出版時(shí)間:2004 出版社:清華大學(xué)出版社 作者:Alberto Leon-Garcia,Indra Widjaja 頁(yè)數(shù):900
Tag標(biāo)簽:無
前言
未來的社會(huì)是信息化的社會(huì),計(jì)算機(jī)科學(xué)與技術(shù)在其中占據(jù)了最重要的地位,這對(duì)高素質(zhì)創(chuàng)新型計(jì)算機(jī)人才的培養(yǎng)提出了迫切的要求。計(jì)算機(jī)科學(xué)與技術(shù)已經(jīng)成為一門基礎(chǔ)技術(shù)學(xué)科,理論性和技術(shù)性都很強(qiáng)。與傳統(tǒng)的數(shù)學(xué)、物理和化學(xué)等基礎(chǔ)學(xué)科相比,該學(xué)科的教育工作者既要培養(yǎng)學(xué)科理論研究和基本系統(tǒng)的開發(fā)人才,還要培養(yǎng)應(yīng)用系統(tǒng)開發(fā)人才,甚至是應(yīng)用人才。從層次上來講,則需要培養(yǎng)系統(tǒng)的設(shè)計(jì)、實(shí)現(xiàn)、使用與維護(hù)等各個(gè)層次的人才。這就要求我們的計(jì)算機(jī)教育按照定位的需要,從知識(shí)、能力、素質(zhì)三個(gè)方面進(jìn)行人才培養(yǎng)。碩士研究生的教育需突出"研究
內(nèi)容概要
《通信網(wǎng)基本概念與主體結(jié)構(gòu)》(英文版)(第2版)除對(duì)第1版內(nèi)容進(jìn)行了更新外,還廣泛引入了網(wǎng)絡(luò)協(xié)議分析儀分析各種協(xié)議的操作過程。《通信網(wǎng)基本概念與主體結(jié)構(gòu)》內(nèi)容大致分為三部分。第一部分為綜述,由前兩章組成。主要通過廣泛應(yīng)用的網(wǎng)絡(luò)業(yè)務(wù)介紹網(wǎng)絡(luò)的變革與發(fā)展;并通過網(wǎng)絡(luò)提供的服務(wù)討論網(wǎng)絡(luò)協(xié)議的分層模型和不同層之間的交互作用?! 〉诙糠忠噪娫捑W(wǎng)、局域網(wǎng)、分組交換網(wǎng)這些基礎(chǔ)網(wǎng)絡(luò)為例,介紹網(wǎng)絡(luò)體系結(jié)構(gòu)的基本概念和低層協(xié)議的主要技術(shù)。這部分包含第3章至第7章,其中,第3章介紹數(shù)字傳輸技術(shù)的基礎(chǔ)知識(shí),內(nèi)容有不同媒體信息的數(shù)字化描述、數(shù)字調(diào)制、編碼、檢錯(cuò)、糾錯(cuò)、信道特性及各種傳輸媒質(zhì)特性等。第4章介紹電路交換網(wǎng)絡(luò)中的幾種復(fù)用和交換技術(shù),重點(diǎn)是SONET。第5章討論對(duì)等層協(xié)議,主要討論數(shù)據(jù)鏈路層的ARQ差錯(cuò)控制協(xié)議,滑動(dòng)窗機(jī)理,以及實(shí)用的PPP協(xié)議和HDLC協(xié)議。第6章首先詳細(xì)討論媒質(zhì)訪問控制技術(shù),包括隨機(jī)訪問、預(yù)約訪問、信道化訪問,然后對(duì)以太網(wǎng)、令牌環(huán)、FDDI和無線局域網(wǎng)的基本知識(shí)和協(xié)議作了簡(jiǎn)要介紹。第7章討論分組交換網(wǎng),介紹了幾種常用的路由算法,并對(duì)不同類型的流量管理機(jī)制作了較為深入的分析。 第三部分討論TCP/IP和ATM這兩種主體網(wǎng)絡(luò),并進(jìn)一步闡明基本的網(wǎng)絡(luò)概念如何體現(xiàn)在這兩種主體網(wǎng)絡(luò)之中。此外,對(duì)當(dāng)前某些熱點(diǎn)課題也作了必要介紹。這部分由5章組成,其中,第8章討論TCP/IP網(wǎng)絡(luò)的結(jié)構(gòu)和相關(guān)協(xié)議,包括IP、IPv6、TCP、UDP、內(nèi)部路由協(xié)議和組播路由協(xié)議等。第9章討論ATM網(wǎng)絡(luò),主要介紹ATM層和ATM適配層,并對(duì)信令和PNNI路由選擇作了基本介紹。第10章介紹現(xiàn)代網(wǎng)絡(luò)結(jié)構(gòu)中的基本概念和主要協(xié)議,包括綜合服務(wù)、區(qū)分服務(wù)、互連模型以及RSVP、MPLS、RTTP、SCP等協(xié)議。第11章介紹網(wǎng)絡(luò)安全協(xié)議和加密算法。第12章討論網(wǎng)絡(luò)中的多媒體技術(shù)和相關(guān)標(biāo)準(zhǔn),包括數(shù)據(jù)壓縮、信號(hào)編碼以及分別用于圖像和視頻編碼的JPEG、MPEG標(biāo)準(zhǔn)。
作者簡(jiǎn)介
作者:(美國(guó))加西亞(Alderto Leon-Garcia) (美國(guó))維德加加(Indra Widjaja)
書籍目錄
PrefaceAbout the Authors1 Communication Networks and Services1.1 Evolution of Network Architecture and Services1.1.1 Telegraph Networks and Message Switching1.1.2 Telephone Networks and Circuit Switching1.1.3 The Intemet, Computer Networks, and Packet Switching1.2 Future Network Architectures and Their Services1.3 Key Factors in Communication Network Evolution1.3.1 Role of Technology1.3.2 Role of Regulation1.3.3 Role of the Market1.3.4 Role of StandardsChecklist of Important TermsFurther ReadingProblems2 Applications and Layered Architectures2.1 Examples of Protocols, Services, and Layering2.1.1 HTTP, DNS, and SMTP2.1.2 TCP and UDP Transport Layer Services2.2 The OSI Reference Model2.2.1 The Seven-Layer OSI Reference Model2.2.2 Unified View of Layers, Protocols, and Services2.3 Overview of TCP/IP Architecture2.3.1 TCP/IP Architecture2.3.2 TCP/IP Protocol: How the Layers Work Together2.3.3 Protocol Overview2.4 The Berkeley API2.4.1 Socket System Calls2.4.2 Network Utility