图书介绍
用TCP/IP进行网际互连 第1卷 原理、协议与结构 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- 道格拉斯E·科默著 著
- 出版社: 北京:电子工业出版社
- ISBN:9787121091612
- 出版时间:2009
- 标注页数:651页
- 文件大小:170MB
- 文件页数:683页
- 主题词:计算机网络-通信协议-教材-英文
PDF下载
下载说明
用TCP/IP进行网际互连 第1卷 原理、协议与结构 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction And Overview1
1.1 The Motivation For Internetworking1
1.2 The TCP/IP Internet2
1.3 Internet Services2
1.4 History And Scope Of The Internet5
1.5 The Internet Architecture Board7
1.6 The IAB Reorganization7
1.7 Internet Request For Comments8
1.8 Future Growth And Technology9
1.9 Organization Of The Text10
1.10 Summary10
Chapter 2 Review Of Underlying Network Technologies13
2.1 Introduction13
2.2 Two Approaches To Network Communication14
2.3 Wide Area And Local Area Networks15
2.4 Ethernet Technology16
2.5 Switched Ethernet24
2.6 Asynchronous Transfer Mode25
2.7 Summary27
Chapter 3 Internetworking Concept And Architectural Model31
3.1 Introduction31
3.2 Application-Level Interconnection31
3.3 Network-Level Interconnection32
3.4 Properties Of The Intrenet33
3.5 Internet Architecture34
3.6 Interconnection Through IP Routers35
3.7 The User's View36
3.8 All Networks Are Equal37
3.9 The Unanswered Questions38
3.10 Summary38
Chapter 4 Classful Internet Addresses41
4.1 Introduction41
4.2 Universal Identifiers41
4.3 The Original Classful Addressing Scheme42
4.4 Addresses Specify Network Connections43
4.5 Network And Directed Broadcast Addresses43
4.6 Limited Broadcast44
4.7 The All-Os Address45
4.8 Subnet And Classless Extensions45
4.9 IP Multicast Addresses45
4.10 Weaknesses In Internet Addressing46
4.11 Dotted Decimal Notation47
4.12 Loopback Address48
4.13 Summary Of Special Address Conventions48
4.14 Internet Addressing Authority48
4.15 Reserved Address Prefixes50
4.16 An Example50
4.17 Network Byte Order52
4.18 Summary52
Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)57
5.1 Introduction57
5.2 The Address Resolution Problem57
5.3 Two Types Of Physical Addresses58
5.4 Resolution Through Direct Mapping58
5.5 Resolution Through Dynamic Binding59
5.6 The Address Resolution Cache60
5.7 ARP Cache Timeout61
5.8 ARP Refinements62
5.9 Relationship Of ARP To Other Protocols62
5.10 ARP Implementation62
5.11 ARP Encapsulation And Identification64
5.12 ARP Protocol Format64
5.13 Automatic ARP Cache Revalidation66
5.14 Reverse Address Resolution (RARP)66
5.15 Summary67
Chapter 6 Internet Protocol: Connectionless Datagram Delivery (IPv4)71
6.1 Introduction71
6.2 A Virtual Network71
6.3 Internet Architecture And Philosophy72
6.4 The Conceptual Service Organization72
6.5 Connectionless Delivery System73
6.6 Purpose Of The Internet Protocol73
6.7 The IPv4 Datagram74
6.8 Internet Datagram Options83
6.9 Summary89
Chapter 7 Internet Protocol: Forwarding IP Datagrams93
7.1 Introduction93
7.2 Forwarding In An Internet93
7.3 Direct And Indirect Delivery95
7.4 Table-Driven IP Forwarding97
7.5 Next-Hop Forwarding97
7.6 Default Routes100
7.7 Host-Specific Routes100
7.8 The IP Forwarding Algorithm100
7.9 Forwarding With IP Addresses101
7.10 Handling Incoming Datagrams103
7.11 Establishing Routing Tables104
7.12 Summary104
Chapter 8 Internet Protocol: Error And Control Messages (ICMP)109
8.1 Introduction109
8.2 The Internet Control Message Protocol109
8.3 Error Reporting Vs.Error Correction110
