出版时间:2004 出版社:清华大学出版社 作者:Alberto Leon-Garcia,Indra Widjaja 页数:900
Tag标签:无
前言
未来的社会是信息化的社会,计算机科学与技术在其中占据了最重要的地位,这对高素质创新型计算机人才的培养提出了迫切的要求。计算机科学与技术已经成为一门基础技术学科,理论性和技术性都很强。与传统的数学、物理和化学等基础学科相比,该学科的教育工作者既要培养学科理论研究和基本系统的开发人才,还要培养应用系统开发人才,甚至是应用人才。从层次上来讲,则需要培养系统的设计、实现、使用与维护等各个层次的人才。这就要求我们的计算机教育按照定位的需要,从知识、能力、素质三个方面进行人才培养。硕士研究生的教育需突出"研究
内容概要
《通信网基本概念与主体结构》(英文版)(第2版)除对第1版内容进行了更新外,还广泛引入了网络协议分析仪分析各种协议的操作过程。《通信网基本概念与主体结构》内容大致分为三部分。第一部分为综述,由前两章组成。主要通过广泛应用的网络业务介绍网络的变革与发展;并通过网络提供的服务讨论网络协议的分层模型和不同层之间的交互作用。 第二部分以电话网、局域网、分组交换网这些基础网络为例,介绍网络体系结构的基本概念和低层协议的主要技术。这部分包含第3章至第7章,其中,第3章介绍数字传输技术的基础知识,内容有不同媒体信息的数字化描述、数字调制、编码、检错、纠错、信道特性及各种传输媒质特性等。第4章介绍电路交换网络中的几种复用和交换技术,重点是SONET。第5章讨论对等层协议,主要讨论数据链路层的ARQ差错控制协议,滑动窗机理,以及实用的PPP协议和HDLC协议。第6章首先详细讨论媒质访问控制技术,包括随机访问、预约访问、信道化访问,然后对以太网、令牌环、FDDI和无线局域网的基本知识和协议作了简要介绍。第7章讨论分组交换网,介绍了几种常用的路由算法,并对不同类型的流量管理机制作了较为深入的分析。 第三部分讨论TCP/IP和ATM这两种主体网络,并进一步阐明基本的网络概念如何体现在这两种主体网络之中。此外,对当前某些热点课题也作了必要介绍。这部分由5章组成,其中,第8章讨论TCP/IP网络的结构和相关协议,包括IP、IPv6、TCP、UDP、内部路由协议和组播路由协议等。第9章讨论ATM网络,主要介绍ATM层和ATM适配层,并对信令和PNNI路由选择作了基本介绍。第10章介绍现代网络结构中的基本概念和主要协议,包括综合服务、区分服务、互连模型以及RSVP、MPLS、RTTP、SCP等协议。第11章介绍网络安全协议和加密算法。第12章讨论网络中的多媒体技术和相关标准,包括数据压缩、信号编码以及分别用于图像和视频编码的JPEG、MPEG标准。
作者简介
作者:(美国)加西亚(Alderto Leon-Garcia) (美国)维德加加(Indra Widjaja)
书籍目录
PrefaceAbout the Authors1 Communication Networks and Services1.1 Evolution of Network Architecture and Services1.1.1 Telegraph Networks and Message Switching1.1.2 Telephone Networks and Circuit Switching1.1.3 The Intemet, Computer Networks, and Packet Switching1.2 Future Network Architectures and Their Services1.3 Key Factors in Communication Network Evolution1.3.1 Role of Technology1.3.2 Role of Regulation1.3.3 Role of the Market1.3.4 Role of StandardsChecklist of Important TermsFurther ReadingProblems2 Applications and Layered Architectures2.1 Examples of Protocols, Services, and Layering2.1.1 HTTP, DNS, and SMTP2.1.2 TCP and UDP Transport Layer Services2.2 The OSI Reference Model2.2.1 The Seven-Layer OSI Reference Model2.2.2 Unified View of Layers, Protocols, and Services2.3 Overview of TCP/IP Architecture2.3.1 TCP/IP Architecture2.3.2 TCP/IP Protocol: How the Layers Work Together2.3.3 Protocol Overview2.4 The Berkeley API2.4.1 Socket System Calls2.4.2 Network Utility Functions2.5 Application Layer Protocols and TCP/IP Utilities2.5.1 Telnet2.5.2 File Transfer Protocol2.5.3 Hypertext Transfer Protocol and the World Wide Web2.5.4 IP Utilities2.5.5 Tcpdump and Network Protocol AnalyzersSummaryChecklist of Important TermsFurther ReadingProblems3 Digital Transmission Fundamentals3.1 Digital Representation of Information3.1.1 Block-Oriented Information3.1.2 Stream Information3.2 Why Digital Communications?3.2.1 Comparison of Analog and Digital Transmission3.2.2 Basic Properties of Digital Transmission Systems3.3 Digital Representation of Analog Signals3.3.1 Bandwidth of Analog Signals3.3.2 Sampling of an Analog Signal3.3.3 Digital Transmission of Analog Signals3.3.4 SNR Performance of Quantizers3.4 Characterization of Communication