图书介绍

数据通信与网络 英文版 第5版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

数据通信与网络 英文版 第5版
  • (美)佛罗赞著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111427438
  • 出版时间:2013
  • 标注页数:1190页
  • 文件大小:223MB
  • 文件页数:1230页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

数据通信与网络 英文版 第5版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART Ⅰ: Overview1

Chapter 1 Introduction3

1.1 DATA COMMUNICATIONS4

1.1.1 Components4

1.1.2 Data Representation5

1.1.3 Data Flow6

1.2 NETWORKS7

1.2.1 Network Criteria7

1.2.2 Physical Structures8

1.3 NETWORK TYPES13

1.3.1 Local Area Network13

1.3.2 Wide Area Network14

1.3.3 Switching15

1.3.4 The Internet17

1.3.5 Accessing the Internet18

1.4 INTERNET HISTORY19

1.4.1 Early History19

1.4.2 Birth of the Internet20

1.4.3 Internet Today22

1.5 STANDARDS AND ADMINISTRATION22

1.5.1 Internet Standards22

1.5.2 Internet Administration24

1.6 END-CHAPTER MATERIALS25

1.6.1 Recommended Reading25

1.6.2 Key Terms25

1.6.3 Summary26

1.7 PRACTICE SET27

1.7.1 Quizzes27

1.7.2 Questions27

1.7.3 Problems28

1.8 SIMULATION EXPERIMENTS28

1.8.1 Applets28

1.8.2 Lab Assignments28

Chapter 2 Network Models31

2.1 PROTOCOL LAYERING32

2.1.1 Scenarios32

2.1.2 Principles of Protocol Layering34

2.1.3 Logical Connections35

2.2 TCP/IP PROTOCOL SUITE35

2.2.1 Layered Architecture35

2.2.2 Layers in the TCP/IP Protocol Suite37

2.2.3 Description of Each Layer38

2.2.4 Encapsulation and Decapsulation41

2.2.5 Addressing42

2.2.6 Multiplexing and Demultiplexing43

2.3 THE OSI MODEL44

2.3.1 OSI versus TCP/IP45

2.3.2 Lack of OSI Model's Success45

2.4 END-CHAPTER MATERIALS46

2.4.1 Recommended Reading46

2.4.2 Key Terms46

2.4.3 Summary46

2.5 PRACTICE SET47

2.5.1 Quizzes47

2.5.2 Questions47

2.5.3 Problems48

PART Ⅱ: Physical Layer51

Chapter 3 Introduction to Physical Layer53

3.1 DATA AND SIGNALS54

3.1.1 Analog and Digital Data55

3.1.2 Analog and Digital Signals55

3.1.3 Periodic and Nonperiodic56

3.2 PERIODIC ANALOG SIGNALS56

3.2.1 Sine Wave56

3.2.2 Phase59

3.2.3 Wavelength61

3.2.4 Time and Frequency Domains61

3.2.5 Composite Signals63

3.2.6 Bandwidth65

3.3 DIGITAL SIGNALS68

3.3.1 Bit Rate69

3.3.2 Bit Length69

3.3.3 Digital Signal as a Composite Analog Signal70

3.3.4 Transmission of Digital Signals70

3.4 TRANSMISSION IMPAIRMENT76

3.4.1 Attenuation77

3.4.2 Distortion79

3.4.3 Noise79

3.5 DATA RATE LIMITS81

3.5.1 Noiseless Channel: Nyquist Bit Rate81

3.5.2 Noisy Channel: Shannon Capacity82

3.5.3 Using Both Limits83

3.6 PERFORMANCE84

3.6.1 Bandwidth84

3.6.2 Throughput85

3.6.3 Latency(Delay)85

3.6.4 Bandwidth-Delay Product87

3.6.5 Jitter88

3.7 END-CHAPTER MATERIALS89

3.7.1 Recommended Reading89

3.7.2 Key Terms89

3.7.3 Summary89

3.8 PRACTICE SET90

3.8.1 Quizzes90

3.8.2 Questions90

3.8.3 Problems91

3.9 SIMULATION EXPERIMENTS94

3.9.1 Applets94

Chapter 4 Digital Transmission95

4.1 DIGITAL-TO-DIGITAL CONVERSION96

4.1.1 Line Coding96

4.1.2 Line Coding Schemes100

4.1.3 Block Coding109

4.1.4 Scrambling113

4.2 ANALOG-TO-DIGITAL CONVERSION115

