关于我们
![]() ![]() |
TCP/IP协议族(第4版 影印版) ![]() TCP/IP(Transmission Control Protocol/InternetProtocol,传输控制协议/网际协议)是用于计算机通信的一个协议族,几乎所有的网络操作系统都提供对TCP/IP的支持,TCP/IP已经是Internet的标准协议。 本书是介绍TCP/IP协议族的经典图书的最新版本。全书含有7大部分共30章和7个附录:第1部分介绍一些基本概念和基础底层技术;第2部分介绍网络层协议;第3部分介绍传输层协议;第4部分介绍应用层协议;第5部分介绍下一代协议,即IPv6协议;第6部分介绍网络安全问题;第7部分给出了7个附录。 每章的最后都有实践安排,其中的第1部分是习题,第2部分是研究活动,要求学生或读者查找课外的阅读资料。 本书可作为大学生和研究生的教材,对从事计算机网络教学的老师和科研人员以及工程技术人员也有很好的参考价值。
网络编程经典名著,经久不衰佳作(全英文版本的哦)
Preface
echnologies related to networks and internetworking may be the fastest growing in our culture today. Many professors and students who have used, read, or reviewed the third edition of the book suggested the publication of a new edition that include these changes. In the fourth edition, I have reorganized the book incorporating many changes and added several new chapters and appendices. The fourth edition of the book assumes the reader has no prior knowledge of the TCP/IP protocol suite, although a previous course in data communications is desirable. Organization This book is divided into seven parts. ? Part I (Introduction and Underlying Technologies), comprising Chapters 1 to 3, reviews the basic concepts and underlying technologies that, although independent from the TCP/IP protocols, are needed to support them. ? Part II (Network Layer), comprising Chapters 4 to 12, discusses IPv4 addressing, the IPv4 protocol, all auxiliary protocols helping IPv4 protocol, and unicast and multicast routing protocols. ? Part III (Transport Layer), comprising Chapters 13 to 16, introduces the general concepts in the transport layer (Chapter 13) and then fully discusses three transport layer protocols: UDP, TCP, and SCTP (Chapters 14, 15, and 16). ? Part IV (Application Layer), comprising Chapters 17 to 25, introduces the general concepts in the application layer including client-server programming (Chapter 17) and then fully discusses seven application layer protocols (Chapters 18 to 24). Chapter 25 is devoted to multimedia in the Internet. ? Part V (New Generation), comprising Chapters 26 to 28, introduces the new generation of IP protocol, IPv6 addressing (Chapter 26), IPv6 protocol (Chapter 27), and ICMPv6 (Chapter 28). ? Part VI (Security), comprising Chapters 29 to 30, discusses the inevitable topics such as cryptography and network security (Chapter 29) and Internet security (Chapter 30). ? Part VII (Appendices) inclosed seven appendices that may be needed when reading the book. Features Several features of this text are designed to make it particularly easy for students to understand TCP/IP. T for76042_fm.fm Page xxxi Monday, February 23, 2009 6:43 PM xxxii PREFACE Visual Approach The book presents highly technical subject matter without complex formulas by using a balance of text and figures. More than 650 figures accompanying the text provide a visual and intuitive opportunity for understanding the material. Figures are particularly important in explaining networking concepts, which are based on connections and transmission. Often, these are more easily grasped visually rather than verbally. Highlighted Points I have repeated important concepts in boxes for quick reference and immediate attention. Examples and Applications Whenever appropriate, I have included examples that illustrate the concepts introduced in the text. Also, I have added real-life applications throughout each chapter to motivate students. Protocol Packages Although I have not tried to give the detailed code for implementing each protocol, many chapters contain a section that discusses the general idea behind the implementation of each protocol. These sections provide an understanding of the ideas and issues involved in each protocol, but may be considered optional material. Key Terms The new