計算機網絡

計算機網絡 pdf epub mobi txt 電子書 下載2025

出版者:清華大學齣版社
作者:Andrew S,Tanenbaum
出品人:
頁數:891
译者:
出版時間:2008-5
價格:69.00元
裝幀:平裝
isbn號碼:9787302172758
叢書系列:
圖書標籤:
  • Programming
  • Networks
  • 計算機網絡
  • 計算機
  • 計科專業教材
  • 網絡
  • SE
  • Eng
  • 計算機網絡
  • 網絡原理
  • 數據通信
  • TCP/IP
  • 網絡協議
  • 網絡安全
  • 交換機
  • 路由器
  • 網絡編程
  • 計算機科學
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

具體描述

《計算機網絡(第4版)(修訂版)》是國內外使用最為廣泛的計算機網絡經典教材。全書按照網絡協議模型(物理層、數據鏈路層、介質訪問控製子層、網絡層、傳輸層和應用層),自下而上係統地介紹瞭計算機網絡的基本原理,並給齣瞭大量實例。在講述各網絡層的同時,還融閤進瞭近年來迅速發展起來的各種網絡技術,如Internet、SONET、ADSL、CDMA、WLAN和藍牙等。另外,針對當前計算機網絡的發展現狀以及計算機安全的重要性,《計算機網絡(第4版)(修訂版)》用瞭一整章的篇幅對計算機安全進行瞭深入討論。

著者簡介

《計算機網絡(第4版)(修訂版)》作者[美]特尼博姆(Tanenbaum,A.S.)。

本書的適用對象很廣泛。對於學習計算機網絡課程的本科生以及研究生,本書都可以作為教材或教學參考書,每一章後麵的大量練習題,可用於課程作業或者復習要點。對於從事網絡研究、網絡工程以及使用和管理網絡的科研和工程技術人員,本書也是一本很有價值的參考讀物。

