基本信息
- 原书名:Computer Networks, Fourth Edition: A Systems Approach(Fourth Edition)
- 原出版社: Morgan Kaufmann
- 作者: (美)Larry L.Peterson Bruce S.Davie
- 丛书名: 经典原版书库
- 出版社:机械工业出版社
- ISBN:9787111214014
- 上架时间:2007-5-28
- 出版日期:2007 年5月
- 开本:16开
- 页码:806
- 版次:4-1
- 所属分类:计算机 > 计算机网络 > 综合
教材

编辑推荐
本书与传统网络教材最大的不同在于,不是按照OSI层次机械地介绍计算机网络,而是采用“系统方法”,将网络看成是交互式的复杂系统。
内容简介
计算机书籍
本书是计算机网络方面的经典畅销教科书,凝聚了两位顶尖网络专家几十年的理论研究、实践经验和大量第一手资料,自出版以来已经成为网络课程主流教材,被哈佛大学、斯坦福大学、卡内基-梅隆大学、康奈尔大学、普林斯顿大学、威斯康星大学、普度大学、得克萨斯大学、芝加哥大学等众多名校采用。
第4版秉承了前3版的特点,通过丰富的、基于实例的指导,来帮助读者理解计算机网络及其构件。全书的重点在于“为什么这样设计网络”——不仅详细叙述当今网络系统的组成,而且还阐述关键技术和协议如何在实际应用中发挥作用,从而解决具体的问题。
本书与传统网络教材最大的不同在于,不是按照OSI层次机械地介绍计算机网络,而是采用“系统方法”,将网络看成是交互式的复杂系统。每章开头都给出一些启发式的问题,引导学生或专业人员用新学到的知识来解决实际问题;同时,在每章的最后还会补充一些新的工具和资源,帮助读者巩固和加深所学知识,全面理解复杂网络及其应用的工作原理和工作方式。
作译者
目录
Chapter 1: Foundation
Problem: Building a Network
1.1 Applications
1.2 Requirements
1.2.1 Connectivity
1.2.2 Cost-Effective Resource Sharing
1.2.3 Support for Common Services
1.3 Network Architecture
1.3.1 Layering and Protocols
1.3.2 OSI Architecture
1.3.3 Internet Architecture
1.4 Implementing Network Software
1.4.1 Application Programming Interface (Sockets)
1.4.2 Example Application
1.4.3 Protocol Implementation Issues
1.5 Performance
1.5.1 Bandwidth and Latency
1.5.2 Delay – Bandwidth Product
1.5.3 High-Speed Networks
前言
Despite these changes the question we asked in the first edition is just as valid today: What are the underlying concepts and technologies that make the Internet work?The answer is that much of the TCP/IP architecture continues to function just as was envisioned by its creators more than 30 years ago. This isn't to say that the Internet architecture is uninteresting; quite the contrary. Understanding the design principles that underly an architecture that has not only survived but fostered the kind of growth and change that the Internet has seen over the past three decades is precisely the right place to start. Like the previous editions, the third edition makes the "why" of the Internet architecture its cornerstone.
Audience
Our intent is that the book should serve as the text for a comprehensive networking class, at either the graduate or upper-division undergraduate level. We also believe that the book's focus on core concepts should be appealing to industry professionals who are retraining for network-related assignments, as well as current network practitioners who want to understand the "whys" behind the protocols they work with every day and to see the big picture of networking.
It is our experience that both students and professionals learning about networks for the first time often have the impression that network protocols are some sort of edict handed down from on high, and that their job is to learn as many TLAs (three-letter acronyms) as possible. In fact, protocols are the building blocks of a complex system developed through the application of engineering design principles. Moreover, they are constantly being refined, extended, and replaced based on real-world experience. With this in mind, our goat with this book is to do more than survey the, protocols in use today. Instead, we explain the underlying principles of sound network design. We feel that this grasp of underlying principles is the best tool for handling the rate of change in the networking field.
