控制协议/因特网协议经典教程:TCP/IP(英文版)

控制协议/因特网协议经典教程:TCP/IP(英文版)
作 者: 特洛华·梅蒂
出版社: 北京希望电子出版社
丛编项: 21计算机专业技术丛书
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: TCP/IP
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《控制协议/因特网协议经典教程:TCP/IP(英文版)》作者简介

内容简介

本书是一本有关传输协议INTERNET协议(TCP/TP)的经典教材。它详尽地讲述有关TCP/TP的整套协议规范和应用的协议规则的产生,到最近的广泛运用,包括在世界上最大的网络INTERNET中的运用。本书由三个部分组成,第一部分介绍了TCP/TP协议的历史体系结构和标准,包含了核心网络传送路由和运用协议。第二部分讲述了新的体系结构和应用协议,如IPV6 IP安全和服务质量控制等。第三部分详细讲述了有关网络连接和TCP/IP平台的具体应用配置。本书内容新,理论联系实际,讲练结合,有很强的实用性和指导性,面向开发和编程人员,对于广大计算机专业的师生来说是一本必不可少的计算机教程,对于社会上广大自学者和工程人员来讲也具有很强的指导作用。本版光盘内容包括本版电子书。

图书目录

PART ONE Architecture and Core Protocols

CHAPTER 1 Introduction to TCP/IP-History,Architecture and Standards

1.1 Internet History-Where It All Came From

1.1.1 Internetworks

1.1.2 The Internet

1.1.3 ARPANET

1.1.4 NSFNET

1.1.5 Commercial Use of the Internet

1.1.6 Information Superhighway

1.1.7 Internet2

1.1.8 The Open Systems Interconnect(OSI)Model

1.2 TCP/IP Architectural Model-What It Is All About

1.2.1 Internetworking

1.2.2 The TCP/IP Protocol Stack

1.2.3 TCP/IP Applications

1.2.4 Bridges,Routers and Gateways

1.3 Finding Standards for TCP/IP and the Internet

1.3.1 Request For Comments(RFC)

1.3.2 Internet Standards

1.3.3 Major Internet Protocols

1.4 Future of the Internet

1.5 IBM and the Internet

1.5.1 The Network Computing Framework

CHAPTER 2 Internetworking and Transport Layer Protocols

2.1 Internet Protocol(IP)

2.1.1 IP Addressing

2.1.2 IP Subnets

2.1.3 IP Routing

2.1.4 Methods of Delivery-Unicast,Broadcast,Multicast and Anycast

2.1.5 The IP Address Exhaustion Problem

2.1.6 Intranets(Private IP Addresses)

2.1.7 Classless Inter-Domain Routing(CIDR)

2.1.8 IP Datagram

2.2 Internet Control Message Protocol(ICMP)

2.2.1 ICMP Messages

2.2.2 ICMP Applications

2.3 Internet Group Management Protocol(IGMP)

2.4 Address Resolution Protocol(ARP)

2.4.1 ARP Overview

2.4.2 ARP Detailed Concept

2.4.3 ARP and Subnets

2.4.4 Proxy-ARP or Transparent Subnetting

2.5 Reverse Address Resolution Protocol(RARP)

2.5.1 RARP Concept

2.6 Ports and Sockets

2.6.1 Ports

2.6.2 Sockets

2.7 User Datagram Protocol(UDP)

2.7.1 UDP Datagram Format

2.7.2 UDP Application Programming Interface

2.8 Transmission Control Protocol(TCP)

2.8.1 TCP Concept

2.8.2 TCP Application Programming Interface

2.8.3 TCP Congestion Control Algorithms

2.9 References

CHAPTER 3 Routing Protocols

3.1 Basic IP Routing

3.1.1 Routing Processes

3.1.2 Autonomous Systmes

3.2 Routing Algorithms

3.2.1 Static Routing

3.2.2 Distance Vector Routing

3.2.3 Link State Routing

3.3 Interior Gateway Protocols(IGP)

3.3.1 Routing Information Protocol(RIP)

3.3.2 Routing Information Protocol Version 2(RIP-2)

3.3.3 RIPng for IPv6

3.3.4 Open Shortest Path First(OSPF)

3.4 Exterior Routing Protocols

3.4.1 Exterior Gateway Protocol(EGP)

3.4.2 Border Gateway Protocol(BGP-4)

3.5 References

CHAPTER 4 Application Protocols

4.1 Characteristics of Applications

4.1.1 Client/Server Model

4.2 Domain Name System(DNS)

4.2.1 The Hierarchical Namespace

4.2.2 Fully Qualified Domain Names(FQDNs)

4.2.3 Generic Domains

4.2.4 Country Domains

4.2.5 Mapping Domain Names to IP Addresses

4.2.6 Mapping IP Addresses to Domain Names-Pointer Queries

4.2.7 The Distributed Name Space

4.2.8 Domain Name Resolution

4.2.9 Domain Name System Resource Records

4.2.10 Domain Name System Messages

4.2.11 A Simple Scenario

4.2.12 Extended scenario

4.2.13 Transport

4.2.14 DNS Applications

4.2.15 References

4.3 TELNET

4.3.1 TELNET Operation