4.2.1 Pulse Code Modulation(PCM)115

4.2.2 Delta Modulation(DM)123

4.3 TRANSMISSION MODES125

4.3.1 Parallel Transmission125

4.3.2 Serial Transmission126

4.4 END-CHAPTER MATERIALS129

4.4.1 Recommended Reading129

4.4.2 Key Terms130

4.4.3 Summary130

4.5 PRACTICE SET131

4.5.1 Quizzes131

4.5.2 Questions131

4.5.3 Problems131

4.6 SIMULATION EXPERIMENTS134

4.6.1 Applets134

Chapter 5 Analog Transmission135

5.1 DIGITAL-TO-ANALOG CONVERSION136

5.1.1 Aspects of Digital-to-Analog Conversion137

5.1.2 Amplitude Shift Keying138

5.1.3 Frequency Shift Keying140

5.1.4 Phase Shift Keying142

5.1.5 Quadrature Amplitude Modulation146

5.2 ANALOG-TO-ANALOG CONVERSION147

5.2.1 Amplitude Modulation(AM)147

5.2.2 Frequency Modulation(FM)148

5.2.3 Phase Modulation(PM)149

5.3 END-CHAPTER MATERIALS151

5.3.1 Recommended Reading151

5.3.2 Key Terms151

5.3.3 Summary151

5.4 PRACTICE SET152

5.4.1 Quizzes152

5.4.2 Questions152

5.4.3 Problems153

5.5 SIMULATION EXPERIMENTS154

5.5.1 Applets154

Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum Spreading155

6.1 MULTIPLEXING156

6.1.1 Frequency-Division Multiplexing157

6.1.2 Wavelength-Division Multiplexing162

6.1.3 Time-Division Multiplexing163

6.2 SPREAD SPECTRUM175

6.2.1 Frequency Hopping Spread Spectrum176

6.2.2 Direct Sequence Spread Spectrum178

6.3 END-CHAPTER MATERIALS180

6.3.1 Recommended Reading180

6.3.2 Key Terms180

6.3.3 Summary180

6.4 PRACTICE SET181

6.4.1 Quizzes181

6.4.2 Questions181

6.4.3 Problems182

6.5 SIMULATION EXPERIMENTS184

6.5.1 Applets184

Chapter 7 Transmission Media185

7.1 INTRODUCTION186

7.2 GUIDED MEDIA187

7.2.1 Twisted-Pair Cable187

7.2.2 Coaxial Cable190

7.2.3 Fiber-Optic Cable192

7.3 UNGUIDED MEDIA: WIRELESS197

7.3.1 Radio Waves199

7.3.2 Microwaves200

7.3.3 Infrared201

7.4 END-CHAPTER MATERIALS202

7.4.1 Recommended Reading202

7.4.2 Key Terms202

7.4.3 Summary203

7.5 PRACTICE SET203

7.5.1 Quizzes203

7.5.2 Questions203

7.5.3 Problems204

Chapter 8 Switching207

8.1 INTRODUCTION208

8.1.1 Three Methods of Switching208

8.1.2 Switching and TCP/IP Layers209

8.2 CIRCUIT-SWITCHED NETWORKS209

8.2.1 Three Phases211

8.2.2 Efficiency212

8.2.3 Delay213

8.3 PACKET SWITCHING213

8.3.1 Datagram Networks214

8.3.2 Virtual-Circuit Networks216

8.4 STRUCTURE OF A SWITCH222

8.4.1 Structure of Circuit Switches222

8.4.2 Structure of Packet Switches226

8.5 END-CHAPTER MATERIALS230

8.5.1 Recommended Reading230

8.5.2 Key terms230

8.5.3 Summary230

8.6 PRACTICE SET231

8.6.1 Quizzes231

8.6.2 Questions231

8.6.3 Problems231

8.7 SIMULATION EXPERIMENTS234

8.7.1 Applets234

PART Ⅲ: Data-Link Layer235

Chapter 9 Introduction to Data-Link Layer237

9.1 INTRODUCTION238

9.1.1 Nodes and Links239

9.1.2 Services239

9.1.3 Two Categories of Links241

9.1.4 Two Sublayers242

9.2 LINK-LAYER ADDRESSING242

9.2.1 Three Types of addresses244

9.2.2 Address Resolution Protocol(ARP)245

9.2.3 An Example of Communication248

9.3 END-CHAPTER MATERIALS252

9.3.1 Recommended Reading252

9.3.2 Key Terms252

