TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版)

分類: 图书,计算机/网络,网络与数据通信,网络协议,
作者: [美]库默 著
出 版 社: 人民邮电出版社
出版时间: 2002-1-1字数: 1080000版次: 1页数: 750印刷时间: 2002-1-1开本:印次:纸张: 胶版纸I S B N : 9787115099204包装: 平装编辑推荐
.
内容简介
本书说详尽地讲解了网络互连的原理、网络体系结构、TCP/IP协议族以及近年来互联网发展的最新技术。本书包括了TCP/IP、网络互连各个组成部分的设计及其工作,以基工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP网络互连的经典图书,可读性极强,是任何一个想要了解网络互连技术的人所必不可少的参考书。
本书适合为高等院样计算机专业网络相关课程的教材,也适合各类网络技术开发人员阅读。
作者简介
目录
Chapter 1Introduction And Overview1
1.1The Motivation For Internetworking1
1.2The TCP/IP Internet2
1.3Internet Services3
1.4History And Scope Of The Internet6
1.5The Internet Architecture Board8
1.6The IAB Reorganization9
1.7The Internet Society11
1.8Internet Request For Comments11
1.9Internet Protocols And Standardization12
1.10Future Growth And Technology12
1.11Organization Of The Text13
1.12Summary14
Chapter2Review Of Underlying Network Technologies17
2.1Introduction17
2.2Two Approaches To Network Communication18
2.3Wide Area And Local Area Networks19
2.4Ethernet Technology20
2.5Fiber Distributed Data Interconnect(FDDI)33
2.6Asynchronous Transfer Mode37
2.7WAN Technologies:ARPANET38
2.8National Science Foundation Networking40
2.9ANSNET44
2.10A Very High Speed Backbone(vBNS)45
2.11Other Technologies Over Which TCP/IP Has Been Used46
2.12Summary And Conclusion50
Chapter 3Internetworking Concept And Architectural Model53
3.1Introduction53
3.2Application-Level Interconnection53
3.3Network-Level Interconnection54
3.4Properties Of The Internet55
3.5Internet Architecture56
3.6Interconnection Through IP Routers56
3.7The User's View58
3.9The Unanswered Questions59
3.10Summary60
Chapter 4Classful Internet Addresses63
4.1Introduction63
4.2Universal Identifiers63
4.3The Original Classful Addressing Scheme64
4.4Addresses Specify Network Connections65
4.5Network And Directed Broadcast Addresses65
4.6Limited Broadcast66
4.7Interpreting Zero To Mean “This”67
4.8Subnet And Supernet Extensions67
4.9IP Multicast Addresses68
4.10Weaknesses In Internet Addressing68
4.11Dotted Decimal Notation69
4.12Loopback Address70
4.13Summary Of Special Address Conventions70
4.14Internet Addressing Authority71
4.15Reserved Address Prefixes72
4.16An Example72
4.17Network Bye Order74
4.18Summary75
Chapter 5Mapping Internet Addresses To Physical Addresses(ARP)77
5.1Introduction77
5.2The Address Resolution Problem77
5.3Two Types Of Physical Addresses78
5.4Resolution Through Direct Mapping78
5.5The Address Resolution Cache80
5.6The Address Resolution Cache80
5.7ARP Cache Timeout81
5.8ARP Refinements82
5.9Relationship Of ARP To Other Protocols82
5.10ARP Encapsulation And Identification84
5.12ARP Protocol Format84
5.13 Summary86
Chapter 6Determining An Internet Address At Startup(RARP)89
6.1Introduction89
6.2Reverse Address Resolution Protocol(RARP)90
6.3Timing RARP Transactions92
6.4Primary And Backup RARP Servers92
6.5Summary93
Chapter 7Internet Protocol:Connectionless Datagram Delivery95
7.1Introduction95
7.2A Virtual Network95
7.3Internet Architecture And Philosophy96
7.4The Conceptual Service Organization96
7.5Connectionless Delivery System97
7.6Purpose Of The Internet Protocol97
7.7The Internet Datagram97
7.8Internet Datagram Options107
7.9Summary113
Chapter 8Internet Protocol:Routing IP Datagrams115
8.1Introduction115
8.2Routing In An Internet115
8.3Direct And Indirect Delivery117
8.4Table-Driven IP Routing119
8.5Next-Hop Routing119
