图书介绍

用TCP/IP进行网际互连 第1卷 原理、协议与结构 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

用TCP/IP进行网际互连 第1卷 原理、协议与结构 英文版
  • 道格拉斯E·科默著 著
  • 出版社: 北京:电子工业出版社
  • ISBN:9787121091612
  • 出版时间:2009
  • 标注页数:651页
  • 文件大小:170MB
  • 文件页数:683页
  • 主题词:计算机网络-通信协议-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

用TCP/IP进行网际互连 第1卷 原理、协议与结构 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Introduction And Overview1

1.1 The Motivation For Internetworking1

1.2 The TCP/IP Internet2

1.3 Internet Services2

1.4 History And Scope Of The Internet5

1.5 The Internet Architecture Board7

1.6 The IAB Reorganization7

1.7 Internet Request For Comments8

1.8 Future Growth And Technology9

1.9 Organization Of The Text10

1.10 Summary10

Chapter 2 Review Of Underlying Network Technologies13

2.1 Introduction13

2.2 Two Approaches To Network Communication14

2.3 Wide Area And Local Area Networks15

2.4 Ethernet Technology16

2.5 Switched Ethernet24

2.6 Asynchronous Transfer Mode25

2.7 Summary27

Chapter 3 Internetworking Concept And Architectural Model31

3.1 Introduction31

3.2 Application-Level Interconnection31

3.3 Network-Level Interconnection32

3.4 Properties Of The Intrenet33

3.5 Internet Architecture34

3.6 Interconnection Through IP Routers35

3.7 The User's View36

3.8 All Networks Are Equal37

3.9 The Unanswered Questions38

3.10 Summary38

Chapter 4 Classful Internet Addresses41

4.1 Introduction41

4.2 Universal Identifiers41

4.3 The Original Classful Addressing Scheme42

4.4 Addresses Specify Network Connections43

4.5 Network And Directed Broadcast Addresses43

4.6 Limited Broadcast44

4.7 The All-Os Address45

4.8 Subnet And Classless Extensions45

4.9 IP Multicast Addresses45

4.10 Weaknesses In Internet Addressing46

4.11 Dotted Decimal Notation47

4.12 Loopback Address48

4.13 Summary Of Special Address Conventions48

4.14 Internet Addressing Authority48

4.15 Reserved Address Prefixes50

4.16 An Example50

4.17 Network Byte Order52

4.18 Summary52

Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)57

5.1 Introduction57

5.2 The Address Resolution Problem57

5.3 Two Types Of Physical Addresses58

5.4 Resolution Through Direct Mapping58

5.5 Resolution Through Dynamic Binding59

5.6 The Address Resolution Cache60

5.7 ARP Cache Timeout61

5.8 ARP Refinements62

5.9 Relationship Of ARP To Other Protocols62

5.10 ARP Implementation62

5.11 ARP Encapsulation And Identification64

5.12 ARP Protocol Format64

5.13 Automatic ARP Cache Revalidation66

5.14 Reverse Address Resolution (RARP)66

5.15 Summary67

Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4)71

6.1 Introduction71

6.2 A Virtual Network71

6.3 Internet Architecture And Philosophy72

6.4 The Conceptual Service Organization72

6.5 Connectionless Delivery System73

6.6 Purpose Of The Internet Protocol73

6.7 The IPv4 Datagram74

6.8 Internet Datagram Options83

6.9 Summary89

Chapter 7 Internet Protocol: Forwarding IP Datagrams93

7.1 Introduction93

7.2 Forwarding In An Internet93

7.3 Direct And Indirect Delivery95

7.4 Table-Driven IP Forwarding97

7.5 Next-Hop Forwarding97

7.6 Default Routes100

7.7 Host-Specific Routes100

7.8 The IP Forwarding Algorithm100

7.9 Forwarding With IP Addresses101

7.10 Handling Incoming Datagrams103

7.11 Establishing Routing Tables104

7.12 Summary104

