TCP/IP网络互连技术(卷Ⅰ 原理 协议和体系结构 英文版·第3版)

TCP/IP网络互连技术(卷Ⅰ 原理 协议和体系结构 英文版·第3版)
作 者: 科默Douglas Comer
出版社: 清华大学出版社
丛编项: 大学计算机教育丛书 影印版 网络互连技术系列
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: TCP/IP
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

  作者:DouglasE.ComerDouglasE.Comer博士从20世纪70年代开始从事互联网的研究和开发工作,他曾是互联网体系结构委员会的成员,该委员会是确定互联网发展标准的权威机构;他也曾任美国计算机网CSTNET技术委员会的主席,该网络是美国早期互联网建设中最重要的网络之一。他现在是美国普渡大学计算机科学系的教授,从事计算机网络和操作系统方面的教学和科研工作。Internet技术基础>>更多作品

内容简介

内容简介本书是D0uglasC0mer教授所著网络互连技术系列的第1卷。作者详尽地讲解了因特网的原理、网络体系结构、TCP/IP协议簇。本书包括了TCP/IP,因特网各个组成部分的设计及其工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP因特网的既经典又可读性极强的书,是任何一个想要了解网络互连技术的人所必不可少的参考书。道格拉斯·科默博士是美国普渡大学计算机科学教授,主讲操作系统和计算机网络方面的课程,已发表了大量研究论文和撰写了许多教科书。他从70年代后期开始从事TCP/IP和网络互连技术的研究,是该领域的国际公认的著名专家,是普渡大学网络互连研究中心主任。

图书目录

Foreword

Preface

Chapter 1 Introduction And Overview

1.1 The MOtivation For Internetworking

1.2 The TCP/IP Internet

1.3 Internet Services

1.4 History And Scope Of The Internet

1.5 The Internet Architecture Board

1.6 The IAB Reorganization

1.7 The Internet Society

1.8 Internet Request or Comments

1.9 Internet Protocols And Standadization

1.10 Future Growth And Technology

1.11 Organization Of The Text

1.12 Summary

Chapter 2 ReviewOf Underlying Network Technoiongies

2.1 Introduction

2.2 Two Approaches To Network Communication

2.3 Wide Area And Local Area Network

2.4 Ethernet Technology

2.5 FiberDistibuted Data Interconnect(FDDI)

2.6 Asynchronous Transfer Mode

2.7 Arpanet Technology

2.8 National Sceence Foundation Networking

2.9 ANSNET

2.10 A Planned Wide Area Backbne

2.11 Other Technologies Over Which TCP/IP Has Been Used

2.12 Summary And Conclusion

Chapter 3 Internetworking Concept And Architectural Model

3.1 Introduction

3.2 Application-Level Interconnection

3.3 Network-Level Interconnection

3.4 Prperties Of The Internet

3.5 Inernet Architecturre

3.6 Interconnection Through IPRouters

3.7 The User's View

3.8 All Networks Are Equal

3.9 The Unanswerd Questions

3.10 Summary

Chapter 4 Internet Addresses

4.1 Introduction

4.2 Universal Idetifiers

4.3 Three Primary ClassesOf IP Addresses

4.4 AddressesSpecify Network Connections

4.5 Network And Broadcast Addresses

4.6 Limited Broadcast

4.7 Interpreting Zer To Mean "This "

4.8 Weaknesses In Internet

4.9 Dotted Decimal Notation

4.10 Loopback Address

4.11 Summary Of Special Address Conventions

4.12 Internet Addressing Authority

4.13 An Example

4.14 Network Byte Order

4.15 Summary

Chapter 5 Mapping Internet Addresses To Physical Addresses(ARP)

5.1 Introduction

5.2 The Address Resolution Problem

5.3 Two Types Of Physical Addresses

5.4 Resolution Through Diect Mapping

5.5 Resolution Through Dynaic Binding

5.6 The Address Resolution Cache

5.7 ARP Refinements

5.8 Relationship Of ARP To Other Protocols

5.9 ARP Implmentain

5.10 ARP Encapsulation And Identification

5.11 ARP Protocol Format

5.12 Summary

Chapter 6 Determining An Internet Address At STartup(RARP)