terms used in each chapter are listed at the end of the chapter and their definitions are included in the glossary. Summary Each chapter ends with a summary of the material covered by that chapter. The summary is a bulleted overview of all the key points in the chapter. Practice Set Each chapter includes a practice set designed to reinforce salient concepts and encourage students to apply them. It consists of two parts: exercises and research activities. Exercises require understanding of the material. Research activities challenge those who want to delve more deeply into the material. Appendices The appendices are intended to provide a quick reference or review of materials needed to understand the concepts discussed in the book. The appendices in the previous edition have been revised, combined, and some new ones have been added. Glossary and Acronyms The book contains an extensive glossary and a list of acronyms. Instructor Resources Solutions, PowerPoint presentations, and Student Quizzes are available through the book’s website at www.mhhe.com/forouzan. for76042_fm.fm Page xxxii Friday, February 20, 2009 7:39 PM PREFACE xxxiii Electronic Book Options CourseSmart. This text is offered through CourseSmart for both instructors and students. CourseSmart is an online browser where students can purchase access to this and other McGraw-Hill textbooks in digital format. Through their browser, students can access a complete text online at almost half the cost of a traditional text. Purchasing the etextbook also allows students to take advantage of CourseSmart’s Web tools for learning, which include full text search, notes and highlighting, and e-mail tools for sharing notes between classmates. To learn more about CourseSmart options, contact your sales representative or visit www.CourseSmart.com. VitalSource. VitalSource is a downloadable eBook. Students who choose the Vital- Source eBook can save up to 45 percent off the cost of the print book, reduce their impact on the environment, and access powerful digital learning tools. Students can share notes with others, customize the layout of the etextbook, and quickly search their entire etextbook library for key concepts. Students can also print sections of the book for maximum portability. New and Changes to the Fourth Edition There are many changes and much new material in the fourth edition, including: ? Chapter objectives have been added to the beginning of each chapter. ? A brief references list and a list of corresponding RFCs have been added at the end of each chapter. ? Some new exercises and some research activities are added to some chapters. ? Figures are revised to reflect their relation to the actual technology used today. ? Chapter 3 (Underlying Technologies) has been totally revised to cover new technologies ? Chapter 4 (Introduction to Network Layer) is totally new. ? Chapter 13 (Introduction to the Transport Layer) is totally new. ? Chapter 17 (Introduction to the Application Layer) is totally new. ? Chapter 5 now discusses both classful and classless addressing (a combination of Chapters 4 and 5 in the third edition). ? Chapter 6 has been revised to include MPLS. ? Materials on New Generation Internet Protocol (IPv6) has been augmented to three chapters (Chapters 26, 27, 28). ? Materials on security have been augmented to two chapters (Chapters 29, 30). ? Some deprecated protocols, such as RARP and BOOTP are removed to provide space for new material. ? Chapters are reorganized according to the layers in TCP/IP protocol suite. ? Appendix A (ASCII Code) has been replaced by Unicode. ? Appendix C (Error Detection) has been totally revised and augmented. ? Appendix D (Checksum) is totally revised. for76042_fm.fm Page xxxiii Friday, February 20, 