TCPIP协议族

本书特色

[

这是一本介绍TCP/IP协议族的教材,全书共有24章,分为5个部分:**部分(第1-3章)介绍一些基本概念和基本技术;第二部分(第4-13章)讨论TCP/IP协议族中的核心协议IP和TCP以及几个主要的选路协议;第三部分(第14-23章)讨论使用网络和传输层协议的应用程序;第四部分(第24章)介绍使用插口接口进行网络编程;第五部分(第25章)介绍IPv6以及从IPv4到IPv6的过渡。
本书的主要特点是:(1)用图文并茂的方法讲述技术性很强的内容;(2)重要的概念多次重复;(3)结合实例例子阐明概念;(4)大部分章设有相关的设计内容,以帮助理解每一种协议的思路;(5)章末有归纳该章重点内容的小结;(6)每章有练习题:用来测验对基本概念和术语掌握情况的多项选择题、用于引导对内容有更深了解的习题、编程练习。
本书可作为大学生和研究生的教学参考书,对从事计算机网络的专业人员也有很好的参考价值。

]

目录

Chapter1 Introduction1.1 PROTOCOLS AND STANDARDSProtocolsStandards1.2 STANDARDS ORGANIZATONSStandards Creation CommitteesForumsRegulatory Agencies1.3 Internet StandardsMaturity LevelsRequirement Levels1.4 INTERNET ADMINISTRATIONISOCIABIETFIRTFIANA and ICANNNIC1.5 A BRIEF HISTORYARPANETBirth of the InternetTCP/IP ProtocolMILNETCSNETNSFNETANSNETThe Internet TodayTimeline1.6 SUMMARY1.7 PRACTICE SETMultiple ChoiceExercisesChapter2 The OSI Model and the TCP/IP Protocol Suite2.1 THE OSI MODELLayered ArchitecturePeer-to-Peer Processes2.2 LAYERS IN THE OSI MODELPhysical LayerData Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer2.3 TCP/IP PROTOCOL SUITEPhysical and Data Link LayersNetwork LayerTransport LayerApplication Layer2.4 ADDRESSINGPhysical AddressInternet AddressPort Address2.5 TCP/IP VERSIONSVersion4Version5Version62.6 SUMMARY2.7 PRACTICE SETMultiple ChoiceExercisesChapter3 Underlying Technologies3.1 TRANSMISSION MEDIAGuided MediaUnguided Media3.2 LOCAL AREA NETWORKS(LANS)EthernetToken RingFiber Distributed Data Interface(FDDI)3.3 SWITCHINGCircuit SwitchingPacket SwitchingMessage Switching3.4 WIDE AREA NETWORKS(WANS)Point-to-Point Protocol(PPP)X.25 60Frame RelayAsynchronous Transfer Mode(ATM)3.5 CONNECTING DEVICESRepeatersBridgesRoutersGateways3.6 SUMMARY3.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter4 IP Addressing4.1 DECIMAL NOTATION4.2 CLASSESClass AClass BClass CClass DClass EDetermining the Class of an AddressExtracting Netid and HostidMultihomed DevicesLocation Not Names4.3 SPECIAL ADDRDSSESNetwork AddressDirect Broadcast AddressLimited Broadcast AddressThis Host on This NetworkSpecific Host on This NetworkLoopback Address4.4 A SAMPLE INTERNET4.5 UNICAST MULTICAST AND BROADCAST ADDRESSESUnicast AddressesMulticast AddressesBroadcast Addresses4.6 APPLYING FOR IP ADDRESSESClass of AddressNteids and HostidsAuthorities4.7 PRIVATE NETWORKS4.8 SUMMARY4.9 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter5 Subnetting and Supernetting5.1 SUBNETTINGThree Levels of Hierarchy5.2 MASKINGSpecial Addresses in SubnettingContiguous vs.Noncontiguous Mask5.3 EXAMPLES OF SUBNETTINGSubnetting Class ASubnetting Class BSubnetting Class C5.4 VARIABLE-LENGTH SUBNETTING5.5 SUPERNETTINGSupernet MaskClassless Interdomain Routing(CIDR)5.6 SUMMARY5.7 PRACTICE SETMultiple ChoiceExercisesChapter6 Delivery and Routing of IP Packets6.1 CONNECTION-ORIENTED VS.CONNECTIONLESS SERVICES6.2 DIRECT VS.INDIRECT DELIVERYDirect DeliveryIndirect Delivery6.3 ROUTING METHODSNext-Hop RoutingNetwork-Specfic RoutingHost-Specific RoutingDefault Routing6.4 STATIC VS.DYNAMIC ROUTINGStatic Routing TableDynamic Routing Table6.5 ROUTING MODULE AND ROUTING TABLE DESIGNRouting TableRouting ModuleExamples6.6 SUMMARY6.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter7 Internet Protocol(IP)7.1 DATAGRAM7.2 FRAGMENTATIONMaximum Transfer Unit(MTU)Fields Related to Fragmentation7.3 OPTIONSFormatOption Types7.4 CHECKSUMChecksum Calculation at the SenderChecksum Calculation at the ReceiverChecksum in the IP PacketExample7.5 IP DESIGNHeader-Adding ModuleProcessing ModuleQueuesRouting TableRouting ModuleMTU TableFragmentation ModuleReassembly TableReassembly Module7.6 SUMMARY7.