圖書目錄

1INTRODUCTION1
I.IUSESOFCOMPUTERN-ETWORKS3
I.I.]BusinessApplications3
1.I.2HomeApplications6
I.].3MObileUSers9
11.4socialIsslles12
1.2NETWORKHARDWARE14
]2.1LocalAreaNetworks16
1.2.2MetropohtanahaNetworks18
1.2.3WideAreaNetworks19
l.2.4WirelessNetworks21
l.2.5HomeNetwOIks23
1,26Internetworks25
].3NETWORKSOWrWARE26
1.3]ProtocolHierarchies26
1.3.2DesignIssuesfortheLayers30
]33ConnecTion-OnentedandConnechonlessServices32
].34ServicePriml(lves34
I.3.5TheReIahonstupofServicestorrotocoIS36
tvcow.rLNIs
1.4REFERENCEMODELS37
1.4.1TheOSIReferenceMOCteI37
1.4.2TheTCWIPRettrenceMOdel41
I.4.3ACt>rnparisonoI.tieOSIandThmP~renceMOueIS44
].4.4ACntiqueof'theOSIModelandProtocols46
].4.5ACTitiqueoftheTCWiPReferenceMOueI48
I.5EXAMPLENETWORKS49
l.5.1TheInternet50
].5.2COnnectionOnentedNetworkstX.25.FrameReIas.andATM59
l.5.3EiheTLnei65
I.5.4WIreless~st802.1168
1.6NETWORKSTANDARD~ION71
l.6.1Who'sWhointheTelecommunicationsWOrld71
l.6.2Who'sWhointhe]nternationalStandAnsWorld74
l.6.3Who'sWhointheInternetStandardsWorld75
I.7METRICUNITS77
1.8OUTLINEOFTHERESTOFTHEBOOK78
I.9SUMMARY79
2THEPHYSICALLAYER85
2.1THETHEORETICALBASISFORDATACOMMUNICATION85
2.1.IFounerAnalysis86
ZI2BandwidthL]mitedS]gnals86
213TeeMaximumDataRateofaChanllel89
2.2GUIDEDTRANSMISSIONMEDIA90
2.2.]MagneticMedia90
2,2.2TwistedPair91
2.2.3CoaxialCable92
2.2.4FIberOptICS93
2.3WIRELESSTRANSMISSION100
2.3.1TheElectromagneticSpectrum100
23.2RadioTranstnlsslon103
2.33MicrowaveTransmission104
2,3,4InfrasandMillimeterWaves106
2.3.5LightwaveTransmission107
2.4COMMUNICATIONSATELLITES109
2.4.1GcostatlonareSatellites109
242MediumEarthOrbitSatellites113
2.4.3Low-EarthOTbitSatellites114
2.4.4SatellitesvexsusFiber117
2.5THEPUBLICSWITCHEDTELEPHONENETWORK118
2.5.1StructureoftheTelephoneSystem119
2.5,2ThePoliticsofTelephones122
2.5.3TeeLOCalboorMOdems.ADSL.andWireless124
254TrunksandMuItipIexing137
2.5.5Switching146
icTIJFBOnnsTELEPHONESYSTEM152
2.6.1FirstGCnerationMObileThouesAnalOgVOICe153
2.6.2Second-GenerationMobilePhones'DigitalVoice157
2.6.3Third-GenerationMobilePhones:DigitalVoiceandDaal166
2.7CABLETELEVISION169
2.7,lCommunityAntennaTelevision169
27.2InternetoverCable]70
27.3SPectrumAllocaoon172
2.7.4CableModems173
275ADSLversusCattle175
28SUMMARY177
3THEDATALINKLAYER183
3]DATALINKLAYERDESIGNISSUES184
3.].]ServicesProvidedtotheNetworkLaaer184
3.1.2Framing]87
3.1.3ErrorControl191
3.l.4FlowControl192
yiCON~TS
3.2ERRORDETECTIONANDCORRECTION192
3.2.1Eder-CorrechngCodes193
3.2.2Error-DetechngCodes196
33ELEMENTARYDATALINKPROTOCOLS200
3.31AnUnrestrlctedSimplexProtoco]204
3.3.2ASimplexStop-and-WaitProtocol206
3.33AS]mplexProtocolf',raNoisyChannel208
3.4SLIDJNGWINDOWPROTOCOLS2]1
3.4.]AOneBitSlidingWindowprotocol214
3.4.2ApootocoIUSingcoBackN216
3.4.3AWOtocoIUSingSelectiveffepeat223
3.5PROTOCOLVERIFICATION229
351FiniteStateMachineMOdelS229
35.2PetrlNetModels232
36EXAMPLEDATALINKPROTOCOLS234
3.6.1HDLC--nIghLCVC]DataLinkCOIItroI234
362TheDataLinkLayerintheinternet237
3.7SUMM~242
4THEMEDIUMACCESSCONTROLSUBLAYER247
4.ITHECHANNELALLOCATIONPROBLEM248
4.1.lStaucChannelA]]ocationinLANdandMANs248
41.2DynamICChannelAllOCationinLANSandMANSig
42MULTIPLEACCESSPROTOCOLS251
4.21ALOHA251
4.2.2CarrierSenseMultipleAccessProtocols255
4.2.3C('IIISIOIIrreervotocoIS259
4,24L]mited-ContentionProtocols26]
4.2.5WavelengthDivisionMultipleAccessPTotocols265
4.2.6WlrclcssLANProtocols267
CONTrmTSvii
43ETHERNET271
4.3.1EthernetCablillg271
4.3.2ManchesterEIICOding274
4.3.3TheEthernetMACSublayerProtocol275
4.3.4TheBindsExponentialBackofl'Algorithm278
4.3.5EthernetPerformance279
4.3.6SwitchedEthernet281
4.3.7FastEthernet283
4.3.8GigabitEthernet286
439JEEE8022LogicalLinkConlrol290
4310RetrospectiveonWhernet291
4.4WIRELESSLANS292
441The802.11ProtocolStack292
4.4.2The802.IIimysicaILayer293
443The802.11BACSI]bIaserAntocoI295
4.4.4The802.11I'lameStructule299
4.4.5Ser,IICes3]
4.5BROADBANDWIRELESS302
4.5.1Comparisonof802]1with802.16303
4,5,2The802.16PlotocolStack305
4.5.3The80216Physica]I-ayer306
4.5.4The802.16MACSubIaycrProt'>coI307
4.5.5The802.16FI+amcStructult309
4.6BLUETOOTH310
461BIuetoothArchitecture311
46.2BIuetoothAppIicahons312
4.6.3TheBluetoothProtoco]Stack313
4.6.4TheBIuctoothRadioLayeT315
4.6.5TheBluetoothBasebandLaver315
4.66TheBIIIetonthLZCAPLayer316
4.67TheBllletol)thFralncStruclure316
4.7DATALINKLAYERSWiTCHING318
4.7.1Bridgesfrom802.xto802.y320
4.77Local1llterlletworking322
4.7.3SpanIIingTreebridged324
4.7.4RemoteBridges325
4.7.5Repeateds.Hubs.Bridges.Switches.Routeds.andGatcwnys326
4.7.6VirtualLANS329
4.8SUMMARY337
vinCOMENTS
5THENETWORKLAYER343
5.INETWORKLAYERDESIGNISSUES343
5.l.lStoreanduForwardPacketSwitching344
51.2ServicesProvidedtotheTransportLayer3M
>.l.3implementationofConnechonlessService345
514linplementalonofConnechon-OnentedService347
sl.5CI)mparisonofVirtualCircuitandDatagramSubnets348
5.2ROUT[NGALGORITHMS350
5.2.1TheOptimalityPrinciple352
522ShortestPathRouting353
5.23FlOOding355