8.4 ICMP Message Delivery111
8.5 ICMP Message Format112
8.6 Testing Destination Reachability And Status (Ping)113
8.7 Echo Request And Reply Message Format114
8.8 Reports Of Unreachable Destinations115
8.9 Congestion And Datagram Flow Control116
8.10 Source Quench Format117
8.11 Route Change Requests From Routers118
8.12 Detecting Circular Or Excessively Long Routes119
8.13 Reporting Other Problems120
8.14 Clock Synchronization And Transit Time Estimation121
8.15 Older ICMP Messages No Longer Needed122
8.16 Summary123
Chapter 9 Classless And Subnet Address Extensions (CIDR)127
9.1 Introduction127
9.2 Review Of Relevant Facts127
9.3 Minimizing Network Numbers128
9.4 Proxy ARP128
9.5 Subnet Addressing130
9.6 Flexibility In Subnet Address Assignment132
9.7 Variable-Length Subnets134
9.8 Implementation Of Subnets With Masks135
9.9 Subnet Mask Representation136
9.10 Forwarding In The Presence Of Subnets137
9.11 The Subnet Forwarding Algorithm138
9.12 A Unified Forwarding Algorithm139
9.13 Maintenance Of Subnet Masks140
9.14 Broadcasting To Subnets140
9.15 Anonymous Point-To-Point Networks141
9.16 Classless Addressing And Supernetting142
9.17 CIDR Address Blocks And Bit Masks143
9.18 Address Blocks And CIDR Notation144
9.19 A Classless Addressing Example145
9.20 Data Structures And Algorithms For Classless Lookup145
9.21 Longest-Match And Mixtures Of Route Types148
9.22 CIDR Blocks Reserved For Private Networks149
9.23 Summary150
Chapter 10 Protocol Layering155
10.1 Introduction155
10.2 The Need For Multiple Protocols155
10.3 The Conceptual Layers Of Protocol Software156
10.4 Functionality Of The Layers159
10.5 X&25 And Its Relation To The ISO Model160
10.6 Locus Of Intelligence163
10.7 The Protocol Layering Principle163
10.8 Layering In The Presence Of Network Substructure166
10.9 Two Important Boundaries In The TCP/IP Model168
10.10 The Disadvantage Of Layering169
10.11 The Basic Idea Behind Multiplexing And Demultiplexing170
10.12 Summary171
Chapter 11 User Datagram Protocol (UDP)175
11.1 Introduction175
11.2 Identifying The Ultimate Destination175
11.3 The User Datagram Protocol176
11.4 Format Of UDP Messages177
11.5 UDP Pseudo-Header178
11.6 UDP Encapsulation And Protocol Layering179
11.7 Layering And The UDP Checksum Computation181
11.8 UDP Multiplexing, Demultiplexing, And Ports181
11.9 Reserved And Available UDP Port Numbers182
11.10 Summary184
Chapter 12 Reliable Stream Transport Service (TCP)187
12.1 Introduction187
12.2 The Need For Stream Delivery187
12.3 Properties Of The Reliable Delivery Service188
12.4 Providing Reliability189
12.5 The Idea Behind Sliding Windows191
12.6 The Transmission Control Protocol193
12.7 Ports, Connections, And Endpoints194
12.8 Passive And Active Opens196
12.9 Segments, Streams, And Sequence Numbers197
12.10 Variable Window Size And Flow Control198
12.11 TCP Segment Format199
12.12 Out Of Band Data200
12.13 TCP Options201
12.14 TCP Checksum Computation203
12.15 Acknowledgements, Retransmission, And Timeouts204
12.16 Accurate Measurement Of Round Trip Samples207
12.17 Karn's Algorithm And Timer Backoff208
12.18 Responding To High Variance In Delay209
12.19 Response To Congestion211
12.20 Fast Recovery And Other Modifications213
12.21 Explicit Feedback Mechanisms (SACK and ECN)215
12.22 Congestion, Tail Drop, And TCP216
