首页  软件  游戏  图书  电影  电视剧

请输入您要查询的图书:

 

图书 计算机网络教程(自顶向下方法英文版)/经典原版书库
内容
内容推荐

《计算机网络教程:自顶向下方法(英文版)》是计算机领域知名作者forouzan按照目前计算机网络教学比较流行的自顶向下方法编写的一部重要教材。本书延续了forouzan一贯的风格,以通俗易懂的方式全面阐述了计算机网络原理及其应用,并介绍了一些目前计算机网络发展的新技术。此外,每章都配有丰富的练习集(包括测试题、练习题、思考题),部分章节还包含仿真实验和编程作业,有助于读者巩固所学知识,提高动手实践能力。

本书特色

协议分层:本书利用internet协议分层和tcp/ip协议族讲授网络原理,强调各层网络理论之间的相互关系。

自顶向下:从应用层开始,尽早让读者理解网络设备如何工作,然后讨论其他各层,最后介绍物理层。

形象直观:采用图文并茂的方法描述技术性很强的问题,较少涉及复杂的数学公式,便于读者理解相关概念。

举例和应用:以丰富的实例,阐明相关概念,并添加了一些现实中的应用,激发读者的学习热情。

目录

preface v

chapter 1 introduction

 1.1 overview of the internet

 1.1.1 networks

 1.1.2 switching

 1.1.3 the intemet

 1.1.4 accessing the intemet

 1.1.5 hardware and software

 1.2 protocol layering

 1.2.1 scenarios

 1.2.2 tcp/ip protocol suite

 1.2.3 the esi model

 1.3 internet history

 1.3.1 early history

 1.3.2 birth of the intemet

 1.3.3 intemet today

 1.4 standards and administration

 1.4.1 intemet standards

 1.4.2 intemet administration

 1.5 end-chapter materials

 1.5.1 further reading

 1.5.2 key terms

 1.5.3 summary

 1.6 practice set

 1.6.1 quizzes

 1.6.2 questions

 1.6.3 problems

 1.7 simulation experiments

 1.7.1 applets

 1.7.2 lab assignments

chapter 2 application layer

 2.1 introduction

 2.1.1 providing services

 2.1.2 application-layer paradigms

 2.2 client-server paradigm

 2.2.1 application programming interface

 2.2.2 using services of the transport layer

 2.3 standard client-server applications

 2.3.1 world wide web and http

 2.3.2 ftp

 2.3.3 electronic mail

 2.3.4 telnet

 2.3.5 secure shell (ssh)

 2.3.6 domain name system (dns)

 2.4 peer-to-peer paradigm

 2.4.1 p2p networks

 2.4.2 distributed hash table (dht)

 2.4.3 chord

 2.4.4 pastry

 2.4.5 kademlia

 2.4.6 a popular p2p network: bittorrent

 2.5 socket interface programming

 2.5.1 socket interface in c

 2.6 end-chapter materials

 2.6.1 further reading

 2.6.2 key terms

 2.6.3 summary

 2.7 practice set

 2.7.1 quizzes

 2.7.2 questions

 2.7.3 problems

 2.8 simulation experiments

 2.8.1 applets

 2.8.2 lab assignments

 2.9 programming assignment

chapter 3 transport layer

 3.1 introduction

 3.1.1 transport-layer services

 3.2 transport-layer protocols

 3.2.1 simple protocol

 3.2.2 stop-and-wait protocol

 3.2.3 go-back-n protocol (gb'n)

 3.2.4 selective-repeat protocol

 3.2.5 bidirectional protocols: piggybacking

 3.2.6 intemet transport-layer protocols

 3.3 user datagram protocol (udp)

 3.3.1 user datagram

 3.3.2 udpservices

 3.3.3 udp applications

 3.4 transmission control protocol (tcp)

 3.4.1 tcp services

 3.4.2 tcp features

 3.4.3 segment

 3.4.4 a tcp connection

 3.4.5 state transition diagram

 3.4.6 windows in tcp

 3.4.7 flow control

 3.4.8 error control

 3.4.9 tcp congestion control

 3.4.10 tcp timers

 3.4.11 options

 3.5 end-chapter materials

 3.5.1 further reading

 3.5.2 key terms

 3.5.3 summary

 3.6 practice set

 3.6.1 quizzes

 3.6.2 questions

 3.6.3 problems

 3.7 simulation experiments

 3.7.1 applets

 3.7.2 lab assignments

 3.8 programming assignment

chapter 4 network layer

 4.1 introduction

 4.1.1 network-layer services

 4.1.2 packet switching

 4.1.3 network-layer performance

 4.1.4 network-layer congestion

 4.1.5 structure of a router

 4.2 network-layer protocols 26!

