logo资料库

Computer Networking - A Top Down Approach (7th Global).pdf

第1页 / 共856页
第2页 / 共856页
第3页 / 共856页
第4页 / 共856页
第5页 / 共856页
第6页 / 共856页
第7页 / 共856页
第8页 / 共856页
资料共856页,剩余部分请下载后查看
Cover
Title
Copyright
About the Authors
Preface
Contents (direct linkking)
1. Computer Networks and the Internet
1.1. What Is the Internet?
1.1.1. A Nuts-and-Bolts Description
1.1.2. A Services Description
1.1.3. What Is a Protocol?
1.2. The Network Edge
1.2.1. Access Networks
1.2.2. Physical Media
1.3. The Network Core
1.3.1. Packet Switching
1.3.2. Circuit Switching
1.3.3. A Network of Networks
1.4. Delay, Loss, and Throughput in Packet-Switched Networks
1.4.1. Overview of Delay in Packet-Switched Networks
1.4.2. Queuing Delay and Packet Loss
1.4.3. End-to-End Delay
1.4.4. Throughput in Computer Networks
1.5. Protocol Layers and Their Service Models
1.5.1. Layered Architecture
1.5.2. Encapsulation
1.6. Networks Under Attack
1.7. History of Computer Networking and the Internet
1.7.1. The Development of Packet Switching: 1961–1972
1.7.2. Proprietary Networks and Internetworking: 1972–1980
1.7.3. A Proliferation of Networks: 1980–1990
1.7.4. The Internet Explosion: The 1990s
1.7.5. The New Millennium
1.8. Summary
Homework Problems and Questions
Wireshark Lab
Interview: Leonard Kleinrock
2. Application Layer
2.1. Principles of Network Applications
2.1.1. Network Application Architectures
2.1.2. Processes Communicating
2.1.3. Transport Services Available to Applications
2.1.4. Transport Services Provided by the Internet
2.1.5. Application-Layer Protocols
2.1.6. Network Applications Covered in This Book
2.2. The Web and HTTP
2.2.1. Overview of HTTP
2.2.2. Non-Persistent and Persistent Connections
2.2.3. HTTP Message Format
2.2.4. User-Server Interaction: Cookies
2.2.5. Web Caching
2.3. Electronic Mail in the Internet
2.3.1. SMTP
2.3.2. Comparison with HTTP
2.3.3. Mail Message Formats
2.3.4. Mail Access Protocols
2.4. DNS—The Internet’s Directory Service
2.4.1. Services Provided by DNS
2.4.2. Overview of How DNS Works
2.4.3. DNS Records and Messages
2.5. Peer-to-Peer Applications
2.5.1. P2P File Distribution
2.6. Video Streaming and Content Distribution Networks
2.6.1. Internet Video
2.6.2. HTTP Streaming and DASH
2.6.3. Content Distribution Networks
2.6.4. Case Studies: Netflix, YouTube, and Kankan
2.7. Socket Programming: Creating Network Applications
2.7.1. Socket Programming with UDP
2.7.2. Socket Programming with TCP
2.8. Summary
Homework Problems and Questions
Socket Programming Assignments
Wireshark Labs: HTTP, DNS
Interview: Marc Andreessen
3. Transport Layer
3.1. Introduction and Transport-Layer Services
3.1.1. Relationship Between Transport and Network Layers
3.1.2. Overview of the Transport Layer in the Internet
3.2. Multiplexing and Demultiplexing
3.3. Connectionless Transport: UDP
3.3.1. UDP Segment Structure
3.3.2. UDP Checksum
3.4. Principles of Reliable Data Transfer
3.4.1. Building a Reliable Data Transfer Protocol
3.4.2. Pipelined Reliable Data Transfer Protocols
3.4.3. Go-Back-N (GBN)
3.4.4. Selective Repeat (SR)
3.5. Connection-Oriented Transport: TCP
3.5.1. The TCP Connection
3.5.2. TCP Segment Structure
3.5.3. Round-Trip Time Estimation and Timeout
3.5.4. Reliable Data Transfer
3.5.5. Flow Control
3.5.6. TCP Connection Management
3.6. Principles of Congestion Control
3.6.1. The Causes and the Costs of Congestion
3.6.2. Approaches to Congestion Control
3.7. TCP Congestion Control
3.7.1. Fairness
3.7.2. Explicit Congestion Notification (ECN): Network-assisted Congestion Control
3.8. Summary
Homework Problems and Questions
Programming Assignments
Wireshark Labs: Exploring TCP, UDP
Interview: Van Jacobson
4. The Network Layer: Data Plane
4.1. Overview of Network Layer
4.1.1. Forwarding and Routing: The Network Data and Control Planes
4.1.2. Network Service Models
4.2. What’s Inside a Router?
4.2.1. Input Port Processing and Destination-Based Forwarding
4.2.2. Switching