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter8 ARP and RARP8.1 ARPPacket FormatEncapsulationOperationProxy ARP8.2 ARP DESIGNCache TableQueuesOutput ModuleInput ModuleCache-Control ModuleExamples of ARP8.3 ARRPPacket FormatEncapsulationAlternative Solutions to RARP8.4 SUMMARY8.5 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter9 Internet Control Message Protocol(ICMP)9.1 TYPES OF MESSAGES9.2 MESSAGE FORMAT9.3 ERROR REPORTINGDestination UnreachableSource QuenchTime ExceededParameter ProblemRedirection9.4 QUERYEcho Request and ReplyTimestamp Request and ReplyAddress Mask Request and ReplyRouter Solicitation adn Advertisement9.5 CHECKSUMChecksum CalculationChecksum TestingExample9.6 ICMP DESIGNInput ModuleOutput Module9.7 SUMMARY9.8 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter10 Internet Group Management Protocol(IGMP)10.1 MULTICASTINGMulticast Addresses10.2 IGMPTypes of MessagesMessage FormatOperation of IGMP in a Single NetworkOperation of IGMP in an InternetChanging IP Addresses to PhysicalAddresses10.3 ENCAPSULATION10.4 MULTICAST BACKBONE(MBONE)10.5 IGMP DESIGNGroup TableTimersGroup-Joining ModuleGroup-Leaving ModuleInput ModuleOutput ModuleExamples of IGMP10.6 SUMMARY10.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter11 User Datagram Protocol(UDP)11.1 PROCESS-TO-PROCESSCOMMUNICATIONPort NumbersSocket Addresses11.2 USER DATAGRAM11.3 CHECKSUMChecksum Calculation at SenderChecksum Calculation at ReceiverAn ExampleOptional Use of the Checksum11.4 UDP OPERATIONConnectionless ServicesFlow and Error ControlEncapsulation and DecapsulationQueuingMultiplexing and Demultiplexing11.5 USE OF UDP11.6 UDP DESIGNControl-Block TableInput QueuesControl-Block ModuleInput ModuleOutput ModuleExamples11.7 SUMMARY11.8 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter12 Transmission Control Protocol(TCP)12.1 PROCESS-TO-PROCESS COMMUNICATIONPort AddressesSocket Addresses12.2 TCP SERVICESStream Data ServiceFull-Duplex ServiceReliable Service12.3 SEGMENT12.4 OPTIONS12.5 CHECKSUM12.6 FLOW CONTROLSliding WindowWindow ManagementSlly Window Syndrome12.7 ERROR CONTROLError Detection and Correction12.8 TCP TIMERSRetransmission TimerPersistence TimerKeepalive TimerTimer-Waited Timer12.9 CONNECTIONConnection EstablishmentConnection TerminationConnection Resetting12.10 STATE TRANSITION DIAGRAMClient DiagramServer Diagram12.11 CONGESTION CONTROL12.12 TCP OPERATIONEncapsulation and DecapsulationQueuingMultiplexing and DemultiplexingPushing DataUrgent Data12.13 TCP DESIGNTransmission Control Blocks(TCBs)TimersMain ModuleInput Processing ModuleOutput Processing Module12.14 SUMMARY12.15 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter13 Routing Protocols(RIP,OSPF,and BGP)13.1 INTERIOR AND EXTERIOR ROUTING13.2 RIPDistance Vector RoutingRIP Message FormatRequests and ResponsesTimers in RIPSlow ConvergenceInstabilitySome Remedies for InstabillityRIP VersionAuthenticationEncapsulation13.3 OSPFAreasMetricLink State RoutingTypes of PacketsPacket FormatEncapsulation13.4 BGPPath Vector RoutingTypes of PacketsPacket FormatEncapsulation13.5 MULTICAST ROUTINGDVMRPMOSPF13.6 SUMMARY13.