计算机网络:系统方法(英文版·第5版)
作者 : (美)Larry L. Peterson普林斯顿大学 Bruce S. DavieCisco公司 著
丛书名 : 经典原版书库
出版日期 : 2012-03-29
ISBN : 978-7-111-37720-7
适用人群 : 本书是计算机网络方面的经典畅销教科书,凝聚了两位顶
定价 : 139.00元
教辅资源下载
扩展信息
语种 : 英文
页数 : 912
开本 : 16
原书名 : Computer Networks: A Systems Approach,Fifth Edition
原出版社: Elsevier
属性分类: 教材
包含CD :
绝版 :
图书简介

本书与传统网络教材最大的不同在于,不是按照osi层次机械地介绍计算机网络,而是采用“系统方法”,将网络看成是交互式的复杂系统。每章开头都给出一些启发式的问题,引导学生或专业人员用新学到的知识来解决实际问题;同时,在每章的最后还会补充一些新的工具和资源,帮助读者巩固和加深所学知识,全面理解复杂网络及其应用的工作原理和工作方式。

上架指导

计算机\网络

封底文字

“本书采用系统方法讲解计算机网络基本理论及其应用,不仅教授读者知其然,更要知其所以然。本版中,作者对内容进行了全面更新和修订,与时俱进,更加强调应用设计、无线技术和移动技术。”
    ——David Clark,因特网先驱,MIT教授
Peterson 和 Davie 清晰地描述了各层网络协议,并且在书中给出许多注释边框,来帮助读者更深入、全面地理解深刻影响我们这个社会的各种技术。
——Jean Walrand, 加州大学伯克利分校
我一直采用本书作为通信网络导论课程的教材,对于本书前几个版本也比较熟悉,本版秉承了前几版的特点,不仅说明了“ 如何设计网络”,还解释了“为什么这样设计网络”。本书为读者构建了工程直观性,在计算机技术快速发展的今天,这对于培养读者设计和选择下一代系统的决策能力是非常重要的。
——Roch Guerin, 宾夕法尼亚大学
本书是一本非常优秀的计算机网络导论教材,条理清晰、内容全面、实例丰富。Peterson和Davie在不失技术严谨性的同时以通俗易懂的方式阐明了计算机网络相关概念。对于网络架构设计基本原理及构建其上的应用,本书实现了完美均衡。总之,本书对网络学习和应用来说都是无价的。
                        ——Arvind Krishnamurthy,华盛顿大学
本书是计算机网络方面的经典教科书,凝聚了两位顶尖网络专家几十年的理论研究、实践经验和大量第一手资料,自出版以来已经成为网络课程主流教材,被哈佛大学、斯坦福大学、卡内基-梅隆大学、康奈尔大学、普林斯顿大学等众多名校采用。
第5版秉承了前4版的特点,通过丰富的网络和协议设计实例,来阐述计算机网络关键原理。全书的重点在于“为什么这样设计网络”——不仅详细叙述当今网络系统的组成,而且还阐述关键技术和协议如何在实际应用中发挥作用,从而解决具体的问题。本版对内容进行了全面更新,覆盖P2P、无线技术、网络安全和应用等重要主题,更关注网络研究和设计中涉及的应用层问题。

作者简介

(美)Larry L. Peterson普林斯顿大学 Bruce S. DavieCisco公司 著:Larry L. Peterson 普林斯顿大学副校长,计算机科学系Robert E. Kahn教授,并且还是Verivue,Inc.首席科学家。他于1985年在普度大学获得博士学位,其研究方向主要是网络系统的设计与实现。 Bruce S. Davie 拥有英国爱丁堡大学计算机科学博士学位,于1995年加入Cisco公司,并于1998年被授予Cisco特别会员荣誉称号。他主持设计了MPLS协议,并开发了其他重要的因特网技术。Davie博士在加入Cisco之前曾担任贝尔通信研究公司的首席科学家。 作者照片从上一版封底上复制(978-7-111-21401-4)