8.6Default Routes121
8.7Host-Specific Routes121
8.8The IP Routing Algorithm121
8.9Routing With IP Addresses122
8.10Handling Incoming Datagrams124
8.11Establishing Routing Tables125
8.12Summary125
Chapter 9Internet Protocol:Error And Control Messages(ICMP)129
9.1Introduction129
9.2The Internet Control Message Protocol129
9.3Error Reporting vs. Error Correction130
9.4ICMP Message Delivery131
9.5ICMP Message Format132
9.6Testing Destination Reachability And Status(Ping)133
9.7Echo Request And Reply Message Format134
9.8Reports Of Unreachable Destinations134
9.9Congestion And Datagram Flow Control136
9.10Source Quench Format136
9.11Route Change Requests From Routers137
9.12Detecting Circular Or Excessively Long Routes139
9.13Reporting Other Problems140
9.14Clock Synchronization And Transit Time Estimation140
9.15Information Request And Reply Messages142
9.16Obtaining A Subnet Mask142
9.17Router Discovery143
9.18Router Solicitation144
9.19Summary145
Chapter 10Classless And Subnet Address Extensions(CIDR)147
10.1Introduction147
10.2Review Of Relevant Facts147
10.3Minimizing Network Numbers148
10.4Transparent Routers149
10.5Proxy ARP150
10.6Subnet Addressing152
10.7Flexibility In Subnet Address Assignment154
10.8Variable-Length Subnets155
10.9Implementation Of Subnets With Masks156
10.10Subnet Mask Representation157
10.11Routing In The Presence Of Subnets158
10.12The Subnet Routing Algorithm159
10.13A Unified Routing Algorithm160
10.14Maintenance Of Subnet Masks161
10.15Broadcasting To Subnets161
10.16Anonymous Point-To-Point Networks162
10.17Classless Addressing(Supernetting)164
10.18The Effect Of Supernetting On Routing165
10.19CIDR Address Blocks And Bit Masks165
10.20Address Blocks And CIDR Notation166
10.21A Classless Addressing Example167
10.22Data Structures And Algorithms For Classless Lookup167
10.23Longest-Match Routing And Mixtures Of Route Types170
10.24CIDR Blocks Reserved For Private Networks172
10.25Summary173
Chapter 11Protocol Layering177
11.1Introduction177
11.2The Need For Multiple Protocols177
11.3The Conceptual Layers Of Protocol Software178
11.4Functionality Of The Layers181
11.5X.25 And Its Relation To The ISO Model182
11.6Differences Between ISO And Internet Layering185
11.7The Protocol Layering Principle187
11.8Layering In The Presence Of Network Substructure189
11.9Two Important Boundaries In The TCP/IP Model191
11.10The Disadvantage Of Layering192
11.11The Basic Idea Behind Multiplexing And Demultiplexing192
11.12Summary194
Chapter 12User Datagram Protocol(UDP)197
12.1Introduction197
12.2Identifying The Ultimate Destination197
12.3The User Datagram Protocol198
12.4Format Of UDP Messages199
12.5UDP Pseudo-Header200
12.6UDP Encapsulation And Protocol Layering201
12.7Layering And The UDP Checksum Computation203
12.8UDP Multiplexing,Demultiplexing,And Ports203
12.9Reserved And Available UDP Port Numbers204
12.10Summary206
Chapter 13Reliable Stream Transport Service(TCP)209
13.1Introduction209
13.2The Need For Stream Delivery209
13.3Properties Of The Reliable Delivery Service210
13.4Providing Reliability211
13.5The Idea Behind Sliding Windows213
13.6The Transmission Control Protocol215
13.7Ports,Connections,And Endpoints216
13.8Passive And Active Opens218
13.9Segments,Streams,And Sequence Numbers219
13.10Variable Window Size And Flow Control220
13.11TCP Segment Format221
13.12Out Of Band Data222
13.13Maximum Segment Size Option223
