基本信息
- 原书名:Computer Networks: A Systems Approach, Fifth Edition
- 原出版社: Morgan Kaufmann
- 作者: (美)Larry L.Peterson Bruce S.Davie
- 丛书名: 经典原版书库
- 出版社:机械工业出版社
- ISBN:9787111377207
- 上架时间:2012-4-6
- 出版日期:2012 年4月
- 开本:16开
- 页码:884
- 版次:5-1
- 所属分类:计算机 > 计算机网络 > 计算机网络 > 综合
教材

【插图】

编辑推荐
计算机网络方面的经典教科书
Bruce S.Davie与Larry L.Peterson两位顶尖网络专家的几十年理论研究和实践经验的凝聚
内容简介
计算机书籍
《计算机网络:系统方法(英文版.第5版)》是计算机网络方面的经典教科书,凝聚了两位顶尖网络专家几十年的理论研究、实践经验和大量第一手资料,自出版以来已经成为网络课程主流教材,被哈佛大学、斯坦福大学、卡内基-梅隆大学、康奈尔大学、普林斯顿大学等众多名校采用。
第5版秉承了前4版的特点,通过丰富的网络和协议设计实例,来阐述计算机网络关键原理。全书的重点在于“为什么这样设计网络”——不仅详细叙述当今网络系统的组成,而且还阐述关键技术和协议如何在实际应用中发挥作用,从而解决具体的问题。本版对内容进行了全面更新,覆盖P2P、无线技术、网络安全和应用等重要主题,更关注网络研究和设计中涉及的应用层问题。
作译者
Bruce S. Davie 拥有英国爱丁堡大学计算机科学博士学位,于1995年加入Cisco公司,并于1998年被授予Cisco特别会员荣誉称号。他主持设计了MPLS协议,并开发了其他重要的因特网技术。Davie博士在加入Cisco之前曾担任贝尔通信研究公司的首席科学家。
目录
Foreword
Foreword to the First Edition
Preface
1 Foundation
Problem: Building a Network
1.1 Applications
1.1.1 Classes of Applications
1.2 Requirements
1.2.1 Perspectives
1.2.2 Scalable Connectivity
1.2.3 Cost-Effective Resource Sharing
1.2.4 Support for Common Services
1.2.5 Manageability
1.3 Network Architecture
1.3.1 Layering and Protocols
1.3.2 Internet Architecture
1.4 Implementing Network Software
1.4.1 Application Programming Interface (Sockets)
1.4.2 Example Application
前言
Despite these changes, the question we asked in the first edition is just as valid today: What are the underlying concepts and technologies that make the Internet work? The answer is that much of the TCP/IP architecture continues to function just as was envisioned by its creators more than 30 years ago. This isn't to say that the Internet architecture is uninteresting; quite the contrary. Understanding the design principles that underly an architecture that has not only survived but fostered the kind of growth and change that the Internet has seen over the past 3 decades is precisely the right place to start. Like the previous editions, the Fifth Edition makes the "why" of the Internet architecture its cornerstone.
Audience
Our intent is that the book should serve as the text for a comprehensive networking class, at either the graduate or upper-division undergraduate level. We also believe that the book's focus on core concepts should be appealing to industry professionals who are retraining for networkrelated assignments, as well as current network practitioners who want to understand the "whys" behind the protocols they work with every day and to see the big picture of networking.
It is our experience that both students and professionals learning about networks for the first time often have the impression that network protocols are some sort of edict handed down from on high, and that theirjob is to learn as many TLAs (Three-Letter Acronyms) as possible. In fact, protocols are the building blocks of a complex system developed through the application of engineering design principles. Moreover, they are constantly being refined, extended, and replaced based on real-world experience. With this in mind, our goal with this book is to do more than survey the protocols in use today. Instead, we explain the underlying principles of sound network design. We feel that this grasp of under lying principles is the best tool for handling the rate of change in the networking field,
We also recognize that there are many different ways that people approach networks. In contrast to when we wrote our first edition, most people will pick up this book having considerable experience as users of networks. Some will be looking to become designers of networking prod ucts or protocols. Others may be interested in managing networks, while an increasingly large number will be current or prospective application developers for networked devices. Our focus has traditionally been on the designers of future products and protocols, and that continues to be the case, but in this edition we have tried to address the perspectives of network managers and application developers as well.
Changes in the Fifth Edition
Even though our focus is on the underlying principles of networking, we illustrate these principles using examples from today's working Internet. Therefore, we added a significant amount of new material to track many of the important recent advances in networking. We also deleted, reorga nized, and changed the focus of existing material to reflect changes that have taken place over the past decade.
Perhaps the most significant change we have noticed since writing the first edition is that almost every reader is now familiar with networked applications such as the World Wide Web and email. For this reason, we have increased the focus on applications, starting in the first chapter. We use applications as the motivation for the study of networking, and to derive a set of requirements that a useful network must meet if it is to support both current and future applications on a global scale. However,we retain the problem-solving approach of previous editions that starts with the problem of interconnecting hosts and works its way up the layers to conclude with a detailed examination of application layer issues.We believe it is important to make the topics covered in the book relevant by starting with applications and their needs. At the same time,we feel that higher layer issues, such as application layer and transport layer protocols, are best understood after the basic problems of connecting hosts and switching packets have been explained. That said, we have made it possible to approach the material in a more top-down manner, as described below.