524DistanceVectorRouting357
525LinkStateROuting360
5.26HierarehlcalRouting366
527BTOadcastROuhng368
5.28MuIticastROuting370
5.2.9ROutingforMObiICHOSts372
5.2.10ffeuhnginAdHOCNetworks373
5.2.11NodeLockupinPeertoPeerNetwoTks380
5.3CONGESTIONCONTROLALGORITHMS384
5.3.]GeneralPrinciplesofCongestionControl386
5.3.2CongestionPreventionPolicies388
5.3.3CongeshonControlinVirtoaLCircuitSubnets389
5.3.4COngeshonCOntrolinDatagramSubnets391
5.3.5LOadShedding394
5.3.6JltterControl395
5,4QUALITYOFSERVICE397
54,lRequirements397
5.4.2TechniquesforAchievingGoodQualityofSerylce398
5.4.3IntegratedSemces409
5.4.4DiffeTentiatedServices412
5.4.5LabelSwitchingandMPLS415
5.5INTERNETWORKING418
5.5.1HowNetworksDiffer419
55.2HowNetworksCanBeConnected420
55.3COncatenatedVirtualCircuIts422
5.5.4Connectionlessinternetworking423
CONTENTSix
5.5.5Tunneling425
5.5.6IntrmctworkRouting426
5.5.7Frapmentation427
5.6THENETWORKLAYERINTHEIN'TERNET431
5.6.1ThelPProtocol433
5.6.2lpAddresses436
5.6.3InternetControlProtocols449
56.4OSPF--TheinteriorGatewayR(lutingProtocol454
5.6.5BGP--TheExtenorGatewayRouDngpooioco]459
5.6.6InternetMulticasting46]
5.6.7MObilem462
56,8Ipv6464
5.7SUMMARY473
6THETRANSPORTLAYER481
6.]THETRANSPORTSERVICE48]
6,IIServicesProvidedtotheUPVerLasers48]
6.].2TransP')rtScrylccPnmiiivcs483
6.I.3BerneIeySOCkets487
6,14AnExampleofSocketProgTalnming.AninternetFileServer488
6.2ELEMENTSOFTRANSPORTPROTOCOLS492
6.2.]Addressing493
6.2.2ConnectionEstflblishment496
6.2,3COnnectionRelease502
6.2.4FlowConlTo]andBuffenng506
6.2.5MuIhpIexing510
6.2.6CrashRecoverysll
63ASIMPLET~SPORTPROTOCOL513
63.ITheExampleSerylcePnmltives513
63.2TheExampleTransportEmit}'515
63.3TheExampleasaF]niteStateMachine522
6.4THEINTERNETTRANSPORTPROTOCOLSiUDP524
641IntroductiontoUDP525
6.4.2RcrnotcWoccdureCall526
6.4.3TheReal-TImeTransportriotocoI529
6.5TEE]NTERNETTRANSPORTPROTOCOLSiTCI3532
6.5.1IntroductiontoTCP532
6.5.7TheTCPServiceMOdel533
6.5.3TheTCPPn)tocol535
6.5.4TileTCPSegmentTJeader536
6.5.5TCPConnectionEstablishment539
6.5.6TCPCOnncciinIIRelease541
6,5.7MOdelingTIPCOnnectIOnManasenIeIIt541
6.5.8TCP"I'ransnussionPOlicy543
6.5.9TCPCOngestionCOntrol547
6.5.]0TCPTimerManagemellt550
6.5.IIWZreIessTCPBIndUDP553
6,512TransactiDnaITCP555
6.6PERFOanANCEISSUES557
6.6.]PerformanceProblemsillCompulerNetworks557
6.6.2NetworkPerf<lrlnanceMeasuremenl560
6.6.3SystemDesignforBetterPeritwmancc562
6.6.4FastTPDUProcessing566
6.6.5protocolslITG]gabltNetworks569
67SUMMARY573
7THEAPPLICATIONLAYER579
7.]DNSTabDOMAINNAMESYSTEM579
7.IITheDNSN3meSpaceSKO
7]2ResourceRecords582
7.]3NancyServers586
v.zELECTRONICMAn.588
721AichitectureandServices590
7.2.2TheUSerAgent591
72.3MessageFormats594
7.2.4MessaseTransfer602
7.2.5FInalDCIivcry605
73THEWORLDWIDEWEB611
73.1AichiteclllralOverview612
732StaticWebDocuments629
CONTENTSXi
7.3.3DynamicWebDocuments643
7,34HTTP--ahaHyperxextpansiervrotoco]651
7.3.5PerformanceEnhancements656
7.3.6TheWirelessWeb662
7.4MULTIMEDIA674
7.4.1IntroductiontoDigitalAudio674
7.4.2AudioCompressloll676
7.4.3StreamillgAudio679
7.4.4InterlletRadio683
7.4.5VOICCoverlP685
7.4.6IniroduchontoVIdeo692
7.4.7VideoCOnInxession696
74,8VjdCoonDcmalld704
749TheEBony--TheMulhcastBackbone711
7.5SUMMARY714
8NETWORKSECURITY721
S.ICRYPTOGR-APHY724
8.1.IIntroductiontoCryptography725
8.I.2SubstitutionCiphers727
8.I.3TrallspositionCiphers729
8.1.4OneninePads730
8.1.5TwoFundamentalCryptographicPrinciples733
8.2SYMMETRIC~KEYALGORITHMS737
8.2.IDES--TheDataEncrypti(}nStandard738
8.22AES--sheAdvancedEncr>ptionStandals741
8.23CIPheTModes745
8.2.4otherCiphers750
8.2.5CryptanaIysis750
8.3PUBLIC-KEYALGORITHMS752
8.3.1RSA753
8.3.2OtherPublic-KeyA]gorltbms755
XllCONTENTs
8.4DIGITALSIGNAT'URES755
8.4.1SymmetricKeySignatores756
8.4.2PublicKeySignatures757
8.4.3MessazcDigests759
8.4.4TheBirthdayAttack763
85MANAGEMENTOFPUBLICKEYS765
8.5.1Certificates765
8.5.2X.509767
8.5.3PublicKeyinfrastructures768
86COMMUNICATIONSECURITY772
8.6.]IPSec772
862Firewalls776
863VirtualPrivateNetworks779
8.6.4WirelessSecurity780
8.7AUTHENTJCATIONPROTOCOLS785
8.7.1AuthenticationBasedonaSharedSecretKey786
8.7.2EStablishingaSharedKey.TheDit.ticHell~ASyEXChange791
8.73AuthenticationUsingaKeyDistributionCenteT793
8.7.4AuthenticanonUsingKerberos796
87.>AuthenticahonUsingPubhc-KeyCryptography798
88E-MAILSECURITY799
8.8.]PG~rettyGOOdfuvacy799
8.8.2PEM--ruvacyEnhancedMail803
8.8.3S/MIME804
8.9WEBSECURITY805
8.9.1Threats85
8.9.2SecllreNanung806
8.9.3SSMTheSecureSocketsLayer813
8.94MObileCOdeSecunts8]6
8.10SOCIALISSLTS819
8.10.1Pnvacy819
810.2FreedomofSpeech922
8.10.3Copynght826
sIISUMMARY828
CONT~Sxiii
9READINGLISTANDBIBLIOGRAPHY835
9]SUGGESTIONSFORFURTHERREADING835
9.1.IIntroductionandGenera]Works836
9.l.2ThePhysicalLayal838
9.1.3TheDatainkLaver840
9.1.4TheMediumAccessControlSublayer540
9.1.5TheNetworkLaser542
9.1.6TheTransportLayer844
9.]7TheAppIicahonLaverSa
9.1.8NetworkSecurity846
9.2ALPHABETICALBIBLIOGRAPHY848
INDEX869
· · · · · · (收起)

