书籍详情
TCP/IP网络互连技术(卷Ⅰ 原理 协议和体系结构 英文版·第3版)
作者:(美)D.E.科默Douglas E.Comer著
出版社:清华大学出版社
出版时间:1998-01-01
ISBN:9787302029465
定价:¥30.00
购买这本书可以去
内容简介
内容简介本书是D0uglasC0mer教授所著网络互连技术系列的第1卷。作者详尽地讲解了因特网的原理、网络体系结构、TCP/IP协议簇。本书包括了TCP/IP,因特网各个组成部分的设计及其工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP因特网的既经典又可读性极强的书,是任何一个想要了解网络互连技术的人所必不可少的参考书。道格拉斯·科默博士是美国普渡大学计算机科学教授,主讲操作系统和计算机网络方面的课程,已发表了大量研究论文和撰写了许多教科书。他从70年代后期开始从事TCP/IP和网络互连技术的研究,是该领域的国际公认的著名专家,是普渡大学网络互连研究中心主任。
作者简介
作者:DouglasE.ComerDouglasE.Comer博士从20世纪70年代开始从事互联网的研究和开发工作,他曾是互联网体系结构委员会的成员,该委员会是确定互联网发展标准的权威机构;他也曾任美国计算机网CSTNET技术委员会的主席,该网络是美国早期互联网建设中最重要的网络之一。他现在是美国普渡大学计算机科学系的教授,从事计算机网络和操作系统方面的教学和科研工作。Internet技术基础>>更多作品
目录
Foreword
Preface
Chapter 1 Introduction And Overview
1.1 The MOtivation For Internetworking
1.2 The TCP/IP Internet
1.3 Internet Services
1.4 History And Scope Of The Internet
1.5 The Internet Architecture Board
1.6 The IAB Reorganization
1.7 The Internet Society
1.8 Internet Request or Comments
1.9 Internet Protocols And Standadization
1.10 Future Growth And Technology
1.11 Organization Of The Text
1.12 Summary
Chapter 2 ReviewOf Underlying Network Technoiongies
2.1 Introduction
2.2 Two Approaches To Network Communication
2.3 Wide Area And Local Area Network
2.4 Ethernet Technology
2.5 FiberDistibuted Data Interconnect(FDDI)
2.6 Asynchronous Transfer Mode
2.7 Arpanet Technology
2.8 National Sceence Foundation Networking
2.9 ANSNET
2.10 A Planned Wide Area Backbne
2.11 Other Technologies Over Which TCP/IP Has Been Used
2.12 Summary And Conclusion
Chapter 3 Internetworking Concept And Architectural Model
3.1 Introduction
3.2 Application-Level Interconnection
3.3 Network-Level Interconnection
3.4 Prperties Of The Internet
3.5 Inernet Architecturre
3.6 Interconnection Through IPRouters
3.7 The User's View
3.8 All Networks Are Equal
3.9 The Unanswerd Questions
3.10 Summary
Chapter 4 Internet Addresses
4.1 Introduction
4.2 Universal Idetifiers
4.3 Three Primary ClassesOf IP Addresses
4.4 AddressesSpecify Network Connections
4.5 Network And Broadcast Addresses
4.6 Limited Broadcast
4.7 Interpreting Zer To Mean "This "
4.8 Weaknesses In Internet
4.9 Dotted Decimal Notation
4.10 Loopback Address
4.11 Summary Of Special Address Conventions
4.12 Internet Addressing Authority
4.13 An Example
4.14 Network Byte Order
4.15 Summary
Chapter 5 Mapping Internet Addresses To Physical Addresses(ARP)
5.1 Introduction
5.2 The Address Resolution Problem
5.3 Two Types Of Physical Addresses
5.4 Resolution Through Diect Mapping
5.5 Resolution Through Dynaic Binding
5.6 The Address Resolution Cache
5.7 ARP Refinements
5.8 Relationship Of ARP To Other Protocols
5.9 ARP Implmentain
5.10 ARP Encapsulation And Identification
5.11 ARP Protocol Format
5.12 Summary
Chapter 6 Determining An Internet Address At STartup(RARP)
6.1 Introduction
6.2 Reverse Address Resolutioon Protocol
6.3 Timing RARP Transactions
6.4 Primary And Backup RaRP Servers
6.5 Summary
Chapter 7 Internet Protocol:Connectionless Datagram Delivery
7.1 Introduction
7.2 A Virtual Net work
7.3 Internet Architecture And Philosophy
7.4 The Concept Of Unreliable Delivery
7.5 Connectionless Delivery System
7.6 Purpose Of The Internet Protocol
7.7 The Internet Datagram
7.8 Internet Datagram Options
7.9 Summary
Chapter 8 Internet Protocol:Routing IP Datagrams
8.1 Introduction
8.2 Routing In An Internet
8.3 DirectAnd Indirect Delivery
8.4 Table-Driven IP Routing
8.5 Next-Hop Routing
8.6 Default Routes
8.7 Host-Specific Routes
8.8 The IP Routing Algorithm
8.9 Routing With IP Addresses
8.10 Handling Incoming Datagrams
8.11 Establishing Routing tables
8.12 Summary
Chapter 9 Internet Protocol:Error And Control Messages
