计算机网络教程

出版时间:2012-3  出版社:机械工业出版社  作者:(美)Behrouz A. Forouzan,(美)Firouz Mosharraf  
Tag标签:无  

内容概要

  《计算机网络教程:自顶向下方法(英文版)》是计算机领域知名作者forouzan按照目前计算机网络教学比较流行的自顶向下方法编写的一部重要教材。本书延续了forouzan一贯的风格,以通俗易懂的方式全面阐述了计算机网络原理及其应用,并介绍了一些目前计算机网络发展的新技术。此外,每章都配有丰富的练习集(包括测试题、练习题、思考题),部分章节还包含仿真实验和编程作业,有助于读者巩固所学知识,提高动手实践能力。
  本书特色
  协议分层:本书利用internet协议分层和tcp/ip协议族讲授网络原理,强调各层网络理论之间的相互关系。
  自顶向下:从应用层开始,尽早让读者理解网络设备如何工作,然后讨论其他各层,最后介绍物理层。
  形象直观:采用图文并茂的方法描述技术性很强的问题,较少涉及复杂的数学公式,便于读者理解相关概念。
  举例和应用:以丰富的实例,阐明相关概念,并添加了一些现实中的应用,激发读者的学习热情。

作者简介

作者:(美国)佛罗赞 (Forouzan.B. A.) (美国)莫沙拉夫 (Mosharraf.F.)