9.3.3 Summary252

9.4 PRACTICE SET253

9.4.1 Quizzes253

9.4.2 Questions253

9.4.3 Problems254

Chapter 10 Error Detection and Correction257

10.1 INTRODUCTION258

10.1.1 Types of Errors258

10.1.2 Redundancy258

10.1.3 Detection versus Correction258

10.1.4 Coding259

10.2 BLOCK CODING259

10.2.1 Error Detection259

10.3 CYCLIC CODES264

10.3.1 Cyclic Redundancy Check264

10.3.2 Polynomials267

10.3.3 Cyclic Code Encoder Using Polynomials269

10.3.4 Cyclic Code Analysis270

10.3.5 Advantages of Cyclic Codes274

10.3.6 Other Cyclic Codes274

10.3.7 Hardware Implementation274

10.4 CHECKSUM277

10.4.1 Concept278

10.4.2 Other Approaches to the Checksum281

10.5 FORWARD ERROR CORRECTION282

10.5.1 Using Hamming Distance283

10.5.2 UsingXOR283

10.5.3 Chunk Interleaving283

10.5.4 Combining Hamming Distance and Interleaving284

10.5.5 Compounding High- and Low-Resolution Packets284

10.6 END-CHAPTER MATERIALS285

10.6.1 Recommended Reading285

10.6.2 Key Terms286

10.6.3 Summary286

10.7 PRACTICE SET287

10.7.1 Quizzes287

10.7.2 Questions287

10.7.3 Problems288

10.8 SIMULATION EXPERIMENTS292

10.8.1 Applets292

10.9 PROGRAMMING ASSIGNMENTS292

Chapter 11 Data Link Control(DLC)293

11.1 DLC SERVICES294

11.1.1 Framing294

11.1.2 Flow and Error Control297

11.1.3 Connectionless and Connection-Oriented298

11.2 DATA-LINK LAYER PROTOCOLS299

11.2.1 Simple Protocol300

11.2.2 Stop-and-Wait Protocol301

11.2.3 Piggybacking304

11.3 HDLC304

11.3.1 Configurations and Transfer Modes305

11.3.2 Framing305

11.4 POINT-TO-POINT PROTOCOL(PPP)309

11.4.1 Services309

11.4.2 Framing310

11.4.3 Transition Phases311

11.4.4 Multiplexing312

11.5 END-CHAPTER MATERIALS319

11.5.1 Recommended Reading319

11.5.2 Key Terms319

11.5.3 Summary319

11.6 PRACTICE SET320

11.6.1 Quizzes320

11.6.2 Questions320

11.6.3 Problems321

11.7 SIMULATION EXPERIMENTS323

11.7.1 Applets323

11.8 PROGRAMMING ASSIGNMENTS323

Chapter 12 Media Access Control(MAC)325

12.1 RANDOM ACCESS326

12.1.1 ALOHA326

12.1.2 CSMA331

12.1.3 CSMA/CD334

12.1.4 CSMA/CA338

12.2 CONTROLLED ACCESS341

12.2.1 Reservation341

12.2.2 Polling342

12.2.3 Token Passing343

12.3 CHANNELIZATION344

12.3.1 FDMA344

12.3.2 TDMA346

12.3.3 CDMA347

12.4 END-CHAPTER MATERIALS352

12.4.1 Recommended Reading352

12.4.2 Key Terms353

12.4.3 Summary353

12.5 PRACTICE SET354

12.5.1 Quizzes354

12.5.2 Questions354

12.5.3 Problems356

12.6 SIMULATION EXPERIMENTS360

12.6.1 Applets360

12.7 PROGRAMMING ASSIGNMENTS360

Chapter 13 Wired LANs: Ethernet361

13.1 ETHERNET PROTOCOL362

13.1.1 IEEEProject 802362

13.1.2 Ethernet Evolution363

13.2 STANDARD ETHERNET364

13.2.1 Characteristics364

13.2.2 Addressing366

13.2.3 Access Method368

13.2.4 Efficiency of Standard Ethernet370

13.2.5 Implementation370

13.2.6 Changes in the Standard373

13.3 FAST ETHERNET(100 MBPS)376

13.3.1 Access Method377

13.3.2 Physical Layer377

13.4 GIGABIT ETHERNET379

13.4.1 MAC Sublayer380

13.4.2 Physical Layer381

13.5 10 GIGABIT ETHERNET382

13.5.1 Implementation382