9.1 Introduction
9.2 The Internet Control Message Protocol
9.3 Error Reporting vs Error Correction
9.4 ICMP Message Delivery
9.5 ICMP Message Format
9.6 Testing Destination Reachability And Staus
9.7 Echo Request AndREply Message Format
9.8 Reports of Unreachable Destinations
9.9 Congestion And Datagram Flow Control
9.10 Source Quench Format
9.11 Route Change Requests From Routers
9.12 Detecting Circular Or Excessively Long Routes
9.13 Reporting Other Problems
9.14 Clock Synchronization And Transit Time Estimation
9.15 Information Request And Reply Messages
9.16 Obtaining A Subnet Msak
9.17 Summary
Chapter 10 Subnet And Spernet Address Extensions
10.1 Introduction
10.2 Review Of Relevant Facts
10.3 Minimizing Network Numbers
10.4 Transparent Routers
10.5 Proxy ARP
10.6 Subnet Addressing
10.7 Flexibility In Subnet Address Assignment
10.8 Implementation Of Subnets With Masks
10.9 Subnet Mask Represntation
10.10 Routing In The Presnce Of Subnets
10.11 The Subnet Routing Alogrithm
10.12 A Unified Routing Algorihm
10.13 Maintenance Of Subnet Masks
10.14 Broadcasting To Subnets
10.15 Supernet Addressing
10.16 The Effect Of Supernetting On Routing
10.17 Summary
Chapter 11 Introduction The Need For Multiple Protocols
11.1 Introduction
11.2 The Need For Multiple Protocols
11.3 The Conceptual Layers Of Protocol Software
11.4 Funcionality Of The Layers
11.5 X.25 And Its Relation To The ISO Model
11.6 DifferencesBetween X.25 And Internet Layering
11.7 The Protocol Layering Principle
11.8 Layering In The Presence Of Network Substructure
11.9 Two Important Boundaries In The TCP/IPModel
11.10 The Disadvantage Of Layering
11.11 The Basic Idea Behind Multip lexing And Demultiplexing
11.12 Summary
Chapter 12 User Datagram Protocol
12.1 Introduction
12.2 Identifying The Ultimate Destination
12.3 The User Datagram Protocol
12.4 Format Of UDP Messages
12.5 UDP Pseudo-Header
12.6 UDP Encapsulation And Protocol Layering
12.7 Layering Andthe UDP Checksum Computation
12.8 UDP Multipexing,Demultiplexing,And Ports
12.9 Reserved And Available UDP Por Numbvers
12.10 Summay
Chapter 13 Reliable Stream Transport Service(TCP)
13.1 Introduction
13.2 Tht Need For Stream Delivery
13.3 Properties Of the Reliable Delivery Service
13.4 Providing Reliability
13.5 The Idea Behind Sliding Windows
13.6 The Transmission Control Protocol
13.7 Ports ,connections,And Endpoints
13.8 Passive And Active Opens
13.9 Segments,Streams,And Sequence Numbers
13.10 Variable Window Size And Flow control
13.11 TCP Segment Format
13.12 Out Of Band Data
13.13 Maximum Segment Size Option
13.14 TCP Checksum Computation
13.15 Acknowledgements And Retransission
13.16 Timeou And Retramsmission
13.17 Accurate Measuremint Of Round Trip Samples
13.18 Karn's Algorithm And Timer Backoff
13.19 Responding To High Variancd In Delay
13.20 Response To Congestion
13.21 Establishing A TCP Connection
13.22 Initial Sequence Numbers
13.23 Closing a TCP Connection
13.24 TCP Connection Reset
13.25 TCP State Machine
13.26 Forcing Data Delivery
13.27 Reserved TCP Port Numbers
13.28 TCP Performance
13.29 Silly Window Syndrome And Small Packets
13.30 Avoiding Silly Window syndrome
13.31 Summary
Chapter 14 Routing:cores,Peers,And Algorithms
14.1 Introduction
14.2 The Origin Of Routing Tables
14.3 Routing With Partial Information
14.4 Original Internet Architecture And Cores
14.5 Core Routers
14.6 Beyond The Core Architecture To Peer Backbones
14.7 Automatic Route Propagation
14.8 Vector Distance(Bellman-Ford)Routng
14.9 Gateway-To-Gateway Protocol(GGP)
14.10 GGP Message Formats
14.11 Link-State(SPF)Routing
14.12 Spf Protocols
14.13 Summary