6.1 Introduction

6.2 Reverse Address Resolutioon Protocol

6.3 Timing RARP Transactions

6.4 Primary And Backup RaRP Servers

6.5 Summary

Chapter 7 Internet Protocol:Connectionless Datagram Delivery

7.1 Introduction

7.2 A Virtual Net work

7.3 Internet Architecture And Philosophy

7.4 The Concept Of Unreliable Delivery

7.5 Connectionless Delivery System

7.6 Purpose Of The Internet Protocol

7.7 The Internet Datagram

7.8 Internet Datagram Options

7.9 Summary

Chapter 8 Internet Protocol:Routing IP Datagrams

8.1 Introduction

8.2 Routing In An Internet

8.3 DirectAnd Indirect Delivery

8.4 Table-Driven IP Routing

8.5 Next-Hop Routing

8.6 Default Routes

8.7 Host-Specific Routes

8.8 The IP Routing Algorithm

8.9 Routing With IP Addresses

8.10 Handling Incoming Datagrams

8.11 Establishing Routing tables

8.12 Summary

Chapter 9 Internet Protocol:Error And Control Messages

9.1 Introduction

9.2 The Internet Control Message Protocol

9.3 Error Reporting vs Error Correction

9.4 ICMP Message Delivery

9.5 ICMP Message Format

9.6  Testing Destination Reachability And Staus

9.7 Echo Request AndREply Message Format

9.8 Reports of Unreachable Destinations

9.9 Congestion And Datagram Flow Control

9.10 Source Quench Format

9.11 Route Change Requests From Routers

9.12 Detecting Circular Or Excessively Long Routes

9.13 Reporting Other Problems

9.14 Clock Synchronization And Transit Time Estimation

9.15 Information Request And Reply Messages

9.16 Obtaining A Subnet Msak

9.17 Summary

Chapter 10 Subnet And Spernet Address Extensions

10.1 Introduction

10.2 Review Of Relevant Facts

10.3 Minimizing Network Numbers

10.4 Transparent Routers

10.5 Proxy ARP

10.6 Subnet Addressing

10.7 Flexibility In Subnet Address Assignment

10.8 Implementation Of Subnets With Masks

10.9 Subnet Mask Represntation

10.10 Routing In The Presnce Of Subnets

10.11 The Subnet Routing Alogrithm

10.12 A Unified Routing Algorihm

10.13 Maintenance Of Subnet Masks

10.14 Broadcasting To Subnets

10.15 Supernet Addressing

10.16 The Effect Of Supernetting On Routing

10.17 Summary

Chapter 11 Introduction The Need For Multiple Protocols

11.1 Introduction

11.2 The Need For Multiple Protocols

11.3 The Conceptual Layers Of Protocol Software

11.4 Funcionality Of The Layers

11.5 X.25 And Its Relation To The ISO Model

11.6 DifferencesBetween X.25 And Internet Layering

11.7 The Protocol Layering Principle

11.8 Layering In The Presence Of Network Substructure

11.9 Two Important Boundaries In The TCP/IPModel

11.10 The Disadvantage Of Layering

11.11 The Basic Idea Behind Multip lexing And Demultiplexing

11.12 Summary

Chapter 12 User Datagram Protocol

12.1 Introduction

12.2 Identifying The Ultimate Destination

12.3 The User Datagram Protocol

12.4 Format Of UDP Messages

12.5 UDP Pseudo-Header

12.6 UDP Encapsulation And Protocol Layering

12.7 Layering Andthe UDP Checksum Computation

12.8 UDP Multipexing,Demultiplexing,And Ports

12.9 Reserved And Available UDP Por Numbvers

12.10 Summay

Chapter 13 Reliable Stream Transport Service(TCP)

