图书介绍
计算机网络自顶向下方法 英文【2025|PDF下载-Epub版本|mobi电子书|kindle百度云盘下载】

- (美)JamesF.Kurose,KeithW.Ross著 著
- 出版社: 北京:高等教育出版社
- ISBN:9787040268454
- 出版时间:2009
- 标注页数:879页
- 文件大小:176MB
- 文件页数:895页
- 主题词:计算机网络-英文
PDF下载
下载说明
计算机网络自顶向下方法 英文PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Computer Networks and the Internet27
1.1 What Is the Internet?28
1.1.1 A Nuts-and-Bolts Description28
1.1.2 A Services Description31
1.1.3 What Is a Protocol?33
1.2 The Network Edge35
1.2.1 Client and Server Programs38
1.2.2 Access Networks38
1.2.3 Physical Media45
1.3 The Network Core48
1.3.1 Circuit Switching and Packet Switching48
1.3.2 How Do Packets Make Their Way Through56
Packet-Switched Networks?56
1.3.3 ISPs and Internet Backbones57
1.4 Delay, Loss, and Throughput in Packet-Switched Networks59
1.4.1 Overview of Delay in Packet-Switched Networks59
1.4.2 Queuing Delay and Packet Loss63
1.4.3 End-to-End Delay66
1.4.4 Throughput in Computer Networks68
1.5 Protocol Layers and Their Service Models71
1.5.1 Layered Architecture71
1.5.2 Messages, Segments, Datagrams, and Frames77
1.6 Networks Under Attack79
1.7 History of Computer Networking and the Internet84
1.7.1 The Development of Packet Switching: 1961-197284
1.7.2 Proprietary Networks and Internetworking: 1972-198086
1.7.3 A Proliferation of Networks: 1980-199088
1.7.4 The Internet Explosion: The 1990s89
1.7.5 Recent Developments90
1.8 Summary91
Road-Mapping This Book92
Homework Problems and Questions93
Problems95
Discussion Questions101
Ethereal Lab102
Interview: Leonard Kleinrock103
Chapter 2 Application Layer107
2.1 Principles of Network Applications108
2.1.1 Network Application Architectures108
2.1.2 Processes Communicating111
2.1.3 Transport Services Available to Applications114
2.1.4 Transport Services Provided by the Internet116
2.1.5 Application-Layer Protocols120
2.1.6 Network Applications Covered in This Book121
2.2 The Web and HTTP122
2.2.1 Overview of HTTP122
2.2.2 Non-persistent and Persistent Connections124
2.2.3 HTTP Message Format127
2.2.4 User-Server Interaction: Cookies132
2.2.5 Web Caching134
2.2.6 The Conditional GET138
2.3 File Transfer: FTP140
2.3.1 FTP Commands and Replies142
2.4 Electronic Mail in the Internet142
2.4.1 SMTP145
2.4.2 Comparison with HTTP148
2.4.3 Mail Message Formats and MIME149
2.4.4 Mail Access Protocols152
2.5 DNS—The Internet's Directory Service156
2.5.1 Services Provided by DNS157
2.5.2 Overview of How DNS Works159
2.5.3 DNS Records and Messages165
2.6 Peer-to-Peer Applications170
2.6.1 P2P File Distribution171
2.6.2 Searching for Information in a P2P Community177
2.6.3 Case Study: P2P Internet Telephony with Skype183
2.7 Socket Programming with TCP185
2.7.1 Socket Programming with TCP186
2.7.2 An Example Client-Server Application in Java188
2.8 Socket Programming with UDP195
2.9 Summary203
Homework Problems and Questions204
Problems206
Discussion Questions213
Socket Programming Assignments214
Ethereal Labs216
Interview: Bran Cohen218
Chapter 3 Transport Layer221
3.1 Introduction and Transport-Layer Services222
3.1.1 Relationship Between Transport and Network Layers222
3.1.2 Overview of the Transport Layer in the Internet225
3.2 Multiplexing and Demultiplexing227
3.3 Connectionless Transport: UDP234
3.3.1 UDP Segment Structure238
3.3.2 UDP Checksum238
3.4 Principles of Reliable Data Transfer240
3.4.1 Building a Reliable Data Transfer Protocol242
3.4.2 Pipelined Reliable Data Transfer Protocols251
3.4.3 Go-Back-N (GBN)254
3.4.4 Selective Repeat (SR)259
3.5 Connection-Oriented Transport: TCP266
3.5.1 The TCP Connection267
3.5.2 TCP Segment Structure269
3.5.3 Round-Trip Time Estimation and Timeout274
3.5.4 Reliable Data Transfer278
3.5.5 Flow Control286
3.5.6 TCP Connection Management288