12.23 Random Early Detection (RED)217
12.24 Establishing A TCP Connection219
12.25 Initial Sequence Numbers220
12.26 Closing a TCP Connection221
12.27 TCP Connection Reset222
12.28 TCP State Machine222
12.29 Forcing Data Delivery224
12.30 Reserved TCP Port Numbers224
12.31 TCP Performance225
12.32 Silly Window Syndrome And Small Packets226
12.33 Avoiding Silly Window Syndrome227
12.34 Summary230
Chapter 13 Routing Architecture: Cores, Peers, And Algorithms235
13.1 Introduction235
13.2 The Origin Of Routing Tables236
13.3 Forwarding With Partial Information237
13.4 Original Internet Architecture And Cores238
13.5 Beyond The Core Architecture To Peer Backbones240
13.6 Automatic Route Propagation241
13.7 Distance Vector (Bellman-Ford) Routing241
13.8 Reliability And Routing Protocols243
13.9 Link-State (SPF) Routing243
13.10 Summary244
Chapter 14 Routing Between Peers (BGP)249
14.1 Introduction249
14.2 Routing Update Protocol Scope249
14.3 Determining A Practical Limit On Group Size250
14.4 A Fundamental Idea: Extra Hops251
14.5 Autonomous System Concept253
14.6 Exterior Gateway Protocols And Reachability254
14.7 BGP Characteristics255
14.8 BGP Functionality And Message Types256
14.9 BGP Message Header256
14.10 BGP OPEN Message257
14.11 BGP UPDATE Message259
14.12 Compressed Mask-Address Pairs259
14.13 BGP Path Attributes260
14.14 BGP KEEPALIVE Message262
14.15 Information From The Receiver's Perspective262
14.16 The Key Restriction Of Exterior Gateway Protocols263
14.17 The Internet Routing Architecture265
14.18 BGP NOTIFICATION Message266
14.19 Summary267
Chapter 15 Routing Within An Autonomous System (RIP, OSPF)271
15.1 Introduction271
15.2 Static Vs.Dynamic Interior Routes271
15.3 Routing Information Protocol (RIP)274
15.4 Slow Convergence Problem276
15.5 Solving The Slow Convergence Problem277
15.6 RIP1 Message Format278
15.7 RIP2 Address Conventions280
15.8 RIP Route Interpretation And Aggregation280
15.9 RIP2 Extensions And Message Format281
15.10 The Disadvantage Of RIP Hop Counts282
15.11 Delay Metric (HELLO)283
15.12 Delay Metrics And Oscillation283
15.13 Combining RIP, Hello, And BGP285
15.14 Gated: Inter-Autoncnous System Communication286
15.15 The Open SPF Protocol (OSPF)286
15.16 Routing With Partial Information293
15.17 Summary293
Chapter 16 Internet Multicasting297
16.1 Introduction297
16.2 Hardware Broadcast297
16.3 Hardware Origins Of Multicast298
16.4 Ethernet Multicast299
16.5 IP Multicast299
16.6 The Conceptual Pieces300
16.7 IP Multicast Addresses301
16.8 Multicast Address Semantics302
16.9 Mapping IP Multicast To Ethernet Multicast303
16.10 Hosts And Multicast Delivery303
16.11 Multicast Scope304
16.12 Extending Host Software To Handle Multicasting305
16.13 Internet Group Management Protocol305
16.14 IGMP Implementation306
16.15 Group Membership State Transitions308
16.16 IGMP Membership Query Message Format309
16.17 IGMP Membership Report Message Format310
16.18 Multicast Forwarding And Routing Information312
16.19 Basic Multicast Forwarding Paradigms313
16.20 Consequences Of TRPF315
16.21 Multicast Trees317
16.22 The Essence Of Multicast Route Propagation318
16.23 Reverse Path Multicasting318
16.24 Multicast Routing Protocols319
16.25 Reliable Multicast And ACK Implosions322
16.26 Summary323
Chapter 17 IP Switching And MPLS327
17.1 Introduction327
