图书介绍
Computer networkspdf电子书版本下载
- Andrew S.Tanenbaum 著
- 出版社: lnc.Englewood cliffs
- ISBN:
- 出版时间:1981
- 标注页数:517页
- 文件大小:22MB
- 文件页数:533页
- 主题词:
PDF下载
下载说明
Computer networksPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1 INTRODUCTION 1
1.1 THE USES OF COMPUTER NETWORKS 3
1.1.1.Network Goals 3
1.1.2.Applications of Networks 5
1.2 NETWORK STRUCTURE 7
1.3 NETWORK ARCHITECTURES 10
1.3.1.Protocol Hierarchies 10
1.3.2.Design Issues for the Layers 14
1.4 THE ISO REFERENCE MODEL 15
1.4.1.The Physical Layer 16
1.4.2.The Data Link Layer 17
1.4.3.The Network Layer 17
1.4.4.The Transport Layer 18
1.4.5.The Session Layer 19
1.4.6.The Presentation Layer 20
1.4.7.The Application Layer 21
1.5 ARPANET,SNA,DECNET,AND PUBLIC NETWORKS 21
1.5.1.Introduction to the ARPANET 22
1.5.2.Introduction to SNA 23
1.5.3.Introduction to DECNET 26
1.5.4.Introduction to Public Networks and X.25 28
1.6 OUTLINE OF THE REST OF THE BOOK 29
1.7 SUMMARY 30
2 NETWORK TOPOLOGY 32
2.1 INTRODUCTION TO THE TOPOLOGY DESIGN PROBLEM 32
2.1.1.Formulation of the Problem 32
2.1.2.Hierarchical Networks 34
2.2 CONNECTIVITY ANALYSIS 36
2.2.1.Introduction to Graph Theory 36
2.2.2.Cuts and Network Flow 40
2.2.3.The Max-Flow Algorithm 44
2.2.4.Disjoint Paths 47
2.2.5.Monte Carlo Connectivity Analysis 54
2.3 DELAY ANALYSIS 56
2.3.1.Introduction to Queueing Theory 57
2.3.2.The M/M/1 Queue in Equilibrium 59
2.3.3.Networks of M/M/1 Queues 62
2.4 BACKBONE DESIGN 67
2.4.1.The Design Process 67
2.4.2.Generating Starting Topologies 70
2.4.3.Flow and Capacity Assignment 72
2.4.4.Perturbation Heuristics 75
2.5 LOCAL ACCESS NETWORK DESIGN 80
2.5.1.Assigning Sites to Concentrators 80
2.5.2.The Concentrator Location Problem 83
2.5.3.The Terminal Layout Problem 84
2.6 SUMMARY 87
3 THE PHYSICAL LAYER 91
3.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION 91
3.1.1.Fourier Analysis 91
3.1.2.Bandwidth Limited Signals 92
3.1.3.The Maximum Data Rate of a Channel 95
3.2 THE TELEPHONE SYSTEM 96
3.2.1.Who’s Who in the Telecommunication World 97
3.2.2.Structure of the Telephone System 98
3.2.3.The Local Loop 100
3.3 TRANSMISSION AND MULTIPLEXING 103
3.3.1.Frequency Division and Time Division Multiplexing 103
3.3.2.Digital Transmission 104
3.3.3.The X.21 Digital Interface 108
3.3.4.Communication Satellites 110
3.3.5.Circuit Switching and Packet Switching 114
3.4 TERMINAL HANDLING 119
3.4.1.Polling 119
3.4.2.Multiplexing versus Concentration 121
3.4.3.The Packet Assembler/ Disassembler 122
3.5 ERRORS 125
3.5.1.The Nature of Transmission Errors 125
3.5.2.Error-Correcting Codes 126
3.5.3.Error-Detecting Codes 128
3.6 SUMMARY 133
4 THE DATA LINK LAYER 136
4.1 ELEMENTARY DATA LINK PROTOCOLS 136
4.1.1.Some Declarations Needed by the Protocols 137
4.1.2.An Unrestricted Simplex Protocol 141
4.1.3.A Simplex Stop-and-Wait Protocol 143
4.1.4.A Simplex Protocol for a Noisy Channel 145
4.2 SLIDING WINDOW PROTOCOLS 148
4.2.1.A One Bit Sliding Window Protocol 151
4.2.2.A Protocol with Pipelining 153
4.2.3.A Protocol That Accepts Frames Out of Order 157
4.3 EXAMPLES OF THE DATA LINK LAYER 165
4.3.1.The Data Link Layer in the ARPANET 165
4.3.2.The Data Link Layer in SNA and X.25 167
4.3.3.The Data Link Layer in DECNET 172
4.4 ANALYSIS OF PROTOCOLS 174
4.4.1.Protocol Efficiency 174
4.4.2.Protocol Verification 177
4.5 SUMMARY 183
5 THE NETWORK LAYER I:POINT-TO-POINT NETWORKS 187
5.1 VIRTUAL CIRCUITS AND DATAGRAMS 187
5.1.1.The Service Provided by the Network Layer 188
5.1.2.Comparison of Virtual Circuit and Datagram Service 189
5.1.3.The Internal Structure of the Subnet 192
5.1.4.Comparison of VCs and Datagrams within the Subnet 195
5.1.5.Independence of Subnet Service and Subnet Structure 196
5.2 ROUTING ALGORITHMS 197
5.2.1.Flooding 198
5.2.2.Static Routing 199
5.2.3.Centralized Routing Algorithms 200
5.2.4.Isolated Routing 202
5.2.5.Distributed Routing Algorithms 205
5.2.6.The Topology Update Problem 207
5.2.7.Hierarchical Routing 211
5.2.8.Broadcast Routing 213
5.3 CONGESTION 215