4.3.2 Terminal Emulation(Telnet 3270)

4.3.3 TN3270 Enhancements(TN3270E)

4.3.4 References

4.4 File Transfer Protocol(FTP)

4.4.1 Overview of FTP

4.4.2 FTP Operations

4.4.3 Reply Codes

4.4.4 FTP Scenario

4.4.5 A Sample FTP Session

4.4.6 Anonymous FTP

4.4.7 Remote Job Entry Using FTP

4.5 Trivial File Transfer Protocol(TFTP)

4.5.1 FTFP Usage

4.5.2 Protocol Description

4.5.3 TFTP Multicast Option

4.5.4 Security Issue

4.6 Remote Execution Command Protocol(REXEC and RSH)

4.6.1 Principle of Operation

4.7 Simple Mail Transfer Protocol(SMTP)

4.7.1 How SMTP Works

4.7.2 SMTP and the Domain Name System

4.7.3 References

4.8 Multipurpose Internet Mail Extensions(MIME)

4.8.1 How MIME Works

4.8.2 The Content-Type Field

4.8.3 The Content-Transfer-Encoding Field

4.8.4 Using Non-ASCII Characters in Message Headers

4.8.5 References

4.9 Post Office Protocol(POP)

4.9.1 POP3 Commands and Responses

4.9.2 References

4.10 Internet Message Access Protocol Version 4(IMAP4)

4.10.1 IMAP4 Underlying Electronic Mail Models

4.10.2 IMAP4 Commands and Responses

4.10.3 Message Numbers

4.10.4 IMAP4 States

4.10.5 Client Commands

4.10.6 References

4.11 Network Management

4.11.1 Standards

4.11.2 Bootstrap Protocol(BOOTP)

4.11.3 Structure and Identification of Management Information(SMI)

4.11.4 Management Information Base(MIB)

4.11.5 Simple Network Management Protocol(SNMP)

4.11.6 Simple Network Management Protocol Version 2(SNMPv2)

4.11.7 MIB for SNMPv2

4.11.8 Single Authentication and Privacy Protocol

4.11.9 The New Administrative Model

4.11.10 Simple Network Management Protocol Version 3(SNMPv3)

4.11.11 References

4.12 Remote Printing(LPR and LPD)

4.13 Network File System(NFS)

4.13.1 NFS Concept

4.13.2 WebNFS

4.13.3 References

4.14 X Window System

4.14.1 Functional Concept

4.14.2 Protocol

4.15 Finger Protocol

4.16 NETSTAT

4.17 Network Information System(NIS)

4.18 NetBIOS over TCP/IP

4.18.1 NetBIOS over TCP/IP in IBM OS/2 Warp 4

4.18.2 NetBIOS over TCP/IP in Microsoft Windows Systems

4.18.3 NetBIOS Name Server(NBNS)Implementations

4.19 Application Programming Interfaces(APIs)

4.19.1 The Socket API

4.19.2 Remote Procedure Call(RPC)

4.19.3 Windows sockets Version 2(Winsock V2.0)

4.19.4 SNMP Distributed Programming Interface(SNMP DPI)

4.19.5 FTP API

4.19.6 CICS Socket Interface

4.19.7 IMS Socket Interface

4.19.8 Sockets Extended

4.19.9 REXX Sockets

PART TWO Special Purpose Protocols and New Technologies

CHAPTER 5 TCP/IP Security Overview

5.1 Security Exposures and Solutions

5.1.1 Common Attacks Against Security

5.1.2 Solutions to Network Security Problems

5.1.3 Implementations of Security Solutions

5.1.4 Network Security Policy

5.2 A Short Introduction to Cryptography

5.2.1 Terminology

5.2.2 symmetric or Secret-Key Algorithms

5.2.3 Asymmetric or Public-Key Algorithms

5.2.4 Hash Functions

5.2.5 digital Certificates and Certification Authorities

5.2.6 Random-Number Generators

5.2.7 Export/Import Restrictions on Cryptography

5.3 Firewalls

5.3.1 Firewall Concept

5.3.2 Components of A Firewall System

5.3.3 Packet-Filtering Router

5.3.4 Application Level Gateway(Proxy)

5.3.5 Circuit Level Gateway

5.3.6 Firewall Examples

5.4 Network Address Translation(NAT)

5.4.1 NAT Concept

5.4.2 Translation Mechanism

5.4.3 NAT Limitations

5.5 The IP Security Architecture(IPSec)

5.5.1 Concepts

5.5.2 Authentication Header(AH)

5.5.3 Encapsulating Security Payload(ESP)

5.5.4 Combining IPSec Protocols

5.5.5 The Internet Key Exchange Protocol(IKE)