Channels3.4.1 Frequency Domain Characterization3.4.2 Time Domain Characterization3.5 Fundamental Limits in Digital Transmission3.5.1 The Nyquist Signaling Rate3.5.2 The Shannon Channel Capacity3.6 Line Coding3.7 Modems and Digital Modulation3.7.1 Binary Phase Modulation3.7.2 QAM and Signal Constellations3.7.3 Telephone Modem Standards3.8 Properties of Media and Digital Transmission Systems3.8.1 Twisted Pair3.8.2 Coaxial Cable3.8.3 Optical Fiber3.8.4 Radio Transmission3.8.5 lnfrared Light3.9 Error Detection and Correction3.9.1 Error Detection3.9.2 Two-Dimensional Parity Checks3.9.3 Internet Checksum3.9.4 Polynomial Codes3.9.5 Standardized Polynomial Codes3.9.6 Error-Detecting Capability of a Polynomial Code3.9.7 Linear Codes3.9.8 Error CorrectionSummaryChecklist of Important TermsFurther ReadingProblemsAppendix 3A: Asynchronous Data TransmissionAppendix 3B: Fourier SeriesAppendix 3C: Sampling Theorem4 Circuit-Switching Networks4.1 Multiplexing4.1.1 Frequency-Division Multiplexing4.1.2 Time-Division Multiplexing4.1.3 Wavelength-Division Multiplexing4.2 SONET4.2.1 SONET Multiplexing4.2.2 SONET Frame Structure4.3 Transport Networks4.3.1 SONET Networks4.3.2 Optical Transport Networks4.4 Circuit Switches4.4.1 Space-Division Switches4.4.2 Time-Division Switches4.5 The Telephone Network4.5.1 Transmission Facilities4.5.2 End-to-End Digital Services4.6 Signaling4.6.1 Signaling in the Telephone Network4.6.2 Signaling System #7Architecture4.7 Traffic and Overload Control in Telephone Networks4.7.1 Concentration4.7.2 Routing Control4.7.3 Overload Controls4.8 Cellular Telephone NetworksSummaryChecklist of Important TermsFurther ReadingProblems5 Peer-to-Peer Protocols and Data Link LayerPart I: Peer-to-Peer Protocols5.1 Peer-to-Peer Protocols and Service Models5.1.1 Service Models5.1.2 Examples of Services5.1.3 End to End versus Hop by Hop5.2 ARQ Protocols and Reliable Data Transfer Service5.2.1 Stop-and-Wait ARQ5.2.2 Go-Back-N ARQ5.2.3 Selective Repeat ARQ5.3 Other Peer-to-Peer Protocols5.3.1 Sliding-Window Flow Control5.3.2 Timing Recovery for Synchronous Services5.3.3 TCP Reliable Stream Service and Flow ControlPart II: Data Link Controls5.4 Framing5.5 Point-to-Point Protocol5.6 HDLC Data Link Control5.6.1 Data Link Services5.6.2 HDLC Configurations and Transfer Modes5.6.3 HDLC Frame Format5.6.4 Typical Frame Exchanges5.7 Link Sharing Using Packet Multiplexers5.7.1 Statistical Multiplexing5.7.2 Speech Interpolation and the Multiplexing of Packetized SpeechSummaryChecklist of Important TermsFurther ReadingProblemsAppendix 5A: Derivation of Efficiency of ARQ Protocols6 Medium Access Control Protocols and Local Area NetworksPart I: Medium Access Control Protocols6.1 Multiple Access Communications6.2 Random Access6.2.1 ALOHA6.2.2 Slotted ALOHA6.2.3 Carrier Sense Multiple Access6.2.4 Carrier Sense Multiple Access with Collision Detection6.3 Scheduling Approaches to Medium Access Control6.3.1 Reservation Systems6.3.2 Polling6.3.3 Token-Passing