Chapter 8 Internet Protocol: Error And Control Messages (ICMP)109

8.1 Introduction109

8.2 The Internet Control Message Protocol109

8.3 Error Reporting Vs.Error Correction110

8.4 ICMP Message Delivery111

8.5 ICMP Message Format112

8.6 Testing Destination Reachability And Status (Ping)113

8.7 Echo Request And Reply Message Format114

8.8 Reports Of Unreachable Destinations115

8.9 Congestion And Datagram Flow Control116

8.10 Source Quench Format117

8.11 Route Change Requests From Routers118

8.12 Detecting Circular Or Excessively Long Routes119

8.13 Reporting Other Problems120

8.14 Clock Synchronization And Transit Time Estimation121

8.15 Older ICMP Messages No Longer Needed122

8.16 Summary123

Chapter 9 Classless And Subnet Address Extensions (CIDR)127

9.1 Introduction127

9.2 Review Of Relevant Facts127

9.3 Minimizing Network Numbers128

9.4 Proxy ARP128

9.5 Subnet Addressing130

9.6 Flexibility In Subnet Address Assignment132

9.7 Variable-Length Subnets134

9.8 Implementation Of Subnets With Masks135

9.9 Subnet Mask Representation136

9.10 Forwarding In The Presence Of Subnets137

9.11 The Subnet Forwarding Algorithm138

9.12 A Unified Forwarding Algorithm139

9.13 Maintenance Of Subnet Masks140

9.14 Broadcasting To Subnets140

9.15 Anonymous Point-To-Point Networks141

9.16 Classless Addressing And Supernetting142

9.17 CIDR Address Blocks And Bit Masks143

9.18 Address Blocks And CIDR Notation144

9.19 A Classless Addressing Example145

9.20 Data Structures And Algorithms For Classless Lookup145

9.21 Longest-Match And Mixtures Of Route Types148

9.22 CIDR Blocks Reserved For Private Networks149

9.23 Summary150

Chapter 10 Protocol Layering155

10.1 Introduction155

10.2 The Need For Multiple Protocols155

10.3 The Conceptual Layers Of Protocol Software156

10.4 Functionality Of The Layers159

10.5 X&25 And Its Relation To The ISO Model160

10.6 Locus Of Intelligence163

10.7 The Protocol Layering Principle163

10.8 Layering In The Presence Of Network Substructure166

10.9 Two Important Boundaries In The TCP/IP Model168

10.10 The Disadvantage Of Layering169

10.11 The Basic Idea Behind Multiplexing And Demultiplexing170

10.12 Summary171

Chapter 11 User Datagram Protocol (UDP)175

11.1 Introduction175

11.2 Identifying The Ultimate Destination175

11.3 The User Datagram Protocol176

11.4 Format Of UDP Messages177

11.5 UDP Pseudo-Header178

11.6 UDP Encapsulation And Protocol Layering179

11.7 Layering And The UDP Checksum Computation181

11.8 UDP Multiplexing, Demultiplexing, And Ports181

11.9 Reserved And Available UDP Port Numbers182

11.10 Summary184

Chapter 12 Reliable Stream Transport Service (TCP)187

12.1 Introduction187

12.2 The Need For Stream Delivery187

12.3 Properties Of The Reliable Delivery Service188

12.4 Providing Reliability189

12.5 The Idea Behind Sliding Windows191

12.6 The Transmission Control Protocol193

12.7 Ports, Connections, And Endpoints194

12.8 Passive And Active Opens196

12.9 Segments, Streams, And Sequence Numbers197

12.10 Variable Window Size And Flow Control198

12.11 TCP Segment Format199

12.12 Out Of Band Data200

12.13 TCP Options201

12.14 TCP Checksum Computation203

12.15 Acknowledgements, Retransmission, And Timeouts204

12.16 Accurate Measurement Of Round Trip Samples207

12.17 Karn's Algorithm And Timer Backoff208