13.6 END-CHAPTER MATERIALS383

13.6.1 Recommended Reading383

13.6.2 Key Terms383

13.6.3 Summary383

13.7 PRACTICE SET384

13.7.1 Quizzes384

13.7.2 Questions384

13.7.3 Problems385

13.8 SIMULATION EXPERIMENTS385

13.8.1 Applets385

13.8.2 Lab Assignments386

Chapter 14 Other Wired Networks387

14.1 TELEPHONE NETWORKS388

14.1.1 Major Components388

14.1.2 LATAs388

14.1.3 Signaling390

14.1.4 Services Provided by Telephone Networks393

14.1.5 Dial-Up Service394

14.1.6 Digital Subscriber Line(DSL)396

14.2 CABLE NETWORKS397

14.2.1 Traditional Cable Networks397

14.2.2 Hybrid Fiber-Coaxial(HFC)Network398

14.2.3 Cable TV for Data Transfer399

14.3 SONET400

14.3.1 Architecture401

14.3.2 SONET Layers403

14.3.3 SONET Frames404

14.3.4 STS Multiplexing412

14.3.5 SONET Networks415

14.3.6 Virtual Tributaries420

14.4 ATM421

14.4.1 Design Goals422

14.4.2 Problems422

14.4.3 Architecture425

14.5 END-CHAPTER MATERIALS429

14.5.1 Recommended Reading429

14.5.2 Key Terms430

14.5.3 Summary431

14.6 PRACTICE SET432

14.6.1 Quizzes432

14.6.2 Questions432

14.6.3 Problems433

Chapter15 Wireless LANs435

15.1 INTRODUCTION436

15.1.1 Architectural Comparison436

15.1.2 Characteristics438

15.1.3 Access Control438

15.2 IEEE 802.11 PROJECT439

15.2.1 Architecture440

15.2.2 MAC Sublayer441

15.2.3 Addressing Mechanism446

15.2.4 Physical Layer448

15.3 BLUETOOTH451

15.3.1 Architecture451

15.3.2 Bluetooth Layers452

15.4 END-CHAPTER MATERIALS458

15.4.1 Further Reading458

15.4.2 Key Terms458

15.4.3 Summary458

15.5 PRACTICE SET459

15.5.1 Quizzes459

15.5.2 Questions459

15.5.3 Problems460

15.6 SIMULATION EXPERIMENTS463

15.6.1 Applets463

15.6.2 Lab Assignments463

Chapter 16 Other Wireless Networks465

16.1 WiMAX466

16.1.1 Services466

16.1.2 IEEEProject 802.16467

16.1.3 Layers in Project 802.16467

16.2 CELLULAR TELEPHONY470

16.2.1 Operation471

16.2.2 First Generation(1G)473

16.2.3 Second Generation(2G)474

16.2.4 Third Generation(3G)480

16.2.5 Fourth Generation(4G)482

16.3 SATELLITE NETWORKS483

16.3.1 Operation483

16.3.2 GEO Satellites485

16.3.3 MEO Satellites485

16.3.4 LEO Satellites488

16.4 END-CHAPTER MATERIALS489

16.4.1 Recommended Reading489

16.4.2 Key Terms490

16.4.3 Summary490

16.5 PRACTICE SET491

16.5.1 Quizzes491

16.5.2 Questions491

16.5.3 Problems491

Chapter 17 Connecting Devices and Virtual LANs493

17.1 CONNECTING DEVICES494

17.1.1 Hubs494

17.1.2 Link-Layer Switches495

17.1.3 Routers501

17.2 VIRTUAL LANS502

17.2.1 Membership504

17.2.2 Configuration504

17.2.3 Communication between Switches505

17.2.4 Advantages506

17.3 END-CHAPTER MATERIALS506

17.3.1 Recommended Reading506

17.3.2 Key Terms506

17.3.3 Summary506

17.4 PRACTICE SET507

17.4.1 Quizzes507

17.4.2 Questions507

17.4.3 Problems507

PART Ⅳ: Network Layer509

Chapter 18 Introduction to Network Layer511

18.1 NETWORK-LAYER SERVICES512

18.1.1 Packetizing513

18.1.2 Routing and Forwarding513

18.1.3 Other Services514

18.2 PACKET SWITCHING516

18.2.1 Datagram Approach: Connectionless Service516