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter14 Application Layer and Client-Server Model14.1 CLIENT-SERVER MODELClientServer14.2 CONCURRENCYConcurrency in ClientsConcurrency in Servers14.3 PROCESSESConceptProcess IdentificationProcess Creation14.4 SUMMARY14.5 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter15 BOOTP and DHCP15.1 BOOTPPacket FormatOperationUDP PortsUsing TFTPRelay Agent15.2 DYNAMIC HOST CONFIGURATION PROTOCOL(DHCP)LeasingDHCP OperationPacket Format15.3 SUMMARY15.4 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter16 Domain Name System(DNS)16.1 NAME SPACEFlat Name SpaceHierarchical Name Space16.2 DOMAIN NAME SPACELabelDomain NameDomain16.3 DISTRIBUTION OF NAME SPACEHierarchy of Name ServersZonePrimary and Secondary Servers16.4 DNS IN THE INTERNETGeneric DomainsCountry DomainsInverse Domain16.5 RESOLUTIONResolverMapping Names to AddressesMapping Addresses to NamesRecursive ResolutionIterative ResolutionCaching16.6 DNS MESSAGESHeader16.7 TYPES OF RECORDSQuestion Record Resource Record16.8 COMPRESSION16.9 EXAMPLES16.10 DDNS16.11 ENCAPSULATION 16.12 SUMMARY16.13 PRACTICE SETMultiple ChoiceExercisesChapter17 TERNET and Rlogin17.1 CONCEPTTimesharing EnvironmentLogin17.2 NETWORK VIRTUAL TERMINAL(NVT)17.3 NVT CHARACTER SETData CharactersRemote Control Characters17.4 EMBEDDING17.5 OPTIONS17.6 OPTION NEGOTIATIONEnabling an OptionDisabling an OptionExampleSymmetry17.7 SUBOPTION NEGOTIATION17.8 CONTROLLING THE SERVER17.9 OUT-OF-BAND SIGNALING17.10 ESCAPE CHARACTERDefault ModeCharacter ModeLine Mode17.11 MODE OF OPERATIONDefault ModeCharacter ModeLine Mode17.12 EXAMPLES17.13 USER INTERFACE17.14 RLOGIN(REMOTE LOGIN)TCP PortConnectionFlow ControlCommandsMode17.15 SECURITY ISSUE17.16 SUMMARY17.17 PRACTICE SETMultiple ChoiceExercisesChapter18 File Transfer Protocol(FTP)18.1 CONNECTIONSControl ConnectionData Connection18.2 COMMUNICATIONCommunication over ControlConnectionCommunication over Data Connection18.3 COMMAND PROCESSINGCommandsResponses18.4 FILE TRANSFER18.5 USER INTERFACE18.6 ANONYMOUS FTP18.7 SUMMARY18.8 PRACTICE SETMultiple ChoiceExercisesChapter19 Trivial File Transfer Protocol(TFTP)19.1 MESSAGESRRQWRQDATAACKERROR19.2 CONNECTIONConnection EstablishmentConnection Termination19.3 DATA TRANSFERFlow ControlError ControlSorcerer’s Apprentice Bug19.4 UDP PORTS19.5 TFTP EXAMPLE19.6 TFTP OPTONS19.7 SECUITY19.8 APPLICATIONS19.9 SUMMARY19.10 PRACTICE SETMultiple ChoiceExercisesChapter20 Simple Mail Transfer Protocol(SMTP)20.1 USER AGENT(UA)Sending MailReceiving Mail20.2 ADDRESSESLocal PartDomain Name20.3 DELAYED DELIVERYSender-Site DelayReceiver-Site DelayIntermediate Delay20.4 ALIASESOne-to-Many ExpansionMany-to-One Expasion20.5 MAIL TRANSFER AGENT(MTA)20.6 COMMANDS AND RESPONSESCommandsResponses20.7 MAIL TRANSFER PHASESConnection EstablishmentMessage TransferConnection Termination20.8 MULTIPURPOSE INTERNET MAIL EXTENSIONS(MIME)MIME-VersionContent-TypeContent-Transfer-EncodingContent-IdContent-Description20.9 POST OFFICE PROTOCOL(POP)20.10 SUMMARY20.11 PRACTICE SETMultiple ChoiceExercisesChapter21 Simple Network Management Protocol(SNMP)21.1 CONNEPTManagers and AgentsComponents21.2 SMINameTypeEncoding Method21.3 MIBAccessing MIB VariablesLexicographic Ordering21.4 SNMPMessagesFormatEncoding21.5 EXAMPLES21.6 UDP PORTS21.7 SUMMARY21.8 PRACTICE SETMultiple ChoiceExercisesChapter22 Hypertext Transfer Protocol(HTTP)22.1 HTTP TRANSACTIONMessages22.2 REQUEST MESSAGESRequest LineMethods22.3 RESPONSE MESSAGESStatus Line22.4 HEADERGeneral HeaderRequest HeaderResponse HeaderEntity Header22.5 