图书介绍
计算机网络 英文版·第5版pdf电子书版本下载
- (荷)塔嫩鲍姆等著 著
- 出版社: 北京:机械工业出版社
- ISBN:7111359258
- 出版时间:2011
- 标注页数:951页
- 文件大小:85MB
- 文件页数:953页
- 主题词:
PDF下载
下载说明
计算机网络 英文版·第5版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PREFACE 6
ABOUT THE AUTHORS 10
1 INTRODUCTION 23
1.1 USES OF COMPUTER NETWORKS, 25
1.1.1 Business Applications, 25
1.1.2Home Applications, 28
1.1.3Mobile Users, 32
1.1.4 Social Issues, 36
1.2NETWORK HARDWARE, 39
1.2.1 Personal Area Networks, 40
1.2.2Local Area Networks, 41
1.2.3Metropolitan Area Networks, 45
1.2.4 Wide Area Networks, 45
1.2.5 Internetworks, 50
1.3NETWORK SOFTWARE, 51
1.3.1 Protocol Hierarchies, 51
1.3.2Design Issues for the Layers, 55
1.3.3Connection-Oriented Versus Connectionless Service, 57
1.3.4 Service Primitives, 60
1.3.5 The Relationship of Services to Protocols, 62
1.4 REFERENCE MODELS, 63
1.4.1 The OSI Reference Model, 63
1.4.2The TCP/IP Reference Model, 67
1.4.3The Model Used in This Book, 70
1.4.4 A Comparison of the OSI and TCP/IP Reference Models, 71
1.4.5 A Critique of the OSI Model and Protocols, 73
1.4.6 A Critique of the TCP/IP Reference Model, 75
1.5 EXAMPLE NETWORKS, 76
1.5.1 The Internet, 76
1.5.2Third-Generation Mobile Phone Networks, 85
1.5.3Wireless LANs: 802.11, 90
1.5.4 RFID and Sensor Networks, 93
1.6 NETWORK STANDARDIZATION, 95
1.6.1 Who’s Who in the Telecommunications World, 97
1.6.2Who’s Who in the International Standards World, 98
1.6.3Who’s Who in the Internet Standards World, 100
1.7 METRIC UNITS, 102
1.8 OUTLINE OF THE REST OF THE BOOK, 103
1.9 SUMMARY, 104
2 THE PHYSICAL LAYER 109
2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION, 110
2.1.1 Fourier Analysis, 110
2.1.2Bandwidth-Limited Signals, 110
2.1.3The Maximum Data Rate of a Channel, 114
2.2GUIDED TRANSMISSION MEDIA, 115
2.2.1 Magnetic Media, 115
2.2.2Twisted Pairs, 116
2.2.3Coaxial Cable, 117
2.2.4 Power Lines, 118
2.2.5 Fiber Optics, 119
2.3WIRELESS TRANSMISSION, 125
2.3.1 The Electromagnetic Spectrum, 125
2.3.2Radio Transmission, 129
2.3.3Microwave Transmission, 130
2.3.4 Infrared Transmission, 134
2.3.5 Light Transmission, 134
2.4 COMMUNICATION SATELLITES, 136
2.4.1 Geostationary Satellites, 137
2.4.2Medium-Earth Orbit Satellites, 141
2.4.3Low-Earth Orbit Satellites, 141
2.4.4 Satellites Versus Fiber, 143
2.5 DIGITAL MODULATION AND MULTIPLEXING, 145
2.5.1 Baseband Transmission, 145
2.5.2Passband Transmission, 150
2.5.3Frequency Division Multiplexing, 152
2.5.4 Time Division Multiplexing, 155
2.5.5 Code Division Multiplexing, 155
2.6 THE PUBLIC SWITCHED TELEPHONE NETWORK, 158
2.6.1 Structure of the Telephone System, 159
2.6.2The Politics of Telephones, 162
2.6.3The Local Loop: Modems, ADSL, and Fiber, 164
2.6.4 Trunks and Multiplexing, 172
2.6.5 Switching, 181
2.7 THE MOBILE TELEPHONE SYSTEM, 184
2.7.1 First-Generation (1G) Mobile Phones: Analog Voice, 186
2.7.2Second-Generation (2G) Mobile Phones: Digital Voice, 190
2.7.3Third-Generation (3G) Mobile Phones: Digital Voice and Data, 194
