书籍详情
网络互连:网桥·路由器·交换机和互连协议 英文版
作者:(美)Radia Perlman著
出版社:机械工业出版社
出版时间:2002-01-01
ISBN:9787111095064
定价:¥36.00
购买这本书可以去
内容简介
暂缺《网络互连:网桥·路由器·交换机和互连协议 英文版》简介
作者简介
暂缺《网络互连:网桥·路由器·交换机和互连协议 英文版》作者简介
目录
Chapter 1 Essential Networking Concepts
l . l Layers
l . 2 Service Models
l . 3 Important Properties of a Network
l . 4 Reliable Data Transfer Protocols
Chapter 2 Data Link Layer Issues
2. I Generic LANs
2. 2 IEEE 802 LANs
2. 3 Names, Addresses. Routes
2. 4 LAN Addresses
2. 5 Multicast versus Unicast Addresses
2. 6 The Broadcast Address
2. 7 Multiplexing Field
2. 8 Bit Order
2. 9 Logical Link Control
2. IO Issues in 802.3
2. ll Issues in 802.5
2. 12 Packet Bursts
2. l3 Reasons for Bridges
2. I4 Point-to-Point Links
Chapter 3 Traneparent Bridges
3. I The No-Frills Bridge
3. 2 The Learning Bridge
3. 3 Spanning Tree Algorithm
3. 4 Spanning Tree Algorithm Refinements
3.5 Bridge Message Formats
3.6 Other Bridge Issues
3.7 Remote Bridges
Chapter 4 Source Routing Bridges
4.l Pure Source Routing
4.2 SR-TB Bridges
4.3 SRT Bridges
4.4 End-system Algorithms
4.5 Source Routing versus Transparent Bridging
4.6 Ideas for Improving Source Route Bridging
Chapter 5 Hubs, Switches, Virtual LANs, and Fast Ethernet
5.l Hubs
5.2 Faster LANs
5.3 Virtual LANs (VLANs)
Chapter 6 Network Interface: Service Models
6.l What Is the Network Layer?
6.2 Network Service Types
Chapter 7 Connection-oriented Nets: X.25 and ATM
7.l Generic Connection-oriented Network
7.2 X.25: Reliable Connection-oriented Service
7.3 Implementing X.25 Inside the Net
7.4 Asynchronous Transfer Mode
Chapter 8 Generic Connectionless Service
8.I Data Transfer
8.2 Addresses
8.3 Hop Count
8.4 Service Class Information
8.5 Network Feedback
8.6 Fragmentation and Reassembly
8.7 Maximum Packet Size Discovery
Chapter 9 Network Layer Addresses
9.I Hierarchical Addresses with Fixed Boundaries
9.2 Hierarchical Addresses with Flexible Boundaries
9.3 Owning versus Renting Addresses
9.4 Types of Addresses
9.5 IP
9.6 IPX
9.7 IPX+
9.S IPv6
9.9 CLNP Network Layer Addresses
9. IO AppleTalk Network Layer Addresses
9. ll DECnet Phases III and IV
9. l2 NAT/NAPT
Chapter 10 Connectionless Data Packet Formats
IO.I Pieces of a Connectionless Network Layer
lO.2 Data Packets
IO.3 Sammary of Packet Formats for Easy Reference
IO.4 Technical Issues and Comparisons in Data Packet Formats
I0.5 Source Routing
IO.6 The Great IPX Frame Format Mystery
IO.7 Error Reports and Other Network Feedback to the Endnode
Chapter 11 Neighbor Greeting and Autoconfiguration
lI .l Endnodes Attached via Point-to-Point Links
ll .2 Endnodes Attached via LANs
lI .3 Endnodes Attached via Nonbroadcast Multiaccess Media
ll .4 Finding Things
Chapter 12 Routing Algorithm Coneepts
l2.I Distance Vector Routing
12.2 Link State Routing
12.3 Comparison of Link State and Distance Vector Roating
12.4 Load Splitting
12.5 Link Costs
I2.6 Migrating Routing Algorithms
12.7 LANs
12.8 Types of Service
12.9 Partition Repair: Level l Subnetwork Partition
Chapter 19 Fast Packet Fowarding
13.l Using an Additional Header
13.2 Address Prefix Matching
13.3 Longest Prefix Match with Trie
I3.4 Binary Search
Chapter 14 Specific Routing Protocols
14.l A Brief History of Intradomain Routing Protocols
14.2 RIP
14.3 RTMP, IPX-RIP, and DECnet
14.4 IS-IS, OSPF, NLSP, and PNNI
14.5 Interdomain Routing Protocols
Chapter 15 WAN Multicast
15.l Introduction
15.2 Multicast in IP
Chapter 16 Sabotage-proof Routing
16.l The Problem
16.2 AII You Need to Know about Cryptography
l6.3 Overview of the Approach
16.4 Detailed Description of the Approach
l6.5 Summary
16.6 For Further Reading
Chapter 17 To Route, Bridge, or Switch: Is That the Question?