18.2.2 Virtual-Circuit Approach: Connection-Oriented Service517

18.3 NETWORK-LAYER PERFORMANCE522

18.3.1 Delay522

18.3.2 Throughput523

18.3.3 Packet Loss525

18.3.4 Congestion Control525

18.4 IPV4 ADDRESSES528

18.4.1 Address Space529

18.4.2 Classful Addressing530

18.4.3 Classless Addressing532

18.4.4 Dynamic Host Configuration Protocol(DHCP)539

18.4.5 Network Address Resolution(NAT)543

18.5 FORWARDING OF IP PACKETS546

18.5.1 Forwarding Based on Destination Address547

18.5.2 Forwarding Based on Label553

18.5.3 Routers as Packet Switches555

18.6 END-CHAPTER MATERIALS556

18.6.1 Recommended Reading556

18.6.2 Key Terms556

18.6.3 Summary556

18.7 PRACTICE SET557

18.7.1 Quizzes557

18.7.2 Questions557

18.7.3 Problems558

18.8 SIMULATION EXPERIMENTS560

18.8.1 Applets560

18.9 PROGRAMMING ASSIGNMENT560

Chapter 19 Network-Layer Protocols561

19.1 INTERNET PROTOCOL(IP)562

19.1.1 Datagram Format563

19.1.2 Fragmentation567

19.1.3 Options572

19.1.4 Security of IPv4 Datagrams573

19.2 ICMPv4574

19.2.1 MESSAGES575

19.2.2 Debugging Tools578

19.2.3 ICMP Checksum580

19.3 MOBILEIP581

19.3.1 Addressing581

19.3.2 Agents583

19.3.3 Three Phases584

19.3.4 Inefficiency in Mobile IP589

19.4 END-CHAPTER MATERIALS591

19.4.1 Recommended Reading591

19.4.2 Key Terms591

19.4.3 Summary591

19.5 PRACTICE SET592

19.5.1 Quizzes592

19.5.2 Questions592

19.5.3 Problems593

19.6 SIMULATION EXPERIMENTS594

19.6.1 Applets594

19.6.2 Lab Assignments594

Chapter 20 Unicast Routing595

20.1 INTRODUCTION596

20.1.1 General Idea596

20.1.2 Least-Cost Routing596

20.2 ROUTING ALGORITHMS598

20.2.1 Distance-Vector Routing598

20.2.2 Link-State Routing604

20.2.3 Path-Vector Routing606

20.3 UNICAST ROUTING PROTOCOLS611

20.3.1 Internet Structure611

20.3.2 Routing Information Protocol(RIP)613

20.3.3 Open Shortest Path First(OSPF)618

20.3.4 Border Gateway Protocol Version 4(BGP4)623

20.4 END-CHAPTER MATERIALS631

20.4.1 Recommended Reading631

20.4.2 Key Terms631

20.4.3 Summary632

20.5 PRACTICE SET632

20.5.1 Quizzes632

20.5.2 Questions632

20.5.3 Problems634

20.6 SIMULATION EXPERIMENTS637

20.6.1 Applets637

20.7 PROGRAMMING ASSIGNMENT637

Chapter 21 Multicast Routing639

21.1 INTRODUCTION640

21.1.1 Unicasting640

21.1.2 Multicasting640

21.1.3 Broadcasting643

21.2 MULTICASTING BASICS643

21.2.1 Multicast Addresses643

21.2.2 Delivery at Data-Link Layer645

21.2.3 Collecting Information about Groups647

21.2.4 Multicast Forwarding648

21.2.5 Two Approaches to Multicasting649

21.3 INTRADOMAIN MULTICAST PROTOCOLS650

21.3.1 Multicast Distance Vector(DVMRP)651

21.3.2 Multicast Link State(MOSPF)653

21.3.3 Protocol Independent Multicast(PIM)654

21.4 INTERDOMAIN MULTICAST PROTOCOLS657

21.5 IGMP658

21.5.1 Messages658

21.5.2 Propagation of Membership Information659

21.5.3 Encapsulation660

21.6 END-CHAPTER MATERIALS660

21.6.1 Recommended Reading660

21.6.2 Key Terms660

21.6.3 Summary660

21.7 PRACTICE SET661

21.7.1 Quizzes661

21.7.2 Questions661

21.7.3 Problems662

21.8 SIMULATION EXPERIMENTS663