 4.2.1 ipv4 datagram format

 4.2.2 ipv4 addresses

 4.2.3 forwarding of ip packets

 4.2.4 icmpv4

 4.3 unicast routing

 4.3.1 general idea

 4.3.2 routing algorithms

 4.3.3 unicast routing protocols

 4.4 multicast routing

 4.4.1 introduction

 4.4.2 multicasting basics

 4.4.3 intradomain routing protocols

 4.4.4 interdomain routing protocols

 4.5 next generation ip

 4.5.1 packet format

 4.5.2 ipv6 addressing

 4.5.3 transition from ipv4 to ipv6

 4.5.4 icmpv6

 4.6 end-chapter materials

 4.6.1 further reading

 4.6.2 key terms

 4.6.3 summary

 4.7 practice set

 4.7.1 quizzes

 4.7.2 questions

 4.7.3 problems

 4.8 simulation experiments

 4.8.1 applets

 4.8.2 lab assignments

 4.9 programming assignment

chapter 5 data-link layer: wired networks

 5.1 introduction

 5.1.1 nodes and links

 5.1.2 two types of links

 5.1.3 two sublayers

 5.2 data link control (dlc)

 5.2.1 framing

 5.2.2 flow and error control

 5.2.3 error detection and correction

 5.2.4 two dlc protocols

 5.3 multiple access protocols

 5.3.1 random access

 5.3.2 controlled access

 5.3.3 channelization

 5.4 link-layer addressing

 5.5 wired lans: ethernet protocol

 5.5.1 ieee project 802

 5.5.2 standard ethernet

 5.5.3 fast ethernet (100 mbps)

 5.5.4 gigabit ethernet

 5.5.5 10-gigabit ethernet

 5.5.6 vh'tual lans

 5.6 other wired networks

 5.6.1 point-to-point networks

 5.6.2 sonet

 5.6.3 switched network: atm

 5.7 connecting devices

 5.7.1 repeaters or hubs

 5.7.2 link-layer switches

 5.7.3 routers

 5.8 end-chapter materials

 5.8.1 recommended reading

 5.8.2 key terms

 5.8.3 summary

 5.9 practice set

 5.9.1 quizzes

 5.9.2 questions

 5.9.3 problems

 5.10 simulation experiments

 5.10.1 applets

 5.10.2 lab assignments

 5.11 programming assignments

chapter 6 wireless networks and mobile ip

 6.1 wireless lans

 6.1.1 introduction

 6.1.2 ieee 802.11project

 6.1.3 bluetooth

 6.1.4 wimax

 6.2 other wireless networks

 6.2.1 channelization

 6.2.2 cellular telephony

 6.2.3 satellite networks

 6.3 mobile ip

 6.3.1 addressing

 6.3.2 agents

 6.3.3 three phases

 6.3.4 inefficiency in mobile ip

 6.4 end-chapter materials

 6.4.1 further reading

 6.4.2 key terms

 6.4.3 summary

 6.5 practice set

 6.5.1 quizzes

 6.5.2 questions

 6.5.3 problems

 6.6 simulation experiments

 6.6.1 applets

 6.6.2 lab assignments

 6.7 programming assignment

chapter 7 physical layer and transmission media

 7.1 data and signals

 7.1.1 analog and digital

 7.1.2 transmission impairment

 7.1.3 data rate limits

 7.1.4 performance

 7.2 digital transmission

 7.2.1 digital-to-digital conversion

 7.2.2 analog-to-digitalconversion

 7,3 analog transmission

 7.3.1 digital-to-analog conversion

 7.3.2 analog-to-analog conversion

 7.4 bandwidth utilization

 7.4.1 multiplexing

 7.4.2 spread spectrum

 7.5 transmission media

 7.5.1 guided media

 7.5.2 unguided media: wireless

 7.6 end-chapter materials

 7.6.1 recommended reading

 7.6.2 key terms

 7.6.3 summary

 7.7 practice set

 7.7.1 quizzes

 7.7.2 questions

 7.7.3 problems

chapter 8 multimedia and quality of service

 8.1 compression

 8.1.1 lossless compression

 8.1.2 lossy compression

 8.2 multimedia data

 8.2.1 text

 8.2.2 image

 8.2.3 video

 8.2.4 audio

 8.3 multimedia in the internet

 8.3.1 streaming stored audio/video

 8.3.2 streaming live audio/video

 8.3.3 real-time interactive audio/video

 8.4 real-time interactive protocols

 8.4.1 rationale for new protocols

 8.4.2 rtp

 8.4.3 rtcp

 8.4.4 session initialization protocol (sip)

