图书介绍
数据通信与网络 英文版 第5版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

- (美)佛罗赞著 著
- 出版社: 北京:机械工业出版社
- ISBN:7111427438
- 出版时间:2013
- 标注页数:1190页
- 文件大小:223MB
- 文件页数:1230页
- 主题词:
PDF下载
下载说明
数据通信与网络 英文版 第5版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART Ⅰ: Overview1
Chapter 1 Introduction3
1.1 DATA COMMUNICATIONS4
1.1.1 Components4
1.1.2 Data Representation5
1.1.3 Data Flow6
1.2 NETWORKS7
1.2.1 Network Criteria7
1.2.2 Physical Structures8
1.3 NETWORK TYPES13
1.3.1 Local Area Network13
1.3.2 Wide Area Network14
1.3.3 Switching15
1.3.4 The Internet17
1.3.5 Accessing the Internet18
1.4 INTERNET HISTORY19
1.4.1 Early History19
1.4.2 Birth of the Internet20
1.4.3 Internet Today22
1.5 STANDARDS AND ADMINISTRATION22
1.5.1 Internet Standards22
1.5.2 Internet Administration24
1.6 END-CHAPTER MATERIALS25
1.6.1 Recommended Reading25
1.6.2 Key Terms25
1.6.3 Summary26
1.7 PRACTICE SET27
1.7.1 Quizzes27
1.7.2 Questions27
1.7.3 Problems28
1.8 SIMULATION EXPERIMENTS28
1.8.1 Applets28
1.8.2 Lab Assignments28
Chapter 2 Network Models31
2.1 PROTOCOL LAYERING32
2.1.1 Scenarios32
2.1.2 Principles of Protocol Layering34
2.1.3 Logical Connections35
2.2 TCP/IP PROTOCOL SUITE35
2.2.1 Layered Architecture35
2.2.2 Layers in the TCP/IP Protocol Suite37
2.2.3 Description of Each Layer38
2.2.4 Encapsulation and Decapsulation41
2.2.5 Addressing42
2.2.6 Multiplexing and Demultiplexing43
2.3 THE OSI MODEL44
2.3.1 OSI versus TCP/IP45
2.3.2 Lack of OSI Model's Success45
2.4 END-CHAPTER MATERIALS46
2.4.1 Recommended Reading46
2.4.2 Key Terms46
2.4.3 Summary46
2.5 PRACTICE SET47
2.5.1 Quizzes47
2.5.2 Questions47
2.5.3 Problems48
PART Ⅱ: Physical Layer51
Chapter 3 Introduction to Physical Layer53
3.1 DATA AND SIGNALS54
3.1.1 Analog and Digital Data55
3.1.2 Analog and Digital Signals55
3.1.3 Periodic and Nonperiodic56
3.2 PERIODIC ANALOG SIGNALS56
3.2.1 Sine Wave56
3.2.2 Phase59
3.2.3 Wavelength61
3.2.4 Time and Frequency Domains61
3.2.5 Composite Signals63
3.2.6 Bandwidth65
3.3 DIGITAL SIGNALS68
3.3.1 Bit Rate69
3.3.2 Bit Length69
3.3.3 Digital Signal as a Composite Analog Signal70
3.3.4 Transmission of Digital Signals70
3.4 TRANSMISSION IMPAIRMENT76
3.4.1 Attenuation77
3.4.2 Distortion79
3.4.3 Noise79
3.5 DATA RATE LIMITS81
3.5.1 Noiseless Channel: Nyquist Bit Rate81
3.5.2 Noisy Channel: Shannon Capacity82
3.5.3 Using Both Limits83
3.6 PERFORMANCE84
3.6.1 Bandwidth84
3.6.2 Throughput85
3.6.3 Latency(Delay)85
3.6.4 Bandwidth-Delay Product87
3.6.5 Jitter88
3.7 END-CHAPTER MATERIALS89
3.7.1 Recommended Reading89
3.7.2 Key Terms89
3.7.3 Summary89
3.8 PRACTICE SET90
3.8.1 Quizzes90
3.8.2 Questions90
3.8.3 Problems91
3.9 SIMULATION EXPERIMENTS94
3.9.1 Applets94
Chapter 4 Digital Transmission95
4.1 DIGITAL-TO-DIGITAL CONVERSION96
4.1.1 Line Coding96
4.1.2 Line Coding Schemes100
4.1.3 Block Coding109
4.1.4 Scrambling113
4.2 ANALOG-TO-DIGITAL CONVERSION115
4.2.1 Pulse Code Modulation(PCM)115
4.2.2 Delta Modulation(DM)123
4.3 TRANSMISSION MODES125
4.3.1 Parallel Transmission125