图书目录

Foreword vi Foreword to the First Edition vii Preface ix
1 Foundation
Problem: Building a Network 1
1.1 Applications 2
1.1.1 Classes of Applications 3
1.2 Requirements 6
1.2.1 Perspectives 7
1.2.2 Scalable Connectivity 8
1.2.3 Cost-Effective Resource Sharing 13
1.2.4 Support for Common Services 18
1.2.5 Manageability 23
1.3 Network Architecture 24
1.3.1 Layering and Protocols 24
1.3.2 Internet Architecture 33
1.4 Implementing Network Software 36
1.4.1 Application Programming Interface(Sockets) 37
1.4.2 Example Application 40
1.5 Performance 44
1.5.1 Bandwidth and Latency 44
1.5.2 Delay×Bandwidth Product 48
1.5.3 High-Speed Networks 51
1.5.4 Application Performance Needs 53
1.6 Summary 55
What’s Next: Cloud Computing 57
Further Reading 58
Exercises 60
2 Getting Connected
Problem: Connecting to a Network 71
2.1 Perspectives on Connecting 72
2.1.1 Classes of Links 75
2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B) 78
2.3 Framing 81
2.3.1 Byte-Oriented Protocols (BISYNC, PPP, DDCMP) 83
2.3.2 Bit-Oriented Protocols (HDLC) 85
2.3.3 Clock-Based Framing (SONET) 88
2.4 Error Detection 91
2.4.1 Two-Dimensional Parity 93
2.4.2 Internet Checksum Algorithm 94
2.4.3 Cyclic Redundancy Check 97
2.5 Reliable Transmission 102
2.5.1 Stop-and-Wait 103
2.5.2 Sliding Window 106
2.5.3 Concurrent Logical Channels 118
2.6 Ethernet and Multiple Access Networks (802.3) 119
2.6.1 Physical Properties 120
2.6.2 Access Protocol 122
2.6.3 Experience with Ethernet 127
2.7 Wireless 128
2.7.1 802.11/Wi-Fi 135
2.7.2 Bluetooth  (802.15.1) 142
2.7.3 Cell Phone Technologies 144
2.8 Summary 148
What’s Next: “The Internet of Things” 150
Further Reading 151
Exercises 153
3 Internetworking
Problem: Not All Networks are Directly Connected 169
3.1 Switching and Bridging 170
3.1.1 Datagrams 172
3.1.2 Virtual Circuit Switching 174
3.1.3 Source Routing 186
3.1.4 Bridges and LAN Switches 189
3.2 Basic Internetworking (IP) 203
3.2.1 What Is an Internetwork 203
3.2.2 Service Model 206
3.2.3 Global Addresses 213
3.2.4 Datagram Forwarding in IP 216
3.2.5 Subnetting and Classless Addressing 220
3.2.6 Address Translation (ARP) 228
3.2.7 Host Configuration (DHCP) 231
3.2.8 Error Reporting (ICMP) 235
3.2.9 Virtual Networks and Tunnels 235
3.3 Routing 240
3.3.1 Network as a Graph 242
3.3.2 Distance Vector (RIP) 243
3.3.3 Link State (OSPF) 252
3.3.4 Metrics 262
3.4 Implementation and Performance 266
3.4.1 Switch Basics 267
3.4.2 Ports 270
3.4.3 Fabrics 273
3.4.4 Router Implementation 277
3.5 Summary 280
What’s Next: The Future Internet 281
Further Reading 282
Exercises 284
4 Advanced Internetworking
Problem: Scaling to Billions 307
4.1 The Global Internet 308
4.1.1 Routing Areas 310
4.1.2 Interdomain Routing (BGP) 313
4.1.3 IP Version 6 (IPv6) 324
4.2 Multicast 338
4.2.1 Multicast Addresses 340
4.2.2 Multicast Routing (DVMRP, PIM, MSDP) 341
4.3 Multiprotocol Label Switching (MPLS) 354
4.3.1 Destination-Based Forwarding 355
4.3.2 Explicit Routing 362
4.3.3 Virtual Private Networks and Tunnels 364
4.4 Routing among Mobile Devices 369
4.4.1 Challenges for Mobile Networking 369
4.4.2 Routing to Mobile Hosts (Mobile IP) 372
4.5 Summary 379
What’s Next: Deployment of IPv6 380
Further Reading 381
Exercises 382
5 End-to-End Protocols
Problem: Getting Process to Communicate 391
5.1 Simple Demultiplexer (UDP) 393
5.2 Reliable Byte Stream ( TCP) 396
5.2.1 End-to-End Issues 397
5.2.2 Segment Format 400
5.2.3 Connection Establishment and
Termination 402
5.2.4 Sliding Window Revisited 407
5.2.5 Triggering Transmission 414
5.2.6 Adaptive Retransmission 418