21.8.1 Applets663

Chapter 22 Next Generation IP665

22.1 IPv6 ADDRESSING666

22.1.1 Representation666

22.1.2 Address Space667

22.1.3 Address Space Allocation668

22.1.4 Autoconfiguration672

22.1.5 Renumbering673

22.2 THE IPv6 PROTOCOL674

22.2.1 Packet Format674

22.2.2 Extension Header677

22.3 THE ICMPv6 PROTOCOL679

22.3.1 Error-Reporting Messages679

22.3.2 Informational Messages680

22.3.3 Neighbor-Discovery Messages681

22.3.4 Group Membership Messages682

22.4 TRANSITION FROM IPv4 TO IPv6682

22.4.1 Strategies683

22.4.2 Use of IP Addresses684

22.5 END-CHAPTER MATERIALS684

22.5.1 Recommended Reading684

22.5.2 Key Terms685

22.5.3 Summary685

22.6 PRACTICE SET685

22.6.1 Quizzes685

22.6.2 Questions685

22.6.3 Problems686

22.7 SIMULATION EXPERIMENTS688

22.7.1 Applets688

PART Ⅴ: Transport Layer689

Chapter 23 Introduction to Transport Layer691

23.1 INTRODUCTION692

23.1.1 Transport-Layer Services693

23.1.2 Connectionless and Connection-Oriented Protocols703

23.2 TRANSPORT-LAYER PROTOCOLS707

23.2.1 Simple Protocol707

23.2.2 Stop-and-Wait Protocol708

23.2.3 Go-Back-N Protocol(GBN)713

23.2.4 Selective-Repeat Protocol720

23.2.5 Bidirectional Protocols: Piggybacking726

23.3 END-CHAPTER MATERIALS727

23.3.1 Recommended Reading727

23.3.2 Key Terms727

23.3.3 Summary728

23.4 PRACTICE SET728

23.4.1 Quizzes728

23.4.2 Questions728

23.4.3 Problems729

23.5 SIMULATION EXPERIMENTS733

23.5.1 Applets733

23.6 PROGRAMMING ASSIGNMENT733

Chapter 24 Transport-Layer Protocols735

24.1 INTRODUCTION736

24.1.1 Services736

24.1.2 Port Numbers736

24.2 USER DATAGRAM PROTOCOL737

24.2.1 User Datagram737

24.2.2 UDP Services738

24.2.3 UDP Applications741

24.3 TRANSMISSION CONTROL PROTOCOL743

24.3.1 TCP Services743

24.3.2 TCP Features746

24.3.3 Segment748

24.3.4 A TCP Connection750

24.3.5 State Transition Diagram756

24.3.6 Windows in TCP760

24.3.7 Flow Control762

24.3.8 Error Control768

24.3.9 TCP Congestion Control777

24.3.10 TCPTimers786

24.3.11 Options790

24.4 SCTP791

24.4.1 SCTP Services791

24.4.2 SCTP Features792

24.4.3 Packet Format794

24.4.4 An SCTP Association796

24.4.5 Flow Control799

24.4.6 Error Control801

24.5 END-CHAPTER MATERIALS805

24.5.1 Recommended Reading805

24.5.2 Key Terms805

24.5.3 Summary805

24.6 PRACTICE SET806

24.6.1 Quizzes806

24.6.2 Questions806

24.6.3 Problems809

PART Ⅵ: Application Layer815

Chapter 25 Introduction to Application Layer817

25.1 INTRODUCTION818

25.1.1 Providing Services819

25.1.2 Application-Layer Paradigms820

25.2 CLIENT-SERVER PROGRAMMING823

25.2.1 Application Programming Interface823

25.2.2 Using Services of the Transport Layer827

25.2.3 Iterative Communication Using UDP828

25.2.4 Iterative Communication Using TCP830

25.2.5 Concurrent Communication832

25.3 ITERATIVE PROGRAMMING IN C833

25.3.1 General Issues833

25.3.2 Iterative Programming Using UDP834

25.3.3 Iterative Programming Using TCP837

25.4 ITERATIVE PROGRAMMING IN JAVA842

25.4.1 Addresses and Ports843

25.4.2 Iterative Programming Using UDP846