3.6 Principles of Congestion Control295
3.6.1 The Causes and the Costs of Congestion296
3.6.2 Approaches to Congestion Control302
3.6.3 Network-Assisted Congestion-Control Example:ATM ABR Congestion Control303
3.7 TCP Congestion Control305
3.7.1 Fairness313
3.8 Summary316
Homework Problems and Questions319
Problems321
Discussion Questions330
Programming Assignments331
Ethereal Labs331
Interview: Sally Floyd333
Chapter 4 The Network Layer335
4.1 Introduction336
4.1.1 Forwarding and Routing338
4.1.2 Network Service Models340
4.2 Virtual Circuit and Datagram Networks343
4.2.1 Virtual-Circuit Networks344
4.2.2 Datagram Networks347
4.2.3 Origins of VC and Datagram Networks349
4.3 What's Inside a Router?350
4.3.1 Input Ports352
4.3.2 Switching Fabric354
4.3.3 Output Ports357
4.3.4 Where Does Queuing Occur?357
4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet360
4.4.1 Datagram Format362
4.4.2 IPv4 Addressing368
4.4.3 Internet Control Message Protocol (ICMP)383
4.4.4 IPv6386
4.4.5 A Brief Introduction into IP Security VPNs392
4.5 Routing Algorithms394
4.5.1 The Link-State (LS) Routing Algorithm397
4.5.2 The Distance-Vector (DV) Routing Algorithm401
4.5.3 Hierarchical Routing409
4.6 Routing in the Internet413
4.6.1 Intra-AS Routing in the Internet: RIP414
4.6.2 Intra-AS Routing in the Internet: OSPF418
4.6.3 Inter-AS Routing: BGP421
4.7 Broadcast and Multicast Routing428
4.7.1 Broadcast Routing Algorithms429
4.7.2 Multicast434
4.8 Summary441
Homework Problems and Questions442
Problems445
Discussion Questions455
Programming Assignment456
Ethereal Labs457
Interview: Vinton G&Cerf458
Chapter S The Link Layer and Local Area Networks461
5.1 Link Layer: Introduction and Services463
5.1.1 The Services Provided by the Link Layer463
5.1.2 Where Is the Link Layer Implemented?466
5.2 Error-Detection and -Correction Techniques468
5.2.1 Parity Checks470
5.2.2 Checksumming Methods472
5.2.3 Cyclic Redundancy Check (CRC)472
5.3 Multiple Access Protocols475
5.3.1 Channel Partitioning Protocols477
5.3.2 Random Access Protocols479
5.3.3 Taking-Turns Protocols486
5.3.4 Local Area Networks (LANs)487
5.4 Link-Layer Addressing489
5.4.1 MAC Addresses489
5.4.2 Address Resolution Protocol (ARP)491
5.5 Ethernet491
5.5.1 Ethernet Frame Structure497
5.5.2 CSMA/CD: Ethernet's Multiple Access Protocol501
5.5.3 Ethernet Technologies503
5.6 Link-Layer Switches506
5.6.1 Forwarding and Filtering507
5.6.2 Self-Learning509
5.6.3 Properties of Link-Layer Switching510
5.6.4 Switches Versus Routers511
5.7 PPP: The Point-to-Point Protocol513
5.7.1 PPP Data Framing515
5.8 Link Virtualization: A Network as a Link Layer517
5.8.1 Asynchronous Transfer Mode (ATM) Networks518
5.8.2 Multiprotocol Label Switching (MPLS)523
5.9 Summary526
Homework Problems and Questions527
Problems529
Discussion Questions534
Ethereal Labs535
Interview: Simon S&Lam536
Chapter 6 Wireless and Mobile Networks539
6.1 Introduction540
6.2 Wireless Links and Network Characteristics545
6.2.1 CDMA548
6.3 WiFi: 802.11 Wireless LANs552
6.3.1 The 802.11 Architecture553
6.3.2 The 802.11 MAC Protocol557
6.3.3 The IEEE 802.11 Frame563
6.3.4 Mobility in the Same IP Subnet567
6.3.5 Advanced Features in 802.11568
6.3.6 Beyond 802.11: Bluetooth and WiMAX570
6.4 Cellular Internet Access574
6.4.1 An Overview of Cellular Architecture574
6.4.2 Cellular Standards and Technologies: A Brief Survey577
6.5 Mobiliry Management: Principles581
6.5.1 Addressing583
6.5.2 Routing to a Mobile Node585
6.6 Mobile IP590
6.7 Managing Mobility in Cellular Networks596
6.7.1 Routing Calls to a Mobile User597
6.7.2 Handoffs in GSM598
6.8 Wireless and Mobility: Impact on Higher-layer Protocols601
6.9 Summary604
Homework Problems and Questions605
Problems606
Discussion Questions610
Ethereal Labs610