书籍目录

preface v
chapter 1 introduction
 1.1 overview of the internet
 1.1.1 networks
 1.1.2 switching
 1.1.3 the intemet
 1.1.4 accessing the intemet
 1.1.5 hardware and software
 1.2 protocol layering
 1.2.1 scenarios
 1.2.2 tcp/ip protocol suite
 1.2.3 the esi model
 1.3 internet history
 1.3.1 early history
 1.3.2 birth of the intemet
 1.3.3 intemet today
 1.4 standards and administration
 1.4.1 intemet standards
 1.4.2 intemet administration
 1.5 end-chapter materials
 1.5.1 further reading
 1.5.2 key terms
 1.5.3 summary
 1.6 practice set
 1.6.1 quizzes
 1.6.2 questions
 1.6.3 problems
 1.7 simulation experiments
 1.7.1 applets
 1.7.2 lab assignments
chapter 2 application layer
 2.1 introduction
 2.1.1 providing services
 2.1.2 application-layer paradigms
 2.2 client-server paradigm
 2.2.1 application programming interface
 2.2.2 using services of the transport layer
 2.3 standard client-server applications
 2.3.1 world wide web and http
 2.3.2 ftp
 2.3.3 electronic mail
 2.3.4 telnet
 2.3.5 secure shell (ssh)
 2.3.6 domain name system (dns)
 2.4 peer-to-peer paradigm
 2.4.1 p2p networks
 2.4.2 distributed hash table (dht)
 2.4.3 chord
 2.4.4 pastry
 2.4.5 kademlia
 2.4.6 a popular p2p network: bittorrent
 2.5 socket interface programming
 2.5.1 socket interface in c
 2.6 end-chapter materials
 2.6.1 further reading
 2.6.2 key terms
 2.6.3 summary
 2.7 practice set
 2.7.1 quizzes
 2.7.2 questions
 2.7.3 problems
 2.8 simulation experiments
 2.8.1 applets
 2.8.2 lab assignments
 2.9 programming assignment
chapter 3 transport layer
 3.1 introduction
 3.1.1 transport-layer services
 3.2 transport-layer protocols
 3.2.1 simple protocol
 3.2.2 stop-and-wait protocol
 3.2.3 go-back-n protocol (gb'n)
 3.2.4 selective-repeat protocol
 3.2.5 bidirectional protocols: piggybacking
 3.2.6 intemet transport-layer protocols
 3.3 user datagram protocol (udp)
 3.3.1 user datagram
 3.3.2 udpservices
 3.3.3 udp applications
 3.4 transmission control protocol (tcp)
 3.4.1 tcp services
 3.4.2 tcp features
 3.4.3 segment
 3.4.4 a tcp connection
 3.4.5 state transition diagram
 3.4.6 windows in tcp
 3.4.7 flow control
 3.4.8 error control
 3.4.9 tcp congestion control
 3.4.10 tcp timers
 3.4.11 options
 3.5 end-chapter materials
 3.5.1 further reading
 3.5.2 key terms
 3.5.3 summary
 3.6 practice set
 3.6.1 quizzes
 3.6.2 questions
 3.6.3 problems
 3.7 simulation experiments
 3.7.1 applets
 3.7.2 lab assignments
 3.8 programming assignment
chapter 4 network layer
 4.1 introduction
 4.1.1 network-layer services
 4.1.2 packet switching
 4.1.3 network-layer performance
 4.1.4 network-layer congestion
 4.1.5 structure of a router
 4.2 network-layer protocols 26!
 4.2.1 ipv4 datagram format
 4.2.2 ipv4 addresses
 4.2.3 forwarding of ip packets
 4.2.4 icmpv4
 4.3 unicast routing
 4.3.1 general idea
 4.3.2 routing algorithms
 4.3.3 unicast routing protocols
 4.4 multicast routing
 4.4.1 introduction
 4.4.2 multicasting basics
 4.4.3 intradomain routing protocols
 4.4.4 interdomain routing protocols
 4.5 next generation ip
 4.5.1 packet format
 4.5.2 ipv6 addressing
 4.5.3 transition from ipv4 to ipv6
 4.5.4 icmpv6
 4.6 end-chapter materials
 4.6.1 further reading
 4.6.2 key terms
 4.6.3 summary
 4.7 practice set
 4.7.1 quizzes
 4.7.2 questions
 4.7.3 problems
 4.8 simulation experiments
 4.8.1 applets
 4.8.2 lab assignments
 4.9 programming assignment
chapter 5 data-link layer: wired networks
 5.1 introduction
 5.1.1 nodes and links
 5.1.2 two types of links
 5.1.3 two sublayers
 5.2 data link control (dlc)
 5.2.1 framing
 5.2.2 flow and error control
 5.2.3 error detection and correction
 5.2.4 two dlc protocols
 5.3 multiple access protocols
 5.3.1 random access
 5.3.2 controlled access
 5.3.3 channelization
 5.4 link-layer addressing
 5.5 wired lans: ethernet protocol
 5.5.1 ieee project 802
 5.5.2 standard ethernet
 5.5.3 fast ethernet (100 mbps)
 5.5.4 gigabit ethernet
 5.5.5 10-gigabit ethernet
 5.5.6 vh'tual lans
 5.6 other wired networks
 5.6.1 point-to-point networks
 5.6.2 sonet
 5.6.3 switched network: atm
 5.7 connecting devices
 5.7.1 repeaters or hubs
 5.7.2 link-layer switches
 5.7.3 routers
 5.8 end-chapter materials
 5.8.1 recommended reading
 5.8.2 key terms
 5.8.3 summary
 5.9 practice set
 5.9.1 quizzes
 5.9.2 questions
 5.9.3 problems
 5.10 simulation experiments
 5.10.1 applets
 5.10.2 lab assignments
 5.11 programming assignments
chapter 6 wireless networks and mobile ip
 6.1 wireless lans
 6.1.1 introduction
 6.1.2 ieee 802.11project
 6.1.3 bluetooth
 6.1.4 wimax
 6.2 other wireless networks
 6.2.1 channelization
 6.2.2 cellular telephony
 6.2.3 satellite networks
 6.3 mobile ip
 6.3.1 addressing
 6.3.2 agents
 6.3.3 three phases
 6.3.4 inefficiency in mobile ip
 6.4 end-chapter materials
 6.4.1 further reading
 6.4.2 key terms
 6.4.3 summary
 6.5 practice set
 6.5.1 quizzes
 6.5.2 questions
 6.5.3 problems
 6.6 simulation experiments
 6.6.1 applets
 6.6.2 lab assignments
 6.7 programming assignment
chapter 7 physical layer and transmission media
 7.1 data and signals
 7.1.1 analog and digital
 7.1.2 transmission impairment
 7.1.3 data rate limits
 7.1.4 performance
 7.2 digital transmission
 7.2.1 digital-to-digital conversion
 7.2.2 analog-to-digitalconversion
 7,3 analog transmission
 7.3.1 digital-to-analog conversion
 7.3.2 analog-to-analog conversion
 7.4 bandwidth utilization
 7.4.1 multiplexing
 7.4.2 spread spectrum
 7.5 transmission media
 7.5.1 guided media
 7.5.2 unguided media: wireless
 7.6 end-chapter materials
 7.6.1 recommended reading
 7.6.2 key terms
 7.6.3 summary
 7.7 practice set
 7.7.1 quizzes
 7.7.2 questions
 7.7.3 problems
chapter 8 multimedia and quality of service
 8.1 compression
 8.1.1 lossless compression
 8.1.2 lossy compression
 8.2 multimedia data
 8.2.1 text
 8.2.2 image
 8.2.3 video
 8.2.4 audio
 8.3 multimedia in the internet
 8.3.1 streaming stored audio/video
 8.3.2 streaming live audio/video
 8.3.3 real-time interactive audio/video
 8.4 real-time interactive protocols
 8.4.1 rationale for new protocols
 8.4.2 rtp
 8.4.3 rtcp
 8.4.4 session initialization protocol (sip)
 8.4.5 h.323
 8.4.6 sctp
 8.5 quality of service
 8.5.1 data-flow characteristics
 8.5.2 flow classes
 8.5.3 flow control to improve qos
 8.5.4 integrated services (intserv)
 8.5.5 differentiated services (diffserv)
 8.6 end-chapter materials
 8.6.1 recommended reading
 8.6.2 key terms
 8.6.3 summary
 8.7 practice set
 8.7.1 quizzes
 8.7.2 questions
 8.7.3 problems
 8.8 simulation experiments
 8.8.1 applets
 8.8.2 lab assignments
 8.9 programming assignments
chapter 9 network management
 9.1 introduction
 9.1.1 configuration management
 9.1.2 fault management
 9.1.3 performance management
 9.1.4 security management
 9.1.5 accounting management
 9.2 snmp
 9.2.1 managers and agents
 9.2.2 management components
 9.2.3 an overview
 9.2.4 smi
 9.2.5 mib 7t
 9.2.6 snmp
 9.3 asn. 1
 9.3.1 language basics
 9.3.2 data types
 9.3.3 encoding
 9.4 end-chapter materials
 9.4.1 further reading
 9.4.2 key terms
 9.4.3 summary
 9.5 practice set
 9.5.1 quizzes
 9.5.2 questions
 9.5.3 problems
chapter 10 network security
 10.1 introduction
 10.1.1 security goals
 10.1.2 attacks
 10.1.3 services and techniques
 t 0.2 confidentiality
 10.2.1 symmetric-key ciphers
 10.2.2 asymmetric-key ciphers
 10.3 other aspects of security
 10.3.1 message integrity
 10.3.2 message authentication
 10.3.3 digital signature
 10.3.4 entity authentication
 10.3.5 key management
 10.4 internet security
 10.4.1 application-layer security
 10.4.2 transport-layer security
 10.4.3 network-layer security
 10.5 firewalls
 10.5.1 packet-filter firewall
 10.5.2 proxy firewall
 10.6 end-chapter materials
 10.6.1 further reading
 10.6.2 key terms
 10.6.3 summary
 10.7 practice set
 10.7.1 quizzes
 10.7.2 questions
 10.7.3 problems
 10.8 simulation experiments
 10.8.1 applets
 10.8.2 lab assignments
 10.9 programming assignments
chapter 11 socket programming in java
 11.1 introduction
 11.1.1 addresses and ports
 11.1.2 client-server paradigm
 11.2 programming with udp
 11.2.1 iterative approach
 11.2.2 concurrent approach
 11.3 programming with tcp
 11.3.1 iterative approach
 11.3.2 concurrent approach
 11.4 end-chapter materials
 11.4.1 further reading
 11.4.2 key terms
 11.4.3 summary
 11.5 practice set
 11.5.1 quizzes
 11.5.2 questions
 11.5.3 problems
 11.6 programming assignments
 appendix a unicode
 appendix b positional numbering system
 appendix c html, css, xml, and xsl
 appendix d miscellaneous information
 appendix e 8b/6t code
glossary
references
index
 