13.1 Introduction

13.2 Tht Need For Stream Delivery

13.3 Properties Of the Reliable Delivery Service

13.4 Providing Reliability

13.5 The Idea Behind Sliding Windows

13.6 The Transmission Control Protocol

13.7 Ports ,connections,And Endpoints

13.8 Passive And Active Opens

13.9 Segments,Streams,And Sequence Numbers

13.10 Variable Window Size And Flow control

13.11 TCP Segment Format

13.12 Out Of Band Data

13.13 Maximum Segment Size Option

13.14 TCP Checksum Computation

13.15 Acknowledgements And Retransission

13.16 Timeou And Retramsmission

13.17 Accurate Measuremint Of Round Trip Samples

13.18 Karn's Algorithm And Timer Backoff

13.19 Responding To High Variancd In Delay

13.20 Response To Congestion

13.21 Establishing A TCP Connection

13.22 Initial Sequence Numbers

13.23 Closing a TCP Connection

13.24 TCP Connection Reset

13.25 TCP State Machine

13.26 Forcing Data Delivery

13.27 Reserved TCP Port Numbers

13.28 TCP Performance

13.29 Silly Window Syndrome And Small Packets

13.30 Avoiding Silly Window syndrome

13.31 Summary

Chapter 14 Routing:cores,Peers,And Algorithms

14.1 Introduction

14.2 The Origin Of Routing Tables

14.3 Routing With Partial Information

14.4 Original Internet Architecture And Cores

14.5 Core Routers

14.6 Beyond The Core Architecture To Peer Backbones

14.7 Automatic Route Propagation

14.8 Vector Distance(Bellman-Ford)Routng

14.9 Gateway-To-Gateway Protocol(GGP)

14.10 GGP Message Formats

14.11 Link-State(SPF)Routing

14.12 Spf Protocols

14.13 Summary

Chapter 15 Routing:Autonomous Systems(EGP)

15.1 Introduction

15.2 Adding Complexity To The Architectural Model

15.3 A Fundamental Idea:extra Hops

15.4 Autonomous Sys Tem Concept Exterior Gateway Protocol

15.5 Exterior Gatewqy Protocol(EGP)

15.6 EGP Message Header

15.7 EGP Neighor Acquisition Messages

15.8 EGP Neighbor Reachability Messages

15.9 EGP Poll Request Messages

15.10 EGP Routing Update Messages

15.11 Measring Up date Messages

15.12 The Key Restriction Of EGP

15.13 Technical Problems

15.14 Decentralization Of Internet Architecture

15.15 Beyond Autonomous Systems

15.16 Summary

Chapter 16 Routing:In An Autonomous System(RIP,OSPF,HELLO)

