TCP/IP protocol suite = TCP/IP协议簇 / 2nd ed.

副标题:无

作   者:Behrouz A. Forouzan, Sophia Chung Fegan著.

分类号:

ISBN:9787302078357

微信扫一扫,移动浏览光盘

简介

本书是一本全面系统介绍TCP/IP协议簇的教材。为了展现最新的技术发展,本版在第1版的基础上增加了6章:组播路由协议、ATM网络上的IP协议、移动IP、Internet上的实时通信、Internet的安全以及专用网络等。全书分为5大部分共31章,内容包括TCP/IP的基本概念和基础技术、TCP/IP协议簇的核心协议及路由协议、使用网络和传达室输层协议的应用程序等。与同类书相比,本书具有如下特点:(1)善于用图来阐述技术性很强的内容;(2)重要概念突出;(3)概念讲解与实际例子相结合;(4)内容丰富而新颖;(5)章末有归纳本章重点内容的小结及重要的术语列表;(6)每章都有大量练,既可测验对基本概念的掌握程度,又可加深对内容的理解;(7)本书最后还附有几个附录以供读者参考。 本书可作为计算机及相关专业本科生和研究生的教材,对从事计算机网络的教学和科研人员以及工程技术人员也有很好的参考价值。更多>>

目录

preface

chapter 1 introduction

1.1 a brief history

arpanet

birth of the internet

transmission control protocol/internetworking protocol(tcp/ip)

milnet

csnet

nsfnet

ansnet

the interent today

time line

growth of the internet

1.2 protocols and standards

protocols

standards

1.3 standards organizations

standards creation committees

forums

regulatory agencies

.1.4 internet standards

maturinty levels

requirement levels

1.5 internet administration

internet society(isoc)

internet architecture board(iab)

internet engineering task force(ietf)

internet research task force(irtf)

internet assigned numbers authority(iana)and internet corporation for assigned names and numbers(icann)

network information center(nic)

1.6 key terms

1.7 summary

1.8 problem set

multiple-choice questions

exercises


chapter 2 the osi model and the tcp/ip protocol suite

2.1 the osi model

layered architecture

peer-to-peer processes

2.2 layers in the osi model

physical layer

data link layer

network layer

transport layer

session layer

presentation layer

application layer

summary of layers

2.3 tcp/ip protocol suite

physical and data link layers

network layer

transport layer

application layer

2.4 addressing

physical address

internet address

port address

2.5 tcp/ip versions

version 4

version 5

version 6

2.6 key terms

2.7 summary

2.8 practice set

multiple-choice questions

exercises


chapter 3 underlying technologies

3.1 local area networks(lans)

ethernet

token ring

wireless lans

3.2 point-to-point wans

physical layer

data link layer

3.3 switched wans

x.25

frame relay

atm

atm lans

3.4 connecting devices

repeaters

bridges

routers

switches

3.5 key terms

3.6 summary

3.7 practice set

multiple-choice questions

exercises

programming exercies


chapter 4 ip addresses:classful addressing

4.1 introduction

address space

notation

4.2 classful addressing

recognizing classes

netid and hostid

classes and blocks

network addresses

sufficient information

mask

address depletion

4.3 other issues

multihomed devices

location,not names

special addresses

private addresses

unicast,multicast,and broadcast addresses

4.4 a sample internet with classful addresses

4.5 key terms

4.6 summary

4.7 practice set

multiple-choice questions

exercises

programming exercises


chapter 5 subnetting/supernetting and classless addressing

5.1 subnetting

three levels of hierarchy

subnet mask

special addresses in subnetting

designing subnets

variable-length subnet mask

5.2 supernetting

assigning addresses

supernet mask

5.3 classless addressing

variable-length blocks

finding the network address

subnetting

supernetting

migration

classless interdomain routing(cidr)

5.4 key terms

5.5 summary

5.6 practice set

multiple-choice questions

exercises

programming exercises


chapter 6 delivery and routing of ip packets

6.1 connection-oriented versus connectionless services

6.2 direct versus indirect delivery

direct delivery

indirect delivery

6.3 routing methods

next-hop routing

network-specific routing

host-specific routing

default routing

6.4 static versus dynamic routing

static routing table

dynamic routing table

6.5 routing table and routing module

routing table

routing module

some examples

6.6 classless addressing:cidr

routing table size

hierarchical routing

geographical routing

routing table search algorithms

6.7 key terms

6.8 summary

6.9 practice set

multiple-choice questions

exercises

programming exercises


chapter 7 arp and rarp

7.1 arp

packet format

encapsulation

operation

arp over

proxy arp

7.2 arp package

cache table

queues

output module

input module

cache-control module

more examples

7.3 rarp

packet format

encapsulation

alternative solutions to rarp

7.4 key terms

7.5 summary

7.6 practice set

multiple-choice questions

exercises

programming exercises


chapter 8 internet protocol(ip)

