计算机网络

计算机网络 pdf epub mobi txt 电子书 下载 2025

出版者:清华大学出版社
作者:Andrew S,Tanenbaum
出品人:
页数:891
译者:
出版时间:2008-5
价格:69.00元
装帧:平装
isbn号码:9787302172758
丛书系列:
图书标签:
  • Programming
  • Networks
  • 计算机网络
  • 计算机
  • 计科专业教材
  • 网络
  • SE
  • Eng
  • 计算机网络
  • 网络原理
  • 数据通信
  • TCP/IP
  • 网络协议
  • 网络安全
  • 交换机
  • 路由器
  • 网络编程
  • 计算机科学
想要找书就要到 小美书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

具体描述

《计算机网络(第4版)(修订版)》是国内外使用最为广泛的计算机网络经典教材。全书按照网络协议模型(物理层、数据链路层、介质访问控制子层、网络层、传输层和应用层),自下而上系统地介绍了计算机网络的基本原理,并给出了大量实例。在讲述各网络层的同时,还融合进了近年来迅速发展起来的各种网络技术,如Internet、SONET、ADSL、CDMA、WLAN和蓝牙等。另外,针对当前计算机网络的发展现状以及计算机安全的重要性,《计算机网络(第4版)(修订版)》用了一整章的篇幅对计算机安全进行了深入讨论。

作者简介

《计算机网络(第4版)(修订版)》作者[美]特尼博姆(Tanenbaum,A.S.)。

本书的适用对象很广泛。对于学习计算机网络课程的本科生以及研究生,本书都可以作为教材或教学参考书,每一章后面的大量练习题,可用于课程作业或者复习要点。对于从事网络研究、网络工程以及使用和管理网络的科研和工程技术人员,本书也是一本很有价值的参考读物。