Functions2.5 Application Layer Protocols and TCP/IP Utilities2.5.1 Telnet2.5.2 File Transfer Protocol2.5.3 Hypertext Transfer Protocol and the World Wide Web2.5.4 IP Utilities2.5.5 Tcpdump and Network Protocol AnalyzersSummaryChecklist of Important TermsFurther ReadingProblems3 Digital Transmission Fundamentals3.1 Digital Representation of Information3.1.1 Block-Oriented Information3.1.2 Stream Information3.2 Why Digital Communications?3.2.1 Comparison of Analog and Digital Transmission3.2.2 Basic Properties of Digital Transmission Systems3.3 Digital Representation of Analog Signals3.3.1 Bandwidth of Analog Signals3.3.2 Sampling of an Analog Signal3.3.3 Digital Transmission of Analog Signals3.3.4 SNR Performance of Quantizers3.4 Characterization of Communication Channels3.4.1 Frequency Domain Characterization3.4.2 Time Domain Characterization3.5 Fundamental Limits in Digital Transmission3.5.1 The Nyquist Signaling Rate3.5.2 The Shannon Channel Capacity3.6 Line Coding3.7 Modems and Digital Modulation3.7.1 Binary Phase Modulation3.7.2 QAM and Signal Constellations3.7.3 Telephone Modem Standards3.8 Properties of Media and Digital Transmission Systems3.8.1 Twisted Pair3.8.2 Coaxial Cable3.8.3 Optical Fiber3.8.4 Radio Transmission3.8.5 lnfrared Light3.9 Error Detection and Correction3.9.1 Error Detection3.9.2 Two-Dimensional Parity Checks3.9.3 Internet Checksum3.9.4 Polynomial Codes3.9.5 Standardized Polynomial Codes3.9.6 Error-Detecting Capability of a Polynomial Code3.9.7 Linear Codes3.9.8 Error CorrectionSummaryChecklist of Important TermsFurther ReadingProblemsAppendix 3A: Asynchronous Data TransmissionAppendix 3B: Fourier SeriesAppendix 3C: Sampling Theorem4 Circuit-Switching Networks4.1 Multiplexing4.1.1 Frequency-Division Multiplexing4.1.2 Time-Division Multiplexing4.1.3 Wavelength-Division Multiplexing4.2 SONET4.2.1 SONET Multiplexing4.2.2 SONET Frame Structure4.3 Transport Networks4.3.1 SONET Networks4.3.2 Optical Transport Networks4.4 Circuit Switches4.4.1 Space-Division Switches4.4.2 Time-Division Switches4.5 The Telephone Network4.5.1 Transmission Facilities4.5.2 End-to-End Digital Services4.6 Signaling4.6.1 Signaling in the Telephone Network4.6.2 Signaling System #7Architecture4.7 Traffic and Overload Control in Telephone Networks4.7.1 Concentration4.7.2 Routing Control4.7.3 Overload Controls4.8 Cellular Telephone NetworksSummaryChecklist of Important TermsFurther ReadingProblems5 Peer-to-Peer Protocols and Data Link LayerPart I: Peer-to-Peer Protocols5.1 Peer-to-Peer Protocols and Service Models5.1.1 Service Models5.1.2 Examples of Services5.1.3 End to End versus Hop by Hop5.2 ARQ Protocols and Reliable Data Transfer Service5.2.1 Stop-and-Wait ARQ5.2.2 Go-Back-N ARQ5.2.3 Selective Repeat ARQ5.3 Other Peer-to-Peer Protocols5.3.1 Sliding-Window Flow Control5.3.2 Timing Recovery for Synchronous Services5.3.3 TCP Reliable Stream Service and Flow ControlPart II: Data Link Controls5.4 Framing5.5 Point-to-Point Protocol5.6 HDLC Data Link Control5.6.1 Data Link Services5.6.2 HDLC Configurations and Transfer Modes5.6.3 HDLC Frame Format5.6.4 Typical Frame Exchanges5.7 Link Sharing Using Packet Multiplexers5.7.1 Statistical Multiplexing5.7.2 