2.8 CABLE TELEVISION, 199
2.8.1 Community Antenna Television, 199
2.8.2Internet over Cable, 200
2.8.3Spectrum Allocation, 202
2.8.4 Cable Modems, 203
2.8.5 ADSL Versus Cable, 205
2.9 SUMMARY, 206
3 THE DATA LINK LAYER 213
3.1 DATA LINK LAYER DESIGN ISSUES, 214
3.1.1 Services Provided to the Network Layer, 214
3.1.2Framing, 217
3.1.3Error Control, 220
3.1.4 Flow Control, 221
3.2ERROR DETECTION AND CORRECTION, 222
3.2.1 Error-Correcting Codes, 224
3.2.2Error-Detecting Codes, 229
3.3ELEMENTARY DATA LINK PROTOCOLS, 235
3.3.1 A Utopian Simplex Protocol, 240
3.3.2A Simplex Stop-and-Wait Protocol for an Error-Free Channel, 241
3.3.3A Simplex Stop-and-Wait Protocol for a Noisy Channel, 242
3.4 SLIDING WINDOW PROTOCOLS, 246
3.4.1 A One-Bit Sliding Window Protocol, 249
3.4.2A Protocol Using Go-Back-N, 252
3.4.3A Protocol Using Selective Repeat, 259
3.5 EXAMPLE DATA LINK PROTOCOLS, 264
3.5.1 Packet over SONET, 265
3.5.2ADSL (Asymmetric Digital Subscriber Loop), 268
3.6 SUMMARY, 271
4 THE MEDIUM ACCESS CONTROL SUBLAYER 275
4.1 THE CHANNEL ALLOCATION PROBLEM, 276
4.1.1 Static Channel Allocation, 276
4.1.2Assumptions for Dynamic Channel Allocation, 278
4.2MULTIPLE ACCESS PROTOCOLS, 279
4.2.1 ALOHA, 280
4.2.2Carrier Sense Multiple Access Protocols, 284
4.2.3Collision-Free Protocols, 287
4.2.4 Limited-Contention Protocols, 292
4.2.5 Wireless LAN Protocols, 295
4.3ETHERNET, 298
4.3.1 Classic Ethernet Physical Layer, 299
4.3.2Classic Ethernet MAC Sublayer Protocol, 300
4.3.3Ethernet Performance, 304
4.3.4 Switched Ethernet, 306
4.3.5 Fast Ethernet, 308
4.3.6 Gigabit Ethernet, 311
4.3.7 10-Gigabit Ethernet, 314
4.3.8 Retrospective on Ethernet, 316
4.4 WIRELESS LANS, 317
4.4.1 The 802.11 Architecture and Protocol Stack, 317
4.4.2The 802.11 Physical Layer, 319
4.4.3The 802.11 MAC Sublayer Protocol, 321
4.4.4 The 802.11 Frame Structure, 327
4.4.5 Services, 329
4.5 BROADBAND WIRELESS, 330
4.5.1 Comparison of 802.16 with 802.11 and 3G, 331
4.5.2The 802.16 Architecture and Protocol Stack, 332
4.5.3The 802.16 Physical Layer, 334
4.5.4 The 802.16 MAC Sublayer Protocol, 335
4.5.5 The 802.16 Frame Structure, 337
4.6 BLUETOOTH, 338
4.6.1 Bluetooth Architecture, 338
4.6.2Bluetooth Applications, 339
4.6.3The Bluetooth Protocol Stack, 340
4.6.4 The Bluetooth Radio Layer, 342
4.6.5 The Bluetooth Link Layers, 342
4.6.6 The Bluetooth Frame Structure, 343
4.7 RFID, 345
4.7.1 EPC Gen 2Architecture, 345
4.7.2EPC Gen 2Physical Layer, 346
4.7.3EPC Gen 2Tag Identification Layer, 347
4.7.4 Tag Identification Message Formats, 349
4.8 DATA LINK LAYER SWITCHING, 350
4.8.1 Uses of Bridges, 350
4.8.2Learning Bridges, 352
4.8.3Spanning Tree Bridges, 355
4.8.4 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways, 358
4.8.5 Virtual LANs, 360
4.9 SUMMARY, 367
5 THE NETWORK LAYER 373
5.1 NETWORK LAYER DESIGN ISSUES, 373
5.1.1 Store-and-Forward Packet Switching, 374
5.1.2Services Provided to the Transport Layer, 374