  

章节摘录

版权页:因特网利用有线和无线传输介质,连接了大大小小的计算机系统,允许用户共享包括文本、图像、声音和视频在内的大量信息,并允许用户之间相互发送消息。今天我们谈到的网络主要分为两种类型:局域网和广域网。协议是管理通信的规则集。在协议分层中,我们需要遵循两个原则以提供双向通信。首先,每一层需要实现两个相反的任务。其次,位于两端每层下的两个对象应该是等同的。TCP/IP是一个由5个层次组成的层次化协议,这5层为应用层、传输层、网络层、数据链路层和物理层。互联网的历史开始于20世纪60年代中期的ARPA网。Internet的诞生与Cerf和Kahn的工作以及连接网络的网关出现有很大关系。Internet的管理随Internet的发展不断演化。ISOC促进和发起了相关的研究和活动。IAB是1SOC的技术顾问组。IETF是负责运行问题的工作组论坛。IRTF为关注于长期发展研究课题的工作组论坛。ICANN负责Internet域名和地址的管理。NIC负责收集和发布有关TCP/IP协议的信息。……

编辑推荐

《计算机网络教程:自顶向下方法(英文版)》是由机械工业出版社出版的。

图书封面

图书标签Tags

评论、评分、阅读与下载


    计算机网络教程 PDF格式下载


用户评论 (总计6条)

 
 

  •   懂了,这本书讲的是基础,挺不错的...接着看看allen的集成电路设计,也是有关模拟电路设计的书,如果是刚学的模电的话,那么我的建议是看看清华大学的模电那本书,比较经典...
  •   腊月二十七买的书,到了正月13才回来。半个月了!但是想到又过年又下雪这情况,就觉得快递也不容易!大家相互体谅吧!
  •   英文原版虽然读起来比较吃力,但是比起被国内所谓的叫兽翻译过来的书来说还是很好的
  •   书非常好,而且是新的~
  •   很好bucuo 很有帮助
  •   很清楚。。还有很多图片。。还有很多例子。。。
 

250万本中文图书简介、评论、评分,PDF格式免费下载。 第一图书网 手机版

京ICP备13047387号-7