5.5.6 References

5.6 SOCKS

5.6.1 SOCKS Version 5(SOCKSv5)

5.7 Secure Sockets Layer(SSL)

5.7.1 SSL Overview

5.7.2 SSL Protocol

5.8 Transport Layer Security(TLS)

5.9 Secure Multipurpose Internet Mail Extension(S-MIME)

5.10 Virtural Private Networks(VPN)Overview

5.10.1 VPN Introduction and Benefits

5.11 Kerberos Authentication and Authorization System

5.11.1 Assumptions

5.11.2 Naming

5.11.3 Kerberos Authentication Process

5.11.4 Kerberos Database Management

5.11.5 Kerberos Authorization Model

5.11.6 Kerberos Version 5 Enhancements

5.12 Remote Access Authentication Protocols

5.13 Layer 2 Tunneling Protocol(L2TP)

5.13.1 Terminology

5.13.2 Protocol Overview

5.13.3 L2TP Security Issues

5.14 Secure Electronic Transactions(SET)

5.14.1 SET Roles

5.14.2 SET Transactions

5.14.3 The SET Certificate Scheme

5.15 References

CHAPTER 6 IP Version 6

6.1 IPv6 Overview

6.2 The IPv6 Header Format

6.2.1 Packet Sizes

6.2.2 Extension Headers

6.2.3 IPv6 Addressing

6.2.4 Priority

6.2.5 Flow Labels

6.3 Internet Control Message Protocol Version 6(ICMPv6)

6.3.1 Neighbor Discovery

6.3.2 Stateless Address Autoconfiguration

6.3.3 Multicast Listener Discovery(MLD)

6.4 DNS in IPv6

6.4.1 Format of IPv6 Resource Records

6.5 DHCP in IPv6

6.5.1 Differences between DHCPv6 and DHCPv4

6.5.2 DHCPv6 Messages

6.6 Mobility Support in IPv6

6.7 Internet Transition-Migrating from IPv4 to IPv6

6.7.1 Dual IP Stack Implementation-The IPv6/IPv4 Node

6.7.2 Tunneling

6.7.3 Header Translation

6.7.4 Interoperability Summary

6.8 The Drive Towards IPv6

6.9 References

CHAPTER 7 Dynamic IP,Mobile IP and Network Computers

7.1 Bootstrap Protocol(BOOTP)

7.1.1 BOOTP Forwarding

7.1.2 BOOTP Considerations

7.2 Dynamic Host Configuration Protocol(DHCP)

7.2.1 The DHCP Message Types

7.2.2 Allocating a New Network Address

7.2.3 DHCP Lease Renewal Process

7.2.4 Reusing a Previously Allocated Network Address

7.2.5 Configuration Parameters Repository

7.2.6 DHCP Considerations

7.2.7 DHCP Considerations

7.2.8 BOOTP and DHCP Interoperability

7.3 Dynamic Domain Name System

7.3.1 The UPDATE DNS Message Format

7.3.2 IBM’s Implementation of DDNS

7.3.3 Proxy A Record Update(ProxyArec)

7.4 Mobile IP

7.4.1 Mobile IP Overview

7.4.2 Mobile IP Operation

7.4.3 Mobility Agent Advertisement Extemsions

7.4.4 Mobile IP Registration Process

7.4.5 Tunneling

7.4.6 Broadcast Datagrams

7.4.7 Move Detection

7.4.8 ARP Considerations

7.4.9 Mobile IP Security Considerations

7.5 IP Masquerading

7.6 The Network Computer

7.7 References

CHAPTER 8 Internet Protocols and Applications

8.1 The World Wide Web(WWW)

8.1.1 Web Browsers

8.1.2 Web Servers

8.1.3 Web Server Application Technologies

8.2 Hypertext Rtansfer Protocol(HTTP)

8.2.1 Overview of HTTP

8.2.2 HTTP Operation

8.3 Hypertext Markup Language(HTML)

8.4 The Extensible Markup Language(XML)

8.5 Java

8.5.1 Java Components Overview

8.5.2 JavaScript

8.5.3 Java in the World Wide Web

8.5.4 Java Security

8.5.5 Distributed Objects

8.6 Accessing Legacy Applications from the Web

8.6.1 Business Requirements

8.6.2 Technical Issues

8.6.3 Security Issues

8.6.4 IBM e-business Solutions

8.7 Network News Transfer Protocol(NNTP)

8.8 Gopher

8.9 Internet2

8.9.1 Mission

8.9.2 Project Description

8.9.3 Internet2 and NGI

CHAPTER 9 Multicast and Multimedia

9.1 Multicasting

9.2 Internet Group Management Protocol(IGMP)

9.2.1 IGMP Operation

9.3 Multicast Routing Protocols

9.3.1 distance Vector Multicast Routing Protocol(DVMRP)

