《计算机网络:自顶向下方法(第4版英文影印版)》
Chapter 1 Computer Networks and the Internet
1.1 What Is the Internet?
1.1.1 A Nuts-and-Bolts Description
1.1.2 A Services Description
1.1.3 What Is a Protocol?
1.2 The Network Edge
1.2.1 Client and Server Programs
1.2.2 Access Networks
1.2.3 Physical Media
1.3 The Network Core
1.3.1 Circuit Switching and Packet Switching
1.3.2 How Do Packets Make Their Way Through Packet-Switched Networks?
1.3.3 ISPs and Internet Backbones
1.4 Delay, Loss, and Throughput in Packet-Switched Networks
1.4.1 Overview of Delay in Packet-Switched Networks
1.4.2 Queuing Delay and Packet Loss
1.4.3 End-to-End Delay
1.4.4 Throughput in Computer Networks
1.5 Protocol Layers and Their Service Models
1.5.1 Layered Architecture
1.5.2 Messages, Segments, Datagrams, and Frames
1.6 Networks Under Attack
1.7 History of Computer Networking and the Internet
1.7.1 The Development of Packet Switching: 1961-1972
1.7.2 Proprietary Networks and Internetworking: 1972-1980
1.7.3 A Proliferation of Networks: 1980-1990
1.7.4 The Intemet Explosion: The 1990s
1.7.5 Recent Developments
1.8 Summary
Road-Mapping This Book
Homework Problems and Questions
Problems
Discussion Questions
Ethereal Lab
Interview: Leonard Kleinrock
Chapter 2 Application Layer
2.1 Principles of Network Applications
2.1.1 Network Application Architectures
2.1.2 Processes Communicating
2.1.3 Transport Services Available to Applications
2.1.4 Transport Services Provided by the Internet
2.1.5 Application-Layer Protocols
2.1.6 Network Applications Covered in This Book
2.2 The Web and HTTP
2.2.1 Overview of HTTP
2.2.2 Non-persistent and Persistent Connections
2.2.3 HTTP Message Format
2.2.4 User-Server Interaction: Cookies
2.2.5 Web Caching
2.2.6 The Conditional GET
2.3 File Transfer: FTP
2.3.1 FTP Commands and Replies
2.4 Electronic Mail in the Internet
2.4.1 SMTP
2.4.2 Comparison with HTTP
2.4.3 Mail Message Formats and MIME
2.4.4 Mail Access Protocols
2.5 DNS--The lnternet's Directory Service
2.5.1 Services Provided by DNS
2.5.2 Overview of How DNS Works
2.5.3 DNS Records and Messages
2.6 Peer-to-Peer Applications
2.6.1 P2P File Distribution
2.6.2 Searching for Information in a P2P Community
2.6.3 Case Study: P2P Intemet Telephony with Skype
2.7 Socket Programming with TCP
2.7.1 Socket Programming with TCP
2.7.2 An Example Client-Server Application in Java
2.8 Socket Programming with UDP
2.9 Summary
Homework Problems and Questions
Problems
Discussion Questions
Socket Programming Assignments
Ethereal Labs
Interview: Brain Cohen
Chapter 3 Transport Layer
3.1 Introduction and Transport-Layer Services
3.1.1 Relationship Between Transport and Network Layers
3.1.2 Overview of the Transport Layer in the Intemet
3.2 Multiplexing and Demultiplexing
3.3 Connectionless Transport: UDP
3.3.1 UDP Segment Structure
3.3.2 UDP Checksum
3.4 Principles of Reliable Data Transfer
3.4.1 Building a Reliable Data Transfer Protocol
3.4.2 Pipelined Reliable Data Transfer Protocols
3.4.3 Go-Back-N (GBN)
3.4.4 Selective Repeat (SR)
3.5 Connection-Oriented Transport: TCP
3.5.1 The TCP Connection
3.5.2 TCPSegment Structure
3.5.3 Round-Trip Time Estimation and Timeout
3.5.4 Reliable Data Transfer
3.5.5 Flow Control