Chapter 15 Routing:Autonomous Systems(EGP)
15.1 Introduction
15.2 Adding Complexity To The Architectural Model
15.3 A Fundamental Idea:extra Hops
15.4 Autonomous Sys Tem Concept Exterior Gateway Protocol
15.5 Exterior Gatewqy Protocol(EGP)
15.6 EGP Message Header
15.7 EGP Neighor Acquisition Messages
15.8 EGP Neighbor Reachability Messages
15.9 EGP Poll Request Messages
15.10 EGP Routing Update Messages
15.11 Measring Up date Messages
15.12 The Key Restriction Of EGP
15.13 Technical Problems
15.14 Decentralization Of Internet Architecture
15.15 Beyond Autonomous Systems
15.16 Summary
Chapter 16 Routing:In An Autonomous System(RIP,OSPF,HELLO)
16.1 Introduction
16.2 Static Vs.Dynamic Interior Routes
16.3 Routing Information Protocol(RIP)
16.4 The Hello Protocol
16.5 Combining RIP,Hello,And EGP
16.6 The Open SPF Protocol(OSPF)
16.7 Routing With Partial Information
16.8 Summary
Chapter 17 Internet Multicasting
17.1 Introduction
17.2 HardWare Broadcast
17.3 Hardware Multicast
17.4 Ip Multicast
17.5 IP Multicast Addresses
17.6 Mapping IP Multicast To Ehernet Multicast
17.7 Extending IP To Handle MUlticasting
17.8 Internet Group Management Protocol
17.9 IGMP mplementaioIn
17.10 Group Membership Stae Transitions
17.11 IGMP Message Format Multicast Address Assingnment
17.12 MulTicast Address Assignment
17.13 Propagating Routing Information
17.14 The Mrouted Program
17.15 Summary
Chapter 18 TCP/IP Over ATM Networks
18.1 Introduction
18.2 ATM Hardware
18.3 Large ATM Network
18.4 The Logical Vies Of An ATM Networ
18.5 The Two ATM Connection Paradigms
18.6 Pahs,Circuits,And Identifiers
18.7 ATM Cell Transport
18.8 ATM Adaptation Layers
18.9 AAL5 Convergence,Segmentation ,And Reassemblym
18.10 Datagram Encapsulaton And IP MTU Size
18.11 Packey Type And Multiplexing
18.12 IP Address Binding In An ATM Network
18.13 Logical IP Subnet Concept
18.14 Connection Management
18.15 Address Binding Within An LIS
18.16 ATMARP Packet Format
18.17 Using ATMARP Packets To DetermingAn Address
18.18 Obtaining Entries For A Server Database
18.19 Timing Out ATMARP Information In A Server
18.20 Timing Out ATMARP Information In A Host Or Router
18.21 Summary
Chapter 19 Client-Server Model Of Interaction
19.1 Introduction
19.2 The Client-Server Model
19.3 A Simple Example:UDP Echo Server
19.4 Time And Date Service
19.5 The Complexity of Servers
19.6 RARP Server
19.7 Alternatives To The Client-Server Model
19.8 Summary
Chapter 20 The Sockey Interface
20.1 Introduction
20.2 The UNIX I?O Paradigm And Network I?O
20.3 Adding Network I/O to UNIX
20.4 The Socket
20.5 Abstraction Creating A Socket
20.6 Socket Inheritance And Termination
20.7 Specifying A Local Address
20.8 Connecting Sockets To Destination Addresses
20.9 Sending Data Through A Socket
20.10 Receiving Data Through A Socket
20.11 Obtaing Local And Remote Socket Addresse
20.12 Obtaining And Setting Socket Options
20.13 Specifying A Queue Length For A Server
20.14 How A Server Acdepts Connections
20.15 Servers That Handle Multiple Services
20.16 Obtaining And Setting Host Names
20.17 Obtaining And Setting The Internal Host Domain
20.18 BSD UNIX Networi Library Calls
20.19 Network Byte Order Conversion Routines
20.20 IP Address Manipulation Routines
20.21 Accesssing The Domain Name System
20.22 Obtaining Inforation About Hosts
20.23 Obtaining Inforation About Networks
20.24 Obtaining Inforation About Protocols
20.25 Obtaining Inforation About Network Services
20.26 An Example client
20.27 An Example Server
20.28 Summary
Chapter 21 Bootstrap And Autoconfiguration
21.1 Introduction
21.2 The Need For An Alternative To RARP
21.3 Using IP To Determine An IP Address