17.2 Switching Technology327
17.3 Large Networks, Label Swapping, And Paths328
17.4 Using Switching With IP329
17.5 IP Switching Technologies And MPLS330
17.6 Classification, Flows, And Higher Layer Switching331
17.7 Hierarchical Use Of MPLS331
17.8 MPLS Encapsulation332
17.9 Label Switching Router333
17.10 Control Processing And Label Distribution334
17.11 MPLS And Fragmentation334
17.12 Mesh Topology And Traffic Engineering335
17.13 Summary336
Chapter 18 Mobile IP339
18.1 Introduction339
18.2 Mobility, Routing, and Addressing339
18.3 Mobile IP Characteristics340
18.4 Overview Of Mobile IP Operation340
18.5 Mobile Addressing Details341
18.6 Foreign Agent Discovery341
18.7 Agent Registration342
18.8 Registration Message Format343
18.9 Communication With A Foreign Agent344
18.10 Datagram Transmission And Reception344
18.11 The Two-Crossing Problem345
18.12 Communication With Computers On the Home Network346
18.13 Summary346
Chapter 19 Private Network Interconnection (NAT, VPN)349
19.1 Introduction349
19.2 Private And Hybrid Networks349
19.3 VPN Addressing And Routing351
19.4 Extending VPN Technology To Individual Hosts352
19.5 A VPN With Private Addresses352
19.6 Network Address Translation (NAT)353
19.7 NAT Translation Table Creation354
19.8 Multi-Address NAT355
19.9 Port-Mapped NAT356
19.10 Interaction Between NAT And ICMP357
19.11 Interaction Between NAT And Applications358
19.12 NAT In The Presence Of Fragmentation358
19.13 Conceptual Address Domains359
19.14 Slirp And Iptables359
19.15 Summary360
Chapter 20 Client-Server Model Of Interaction363
20.1 Introduction363
20.2 The Client-Server Model363
20.3 A Simple Example: UDP Echo Server364
20.4 Time And Date Service366
20.5 The Complexity of Servers366
20.6 Broadcasting A Request368
20.7 Alternatives To The Client-Server Model368
20.8 Summary369
Chapter 21 The Socket Interface373
21.1 Introduction373
21.2 The UNIX I/O Paradigm And Network I/O373
21.3 Adding Network I/O to UNIX374
21.4 The Socket Abstraction375
21.5 Creating A Socket375
21.6 Socket Inheritance And Termination375
21.7 Specifying A Local Address376
21.8 Connecting Sockets To Destination Addresses377
21.9 Sending Data Through A Socket378
21.10 Receiving Data Through A Socket380
21.11 Obtaining Local And Remote Socket Addresses381
21.12 Obtaining And Setting Socket Options382
21.13 Specifying A Queue Length For A Server383
21.14 How A Server Accepts Connections383
21.15 Servers That Handle Multiple Services384
21.16 Obtaining And Setting Host Names385
21.17 Obtaining And Setting The Internal Host Domain386
21.18 Socket Library Calls386
21.19 Network Byte Order Conversion Routines387
21.20 IP Address Manipulation Routines389
21.21 Accessing The Domain Name System390
21.22 Obtaining Information About Hosts391
21.23 Obtaining Information About Networks392
21.24 Obtaining Information About Protocols393
21.25 Obtaining Information About Network Services393
21.26 An Example Client394
21.27 An Example Server396
21.28 Summary399
Chapter 22 Bootstrap And Autoconfiguration (DHCP)403
22.1 Introduction403
22.2 History Of Bootstrapping403
22.3 Using IP To Determine An IP Address404
22.4 The DHCP Retransmission Policy405
22.5 The DHCP Message Format405
22.6 The Need For Dynamic Configuration408
22.7 DHCP Lease Concept409
22.8 Multiple Addresses And Relays409