12.18 Responding To High Variance In Delay209

12.19 Response To Congestion211

12.20 Fast Recovery And Other Modifications213

12.21 Explicit Feedback Mechanisms (SACK and ECN)215

12.22 Congestion, Tail Drop, And TCP216

12.23 Random Early Detection (RED)217

12.24 Establishing A TCP Connection219

12.25 Initial Sequence Numbers220

12.26 Closing a TCP Connection221

12.27 TCP Connection Reset222

12.28 TCP State Machine222

12.29 Forcing Data Delivery224

12.30 Reserved TCP Port Numbers224

12.31 TCP Performance225

12.32 Silly Window Syndrome And Small Packets226

12.33 Avoiding Silly Window Syndrome227

12.34 Summary230

Chapter 13 Routing Architecture: Cores, Peers, And Algorithms235

13.1 Introduction235

13.2 The Origin Of Routing Tables236

13.3 Forwarding With Partial Information237

13.4 Original Internet Architecture And Cores238

13.5 Beyond The Core Architecture To Peer Backbones240

13.6 Automatic Route Propagation241

13.7 Distance Vector (Bellman-Ford) Routing241

13.8 Reliability And Routing Protocols243

13.9 Link-State (SPF) Routing243

13.10 Summary244

Chapter 14 Routing Between Peers (BGP)249

14.1 Introduction249

14.2 Routing Update Protocol Scope249

14.3 Determining A Practical Limit On Group Size250

14.4 A Fundamental Idea: Extra Hops251

14.5 Autonomous System Concept253

14.6 Exterior Gateway Protocols And Reachability254

14.7 BGP Characteristics255

14.8 BGP Functionality And Message Types256

14.9 BGP Message Header256

14.10 BGP OPEN Message257

14.11 BGP UPDATE Message259

14.12 Compressed Mask-Address Pairs259

14.13 BGP Path Attributes260

14.14 BGP KEEPALIVE Message262

14.15 Information From The Receiver's Perspective262

14.16 The Key Restriction Of Exterior Gateway Protocols263

14.17 The Internet Routing Architecture265

14.18 BGP NOTIFICATION Message266

14.19 Summary267

Chapter 15 Routing Within An Autonomous System (RIP, OSPF)271

15.1 Introduction271

15.2 Static Vs.Dynamic Interior Routes271

15.3 Routing Information Protocol (RIP)274

15.4 Slow Convergence Problem276

15.5 Solving The Slow Convergence Problem277

15.6 RIP1 Message Format278

15.7 RIP2 Address Conventions280

15.8 RIP Route Interpretation And Aggregation280

15.9 RIP2 Extensions And Message Format281

15.10 The Disadvantage Of RIP Hop Counts282

15.11 Delay Metric (HELLO)283

15.12 Delay Metrics And Oscillation283

15.13 Combining RIP, Hello, And BGP285

15.14 Gated: Inter-Autoncnous System Communication286

15.15 The Open SPF Protocol (OSPF)286

15.16 Routing With Partial Information293

15.17 Summary293

Chapter 16 Internet Multicasting297

16.1 Introduction297

16.2 Hardware Broadcast297

16.3 Hardware Origins Of Multicast298

16.4 Ethernet Multicast299

16.5 IP Multicast299

16.6 The Conceptual Pieces300

16.7 IP Multicast Addresses301

16.8 Multicast Address Semantics302

16.9 Mapping IP Multicast To Ethernet Multicast303

16.10 Hosts And Multicast Delivery303

16.11 Multicast Scope304

16.12 Extending Host Software To Handle Multicasting305

16.13 Internet Group Management Protocol305

16.14 IGMP Implementation306

16.15 Group Membership State Transitions308

16.16 IGMP Membership Query Message Format309

16.17 IGMP Membership Report Message Format310

16.18 Multicast Forwarding And Routing Information312

16.19 Basic Multicast Forwarding Paradigms313