 8.4.5 h.323

 8.4.6 sctp

 8.5 quality of service

 8.5.1 data-flow characteristics

 8.5.2 flow classes

 8.5.3 flow control to improve qos

 8.5.4 integrated services (intserv)

 8.5.5 differentiated services (diffserv)

 8.6 end-chapter materials

 8.6.1 recommended reading

 8.6.2 key terms

 8.6.3 summary

 8.7 practice set

 8.7.1 quizzes

 8.7.2 questions

 8.7.3 problems

 8.8 simulation experiments

 8.8.1 applets

 8.8.2 lab assignments

 8.9 programming assignments

chapter 9 network management

 9.1 introduction

 9.1.1 configuration management

 9.1.2 fault management

 9.1.3 performance management

 9.1.4 security management

 9.1.5 accounting management

 9.2 snmp

 9.2.1 managers and agents

 9.2.2 management components

 9.2.3 an overview

 9.2.4 smi

 9.2.5 mib 7t

 9.2.6 snmp

 9.3 asn. 1

 9.3.1 language basics

 9.3.2 data types

 9.3.3 encoding

 9.4 end-chapter materials

 9.4.1 further reading

 9.4.2 key terms

 9.4.3 summary

 9.5 practice set

 9.5.1 quizzes

 9.5.2 questions

 9.5.3 problems

chapter 10 network security

 10.1 introduction

 10.1.1 security goals

 10.1.2 attacks

 10.1.3 services and techniques

 t 0.2 confidentiality

 10.2.1 symmetric-key ciphers

 10.2.2 asymmetric-key ciphers

 10.3 other aspects of security

 10.3.1 message integrity

 10.3.2 message authentication

 10.3.3 digital signature

 10.3.4 entity authentication

 10.3.5 key management

 10.4 internet security

 10.4.1 application-layer security

 10.4.2 transport-layer security

 10.4.3 network-layer security

 10.5 firewalls

 10.5.1 packet-filter firewall

 10.5.2 proxy firewall

 10.6 end-chapter materials

 10.6.1 further reading

 10.6.2 key terms

 10.6.3 summary

 10.7 practice set

 10.7.1 quizzes

 10.7.2 questions

 10.7.3 problems

 10.8 simulation experiments

 10.8.1 applets

 10.8.2 lab assignments

 10.9 programming assignments

chapter 11 socket programming in java

 11.1 introduction

 11.1.1 addresses and ports

 11.1.2 client-server paradigm

 11.2 programming with udp

 11.2.1 iterative approach

 11.2.2 concurrent approach

 11.3 programming with tcp

 11.3.1 iterative approach

 11.3.2 concurrent approach

 11.4 end-chapter materials

 11.4.1 further reading

 11.4.2 key terms

 11.4.3 summary

 11.5 practice set

 11.5.1 quizzes

 11.5.2 questions

 11.5.3 problems

 11.6 programming assignments

 appendix a unicode

 appendix b positional numbering system

 appendix c html, css, xml, and xsl

 appendix d miscellaneous information

 appendix e 8b/6t code

glossary

references

index

标签
缩略图
书名 计算机网络教程(自顶向下方法英文版)/经典原版书库
副书名
原作名
作者 (美)佛罗赞//莫沙拉夫
译者
编者
绘者
出版社 机械工业出版社
商品编码(ISBN) 9787111374305
开本 32开
页数 931
版次 1
装订 平装
字数
出版时间 2012-03-01
首版时间 2012-03-01
印刷时间 2012-03-01
正文语种
读者对象 普通成人
适用范围
发行范围 公开发行
发行模式 实体书
首发网站
连载网址
图书大类 教育考试-考试-计算机类
图书小类
重量 0.926
CIP核字
中图分类号 TP393
丛书名
印张 29.75
印次 1
出版地 北京
213
149
33
整理
媒质 图书
用纸 普通纸
是否注音
影印版本 原版
出版商国别 CN
是否套装 单册
著作权合同登记号
版权提供者
定价
印数
出品方
作品荣誉
主角
配角
其他角色
一句话简介
立意
作品视角
所属系列
文章进度
内容简介
作者简介
目录
文摘
安全警示 适度休息有益身心健康,请勿长期沉迷于阅读小说。
随便看

 

兰台网图书档案馆全面收录古今中外各种图书,详细介绍图书的基本信息及目录、摘要等图书资料。

 

Copyright © 2004-2025 xlantai.com All Rights Reserved
更新时间:2025/5/18 6:07:32