22.9 Address Acquisition States410
22.10 Early Lease Termination411
22.11 Lease Renewal States412
22.12 DHCP Options And Message Type413
22.13 Option Overload414
22.14 DHCP And Domain Names414
22.15 Summary414
Chapter 23 The Domain Name System (DNS)419
23.1 Introduction419
23.2 Names For Machines420
23.3 Flat Namespace420
23.4 Hierarchical Names421
23.5 Delegation Of Authority For Names422
23.6 Subset Authority422
23.7 Internet Domain Names423
23.8 Top-Level Domains424
23.9 Name Syntax And Type426
23.10 Mapping Domain Names To Addresses427
23.11 Domain Name Resolution429
23.12 Efficient Translation430
23.13 Caching: The Key To Efficiency431
23.14 Domain Name System Message Format431
23.15 Compressed Name Format435
23.16 Abbreviation Of Domain Names435
23.17 Inverse Mappings436
23.18 Pointer Queries437
23.19 Object Types And Resource Record Contents437
23.20 Obtaining Authority For A Subdomain439
23.21 Dynamic DNS Update And Notification439
23.22 DNS Security Extensions (DNSSEC)440
23.23 Summary441
Chapter 24 Remote Login And Desktop (TELNET, SSH)445
24.1 Introduction445
24.2 Remote Interactive Computing445
24.3 TELNET Protocol446
24.4 Accommodating Heterogeneity448
24.5 Passing Commands That Control The Remote Side449
24.6 Forcing The Server To Read A Control Function450
24.7 TELNET Options452
24.8 TELNET Option Negotiation452
24.9 Secure Shell (SSH)453
24.10 Other Remote Access Technologies455
24.11 Summary455
Chapter 25 File Transfer And Access (FTP, TFTP, NFS)459
25.1 Introduction459
25.2 Remote File Access, Transfer, And Storage Networks459
25.3 On-line Shared Access460
25.4 Sharing By File Transfer461
25.5 FTP: The Major TCP/IP File Transfer Protocol461
25.6 FTP Features461
25.7 FTP Process Model462
25.8 TCP Port Numbers And Data Connections463
25.9 The User's View Of FTP464
25.10 Anonymous FTP464
25.11 Secure File Transfer (SSL-FTP, Scp, Sftp)464
25.12 TFTP465
25.13 NFS467
25.14 Implementation Of NFS (RPC And XDR)468
25.15 Summary469
Chapter 26 Electronic Mail (SMTP, POP, IMAP, MIME)473
26.1 Introduction473
26.2 Electronic Mail473
26.3 Mailbox Names And Aliases474
26.4 Alias Expansion And Mail Forwarding475
26.5 TCP/IP Standards For Electronic Mail Service476
26.6 Simple Mail Transfer Protocol (SMTP)477
26.7 Mail Retrieval And Mailbox Manipulation Protocols479
26.8 The MIME Extensions For Non-ASCII Data480
26.9 MIME Multipart Messages482
26.10 Summary483
Chapter 27 World Wide Web (HTTP)487
27.1 Introduction487
27.2 Importance Of The Web487
27.3 Architectural Components488
27.4 Uniform Resource Locators488
27.5 An Example Document489
27.6 Hypertext Transfer Protocol490
27.7 HTTP GET Request490
27.8 Error Messages491
27.9 Persistent Connections And Lengths492
27.10 Data Length And Program Output492
27.11 Length Encoding And Headers493
27.12 Negotiation494
27.13 Conditional Requests495
27.14 Proxy Servers And Caching495
27.15 Caching496
27.16 Other HTTP Functionality497
27.17 HTTP, Security, And E-Commerce497
27.18 Summary498
Chapter 28 Voice And Video Over IP (RTP, RSVP, QoS)501
28.1 Introduction501
28.2 Digitizing And Encoding501
28.3 Audio And Video Transmission And Reproduction502
28.4 Jitter And Playback Delay503
28.5 Real-time Transport Protocol (RTP)504
28.6 Streams, Mixing, And Multicasting505
28.7 RTP Encapsulation506
28.8 RTP Control Protocol (RTCP)506