I7.l Switches
l7.2 Bridges versus Routers
l7.3 Extensions to Bridges
17.4 Extensions to Routers
Chapter 18 Protocol Design Folklore
18.l Simplicity versus nexibility versus Optimality
l8.2 Knowing the Problem You're Trying to Solve
l8.3 Overhead and Scaling
l8.4 Operation Above Capacity
l8.5 Compact IDs versus Object Identifiers
18.6 Optimizing for the Most Common or Important Case
I8. 7 Forward Compatibility
l8.8 Migration: Roating Algorithms and Addressing
l8.9 Parameters
18.IO Making Multiprotocol Operation Possible
18.ll Ronning over Layer 3 versus Layer 2
18.12 Robustness
18.13 Determinism versus Stability
18.14 Performance for Correctness
18.15 In Closing
Glossary
Index
l . l Layers
l . 2 Service Models
l . 3 Important Properties of a Network
l . 4 Reliable Data Transfer Protocols
Chapter 2 Data Link Layer Issues
2. I Generic LANs
2. 2 IEEE 802 LANs
2. 3 Names, Addresses. Routes
2. 4 LAN Addresses
2. 5 Multicast versus Unicast Addresses
2. 6 The Broadcast Address
2. 7 Multiplexing Field
2. 8 Bit Order
2. 9 Logical Link Control
2. IO Issues in 802.3
2. ll Issues in 802.5
2. 12 Packet Bursts
2. l3 Reasons for Bridges
2. I4 Point-to-Point Links
Chapter 3 Traneparent Bridges
3. I The No-Frills Bridge
3. 2 The Learning Bridge
3. 3 Spanning Tree Algorithm
3. 4 Spanning Tree Algorithm Refinements
3.5 Bridge Message Formats
3.6 Other Bridge Issues
3.7 Remote Bridges
Chapter 4 Source Routing Bridges
4.l Pure Source Routing
4.2 SR-TB Bridges
4.3 SRT Bridges
4.4 End-system Algorithms
4.5 Source Routing versus Transparent Bridging
4.6 Ideas for Improving Source Route Bridging
Chapter 5 Hubs, Switches, Virtual LANs, and Fast Ethernet
5.l Hubs
5.2 Faster LANs
5.3 Virtual LANs (VLANs)
Chapter 6 Network Interface: Service Models
6.l What Is the Network Layer?
6.2 Network Service Types
Chapter 7 Connection-oriented Nets: X.25 and ATM
7.l Generic Connection-oriented Network
7.2 X.25: Reliable Connection-oriented Service
7.3 Implementing X.25 Inside the Net
7.4 Asynchronous Transfer Mode
Chapter 8 Generic Connectionless Service
8.I Data Transfer
8.2 Addresses
8.3 Hop Count
8.4 Service Class Information
8.5 Network Feedback
8.6 Fragmentation and Reassembly
8.7 Maximum Packet Size Discovery
Chapter 9 Network Layer Addresses
9.I Hierarchical Addresses with Fixed Boundaries
9.2 Hierarchical Addresses with Flexible Boundaries
9.3 Owning versus Renting Addresses
9.4 Types of Addresses
9.5 IP
9.6 IPX
9.7 IPX+
9.S IPv6
9.9 CLNP Network Layer Addresses
9. IO AppleTalk Network Layer Addresses
9. ll DECnet Phases III and IV
9. l2 NAT/NAPT
Chapter 10 Connectionless Data Packet Formats
IO.I Pieces of a Connectionless Network Layer
lO.2 Data Packets
IO.3 Sammary of Packet Formats for Easy Reference
IO.4 Technical Issues and Comparisons in Data Packet Formats
I0.5 Source Routing
IO.6 The Great IPX Frame Format Mystery
IO.7 Error Reports and Other Network Feedback to the Endnode
Chapter 11 Neighbor Greeting and Autoconfiguration
lI .l Endnodes Attached via Point-to-Point Links
ll .2 Endnodes Attached via LANs
lI .3 Endnodes Attached via Nonbroadcast Multiaccess Media
ll .4 Finding Things
Chapter 12 Routing Algorithm Coneepts
l2.I Distance Vector Routing
12.2 Link State Routing
12.3 Comparison of Link State and Distance Vector Roating
12.4 Load Splitting
12.5 Link Costs
I2.6 Migrating Routing Algorithms
12.7 LANs
12.8 Types of Service
12.9 Partition Repair: Level l Subnetwork Partition
Chapter 19 Fast Packet Fowarding
13.l Using an Additional Header
13.2 Address Prefix Matching
13.3 Longest Prefix Match with Trie
I3.4 Binary Search
Chapter 14 Specific Routing Protocols
14.l A Brief History of Intradomain Routing Protocols
14.2 RIP
14.3 RTMP, IPX-RIP, and DECnet
14.4 IS-IS, OSPF, NLSP, and PNNI
14.5 Interdomain Routing Protocols
Chapter 15 WAN Multicast
15.l Introduction
15.2 Multicast in IP
Chapter 16 Sabotage-proof Routing
16.l The Problem
16.2 AII You Need to Know about Cryptography
l6.3 Overview of the Approach
16.4 Detailed Description of the Approach
l6.5 Summary
16.6 For Further Reading
Chapter 17 To Route, Bridge, or Switch: Is That the Question?
I7.l Switches
l7.2 Bridges versus Routers
l7.3 Extensions to Bridges
17.4 Extensions to Routers
Chapter 18 Protocol Design Folklore
18.l Simplicity versus nexibility versus Optimality
l8.2 Knowing the Problem You're Trying to Solve
l8.3 Overhead and Scaling
l8.4 Operation Above Capacity
l8.5 Compact IDs versus Object Identifiers
18.6 Optimizing for the Most Common or Important Case
I8. 7 Forward Compatibility
l8.8 Migration: Roating Algorithms and Addressing
l8.9 Parameters
18.IO Making Multiprotocol Operation Possible
18.ll Ronning over Layer 3 versus Layer 2
18.12 Robustness
18.13 Determinism versus Stability
18.14 Performance for Correctness
18.15 In Closing
Glossary
Index
猜您喜欢