Speech Interpolation and the Multiplexing of Packetized SpeechSummaryChecklist of Important TermsFurther ReadingProblemsAppendix 5A: Derivation of Efficiency of ARQ Protocols6 Medium Access Control Protocols and Local Area NetworksPart I: Medium Access Control Protocols6.1 Multiple Access Communications6.2 Random Access6.2.1 ALOHA6.2.2 Slotted ALOHA6.2.3 Carrier Sense Multiple Access6.2.4 Carrier Sense Multiple Access with Collision Detection6.3 Scheduling Approaches to Medium Access Control6.3.1 Reservation Systems6.3.2 Polling6.3.3 Token-Passing Rings6.3.4 Comparison of Scheduling Approaches in Medium Access Control6.3.5 Comparison of Random Access and Scheduling Medium Access Controls6.4 Channelization6.4.1 FDMA6.4.2 TDMA6.4.3 CDMA6.4.4 Channelization in Telephone Cellular Networks6.5 Delay Performance of MAC and Channelization Schemes6.5.1 Performance of Channelization Techniques with Bursty Traffic6.5.2 Performance of Polling and Token Ring Systems6.5.3 Random Access and CSMA-CDPart II: Local Area Networks6.6 LAN Protocols6.6.1 LAN Structure6.6.2 The Medium Access Control Sublayer6.6.3 The Logical Link Control Sublayer6.7 Ethernet and IEEE 802.3 LAN Standard6.7.1 Ethernet Protocol6.7.2 Frame Structure6.7.3 Physical Layers6.7.4 Fast Ethernet6.7.5 Gigabit Ethernet6.7.6 10 Gigabit Ethernet6.8 Token-Ring and IEEE 802.5 LAN Standard6.8.1 Token-Ring Protocol6.8.2 Frame Structure6.9 FDDI6.10 Wireless LANs and IEEE 802.11 Standard6.10.1 Ad hoc and Infrastructure Networks6.10.2 Frame Structure and Addressing6.10.3 Medium Access Control6.10.4 Physical Layers6.11 LAN Bridges and Ethernet Switches6.11.1 Transparent Bridges6.11.2 Source Routing Bridges6.11.3 Mixed-Media Bridges6.11.4 Virtual LANsSummaryChecklist of Important TermsFurther ReadingProblems7 Packet-Switching Networks7.1 Network Services and Internal Network Operation7.2 Packet Network Topology7.3 Datagrams and Virtual Circuits7.3.1 Connectionless Packet Switching7.3.2 Virtual-Circuit Packet Switching7.3.3 Structure of a Packet Switch7.4 Routing in Packet Networks7.4.1 Routing Algorithm Classification7.4.2 Routing Tables7.4.3 Hierarchical Routing7.4.4 Specialized Routing7.5 Shortest-Path Routing7.5.1 The Bellman-Ford Algorithm7.5.2 Dijkstra's Algorithm7.5.3 Source Routing versus Hop-by-Hop Routing7.5.4 Link-State Routing versus Distance-Vector Routing7.6 ATM Networks7.7 Traffic Management at the Packet Level7.7.1 FIFO and Priority Queues7.7.2 Fair Queueing7.7.3 Weighted Fair Queueing7.7.4 Random Early Detection7.8 Traffic Management at the Flow Level7.8.1 Open-Loop Control7.8.2 Closed-Loop Control7.9 Traffic Management at the Flow-Aggregate LevelSummaryChecklist of Important TermsFurther ReadingProblems8 TCP/IP8.1 The TCP/IP Architecture8.2 The Internet Protocol8.2.1 IP Packet8.2.2 IP Addressing8.2.3 Subnet Addressing8.2.4 IP Routing8.2.5 Classless Interdomain Routing (CIDR)8.2.6 Address Resolution8.2.7 Reverse Address Resolution8.2.8 Fragmentation and Reassembly8.2.9 ICMP: Error and Control Messages8.3 IPv68.3.1 Header Format8.3.2 Network Addressing8.3.3 Extension Headers8.3.4 Migration Issues from IPv4 to IPv68.4 User Datagram Protocol8.5 Transmission Control Protocol8.5.1 TCP