3.5.6 TCPConnection Management
3.6 Principles of Congestion Control
3.6.1 The Causes and the Costs of Congestion
3.6.2 Approaches to Congestion Control
3.6.3 Network-Assisted Congestion-Control Example:ATM ABR Congestion Control
3.7 TCP Congestion Control
3.7.1 Fairness
3.8 Summary
Homework Problems and Questions
Problems
Discussion Questions
Programming Assignments
Ethereal Labs
Interview: Sally Floyd
Chapter 4 The Network Layer
4.1 Introduction
4.1.1 Forwarding and Routing
4.1.2 Network Service Models
4.2 Virtual Circuit and Datagram Networks
4.2.1 Virtual-Circuit Networks
4.2.2 Datagram Networks
4.2.3 Origins of VC and Datagram Networks
4.3 What's Inside a Router?
4.3.1 Input Ports
4.3.2 Switching Fabric
4.3.3 Output Ports
4.3.4 Where Does Queuing Occur?
4.4 The Intemet Protocol (IP): Forwarding and Addressing in the Intemet
4.4.1 Datagram Format
4.4.2 IPv4 Addressing
4.4.3 Intemet Control Message Protocol (ICMP)
4.4.4 IPv6
4.4.5 A Brief Introduction into IP Security VPNs
4.5 Routing Algorithms
4.5.1 The Link-State (LS) Routing Algorithm
4.5.2 The Distance-Vector (DV) Routing Algorithm
4.5.3 Hierarchical Routing
4.6 Routing in the Intemet
4.6.1 Intra-AS Routing in the Intemet: RIP
4.6.2 Intra-AS Routing in the Intemet: OSPF
4.6.3 Inter-AS Routing: BGP
4.7 Broadcast and Multicast Routing
4.7.1 Broadcast Routing Algorithms
4.7.2 Multicast
4.8 Summary
Homework Problems and Questions
Problems
Discussion Questions
Programming Assignment
Ethereal Labs
Interview: Vinton G.Cerf
Chapter 5 The Link Layer and Local Area Networks
5.1 Link Layer: Introduction and Services
5.1.1 The Services Provided by the Link Layer
5.1.2 Where Is the Link Layer Implemented?
5.2 Error-Detection and -Correction Techniques
5.2.1 Parity Checks
5.2.2 Checksumming Methods
5.2.3 Cyclic Redundancy Check (CRC)
5.3 Multiple Access Protocols
5.3.1 Channel Partitioning Protocols
5.3.2 Random Access Protocols
5.3.3 Taking-Turns Protocols
5.3.4 Local Area Networks (LANs)
5.4 Link-Layer Addressing
5.4.1 MAC Addresses
5.4.2 Address Resolution Protocol (ARP)
5.5 Ethernet
5.5.1 Ethernet Frame Structure
5.5.2 CSMA/CD: Ethemet's Multiple Access Protocol
5.5.3 Ethernet Technologies
5.6 Link-Layer Switches
5.6.1 Forwarding and Filtering
5.6.2 Self-Learning
5.6.3 Properties of Link-Layer Switching
5.6.4 Switches Versus Routers
5.7 PPP: The Point-to-Point Protocol
5.7.1 PPP Data Framing
5.8 Link Virtualization: A Network as a Link Layer
5.8.1 Asynchronous Transfer Mode (ATM) Networks
5.8.2 Multiprotocol Label Switching (MPLS)
5.9 Summary
Homework Problems and Questions
Problems
Discussion Questions
Ethereal Labs
Interview: Simon S. Lam
Chapter 6 Wireless and Mobile Networks
6.1 Introduction
6.2 Wireless Links and Network Characteristics
6.2.1 CDMA
6.3 WiFi: 802.11 Wireless LANs
6.3.1 The 802.11 Architecture
6.3.2 The 802.11 MAC Protocol
6.3.3 The IEEE 802.11 Frame
6.3.4 Mobility in the Same IP Subnet
6.3.5 Advanced Features in 802.11
6.3.6 Beyond 802. 11: Bluetooth and WiMAX
6.4 Cellular Intemet Access
6.4.1 An Overview of Cellular Architecture
6.4.2 Cellular Standards and Technologies: A Brief Survey
6.5 Mobility Management: Principles
6.5.1 Addressing
6.5.2 Routing to a Mobile Node