4.3.2 Serial Transmission126
4.4 END-CHAPTER MATERIALS129
4.4.1 Recommended Reading129
4.4.2 Key Terms130
4.4.3 Summary130
4.5 PRACTICE SET131
4.5.1 Quizzes131
4.5.2 Questions131
4.5.3 Problems131
4.6 SIMULATION EXPERIMENTS134
4.6.1 Applets134
Chapter 5 Analog Transmission135
5.1 DIGITAL-TO-ANALOG CONVERSION136
5.1.1 Aspects of Digital-to-Analog Conversion137
5.1.2 Amplitude Shift Keying138
5.1.3 Frequency Shift Keying140
5.1.4 Phase Shift Keying142
5.1.5 Quadrature Amplitude Modulation146
5.2 ANALOG-TO-ANALOG CONVERSION147
5.2.1 Amplitude Modulation(AM)147
5.2.2 Frequency Modulation(FM)148
5.2.3 Phase Modulation(PM)149
5.3 END-CHAPTER MATERIALS151
5.3.1 Recommended Reading151
5.3.2 Key Terms151
5.3.3 Summary151
5.4 PRACTICE SET152
5.4.1 Quizzes152
5.4.2 Questions152
5.4.3 Problems153
5.5 SIMULATION EXPERIMENTS154
5.5.1 Applets154
Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum Spreading155
6.1 MULTIPLEXING156
6.1.1 Frequency-Division Multiplexing157
6.1.2 Wavelength-Division Multiplexing162
6.1.3 Time-Division Multiplexing163
6.2 SPREAD SPECTRUM175
6.2.1 Frequency Hopping Spread Spectrum176
6.2.2 Direct Sequence Spread Spectrum178
6.3 END-CHAPTER MATERIALS180
6.3.1 Recommended Reading180
6.3.2 Key Terms180
6.3.3 Summary180
6.4 PRACTICE SET181
6.4.1 Quizzes181
6.4.2 Questions181
6.4.3 Problems182
6.5 SIMULATION EXPERIMENTS184
6.5.1 Applets184
Chapter 7 Transmission Media185
7.1 INTRODUCTION186
7.2 GUIDED MEDIA187
7.2.1 Twisted-Pair Cable187
7.2.2 Coaxial Cable190
7.2.3 Fiber-Optic Cable192
7.3 UNGUIDED MEDIA: WIRELESS197
7.3.1 Radio Waves199
7.3.2 Microwaves200
7.3.3 Infrared201
7.4 END-CHAPTER MATERIALS202
7.4.1 Recommended Reading202
7.4.2 Key Terms202
7.4.3 Summary203
7.5 PRACTICE SET203
7.5.1 Quizzes203
7.5.2 Questions203
7.5.3 Problems204
Chapter 8 Switching207
8.1 INTRODUCTION208
8.1.1 Three Methods of Switching208
8.1.2 Switching and TCP/IP Layers209
8.2 CIRCUIT-SWITCHED NETWORKS209
8.2.1 Three Phases211
8.2.2 Efficiency212
8.2.3 Delay213
8.3 PACKET SWITCHING213
8.3.1 Datagram Networks214
8.3.2 Virtual-Circuit Networks216
8.4 STRUCTURE OF A SWITCH222
8.4.1 Structure of Circuit Switches222
8.4.2 Structure of Packet Switches226
8.5 END-CHAPTER MATERIALS230
8.5.1 Recommended Reading230
8.5.2 Key terms230
8.5.3 Summary230
8.6 PRACTICE SET231
8.6.1 Quizzes231
8.6.2 Questions231
8.6.3 Problems231
8.7 SIMULATION EXPERIMENTS234
8.7.1 Applets234
PART Ⅲ: Data-Link Layer235
Chapter 9 Introduction to Data-Link Layer237
9.1 INTRODUCTION238
9.1.1 Nodes and Links239
9.1.2 Services239
9.1.3 Two Categories of Links241
9.1.4 Two Sublayers242
9.2 LINK-LAYER ADDRESSING242
9.2.1 Three Types of addresses244
9.2.2 Address Resolution Protocol(ARP)245
9.2.3 An Example of Communication248
9.3 END-CHAPTER MATERIALS252
9.3.1 Recommended Reading252
9.3.2 Key Terms252
9.3.3 Summary252
9.4 PRACTICE SET253
9.4.1 Quizzes253
9.4.2 Questions253
9.4.3 Problems254
Chapter 10 Error Detection and Correction257
10.1 INTRODUCTION258
10.1.1 Types of Errors258