13.14TCP Checksum Computation224
13.15Acknowledgements And Retransmission225
13.16Timeout And Retransmission226
13.17Accurate Measurement Of Round Trip Samples228
13.18Karn's Algorithm And Timer Backoff229
13.19Responding To High Variance In Delay230
13.20Response To Congestion232
13.21Congestion,Tail Drop,And TCP234
13.22Random Early Discard(RED)235
13.23Establishing A TCP Connection237
13.24Initial Sequence Numbers239
13.25Closing a TCP Connection239
13.26TCP Connection Reset241
13.27TCP State Machine241
13.28Forcing Data Delivery243
13.29Reserved TCP Port Numbers243
13.30TCP Performance243
13.31Silly Window Syndrome And Small Packets245
13.32Avoiding Silly Window Syndrome246
13.33Summary249
Chapter 14Routing:Cores,Peers,And Algorithms253
14.1Introduction253
14.2The Origin Of Routing Tables254
14.3Routing With Partial Information 255
14.4Original Internet Architecture And Cores256
14.5Core Routers257
14.6Beyond The Core Architecture To Peer Backbones260
14.7Automatic Route Propagation262
14.8Distance Vector (Bellman-Ford)Routing262
14.9Gateway-To-Gateway Protocol(GGP)264
14.10Distance Factoring265
14.11Reliability And Routing Protocols265
14.12Link-State(SPE)Routing266
14.13Summary267
Chapter 15Routing:Exterior Gateway Protocols And Autonomous269
Systems(BGP)
15.1Introduction269
15.2Adding Complexity To The Architectural Model269
15.3Determining A Practical Limit On Group Size270
15.4A Fundamental Idea:Extra Hops271
15.5Hidden Networks273
15.6Autonomous System Concept274
15.7From A Core To Independent Autonomous Systems275
15.8An Exterior Gateway Protocol276
15.9BGP Characteristics277
15.10BGP Functionality And Message Types278
15.11BGP Message Header278
15.12BGP OPEN Message279
15.13BGP UPDATE Message280
15.14Compressed Mask-Address Pairs281
15.15BGP Path Attributes282
15.16BGP KEEPALIVE Message283
15.17Information From The Receiver's Perspective284
15.18The Key Restriction Of Exterior Gateway Protocols285
15.19The Internet Routing Arbiter System287
15.20BGP NOTIFICATION Message288
15.21Decentralization Of Internet Architecture289
15.22Summary290
Chapter 16Routing:In An Autonomous System(RIP,OSPF,HELLO)293
16.1Introduction293
16.2Static Vs. Dynamic Interior Routes293
16.3Routing Information Protocol(RIP)296
16.4The Hello Protocol305
16.5Delay Metrics And Oscillation305
16.6Combining RIP,Hello,And BGP307
16.7Inter-Autonomous System Routing307
16.8Gated:Inter-Autonomous System Communication308
16.9The Open SPF Protocol(OSPF)308
16.10Routing With Partial Information315
16.11Summary315
Chapter 17Internet Multicasting319
17.1Introduction319
17.2Hardware Broadcast319
17.3Hardware Origins Of Multicast320
17.4Ethernet Multicast321
17.5IP Multicast321
17.6The Conceptual Pieces322
17.7IP Multicast Addresses323
17.8Multicast Address Semantics325
17.9Mapping IP Multicast To Ethernet Multicast325
17.10Hosts And Multicast Delivery326
17.11Multicast Scope326
17.12Extending Host Software To Handle Multicasting327
17.13Internet Group Management Protocol328
17.14IGMP Implementation328
17.15Group Membership State Transitions329
17.16IGMP Message Format331
17.17Multicast Forwarding And Routing Information332
17.18Basic Multicast Routing Paradigms334
17.19Consequences Of TRPF335
17.20Multicast Trees337
17.21The Essence Of Multicast Routing338
17.22Reverse Path Multicasting338
17.23Distance Vector Multicast Routing Protocol339
17.24The Mrouted Program340