Interview: Charlie Perkins611
Chapter 7 Multimedia Networking615
7.1 Multimedia Networking Applications616
7.1.1 Examples of Multimedia Applications616
7.1.2 Hurdles for Multimedia in Today's Internet619
7.1.3 How Should the Internet Evolve to Support Multimedia Better?620
7.1.4 Audio and Video Compression622
7.2 Streaming Stored Audio and Video626
7.2.1 Accessing Audio and Video Through a Web Server626
7.2.2 Sending Multimedia from a Streaming Server to a Helper Application628
7.2.3 Real-Time Streaming Protocol (RTSP)630
7.3 Making the Best of the Best-Effort Service634
7.3.1 The Limitations of a Best-Effoff Service634
7.3.2 Removing Jitter at the Receiver for Audio637
7.3.3 Recovering from Packet Loss640
7.3.4 Distributing Multimedia in Today's Internet:Content Distribution Networks644
7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service647
7.4 Protocols for Real-Time Interactive Applications649
7.4.1 RTP649
7.4.2 RTP Control Protocol (RTCP)654
7.4.3 SIP657
7.4.4 H.323663
7.5 Providing Multiple Classes of Service665
7.5.1 Motivating Scenarios666
7.5.2 Scheduling and Policing Mechanisms671
7.5.3 Diffserv678
7.6 Providing Quality of Service Guarantees683
7.6.1 A Motivating Example683
7.6.2 Resource Reservation, Call Admission, Call Setup685
7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP687
7.7 Summary690
Homework Problems and Questions691
Problems692
Discussion Questions699
Programming Assignment700
Interview: Henning Schulzrinne702
Chapter 8 Security in Computer Networks705
8.1 What Is Network Security?706
8.2 Principles of Cryptography709
8.2.1 Symmetric Key Cryptography711
8.2.2 Public Key Encryption717
8.3 Message Integrity722
8.3.1 Cryptographic Hash Functions723
8.3.2 Message Authentication Code725
8.3.3 Digital Signatures727
8.4 End-Point Authentication733
8.4.1 Authentication Protocol ap1.0734
8.4.2 Authentication Protocol ap2.0735
8.4.3 Authentication Protocol ap3.0736
8.4.4 Authentication Protocol ap3.1737
8.4.5 Authentication Protocol ap4.0737
8.4.6 Authentication Protocol ap5.0739
8.5 Securing E-mail742
8.5.1 Secure E-mail743
8.5.2 PGP746
8.6 Securing TCP Connections: SSL748
8.6.1 The Big Picture750
8.6.2 A More Complete Picture753
8.7 Network-Layer Security: IPsec754
8.7.1 Authentication Header (AH) Protocol755
8.7.2 The ESP Protocol757
8.7.3 SA and Key Management757
8.8 Securing Wireless LANs758
8.8.1 Wired Equivalent Privacy (WEP)758
8.8.2 IEEE802.l li761
8.9 Operational Security: Firewalls and Intrusion Detection Systems763
8.9.1 Firewalls763
8.9.2 Intrusion Detection Systems770
8.10 Summary774
Homework Problems and Questions775
Problems776
Discussion Questions779
Ethereal Lab780
Interview: Steven M. Bellovin781
Chapter 9 Network Management783
9.1 What Is Network Management?784
9.2 The Infrastructure for Network Management788
9.3 The Intemet-Standard Management Framework792
9.3.1 Structure of Management Information: SMI794
9.3.2 Management Information Base: MIB798
9.3.3 SNMP Protocol Operations and Transport Mappings801
9.3.4 Security and Administration803
9.4 ASN.1807
9.5 Conclusion812
Homework Problems and Questions813
Problems813
Discussion Questions814
Interview: Jeff Case815
References817
Index847
热门推荐
- 2164007.html
- 693875.html
- 838083.html
- 2243961.html
- 1138690.html
- 3283523.html
- 1131623.html
- 242077.html
- 3844477.html
- 2787754.html
- http://www.ickdjs.cc/book_3753688.html
- http://www.ickdjs.cc/book_3135371.html
- http://www.ickdjs.cc/book_2049820.html
- http://www.ickdjs.cc/book_1415713.html
- http://www.ickdjs.cc/book_2206376.html
- http://www.ickdjs.cc/book_2200347.html
- http://www.ickdjs.cc/book_2944715.html
- http://www.ickdjs.cc/book_2437649.html
- http://www.ickdjs.cc/book_1711376.html
- http://www.ickdjs.cc/book_3591091.html