目录信息

1INTRODUCTION1
I.IUSESOFCOMPUTERN-ETWORKS3
I.I.]BusinessApplications3
1.I.2HomeApplications6
I.].3MObileUSers9
11.4socialIsslles12
1.2NETWORKHARDWARE14
]2.1LocalAreaNetworks16
1.2.2MetropohtanahaNetworks18
1.2.3WideAreaNetworks19
l.2.4WirelessNetworks21
l.2.5HomeNetwOIks23
1,26Internetworks25
].3NETWORKSOWrWARE26
1.3]ProtocolHierarchies26
1.3.2DesignIssuesfortheLayers30
]33ConnecTion-OnentedandConnechonlessServices32
].34ServicePriml(lves34
I.3.5TheReIahonstupofServicestorrotocoIS36
tvcow.rLNIs
1.4REFERENCEMODELS37
1.4.1TheOSIReferenceMOCteI37
1.4.2TheTCWIPRettrenceMOdel41
I.4.3ACt>rnparisonoI.tieOSIandThmP~renceMOueIS44
].4.4ACntiqueof'theOSIModelandProtocols46
].4.5ACTitiqueoftheTCWiPReferenceMOueI48
I.5EXAMPLENETWORKS49
l.5.1TheInternet50
].5.2COnnectionOnentedNetworkstX.25.FrameReIas.andATM59
l.5.3EiheTLnei65
I.5.4WIreless~st802.1168
1.6NETWORKSTANDARD~ION71
l.6.1Who'sWhointheTelecommunicationsWOrld71
l.6.2Who'sWhointhe]nternationalStandAnsWorld74
l.6.3Who'sWhointheInternetStandardsWorld75
I.7METRICUNITS77
1.8OUTLINEOFTHERESTOFTHEBOOK78
I.9SUMMARY79
2THEPHYSICALLAYER85
2.1THETHEORETICALBASISFORDATACOMMUNICATION85
2.1.IFounerAnalysis86
ZI2BandwidthL]mitedS]gnals86
213TeeMaximumDataRateofaChanllel89
2.2GUIDEDTRANSMISSIONMEDIA90
2.2.]MagneticMedia90
2,2.2TwistedPair91
2.2.3CoaxialCable92
2.2.4FIberOptICS93
2.3WIRELESSTRANSMISSION100
2.3.1TheElectromagneticSpectrum100
23.2RadioTranstnlsslon103
2.33MicrowaveTransmission104
2,3,4InfrasandMillimeterWaves106
2.3.5LightwaveTransmission107
2.4COMMUNICATIONSATELLITES109
2.4.1GcostatlonareSatellites109
242MediumEarthOrbitSatellites113
2.4.3Low-EarthOTbitSatellites114
2.4.4SatellitesvexsusFiber117
2.5THEPUBLICSWITCHEDTELEPHONENETWORK118
2.5.1StructureoftheTelephoneSystem119
2.5,2ThePoliticsofTelephones122
2.5.3TeeLOCalboorMOdems.ADSL.andWireless124
254TrunksandMuItipIexing137
2.5.5Switching146
icTIJFBOnnsTELEPHONESYSTEM152
2.6.1FirstGCnerationMObileThouesAnalOgVOICe153
2.6.2Second-GenerationMobilePhones'DigitalVoice157
2.6.3Third-GenerationMobilePhones:DigitalVoiceandDaal166
2.7CABLETELEVISION169
2.7,lCommunityAntennaTelevision169
27.2InternetoverCable]70
27.3SPectrumAllocaoon172
2.7.4CableModems173
275ADSLversusCattle175
28SUMMARY177
3THEDATALINKLAYER183
3]DATALINKLAYERDESIGNISSUES184
3.].]ServicesProvidedtotheNetworkLaaer184
3.1.2Framing]87
3.1.3ErrorControl191
3.l.4FlowControl192
yiCON~TS
3.2ERRORDETECTIONANDCORRECTION192
3.2.1Eder-CorrechngCodes193
3.2.2Error-DetechngCodes196
33ELEMENTARYDATALINKPROTOCOLS200
3.31AnUnrestrlctedSimplexProtoco]204
3.3.2ASimplexStop-and-WaitProtocol206
3.33AS]mplexProtocolf',raNoisyChannel208
3.4SLIDJNGWINDOWPROTOCOLS2]1
3.4.]AOneBitSlidingWindowprotocol214
3.4.2ApootocoIUSingcoBackN216
3.4.3AWOtocoIUSingSelectiveffepeat223
3.5PROTOCOLVERIFICATION229
351FiniteStateMachineMOdelS229
35.2PetrlNetModels232
36EXAMPLEDATALINKPROTOCOLS234
3.6.1HDLC--nIghLCVC]DataLinkCOIItroI234
362TheDataLinkLayerintheinternet237
3.7SUMM~242
4THEMEDIUMACCESSCONTROLSUBLAYER247
4.ITHECHANNELALLOCATIONPROBLEM248
4.1.lStaucChannelA]]ocationinLANdandMANs248
41.2DynamICChannelAllOCationinLANSandMANSig
42MULTIPLEACCESSPROTOCOLS251
4.21ALOHA251
4.2.2CarrierSenseMultipleAccessProtocols255
4.2.3C('IIISIOIIrreervotocoIS259
4,24L]mited-ContentionProtocols26]
4.2.5WavelengthDivisionMultipleAccessPTotocols265
4.2.6WlrclcssLANProtocols267
CONTrmTSvii
43ETHERNET271
4.3.1EthernetCablillg271
4.3.2ManchesterEIICOding274
4.3.3TheEthernetMACSublayerProtocol275
4.3.4TheBindsExponentialBackofl'Algorithm278
4.3.5EthernetPerformance279
4.3.6SwitchedEthernet281
4.3.7FastEthernet283
4.3.8GigabitEthernet286
439JEEE8022LogicalLinkConlrol290
4310RetrospectiveonWhernet291
4.4WIRELESSLANS292
441The802.11ProtocolStack292
4.4.2The802.IIimysicaILayer293
443The802.11BACSI]bIaserAntocoI295
4.4.4The802.11I'lameStructule299
4.4.5Ser,IICes3]
4.5BROADBANDWIRELESS302
4.5.1Comparisonof802]1with802.16303
4,5,2The802.16PlotocolStack305
4.5.3The80216Physica]I-ayer306
4.5.4The802.16MACSubIaycrProt'>coI307
4.5.5The802.16FI+amcStructult309
4.6BLUETOOTH310
461BIuetoothArchitecture311
46.2BIuetoothAppIicahons312
4.6.3TheBluetoothProtoco]Stack313
4.6.4TheBIuctoothRadioLayeT315
4.6.5TheBluetoothBasebandLaver315
4.66TheBIIIetonthLZCAPLayer316
4.67TheBllletol)thFralncStruclure316
4.7DATALINKLAYERSWiTCHING318
4.7.1Bridgesfrom802.xto802.y320
4.77Local1llterlletworking322
4.7.3SpanIIingTreebridged324
4.7.4RemoteBridges325
4.7.5Repeateds.Hubs.Bridges.Switches.Routeds.andGatcwnys326
4.7.6VirtualLANS329
4.8SUMMARY337
vinCOMENTS
5THENETWORKLAYER343
5.INETWORKLAYERDESIGNISSUES343
5.l.lStoreanduForwardPacketSwitching344
51.2ServicesProvidedtotheTransportLayer3M
>.l.3implementationofConnechonlessService345
514linplementalonofConnechon-OnentedService347
sl.5CI)mparisonofVirtualCircuitandDatagramSubnets348
5.2ROUT[NGALGORITHMS350
5.2.1TheOptimalityPrinciple352
522ShortestPathRouting353
5.23FlOOding355