5.3.1.Preallocation of Buffers 216
5.3.2.Packet Discarding 217
5.3.3.Isarithmic Congestion Control 219
5.3.4.Flow Control 220
5.3.5.Choke Packets 221
5.3.6.Deadlocks 222
5.4 EXAMPLES OF THE NETWORK LAYER 225
5.4.1.The Network Layer in the ARPANET 226
5.4.2.The Network Layer in SNA 231
5.4.3.The Network Layer in DECNET 235
5.4.4.The Network Layer in X.25 237
5.5 SUMMARY 245
6 THE NETWORK LAYER Ⅱ:SATELLITE AND PACKET RADIO NETWORKS 249
6.1 SATELLITE PACKET BROADCASTING 250
6.1.1.Conventional Channel Allocation Methods 251
6.1.2.Pure ALOHA and Slotted ALOHA 253
6.1.3.Finite Population ALOHA 257
6.1.4.Delay and Throughput of Slotted ALOHA 259
6.1.5.Stability of Slotted ALOHA 265
6.1.6.Controlled ALOHA 269
6.1.7.Reservation ALOHA 271
6.2 PACKET RADIO 273
6.2.1.The University of Hawaii ALOHA System 273
6.2.2.Design Issues for Packet Radio Networks 277
6.3 SUMMARY 282
7 THE NETWORK LAYER Ⅲ:LOCAL NETWORKS 286
7.1 CARRIER SENSE NETWORKS 288
7.1.1.Persistent and Nonpersistent CSMA 289
7.1.2.Ethernet 292
7.1.3.Collision-Free Protocols 296
7.1.4.Limited-Contention Protocols 300
7.2 RING NETWORKS 307
7.2.1.Token Rings 307
7.2.2.Contention Rings 311
7.2.3.Slotted Rings 312
7.2.4.Register Insertion Rings 313
7.3 SHARED MEMORY SYSTEMS 315
7.3.1.Processor-Memory Interconnection 315
7.3.2.Examples of Shared Memory Systems 317
7.4 SUMMARY 320
8 THE TRANSPORT AND SESSION LAYERS 324
8.1 TRANSPORT PROTOCOL DESIGN ISSUES 325
8.1.1.Transport Service 326
8.1.2.Addressing and Connection Establishment 335
8.1.3.Flow Control and Buffering 338
8.1.4.Multiplexing 343
8.1.5.Synchronization in the Presence of Delayed Packets 345
8.1.6.Crash Recovery 351
8.2 INTERCONNECTION OF PACKET-SWITCHING NETWORKS 353
8.2.1.Gateways 354
8.2.2.The Level of Interconnection 358
8.2.3.The X.75 Model versus the Datagram Model 359
8.2.4.Internetwork Packet Fragmentation 364
8.3 THE SESSION LAYER 368
8.4 EXAMPLES OF THE TRANSPORT AND SESSION LAYERS 369
8.4.1.The Transport Layer in the ARPANET 369
8.4.2.The Transport and Session Layers in SNA 377
8.4.3.The Transport Layer in DECNET 380
8.5 SUMMARY 381
9 THE PRESENTATION LAYER 386
9.1 NETWORK SECURITY AND PRIVACY 386
9.1.1.Traditional Cryptography 388
9.1.2.The Data Encryption Standard 396
9.1.3.The Key Distribution Problem 406
9.1.4.Public Key Cryptography 410
9.1.5.Authentication and Digital Signatures 413
9.2 TEXT COMPRESSION 417
9.2.1.Encoding a Finite Set of Equally Likely Symbols 418
9.2.2.Huffman Coding 419
9.2.3.Context Dependent Encoding 420
9.3 VIRTUAL TERMINAL PROTOCOLS 421
9.3.1.Classes of Terminals 421
9.3.2.The Data Structure Model 423
9.3.3.Design Principles 425
9.3.4.An Example Virtual Terminal Protocol 426
9.4 FILE TRANSFER PROTOCOLS 429
9.5 EXAMPLES OF THE PRESENTATION LAYER 431
9.5.1.The Presentation Layer in the ARPANET 431
9.5.2.The Presentation Layer in SNA 433
9.5.3.The Presentation Layer in DECNET 434
9.6 SUMMARY 435
10 THE APPLICATION LAYER 440
10.1 DISTRIBUTED DATA BASE SYSTEMS 440
10.1.1.The Relational Data Base Model 441
10.1.2.The Relation Distribution Problem 446
10.1.3.Query Processing 448
10.1.4.Concurrency Control 452
10.1.5.Crash Recovery 457
10.2 DISTRIBUTED COMPUTATION 460
10.2.1.The Hierarchical Model 461
10.2.2.The CPU Cache Model 462
10.2.3.The User-Server Model 464
10.2.4.The Pool Processor Model 466
10.2.5.The Data Flow Model 468
10.3 NETWORK AND DISTRIBUTED OPERATING SYSTEMS 476
10.3.1.Network Operating Systems 476
10.3.2.Distributed Operating Systems 479
10.3 SUMMARY 482
11 READING LIST AND BIBLIOGRAPHY 486
11.1 SUGGESTIONS FOR FURTHER READING 486
11.1.1 Introduction 487
11.1.2 Network Topology 487
11.1.3 The Physical Layer 488
11.1.4 The Data Link Layer 488
11.1.5 The Network Layer Ⅰ:Point-to-Point Networks 489
11.1.6 The Network Layer Ⅱ:Satellite and Packet Radio Networks 489
11.1.7 The Network Layer Ⅲ:Local Networks 490
11.1.8 The Transport and Session Layers 490
11.1.9 The Presentation Layer 491
11.1.10 The Application Layer 492
11.2 ALPHABETICAL BIBLIOGRAPHY 493
INDEX 508