7.4.3 SIP602

7.4.4 H.323608

7.5 Distributing Multimedia:Content Distribution Networks610

7.6 Beyond Best Effort614

7.6.1 Scenario 1:A 1 Mbps Audio Application and an FTP Transfer615

7.6.2 Scenario 2:A 1 Mbps Audio Application and a High-Priority FTP Transfer616

7.6.3 Scenario 3:A Misbehaving Audio Application and an FTP Transfer617

7.6.4 Scenario 4:Two 1 Mbps Audio Applications over an Overloaded 1.5 Mbps Link619

7.7 Scheduling and Policing Mechanisms620

7.7.1 Scheduling Mechanisms621

7.7.2 Policing:The Leaky Bucket625

7.8 Integrated Services and Differentiated Services628

7.8.1 Intserv628

7.8.2 Diffserv631

7.9 RSVP636

7.9.1 The Essence of RSVP637

7.9.2 A Few Simple Examples639

7.10 Summary643

Homework Problems and Questions644

Problems645

Discussion Questions649

Programming Assignment649

Interview:Henning Schulzrinne651

Chapter 8 Security in Computer Networks653

8.1 What Is Network Security?654

8.2 Principles of Cryptography657

8.2.1 Symmetric Key Cryptography660

8.2.2 Public Key Encryption664

8.3 Authentication670

8.3.1 Authentication Protocol ap1.0670

8.3.2 Authentication Protocol ap2.0671

8.3.3 Authentication Protocol ap3.0672

8.3.4 Authentication Protocol ap3.1672

8.3.5 Authentication Protocol ap4.0673

8.3.6 Authentication Protocol ap5.0674

8.4 Integrity678

8.4.1 Generating Digital Signatures678

8.4.2 Message Digests679

8.4.3 Hash Function Algorithms681

8.5 Key Distribution and Certification684

8.5.1 The Key Distribution Center686

8.5.2 Public Key Certification687

8.6 Access Control:Firewalls691

8.6.1 Packet Filtering692

8.6.2 Application Gateway695

8.7 Attacks and Countermeasures697

8.7.1 Mapping697

8.7.2 Packet Sniffing698

8.7.3 Spoofing699

8.7.4 Denial-of-Service and Distributed Denial-of-Service Attacks700

8.7.5 Hijacking701

8.8 Security in Many Layers:Case Studies702

8.8.1 Secure E-mail703

8.8.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)708

8.8.3 Network-Layer Security:IPsec712

8.8.4 Security in IEEE 802.11716

8.9 Summary721

Homework Problems and Questions722

Problems723

Discussion Questions725

Interview:Steven M.Bellovin726

Chapter 9 Network Management729

9.1 What Is Network Management?730

9.2 The Infrastructure for Network Management734

9.3 The Internet-Standard Management Framework738

9.3.1 Structure of Management Information:SMI740

9.3.2 Management Information Base:MIB743

9.3.3 SNMP Protocol Operations and Transport Mappings745

9.3.4 Security and Administration749

9.4 ASN.1753

9.5 Conclusion757

Homework Problems and Questions758

Problems759

Discussion Questions760

Interview:Jeff Case761

References763

Index797

热门推荐