524DistanceVectorRouting357
525LinkStateROuting360
5.26HierarehlcalRouting366
527BTOadcastROuhng368
5.28MuIticastROuting370
5.2.9ROutingforMObiICHOSts372
5.2.10ffeuhnginAdHOCNetworks373
5.2.11NodeLockupinPeertoPeerNetwoTks380
5.3CONGESTIONCONTROLALGORITHMS384
5.3.]GeneralPrinciplesofCongestionControl386
5.3.2CongestionPreventionPolicies388
5.3.3CongeshonControlinVirtoaLCircuitSubnets389
5.3.4COngeshonCOntrolinDatagramSubnets391
5.3.5LOadShedding394
5.3.6JltterControl395
5,4QUALITYOFSERVICE397
54,lRequirements397
5.4.2TechniquesforAchievingGoodQualityofSerylce398
5.4.3IntegratedSemces409
5.4.4DiffeTentiatedServices412
5.4.5LabelSwitchingandMPLS415
5.5INTERNETWORKING418
5.5.1HowNetworksDiffer419
55.2HowNetworksCanBeConnected420
55.3COncatenatedVirtualCircuIts422
5.5.4Connectionlessinternetworking423
CONTENTSix
5.5.5Tunneling425
5.5.6IntrmctworkRouting426
5.5.7Frapmentation427
5.6THENETWORKLAYERINTHEIN'TERNET431
5.6.1ThelPProtocol433
5.6.2lpAddresses436
5.6.3InternetControlProtocols449
56.4OSPF--TheinteriorGatewayR(lutingProtocol454
5.6.5BGP--TheExtenorGatewayRouDngpooioco]459
5.6.6InternetMulticasting46]
5.6.7MObilem462
56,8Ipv6464
5.7SUMMARY473
6THETRANSPORTLAYER481
6.]THETRANSPORTSERVICE48]
6,IIServicesProvidedtotheUPVerLasers48]
6.].2TransP')rtScrylccPnmiiivcs483
6.I.3BerneIeySOCkets487
6,14AnExampleofSocketProgTalnming.AninternetFileServer488
6.2ELEMENTSOFTRANSPORTPROTOCOLS492
6.2.]Addressing493
6.2.2ConnectionEstflblishment496
6.2,3COnnectionRelease502
6.2.4FlowConlTo]andBuffenng506
6.2.5MuIhpIexing510
6.2.6CrashRecoverysll
63ASIMPLET~SPORTPROTOCOL513
63.ITheExampleSerylcePnmltives513
63.2TheExampleTransportEmit}'515
63.3TheExampleasaF]niteStateMachine522
6.4THEINTERNETTRANSPORTPROTOCOLSiUDP524
641IntroductiontoUDP525
6.4.2RcrnotcWoccdureCall526
6.4.3TheReal-TImeTransportriotocoI529
6.5TEE]NTERNETTRANSPORTPROTOCOLSiTCI3532
6.5.1IntroductiontoTCP532
6.5.7TheTCPServiceMOdel533
6.5.3TheTCPPn)tocol535
6.5.4TileTCPSegmentTJeader536
6.5.5TCPConnectionEstablishment539
6.5.6TCPCOnncciinIIRelease541
6,5.7MOdelingTIPCOnnectIOnManasenIeIIt541
6.5.8TCP"I'ransnussionPOlicy543
6.5.9TCPCOngestionCOntrol547
6.5.]0TCPTimerManagemellt550
6.5.IIWZreIessTCPBIndUDP553
6,512TransactiDnaITCP555
6.6PERFOanANCEISSUES557
6.6.]PerformanceProblemsillCompulerNetworks557
6.6.2NetworkPerf<lrlnanceMeasuremenl560
6.6.3SystemDesignforBetterPeritwmancc562
6.6.4FastTPDUProcessing566
6.6.5protocolslITG]gabltNetworks569
67SUMMARY573
7THEAPPLICATIONLAYER579
7.]DNSTabDOMAINNAMESYSTEM579
7.IITheDNSN3meSpaceSKO
7]2ResourceRecords582
7.]3NancyServers586
v.zELECTRONICMAn.588
721AichitectureandServices590
7.2.2TheUSerAgent591
72.3MessageFormats594
7.2.4MessaseTransfer602
7.2.5FInalDCIivcry605
73THEWORLDWIDEWEB611
73.1AichiteclllralOverview612
732StaticWebDocuments629
CONTENTSXi
7.3.3DynamicWebDocuments643
7,34HTTP--ahaHyperxextpansiervrotoco]651
7.3.5PerformanceEnhancements656
7.3.6TheWirelessWeb662
7.4MULTIMEDIA674
7.4.1IntroductiontoDigitalAudio674
7.4.2AudioCompressloll676
7.4.3StreamillgAudio679
7.4.4InterlletRadio683
7.4.5VOICCoverlP685
7.4.6IniroduchontoVIdeo692
7.4.7VideoCOnInxession696
74,8VjdCoonDcmalld704
749TheEBony--TheMulhcastBackbone711
7.5SUMMARY714
8NETWORKSECURITY721
S.ICRYPTOGR-APHY724
8.1.IIntroductiontoCryptography725
8.I.2SubstitutionCiphers727
8.I.3TrallspositionCiphers729
8.1.4OneninePads730
8.1.5TwoFundamentalCryptographicPrinciples733
8.2SYMMETRIC~KEYALGORITHMS737
8.2.IDES--TheDataEncrypti(}nStandard738
8.22AES--sheAdvancedEncr>ptionStandals741
8.23CIPheTModes745
8.2.4otherCiphers750
8.2.5CryptanaIysis750
8.3PUBLIC-KEYALGORITHMS752
8.3.1RSA753
8.3.2OtherPublic-KeyA]gorltbms755
XllCONTENTs
8.4DIGITALSIGNAT'URES755
8.4.1SymmetricKeySignatores756
8.4.2PublicKeySignatures757
8.4.3MessazcDigests759
8.4.4TheBirthdayAttack763
85MANAGEMENTOFPUBLICKEYS765
8.5.1Certificates765
8.5.2X.509767
8.5.3PublicKeyinfrastructures768
86COMMUNICATIONSECURITY772
8.6.]IPSec772
862Firewalls776
863VirtualPrivateNetworks779
8.6.4WirelessSecurity780
8.7AUTHENTJCATIONPROTOCOLS785
8.7.1AuthenticationBasedonaSharedSecretKey786
8.7.2EStablishingaSharedKey.TheDit.ticHell~ASyEXChange791
8.73AuthenticationUsingaKeyDistributionCenteT793
8.7.4AuthenticanonUsingKerberos796
87.>AuthenticahonUsingPubhc-KeyCryptography798
88E-MAILSECURITY799
8.8.]PG~rettyGOOdfuvacy799
8.8.2PEM--ruvacyEnhancedMail803
8.8.3S/MIME804
8.9WEBSECURITY805
8.9.1Threats85
8.9.2SecllreNanung806
8.9.3SSMTheSecureSocketsLayer813
8.94MObileCOdeSecunts8]6
8.10SOCIALISSLTS819
8.10.1Pnvacy819
810.2FreedomofSpeech922
8.10.3Copynght826
sIISUMMARY828
CONT~Sxiii
9READINGLISTANDBIBLIOGRAPHY835
9]SUGGESTIONSFORFURTHERREADING835
9.1.IIntroductionandGenera]Works836
9.l.2ThePhysicalLayal838
9.1.3TheDatainkLaver840
9.1.4TheMediumAccessControlSublayer540
9.1.5TheNetworkLaser542
9.1.6TheTransportLayer844
9.]7TheAppIicahonLaverSa
9.1.8NetworkSecurity846
9.2ALPHABETICALBIBLIOGRAPHY848
INDEX869
· · · · · · (收起)

