网络互连:网桥·路由器·交换机和互连协议 英文版

网络互连:网桥·路由器·交换机和互连协议 英文版
作 者: Radia Perlman
出版社: 机械工业出版社
丛编项: 经典原版书库
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《网络互连:网桥·路由器·交换机和互连协议 英文版》作者简介

内容简介

暂缺《网络互连:网桥·路由器·交换机和互连协议 英文版》简介

图书目录

Chapter 1 Essential Networking Concepts

l . l Layers

l . 2 Service Models

l . 3 Important Properties of a Network

l . 4 Reliable Data Transfer Protocols

Chapter 2 Data Link Layer Issues

2. I Generic LANs

2. 2 IEEE 802 LANs

2. 3 Names, Addresses. Routes

2. 4 LAN Addresses

2. 5 Multicast versus Unicast Addresses

2. 6 The Broadcast Address

2. 7 Multiplexing Field

2. 8 Bit Order

2. 9 Logical Link Control

2. IO Issues in 802.3

2. ll Issues in 802.5

2. 12 Packet Bursts

2. l3 Reasons for Bridges

2. I4 Point-to-Point Links

Chapter 3 Traneparent Bridges

3. I The No-Frills Bridge

3. 2 The Learning Bridge

3. 3 Spanning Tree Algorithm

3. 4 Spanning Tree Algorithm Refinements

3.5 Bridge Message Formats

3.6 Other Bridge Issues

3.7 Remote Bridges

Chapter 4 Source Routing Bridges

4.l Pure Source Routing

4.2 SR-TB Bridges

4.3 SRT Bridges

4.4 End-system Algorithms

4.5 Source Routing versus Transparent Bridging

4.6 Ideas for Improving Source Route Bridging

Chapter 5 Hubs, Switches, Virtual LANs, and Fast Ethernet

5.l Hubs

5.2 Faster LANs

5.3 Virtual LANs (VLANs)

Chapter 6 Network Interface: Service Models

6.l What Is the Network Layer?

6.2 Network Service Types

Chapter 7 Connection-oriented Nets: X.25 and ATM

7.l Generic Connection-oriented Network

7.2 X.25: Reliable Connection-oriented Service

7.3 Implementing X.25 Inside the Net

7.4 Asynchronous Transfer Mode

Chapter 8 Generic Connectionless Service

8.I Data Transfer

8.2 Addresses

8.3 Hop Count

8.4 Service Class Information

8.5 Network Feedback

8.6 Fragmentation and Reassembly

8.7 Maximum Packet Size Discovery

Chapter 9 Network Layer Addresses

9.I Hierarchical Addresses with Fixed Boundaries

9.2 Hierarchical Addresses with Flexible Boundaries

9.3 Owning versus Renting Addresses

9.4 Types of Addresses

9.5 IP

9.6 IPX

9.7 IPX+

9.S IPv6

9.9 CLNP Network Layer Addresses

9. IO AppleTalk Network Layer Addresses

9. ll DECnet Phases III and IV

9. l2 NAT/NAPT

Chapter 10 Connectionless Data Packet Formats

IO.I Pieces of a Connectionless Network Layer

lO.2 Data Packets

IO.3 Sammary of Packet Formats for Easy Reference

IO.4 Technical Issues and Comparisons in Data Packet Formats

I0.5 Source Routing

IO.6 The Great IPX Frame Format Mystery

IO.7 Error Reports and Other Network Feedback to the Endnode

Chapter 11 Neighbor Greeting and Autoconfiguration

lI .l Endnodes Attached via Point-to-Point Links

ll .2 Endnodes Attached via LANs

lI .3 Endnodes Attached via Nonbroadcast Multiaccess Media

ll .4 Finding Things

Chapter 12 Routing Algorithm Coneepts

l2.I Distance Vector Routing

12.2 Link State Routing

12.3 Comparison of Link State and Distance Vector Roating

12.4 Load Splitting

12.5 Link Costs

I2.6 Migrating Routing Algorithms

12.7 LANs

12.8 Types of Service

12.9 Partition Repair: Level l Subnetwork Partition

Chapter 19 Fast Packet Fowarding

13.l Using an Additional Header

13.2 Address Prefix Matching

13.3 Longest Prefix Match with Trie

I3.4 Binary Search

Chapter 14 Specific Routing Protocols

14.l A Brief History of Intradomain Routing Protocols

14.2 RIP

14.3 RTMP, IPX-RIP, and DECnet

14.4 IS-IS, OSPF, NLSP, and PNNI

14.5 Interdomain Routing Protocols

Chapter 15 WAN Multicast

15.l Introduction

15.2 Multicast in IP

Chapter 16 Sabotage-proof Routing

16.l The Problem

16.2 AII You Need to Know about Cryptography

l6.3 Overview of the Approach

16.4 Detailed Description of the Approach

l6.5 Summary

16.6 For Further Reading

Chapter 17 To Route, Bridge, or Switch: Is That the Question?

I7.l Switches

l7.2 Bridges versus Routers

l7.3 Extensions to Bridges

17.4 Extensions to Routers

Chapter 18 Protocol Design Folklore

18.l Simplicity versus nexibility versus Optimality

l8.2 Knowing the Problem You're Trying to Solve

l8.3 Overhead and Scaling

l8.4 Operation Above Capacity

l8.5 Compact IDs versus Object Identifiers

18.6 Optimizing for the Most Common or Important Case

I8. 7 Forward Compatibility

l8.8 Migration: Roating Algorithms and Addressing

l8.9 Parameters

18.IO Making Multiprotocol Operation Possible

18.ll Ronning over Layer 3 versus Layer 2

18.12 Robustness

18.13 Determinism versus Stability

18.14 Performance for Correctness

18.15 In Closing

Glossary

Index