5.2.7 Record Boundaries 422
5.2.8 TCP Extensions 423
5.2.9 Performance 425
5.2.10 Alternative Design Choices 428
5.3 Remote Procedure Call 431
5.3.1 RPC Fundamentals 431
5.3.2 RPC Implementations (SunRPC, DCE) 440
5.4 Transport for Real-Time Applications (RTP) 447
5.4.1 Requirements 449
5.4.2 RTP Design 452
5.4.3 Control Protocol 456
5.5 Summary 460
What’s Next: Transport Protocol Diversity 461
Further Reading 462
Exercises 463
6 Congestion Control and Resource Allocation
Problem: Allocating Resources 479
6.1 Issues in Resource Allocation 480
6.1.1 Network Model 481
6.1.2 Taxonomy 485
6.1.3 Evaluation Criteria 488
6.2 Queuing Disciplines 492
6.2.1 FIFO 492
6.2.2 Fair Queuing 494
6.3 TCP Congestion Control 499
6.3.1 Additive Increase/Multiplicative
Decrease 500
6.3.2 Slow Start 505
6.3.3 Fast Retransmit and Fast Recovery 510
6.4 Congestion-Avoidance Mechanisms 514
6.4.1 DECbit 515
6.4.2 Random Early Detection (RED) 516
6.4.3 Source-Based Congestion Avoidance 523
6.5 Quality of Service 530
6.5.1 Application Requirements 531
6.5.2 Integrated Services (RSVP) 537
6.5.3 Differentiated Services (EF, AF) 549
6.5.4 Equation-Based Congestion Control 557
6.6 Summary 559
What’s Next: Refactoring the Network 560
Further Reading 561
Exercises 563
7 End-to-End Data
Problem: What Do We Do with the Data 579
7.1 Presentation Formatting 581
7.1.1 Taxonomy 583
7.1.2 Examples (XDR, ASN.1, NDR) 587
7.1.3 Markup Languages (XML) 592
7.2 Multimedia Data 596
7.2.1 Lossless Compression Techniques 598
7.2.2 Image Representation and
Compression (GIF, JPEG) 601
7.2.3 Video Compression (MPEG) 609
7.2.4 Transmitting MPEG over a Network 614
7.2.5 Audio Compression (MP3) 619
7.3 Summary 621
What’s Next: Video Everywhere 622
Further Reading 623
Exercises 624
8 Network Security
Problem: Security Attacks 633
8.1 Cryptographic Building Blocks 635
8.1.1 Principles of Ciphers 635
8.1.2 Symmetric-Key Ciphers 638
8.1.3 Public-Key Ciphers 640
8.1.4 Authenticators 643
8.2 Key Predistribution 647
8.2.1 Predistribution of Public Keys 648
8.2.2 Predistribution of Symmetric Keys 653
8.3 Authentication Protocols 654
8.3.1 Originality and Timeliness Techniques 655
8.3.2 Public-Key Authentication Protocols 656
8.3.3 Symmetric-Key Authentication Protocols 658
8.3.4 Diffie-Hellman Key Agreement 662
8.4 Example Systems 664
8.4.1 Pretty Good Privacy (PGP) 665
8.4.2 Secure Shell (SSH) 667
8.4.3 Transport Layer Security( TLS, SSL, HTTPS) 670
8.4.4 IP Security (IPsec) 675
8.4.5 Wireless Security (802.11i) 678
8.5 Firewalls 681
8.5.1 Strengths and Weaknesses of Firewalls 684
8.6 Summary 686
What’s Next: Coming to Grips with Security 688
Further Reading 689
Exercises 690
9 Applications
Problem: Applications Need their Own Protocols 697
9.1 Traditional Applications 698
9.1.1 Electronic Mail (SMTP, MIME, IMAP) 700
9.1.2 World Wide Web (HTTP) 708
9.1.3 Web Services 718
9.2 Multimedia Applications 727
9.2.1 Session Control and Call Control(SDP, SIP, H.323) 728
9.2.2 Resource Allocation for Multimedia Applications 739
9.3 Infrastructure Services 744
9.3.1 Name Service (DNS) 745
9.3.2 Network Management (SNMP) 756
9.4 Overlay Networks 759
9.4.1 Routing Overlays 762
9.4.2 Peer-to-Peer Networks 769
9.4.3 Content Distribution Networks 783
9.5 Summary 789
What’s Next: New Network Architecture 790
Further Reading 791
Exercises 793
Solutions to Select Exercises 801
Glossary 815
Bibliography 837
Index 851

教学资源推荐
作者: Michael P. Papazoglou 著
作者: 常晋义 何世明 赵秀兰
作者: 王卫红 李晓明
作者: 李士宁
参考读物推荐
作者: (美)David Josephsen 著
作者: Paul T.Ammann
作者: 杜金房 张令考 著