Rings6.3.4 Comparison of Scheduling Approaches in Medium Access Control6.3.5 Comparison of Random Access and Scheduling Medium Access Controls6.4 Channelization6.4.1 FDMA6.4.2 TDMA6.4.3 CDMA6.4.4 Channelization in Telephone Cellular Networks6.5 Delay Performance of MAC and Channelization Schemes6.5.1 Performance of Channelization Techniques with Bursty Traffic6.5.2 Performance of Polling and Token Ring Systems6.5.3 Random Access and CSMA-CDPart II: Local Area Networks6.6 LAN Protocols6.6.1 LAN Structure6.6.2 The Medium Access Control Sublayer6.6.3 The Logical Link Control Sublayer6.7 Ethernet and IEEE 802.3 LAN Standard6.7.1 Ethernet Protocol6.7.2 Frame Structure6.7.3 Physical Layers6.7.4 Fast Ethernet6.7.5 Gigabit Ethernet6.7.6 10 Gigabit Ethernet6.8 Token-Ring and IEEE 802.5 LAN Standard6.8.1 Token-Ring Protocol6.8.2 Frame Structure6.9 FDDI6.10 Wireless LANs and IEEE 802.11 Standard6.10.1 Ad hoc and Infrastructure Networks6.10.2 Frame Structure and Addressing6.10.3 Medium Access Control6.10.4 Physical Layers6.11 LAN Bridges and Ethernet Switches6.11.1 Transparent Bridges6.11.2 Source Routing Bridges6.11.3 Mixed-Media Bridges6.11.4 Virtual LANsSummaryChecklist of Important TermsFurther ReadingProblems7 Packet-Switching Networks7.1 Network Services and Internal Network Operation7.2 Packet Network Topology7.3 Datagrams and Virtual Circuits7.3.1 Connectionless Packet Switching7.3.2 Virtual-Circuit Packet Switching7.3.3 Structure of a Packet Switch7.4 Routing in Packet Networks7.4.1 Routing Algorithm Classification7.4.2 Routing Tables7.4.3 Hierarchical Routing7.4.4 Specialized Routing7.5 Shortest-Path Routing7.5.1 The Bellman-Ford Algorithm7.5.2 Dijkstra's Algorithm7.5.3 Source Routing versus Hop-by-Hop Routing7.5.4 Link-State Routing versus Distance-Vector Routing7.6 ATM Networks7.7 Traffic Management at the Packet Level7.7.1 FIFO and Priority Queues7.7.2 Fair Queueing7.7.3 Weighted Fair Queueing7.7.4 Random Early Detection7.8 Traffic Management at the Flow Level7.8.1 Open-Loop Control7.8.2 Closed-Loop Control7.9 Traffic Management at the Flow-Aggregate LevelSummaryChecklist of Important TermsFurther ReadingProblems8 TCP/IP8.1 The TCP/IP Architecture8.2 The Internet Protocol8.2.1 IP Packet8.2.2 IP Addressing8.2.3 Subnet Addressing8.2.4 IP Routing8.2.5 Classless Interdomain Routing (CIDR)8.2.6 Address Resolution8.2.7 Reverse Address Resolution8.2.8 Fragmentation and Reassembly8.2.9 ICMP: Error and Control Messages8.3 IPv68.3.1 Header Format8.3.2 Network Addressing8.3.3 Extension Headers8.3.4 Migration Issues from IPv4 to IPv68.4 User Datagram Protocol8.5 Transmission Control Protocol8.5.1 TCP Operation and Reliable Stream Service8.5.2 TCP Protocol8.5.3 TCP Congestion Control8.6 Internet Routing Protocols8.6.1 Routing Information Protocol8.6.2 Open Shortest Path First8.6.3 Border Gateway Protocol8.7 Multicast Routing8.7.1 Reverse-Path Broadcasting8.7.2 Intemet Group Management Protocol8.7.3 Reverse-Pa& Multicasting8.7.4 