Changes in the Fourth Edition
Even though our focus is on the underlying principles of networking, we illustrate these principles using examples from today's working Internet. Therefore, we added a significant amount of new material to track many of the important recent advances in networking. We also deleted, reorganized, and changed the focus of existing material to reflect changes that have taken place over the past decade.
Perhaps the most significant change we have noticed since writing the first edition is that almost every reader now has some familiarity with networked applications such as the World Wide Web and email. For this reason, we have increased the focus on applications, starting in the first chapter. We use applications as the motivation for the study of networking, and to derive a set of requirements that a useful network must meet if it is to support both current and future applications on a global scale. However, we retain the problem-solving approach of previous editions that starts with the problem of interconnecting hosts and works its way up the layers to condude with a detailed examination of application layer issues. We believe it is important to make the topics covered in the book relevant by starting with applications and their needs. At the same time, we feel that higher-layer issues, such as application layer and transport layer protocols, are best understood after the basic problems of connecting hosts and switching packets have been explained.
As we did in the second and third editions, we have added or increased coverage of important new topics, and brought other topics up to date. Major new or substantially updated topics in this edition are:
■ Comprehensively revised and updated coverage of security, with a focus on building secure systems, not just on cryptographic algorithms;
■ Expanded and updated coverage ofXML (extensible markup language);
■ An updated section on overlay networks, including "peer-to-peer" networking and "content distribution networks";
■ A new section on web services, including the SOAP and REST (Representational State Transfer) architectures;
■ Updated material on wireless technology, induding the 802.11 (WiFi) and 802.16 (WiMAX) standards as well as cellular wireless technologies including the 3G (third generation) standards;
■ Expanded coverage of interdomain routing;
■ Expanded coverage on protocols and quality of service for multimedia applications such as voice over IP (VolP) and video streaming;
■ Updated coverage of congestion control mechanisms, particularly for high bandwidth-delay product networks.
In addition, we have added a new feature to this edition: "Where are they now?" sidebars. These short discussions focus on the success and failure of protocols in the real world. Sometimes they describe a protocol that most people have written off but which is actually enjoying unheralded success; other times they trace the fate of a protocol that failed to thrive over the long run. The goal of these sidebars is to make the material relevant by showing how technologies have fared in the competitive world of networking.
Approach
For an area that's as dynamic and changing as computer networks, the most important thing a textbook can offer is perspective--to distinguish between what's important and what's not, and between what's lasting and what's superficial. Based on our experience over the past 20-plus years doing research that has led to new networking technology,teaching undergraduate and graduate students about the latest trends in networking, and delivering advanced networking products to market, we have developed a perspective--which we call the systems approach--that forms the soul of this book. The systems approach has several implications:
序言
This book, too, has changed much in ten years, with four editions to keep up. But the basic value of the book remains the same as the first edition. This book gives you the facts you need, and puts those facts into the larger context so that the knowledge you gain will be of value even as the details change. Reading this book informs you about today and prepares you for tomorrow. One new feature is a set of sidebars that illustrate the context of ideas being presented in the text--the why of the ideas. Why did an idea fail? Why did it succeed?..
What has changed in the book? Some technologies have faded from sight, and get less attention in this edition. We bid a fond farewell to FDDI and ATM LANs. Some technologies have mutated and emerged in new forms. Remote Procedure Call is no longer a LAN-based low-level invocation mechanism, but the foundation of Internetwide Web Services. We welcome gigabit Ethernet, an updated and expanded section on wireless, and more on router implementation. The material on TCP is up to date, with discussion of new acknowledgment schemes and extensions for high speed.
With the increasing concern with security, there is a completely revised chapter with a new emphasis on a systems approach to security, and a discussion of threats and how to counter them. And at the end, there is a chapter that helps you "put it all together,'' using case studies at the application layer (VoIP, multimedia, and peer to peer)to show how all the concepts from the previous chapters combine to provide the system that supports these applications.
The evolution of networks is not going to slow down. Soon we will be talking about the impact of television over IP, the collision of the Internet and sensor networks,and lots of other very new and exciting ideas. But relax--if you read this book today you will have the insights you need for tomorrow. ...