8.1 datagram

8.2 fragmentation

maximum transfer unit(mtu)

fields related to fragmentation

8.3 options

format

option types

8.4 checksum

checksum calculation at the sender

checksum calculation at the receiver

checksum in the ip packet

8.5 ip package

header-adding module

procesing module

queues

routing table

routing module

mtu table

fragmentation module

reassembly table

ressembly module

8.6 key terms

8.7 summary

8.8 practice set

multiple-choice questions

exercises

programming exercises


chapter 9 internet control message protocol(icmp)

9.1 types of messages

9.2 message format

9.3 error reporting

destination unreachable

source quench

time exceeded

parameter problem

redirection

9.4 query

echo requet and reply

timestamp request and reply

address-mask request and reply

router solication and advertisement

9.5 checksum

checksum calculation

checksum testing

example

9.6 icmp package

input module

output module

9.7 key terms

9.8 summary

9.9 practice set

multiple-choice questions

exercises

programming exercises


chapter 10 internet group management protocol(igmp)

10.1 group management

10.2 igmp messages

message format

10.3 igmp operation

joining a group

leaving a group

monitoring membership

10.4 encapsulation

ip layer

data link layer

10.5 igmp package

group table

timers

group-joining module

group-leaving module

input module

output module

10.6 key terms

10.7 summary

10.8 practice set

multiple-choice questions

exercises

programming exercises


chapter 11 user datagram protocol(udp)
11.1 process-to-process communication

port numbers

socket addresses

11.2 user datagram

11.3 checksum

checksum calculation at sender

checksum calculation at receiver

an example

optional use of the checksum

11.4 udp operation

connectionless servies

flow and error control

encapsulation and decapsulation

queuing

multiplexing and demultiplexing

11.5 use of udp

11.6 udp package

control-block table

input queues

control-block module

input module

output module

examples

11.7 key terms

11.8 sumary

11.9 practice set

multiple-choice questions

exercises

programming exercises


chapter 12 transmission control protocol(tcp)

12.1 process-to-process communication

port addresses

socket addresses

12.2 tcp services

stream delivery service

full-duplex service

connection-oriented service

reliable service

12.3 numbering bytes

byte numbers

sequence number

acknowledgment number

12.4 flow control

sliding windows protocol

12.5 silly windows syndrome

syndrome created by the sender

syndrome created by the receiver

12.6 error control

error detection and correction

12.7 tcp timers

retransmission timer

persistence timer

keepalive timer

time-waited timer

12.8 congestion control

congestion window

congestion avoidance

12.9 segment

12.10 options

12.11 checksum

12.12 connection

connection establishment

connection termination

connection resetting

12.13 state transition diagram

client diagram

server diagram

12.14 tcp operation

encapsulation and decapsulation

buffering

multiplexing and demultiplexing

pushing data

urgent data

12.15 tcp package

transmission control blocks(tcbs)

timers

main module

input processing module

output processing module

12.16 key terms

12.17 summary

12.18 practice set

multiple-choice questions

exercises

programming exercises


chapter 13 unicast routing protocols(rip,ospf,and bgp)