21.4 The BOOTP Retransmission Policy
21.5 The BOOTM Message Fromat
21.6 The Two-Step Bootstrap Procedure
21.7 Vendor-Specific Field
21.8 The Need For Dynnamic Configuration
21.9 Dynamic Host Configuration
21.10 Dynamic IP Address Assignment
21.11 Obtaining Mutltiple Addresses
21.12 AddressAcquisition States
21.13 Early Lease Termination
21.14 Lease RenewalStates
21.15 DHCP Message Format
21.16 DHCP Options And Message Type
21.17 Option Overload
21.18 DHCP And Domain Names
21.19 Summary
Chapter 22 The Domain Name System
22.1 Introduction
22.2 Names For Machines
22.3 Flat Namespace
22.4 Hierarchical Names
22.5 Delegation Of Authority For Names
22.6 Subset Authority
22.7 TCP/IP Internet Domain Names
22.8 Official And UnofficialInternet Domain Names
22.9 Items Named And Synax Of Names
22.10 Mapping Domain Names To Addresses
22.11 Domain Name Resolution
22.12 Efficient Translation
22.13 Caching:the Key To Efficiecy
22.14 Domain Server MessageFormat
22.15 Compressed Name Format
22.16 Abbreviation Of Domain Names
22.17 Inverse Mappings
22.18 Pointer Queries
22.19 Object Types And Resource Record Contents
22.20 Obtaining Authority For A Subdomain
22.21 Summary
Chapter 23 Applications:Remote Login
23.1 Introduction
23.2 Remote Interactive Computing
23.3 TELNET protocol
23.4 Accommodating Heterogeneity
23.5 Passing Commands That Control The Remots Side
23.6 Forcing The Server To Read A Control Function
23.7 TELNET Options
23.8 TELNET Option Negotiation
23.9 Rlogin(BSD UNIX)
23.10 Summary
Chapter 24 Applications:File Transfer And Access(FTP,TFTP,NFS)
24.1 Introduction
24.2 File Acess And Transfer
24.3 On-line Shared Access
24.4 Sharing By File Transfer
24.5 FTP:The Major TCP/IP File Transfer Protocol
24.6 FTP:Features
24.7 FTPProcess Model
24.8 TCP Port Number Assignment
24.9 The User's View Of FTP
24.10 An Example Anonymous FTP Session
24.11 TFTP
24.12 NFS
24.13 NFS Implementation
24.14 Remote Procedure Call
24.15 Summary
Chapter 25 Applications:Electronic Mail
25.1 Introduction
25.2 Electronic Mail
25.3 Mailbox Names And Aliases
25.4 Alias Expansion And Mail Forwarding
25.5 The Relationship Of Internetworking And Mail
25.6 TCP/IP Standards For Electronic Mail Service
25.7 Elecctronic Mail Addresses
25.8 Pseudo Domain Addresses
25.9 Simain Mail Transfer Protocol
25.10 The MIME Extension For Non-ASCII Data
25.11 MIME MultipartMessages
25.12 Summary
Chapter26 Applications:Internet Management
26.1 Introduction
26.2 The Level Of Management Protocols
26.3 Architectural Model
26.4 ProtocolArchitecture
26.5 Examples of MIB Variables
26.6 The Structure Of Management Information
26.7 Formal Definitions Using ASN.I
26.8 Structure And Representaion Of MIB Object Names
26.9 Simlpe Network Management Protocol
26.10 SNMP Message Format
26.11 ExampleEncodedSNMP Message
26.12 Summary
Chapter27 Summary Of Protocol Dependencies
27.1 Introduction
27.2 ProtocolDependencies
27.3 Application Program Access
27.4 Summary
Chapter 28Internet Security And Firewall Design
28.1 Introduction
28.2 Protecting Resources
28.3 The Need For An Information Policy
28.4 Communication,Coopration,And Mutual Mistrust
28.5 Mechanisms For Internet Security
28.6 firewalls And Internet Access
28.7 Multiple Connections And Weakest Links
28.8 Firewall Implementation And High-Speed Hardware
28.9 Packet-LevelFilters
28.10 Security And Packet Felter Specification
28.11 The Consequence Of Restricted Access For Clients
28.12 Accessing Services Through A Firewall
28.13 The Details Of Firewall Architecture
28.14 Stub Network
28.15 An Alternative Firewall Implementation
28.16 Monitoring And Logging
28.17 Summary
Chapter29 The Future Of TCP/IP(IPng,IPv6)