16.20 Consequences Of TRPF315

16.21 Multicast Trees317

16.22 The Essence Of Multicast Route Propagation318

16.23 Reverse Path Multicasting318

16.24 Multicast Routing Protocols319

16.25 Reliable Multicast And ACK Implosions322

16.26 Summary323

Chapter 17 IP Switching And MPLS327

17.1 Introduction327

17.2 Switching Technology327

17.3 Large Networks, Label Swapping, And Paths328

17.4 Using Switching With IP329

17.5 IP Switching Technologies And MPLS330

17.6 Classification, Flows, And Higher Layer Switching331

17.7 Hierarchical Use Of MPLS331

17.8 MPLS Encapsulation332

17.9 Label Switching Router333

17.10 Control Processing And Label Distribution334

17.11 MPLS And Fragmentation334

17.12 Mesh Topology And Traffic Engineering335

17.13 Summary336

Chapter 18 Mobile IP339

18.1 Introduction339

18.2 Mobility, Routing, and Addressing339

18.3 Mobile IP Characteristics340

18.4 Overview Of Mobile IP Operation340

18.5 Mobile Addressing Details341

18.6 Foreign Agent Discovery341

18.7 Agent Registration342

18.8 Registration Message Format343

18.9 Communication With A Foreign Agent344

18.10 Datagram Transmission And Reception344

18.11 The Two-Crossing Problem345

18.12 Communication With Computers On the Home Network346

18.13 Summary346

Chapter 19 Private Network Interconnection (NAT, VPN)349

19.1 Introduction349

19.2 Private And Hybrid Networks349

19.3 VPN Addressing And Routing351

19.4 Extending VPN Technology To Individual Hosts352

19.5 A VPN With Private Addresses352

19.6 Network Address Translation (NAT)353

19.7 NAT Translation Table Creation354

19.8 Multi-Address NAT355

19.9 Port-Mapped NAT356

19.10 Interaction Between NAT And ICMP357

19.11 Interaction Between NAT And Applications358

19.12 NAT In The Presence Of Fragmentation358

19.13 Conceptual Address Domains359

19.14 Slirp And Iptables359

19.15 Summary360

Chapter 20 Client-Server Model Of Interaction363

20.1 Introduction363

20.2 The Client-Server Model363

20.3 A Simple Example: UDP Echo Server364

20.4 Time And Date Service366

20.5 The Complexity of Servers366

20.6 Broadcasting A Request368

20.7 Alternatives To The Client-Server Model368

20.8 Summary369

Chapter 21 The Socket Interface373

21.1 Introduction373

21.2 The UNIX I/O Paradigm And Network I/O373

21.3 Adding Network I/O to UNIX374

21.4 The Socket Abstraction375

21.5 Creating A Socket375

21.6 Socket Inheritance And Termination375

21.7 Specifying A Local Address376

21.8 Connecting Sockets To Destination Addresses377

21.9 Sending Data Through A Socket378

21.10 Receiving Data Through A Socket380

21.11 Obtaining Local And Remote Socket Addresses381

21.12 Obtaining And Setting Socket Options382

21.13 Specifying A Queue Length For A Server383

21.14 How A Server Accepts Connections383

21.15 Servers That Handle Multiple Services384

21.16 Obtaining And Setting Host Names385

21.17 Obtaining And Setting The Internal Host Domain386

21.18 Socket Library Calls386

21.19 Network Byte Order Conversion Routines387

21.20 IP Address Manipulation Routines389

21.21 Accessing The Domain Name System390

21.22 Obtaining Information About Hosts391

21.23 Obtaining Information About Networks392

21.24 Obtaining Information About Protocols393

21.25 Obtaining Information About Network Services393

21.26 An Example Client394