13.1 interior and exterior routing

13.2 rip

distance vector routing

rip message format

requests and responses

timers in rip

slow convergence

instability

some remedies for instability

rip version

authentication

encapsulation

13.3 ospf

areas

metric

link state routing

types of packets

packet format

encapsulation

13.4 bgp

path vector routing

types of packets

packet format

encapsulation

13.5 key terms

13.6 summary

13.7 ractice set

multiple-choice questions

exercises

programming exercises


chapter 14 multicasting and multicast routing protocols

14.1 introduction

unicast,multicast,and broadcast

multicasting versus multiple unicasting

emulation of multicasting with unicasting

flooding

applications

14.2 multicast routing

tree versus graph

spanning tree

shortest path spanning

14.3 multicast trees

source-based tree

group-shared tree

14.4 multicast routing protocols

14.5 dvmrp

formation of shortest path tree

14.6 mospf

least-cost tree

14.7 cbt

formation of the tree

14.8 pim

pim-dm

pim-sm

14.9 mbone

14.10 key terms

14.11 summary

14.12 practice set

multiple-choice questions

exercises

programming exercises


chapter 15 application layer and client-server model

15.1 client-server model

client

server

15.2 concurrency

concurrency in clients

concurrency in servers

15.3 processes

concept

process identification

process creation

15.4 key terms

15.5 summary

15.6 practice set

multiple-choice questions

exercises

programming exercises


chapter 16 socket interface

16.1 some definitions

data types defined

internet address structure

internet socket address structure

16.2 sockets

socket types

16.3 byte ordering

big-endian byte order

little-endian byte order

network byte order

byte-order transformation

16.4 address transformation

16.5 byte manipulation functions

16.6 information about remote host

16.7 socket system calls

socket

bind

connect

listen

accept

sendto

recvfrom

read

write

close

16.8 connectionless iterative server

server

client

16.9 udp client-server programs

server program

client program

16.10 connection-oriented concurrent server

server

client

16.11 tcp client-server programs

server program

client program

16.12 key terms

16.13 summary

16.14 practice set

multiple-choice questions

exercises

programming exercises


chapter 17 bootp and dhcp

17.1 bootp

packet format

operation

udp ports

using tftp

relay agent

error control

17.2 dynamic host configuration protocol(dhcp)

leasing

packet format

transition states

exchanging messages

17.3 key terms

17.4 summary

17.5 practice set

multiple-choice questions

exercises

programming exercises


chapter 18 domain name system(dns)

18.1 name space

flat name space

hierarchical name space

18.2 domain name space

label

domain name

domain

18.3 distribution of name space

hierarchy of name servers

zone

root server

primary and secondary servers

18.4 dns in the internet

generic domains

country domains

inverse domain

18.5 resolution

resolver

mapping names to addresses

mapping addresses to names

recursive resolution

iterative resolution

caching

18.6 dns messages

header

18.7 types of records

question record

resource record

18.8 compression

18.9 examples

18.10 ddns

18.11 encapsulation

18.12 key terms

18.13 summary

18.14 practice set

multiple-choice questions

exercises


chapter 19 telnet and rlogin

19.1 concept

time-sharing environment

login

19.2 network virtual terminal(nvt)

19.3 nvt character set

data characters

remote control characters

19.4 embedding

19.5 options

19.6 option negotiation

enabling an option

disabling an option

example

symmetry

19.7 suboption negotiation

19.8 controlling the server

19.9 out-of-band signaling

19.10 escape character

19.11 mode of operation

default mode

character mode

line mode

19.12 examples

19.13 user interface

19.14 rlogin(remote login)

tcp port

connection

flow control

commands

mode

19.15 security issue

19.16 key terms

19.17 summary

19.18 practice set

multiple-choice questions

exercises


chapter 20 file transfer protocol(ftp)

20.1 connections

control connection

data connection

20.2 communication

communication over control connection

communication over data connection

20.3 command processing

connands

responses

20.4 file transfer

20.5 user interface

20.6 anonymous ftp

20.7 key terms

20.8 summary

20.9 practice set

multiple-choice questions

exercises


chapter 21 trivial file transfer protocol(tftp)

21.1 messages

rrq

wrq

data

ack

error

21.2 connection

connection establishment

connection termination

21.3 data transfer

flow control

error control

sorcerer's apprentice bug

21.4 udp ports

21.5 tftp example

21.6 tftp options

21.7 security

21.8 applications

21.9 key terms

21.10 summary

21.11 practice set

multiple-choice questions

exercises


chapter 22 simple mail transfer protocol(smtp)

22.1 user agent(ua)

sending mial

receiveing mail

22.2 addresses

local part

domain name

22.3 elayed delivery

sender-site delay

receiver-site delay

intermediate delay

22.4 aliases

one-to-many expansion

many-to-one expansion

22.5 mail transfer agent(mta)

22.6 commands and responses

commands

responses

22.7 mail transfer phases

connection establishment

message transfer

connection termination

22.8 multipurpose internet mail extensions(mime)

mime-version

content-type

content-transfer-encoding

content-id

content-description

22.9 mail delivery

first stage

second stage

third stage

22.10 mail access protocols

pop3

imap4

22.11 key terms

22.12 summary

22.13 practice set

multiple-choice questions

exercises


chapter 23 simple networkmanagement protocol(snmp)

23.1 concept

managers and agents

23.2 management components

role of snmp

role of smi

role of mib

an analogy

23.3 smi

name

type

encoding method

23.4 mib

accessing mib variables

lexicographic ordering

23.5 snmp

pdus

format

23.6 messages

23.7 udp ports

23.8 security

23.9 key terms

23.10 summary

23.11 practice set

multiple-choice questions

exercises


chaper 24 hypertext transfer protocol(http)