2009 7:39 PM xxxiv PREFACE ? Appendix E (HTML, XHTML, XML, and XSL) is totally new. ? Appendix F (Client-Server Programming in Java) is totally new. ? Appendix G (Miscellaneous Information) is now a combination of the previous Appendices F, G, and H. How to Use the Book This book is written for both academic and professional audiences. The book can be used as a self-study guide for interested professionals. As a textbook, it can be used for a one-semester or one-quarter course. The chapters are organized to provide a great deal of flexibility. I suggest the following: ? Chapters 1 to 3 can be skipped if students have already taken a course in data communications and networking. ? Chapters 4 through 25 are essential for understanding the TCP/IP protocol suite. ? Chapters 26 to 28 can be used at the professor’s discretion if there is a need for making the student familiar with the new generation. ? Chapters 29 and 30 can prepare the students for a security course, but they can be skipped if there is time restraint. Acknowledgments for the Fourth Edition It is obvious that the development of a book of this scope needs the support of many people. I acknowledged the contributions of many people in the preface of the first three editions. For the fourth edition, I would like to acknowledge the contributions from peer reviewers to the development of the book. These reviewers are: Dale Buchholz, DePaul University Victor Clincy, Kennesaw State University Richard Coppins, Virginia Commonwealth University Zongming Fei, University of Kentucky Guy Hembroff, Michigan Tech University Frank Lin, San Jose State University Tim Lin, California Polytechnic University–Pomona Abdallah Shami, University of Western Ontario Elsa Valeroso, Eastern Michigan University Mark Weiser, Oklahoma State University Ben Zhao, University of California at Santa Barbara I acknowledge the invaluable contributions of professor Paul Amer for providing comments and feedbacks on the manuscript. Special thanks go to the staff of McGraw-Hill. Raghu Srinivasan, the publisher, proved how a proficient publisher can make the impossible, possible. Melinda Bilecki, the developmental editor, gave help whenever I needed it. Joyce Watters, the project manager, guided me through the production process with enormous enthusiasm. I also thank Les Chappell of Macmillan Publishing Solutions in production, Laurie Janssen, the designer, and George F. Watson, the copy editor. Behrouz A. Forouzan January, 2009. for76042_fm.fm Page xxxiv Friday, February 20, 2009 7:39 PM xxxv Trademarks hroughout the text I have used several trademarks. Rather than insert a trademark symbol with each mention of the trademark name, I acknowledge the trademarks here and state that they are used with no intention of infringing upon them. Other product names, trademarks, and registered trademarks are the property of their respective owners. ? Network File System and NFS are registered trademarks of Sun Microsystems, Inc. ? UNIX is a registered trademark of UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc. ? Xerox is a trademark and Ethernet is a registered trademark of Xerox Corp. Behrouz A. Forouzan生于1944年,是美国加利福尼亚州DeAnza学院的计算机科学与工程(Computer Science andEngineering)系的教授,同时兼任多家公司的系统开发顾问。Behrouz教授曾出版了10余部涵盖计算机科学、网络、安全、编程、数据库等领域的热门著作,大部分作品都持续再版。《TCP/IP协议族》就是他的经典著作之一。
Brief Contents