10.1.2 Redundancy258
10.1.3 Detection versus Correction258
10.1.4 Coding259
10.2 BLOCK CODING259
10.2.1 Error Detection259
10.3 CYCLIC CODES264
10.3.1 Cyclic Redundancy Check264
10.3.2 Polynomials267
10.3.3 Cyclic Code Encoder Using Polynomials269
10.3.4 Cyclic Code Analysis270
10.3.5 Advantages of Cyclic Codes274
10.3.6 Other Cyclic Codes274
10.3.7 Hardware Implementation274
10.4 CHECKSUM277
10.4.1 Concept278
10.4.2 Other Approaches to the Checksum281
10.5 FORWARD ERROR CORRECTION282
10.5.1 Using Hamming Distance283
10.5.2 UsingXOR283
10.5.3 Chunk Interleaving283
10.5.4 Combining Hamming Distance and Interleaving284
10.5.5 Compounding High- and Low-Resolution Packets284
10.6 END-CHAPTER MATERIALS285
10.6.1 Recommended Reading285
10.6.2 Key Terms286
10.6.3 Summary286
10.7 PRACTICE SET287
10.7.1 Quizzes287
10.7.2 Questions287
10.7.3 Problems288
10.8 SIMULATION EXPERIMENTS292
10.8.1 Applets292
10.9 PROGRAMMING ASSIGNMENTS292
Chapter 11 Data Link Control(DLC)293
11.1 DLC SERVICES294
11.1.1 Framing294
11.1.2 Flow and Error Control297
11.1.3 Connectionless and Connection-Oriented298
11.2 DATA-LINK LAYER PROTOCOLS299
11.2.1 Simple Protocol300
11.2.2 Stop-and-Wait Protocol301
11.2.3 Piggybacking304
11.3 HDLC304
11.3.1 Configurations and Transfer Modes305
11.3.2 Framing305
11.4 POINT-TO-POINT PROTOCOL(PPP)309
11.4.1 Services309
11.4.2 Framing310
11.4.3 Transition Phases311
11.4.4 Multiplexing312
11.5 END-CHAPTER MATERIALS319
11.5.1 Recommended Reading319
11.5.2 Key Terms319
11.5.3 Summary319
11.6 PRACTICE SET320
11.6.1 Quizzes320
11.6.2 Questions320
11.6.3 Problems321
11.7 SIMULATION EXPERIMENTS323
11.7.1 Applets323
11.8 PROGRAMMING ASSIGNMENTS323
Chapter 12 Media Access Control(MAC)325
12.1 RANDOM ACCESS326
12.1.1 ALOHA326
12.1.2 CSMA331
12.1.3 CSMA/CD334
12.1.4 CSMA/CA338
12.2 CONTROLLED ACCESS341
12.2.1 Reservation341
12.2.2 Polling342
12.2.3 Token Passing343
12.3 CHANNELIZATION344
12.3.1 FDMA344
12.3.2 TDMA346
12.3.3 CDMA347
12.4 END-CHAPTER MATERIALS352
12.4.1 Recommended Reading352
12.4.2 Key Terms353
12.4.3 Summary353
12.5 PRACTICE SET354
12.5.1 Quizzes354
12.5.2 Questions354
12.5.3 Problems356
12.6 SIMULATION EXPERIMENTS360
12.6.1 Applets360
12.7 PROGRAMMING ASSIGNMENTS360
Chapter 13 Wired LANs: Ethernet361
13.1 ETHERNET PROTOCOL362
13.1.1 IEEEProject 802362
13.1.2 Ethernet Evolution363
13.2 STANDARD ETHERNET364
13.2.1 Characteristics364
13.2.2 Addressing366
13.2.3 Access Method368
13.2.4 Efficiency of Standard Ethernet370
13.2.5 Implementation370
13.2.6 Changes in the Standard373
13.3 FAST ETHERNET(100 MBPS)376
13.3.1 Access Method377
13.3.2 Physical Layer377
13.4 GIGABIT ETHERNET379
13.4.1 MAC Sublayer380
13.4.2 Physical Layer381
13.5 10 GIGABIT ETHERNET382
13.5.1 Implementation382
13.6 END-CHAPTER MATERIALS383
13.6.1 Recommended Reading383
13.6.2 Key Terms383
13.6.3 Summary383
13.7 PRACTICE SET384
13.7.1 Quizzes384
13.7.2 Questions384
13.7.3 Problems385
13.8 SIMULATION EXPERIMENTS385
13.8.1 Applets385
13.8.2 Lab Assignments386
Chapter 14 Other Wired Networks387
14.1 TELEPHONE NETWORKS388
14.1.1 Major Components388
14.1.2 LATAs388
14.1.3 Signaling390
14.1.4 Services Provided by Telephone Networks393
14.1.5 Dial-Up Service394
14.1.6 Digital Subscriber Line(DSL)396
14.2 CABLE NETWORKS397
14.2.1 Traditional Cable Networks397
14.2.2 Hybrid Fiber-Coaxial(HFC)Network398
14.2.3 Cable TV for Data Transfer399
14.3 SONET400
14.3.1 Architecture401
14.3.2 SONET Layers403
14.3.3 SONET Frames404
14.3.4 STS Multiplexing412
14.3.5 SONET Networks415
14.3.6 Virtual Tributaries420
14.4 ATM421
14.4.1 Design Goals422
14.4.2 Problems422
14.4.3 Architecture425
14.5 END-CHAPTER MATERIALS429
14.5.1 Recommended Reading429
14.5.2 Key Terms430
14.5.3 Summary431
14.6 PRACTICE SET432
14.6.1 Quizzes432
14.6.2 Questions432
14.6.3 Problems433
Chapter15 Wireless LANs435
15.1 INTRODUCTION436
15.1.1 Architectural Comparison436
15.1.2 Characteristics438
15.1.3 Access Control438
15.2 IEEE 802.11 PROJECT439
15.2.1 Architecture440
15.2.2 MAC Sublayer441
15.2.3 Addressing Mechanism446
15.2.4 Physical Layer448
15.3 BLUETOOTH451
15.3.1 Architecture451
15.3.2 Bluetooth Layers452
15.4 END-CHAPTER MATERIALS458
15.4.1 Further Reading458
15.4.2 Key Terms458
15.4.3 Summary458
15.5 PRACTICE SET459
15.5.1 Quizzes459
15.5.2 Questions459
15.5.3 Problems460
15.6 SIMULATION EXPERIMENTS463
15.6.1 Applets463
15.6.2 Lab Assignments463
Chapter 16 Other Wireless Networks465
16.1 WiMAX466
16.1.1 Services466
16.1.2 IEEEProject 802.16467
16.1.3 Layers in Project 802.16467
16.2 CELLULAR TELEPHONY470
16.2.1 Operation471
16.2.2 First Generation(1G)473
16.2.3 Second Generation(2G)474
16.2.4 Third Generation(3G)480
16.2.5 Fourth Generation(4G)482
16.3 SATELLITE NETWORKS483
16.3.1 Operation483
16.3.2 GEO Satellites485
16.3.3 MEO Satellites485
16.3.4 LEO Satellites488
16.4 END-CHAPTER MATERIALS489
16.4.1 Recommended Reading489
16.4.2 Key Terms490
16.4.3 Summary490
16.5 PRACTICE SET491
16.5.1 Quizzes491
16.5.2 Questions491
16.5.3 Problems491
Chapter 17 Connecting Devices and Virtual LANs493
17.1 CONNECTING DEVICES494
17.1.1 Hubs494
17.1.2 Link-Layer Switches495
17.1.3 Routers501
17.2 VIRTUAL LANS502
17.2.1 Membership504
17.2.2 Configuration504
17.2.3 Communication between Switches505
17.2.4 Advantages506
17.3 END-CHAPTER MATERIALS506
17.3.1 Recommended Reading506
17.3.2 Key Terms506
17.3.3 Summary506
17.4 PRACTICE SET507
17.4.1 Quizzes507
17.4.2 Questions507
17.4.3 Problems507
PART Ⅳ: Network Layer509
Chapter 18 Introduction to Network Layer511
18.1 NETWORK-LAYER SERVICES512
18.1.1 Packetizing513
18.1.2 Routing and Forwarding513
18.1.3 Other Services514
18.2 PACKET SWITCHING516
18.2.1 Datagram Approach: Connectionless Service516
18.2.2 Virtual-Circuit Approach: Connection-Oriented Service517
18.3 NETWORK-LAYER PERFORMANCE522
18.3.1 Delay522
18.3.2 Throughput523
18.3.3 Packet Loss525
18.3.4 Congestion Control525
18.4 IPV4 ADDRESSES528
18.4.1 Address Space529
18.4.2 Classful Addressing530
18.4.3 Classless Addressing532
18.4.4 Dynamic Host Configuration Protocol(DHCP)539
18.4.5 Network Address Resolution(NAT)543
18.5 FORWARDING OF IP PACKETS546
18.5.1 Forwarding Based on Destination Address547
18.5.2 Forwarding Based on Label553
18.5.3 Routers as Packet Switches555
18.6 END-CHAPTER MATERIALS556
18.6.1 Recommended Reading556
18.6.2 Key Terms556
18.6.3 Summary556
18.7 PRACTICE SET557
18.7.1 Quizzes557
18.7.2 Questions557
18.7.3 Problems558
18.8 SIMULATION EXPERIMENTS560
18.8.1 Applets560
18.9 PROGRAMMING ASSIGNMENT560
Chapter 19 Network-Layer Protocols561
19.1 INTERNET PROTOCOL(IP)562
19.1.1 Datagram Format563
19.1.2 Fragmentation567
19.1.3 Options572
19.1.4 Security of IPv4 Datagrams573
19.2 ICMPv4574
19.2.1 MESSAGES575
19.2.2 Debugging Tools578
19.2.3 ICMP Checksum580
19.3 MOBILEIP581
19.3.1 Addressing581
19.3.2 Agents583
19.3.3 Three Phases584
19.3.4 Inefficiency in Mobile IP589
19.4 END-CHAPTER MATERIALS591
19.4.1 Recommended Reading591
19.4.2 Key Terms591
19.4.3 Summary591
19.5 PRACTICE SET592
19.5.1 Quizzes592
19.5.2 Questions592
19.5.3 Problems593
19.6 SIMULATION EXPERIMENTS594
19.6.1 Applets594
19.6.2 Lab Assignments594
Chapter 20 Unicast Routing595
20.1 INTRODUCTION596
20.1.1 General Idea596
20.1.2 Least-Cost Routing596
20.2 ROUTING ALGORITHMS598
20.2.1 Distance-Vector Routing598
20.2.2 Link-State Routing604
20.2.3 Path-Vector Routing606
20.3 UNICAST ROUTING PROTOCOLS611
20.3.1 Internet Structure611
20.3.2 Routing Information Protocol(RIP)613
20.3.3 Open Shortest Path First(OSPF)618
20.3.4 Border Gateway Protocol Version 4(BGP4)623
20.4 END-CHAPTER MATERIALS631
20.4.1 Recommended Reading631
20.4.2 Key Terms631
20.4.3 Summary632
20.5 PRACTICE SET632
20.5.1 Quizzes632
20.5.2 Questions632
20.5.3 Problems634
20.6 SIMULATION EXPERIMENTS637
20.6.1 Applets637
20.7 PROGRAMMING ASSIGNMENT637
Chapter 21 Multicast Routing639
21.1 INTRODUCTION640
21.1.1 Unicasting640
21.1.2 Multicasting640
21.1.3 Broadcasting643
21.2 MULTICASTING BASICS643
21.2.1 Multicast Addresses643
21.2.2 Delivery at Data-Link Layer645
21.2.3 Collecting Information about Groups647
21.2.4 Multicast Forwarding648
21.2.5 Two Approaches to Multicasting649
21.3 INTRADOMAIN MULTICAST PROTOCOLS650
21.3.1 Multicast Distance Vector(DVMRP)651
21.3.2 Multicast Link State(MOSPF)653
21.3.3 Protocol Independent Multicast(PIM)654
21.4 INTERDOMAIN MULTICAST PROTOCOLS657
21.5 IGMP658
21.5.1 Messages658
21.5.2 Propagation of Membership Information659
21.5.3 Encapsulation660
21.6 END-CHAPTER MATERIALS660
21.6.1 Recommended Reading660
21.6.2 Key Terms660
21.6.3 Summary660
21.7 PRACTICE SET661
21.7.1 Quizzes661
21.7.2 Questions661
21.7.3 Problems662
21.8 SIMULATION EXPERIMENTS663
21.8.1 Applets663
Chapter 22 Next Generation IP665
22.1 IPv6 ADDRESSING666
22.1.1 Representation666
22.1.2 Address Space667
22.1.3 Address Space Allocation668
22.1.4 Autoconfiguration672
22.1.5 Renumbering673
22.2 THE IPv6 PROTOCOL674
22.2.1 Packet Format674
22.2.2 Extension Header677
22.3 THE ICMPv6 PROTOCOL679
22.3.1 Error-Reporting Messages679
22.3.2 Informational Messages680
22.3.3 Neighbor-Discovery Messages681
22.3.4 Group Membership Messages682
22.4 TRANSITION FROM IPv4 TO IPv6682
22.4.1 Strategies683
22.4.2 Use of IP Addresses684
22.5 END-CHAPTER MATERIALS684
22.5.1 Recommended Reading684
22.5.2 Key Terms685
22.5.3 Summary685
22.6 PRACTICE SET685
22.6.1 Quizzes685
22.6.2 Questions685
22.6.3 Problems686
22.7 SIMULATION EXPERIMENTS688
22.7.1 Applets688
PART Ⅴ: Transport Layer689
Chapter 23 Introduction to Transport Layer691
23.1 INTRODUCTION692
23.1.1 Transport-Layer Services693
23.1.2 Connectionless and Connection-Oriented Protocols703
23.2 TRANSPORT-LAYER PROTOCOLS707
23.2.1 Simple Protocol707
23.2.2 Stop-and-Wait Protocol708
23.2.3 Go-Back-N Protocol(GBN)713
23.2.4 Selective-Repeat Protocol720
23.2.5 Bidirectional Protocols: Piggybacking726
23.3 END-CHAPTER MATERIALS727
23.3.1 Recommended Reading727
23.3.2 Key Terms727
23.3.3 Summary728
23.4 PRACTICE SET728
23.4.1 Quizzes728
23.4.2 Questions728
23.4.3 Problems729
23.5 SIMULATION EXPERIMENTS733
23.5.1 Applets733
23.6 PROGRAMMING ASSIGNMENT733
Chapter 24 Transport-Layer Protocols735
24.1 INTRODUCTION736
24.1.1 Services736
24.1.2 Port Numbers736
24.2 USER DATAGRAM PROTOCOL737
24.2.1 User Datagram737
24.2.2 UDP Services738
24.2.3 UDP Applications741
24.3 TRANSMISSION CONTROL PROTOCOL743
24.3.1 TCP Services743
24.3.2 TCP Features746
24.3.3 Segment748
24.3.4 A TCP Connection750
24.3.5 State Transition Diagram756
24.3.6 Windows in TCP760
24.3.7 Flow Control762
24.3.8 Error Control768
24.3.9 TCP Congestion Control777
24.3.10 TCPTimers786
24.3.11 Options790
24.4 SCTP791
24.4.1 SCTP Services791
24.4.2 SCTP Features792
24.4.3 Packet Format794
24.4.4 An SCTP Association796
24.4.5 Flow Control799
24.4.6 Error Control801
24.5 END-CHAPTER MATERIALS805
24.5.1 Recommended Reading805
24.5.2 Key Terms805
24.5.3 Summary805
24.6 PRACTICE SET806
24.6.1 Quizzes806
24.6.2 Questions806
24.6.3 Problems809
PART Ⅵ: Application Layer815
Chapter 25 Introduction to Application Layer817
25.1 INTRODUCTION818
25.1.1 Providing Services819
25.1.2 Application-Layer Paradigms820
25.2 CLIENT-SERVER PROGRAMMING823
25.2.1 Application Programming Interface823
25.2.2 Using Services of the Transport Layer827
25.2.3 Iterative Communication Using UDP828
25.2.4 Iterative Communication Using TCP830
25.2.5 Concurrent Communication832
25.3 ITERATIVE PROGRAMMING IN C833
25.3.1 General Issues833
25.3.2 Iterative Programming Using UDP834
25.3.3 Iterative Programming Using TCP837
25.4 ITERATIVE PROGRAMMING IN JAVA842
25.4.1 Addresses and Ports843
25.4.2 Iterative Programming Using UDP846
25.4.3 Iterative Programming Using TCP857
25.5 END-CHAPTER MATERIALS865
25.5.1 Recommended Reading865
25.5.2 Key Terms866
25.5.3 Summary866
25.6 PRACTICE SET866
25.6.1 Quizzes866
25.6.2 Questions866
25.6.3 Problems869
25.7 SIMULATION EXPERIMENTS869
25.7.1 Applets869
25.8 PROGRAMMING ASSIGNMENT870
Chapter 26 Standard Client-Server Protocols871
26.1 WORLD WIDE WEB AND HTTP872
26.1.1 World Wide Web872
26.1.2 HyperText Transfer Protocol(HTTP)876
26.2 FTP887
26.2.1 Two Connections888
26.2.2 Control Connection888
26.2.3 Data Connection889
26.2.4 Security for FTP891
26.3 ELECTRONIC MAIL891
26.3.1 Architecture892
26.3.2 Web-Based Mail903
26.3.3 E-Mail Security904
26.4 TELNET904
26.4.1 Local versus Remote Logging905
26.5 SECURE SHELL(SSH)907
26.5.1 Components907
26.5.2 Applications908
26.6 DOMAIN NAME SYSTEM(DNS)910
26.6.1 NameSpace911
26.6.2 DNS in the Internet915
26.6.3 Resolution916
26.6.4 Caching918
26.6.5 Resource Records918
26.6.6 DNS Messages919
26.6.7 Registrars920
26.6.8 DDNS920
26.6.9 Security of DNS921
26.7 END-CHAPTER MATERIALS921
26.7.1 Recommended Reading921
26.7.2 Key Terms922
26.7.3 Summary922
26.8 PRACTICE SET923
26.8.1 Quizzes923
26.8.2 Questions923
26.8.3 Problems924
26.9 SIMULATION EXPERIMENTS927
26.9.1 Applets927
26.9.2 Lab Assignments927
Chapter 27 Network Management929
27.1 INTRODUCTION930
27.1.1 Configuration Management930
27.1.2 Fault Management932
27.1.3 Performance Management933
27.1.4 Security Management933
27.1.5 Accounting Management934
27.2 SNMP934
27.2.1 Managers and Agents935
27.2.2 Management Components935
27.2.3 An Overview937
27.2.4 SMI938
27.2.5 MIB942
27.2.6 SNMP944
27.3 ASN.1951
27.3.1 Language Basics951
27.3.2 Data Types952
27.3.3 Encoding955
27.4 END-CHAPTER MATERIALS955
27.4.1 Recommended Reading955
27.4.2 Key Terms956
27.4.3 Summary956
27.5 PRACTICE SET956
27.5.1 Quizzes956
27.5.2 Questions956
27.5.3 Problems958
Chapter 28 Multimedia961
28.1 COMPRESSION962
28.1.1 Lossless Compression962
28.1.2 Lossy Compression972
28.2 MULTIMEDIA DATA978
28.2.1 Text978
28.2.2 Image978
28.2.3 Video982
28.2.4 Audio984
28.3 MULTIMEDIA IN THE INTERNET986
28.3.1 Streaming Stored Audio/Video986
28.3.2 Streaming Live Audio/Video989
28.3.3 Real-Time Interactive Audio/Video990
28.4 REAL-TIME INTERACTIVE PROTOCOLS995
28.4.1 Rationale for New Protocols996
28.4.2 RTP999
28.4.3 RTCP1001
28.4.4 Session Initialization Protocol(SIP)1005
28.4.5 H.3231012
28.5 END-CHAPTER MATERIALS1014
28.5.1 Recommended Reading1014
28.5.2 Key Terms1015
28.5.3 Summary1015
28.6 PRACTICE SET1016
28.6.1 Quizzes1016
28.6.2 Questions1016
28.6.3 Problems1018
28.7 SIMULATION EXPERIMENTS1021
28.7.1 Applets1021
28.7.2 Lab Assignments1021
28.8 PROGRAMMING ASSIGNMENTS1022
Chapter 29 Peer-to-Peer Paradigm1023
29.1 INTRODUCTION1024
29.1.1 P2P Networks1024
29.1.2 Distributed Hash Table(DHT)1026
29.2 CHORD1029
29.2.1 Identifier Space1029
29.2.2 Finger Table1029
29.2.3 Interface1030
29.2.4 Applications1036
29.3 PASTRY1036
29.3.1 Identifier Space1036
29.3.2 Routing1037
29.3.3 Application1041
29.4 KADEMLIA1041
29.4.1 Identifier Space1041
29.4.2 Routing Table1041
29.4.3 K-Buckets1044
29.5 BITTORRENT1045
29.5.1 BitTorrent with a Tracker1045
29.5.2 Trackerless BitTorrent1046
29.6 END-CHAPTER MATERIALS1047
29.6.1 Recommended Reading1047
29.6.2 Key Terms1047
29.6.3 Summary1047
29.7 PRACTICE SET1048
29.7.1 Quizzes1048
29.7.2 Questions1048
29.7.3 Problems1048
PART Ⅶ: Topics Related to All Layers1051
Chapter 30 Quality of Service1053
30.1 DATA-FLOW CHARACTERISTICS1054
30.1.1 Definitions1054
30.1.2 Sensitivity of Applications1054
30.1.3 Flow Classes1055
30.2 FLOW CONTROL TO IMPROVE QOS1055
30.2.1 Scheduling1056
30.2.2 Traffic Shaping or Policing1058
30.2.3 Resource Reservation1061
30.2.4 Admission Control1062
30.3 INTEGRATED SERVICES(INTSERV)1062
30.3.1 Flow Specification1062
30.3.2 Admission1063
30.3.3 Service Classes1063
30.3.4 Resource Reservation Protocol(RSVP)1063
30.3.5 Problems with Integrated Services1065
30.4 DIFFERENTIATED SERVICES(DFFSERV)1066
30.4.1 DS Field1066
30.4.2 Per-Hop Behavior1067
30.4.3 Traffic Conditioners1067
30.5 END-CHAPTER MATERIALS1068
30.5.1 Recommended Reading1068
30.5.2 Key Terms1068
30.5.3 Summary1068
30.6 PRACTICE SET1069
30.6.1 Quizzes1069
30.6.2 Questions1069
30.6.3 Problems1070
30.7 SIMULATION EXPERIMENTS1075
30.7.1 Applets1075
30.8 PROGRAMMING ASSIGNMENTS1075
Chapter 31 Cryptography and Network Security1077
31.1 INTRODUCTION1078
31.1.1 Security Goals1078
31.1.2 Attacks1079
31.1.3 Services and Techniques1081
31.2 CONFIDENTIALITY1081
31.2.1 Symmetric-Key Ciphers1081
31.2.2 Asymmetric-Key Ciphers1092
31.3 OTHER ASPECTS OF SECURITY1097
31.3.1 Message Integrity1097
31.3.2 Message Authentication1099
31.3.3 Digital Signature1100
31.3.4 Entity Authentication1105
31.3.5 Key Management1108
31.4 END-CHAPTER MATERIALS1114
31.4.1 Recommended Reading1114
31.4.2 Key Terms1114
31.4.3 Summary1114
31.5 PRACTICE SET1115
31.5.1 Quizzes1115
31.5.2 Questions1115
31.5.3 Problems1117
31.6 SIMULATION EXPERIMENTS1121
31.6.1 Applets1121
31.7 PROGRAMMING ASSIGNMENTS1122
Chapter 32 Internet Security1123
32.1 NETWORK-LAYER SECURITY1124
32.1.1 TwoModes1124
32.1.2 Two Security Protocols1126
32.1.3 Services Provided by IPSec1129
32.1.4 Security Association1130
32.1.5 Internet Key Exchange(IKE)1132
32.1.6 Virtual Private Network(VPN)1133
32.2 TRANSPORT-LAYER SECURITY1134
32.2.1 SSL Architecture1135
32.2.2 Four Protocols1138
32.3 APPLICATION-LAYER SECURITY1140
32.3.1 E-mail Security1141
32.3.2 Pretty Good Privacy(PGP)1142
32.3.3 S/MIME1147
32.4 FIREWALLS1151
32.4.1 Packet-Filter Firewall1152
32.4.2 Proxy Firewall1152
32.5 END-CHAPTER MATERIALS1153
32.5.1 Recommended Reading1153
32.5.2 Key Terms1154
32.5.3 Summary1154
32.6 PRACTICE SET1154
32.6.1 Quizzes1154
32.6.2 Questions1155
32.6.3 Problems1155
32.7 SIMULATION EXPERIMENTS1156
32.7.1 Applets1156
32.7.2 Lab Assignments1156
References1157
Index1163
热门推荐
- 3607676.html
- 792149.html
- 2978690.html
- 3755663.html
- 1626518.html
- 1867567.html
- 161284.html
- 3801619.html
- 530170.html
- 3256550.html
- http://www.ickdjs.cc/book_592217.html
- http://www.ickdjs.cc/book_1138028.html
- http://www.ickdjs.cc/book_3471799.html
- http://www.ickdjs.cc/book_2070014.html
- http://www.ickdjs.cc/book_421569.html
- http://www.ickdjs.cc/book_396659.html
- http://www.ickdjs.cc/book_2732427.html
- http://www.ickdjs.cc/book_1197878.html
- http://www.ickdjs.cc/book_62026.html
- http://www.ickdjs.cc/book_1509014.html