25.4.3 Iterative Programming Using TCP857

25.5 END-CHAPTER MATERIALS865

25.5.1 Recommended Reading865

25.5.2 Key Terms866

25.5.3 Summary866

25.6 PRACTICE SET866

25.6.1 Quizzes866

25.6.2 Questions866

25.6.3 Problems869

25.7 SIMULATION EXPERIMENTS869

25.7.1 Applets869

25.8 PROGRAMMING ASSIGNMENT870

Chapter 26 Standard Client-Server Protocols871

26.1 WORLD WIDE WEB AND HTTP872

26.1.1 World Wide Web872

26.1.2 HyperText Transfer Protocol(HTTP)876

26.2 FTP887

26.2.1 Two Connections888

26.2.2 Control Connection888

26.2.3 Data Connection889

26.2.4 Security for FTP891

26.3 ELECTRONIC MAIL891

26.3.1 Architecture892

26.3.2 Web-Based Mail903

26.3.3 E-Mail Security904

26.4 TELNET904

26.4.1 Local versus Remote Logging905

26.5 SECURE SHELL(SSH)907

26.5.1 Components907

26.5.2 Applications908

26.6 DOMAIN NAME SYSTEM(DNS)910

26.6.1 NameSpace911

26.6.2 DNS in the Internet915

26.6.3 Resolution916

26.6.4 Caching918

26.6.5 Resource Records918

26.6.6 DNS Messages919

26.6.7 Registrars920

26.6.8 DDNS920

26.6.9 Security of DNS921

26.7 END-CHAPTER MATERIALS921

26.7.1 Recommended Reading921

26.7.2 Key Terms922

26.7.3 Summary922

26.8 PRACTICE SET923

26.8.1 Quizzes923

26.8.2 Questions923

26.8.3 Problems924

26.9 SIMULATION EXPERIMENTS927

26.9.1 Applets927

26.9.2 Lab Assignments927

Chapter 27 Network Management929

27.1 INTRODUCTION930

27.1.1 Configuration Management930

27.1.2 Fault Management932

27.1.3 Performance Management933

27.1.4 Security Management933

27.1.5 Accounting Management934

27.2 SNMP934

27.2.1 Managers and Agents935

27.2.2 Management Components935

27.2.3 An Overview937

27.2.4 SMI938

27.2.5 MIB942

27.2.6 SNMP944

27.3 ASN.1951

27.3.1 Language Basics951

27.3.2 Data Types952

27.3.3 Encoding955

27.4 END-CHAPTER MATERIALS955

27.4.1 Recommended Reading955

27.4.2 Key Terms956

27.4.3 Summary956

27.5 PRACTICE SET956

27.5.1 Quizzes956

27.5.2 Questions956

27.5.3 Problems958

Chapter 28 Multimedia961

28.1 COMPRESSION962

28.1.1 Lossless Compression962

28.1.2 Lossy Compression972

28.2 MULTIMEDIA DATA978

28.2.1 Text978

28.2.2 Image978

28.2.3 Video982

28.2.4 Audio984

28.3 MULTIMEDIA IN THE INTERNET986

28.3.1 Streaming Stored Audio/Video986

28.3.2 Streaming Live Audio/Video989

28.3.3 Real-Time Interactive Audio/Video990

28.4 REAL-TIME INTERACTIVE PROTOCOLS995

28.4.1 Rationale for New Protocols996

28.4.2 RTP999

28.4.3 RTCP1001

28.4.4 Session Initialization Protocol(SIP)1005

28.4.5 H.3231012

28.5 END-CHAPTER MATERIALS1014

28.5.1 Recommended Reading1014

28.5.2 Key Terms1015

28.5.3 Summary1015

28.6 PRACTICE SET1016

28.6.1 Quizzes1016

28.6.2 Questions1016

28.6.3 Problems1018

28.7 SIMULATION EXPERIMENTS1021

28.7.1 Applets1021

28.7.2 Lab Assignments1021

28.8 PROGRAMMING ASSIGNMENTS1022

Chapter 29 Peer-to-Peer Paradigm1023

29.1 INTRODUCTION1024

29.1.1 P2P Networks1024

29.1.2 Distributed Hash Table(DHT)1026

29.2 CHORD1029

29.2.1 Identifier Space1029

29.2.2 Finger Table1029

29.2.3 Interface1030

29.2.4 Applications1036