16.1 Introduction

16.2 Static Vs.Dynamic Interior Routes

16.3 Routing Information Protocol(RIP)

16.4 The Hello Protocol

16.5 Combining RIP,Hello,And EGP

16.6 The Open SPF Protocol(OSPF)

16.7 Routing With Partial Information

16.8 Summary

Chapter 17 Internet Multicasting

17.1 Introduction

17.2 HardWare Broadcast

17.3 Hardware Multicast

17.4 Ip Multicast

17.5 IP Multicast Addresses

17.6 Mapping IP Multicast To Ehernet Multicast

17.7 Extending IP To Handle MUlticasting

17.8 Internet Group Management Protocol

17.9 IGMP mplementaioIn

17.10 Group Membership Stae Transitions

17.11 IGMP Message Format Multicast Address Assingnment

17.12 MulTicast Address Assignment

17.13 Propagating Routing Information

17.14 The Mrouted Program

17.15 Summary

Chapter 18 TCP/IP Over ATM Networks

18.1 Introduction

18.2 ATM Hardware

18.3 Large ATM Network

18.4 The Logical Vies Of An ATM Networ

18.5 The Two ATM Connection Paradigms

18.6 Pahs,Circuits,And Identifiers

18.7 ATM Cell Transport

18.8 ATM Adaptation Layers

18.9 AAL5 Convergence,Segmentation ,And Reassemblym

18.10 Datagram Encapsulaton And IP MTU Size

18.11 Packey Type And Multiplexing

18.12 IP Address Binding In An ATM Network

18.13 Logical IP Subnet Concept

18.14 Connection Management

18.15 Address Binding Within An LIS

18.16 ATMARP Packet Format

18.17 Using ATMARP Packets To DetermingAn Address

18.18 Obtaining Entries For A Server Database

18.19 Timing Out ATMARP Information In A Server

18.20 Timing Out ATMARP Information In A Host Or Router

18.21 Summary

Chapter 19 Client-Server Model Of Interaction

19.1 Introduction

19.2 The Client-Server Model

19.3 A Simple Example:UDP Echo Server

19.4 Time And Date Service

19.5 The Complexity of Servers

19.6 RARP Server

19.7 Alternatives To The Client-Server Model

19.8 Summary

Chapter 20 The Sockey Interface

20.1 Introduction

20.2 The UNIX I?O Paradigm And Network I?O

20.3 Adding Network I/O to UNIX

20.4 The Socket

20.5 Abstraction Creating A Socket

20.6 Socket Inheritance And Termination

20.7 Specifying A Local Address

20.8 Connecting Sockets To Destination Addresses

20.9 Sending Data Through A Socket

20.10 Receiving Data Through A Socket

20.11 Obtaing Local And Remote Socket Addresse

20.12 Obtaining And Setting Socket Options

20.13 Specifying A Queue Length For A Server

20.14 How A Server Acdepts Connections

20.15 Servers That Handle Multiple Services

20.16 Obtaining And Setting Host Names

20.17 Obtaining And Setting The Internal Host Domain

20.18 BSD UNIX Networi Library Calls

20.19 Network Byte Order Conversion Routines

20.20 IP Address Manipulation Routines

20.21 Accesssing The Domain Name System

20.22 Obtaining Inforation About Hosts

20.23 Obtaining Inforation About Networks

20.24 Obtaining Inforation About Protocols

20.25 Obtaining Inforation About Network Services

20.26 An Example client

20.27 An Example Server

20.28 Summary

Chapter 21 Bootstrap And Autoconfiguration

21.1 Introduction

21.2 The Need For An Alternative To RARP

21.3 Using IP To Determine An IP Address

21.4 The BOOTP Retransmission Policy

21.5 The BOOTM Message Fromat

21.6 The Two-Step Bootstrap Procedure

21.7 Vendor-Specific Field

21.8 The Need For Dynnamic Configuration

21.9 Dynamic Host Configuration

21.10 Dynamic IP Address Assignment

21.11 Obtaining Mutltiple Addresses

21.12 AddressAcquisition States

21.13 Early Lease Termination

21.14 Lease RenewalStates

21.15 DHCP Message Format

21.16 DHCP Options And Message Type

21.17 Option Overload

21.18 DHCP And Domain Names

21.19 Summary

Chapter 22 The Domain Name System

22.1 Introduction

22.2 Names For Machines

22.3 Flat Namespace

22.4 Hierarchical Names

22.5 Delegation Of Authority For Names

22.6 Subset Authority

22.7 TCP/IP Internet Domain Names

22.8 Official And UnofficialInternet Domain Names

22.9 Items Named And Synax Of Names

22.10 Mapping Domain Names To Addresses

22.11 Domain Name Resolution

22.12 Efficient Translation

22.13 Caching:the Key To Efficiecy

22.14 Domain Server MessageFormat

22.15 Compressed Name Format

22.16 Abbreviation Of Domain Names

22.17 Inverse Mappings

22.18 Pointer Queries

22.19 Object Types And Resource Record Contents

22.20 Obtaining Authority For A Subdomain

22.21 Summary

Chapter 23 Applications:Remote Login

23.1 Introduction

23.2 Remote Interactive Computing

23.3 TELNET protocol

23.4 Accommodating Heterogeneity

23.5 Passing Commands That Control The Remots Side

23.6 Forcing The Server To Read A Control Function

23.7 TELNET Options

23.8 TELNET Option Negotiation

23.9 Rlogin(BSD UNIX)

23.10 Summary

Chapter 24 Applications:File Transfer And Access(FTP,TFTP,NFS)