Distance-Vector Multicast Routing Protocol8.8 DHCP, NAT, and Mobile IP8.8.1 Dynamic Host Configuration Protocol8.8.2 Network Address Translation8.8.3 Mobile IPSummaryChecklist of Important TermsFurther ReadingProblems9 ATM Networks9.1 Why ATM?9.2 BISDN Reference Model9.3 ATM Layer9.3.1 ATM Cell Header9.3.2 Virtual Connections9.3.3 QoS Parameters9.3.4 Traffic Descriptors9.3.5 ATM Service Categories9.3.6 Traffic Contracts, Connection Admission Control,and Traffic Management9.4 ATM Adaptation Layer9.4.1 AAL19.4.2 AAL29.4.3 AAL3/49.4.4 AAL59.4.5 Signaling AAL9.4.6 Applications, AALs, and ATM Service Categories9.5 ATM Signaling9.5.1 ATM Addressing9.5.2 UNI Signaling9.5.3 PNNI Signaling9.6 PNNI Routing9.7 Classical IP Over ATMSummaryChecklist of Important TermsFurther ReadingProblems10 Advanced Network Architectures10.1 Integrated Services in the Internet10.1.1 Guaranteed Service10.1.2 Controlled-Load Service10.2 RSVP10.2.1 Receiver-Initiated Reservation10.2.2 Reservation Merging10.2.3 Reservation Styles10.2.4 Soft State10.2.5 RSVP Message Format10.3 Differentiated Services10.3.1 DS Field10.3.2 Per-Hop Behaviors10.3.3 Traffic Conditioner10.3.4 Bandwidth Broker10.4 Network Interconnection Models10.4.1 Overlay Model10.4.2 Peer-to-Peer Model10.5 MPLS10.5.1 Fundamentals of Labels10.5.2 Label Stack and LSP Hierarchy10.5.3 VC Merging10.5.4 Label Distribution Protocols10.5.5 MPLS Support for Virtual Networks10.5.6 Survivability10.5.7 GMPLS10.6 Real-Time Transport Protocol10.6.1 RTP Scenarios and Terminology10.6.2 RTP Packet Format10.6.3 RTP Control Protocol (RTCP)10.7 Session Control Protocols10.7.1 Session Initiation Protocol10.7.2 H. 323 Multimedia Communication Systems10.7.3 Media Gateway Control ProtocolsSummaryChecklist of Important TermsFurther ReadingProblems11 Security Protocols11.1 Security and Cryptographic Algorithms11.1.1 Applications of Cryptography to Security11.1.2 Key Distribution11.2 Security Protocols11.2.1 Application Scenarios11.2.2 Types of Security Service11.2.3 Setting Up a Security Association11.2.4 IPSec11.2.5 Secure Sockets Layer and Transport Layer Security11.2.6 802.11 and Wired Equivalent Privacy11.3 Cryptographic Algorithms11.3.1 DES11.3.2 RSASummaryChecklist of Important TermsFurther ReadingProblems12 Multimedia Information12.1 Lossless Data Compression12.1.1 Huffman Codes12.1.2 Run-Length Codes12.1.3 Adaptive Data Compression Codes12.2 Compression of Analog Signals12.2.1 Adaptive Quantizers12.2.2 Predictive Coding12.2.3 Transform and Subband Coding12.3 Image and Video Coding12.3.1 Discrete Cosine Transform Coding12.3.2 The JPEG Image-Coding Standard12.3.3 Compression of Video Signals12.3.4 The MPEG Video-Coding Standards12.3.5 MPEG MultiplexingSummaryChecklist of Important TermsFurther ReadingProblemsEpilogueAppendicesA Delay and Loss PerformanceA.1 Delay Analysis and Little's FormulaA.1.1 Arrival Rates and Traffic Load DefinitionsA.1.2 Little's FormulaA.2 Basic Queueing ModelsA.2.1 Arrival ProcessesA.2.2 Service