As in prior editions, we have added or increased coverage of impor-
tant new topics, and brought other topics up to date. Major new or
substantially updated topics in this edition are:
Updated material on wireless technology, particularly the various flavors of 802.1 ! (Wi-Fi) as well as cellular wireless technologies including the third generation (3G) and emerging 4G standards.
Updated coverage of congestion control mechanisms, particularly for high bandwidth-delay product networks and wireless networks.
Updated material on Web Services, including the SOAP and REST (Representational State Transfer) architectures.
Expanded and updated coverage of interdomain routing and the border gateway protocol (BGP).
Expanded coverage on protocols for multimedia applications such as voice over IP (VOIP) and video streaming.
We also reduced coverage of some topics that are less relevant today.Protocols moving into the "historic" category for this edition include asynchronous transfer mode (ATM) and token rings.
One of the most significant changes in this edition is the separation of material into "introductory" and "advanced" sections. We wanted to make the book more accessible to people new to networking technologies and protocols, without giving up the advanced material required for upperlevel classes. The most apparent effect of this change is that Chapter 3 now covers the basics of switching, routing, and Internetworking, while Chapter 4 covers the more advanced routing topics such as BGP, IP version 6, and multicast. Similarly, transport protocol fundamentals are covered in Chapter 5 with the more advanced material such as TCP congestion control algorithms appearing in Chapter 6. We believe this will make it possible for readers new to the field to grasp important foundational concepts without getting overwhelmed by more complex topics.
As in the last edition, we have included a number of "where are they now?" sidebars. These short discussions, updated for this edition, focus on the success and failure of protocols in the real world. Sometimes they describe a protocol that most people have written offbut which is actually enjoying Unheralded success; other times they trace the fate of a protocol that failed to thrive over the long run. The goal of these sidebars is to make the material relevant by showing how technologies have fared in the competitive world of networking.
序言
The field of network protocols is perhaps unique in that the "proper"modularity has been handed down to us in the form of an international standard: the seven-layer reference model of network protocols from the ISO. This model, which reflects a layered approach to modularity, is almost universally used as a starting point for discussions of protocol organization, whether the design in question conforms to the model or deviates from it.
It seems obvious to organize a networking book around this layered model. However, there is a peril to doing so, because the OSI model is not really successful at organizing the core concepts of networking.Such basic requirements as reliability, flow control, or security can be addressed at most, if not all, of the OSI layers. This fact has led to great confusion in trying to understand the reference model. At times it even requires a suspension of disbelief. Indeed, a book organized strictly according to a layered model has some of the attributes of spaghetti code.
Which brings us to this book. Peterson and Davie follow the traditional layered model, but they do not pretend that this model actually helps in the understanding of the big issues in networking. Instead, the authors organize discussion of fundamental concepts in a way that is independent of layering. Thus, after reading the book, readers will under stand flow control, congestion control, reliability enhancement, data'representation, and synchronization, and will separately understand the implications of addressing these issues in one or another of the traditional layers.
This is a timely book. It looks at the important protocols in use today--especially the Internet protocols. Peterson and Davie have a long involvement in and much experience with the Internet. Thus their book reflects not just the theoretical issues in protocol design, but the real factors that matter in practice. The book looks at some of the protocols that are just emerging now, so the reader can be assured of an up-to-date perspective. But most importantly, the discussion of basic issues is presented in a way that derives from the fundamental nature of the problem, not the constraints of the layered reference model or the details of today's protocols. In this regard, what this book presents is both timely and timeless.The combination of real-world relevance, current examples, and careful explanation of fundamentals makes this book unique.
David D. Clark
Massachusetts Institute of Technology
媒体评论
——David Clark,因特网先驱,MIT教授
Peterson 和 Davie 清晰地描述了各层网络协议,并且在书中给出许多注释边框,来帮助读者更深入、全面地理解深刻影响我们这个社会的各种技术。
——Jean Walrand, 加州大学伯克利分校
我一直采用本书作为通信网络导论课程的教材,对于本书前几个版本也比较熟悉,本版秉承了前几版的特点,不仅说明了“ 如何设计网络”,还解释了“为什么这样设计网络”。本书为读者构建了工程直观性,在计算机技术快速发展的今天,这对于培养读者设计和选择下一代系统的决策能力是非常重要的。
——Roch Guerin, 宾夕法尼亚大学
本书是一本非常优秀的计算机网络导论教材,条理清晰、内容全面、实例丰富。Peterson和Davie在不失技术严谨性的同时以通俗易懂的方式阐明了计算机网络相关概念。对于网络架构设计基本原理及构建其上的应用,本书实现了完美均衡。总之,本书对网络学习和应用来说都是无价的。
——Arvind Krishnamurthy,华盛顿大学