21.27 An Example Server396

21.28 Summary399

Chapter 22 Bootstrap And Autoconfiguration (DHCP)403

22.1 Introduction403

22.2 History Of Bootstrapping403

22.3 Using IP To Determine An IP Address404

22.4 The DHCP Retransmission Policy405

22.5 The DHCP Message Format405

22.6 The Need For Dynamic Configuration408

22.7 DHCP Lease Concept409

22.8 Multiple Addresses And Relays409

22.9 Address Acquisition States410

22.10 Early Lease Termination411

22.11 Lease Renewal States412

22.12 DHCP Options And Message Type413

22.13 Option Overload414

22.14 DHCP And Domain Names414

22.15 Summary414

Chapter 23 The Domain Name System (DNS)419

23.1 Introduction419

23.2 Names For Machines420

23.3 Flat Namespace420

23.4 Hierarchical Names421

23.5 Delegation Of Authority For Names422

23.6 Subset Authority422

23.7 Internet Domain Names423

23.8 Top-Level Domains424

23.9 Name Syntax And Type426

23.10 Mapping Domain Names To Addresses427

23.11 Domain Name Resolution429

23.12 Efficient Translation430

23.13 Caching: The Key To Efficiency431

23.14 Domain Name System Message Format431

23.15 Compressed Name Format435

23.16 Abbreviation Of Domain Names435

23.17 Inverse Mappings436

23.18 Pointer Queries437

23.19 Object Types And Resource Record Contents437

23.20 Obtaining Authority For A Subdomain439

23.21 Dynamic DNS Update And Notification439

23.22 DNS Security Extensions (DNSSEC)440

23.23 Summary441

Chapter 24 Remote Login And Desktop (TELNET, SSH)445

24.1 Introduction445

24.2 Remote Interactive Computing445

24.3 TELNET Protocol446

24.4 Accommodating Heterogeneity448

24.5 Passing Commands That Control The Remote Side449

24.6 Forcing The Server To Read A Control Function450

24.7 TELNET Options452

24.8 TELNET Option Negotiation452

24.9 Secure Shell (SSH)453

24.10 Other Remote Access Technologies455

24.11 Summary455

Chapter 25 File Transfer And Access (FTP, TFTP, NFS)459

25.1 Introduction459

25.2 Remote File Access, Transfer, And Storage Networks459

25.3 On-line Shared Access460

25.4 Sharing By File Transfer461

25.5 FTP: The Major TCP/IP File Transfer Protocol461

25.6 FTP Features461

25.7 FTP Process Model462

25.8 TCP Port Numbers And Data Connections463

25.9 The User's View Of FTP464

25.10 Anonymous FTP464

25.11 Secure File Transfer (SSL-FTP, Scp, Sftp)464

25.12 TFTP465

25.13 NFS467

25.14 Implementation Of NFS (RPC And XDR)468

25.15 Summary469

Chapter 26 Electronic Mail (SMTP, POP, IMAP, MIME)473

26.1 Introduction473

26.2 Electronic Mail473

26.3 Mailbox Names And Aliases474

26.4 Alias Expansion And Mail Forwarding475

26.5 TCP/IP Standards For Electronic Mail Service476

26.6 Simple Mail Transfer Protocol (SMTP)477

26.7 Mail Retrieval And Mailbox Manipulation Protocols479

26.8 The MIME Extensions For Non-ASCII Data480

26.9 MIME Multipart Messages482

26.10 Summary483

Chapter 27 World Wide Web (HTTP)487

27.1 Introduction487

27.2 Importance Of The Web487

27.3 Architectural Components488

27.4 Uniform Resource Locators488

27.5 An Example Document489

27.6 Hypertext Transfer Protocol490

27.7 HTTP GET Request490

27.8 Error Messages491

27.9 Persistent Connections And Lengths492

27.10 Data Length And Program Output492

27.11 Length Encoding And Headers493

27.12 Negotiation494

27.13 Conditional Requests495