EXAMPLES22.6 PRACTICE SETMultiple ChoiceExercisesChapter23 World Wide Web(WWW)23.1 HTPERTEXT AND HYPERMEDIA23.2 BROWSER ARCHITECTURE23.3 STATIC DOCUMENTS23.4 HTMLStructure of a Web PageTagsExamples23.5 DYNAMIC DOCUMENTS23.6 COMMON GATEWAY INTERFACE(CGI)CGI ProgramEnvironmentVariablesInputOutputExamples23.7 ACTIVE DOCUMENTSCreation Compilation and Execution23.8 JAVAClasses and ObjectsInstantiationIngeritancePackagesSkeleton of an AppletCreation and CompilationHTML DocumentExamples23.9 SUMMARY23.10 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter24 Socket Interface24.1 SOME DEFINITIONSData Types DefinedInternet Address StructureInternet Socket Address Structure24.2 SOCKETSSocket Types24.3 BYTE ORDERINGBig-Endian Byte OrderLittle-Endian Byte OrderNetwork Byte OrderByte-Order Transformation24.4 ADDRESS TRANSFORMATION24.5 MYTE MAINPULATION FUNCTIONS24.6 INFORMATION ABOUT REMOTE HOST24.7 SOCKET SYSTEM CALLSSocketBindConnectListenAcceptSendtoRecvfromReadWriteClose24.8 CONNECTIONLESS ITERATIVE SERVERServerClient 24.9 UDP CLIENT-SERVER PROGRAMSServer ProgramClient Program24.10 CONNECTION-ORIENTED CONCURRENT SERVERServerClient24.11 TCP CLIENT-SERVER PROGRAMSServer ProgramClient Program24.12 SUMMARY24.13 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesChapter25 Next Generation:IPv6 and ICMPv625.1 IPV625.2 IPV6 ADDRESSESHexadecimal Colon NotationCategories of AddressesAddress Space Assignment25.3 IPV6 PACKET FORMATBase HeaderPriorityFlow LabelComparison between IPv4 and IPv6HeadersExtension HeadersComparison between IPv4 and IPv625.4 ICMPV6Error ReportingQuery25.5 TRANSITION FROM IPV4 TO IPV6Dual StackTunnelingHeader Translation25.6 SUMMARY25.7 PRACTICE SETMultiple ChoiceExercisesProgramming ExercisesAppendixAASCII CodeAppendixBNumbering Systems and TransformationB.1 NUMBERING SYSTEMSDecimal NumbersBinary NumbersOctal NumbersHexadecimal NumbersB.2 TRANSFORMATIONFrom Other Systems to DecimalFrom Decimal to Other SystemsFrom Binary to Octal or HexadecimalFrom Octal or Hexadecimal to BinaryAppendixCRepresentation of Binary NumbersC.1 UNSIGNED NUMBERSC.2 SIGNED NUMBERSSign-and-MagnitudeOne’ComplementTwo’ComplementC.3 MORE ABOUT ONE’COMPLEMENTFinding the ComplementAddign Two NumbersAppendixDError DetectionD.1 TYPES OF ERRORSSingle-Bit ErrorMultiple-Bit ErrorBurst ErrorD.2 DETECTIONRedundancyVertical Redundancy Check(VRC)Longitudinal Redundancy Check(LRC)Cyclic Redundancy Check(CRC)ChecksumAppendixEEncryption/DecryptionE.1 CONVENTIONAL METHODSDESE.2 PUBLIC KEY METHODSRSA EncryptionE.3 AUTHENTICATIONAppendixFMIB ObjectsF.1 SYSTEM GROUPF.2 INTERFACE GROUPF.3 IP GROUPF.4 ICMP GROUPF.5 TCP GROUPF.6 UDP GROUPAppendixGHigh-Level Data Link Control(HDLC)G.1 STATION TYPESG.2 CONFIGURATIONSG.3 MODES OF COMMUNICATIONNRMARMABMG.4 FRAMESG.5 MORE ABOUT FRAMESI-framesS-framesU-framesG.6 LINK ACCESS PROCEDURES(LAPS)LAPBLAPDLAPMAppendixHProjectH.1 PROJECTH.2 PROJECTLLCMACAppendixIASN.1I.1 DATA TYPES AND VALUESSimple TypeStructured TypeTagsSubtypingValuesI.2 MODULES AND MACROSModulesMacrosAppendixJSpanning TreeJ.1 SPANNING TREES AND BRIDGESAlgorithmForming the Spanning TreeExampleJ.2 SPANNING TREES AND MULTICAST ROUTINGAppendixKContact AddressesAppendixLRFCsAppendixMUDP and TCP PortsSolutionsAcronymsGlossaryReferencesIndex

封面

TCPIP协议族

书名:TCPIP协议族

作者:Behrouz

页数:未知

定价:¥69.0

出版社:清华大学出版社

出版日期:2000-12-01

ISBN:9787302041009

PDF电子书大小:45MB 高清扫描完整版

百度云下载:http://www.chendianrong.com/pdf

发表评论

邮箱地址不会被公开。 必填项已用*标注