出版时间:2010-9 出版社:清华大学出版社 作者:科姆 页数:600
Tag标签:无
前言
Previous editions of Computer Networks And Internets have received incrediblypositive reviews; I especially thank readers who have taken the time to write to me per-sonally. In addition to students who use the text in courses, networking professionalshave written to praise its clarity and describe how it helped them pass professional cer-tification exams. Many enthusiastic comments have also arrived about foreign transla-tions. The success is especially satisfying in a market glutted with networking books.This book stands out because of its breadth of coverage, logical organization, explana-tion of concepts, focus on the Internet, and appeal to both professors and students.In response to suggestions from readers and recent changes in networking, the newedition has been completely reorganized, revised, and updated. Descriptions of oldertechnologies has been reduced or eliminated. Material on data communications, whichis becoming an essential staple of networking courses, has been expanded and placed inPart II of the text. The networking chapters build on the data communication basics,and describe both wired and wireless networking. In addition, to emphasize the new802.11 wireless standards, the discussion of wireless includes cellular telephone techno-logies because cellular systems currently offer data services and will soon be adoptingInternet protocols.Recent discussions about networking courses have engendered a debate about thebottom-up or top-down approach. In bottom-up, a student learns the lowest-level de-tails, and then learns how the next higher levels use the lower-levels to provide expand-ed functionality. In top-down, one starts with a high-level application and only learnsenough of the next lower layer to understand how the application can operate. This textcombines the best of each. The text begins with a discussion of network applicationsand the communication paradigms that the Internet offers. It allows students to under-stand the facilities the Internet provides to applications before studying the underlyingtechnologies that implement the facilities. Following the discussion of applications, thetext presents networking in a logical manner so a reader understands how each newtechnology builds on lower layer technologies.The text is intended for upper-division undergraduates or beginning graduate stu-dents, who have little or no background in networking. It does not use sophisticatedmathematics, nor does it assume a knowledge of operating systems. Instead, the textdefines concepts clearly, uses examples and figures to illustrate how the technologyoperates, and states results of analysis without providing mathematical proofs.
内容概要
本书由畅销书作者和网络领域的权威专家Douglas Comer教授编著,全面而系统地介绍了计算机网络知识。全书分5大部分共32章,涵盖的内容广泛,包括网桥、交换、路由与路由协议、多媒体协议与IP技术,以及Web浏览等。本书第5版在前几版的基础上进行了重新组织和全面修订,新增了无线网络协议、网络性能等最新技术主题。本书适合作为高等学校计算机、通信、电子等专业的教材或参考书。
作者简介
作者:(美国)科姆(Douglas E.Comer)
书籍目录
PrefacePART Ⅰ Introduction And internet Applications Chapter 1 Introduction And Overview 1.1 Growth Of Computer Networking 1.2 WhV Networking Seems Complex 1.3 The Five Key ASDects Of Networking 1.4 Public And Private Parts Of The internet 1.5 Networks, Interoperability, And Standards 1.6 Protocol Suites And Layering Models 1.7 How Data Passes Through Layers 1.8 Headers And Lavers 1.9 ISO and the OSI Seven Laver Reference Model 1.10 The inside ScoOD 1.11 Remainder Of The Text 1.12 Summary Chapter 2 Internet Trends Chapter 3 Internet Applications And Network Proqrammina Chapter 4 Traditional Internet ApplicationsPART Ⅱ Data Communication Basics Chapter 5 Overview Of Data Communications Chapter 6 Information Sources And Signals Chapter 7 Transmission Media Chapter & Reliability And Channel Coding Chapter 9 Transmission Modes Chapter 10 Modulation And Modems Chapter 11 Multiplexing And Demultiplexing (Channelization) Chapter 12 Access And Interconnection TechnologiesPART Ⅲ Packet Switching And Network Technologies Chapter 13 Local Area Networks: Packets, Frames, And Topologies Chapter 14 The IEEE MAC Sub-Layer Chapter 15 Wired LAN Technology (Ethernet And 802.3) Chapter 16 Wireless Networking Technologies 267 Chapter 17 LAN Extensions: Fiber Modems, Repeaters, Bridges, and Switches Chapter 18 WAN Technologies And Dynamic Routing 305 Chapter 19 Networking Technologies Past And PresentPART Ⅳ Internetworking Chapter 20 Internetworking: Concepts, Architecture, and Protocols Chapter 21 lP: Internet Addressing Chapter 22 Datagram Forwarding Chapter 23 Support Protocols And Technologies Chapter 24 The Future lP (IPv6) Chapter 25 UDP: Datagram Transport Service Chapter 26 TCP: Reliable Transport Service Chapter 27 Internet Routing And Routing ProtocolsPART Ⅴ Other Networking Concept&Technologies Chapter 28 Network Performance (QoS and DiffSery) Chapter 29 Multimedia And lp Telephony (VOIP) Chapter 30 Network Security Chapter 31 Network Management (SNMP) Chapter 32 Trends in Networking Technologies And UsesAppendix 1 A Simplified Application Programming interfaceIndex
章节摘录
插图:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.
编辑推荐
《计算机网络与因特网(第5版)(影印版)》:大学计算机国外著名教材系列
图书封面
图书标签Tags
无
评论、评分、阅读与下载