讀後感

評分

Preface 1980 academic curiosity 1088 used by universities and large businesses 1996 Internet become a daily reality for millions 2002 rapid growth of wireless networking, mobile computers 2009 CDN, mobile phones 802.12, 802.16, RFID, CDN, P2P, Chp1 802.1...  

評分

还是英文的好,中文的错误贼多,看到怀疑人生。 啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊 啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊 啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊 啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊啊...  

評分

经济学十大原理 1 人们面临权衡取舍 2 某种东西的成本是为了得到它而放弃的东西 3 理性人考虑边际量 4 人们会对激励作出反应 5 贸易能使每个人状况更好 6 市场通常是组织经济活动的一种好方法 7 政府有时可以改善市场结果 8 一国的生活水平取决于它生产物品与劳务的能力 9 当政...  

評分

大学时的教材里最喜欢的书,没有之一。很少有技术书能让人读的时候像读小说一样不觉得累,同时内容精彩没有啰嗦和废话。大三上这门课时读过一遍,毕业将近5年后又重读了一遍,毕业后积累的很多知识发现书中都有提及到,并且虽然原著作者的写作时间比较早,但书中的内容在互联网...  

評分

读起来非常爽,跟小说一样吸引人,作者的用词很地道恰当,生词量不多,介绍了很多网络设计的思想,告诉我们为什么这么做。 内容很专业,很详实,推荐想学网络的同学以这本作为入门再恰当不过了。 我做LTE空口PDCP协议的,这两天要抓一下FTP下载慢的问题。于是决定看看TCP协议...  

用戶評價

评分

评分

评分

评分

评分

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有