24.1 http transaction

messages

24.2 request messages

request line

methods

24.3 response message

status line

24.4 header

general header

request header

response header

entity header

24.5 examples

24.6 some other features

persistent versus nonpersistent conection

proxy server

24.7 key terms

24.8 summary

24.9 practice set

multiple-choice questions

exercises


chapter 25 world wide web(www)

25.1 hypertext and hypermedia

25.2 browser architecture

25.3 static documents

25.4 html

structure of a web page

tags

examples

25.5 dynamic documents

25.6 common gateway interface(cgi)

cgi program

environment variables

input

output

examples

25.7 active documents

creation,compilation,and execution

25.8 java

classes and objects

instantiation

inheritance

packages

skeleton of an applet

creation and compilation

html document

examples

25.9 key terms

25.10 summary

25.11 practice set

multiple-choice questions

exercises

programming exercises


chapter 26 ip over atm

26.1 atm wans

layers

26.2 carrying a datagram in cells

26.3 routing the cells

addresses

address binding

26.4 atmarp

packet format

atmarp operation

26.5 logical ip subnet(lis)

26.6 key terms

26.7 summary

26.8 practice set

multiple-choice questions

exercises


chapter 27 mobile

27.1 addressing

stationary hosts

mobile hosts

27.2 agents

home agent

foreign agent

27.3 three phases

27.4 agent discovery

agent advertisement

agent solicitation

27.5 registration

request and reply

encapsulation

27.6 data transfer

from remote host to home agent

from home agent to foreign agent

from foreign agent to mobile host

from mobile host to remote host

transparency

27.7 inefficiency in mobile ip

double crossing

triangle routing

solution

27.8 key terms

27.9 summary

27.10 practice set

multiple-choice questions

exercises


chapter 28 real-time traffic over the internet

28.1 characteristics

time relationship

ordering

multicasting

translation

mixing

support from transport layer protocol

28.2 rtp

rtp packet format

udp port

28.3 rtcp

sender report

receiver report

source description message

bye message

application specific message

udp port

28.4 key terms

28.5 summary

28.6 practice set

multiple-choice questions

exercises


chapter 29 internet security

29.1 introduction

privacy

authentication

integrity

nonrepudiation

29.2 priv acy

secret-key encryption/decryption

public-key encryption

using the combination

29.3 digital signature

signing the whole document

signing the digest

29.4 security in the internet

29.5 application layer security

pretty good privacy(pgp)

secure shell(ssh)

29.6 transport layer security:tls

position of tls

two protocols

29.7 security at the ip layer:ipsec

authentication header(ah)protocol

encapsulating security payload

29.8 firewals

packet-filter firewall

proxy firewall

29.9 key terms

29.10 summary

29.11 practice set

multiple-choice questions

exercises


chapter 30 private networks,virtual private networks,and network address translation

30.1 private networks

intranet

extranet

addressing

30.2 virtual private networks(vpn)

achieving privacy

vpn technology

30.3 network address translation(nat)

address translation

translation table

nat and isp

30.4 key terms

30.5 summary

30.6 practice set

multiple-choice questions

exercises


chapter 31 next generation:ipv6 and icmpv6

31.1 ipv6

31.2 ipv6 addresses

hexadecimal colon notation

categories of addresses

address space assignment

31.3 ipv6 packet format

base header

priority

flow label

comparison between ipv4 and ipv6 headers

extensioin headers

comparison between ipv4 and ipv6

31.4 icmpv6

error reporting

query

31.5 transition from ipv4 to ipv6

dual stack

tunneling

header translation

31.6 key terms

31.7 summary

31.8 practice set

multiple-choice questions

exercises

programming exercises


appendix a ascii code

appendix b numbering systems and transformation

b.1 numbering systems

decimal numbers

binary numbers

octal numbers

hexadecimal numbers

b.2 transformation

from other sysems to decimal

from decimal to other sysems

from binary to octal or hexadecimal

from octal or hexadecimal to binary

appendix c checksum calculation

c.1 binary notation

partial sum

sum

checksum

c.2 hexadecimal notation

partial sum

sum

checksum

appendix d error detection

d.1 types of errors

single-bit error

burst error

d.2 detection

redundancy

d.3 vertical redundancy check(vrc)

d.4 logitudinal redundancy check(lrc)

performance

d.5 cyclic redundancy check(crc)

the crc generator

d.6 checksum

appendix e encryption methods

e.1 secret-key methods

des

e.2 public key methods

rsa

choosing public and private keys

appendix f project 802

f.1 project 802.1

f.2 project 802.2

llc

mac

appendix g contact addresses

appendix h rfcs

appendix i udp and tcp ports

glossary

references


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

TCP/IP protocol suite = TCP/IP协议簇 / 2nd ed.
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon