注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络网络与数据通信网络组建与管理计算机网络教程:自顶向下方法(英文版)

计算机网络教程:自顶向下方法(英文版)

计算机网络教程:自顶向下方法(英文版)

定 价:¥79.00

作 者: (美)佛罗赞,(美)莫沙拉夫 著
出版社: 机械工业出版社
丛编项:
标 签: 网络配置与管理

购买这本书可以去


ISBN: 9787111374305 出版时间: 2012-03-01 包装: 平装
开本: 32开 页数: 931 字数:  

内容简介

  All Rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including without limitation photocopying, recording, taping, or any database, information or retrieval system, without the prior written permission of the publisher. This authorized Bilingual edition is jointly published by McGraw-Hill Education (Asia) and China Machine Press. This edition is authorized for sale in the People抯 Republic of China only, excluding Hong Kong, Macao SARs and Taiwan. Copyright2012 by McGraw-Hill Education (Asia), a division of the Singapore Branch of The McGraw-Hill Companies, Inc. and China Machine Press.

作者简介

暂缺《计算机网络教程:自顶向下方法(英文版)》作者简介

图书目录

preface v
chapter 1 introduction
 1.1 overview of the internet
 1.1.1 networks
 1.1.2 switching
 1.1.3 the intemet
 1.1.4 accessing the intemet
 1.1.5 hardware and software
 1.2 protocol layering
 1.2.1 scenarios
 1.2.2 tcp/ip protocol suite
 1.2.3 the esi model
 1.3 internet history
 1.3.1 early history
 1.3.2 birth of the intemet
 1.3.3 intemet today
 1.4 standards and administration
 1.4.1 intemet standards
 1.4.2 intemet administration
 1.5 end-chapter materials
 1.5.1 further reading
 1.5.2 key terms
 1.5.3 summary
 1.6 practice set
 1.6.1 quizzes
 1.6.2 questions
 1.6.3 problems
 1.7 simulation experiments
 1.7.1 applets
 1.7.2 lab assignments
chapter 2 application layer
 2.1 introduction
 2.1.1 providing services
 2.1.2 application-layer paradigms
 2.2 client-server paradigm
 2.2.1 application programming interface
 2.2.2 using services of the transport layer
 2.3 standard client-server applications
 2.3.1 world wide web and http
 2.3.2 ftp
 2.3.3 electronic mail
 2.3.4 telnet
 2.3.5 secure shell (ssh)
 2.3.6 domain name system (dns)
 2.4 peer-to-peer paradigm
 2.4.1 p2p networks
 2.4.2 distributed hash table (dht)
 2.4.3 chord
 2.4.4 pastry
 2.4.5 kademlia
 2.4.6 a popular p2p network: bittorrent
 2.5 socket interface programming
 2.5.1 socket interface in c
 2.6 end-chapter materials
 2.6.1 further reading
 2.6.2 key terms
 2.6.3 summary
 2.7 practice set
 2.7.1 quizzes
 2.7.2 questions
 2.7.3 problems
 2.8 simulation experiments
 2.8.1 applets
 2.8.2 lab assignments
 2.9 programming assignment
chapter 3 transport layer
 3.1 introduction
 3.1.1 transport-layer services
 3.2 transport-layer protocols
 3.2.1 simple protocol
 3.2.2 stop-and-wait protocol
 3.2.3 go-back-n protocol (gb'n)
 3.2.4 selective-repeat protocol
 3.2.5 bidirectional protocols: piggybacking
 3.2.6 intemet transport-layer protocols
 3.3 user datagram protocol (udp)
 3.3.1 user datagram
 3.3.2 udpservices
 3.3.3 udp applications
 3.4 transmission control protocol (tcp)
 3.4.1 tcp services
 3.4.2 tcp features
 3.4.3 segment
 3.4.4 a tcp connection
 3.4.5 state transition diagram
 3.4.6 windows in tcp
 3.4.7 flow control
 3.4.8 error control
 3.4.9 tcp congestion control
 3.4.10 tcp timers
 3.4.11 options
 3.5 end-chapter materials
 3.5.1 further reading
 3.5.2 key terms
 3.5.3 summary
 3.6 practice set
 3.6.1 quizzes
 3.6.2 questions
 3.6.3 problems
 3.7 simulation experiments
 3.7.1 applets
 3.7.2 lab assignments
 3.8 programming assignment
chapter 4 network layer
 4.1 introduction
 4.1.1 network-layer services
 4.1.2 packet switching
 4.1.3 network-layer performance
 4.1.4 network-layer congestion
 4.1.5 structure of a router
 4.2 network-layer protocols 26!
 4.2.1 ipv4 datagram format
 4.2.2 ipv4 addresses
 4.2.3 forwarding of ip packets
 4.2.4 icmpv4
 4.3 unicast routing
 4.3.1 general idea
 4.3.2 routing algorithms
 4.3.3 unicast routing protocols
 4.4 multicast routing
 4.4.1 introduction
 4.4.2 multicasting basics
 4.4.3 intradomain routing protocols
 4.4.4 interdomain routing protocols
 4.5 next generation ip
 4.5.1 packet format
 4.5.2 ipv6 addressing
 4.5.3 transition from ipv4 to ipv6
 4.5.4 icmpv6
 4.6 end-chapter materials
 4.6.1 further reading
 4.6.2 key terms
 4.6.3 summary
 4.7 practice set
 4.7.1 quizzes
 4.7.2 questions
 4.7.3 problems
 4.8 simulation experiments
 4.8.1 applets
 4.8.2 lab assignments
 4.9 programming assignment
chapter 5 data-link layer: wired networks
 5.1 introduction
 5.1.1 nodes and links
 5.1.2 two types of links
 5.1.3 two sublayers
 5.2 data link control (dlc)
 5.2.1 framing
 5.2.2 flow and error control
 5.2.3 error detection and correction
 5.2.4 two dlc protocols
 5.3 multiple access protocols
 5.3.1 random access
 5.3.2 controlled access
 5.3.3 channelization
 5.4 link-layer addressing
 5.5 wired lans: ethernet protocol
 5.5.1 ieee project 802
 5.5.2 standard ethernet
 5.5.3 fast ethernet (100 mbps)
 5.5.4 gigabit ethernet
 5.5.5 10-gigabit ethernet
 5.5.6 vh'tual lans
 5.6 other wired networks
 5.6.1 point-to-point networks
 5.6.2 sonet
 5.6.3 switched network: atm
 5.7 connecting devices
 5.7.1 repeaters or hubs
 5.7.2 link-layer switches
 5.7.3 routers
 5.8 end-chapter materials
 5.8.1 recommended reading
 5.8.2 key terms
 5.8.3 summary
 5.9 practice set
 5.9.1 quizzes
 5.9.2 questions
 5.9.3 problems
 5.10 simulation experiments
 5.10.1 applets
 5.10.2 lab assignments
 5.11 programming assignments
chapter 6 wireless networks and mobile ip
 6.1 wireless lans
 6.1.1 introduction
 6.1.2 ieee 802.11project
 6.1.3 bluetooth
 6.1.4 wimax
 6.2 other wireless networks
 6.2.1 channelization
 6.2.2 cellular telephony
 6.2.3 satellite networks
 6.3 mobile ip
 6.3.1 addressing
 6.3.2 agents
 6.3.3 three phases
 6.3.4 inefficiency in mobile ip
 6.4 end-chapter materials
 6.4.1 further reading
 6.4.2 key terms
 6.4.3 summary
 6.5 practice set
 6.5.1 quizzes
 6.5.2 questions
 6.5.3 problems
 6.6 simulation experiments
 6.6.1 applets
 6.6.2 lab assignments
 6.7 programming assignment
chapter 7 physical layer and transmission media
 7.1 data and signals
 7.1.1 analog and digital
 7.1.2 transmission impairment
 7.1.3 data rate limits
 7.1.4 performance
 7.2 digital transmission
 7.2.1 digital-to-digital conversion
 7.2.2 analog-to-digitalconversion
 7,3 analog transmission
 7.3.1 digital-to-analog conversion
 7.3.2 analog-to-analog conversion
 7.4 bandwidth utilization
 7.4.1 multiplexing
 7.4.2 spread spectrum