24.1 Introduction

24.2 File Acess And Transfer

24.3 On-line Shared Access

24.4 Sharing By File Transfer

24.5 FTP:The Major TCP/IP File Transfer Protocol

24.6 FTP:Features

24.7 FTPProcess Model

24.8 TCP Port Number Assignment

24.9 The User's View Of FTP

24.10 An Example Anonymous FTP Session

24.11 TFTP

24.12 NFS

24.13 NFS Implementation

24.14 Remote Procedure Call

24.15 Summary

Chapter 25 Applications:Electronic Mail

25.1 Introduction

25.2 Electronic Mail

25.3 Mailbox Names And Aliases

25.4 Alias Expansion And Mail Forwarding

25.5 The Relationship Of Internetworking And Mail

25.6 TCP/IP Standards For Electronic Mail Service

25.7 Elecctronic Mail Addresses

25.8 Pseudo Domain Addresses

25.9 Simain Mail Transfer Protocol

25.10 The MIME Extension For Non-ASCII Data

25.11 MIME MultipartMessages

25.12 Summary

Chapter26 Applications:Internet Management

26.1 Introduction

26.2 The Level Of Management Protocols

26.3 Architectural Model

26.4 ProtocolArchitecture

26.5 Examples of MIB Variables

26.6 The Structure Of Management Information

26.7 Formal Definitions Using ASN.I

26.8 Structure And Representaion Of MIB Object Names

26.9 Simlpe Network Management Protocol

26.10 SNMP Message Format

26.11 ExampleEncodedSNMP Message

26.12 Summary

Chapter27 Summary Of Protocol Dependencies

27.1 Introduction

27.2 ProtocolDependencies

27.3 Application Program Access

27.4 Summary

Chapter  28Internet Security And Firewall Design

28.1 Introduction

28.2 Protecting Resources

28.3 The Need For An Information Policy

28.4 Communication,Coopration,And Mutual Mistrust

28.5 Mechanisms For Internet Security

28.6 firewalls And Internet Access

28.7 Multiple Connections And Weakest Links

28.8 Firewall Implementation And High-Speed Hardware

28.9 Packet-LevelFilters

28.10 Security And Packet Felter Specification

28.11 The Consequence Of Restricted Access For Clients

28.12 Accessing Services Through A Firewall

28.13 The Details Of Firewall Architecture

28.14 Stub Network

28.15 An Alternative Firewall Implementation

28.16 Monitoring And Logging

28.17 Summary

Chapter29 The Future Of TCP/IP(IPng,IPv6)

29.1 Introduction

29.2 Why Change TCP/IP And The Internet?

29.3 Motivation For Changing IPv

29.4 The Road To A New Version Of IP

29.5 The Name Of The Next IP

29.6 Features Of IPv6

29.7 Generat Form Of An IPv6 Datagram

29.8 IPv6 Base Header Format

29.9 IPv6 Extension Headers

29.10 Parsing An IPv6 Datagram

29.11 IPv6 Fragmentation And Reassembly

29.12 The Consequence Of End-To-End Fragmentation

29.13 IPv6 Source Routing

29.14 IPv6 Options

29.15 Size Of The IPv6 Address Space

29.16 IPv6 Colon Hexadecimal Notation

29.17 Three Basic IPv6 Address Space

29.18 The Duality Of Brooadcast And Multicast

29.19 An EngineerignChoice And Simulated Broadcsat

29.20 Proposed IPv6 Address Space Assingment

29.21 IPv4 Address Encoding And Transition

29.22 Providers,Subscribers,And Address Hierarchy

29.23 Additional Hierarchy

29.24 Summary

Appendix 1 A Guide To RFCs

Appendix 2 Glossary Of Internetworking Terms And Abbreviations

Bibliography

Index