17.25Alternative Protocols343
17.26Core Based Trees(CBT)343
17.27Protocol Independent Multicast(PIM)344
17.28Multicast Extensions To OSPF(MOSPF)347
17.29Reliable Multicast And ACK Implosions347
17.30Summary349
Chapter 18TCP/IP Over ATM Networks353
18.1Introduction353
18.2ATM Hardware354
18.3Large ATM Networks354
18.4The Logical View Of An ATM Network355
18.5The Two Connection Paradigms356
18.6Paths,Circuits,And Identifiers357
18.7ATM Cell Transport358
18.8ATM Adaptaion Layers358
18.9ATM Adaptation Layer 5360
18.10AAL5 Convergence,Segmentation,And Reassembly361
18.11Datagram Encapsulation And IP MTU Size361
18.12Packet Type And Multiplexing362
18.13IP Address Binding In An ATM Network363
18.14Logical IP Subnet Concept364
18.15Connection Management365
18.16Address Binding Within An LIS366
18.17ATMARP Packet Format366
18.18Using ATMARP packets To Determine An Address369
18.19Obtaining Entries For A Server Database370
18.20Timing Out ATMARP Information In A Server370
18.21Timing Out ATMARP Information In A Host Or Router371
18.22IP Switching Technologies371
18.23Switch Operation372
18.24Optimized IP Forwarding372
18.25Classification,Flows,And Higher Layer Switching373
18.26Applicability Of Switching Technology374
18.27Summary374
Chapter 19Mobile IP377
19.1Introduction377
19.2Mobility,Routing,and Addressing377
19.3Mobile IP Characteristics378
19.4Overview Of Mobile IP Operation378
19.5Mobile Addressing Details379
19.6Foreign Agent Discovery380
19.7Agent Registration381
19.8Registration Message Format381
19.9Communication With A Foreign Agent383
19.10Datagram Transmission And Reception383
19.11The Two-Crossing Problem384
19.12Communication With Computers On the Home Network385
19.13Summary386
Chapter 20Private Network Interconnection(NAT,VPA)389
20.1Introduction389
20.2Private And Hybrid Networks389
20.3A Virtual Private Network(VPN)390
20.4VPN Addressing And Routing392
20.5AVPN With Private Addresses393
20.6Network Address Translation(NAT)394
20.7NAT Translation Table Creation395
20.8Multi-Address NAT396
20.9Port-Mapped NAT396
20.10Interaction Between NAT And ICMP398
20.11Interaction Between NAT And Applications398
20.12Conceptual Address Domains399
20.13Slirp And Masquerade399
20.14Summary400
Chapter 21Client-Server Model Of Interaction403
21.1Introduction403
21.2The Client-Server Model403
21.3A Simple Example:UDP Echo Server404
21.4Time And Date Service406
21.5The Complexity of Servers407
21.6RARP Server408
21.7Alternatives To The Client-Server Model409
21.8Summary410
Chapter 22The Socket Interface413
22.1Introduction413
22.2The UNIX I/O Paradigm And Network I/O414
22.3Adding Network I/O to UNIX414
22.4The Socket Abstraction415
22.5Creating A Socket415
22.6Socket Inheritance And Termination416
22.7Specifying A Local Address417
22.8Connecting Sockets To Destination Addresses418
22.9Sending Data Through A Socket421
22.10Receiving Data Through A Socket Addresses422
22.11Obtaining Local And Remote Socket Addresses422
22.12Obtaining And Setting Socket Options423
22.13Specifying A Queue Length For A Server424
22.14How A Server AcceptsConnections424
22.15Servers That Handle Multiple Services425
22.16Obtaining And Setting Host Names426
22.17Obtaining And Setting The Internal Host Domain427
22.18Socket Library Calls427
22.19Network Byte Order Conversion Routines428
22.20IP Address Manipulation Routines428
22.21Accessing The Domain Name System431