29.1 Introduction
29.2 Why Change TCP/IP And The Internet?
29.3 Motivation For Changing IPv
29.4 The Road To A New Version Of IP
29.5 The Name Of The Next IP
29.6 Features Of IPv6
29.7 Generat Form Of An IPv6 Datagram
29.8 IPv6 Base Header Format
29.9 IPv6 Extension Headers
29.10 Parsing An IPv6 Datagram
29.11 IPv6 Fragmentation And Reassembly
29.12 The Consequence Of End-To-End Fragmentation
29.13 IPv6 Source Routing
29.14 IPv6 Options
29.15 Size Of The IPv6 Address Space
29.16 IPv6 Colon Hexadecimal Notation
29.17 Three Basic IPv6 Address Space
29.18 The Duality Of Brooadcast And Multicast
29.19 An EngineerignChoice And Simulated Broadcsat
29.20 Proposed IPv6 Address Space Assingment
29.21 IPv4 Address Encoding And Transition
29.22 Providers,Subscribers,And Address Hierarchy
29.23 Additional Hierarchy
29.24 Summary
Appendix 1 A Guide To RFCs
Appendix 2 Glossary Of Internetworking Terms And Abbreviations
Bibliography
Index
Preface
Chapter 1 Introduction And Overview
1.1 The MOtivation For Internetworking
1.2 The TCP/IP Internet
1.3 Internet Services
1.4 History And Scope Of The Internet
1.5 The Internet Architecture Board
1.6 The IAB Reorganization
1.7 The Internet Society
1.8 Internet Request or Comments
1.9 Internet Protocols And Standadization
1.10 Future Growth And Technology
1.11 Organization Of The Text
1.12 Summary
Chapter 2 ReviewOf Underlying Network Technoiongies
2.1 Introduction
2.2 Two Approaches To Network Communication
2.3 Wide Area And Local Area Network
2.4 Ethernet Technology
2.5 FiberDistibuted Data Interconnect(FDDI)
2.6 Asynchronous Transfer Mode
2.7 Arpanet Technology
2.8 National Sceence Foundation Networking
2.9 ANSNET
2.10 A Planned Wide Area Backbne
2.11 Other Technologies Over Which TCP/IP Has Been Used
2.12 Summary And Conclusion
Chapter 3 Internetworking Concept And Architectural Model
3.1 Introduction
3.2 Application-Level Interconnection
3.3 Network-Level Interconnection
3.4 Prperties Of The Internet
3.5 Inernet Architecturre
3.6 Interconnection Through IPRouters
3.7 The User's View
3.8 All Networks Are Equal
3.9 The Unanswerd Questions
3.10 Summary
Chapter 4 Internet Addresses
4.1 Introduction
4.2 Universal Idetifiers
4.3 Three Primary ClassesOf IP Addresses
4.4 AddressesSpecify Network Connections
4.5 Network And Broadcast Addresses
4.6 Limited Broadcast
4.7 Interpreting Zer To Mean "This "
4.8 Weaknesses In Internet
4.9 Dotted Decimal Notation
4.10 Loopback Address
4.11 Summary Of Special Address Conventions
4.12 Internet Addressing Authority
4.13 An Example
4.14 Network Byte Order
4.15 Summary
Chapter 5 Mapping Internet Addresses To Physical Addresses(ARP)
5.1 Introduction
5.2 The Address Resolution Problem
5.3 Two Types Of Physical Addresses
5.4 Resolution Through Diect Mapping
5.5 Resolution Through Dynaic Binding
5.6 The Address Resolution Cache
5.7 ARP Refinements
5.8 Relationship Of ARP To Other Protocols
5.9 ARP Implmentain
5.10 ARP Encapsulation And Identification
5.11 ARP Protocol Format
5.12 Summary
Chapter 6 Determining An Internet Address At STartup(RARP)
6.1 Introduction
6.2 Reverse Address Resolutioon Protocol
6.3 Timing RARP Transactions
6.4 Primary And Backup RaRP Servers
6.5 Summary
Chapter 7 Internet Protocol:Connectionless Datagram Delivery
7.1 Introduction
7.2 A Virtual Net work
7.3 Internet Architecture And Philosophy
7.4 The Concept Of Unreliable Delivery
7.5 Connectionless Delivery System
7.6 Purpose Of The Internet Protocol
7.7 The Internet Datagram
7.8 Internet Datagram Options
7.9 Summary
Chapter 8 Internet Protocol:Routing IP Datagrams
8.1 Introduction
8.2 Routing In An Internet
8.3 DirectAnd Indirect Delivery
8.4 Table-Driven IP Routing
8.5 Next-Hop Routing
8.6 Default Routes
8.7 Host-Specific Routes
8.8 The IP Routing Algorithm
8.9 Routing With IP Addresses
8.10 Handling Incoming Datagrams
8.11 Establishing Routing tables
8.12 Summary
Chapter 9 Internet Protocol:Error And Control Messages
9.1 Introduction