Operation and Reliable Stream Service8.5.2 TCP Protocol8.5.3 TCP Congestion Control8.6 Internet Routing Protocols8.6.1 Routing Information Protocol8.6.2 Open Shortest Path First8.6.3 Border Gateway Protocol8.7 Multicast Routing8.7.1 Reverse-Path Broadcasting8.7.2 Intemet Group Management Protocol8.7.3 Reverse-Pa& Multicasting8.7.4 Distance-Vector Multicast Routing Protocol8.8 DHCP, NAT, and Mobile IP8.8.1 Dynamic Host Configuration Protocol8.8.2 Network Address Translation8.8.3 Mobile IPSummaryChecklist of Important TermsFurther ReadingProblems9 ATM Networks9.1 Why ATM?9.2 BISDN Reference Model9.3 ATM Layer9.3.1 ATM Cell Header9.3.2 Virtual Connections9.3.3 QoS Parameters9.3.4 Traffic Descriptors9.3.5 ATM Service Categories9.3.6 Traffic Contracts, Connection Admission Control,and Traffic Management9.4 ATM Adaptation Layer9.4.1 AAL19.4.2 AAL29.4.3 AAL3/49.4.4 AAL59.4.5 Signaling AAL9.4.6 Applications, AALs, and ATM Service Categories9.5 ATM Signaling9.5.1 ATM Addressing9.5.2 UNI Signaling9.5.3 PNNI Signaling9.6 PNNI Routing9.7 Classical IP Over ATMSummaryChecklist of Important TermsFurther ReadingProblems10 Advanced Network Architectures10.1 Integrated Services in the Internet10.1.1 Guaranteed Service10.1.2 Controlled-Load Service10.2 RSVP10.2.1 Receiver-Initiated Reservation10.2.2 Reservation Merging10.2.3 Reservation Styles10.2.4 Soft State10.2.5 RSVP Message Format10.3 Differentiated Services10.3.1 DS Field10.3.2 Per-Hop Behaviors10.3.3 Traffic Conditioner10.3.4 Bandwidth Broker10.4 Network Interconnection Models10.4.1 Overlay Model10.4.2 Peer-to-Peer Model10.5 MPLS10.5.1 Fundamentals of Labels10.5.2 Label Stack and LSP Hierarchy10.5.3 VC Merging10.5.4 Label Distribution Protocols10.5.5 MPLS Support for Virtual Networks10.5.6 Survivability10.5.7 GMPLS10.6 Real-Time Transport Protocol10.6.1 RTP Scenarios and Terminology10.6.2 RTP Packet Format10.6.3 RTP Control Protocol (RTCP)10.7 Session Control Protocols10.7.1 Session Initiation Protocol10.7.2 H. 323 Multimedia Communication Systems10.7.3 Media Gateway Control ProtocolsSummaryChecklist of Important TermsFurther ReadingProblems11 Security Protocols11.1 Security and Cryptographic Algorithms11.1.1 Applications of Cryptography to Security11.1.2 Key Distribution11.2 Security Protocols11.2.1 Application Scenarios11.2.2 Types of Security Service11.2.3 Setting Up a Security Association11.2.4 IPSec11.2.5 Secure Sockets Layer and Transport Layer Security11.2.6 802.11 and Wired Equivalent Privacy11.3 Cryptographic Algorithms11.3.1 DES11.3.2 RSASummaryChecklist of Important TermsFurther ReadingProblems12 Multimedia Information12.1 Lossless Data Compression12.1.1 Huffman Codes12.1.2 Run-Length Codes12.1.3 Adaptive Data Compression Codes12.2 Compression of Analog Signals12.2.1 Adaptive Quantizers12.2.2 Predictive Coding12.2.3 Transform and Subband Coding12.3 Image and Video Coding12.3.1 Discrete Cosine Transform Coding12.3.2 The JPEG Image-Coding Standard12.3.3 Compression of Video Signals12.3.4 The MPEG Video-Coding Standards12.3.5 MPEG MultiplexingSummaryChecklist of Important TermsFurther ReadingProblemsEpilogueAppendicesA Delay and Loss PerformanceA.1 Delay Analysis and Little's FormulaA.1.1 Arrival