28.9 RTCP Operation506
28.10 IP Telephony And Signaling508
28.11 Quality Of Service Controversy510
28.12 QoS, Utilization, And Capacity511
28.13 IntServ Resource Reservation (RSVP)511
28.14 IntServ Enforcement (COPS)512
28.15 DiffServ And Per-Hop Behavior513
28.16 Traffic Scheduling513
28.17 Traffic Policing515
28.18 Summary515
Chapter 29 Network Management (SNMP)519
29.1 Introduction519
29.2 The Level Of Management Protocols519
29.3 Architectural Model520
29.4 Protocol Framework522
29.5 Examples of MIB Variables523
29.6 The Structure Of Management Information524
29.7 Formal Definitions Using ASN.1525
29.8 Structure And Representation Of MIB Object Names525
29.9 Simple Network Management Protocol530
29.10 SNMP Message Format532
29.11 An Example Encoded SNMP Message535
29.12 New Features In SNMPv3538
29.13 Summary538
Chapter 30 Internet Security And Firewall Design (IPsec, SSL)543
30.1 Introduction543
30.2 Protecting Resources544
30.3 Information Policy545
30.4 Internet Security545
30.5 IP Security (IPsec)546
30.6 IPsec Authentication Header546
30.7 Security Association547
30.8 IPsec Encapsulating Security Payload548
30.9 Authentication And Mutable Header Fields549
30.10 IPsec Tunneling550
30.11 Required Security Algorithms550
30.12 Secure Sockets (SSL and TLS)551
30.13 Firewalls And Internet Access551
30.14 Multiple Connections And Weakest Links552
30.15 Firewall Implementation And Packet Filters552
30.16 Security And Packet Filter Specification553
30.17 The Consequence Of Restricted Access For Clients554
30.18 Stateful Firewalls554
30.19 Content Protection And Proxies555
30.20 Monitoring And Logging556
30.21 Summary556
Chapter 31 A Next Generation IP (IPv6)561
31.1 Introduction561
31.2 Why Change?561
31.3 Beyond IPv4562
31.4 The Road To A New Version Of IP562
31.5 The Name Of The Next IP562
31.6 Features Of IPv6563
31.7 General Form Of An IPv6 Datagram564
31.8 IPv6 Base Header Format564
31.9 IPv6 Extension Headers566
31.10 Parsing An IPv6 Datagram566
31.11 IPv6 Fragmentation And Reassembly567
31.12 The Consequence Of End-To-End Fragmentation568
31.13 IPv6 Source Routing569
31.14 IPv6 Options569
31.15 Size Of The IPv6 Address Space571
31.16 IPv6 Colon Hexadecimal Notation571
31.17 Three Basic IPv6 Address Types572
31.18 The Duality Of Broadcast And Multicast573
31.19 An Engineering Choice And Simulated Broadcast573
31.20 Proposed IPv6 Address Space Assignment574
31.21 Embedded IPv4 Addresses And Transition574
31.22 Unspecified And Loopback Addresses576
31.23 Unicast Address Structure577
31.24 Interface Identifiers577
31.25 Local Addresses578
31.26 Autoconfiguration And Renumbering578
31.27 Summary579
Appendix 1 A Look At RFCs582
Appendix 2 Glossary Of Internetworking Terms And Abbreviations586
Bibliography626
Index634
热门推荐
- 1026938.html
- 3358075.html
- 3504386.html
- 2735783.html
- 242341.html
- 3370220.html
- 3689598.html
- 3826993.html
- 672470.html
- 284764.html
- http://www.ickdjs.cc/book_60987.html
- http://www.ickdjs.cc/book_1558451.html
- http://www.ickdjs.cc/book_3050329.html
- http://www.ickdjs.cc/book_2365111.html
- http://www.ickdjs.cc/book_2182174.html
- http://www.ickdjs.cc/book_249653.html
- http://www.ickdjs.cc/book_3541122.html
- http://www.ickdjs.cc/book_432041.html
- http://www.ickdjs.cc/book_3504496.html
- http://www.ickdjs.cc/book_3404790.html