9.2 The Internet Control Message Protocol
9.3 Error Reporting vs Error Correction
9.4 ICMP Message Delivery
9.5 ICMP Message Format
9.6 Testing Destination Reachability And Staus
9.7 Echo Request AndREply Message Format
9.8 Reports of Unreachable Destinations
9.9 Congestion And Datagram Flow Control
9.10 Source Quench Format
9.11 Route Change Requests From Routers
9.12 Detecting Circular Or Excessively Long Routes
9.13 Reporting Other Problems
9.14 Clock Synchronization And Transit Time Estimation
9.15 Information Request And Reply Messages
9.16 Obtaining A Subnet Msak
9.17 Summary
Chapter 10 Subnet And Spernet Address Extensions
10.1 Introduction
10.2 Review Of Relevant Facts
10.3 Minimizing Network Numbers
10.4 Transparent Routers
10.5 Proxy ARP
10.6 Subnet Addressing
10.7 Flexibility In Subnet Address Assignment
10.8 Implementation Of Subnets With Masks
10.9 Subnet Mask Represntation
10.10 Routing In The Presnce Of Subnets
10.11 The Subnet Routing Alogrithm
10.12 A Unified Routing Algorihm
10.13 Maintenance Of Subnet Masks
10.14 Broadcasting To Subnets
10.15 Supernet Addressing
10.16 The Effect Of Supernetting On Routing
10.17 Summary
Chapter 11 Introduction The Need For Multiple Protocols
11.1 Introduction
11.2 The Need For Multiple Protocols
11.3 The Conceptual Layers Of Protocol Software
11.4 Funcionality Of The Layers
11.5 X.25 And Its Relation To The ISO Model
11.6 DifferencesBetween X.25 And Internet Layering
11.7 The Protocol Layering Principle
11.8 Layering In The Presence Of Network Substructure
11.9 Two Important Boundaries In The TCP/IPModel
11.10 The Disadvantage Of Layering
11.11 The Basic Idea Behind Multip lexing And Demultiplexing
11.12 Summary
Chapter 12 User Datagram Protocol
12.1 Introduction
12.2 Identifying The Ultimate Destination
12.3 The User Datagram Protocol
12.4 Format Of UDP Messages
12.5 UDP Pseudo-Header
12.6 UDP Encapsulation And Protocol Layering
12.7 Layering Andthe UDP Checksum Computation
12.8 UDP Multipexing,Demultiplexing,And Ports
12.9 Reserved And Available UDP Por Numbvers
12.10 Summay
Chapter 13 Reliable Stream Transport Service(TCP)
13.1 Introduction
13.2 Tht Need For Stream Delivery
13.3 Properties Of the Reliable Delivery Service
13.4 Providing Reliability
13.5 The Idea Behind Sliding Windows
13.6 The Transmission Control Protocol
13.7 Ports ,connections,And Endpoints
13.8 Passive And Active Opens
13.9 Segments,Streams,And Sequence Numbers
13.10 Variable Window Size And Flow control
13.11 TCP Segment Format
13.12 Out Of Band Data
13.13 Maximum Segment Size Option
13.14 TCP Checksum Computation
13.15 Acknowledgements And Retransission
13.16 Timeou And Retramsmission
13.17 Accurate Measuremint Of Round Trip Samples
13.18 Karn's Algorithm And Timer Backoff
13.19 Responding To High Variancd In Delay
13.20 Response To Congestion
13.21 Establishing A TCP Connection
13.22 Initial Sequence Numbers
13.23 Closing a TCP Connection
13.24 TCP Connection Reset
13.25 TCP State Machine
13.26 Forcing Data Delivery
13.27 Reserved TCP Port Numbers
13.28 TCP Performance
13.29 Silly Window Syndrome And Small Packets
13.30 Avoiding Silly Window syndrome
13.31 Summary
Chapter 14 Routing:cores,Peers,And Algorithms
14.1 Introduction
14.2 The Origin Of Routing Tables
14.3 Routing With Partial Information
14.4 Original Internet Architecture And Cores
14.5 Core Routers
14.6 Beyond The Core Architecture To Peer Backbones
14.7 Automatic Route Propagation
14.8 Vector Distance(Bellman-Ford)Routng
14.9 Gateway-To-Gateway Protocol(GGP)
14.10 GGP Message Formats
14.11 Link-State(SPF)Routing
14.12 Spf Protocols
14.13 Summary
Chapter 15 Routing:Autonomous Systems(EGP)
15.1 Introduction
15.2 Adding Complexity To The Architectural Model
15.3 A Fundamental Idea:extra Hops
15.4 Autonomous Sys Tem Concept Exterior Gateway Protocol
15.5 Exterior Gatewqy Protocol(EGP)
15.6 EGP Message Header
15.7 EGP Neighor Acquisition Messages
15.8 EGP Neighbor Reachability Messages
