图书介绍

计算机网络 系统方法 第4版PDF|Epub|txt|kindle电子书版本下载

计算机网络 系统方法 第4版
  • (美)彼得森(Peterson,L.L.),(美)戴维(Davie,B.S.)著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111214013
  • 出版时间:2007
  • 标注页数:806页
  • 文件大小:85MB
  • 文件页数:834页
  • 主题词:计算机网络-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机网络 系统方法 第4版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 Foundation2

Problem:Building a Network2

1.1 Applications4

1.2 Requirements6

1.2.1 Connectivity7

1.2.2 Cost-Effective Resource Sharing11

1.2.3 Support for Common Services14

1.3 Network Architecture19

1.3.1 Layering and Protocols20

1.3.2 OSI Architecture26

1.3.3 Internet Architecture28

1.4 Implementing Network Software30

1.4.1 Application Programming Interface(Sockets)31

1.4.2 Example Application33

1.4.3 Protocol Implementation Issues37

1.5 Performance40

1.5.1 Bandwidth and Latency40

1.5.2 Delay×Bandwidth Product44

1.5.3 High-Speed Networks46

1.5.4 Application Performanca Needs48

1.6 Summary50

Open Issue:Ubiquitous Networking51

Further Reading52

Exercises55

2 Direct Link Networks64

Problem:Physically Connecting Hosts64

2.1 Hardware Building Blocks66

2.1.1 Nodes66

2.1.2 Links71

2.2 Encoding(NRZ,NRZI,Manchester,4B/5B)79

2.3 Framing84

2.3.1 Byte-Oriented Protocols(PPP)84

2.3.2 Bit-Oriented Protocols(HDLC)87

2.3.3 Clock-Based Framing(SONET)89

2.4 Error Detection92

2.4.1 Two-Dimensional Parity93

2.4.2 Internet Checksum Algorithm94

2.4.3 Cyclic Redundancy Check96

2.5 Reliable Transmission101

2.5.1 Stop-and-Wait102

2.5.2 Sliding Window105

2.5.3 Concurrent Logical Channels115

2.6 Ethernet(802.3)116

2.6.1 Physical Properties116

2.6.2 Access Protocol119

2.6.3 Experience with Ethernet123

2.7 Rings(802.5,FDDI,RPR)124

2.7.1 Token Ring Media Access Control127

2.7.2 Token Ring Maintenance129

2.7.3 FDDI130

2.7.4 Resilient Packet Ring(802.17)131

2.8 Wireless133

2.8.1 Bluetooth(802.15.1)136

2.8.2 Wi-Fi(802.11)137

2.8.3 WiMAX(802.16)143

2.8.4 Cell Phone Technologies145

2.9 Summary147

Open Issue:Sensor Networks148

Further Reading149

Exercises151

3 Packet Switching166

Problem:Not All Networks Are Directly Connected166

3.1 Switching and Forwarding168

3.1.1 Datagrams170

3.1.2 Virtual Circuit Switching172

3.1.3 Source Routing179

3.2 Bridges and LAN Switches183

3.2.1 Learning Bridges184

3.2.2 Spanning Tree Algorithm187

3.2.3 Broadcast and Multicast192

3.2.4 Limitations of Bridges193

3.3 Cell Switching(ATM)195

3.3.1 Cells195

3.3.2 Segmentation and Reassembly200

3.3.3 Virtual Paths205

3.3.4 Physical Layers for ATM206

3.4 Implementation and Performance208

3.4.1 Ports210

3.4.2 Febrics214

3.5 Summary218

Open Issue:The Future of Switching219

Further Reading219

Exercises221

4 Internetworking232

Problem:There Is More Than One Network232

4.1 Simple Internetworking(IP)234

4.1.1 What Is an Internetwork?234

4.1.2 Service Model236

4.1.3 Global Addresses248

4.1.4 Datagram Forwarding in IP250

4.1.5 Address Translation(ARP)254

4.1.6 Host Configuration(DHCP)259

4.1.7 Error Reporting(ICMP)262

4.1.8 Virtual Networks and Tunnels262

4.2 Routing266

4.2.1 Network as a Graph268

4.2.2 Distance Vector(RIP)269

4.2.3 Link State(OSPF)277

4.2.4 Metrics286

4.2.5 Routing for Mobile Hosts289

4.2.6 Router Implementation294

4.3 Global Internet297

4.3.1 Subnetting299

4.3.2 Classless Routing(CIDR)303

4.3.3 Interdomain Routing(BGP)306

4.3.4 Routing Areas316

4.3.5 IP Version 6(IPv6)318

4.4 Multicast329

4.4.1 Multicast Addresses331

4.4.2 Multicast Routing(DVMRP,PIM,MSDP)332

4.5 Multiprotocol Label Switching343

4.5.1 Destination-Based Forwarding344

4.5.2 Explicit Routing350

4.5.3 Virtual Private Networks and Tunnels352

4.6 Summary356

Open Issue:Deployment of IPv6358

Further Reading359

Exercises360

5 End-to-End Protocols380