读后感

评分

如题,这是我看的第一本英文原版书。大学时曾经上过的一门选修课是用这本书的中文版做为教材,但是很可惜,当时没有仔细的去读它,匆匆的就过去了。 后来读研的时候,重新捡起来读,不同的是买了一本英文版的,因为也想借此提高一下英语的阅读水平。 让我感到意外的是,我竟...  

评分

评分

第一章看完了,讲解的确实详细,不过感觉看的有点累。 后面的物理层首先讲的就是傅立叶级数,伤脑筋啦。物理层、数据链路层、介质访问控制子层、网络层、传输层和应用层,不知道后面是不是很难,要怎么才能看完啊。 这本书竟然比c primer plus(都是入门类书籍~~~)还要厚。 ...  

评分

如题,这是我看的第一本英文原版书。大学时曾经上过的一门选修课是用这本书的中文版做为教材,但是很可惜,当时没有仔细的去读它,匆匆的就过去了。 后来读研的时候,重新捡起来读,不同的是买了一本英文版的,因为也想借此提高一下英语的阅读水平。 让我感到意外的是,我竟...  

评分

这本书在国内享有盛誉的书,但实际上并不怎样。 我指的是:书的内容很全,面面俱到,但并不适合作为教材。 可读性一般。我是看过这本书的。 我强烈推荐另外一本书:计算机网络,自顶向下的方法。 相信我,没错的。  

用户评价

评分

评分

评分

评分

评分

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美书屋 版权所有