6.6 Mobile IP
6.7 Managing Mobility in Cellular Networks
6.7.1 Routing Calls to a Mobile User
6.7.2 Handoffs in GSM
6.8 Wireless and Mobility: Impact on Higher-layer Protocols
6.9 Summary
Homework Problems and Questions
Problems
Discussion Questions
Ethereal Labs
Interview: Charlie Perkins
Chapter 7 Multimedia Networking
7.1 Multimedia Networking Applications
7.1.1 Examples of Multimedia Applications
7.1.2 Hurdles for Multimedia in Today's Intemet
7.1.3 How Should the Internet Evolve to Support Multimedia Better?
7.1.4 Audio and Video Compression
7.2 Streaming Stored Audio and Video
7.2.1 Accessing Audio and Video Through a Web Server
7.2.2 Sending Multimedia from a Streaming Server to a Helper Application
7.2.3 Real-Time Streaming Protocol (RTSP)
7.3 Making the Best of the Best-Effort Service
7.3.1 The Limitations of a Best-Effort Service
7.3.2 Removing Jitter at the Receiver for Audio
7.3.3 Recovering from Packet Loss
7.3.4 Distributing Multimedia in Today's Internet:Content Distribution Networks
7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service
7.4 Protocols for Real-Time Interactive Applications
7.4.1 RTP
7.4.2 RTP Control Protocol (RTCP)
7.4.3 SIP
7.4.4 H.323
7.5 Providing Multiple Classes of Service
7.5.1 Motivating Scenarios
7.5.2 Scheduling and Policing Mechanisms
7.5.3 Diffserv
7.6 Providing Quality of Service Guarantees
7.6.1 A Motivating Example
7.6.2 Resource Reservation, Call Admission, Call Setup
7.6.3 Guaranteed QoS in the Intemet: Intserv and RSVP
7.7 Summary
Homework Problems and Questions
Problems
Discussion Questions
Programming Assignment
Interview: Henning Schulzrinne
Chapter 8 Security in Computer Networks
8.1 What Is Network Security?
8.2 Principles of Cryptography
8.2.1 Symmetric Key Cryptography
8.2.2 Public Key Encryption
8.3 Message Integrity
8.3.1 Cryptographic Hash Functions
8.3.2 Message Authentication Code
8.3.3 Digital Signatures
8.4 End-Point Authentication
8.4.1 Authentication Protocol ap1. O
8.4.2 Authentication Protocol ap2.0
8.4.3 Authentication Protocol ap3.0
8.4.4 Authentication Protocol ap3.1
8.4.5 Authentication Protocol ap4.0
8.4.6 Authentication Protocol ap5.0
8.5 Securing E-mail
8.5.1 Secure E-mail
8.5.2 PGP
8.6 Securing TCP Connections: SSL
8.6.1 The Big Picture
8.6.2 A More Complete Picture
8.7 Network-Layer Security: IPsec
8.7.1 Authentication Header (AH) Protocol
8.7.2 The ESP Protocol
8.7.3 SA and Key Management
8.8 Securing Wireless LANs
8.8.1 Wired Equivalent Privacy (WEP)
8.8.2 IEEE802.1 li
8.9 Operational Security: Firewalls and Intrusion Detection Systems
8.9.1 Firewalls
8.9.2 Intrusion Detection Systems
8.10 Summary
Homework Problems and Questions
Problems
Discussion Questions
Ethereal Lab
Interview: Steven M.Bellovin
Chapter 9 Network Management
9.1 What Is Network Management?
9.2 The Infrastructure for Network Management
9.3 The Intemet-Standard Management Framework
9.3.1 Structure of Management Information: SMI
9.3.2 Management Information Base: MIB
9.3.3 SNMP Protocol Operations and Transport Mappings
9.3.4 Security and Administration
9.4 ASN. 1
9.5 Conclusion
Homework Problems and Questions
Problems
Discussion Questions
Interview: Jeff Casc
References
Index