9.3.2 Multicast OSPF(MOSPF)

9.3.3 Protocol Independent Multicast(PIM)

9.4 The Multicast Backbone

9.4.1 MBONE Routing

9.4.2 MBONE Applications

9.5 The Real-Time Protocols RTP and RTCP

9.5.1 The Real-Time Transport Protocol(RTP)

9.5.2 The Real-Time Control Protocol

9.5.3 RTP Translators and Mixers

9.5.4 Real-Time Applications

9.6 Voice over IP

9.6.1 ITU-T Recommendation H.323

9.6.2 Voice Compression(G.723.1 and G.729)

9.6.3 The VoIP Protocol Stack

9.7 References

CHAPTER 10 Quality of Service

10.1 Why QoS

10.2 Integrated Services

10.2.1 Service Classes

10.2.2 The Reservation Protocol(RSVP)

10.2.3 The Future of Integrated Services

10.3 Differentiated Services

10.3.1 Differentiated Services Architecture

10.3.2 Using RSVP with Differentiated Services

10.3.3 Configuration and Administration of DS Components with LDAP

10.3.4 Using Differentiated Services with IPSec

10.3.5 Internet Drafts on Differentiated Services

10.4 References

CHAPTER 11 Availability,Scalability and Load Balancing

11.1 Virtual Router Redundancy Protocol(VRRP)

11.1.1 Introduction

11.1.2 VRRP Definitions

11.1.3 VRRP Overview

11.1.4 Sample Configuration

11.1.5 VRRP Packet Format

11.2 Round-Robin DNS

11.3 IMB eNetwork Dispatcher

11.3.1 eNetwork Dispatcher Components

11.3.2 Load Balancing with Weights

11.3.3 High Availability

11.3.4 Server Affinity

11.3.5 Rules-Based Balancing

11.3.6 Wide Area Network Dispatcher

11.3.7 Combining ISS and Dispatcher

11.3.8 Advisors and Custom Advisors

11.3.9 SNMP Support

11.3.10 Co-Location Option

11.3.11 ISP Configuration

11.3.12 OS/390 Parallel Sysplex Support

11.4 Alternative Solutions to Load Balancing

11.4.1 Network Address Translation

11.4.2 Encapsulation

11.4.3 HTTP Redirection

11.5 TCP/IP for OS/390 Using Workload Manager(WLM)

11.5.1 Related Terminology and Products

11.5.2 Overview of WLM

11.6 OSPF Equal-Cost Multipath

11.7 OS/390 VIPA Connection Recovery

CHAPTER 12 Directory Protocols and Distributed Computing

12.1 Introduction to the Distributed Computing Environment(DCE)

12.1.1 DCE Directory Service

12.1.2 DCE Security Service

12.1.3 DCE Threads

12.1.4 DCE Remote Procedure Call

12.1.5 Distributed Time Service

12.1.6 Distributed File Service(DFS)

12.2 The Andrew File System(AFS)

12.3 Lightweight Directory Access Protocol(LDAP)

12.3.1 LDAP-Lightweight Access to X.500

12.3.2 The LDAP Directory Server

12.3.3 Overview of LDAP Architecture