22.22Obtaining Information About Hosts432
22.23Obtaining Information About Networks433
22.24Obtaining Information About Protocols434
22.25Obtaining Information About Network Services434
22.26An Example Client435
22.27An Example Server437
22.28Summary440
Chapter 23Bootstrap And Autoconfiguration(NOOTP,DHCP)443
23.1Introduction443
23.2The Need An Alternative To RARP444
23.3Using IP To Determine An IP Address444
23.4The BOOTP Retransmission Policy445
23.5The BOOTP Message Format446
23.6The Two-Step Bootstrap Procedure447
23.7Vendor-Specific Field448
23.8The Need For Dynamic Configuration448
23.9Dynamic Host Configuration450
23.10Dynamic IP Address Assignment450
23.11Obtaining Multiple Addresses451
23.12Address Acquisition States452
23.14Lease Renewal States454
23.15DHCP Message Format455
23.16DHCP Options And Message Type456
23.17Option Overload457
23.18DHCP And Domain Names457
23.19Summary458
Chapter 24The Domain Name System(DNS)461
24.1Introduction461
24.2Names For Machines462
24.4Hierarchical Names463
24.5Delegation Of Authority For Names464
24.6Subset Authority464
24.7Internet Domain Names465
24.8Official And Unofficial Internet Domain Names466
24.9Named Items And Syntax Of Names468
24.10Mapping Domain Names To Addresses469
24.11Domain Name Resolution471
24.12Efficient Translation472
24.13Caching:The Key To Efficiency473
24.14Domain Server Message Format474
24.15Compressed Name Format477
24.16Abbreviation Of Domain Names477
24.17Inverse Mappings478
24.18Pointer Queries479
24.19Object Types And Resource Record Contents479
24.20Obtaining Authority For A Subdomain480
24.21Summary481
Chapter 25Applications:Remote Login(TELNET,Rlogin)485
25.1Introduction485
25.2Remote Interactive Computing485
25.3TELNET Protocol486
25.4Accommodating Heterogeneity488
25.5Passing Commands That Control The Remote Side490
25.6Forcing The Server To Read A Control Function492
25.7TELNET Options492
25.8TELNET Option Negotiation493
25.9Rlogin(BSD UNIX)494
25.10 Summary495
Chapter 26Applications:File Transfer And Access(FTP,TFTP,NFS)497
26.1Introduction497
26.2File Access And Transfer497
26.3On-line Shared Access498
26.4Sharing By File Transfer499
26.5FTP:The Major TCP/IP File Transfer Protocol499
26.6FTP Features500
26.7FTP Process Model500
26.8TCP Port Number Assignment502
26.9The User's View Of FTP502
26.10An Example Anonymous FTP Session504
26.11TFTP505
26.12NFS507
26.13NFS Implementation507
26.14Remote Procedure Call(RPC)508
26.15Summary509
Chapter 27Applications:Electronic Mail(SMTP,POP,IMAP,MIME)511
27.1Introduction511
27.2Electronic Mail511
27.3Mailbox Names And Aliases513
27.4Alias Expansion And Mail Forwarding513
27.5The Relationship Of Internetworking And Mail514
27.6TCP?IP Standards For Electronic Mail Service516
27.7Electronic Mail Addresses516
27.8Pseudo Domain Addresses518
27.9Simple Mail Transfer Protocol(SMTP)518
27.10Mail Retrieval And Mailbox Manipulation Protocols521
27.11The MIME Extension for Non-ASCII Data522
27.12MIME Multipart Messages523
27.13Summary524
Chapter 28Applications :World Wide Web(HTTP)527
28.1Introduction527
28.2Importance Of The Web527
28.3Architectural Components528
28.4Uniform Resource Locators528
28.5An Example Document529
28.6Hypertext Transfer Protocol530
28.7HTTP GET Request530
28.8Error Messages531
28.9Persistent Connections And Lengths532
28.10Data Length And Program Output532
28.11Length Encoding And Headers533