15.9 EGP Poll Request Messages
15.10 EGP Routing Update Messages
15.11 Measring Up date Messages
15.12 The Key Restriction Of EGP
15.13 Technical Problems
15.14 Decentralization Of Internet Architecture
15.15 Beyond Autonomous Systems
15.16 Summary
Chapter 16 Routing:In An Autonomous System(RIP,OSPF,HELLO)
16.1 Introduction
16.2 Static Vs.Dynamic Interior Routes
16.3 Routing Information Protocol(RIP)
16.4 The Hello Protocol
16.5 Combining RIP,Hello,And EGP
16.6 The Open SPF Protocol(OSPF)
16.7 Routing With Partial Information
16.8 Summary
Chapter 17 Internet Multicasting
17.1 Introduction
17.2 HardWare Broadcast
17.3 Hardware Multicast
17.4 Ip Multicast
17.5 IP Multicast Addresses
17.6 Mapping IP Multicast To Ehernet Multicast
17.7 Extending IP To Handle MUlticasting
17.8 Internet Group Management Protocol
17.9 IGMP mplementaioIn
17.10 Group Membership Stae Transitions
17.11 IGMP Message Format Multicast Address Assingnment
17.12 MulTicast Address Assignment
17.13 Propagating Routing Information
17.14 The Mrouted Program
17.15 Summary
Chapter 18 TCP/IP Over ATM Networks
18.1 Introduction
18.2 ATM Hardware
18.3 Large ATM Network
18.4 The Logical Vies Of An ATM Networ
18.5 The Two ATM Connection Paradigms
18.6 Pahs,Circuits,And Identifiers
18.7 ATM Cell Transport
18.8 ATM Adaptation Layers
18.9 AAL5 Convergence,Segmentation ,And Reassemblym
18.10 Datagram Encapsulaton And IP MTU Size
18.11 Packey Type And Multiplexing
18.12 IP Address Binding In An ATM Network
18.13 Logical IP Subnet Concept
18.14 Connection Management
18.15 Address Binding Within An LIS
18.16 ATMARP Packet Format
18.17 Using ATMARP Packets To DetermingAn Address
18.18 Obtaining Entries For A Server Database
18.19 Timing Out ATMARP Information In A Server
18.20 Timing Out ATMARP Information In A Host Or Router
18.21 Summary
Chapter 19 Client-Server Model Of Interaction
19.1 Introduction
19.2 The Client-Server Model
19.3 A Simple Example:UDP Echo Server
19.4 Time And Date Service
19.5 The Complexity of Servers
19.6 RARP Server
19.7 Alternatives To The Client-Server Model
19.8 Summary
Chapter 20 The Sockey Interface
20.1 Introduction
20.2 The UNIX I?O Paradigm And Network I?O
20.3 Adding Network I/O to UNIX
20.4 The Socket
20.5 Abstraction Creating A Socket
20.6 Socket Inheritance And Termination
20.7 Specifying A Local Address
20.8 Connecting Sockets To Destination Addresses
20.9 Sending Data Through A Socket
20.10 Receiving Data Through A Socket
20.11 Obtaing Local And Remote Socket Addresse
20.12 Obtaining And Setting Socket Options
20.13 Specifying A Queue Length For A Server
20.14 How A Server Acdepts Connections
20.15 Servers That Handle Multiple Services
20.16 Obtaining And Setting Host Names
20.17 Obtaining And Setting The Internal Host Domain
20.18 BSD UNIX Networi Library Calls
20.19 Network Byte Order Conversion Routines
20.20 IP Address Manipulation Routines
20.21 Accesssing The Domain Name System
20.22 Obtaining Inforation About Hosts
20.23 Obtaining Inforation About Networks
20.24 Obtaining Inforation About Protocols
20.25 Obtaining Inforation About Network Services
20.26 An Example client
20.27 An Example Server
20.28 Summary
Chapter 21 Bootstrap And Autoconfiguration
21.1 Introduction
21.2 The Need For An Alternative To RARP
21.3 Using IP To Determine An IP Address
21.4 The BOOTP Retransmission Policy
21.5 The BOOTM Message Fromat
21.6 The Two-Step Bootstrap Procedure
21.7 Vendor-Specific Field
21.8 The Need For Dynnamic Configuration
21.9 Dynamic Host Configuration
21.10 Dynamic IP Address Assignment
21.11 Obtaining Mutltiple Addresses
21.12 AddressAcquisition States
21.13 Early Lease Termination
21.14 Lease RenewalStates
21.15 DHCP Message Format
21.16 DHCP Options And Message Type
21.17 Option Overload
21.18 DHCP And Domain Names
21.19 Summary
Chapter 22 The Domain Name System
22.1 Introduction
22.2 Names For Machines
22.3 Flat Namespace
22.4 Hierarchical Names
22.5 Delegation Of Authority For Names
