計算機(jī)網(wǎng)絡(luò)與因特網(wǎng)

出版時間:2010-9  出版社:清華大學(xué)出版社  作者:科姆  頁數(shù):600  
Tag標(biāo)簽:無  

前言

Previous editions of Computer Networks And Internets have received incrediblypositive reviews; I especially thank readers who have taken the time to write to me per-sonally. In addition to students who use the text in courses, networking professionalshave written to praise its clarity and describe how it helped them pass professional cer-tification exams. Many enthusiastic comments have also arrived about foreign transla-tions. The success is especially satisfying in a market glutted with networking books.This book stands out because of its breadth of coverage, logical organization, explana-tion of concepts, focus on the Internet, and appeal to both professors and students.In response to suggestions from readers and recent changes in networking, the newedition has been completely reorganized, revised, and updated. Descriptions of oldertechnologies has been reduced or eliminated. Material on data communications, whichis becoming an essential staple of networking courses, has been expanded and placed inPart II of the text. The networking chapters build on the data communication basics,and describe both wired and wireless networking. In addition, to emphasize the new802.11 wireless standards, the discussion of wireless includes cellular telephone techno-logies because cellular systems currently offer data services and will soon be adoptingInternet protocols.Recent discussions about networking courses have engendered a debate about thebottom-up or top-down approach. In bottom-up, a student learns the lowest-level de-tails, and then learns how the next higher levels use the lower-levels to provide expand-ed functionality. In top-down, one starts with a high-level application and only learnsenough of the next lower layer to understand how the application can operate. This textcombines the best of each. The text begins with a discussion of network applicationsand the communication paradigms that the Internet offers. It allows students to under-stand the facilities the Internet provides to applications before studying the underlyingtechnologies that implement the facilities. Following the discussion of applications, thetext presents networking in a logical manner so a reader understands how each newtechnology builds on lower layer technologies.The text is intended for upper-division undergraduates or beginning graduate stu-dents, who have little or no background in networking. It does not use sophisticatedmathematics, nor does it assume a knowledge of operating systems. Instead, the textdefines concepts clearly, uses examples and figures to illustrate how the technologyoperates, and states results of analysis without providing mathematical proofs.

內(nèi)容概要

本書由暢銷書作者和網(wǎng)絡(luò)領(lǐng)域的權(quán)威專家Douglas Comer教授編著,全面而系統(tǒng)地介紹了計算機(jī)網(wǎng)絡(luò)知識。全書分5大部分共32章,涵蓋的內(nèi)容廣泛,包括網(wǎng)橋、交換、路由與路由協(xié)議、多媒體協(xié)議與IP技術(shù),以及Web瀏覽等。本書第5版在前幾版的基礎(chǔ)上進(jìn)行了重新組織和全面修訂,新增了無線網(wǎng)絡(luò)協(xié)議、網(wǎng)絡(luò)性能等最新技術(shù)主題。本書適合作為高等學(xué)校計算機(jī)、通信、電子等專業(yè)的教材或參考書。

作者簡介

作者:(美國)科姆(Douglas E.Comer)

書籍目錄

PrefacePART Ⅰ Introduction And internet Applications  Chapter 1 Introduction And Overview    1.1 Growth Of Computer Networking    1.2 WhV Networking Seems Complex    1.3 The Five Key ASDects Of Networking    1.4 Public And Private Parts Of The internet    1.5 Networks, Interoperability, And Standards    1.6 Protocol Suites And Layering Models    1.7 How Data Passes Through Layers    1.8 Headers And Lavers    1.9 ISO and the OSI Seven Laver Reference Model    1.10 The inside ScoOD    1.11 Remainder Of The Text    1.12 Summary  Chapter 2 Internet Trends  Chapter 3 Internet Applications And Network Proqrammina  Chapter 4 Traditional Internet ApplicationsPART Ⅱ Data Communication Basics  Chapter 5 Overview Of Data Communications  Chapter 6 Information Sources And Signals  Chapter 7 Transmission Media  Chapter & Reliability And Channel Coding  Chapter 9 Transmission Modes  Chapter 10 Modulation And Modems  Chapter 11 Multiplexing And Demultiplexing (Channelization)  Chapter 12 Access And Interconnection TechnologiesPART Ⅲ Packet Switching And Network Technologies  Chapter 13 Local Area Networks: Packets, Frames, And Topologies  Chapter 14 The IEEE MAC Sub-Layer  Chapter 15 Wired LAN Technology (Ethernet And 802.3)  Chapter 16 Wireless Networking Technologies 267  Chapter 17 LAN Extensions: Fiber Modems, Repeaters, Bridges, and Switches  Chapter 18 WAN Technologies And Dynamic Routing 305  Chapter 19 Networking Technologies Past And PresentPART Ⅳ Internetworking  Chapter 20 Internetworking: Concepts, Architecture, and Protocols  Chapter 21 lP: Internet Addressing  Chapter 22 Datagram Forwarding  Chapter 23 Support Protocols And Technologies  Chapter 24 The Future lP (IPv6)  Chapter 25 UDP: Datagram Transport Service  Chapter 26 TCP: Reliable Transport Service  Chapter 27 Internet Routing And Routing ProtocolsPART Ⅴ Other Networking Concept&Technologies  Chapter 28 Network Performance (QoS and DiffSery)  Chapter 29 Multimedia And lp Telephony (VOIP)  Chapter 30 Network Security  Chapter 31 Network Management (SNMP)  Chapter 32 Trends in Networking Technologies And UsesAppendix 1 A Simplified Application Programming interfaceIndex

章節(jié)摘錄

插圖:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.

編輯推薦

《計算機(jī)網(wǎng)絡(luò)與因特網(wǎng)(第5版)(影印版)》:大學(xué)計算機(jī)國外著名教材系列

圖書封面

圖書標(biāo)簽Tags

評論、評分、閱讀與下載


    計算機(jī)網(wǎng)絡(luò)與因特網(wǎng) PDF格式下載


用戶評論 (總計3條)

 
 

  •   很好的引進(jìn)版,適合計算機(jī)網(wǎng)絡(luò)方面的學(xué)生和專業(yè)人士參考。
  •   作為入門書讀讀。
  •   在書吧看了前3章,語言很簡練,內(nèi)容深入淺出,美國名牌大學(xué)教授寫的,就是不一樣,先買回來,再仔細(xì)研究。
 

250萬本中文圖書簡介、評論、評分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號-7