28.12Negotiation534
28.13Conditional Requests535
28.14Support For Proxy Servers535
28.15Caching 536
28.16Summary537
Chapter 29Applications :Voice And Video Over IP(RTP)539
29.1Introduction539
29.2Audio Clips And Encoding Standards539
29.3Audio And Video Transmission And Reproduction540
29.4Jitter And Playback Delay541
29.5Real-Time Transport Protocol(RTP)542
29.6Streams,Mixing,And Multicasting543
29.7RTP Encapsulation544
29.8RTP Control Protocol(RTCP)544
29.9RTCP Operation545
29.10IP Telephony And Signaling546
29.11Resource Reservation And Quality Of Service548
29.12QoS,Utilization,And Capacity549
29.13RSVP549
29.14COPS550
29.15Summary551
Chapter 30Applications :Internet Management(SNMP)553
30.1Introduction553
30.2The Level Of Management Protocols553
30.3Architectural Model554
30.4Protocol Framework556
30.5Examples of MIB Variables557
30.6The Structure Of Management Information558
30.7Formal Definitions Using ASN.1559
30.8Structure And Representation Of MIB Object Names559
30.9Simple Network Management Protocol564
30.10SNMP Message Format566
30.11Example Encoded SNMP Message569
30.12New Features In SNMPv3572
30.13Summary572
Chapter 31Summary Of Protocol Dependencies575
31.1Introduction 575
31.2Protocol Dependencies575
31.3The Hourglass Model577
31.4Application Program Access578
31.5Summary579
Chapter 32Internet Security And Firewall Design(Ipsec)581
32.1Introduction581
32.2Protecting Resources582
32.3Information Policy583
32.4Internet Security583
32.5IP Security(IPsec)584
32.6IPsec Authentication Header584
32.7Security Association585
32.8IPsec Encapsulating Security Payload586
32.9Authentication And Mutable Header Fields587
32.10IPsec Tunneling588
32.11Required Security Algorithms588
32.12Secure Sockets589
32.13Firewalls And Internet Access589
32.14Multiple Connections And Weakest Links589
32.15Firewall Implementation590
32.16Packet-Level Filters590
32.17Security And Packet Filter Specification591
32.18The Consequence Of Restricted Access For Clients592
32.19Proxy Access Through A Firewall592
32.20The Details Of Firewall Architecture593
32.21Stub Network594
32.22An Alternative Firewall Implementation595
32.23Monitoring And Logging596
32.24Summary596
Chapter 33The Future Of TCP/IP(Ipv6)599
33.1Introduction599
33.2Why Change?600
33.3New Policies600
33.4Motivation For Changing Ipv4600
33.5The Road To A New Version Of IP601
33.6The Name Of The Next IP602
33.7Features Of Ipv6602
33.8General Form Of An Ipv6 Datagram603
33.9Ipv6Base Header Format603
33.10Ipv6 Extension Headers605
33.11Parsing An Ipv6 Datagram606
33.12Ipv6Fragmentation And Reassembly607
33.13The Consequence Of End-To-End Fragmentation607
33.14Ipv6 Source Routing608
33.15Ipv6 Options609
33.16Size Of The Ipv6 Address Space610
33.17Ipv6 Colon Hexadecimal Notation610
33.18Three Basic IPv6 Address Types612
33.19The Duality Of Broadcast And Multicast612
33.20An Engineering Choice And Simulated Broadcast613
33.21Proposed Ipv6 Address Space Assignment613
33.22Embedded Ipv4 Addresses And Transition614
33.23Unspecified And Loopback Addresses616
33.24Unicast Address Hierarchy616
33.25Aggregatable Global Unicast Address Structure617
33.26Interface Identifiers618
33.27Additional Hierarchy619
33.28Local Addresses619
33.29Autoconfiguration And Renumbering620
33.30Summary620
Appendix 1A Guide To RFCs523
Appendix 2Glossary Of Internetworking Terms And Abbreviations673
Bibliography721
Index729
媒体评论