27.14 Proxy Servers And Caching495

27.15 Caching496

27.16 Other HTTP Functionality497

27.17 HTTP, Security, And E-Commerce497

27.18 Summary498

Chapter 28 Voice And Video Over IP (RTP, RSVP, QoS)501

28.1 Introduction501

28.2 Digitizing And Encoding501

28.3 Audio And Video Transmission And Reproduction502

28.4 Jitter And Playback Delay503

28.5 Real-time Transport Protocol (RTP)504

28.6 Streams, Mixing, And Multicasting505

28.7 RTP Encapsulation506

28.8 RTP Control Protocol (RTCP)506

28.9 RTCP Operation506

28.10 IP Telephony And Signaling508

28.11 Quality Of Service Controversy510

28.12 QoS, Utilization, And Capacity511

28.13 IntServ Resource Reservation (RSVP)511

28.14 IntServ Enforcement (COPS)512

28.15 DiffServ And Per-Hop Behavior513

28.16 Traffic Scheduling513

28.17 Traffic Policing515

28.18 Summary515

Chapter 29 Network Management (SNMP)519

29.1 Introduction519

29.2 The Level Of Management Protocols519

29.3 Architectural Model520

29.4 Protocol Framework522

29.5 Examples of MIB Variables523

29.6 The Structure Of Management Information524

29.7 Formal Definitions Using ASN.1525

29.8 Structure And Representation Of MIB Object Names525

29.9 Simple Network Management Protocol530

29.10 SNMP Message Format532

29.11 An Example Encoded SNMP Message535

29.12 New Features In SNMPv3538

29.13 Summary538

Chapter 30 Internet Security And Firewall Design (IPsec, SSL)543

30.1 Introduction543

30.2 Protecting Resources544

30.3 Information Policy545

30.4 Internet Security545

30.5 IP Security (IPsec)546

30.6 IPsec Authentication Header546

30.7 Security Association547

30.8 IPsec Encapsulating Security Payload548

30.9 Authentication And Mutable Header Fields549

30.10 IPsec Tunneling550

30.11 Required Security Algorithms550

30.12 Secure Sockets (SSL and TLS)551

30.13 Firewalls And Internet Access551

30.14 Multiple Connections And Weakest Links552

30.15 Firewall Implementation And Packet Filters552

30.16 Security And Packet Filter Specification553

30.17 The Consequence Of Restricted Access For Clients554

30.18 Stateful Firewalls554

30.19 Content Protection And Proxies555

30.20 Monitoring And Logging556

30.21 Summary556

Chapter 31 A Next Generation IP (IPv6)561

31.1 Introduction561

31.2 Why Change?561

31.3 Beyond IPv4562

31.4 The Road To A New Version Of IP562

31.5 The Name Of The Next IP562

31.6 Features Of IPv6563

31.7 General Form Of An IPv6 Datagram564

31.8 IPv6 Base Header Format564

31.9 IPv6 Extension Headers566

31.10 Parsing An IPv6 Datagram566

31.11 IPv6 Fragmentation And Reassembly567

31.12 The Consequence Of End-To-End Fragmentation568

31.13 IPv6 Source Routing569

31.14 IPv6 Options569

31.15 Size Of The IPv6 Address Space571

31.16 IPv6 Colon Hexadecimal Notation571

31.17 Three Basic IPv6 Address Types572

31.18 The Duality Of Broadcast And Multicast573

31.19 An Engineering Choice And Simulated Broadcast573

31.20 Proposed IPv6 Address Space Assignment574

31.21 Embedded IPv4 Addresses And Transition574

31.22 Unspecified And Loopback Addresses576

31.23 Unicast Address Structure577

31.24 Interface Identifiers577

31.25 Local Addresses578

31.26 Autoconfiguration And Renumbering578

31.27 Summary579

Appendix 1 A Look At RFCs582

Appendix 2 Glossary Of Internetworking Terms And Abbreviations586

Bibliography626

Index634

热门推荐