Preface xxxi Trademarks xxxv Part 1 Introduction and Underlying Technologies1 Chapter 1 Introduction 2 Chapter 2 The OSI Model and the TCP/IP Protocol Suite18 Chapter 3 Underlying Technologies46 Part 2 Network Layer 93 Chapter 4 Introduction to Network Layer94 Brief Contents Preface xxxi Trademarks xxxv Part 1 Introduction and Underlying Technologies1 Chapter 1 Introduction 2 Chapter 2 The OSI Model and the TCP/IP Protocol Suite18 Chapter 3 Underlying Technologies46 Part 2 Network Layer 93 Chapter 4 Introduction to Network Layer94 Chapter 5 IPv4 Addresses 114 Chapter 6 Delivery and Forwarding of IP Packets160 Chapter 7 Internet Protocol Version 4 (IPv4)186 Chapter 8 Address Resolution Protocol (ARP)220 Chapter 9 Internet Control Message Protocol Version 4(ICMPv4) 244 Chapter 10 Mobile IP 268 Chapter 11 Unicast Routing Protocols (RIP, OSPF, and BGP)282 Chapter 12 Multicasting and Multicast Routing Protocols334 Part 3 Transport Layer 373 Chapter 13 Introduction to the Transport Layer374 Chapter 14 User Datagram Protocol (UDP)414 Chapter 15 Transmission Control Protocol (TCP)432 Chapter 16 Stream Control Transmission Protocol (SCTP)502 for76042_fm.fm Page vii Friday, February 20, 20097:39 PM viii BRIEF CONTENTS Part 4 Application Layer 541 Chapter 17 Introduction to the Application Layer542 Chapter 18 Host Configuration: DHCP568 Chapter 19 Domain Name System (DNS)582 Chapter 20 Remote Login: TELNET and SSH610 Chapter 21 File Transfer: FTP and TFTP630 Chapter 22 World Wide Web and HTTP656 Chapter 23 Electronic Mail: SMTP, POP, IMAP, and MIME680 Chapter 24 Network Management: SNMP706 Chapter 25 Multimedia 728 Part 5 Next Generation 767 Chapter 26 IPv6 Addressing 768 Chapter 27 IPv6 Protocol 786 Chapter 28 ICMPv6 800 Part 6 Security 815 Chapter 29 Cryptography and Network Security816 Chapter 30 Internet Security 858 Part 7 Appendices 891 Appendix A Unicode 892 Appendix B Positional Numbering Systems896 Appendix C Error Detection Codes904 Appendix D Checksum 914 Appendix E HTML, XHTML, XML, and XSL920 Appendix F Client-Server Programming in Java926 Appendix G Miscellaneous Information932 Glossary 935 References 955 Index 957 for76042_fm.fm Page viii Friday, February 20,2009 7:39 PM ix Contents Preface xxxi Trademarks xxxv Part 1 Introduction and Underlying Technologies1 Chapter 1 Introduction 2 1.1 A BRIEF HISTORY 3 ARPANET 3 Birth of the Internet 3 Transmission Control Protocol/InternetworkingProtocol (TCP/IP) 4 MILNET 4 CSNET 4 NSFNET 4 ANSNET 5 The Internet Today 5 World Wide Web 6 Time Line 6 Growth of the Internet 7 1.2 PROTOCOLS AND STANDARDS7 Protocols 7 Standards 8 1.3 STANDARDS ORGANIZATIONS8 Standards Creation Committees8 Forums 10 Regulatory Agencies 10 1.4 INTERNET STANDARDS10 Maturity Levels 11 Requirement Levels 12 1.5 INTERNET ADMINISTRATION13 Internet Society (ISOC)13 Internet Architecture Board (IAB)13 Internet Engineering Task Force (IETF)13 Internet Research Task Force (IRTF)14 Internet Assigned Numbers Authority (IANA) andInternet Corporation for Assigned Names and Numbers (ICANN)14 Network Information Center (NIC)14 for76042_fm.fm Page ix Friday, February 20, 20098:03 PM x CONTENTS 1.6 FURTHER READING 14 Books and Papers 15 Websites 15 1.7 KEY TERMS 15 1.8 SUMMARY 15 1.9 PRACTICE SET 16 Exercises 16 Research Activities 17 Chapter 2 The OSI Model and the TCP/IP Protocol Suite18 2.1 PROTOCOL LAYERS 19 Hierarchy 20 Services 20 2.2 THE OSI MODEL 20 Layered Architecture 21 Layer-to-Layer Communication22 Encapsulation 23 Layers in the OSI Model24 Summary of OSI Layers 28 2.3 TCP/IP PROTOCOL SUITE28 Comparison between OSI and TCP/IP Protocol Suite28 Layers in the TCP/IP Protocol Suite30 2.4 ADDRESSING 35 Physical Addresses 35 Logical Addresses 37 Port Addresses 39 Application-Specific Addresses40 2.5 FURTHER READING 40 Books 40 RFCs 40 2.6 KEY TERMS 41 2.7 SUMMARY 41 2.8 PRACTICE SET 42 Exercises 42 Research Activities 44 Chapter 3 Underlying Technologies46 3.1 WIRED LOCAL AREA NETWORKS47 IEEE Standards 47 Frame Format 48 Addressing 49 Ethernet Evolution 51 Standard Ethernet 51 Fast Ethernet 55 Gigabit Ethernet 56 Ten-Gigabit Ethernet 59 for76042_fm.fm Page x Friday, February 20, 20097:39 PM
我要评论
|