Rates and Traffic Load DefinitionsA.1.2 Little's FormulaA.2 Basic Queueing ModelsA.2.1 Arrival ProcessesA.2.2 Service TimesA.2.3 Queueing System ClassificationA.3 M/M/1: A Basic Multiplexer ModelA.3.1 M/M/1 Steady State Probabilities and the Notion of StabilityA.3.2 Effect of Scale on PerformanceA.3.3 Average Packet Delay in a NetworkA.4 The M/G/1 ModelA.4.1 Service Time Variability and DelayA.4.2 Priority Queueing SystemsA.4.3 Vacation Models and Multiplexer PerformanceA.5 Erlang B Formula: M/M/c/c SystemFurther ReadingB Network ManagementB.1 Network Management OverviewB.2 Simple Network Management Protocol (SNMP)B.3 Structure of Management InformationB.4 Management Information BaseB.5 Remote Network MonitoringFurther ReadingIndex
章節(jié)摘錄
插圖:
編輯推薦
概括而言,《通信網(wǎng)基本概念與主體結(jié)構(gòu)》(英文版)(第2版)取材廣泛,內(nèi)容新穎,結(jié)合實(shí)際,既有基本的介紹,又有較為深入的分析,還有大量的習(xí)題,可作為計(jì)算機(jī)、電子等專業(yè)本科生、研究生的教學(xué)用書,或作為各行業(yè)網(wǎng)絡(luò)技術(shù)人員、服務(wù)人員的參考讀物。The material in the book has been rearranged so that optional sections can be skipped without a disruption in the topic flow. The sections that contain optional material are indicated by a diamond (◆) in the heading. The optional sections that contain detailed mathematics are now indicated by a sidebar. Chapter 1 has been shortened and the discussion of network evolution has been simplified. The functions associated with each layer are introduced along with the discussion on network evolution. In Chapter 2 the discussion on how all the layers work together has been improved by introducing examples using Ethereal packet captures. The section on application layer protocols has been expanded and a new section provides an introduction to network protocol analyzers. PCM speech coding has been moved from Chapter 12 to Chapter 3. Chapter 4 provides more detail on SONET and optical transport networks. Satellite cellular networks have been dropped. Chapter 5 now consists of two parts. The first part deals with peer-to-peer protocols using reliable data transfer protocols as an example. The first part also includes TCP reliable byte stream service. The second part focuses on data link layer protocols and now includes a section on framing. Chapter 6 has also been divided into the principles of medium access control protocols Part I and LANs (Part II). We have simplified the mathematical discussion of medium access controls and provide details in a separate section. In Chapter 7 we have streamlined the discussion of packet networks, and we have separated clearly the more advanced discussion of traffic management. Chapter 8 makes extensive use of packet capture examples to illustrate the operation of TCP/IP protocols. Chapter 10 on advanced network architectures has been revised extensively. The discussion of ATMover IP has been replaced by a discussion of the overlay and peer models to network interconnection. The chapter now contains discussion on virtual networks and GMPLS. The material on RTP and SIP has been updated and moved from Chapter 12 to this chapter. Chapter 11 has been updated with brief discussions of the Advanced Encryption Standard and 802.1 I security.
圖書封面
圖書標(biāo)簽Tags
無
評(píng)論、評(píng)分、閱讀與下載