5.1.3Implementation of Connectionless Service, 376
5.1.4 Implementation of Connection-Oriented Service, 377
5.1.5 Comparison of Virtual-Circuit and Datagram Networks, 379
5.2ROUTING ALGORITHMS, 380
5.2.1 The Optimality Principle, 382
5.2.2Shortest Path Algorithm, 384
5.2.3Flooding, 386
5.2.4 Distance Vector Routing, 388
5.2.5 Link State Routing, 391
5.2.6 Hierarchical Routing, 396
5.2.7 Broadcast Routing, 398
5.2.8 Multicast Routing, 400
5.2.9 Anycast Routing, 403
5.2.10 Routing for Mobile Hosts, 404
5.2.11 Routing in Ad Hoc Networks, 407
5.3CONGESTION CONTROL ALGORITHMS, 410
5.3.1 Approaches to Congestion Control, 412
5.3.2Traffic-Aware Routing, 413
5.3.3Admission Control, 415
5.3.4 Traffic Throttling, 416
5.3.5 Load Shedding, 419
5.4 QUALITY OF SERVICE, 422
5.4.1 Application Requirements, 423
5.4.2Traffic Shaping, 425
5.4.3Packet Scheduling, 429
5.4.4 Admission Control, 433
5.4.5 Integrated Services, 436
5.4.6 Differentiated Services, 439
5.5 INTERNETWORKING, 442
5.5.1 How Networks Differ, 443
5.5.2How Networks Can Be Connected, 444
5.5.3Tunneling, 447
5.5.4 Internetwork Routing, 449
5.5.5 Packet Fragmentation, 450
5.6 THE NETWORK LAYER IN THE INTERNET, 454
5.6.1 The IP Version 4 Protocol, 457
5.6.2IP Addresses, 460
5.6.3IP Version 6, 473
5.6.4 Internet Control Protocols, 483
5.6.5 Label Switching and MPLS, 488
5.6.6 OSPF—An Interior Gateway Routing Protocol, 492
5.6.7 BGP—The Exterior Gateway Routing Protocol, 497
5.6.8 Internet Multicasting, 502
5.6.9 Mobile IP, 503
5.7 SUMMARY, 506
6 THE TRANSPORT LAYER 513
6.1 THE TRANSPORT SERVICE, 513
6.1.1 Services Provided to the Upper Layers, 514
6.1.2Transport Service Primitives, 516
6.1.3Berkeley Sockets, 518
6.1.4 An Example of Socket Programming: An Internet File Server, 521
6.2ELEMENTS OF TRANSPORT PROTOCOLS, 525
6.2.1 Addressing, 527
6.2.2Connection Establishment, 530
6.2.3Connection Release, 535
6.2.4 Error Control and Flow Control, 540
6.2.5 Multiplexing, 545
6.2.6 Crash Recovery, 545
6.3CONGESTION CONTROL, 548
6.3.1 Desirable Bandwidth Allocation, 549
6.3.2Regulating the Sending Rate, 553
6.3.3Wireless Issues, 557
6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP, 559
6.4.1 Introduction to UDP, 559
6.4.2Remote Procedure Call, 561
6.4.3Real-Time Transport Protocols, 564
6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP, 570
6.5.1 Introduction to TCP, 570
6.5.2The TCP Service Model, 571
6.5.3The TCP Protocol, 574
6.5.4 The TCP Segment Header, 575
6.5.5 TCP Connection Establishment, 578
6.5.6 TCP Connection Release, 580
6.5.7 TCP Connection Management Modeling, 580
6.5.8 TCP Sliding Window, 583
6.5.9 TCP Timer Management, 586
6.5.10 TCP Congestion Control, 589
6.5.11 The Future of TCP, 599
6.6 PERFORMANCE ISSUES, 600
6.6.1 Performance Problems in Computer Networks, 601
6.6.2Network Performance Measurement, 602
6.6.3Host Design for Fast Networks, 604
6.6.4 Fast Segment Processing, 608
6.6.5 Header Compression, 611
6.6.6 Protocols for Long Fat Networks, 613