12.3.4 LDAP Models

12.3.5 LDAP Security

12.3.6 LDAP URLs

12.3.7 LDAP and DCE

12.3.8 The Directory-Enabled Networks Initiative(DEN)

12.3.9 References

PART THREE Connection Protocols and Platform Implementations

CHAPTER 13 Connection Protocols

13.1 Ethernet and IEEE 802.x Local Area Networks(LANs)

13.2 Fiber Distributed Data Interface()

13.3 Asynchronous Transfer Mode(ATM)

13.3.1 Address Resolution(ATMARP and InATMARP)

13.3.2 Classical IP over ATM

13.3.3 ATM LAN Emulation

13.3.4 Classical IP over ATM versus LAN Emulation

13.4 Data Link Switching:Switch-to-switch Protocol

13.4.1 Introduction

13.4.2 Functional Description

13.5 Serial Line IP(SLIP)

13.6 Point-to-Point Protocol(PPP)

13.6.1 Point-to-Point Encapsulation

13.7 Integrated Services Digital Network(ISDN)

13.8 TCP/IP and X.25

13.9 Frame Relay

13.9.1 Frame Format

13.9.2 Interconnect Issues

13.9.3 Data Link Layer Parameter Negotiation

13.9.4 IP over Frame Relay

13.10 PPP over SONET and SDH Circuits

13.10.1 Physical Layer

13.11 Multiprotocol Label Switching(MPLS)

13.11.1 Forwarding Methods

13.11.2 MPLS Usefulness

13.12 Enterprise Extender

13.12.1 Performance and Recovery

13.13 Multiprotocol Transport Network(MPTN)

13.13.1 Requirements for Mixed-Protocol Networking

13.13.2 MPTN Architecture

13.13.3 MPTN Methodology

13.13.4 MPTN Major Components

13.14 Multi-Path Channel+(MPC+)

13.15 S/390 Open Systems Adapter 2

13.15.1 OSA-2 Modes

13.15.2 S/390 Unit Addresses Correlate with OSA-2 LAN Port Numbers

13.15.3 Open Systems Adapter/Support Facility(OSA/SF)

13.16 Multiprotocol over ATM(MPOA)

13.16.1 Benefits of MPOA

13.16.2 MPOA Logical Components

13.16.3 MPOA Functional Components

13.16.4 MPOA Operation

13.17 Private Network-to-Network Interface(PNNI)

13.17.1 PNNI Overview

13.17.2 PNNI Routing

13.17.3 PNNI Signalling

13.18 References

CHAPTER 14 Platform Implementations

14.1 Software Operating System Implementations

14.1.1 IBM OS/390 V2R6

14.1.2 IBM TCP/IP V2R4 for VM

14.1.3 IBM OS/400 V4R3

14.1.4 IBM AIX 4.3

14.1.5 IBM TCP/IP 4.1 for OS/2

14.1.6 Functional Comparisons

14.2 IBM Hardware Platform Implementations

14.2.1 The IBM Nways Router Family

14.2.2 The IBM Multiprotocol Switch Hub Family

14.2.3 The IBM Workgroup Hubs and Workgroup Switches

14.2.4 The IBM High Performance Controllers

14.2.5 The IBM Nways Wide Area Switches

14.2.6 Functional Comparisons

APPENDIX A Special Notices