 7.5 transmission media
 7.5.1 guided media
 7.5.2 unguided media: wireless
 7.6 end-chapter materials
 7.6.1 recommended reading
 7.6.2 key terms
 7.6.3 summary
 7.7 practice set
 7.7.1 quizzes
 7.7.2 questions
 7.7.3 problems
chapter 8 multimedia and quality of service
 8.1 compression
 8.1.1 lossless compression
 8.1.2 lossy compression
 8.2 multimedia data
 8.2.1 text
 8.2.2 image
 8.2.3 video
 8.2.4 audio
 8.3 multimedia in the internet
 8.3.1 streaming stored audio/video
 8.3.2 streaming live audio/video
 8.3.3 real-time interactive audio/video
 8.4 real-time interactive protocols
 8.4.1 rationale for new protocols
 8.4.2 rtp
 8.4.3 rtcp
 8.4.4 session initialization protocol (sip)
 8.4.5 h.323
 8.4.6 sctp
 8.5 quality of service
 8.5.1 data-flow characteristics
 8.5.2 flow classes
 8.5.3 flow control to improve qos
 8.5.4 integrated services (intserv)
 8.5.5 differentiated services (diffserv)
 8.6 end-chapter materials
 8.6.1 recommended reading
 8.6.2 key terms
 8.6.3 summary
 8.7 practice set
 8.7.1 quizzes
 8.7.2 questions
 8.7.3 problems
 8.8 simulation experiments
 8.8.1 applets
 8.8.2 lab assignments
 8.9 programming assignments
chapter 9 network management
 9.1 introduction
 9.1.1 configuration management
 9.1.2 fault management
 9.1.3 performance management
 9.1.4 security management
 9.1.5 accounting management
 9.2 snmp
 9.2.1 managers and agents
 9.2.2 management components
 9.2.3 an overview
 9.2.4 smi
 9.2.5 mib 7t
 9.2.6 snmp
 9.3 asn. 1
 9.3.1 language basics
 9.3.2 data types
 9.3.3 encoding
 9.4 end-chapter materials
 9.4.1 further reading
 9.4.2 key terms
 9.4.3 summary
 9.5 practice set
 9.5.1 quizzes
 9.5.2 questions
 9.5.3 problems
chapter 10 network security
 10.1 introduction
 10.1.1 security goals
 10.1.2 attacks
 10.1.3 services and techniques
 t 0.2 confidentiality
 10.2.1 symmetric-key ciphers
 10.2.2 asymmetric-key ciphers
 10.3 other aspects of security
 10.3.1 message integrity
 10.3.2 message authentication
 10.3.3 digital signature
 10.3.4 entity authentication
 10.3.5 key management
 10.4 internet security
 10.4.1 application-layer security
 10.4.2 transport-layer security
 10.4.3 network-layer security
 10.5 firewalls
 10.5.1 packet-filter firewall
 10.5.2 proxy firewall
 10.6 end-chapter materials
 10.6.1 further reading
 10.6.2 key terms
 10.6.3 summary
 10.7 practice set
 10.7.1 quizzes
 10.7.2 questions
 10.7.3 problems
 10.8 simulation experiments
 10.8.1 applets
 10.8.2 lab assignments
 10.9 programming assignments
chapter 11 socket programming in java
 11.1 introduction
 11.1.1 addresses and ports
 11.1.2 client-server paradigm
 11.2 programming with udp
 11.2.1 iterative approach
 11.2.2 concurrent approach
 11.3 programming with tcp
 11.3.1 iterative approach
 11.3.2 concurrent approach
 11.4 end-chapter materials
 11.4.1 further reading
 11.4.2 key terms
 11.4.3 summary
 11.5 practice set
 11.5.1 quizzes
 11.5.2 questions
 11.5.3 problems
 11.6 programming assignments
 appendix a unicode
 appendix b positional numbering system
 appendix c html, css, xml, and xsl
 appendix d miscellaneous information
 appendix e 8b/6t code
glossary
references
index
 

本目录推荐