29.3 PASTRY1036

29.3.1 Identifier Space1036

29.3.2 Routing1037

29.3.3 Application1041

29.4 KADEMLIA1041

29.4.1 Identifier Space1041

29.4.2 Routing Table1041

29.4.3 K-Buckets1044

29.5 BITTORRENT1045

29.5.1 BitTorrent with a Tracker1045

29.5.2 Trackerless BitTorrent1046

29.6 END-CHAPTER MATERIALS1047

29.6.1 Recommended Reading1047

29.6.2 Key Terms1047

29.6.3 Summary1047

29.7 PRACTICE SET1048

29.7.1 Quizzes1048

29.7.2 Questions1048

29.7.3 Problems1048

PART Ⅶ: Topics Related to All Layers1051

Chapter 30 Quality of Service1053

30.1 DATA-FLOW CHARACTERISTICS1054

30.1.1 Definitions1054

30.1.2 Sensitivity of Applications1054

30.1.3 Flow Classes1055

30.2 FLOW CONTROL TO IMPROVE QOS1055

30.2.1 Scheduling1056

30.2.2 Traffic Shaping or Policing1058

30.2.3 Resource Reservation1061

30.2.4 Admission Control1062

30.3 INTEGRATED SERVICES(INTSERV)1062

30.3.1 Flow Specification1062

30.3.2 Admission1063

30.3.3 Service Classes1063

30.3.4 Resource Reservation Protocol(RSVP)1063

30.3.5 Problems with Integrated Services1065

30.4 DIFFERENTIATED SERVICES(DFFSERV)1066

30.4.1 DS Field1066

30.4.2 Per-Hop Behavior1067

30.4.3 Traffic Conditioners1067

30.5 END-CHAPTER MATERIALS1068

30.5.1 Recommended Reading1068

30.5.2 Key Terms1068

30.5.3 Summary1068

30.6 PRACTICE SET1069

30.6.1 Quizzes1069

30.6.2 Questions1069

30.6.3 Problems1070

30.7 SIMULATION EXPERIMENTS1075

30.7.1 Applets1075

30.8 PROGRAMMING ASSIGNMENTS1075

Chapter 31 Cryptography and Network Security1077

31.1 INTRODUCTION1078

31.1.1 Security Goals1078

31.1.2 Attacks1079

31.1.3 Services and Techniques1081

31.2 CONFIDENTIALITY1081

31.2.1 Symmetric-Key Ciphers1081

31.2.2 Asymmetric-Key Ciphers1092

31.3 OTHER ASPECTS OF SECURITY1097

31.3.1 Message Integrity1097

31.3.2 Message Authentication1099

31.3.3 Digital Signature1100

31.3.4 Entity Authentication1105

31.3.5 Key Management1108

31.4 END-CHAPTER MATERIALS1114

31.4.1 Recommended Reading1114

31.4.2 Key Terms1114

31.4.3 Summary1114

31.5 PRACTICE SET1115

31.5.1 Quizzes1115

31.5.2 Questions1115

31.5.3 Problems1117

31.6 SIMULATION EXPERIMENTS1121

31.6.1 Applets1121

31.7 PROGRAMMING ASSIGNMENTS1122

Chapter 32 Internet Security1123

32.1 NETWORK-LAYER SECURITY1124

32.1.1 TwoModes1124

32.1.2 Two Security Protocols1126

32.1.3 Services Provided by IPSec1129

32.1.4 Security Association1130

32.1.5 Internet Key Exchange(IKE)1132

32.1.6 Virtual Private Network(VPN)1133

32.2 TRANSPORT-LAYER SECURITY1134

32.2.1 SSL Architecture1135

32.2.2 Four Protocols1138

32.3 APPLICATION-LAYER SECURITY1140

32.3.1 E-mail Security1141

32.3.2 Pretty Good Privacy(PGP)1142

32.3.3 S/MIME1147

32.4 FIREWALLS1151

32.4.1 Packet-Filter Firewall1152

32.4.2 Proxy Firewall1152

32.5 END-CHAPTER MATERIALS1153

32.5.1 Recommended Reading1153

32.5.2 Key Terms1154

32.5.3 Summary1154

32.6 PRACTICE SET1154

32.6.1 Quizzes1154

32.6.2 Questions1155

32.6.3 Problems1155

32.7 SIMULATION EXPERIMENTS1156

32.7.1 Applets1156

32.7.2 Lab Assignments1156

References1157

Index1163

热门推荐