6.7 DELAY-TOLERANT NETWORKING, 617
6.7.1 DTN Architecture, 618
6.7.2The Bundle Protocol, 621
6.8 SUMMARY, 623
7 THE APPLICATION LAYER 629
7.1 DNS—THE DOMAIN NAME SYSTEM, 629
7.1.1 The DNS Name Space, 630
7.1.2Domain Resource Records, 634
7.1.3Name Servers, 637
7.2ELECTRONIC MAIL, 641
7.2.1 Architecture and Services, 642
7.2.2The User Agent, 644
7.2.3Message Formats, 648
7.2.4 Message Transfer, 655
7.2.5 Final Delivery, 661
7.3THE WORLD WIDE WEB, 664
7.3.1 Architectural Overview, 665
7.3.2Static Web Pages, 680
7.3.3Dynamic Web Pages and Web Applications, 690
7.3.4 HTTP—The HyperText Transfer Protocol, 701
7.3.5 The Mobile Web, 711
7.3.6 Web Search, 713
7.4 STREAMING AUDIO AND VIDEO, 715
7.4.1 Digital Audio, 717
7.4.2Digital Video, 722
7.4.3Streaming Stored Media, 731
7.4.4 Streaming Live Media, 739
7.4.5 Real-Time Conferencing, 742
7.5 CONTENT DELIVERY, 752
7.5.1 Content and Internet Traffic, 754
7.5.2Server Farms and Web Proxies, 756
7.5.3Content Delivery Networks, 761
7.5.4 Peer-to-Peer Networks, 766
7.6 SUMMARY, 775
8 NETWORK SECURITY 781
8.1 CRYPTOGRAPHY, 784
8.1.1 Introduction to Cryptography, 785
8.1.2Substitution Ciphers, 787
8.1.3Transposition Ciphers, 789
8.1.4 One-Time Pads, 790
8.1.5 Two Fundamental Cryptographic Principles, 794
8.2SYMMETRIC-KEY ALGORITHMS, 796
8.2.1 DES—The Data Encryption Standard, 798
8.2.2AES—The Advanced Encryption Standard, 801
8.2.3Cipher Modes, 805
8.2.4 Other Ciphers, 810
8.2.5 Cryptanalysis, 810
8.3PUBLIC-KEY ALGORITHMS, 811
8.3.1 RSA, 812
8.3.2Other Public-Key Algorithms, 814
8.4 DIGITAL SIGNATURES, 815
8.4.1 Symmetric-Key Signatures, 816
8.4.2Public-Key Signatures, 817
8.4.3Message Digests, 818
8.4.4 The Birthday Attack, 822
8.5 MANAGEMENT OF PUBLIC KEYS, 824
8.5.1 Certificates, 825
8.5.2X.509, 827
8.5.3Public Key Infrastructures, 828
8.6 COMMUNICATION SECURITY, 831
8.6.1 IPsec, 832
8.6.2Firewalls, 836
8.6.3Virtual Private Networks, 839
8.6.4 Wireless Security, 840
8.7 AUTHENTICATION PROTOCOLS, 845
8.7.1 Authentication Based on a Shared Secret Key, 846
8.7.2Establishing a Shared Key: The Diffie-Hellman Key Exchange, 851
8.7.3Authentication Using a Key Distribution Center, 853
8.7.4 Authentication Using Kerberos, 856
8.7.5 Authentication Using Public-Key Cryptography, 858
8.8 EMAIL SECURITY, 859
8.8.1 PGP—Pretty Good Privacy, 860
8.8.2S/MIME, 864
8.9 WEB SECURITY, 864
8.9.1 Threats, 865
8.9.2Secure Naming, 866
8.9.3SSL—The Secure Sockets Layer, 871
8.9.4 Mobile Code Security, 875
8.10 SOCIAL ISSUES, 878
8.10.1 Privacy, 878
8.10.2Freedom of Speech, 881
8.10.3Copyright, 885
8.11 SUMMARY, 887
9 READING LIST AND BIBLIOGRAPHY 895
9.1 SUGGESTIONS FOR FURTHER READING, 895
9.1.1 Introduction and General Works, 896
9.1.2The Physical Layer, 897
9.1.3The Data Link Layer, 898
9.1.4 The Medium Access Control Sublayer, 898
9.1.5 The Network Layer, 899
9.1.6 The Transport Layer, 900
9.1.7 The Application Layer, 900
9.1.8 Network Security, 901
9.2ALPHABETICAL BIBLIOGRAPHY, 902
INDEX 921