22.6 Subset Authority
22.7 TCP/IP Internet Domain Names
22.8 Official And UnofficialInternet Domain Names
22.9 Items Named And Synax Of Names
22.10 Mapping Domain Names To Addresses
22.11 Domain Name Resolution
22.12 Efficient Translation
22.13 Caching:the Key To Efficiecy
22.14 Domain Server MessageFormat
22.15 Compressed Name Format
22.16 Abbreviation Of Domain Names
22.17 Inverse Mappings
22.18 Pointer Queries
22.19 Object Types And Resource Record Contents
22.20 Obtaining Authority For A Subdomain
22.21 Summary
Chapter 23 Applications:Remote Login
23.1 Introduction
23.2 Remote Interactive Computing
23.3 TELNET protocol
23.4 Accommodating Heterogeneity
23.5 Passing Commands That Control The Remots Side
23.6 Forcing The Server To Read A Control Function
23.7 TELNET Options
23.8 TELNET Option Negotiation
23.9 Rlogin(BSD UNIX)
23.10 Summary
Chapter 24 Applications:File Transfer And Access(FTP,TFTP,NFS)
24.1 Introduction
24.2 File Acess And Transfer
24.3 On-line Shared Access
24.4 Sharing By File Transfer
24.5 FTP:The Major TCP/IP File Transfer Protocol
24.6 FTP:Features
24.7 FTPProcess Model
24.8 TCP Port Number Assignment
24.9 The User's View Of FTP
24.10 An Example Anonymous FTP Session
24.11 TFTP
24.12 NFS
24.13 NFS Implementation
24.14 Remote Procedure Call
24.15 Summary
Chapter 25 Applications:Electronic Mail
25.1 Introduction
25.2 Electronic Mail
25.3 Mailbox Names And Aliases
25.4 Alias Expansion And Mail Forwarding
25.5 The Relationship Of Internetworking And Mail
25.6 TCP/IP Standards For Electronic Mail Service
25.7 Elecctronic Mail Addresses
25.8 Pseudo Domain Addresses
25.9 Simain Mail Transfer Protocol
25.10 The MIME Extension For Non-ASCII Data
25.11 MIME MultipartMessages
25.12 Summary
Chapter26 Applications:Internet Management
26.1 Introduction
26.2 The Level Of Management Protocols
26.3 Architectural Model
26.4 ProtocolArchitecture
26.5 Examples of MIB Variables
26.6 The Structure Of Management Information
26.7 Formal Definitions Using ASN.I
26.8 Structure And Representaion Of MIB Object Names
26.9 Simlpe Network Management Protocol
26.10 SNMP Message Format
26.11 ExampleEncodedSNMP Message
26.12 Summary
Chapter27 Summary Of Protocol Dependencies
27.1 Introduction
27.2 ProtocolDependencies
27.3 Application Program Access
27.4 Summary
Chapter 28Internet Security And Firewall Design
28.1 Introduction
28.2 Protecting Resources
28.3 The Need For An Information Policy
28.4 Communication,Coopration,And Mutual Mistrust
28.5 Mechanisms For Internet Security
28.6 firewalls And Internet Access
28.7 Multiple Connections And Weakest Links
28.8 Firewall Implementation And High-Speed Hardware
28.9 Packet-LevelFilters
28.10 Security And Packet Felter Specification
28.11 The Consequence Of Restricted Access For Clients
28.12 Accessing Services Through A Firewall
28.13 The Details Of Firewall Architecture
28.14 Stub Network
28.15 An Alternative Firewall Implementation
28.16 Monitoring And Logging
28.17 Summary
Chapter29 The Future Of TCP/IP(IPng,IPv6)
29.1 Introduction
29.2 Why Change TCP/IP And The Internet?
29.3 Motivation For Changing IPv
29.4 The Road To A New Version Of IP
29.5 The Name Of The Next IP
29.6 Features Of IPv6
29.7 Generat Form Of An IPv6 Datagram
29.8 IPv6 Base Header Format
29.9 IPv6 Extension Headers
29.10 Parsing An IPv6 Datagram
29.11 IPv6 Fragmentation And Reassembly
29.12 The Consequence Of End-To-End Fragmentation
29.13 IPv6 Source Routing
29.14 IPv6 Options
29.15 Size Of The IPv6 Address Space
29.16 IPv6 Colon Hexadecimal Notation
29.17 Three Basic IPv6 Address Space
29.18 The Duality Of Brooadcast And Multicast
29.19 An EngineerignChoice And Simulated Broadcsat
29.20 Proposed IPv6 Address Space Assingment
29.21 IPv4 Address Encoding And Transition
29.22 Providers,Subscribers,And Address Hierarchy
29.23 Additional Hierarchy
29.24 Summary
Appendix 1 A Guide To RFCs
Appendix 2 Glossary Of Internetworking Terms And Abbreviations
Bibliography
Index
猜您喜欢