Problem:Getting Processes to Communicate380

5.1 Simple Demultiplexer(UDP)382

5.2 Reliable Byte Stream(TCP)384

5.2.1 End-to-End Issuaa385

5.2.2 Segment Format387

5.2.3 Connection Establishment and Termination390

5.2.4 Sliding Window Revisited394

5.2.5 Triggering Transmission400

5.2.6 Adaptive Retransmission403

5.2.7 Record Boundaries407

5.2.8 TCP Extensions408

5.2.9 Alternative Design Choices410

5.3 Remote Procedure Call411

5.3.1 RPC Fundamentals412

5.3.2 RPC Implementations(SunRPC,DCE)419

5.4 Transport for Real-Time Applications(RTP)426

5.4.1 Requirements428

5.4.2 RTP Details429

5.4.3 Control Protocol433

5.5 Performance437

5.6 Summary440

Open Issue:Application-Specific Protocols441

Further Reading442

Exercises443

6 Congestion Control and Resource AllocationProblem:Allocating Resources456

6.1 Issues in Resource Allocation458

6.1.1 Network Model458

6.1.2 Taxonomy462

6.1.3 Evaluation Criteria464

6.2 Queuing Disciplines467

6.2.1 FIFO468

6.2.2 Fair Oueuing469

6.3 TCP Congestion Control474

6.3.1 Additive Increase/Multiplicative Decrease474

6.3.2 Slow Start477

6.3.3 Fast Retransmit and Fast Recovery483

6.4 Congestion-Avoidance Mechanisms486

6.4.1 DECbit486

6.4.2 Random Early Detection(RED)487

6.4.3 Source-Based Congestion Avoidance493

6.5 Quality of Service499

6.5.1 Application Requirements500

6.5.2 Integrated Services(RSVP)506

6.5.3 Differentiated Services (EF,AF)516

6.5.4 Equation-Based Congestion Control522

6.6 Summary524

Open Issue:Inside versus Outside the Network525

Further Reading526

Exercises527

7 End-to-End Data542

Problem:What Do We Do with the Data?542

7.1 Presentation Formatting544

7.1.1 Taxonomy545

7.1.2 Examples(XDR,ASN.1,NDR)549

7.1.3 Markup Languages(XML)553

7.2 Data Compression557

7.2.1 Lossless Compression Algorithms559

7.2.2 Image Compression(JPEG)561

7.2.3 Video Compression(MPEG)566

7.2.4 Transmitting MPEG over a Network571

7.2.5 Audio Compression(MP3)575

7.3 Summary576

Open Issue:Computer Networks Meet Consumer Electronics577

Further Reading578

Exercises579

8 Network Security586

Problem:Security Attacks586

8.1 Cryptographic Tools589

8.1.1 Principles of Ciphers589

8.1.2 Symmetric-Key Ciphers591

8.1.3 Public-Key Ciphers593

8.1.4 Authenticators595

8.2 Key Predistribution599

8.2.1 Predistribution of Public Keys599

8.2.2 Predistribution of Symmetric Keys604

8.3 Authentication Protocols604

8.3.1 Originality and Timeliness Techniques605

8.3.2 Public-Key Authentication Protocols606

8.3.3 Symmetric-Key Authentication Protocols607

8.3.4 Diffie-Hellman Key Agreement611

8.4 Secure Systems613

8.4.1 Pretty Good Privacy(PGP)613

8.4.2 Secure Shell(SSH)615

8.4.3 Transport Layer Security(TLS,SSL,HTTPS)618

8.4.4 IP Security (IPsec)622

8.4.5 Wireless Security(802.11i)625

8.5 Firewalls626

8.5.1 Strengths and Weaknesses of Firewalls629

8.6 Summary631

Open Issue:Denial-of-Service Attacks632

Further Reading633

Exercises634

9 Applications640

Problem:Applications Need Their Own Protocols640

9.1 Traditional Applications642

9.1.1 Electronic Mail(SMTP,MIME,IMAP)643

9.1.2 World Wide Web(HTTP)650

9.1.3 Name Service(DNS)657

9.1.4 Network Management(SNMP)666

9.2 Web Services668

9.2.1 Custom Application Protocols(WSDL,SOAP)670

9.2.2 A Generic Application Protocol(REST)676

9.3 Multimedia Applications678

9.3.1 Session Control and Call Control(SDP,SIP,H.323)679

9.3.2 Resource Allocation for Multimedia Applications688

9.4 Overlay Networks693

9.4.1 Routing Overlays695

9.4.2 Peer-to-Peer Networks(Gnutella,BitTorrent)702

9.4.3 Content Distribution Networks714

9.5 Summary719

Open Issue:New Network Architecture720

Further Reading721

Exercises722

Solutions to Select Exercises729

Glossary743

Bibliography769

Index785

热门推荐