TimesA.2.3 Queueing System ClassificationA.3 M/M/1: A Basic Multiplexer ModelA.3.1 M/M/1 Steady State Probabilities and the Notion of StabilityA.3.2 Effect of Scale on PerformanceA.3.3 Average Packet Delay in a NetworkA.4 The M/G/1 ModelA.4.1 Service Time Variability and DelayA.4.2 Priority Queueing SystemsA.4.3 Vacation Models and Multiplexer PerformanceA.5 Erlang B Formula: M/M/c/c SystemFurther ReadingB Network ManagementB.1 Network Management OverviewB.2 Simple Network Management Protocol (SNMP)B.3 Structure of Management InformationB.4 Management Information BaseB.5 Remote Network MonitoringFurther ReadingIndex
章节摘录
插图:
编辑推荐
概括而言,《通信网基本概念与主体结构》(英文版)(第2版)取材广泛,内容新颖,结合实际,既有基本的介绍,又有较为深入的分析,还有大量的习题,可作为计算机、电子等专业本科生、研究生的教学用书,或作为各行业网络技术人员、服务人员的参考读物。The material in the book has been rearranged so that optional sections can be skipped without a disruption in the topic flow. The sections that contain optional material are indicated by a diamond (◆) in the heading. The optional sections that contain detailed mathematics are now indicated by a sidebar. Chapter 1 has been shortened and the discussion of network evolution has been simplified. The functions associated with each layer are introduced along with the discussion on network evolution. In Chapter 2 the discussion on how all the layers work together has been improved by introducing examples using Ethereal packet captures. The section on application layer protocols has been expanded and a new section provides an introduction to network protocol analyzers. PCM speech coding has been moved from Chapter 12 to Chapter 3. Chapter 4 provides more detail on SONET and optical transport networks. Satellite cellular networks have been dropped. Chapter 5 now consists of two parts. The first part deals with peer-to-peer protocols using reliable data transfer protocols as an example. The first part also includes TCP reliable byte stream service. The second part focuses on data link layer protocols and now includes a section on framing. Chapter 6 has also been divided into the principles of medium access control protocols Part I and LANs (Part II). We have simplified the mathematical discussion of medium access controls and provide details in a separate section. In Chapter 7 we have streamlined the discussion of packet networks, and we have separated clearly the more advanced discussion of traffic management. Chapter 8 makes extensive use of packet capture examples to illustrate the operation of TCP/IP protocols. Chapter 10 on advanced network architectures has been revised extensively. The discussion of ATMover IP has been replaced by a discussion of the overlay and peer models to network interconnection. The chapter now contains discussion on virtual networks and GMPLS. The material on RTP and SIP has been updated and moved from Chapter 12 to this chapter. Chapter 11 has been updated with brief discussions of the Advanced Encryption Standard and 802.1 I security.
图书封面
图书标签Tags
无
评论、评分、阅读与下载