4.2.3. Output Port Processing
4.2.4. Where Does Queuing Occur?
4.2.5. Packet Scheduling
4.3. The Internet Protocol (IP): IPv4, Addressing, IPv6, and More
4.3.1. IPv4 Datagram Format
4.3.2. IPv4 Datagram Fragmentation
4.3.3. IPv4 Addressing
4.3.4. Network Address Translation (NAT)
4.3.5. IPv6
4.4. Generalized Forwarding and SDN
4.4.1. Match
4.4.2. Action
4.4.3. OpenFlow Examples of Match-plus-action in Action
4.5. Summary
Homework Problems and Questions
Wireshark Lab
Interview: Vinton G. Cerf
5. The Network Layer: Control Plane
5.1. Introduction
5.2. Routing Algorithms
5.2.1. The Link-State (LS) Routing Algorithm
5.2.2. The Distance-Vector (DV) Routing Algorithm
5.3. Intra-AS Routing in the Internet: OSPF
5.4. Routing Among the ISPs: BGP
5.4.1. The Role of BGP
5.4.2. Advertising BGP Route Information
5.4.3. Determining the Best Routes
5.4.4. IP-Anycast
5.4.5. Routing Policy
5.4.6. Putting the Pieces Together: Obtaining Internet Presence
5.5. The SDN Control Plane
5.5.1. The SDN Control Plane: SDN Controller and SDN Control Applications
5.5.2. OpenFlow Protocol
5.5.3. Data and Control Plane Interaction: An Example
5.5.4. SDN: Past and Future
5.6. ICMP: The Internet Control Message Protocol
5.7. Network Management and SNMP
5.7.1. The Network Management Framework
5.7.2. The Simple Network Management Protocol (SNMP)
5.8. Summary
Homework Problems and Questions
Socket Programming Assignment
Programming Assignment
Wireshark Lab
Interview: Jennifer Rexford
6. The Link Layer and LANs
6.1. Introduction to the Link Layer
6.1.1. The Services Provided by the Link Layer
6.1.2. Where Is the Link Layer Implemented?
6.2. Error-Detection and -Correction Techniques
6.2.1. Parity Checks
6.2.2. Checksumming Methods
6.2.3. Cyclic Redundancy Check (CRC)
6.3. Multiple Access Links and Protocols
6.3.1. Channel Partitioning Protocols
6.3.2. Random Access Protocols
6.3.3. Taking-Turns Protocols
6.3.4. DOCSIS: The Link-Layer Protocol for Cable Internet Access
6.4. Switched Local Area Networks
6.4.1. Link-Layer Addressing and ARP
6.4.2. Ethernet
6.4.3. Link-Layer Switches
6.4.4. Virtual Local Area Networks (VLANs)
6.5. Link Virtualization: A Network as a Link Layer
6.5.1. Multiprotocol Label Switching (MPLS)
6.6. Data Center Networking
6.7. Retrospective: A Day in the Life of a Web Page Request
6.7.1. Getting Started: DHCP, UDP, IP, and Ethernet
6.7.2. Still Getting Started: DNS and ARP
6.7.3. Still Getting Started: Intra-Domain Routing to the DNS Server
6.7.4. Web Client-Server Interaction: TCP and HTTP
6.8. Summary
Homework Problems and Questions
Wireshark Lab
Interview: Simon S. Lam
7. Wireless and Mobile Networks
7.1. Introduction
7.2. Wireless Links and Network Characteristics
7.2.1. CDMA
7.3. WiFi: 802.11 Wireless LANs
7.3.1. The 802.11 Architecture
7.3.2. The 802.11 MAC Protocol
7.3.3. The IEEE 802.11 Frame
7.3.4. Mobility in the Same IP Subnet
7.3.5. Advanced Features in 802.11
7.3.6. Personal Area Networks: Bluetooth and Zigbee
7.4. Cellular Internet Access
7.4.1. An Overview of Cellular Network Architecture
7.4.2. 3G Cellular Data Networks: Extending the Internet to Cellular Subscribers
7.4.3. On to 4G: LTE
7.5. Mobility Management: Principles
7.5.1. Addressing
7.5.2. Routing to a Mobile Node
7.6. Mobile IP
7.7. Managing Mobility in Cellular Networks
7.7.1. Routing Calls to a Mobile User
7.7.2. Handoffs in GSM
7.8. Wireless and Mobility: Impact on Higher-Layer Protocols
7.9. Summary
Homework Problems and Questions
Wireshark Lab
Interview: Deborah Estrin
8. Security in Computer Networks
8.1. What Is Network Security?
8.2. Principles of Cryptography
8.2.1. Symmetric Key Cryptography
8.2.2. Public Key Encryption
8.3. Message Integrity and Digital Signatures
8.3.1. Cryptographic Hash Functions
8.3.2. Message Authentication Code
8.3.3. Digital Signatures
8.4. End-Point Authentication
8.4.1. Authentication Protocol ap1.0
8.4.2. Authentication Protocol ap2.0
8.4.3. Authentication Protocol ap3.0
8.4.4. Authentication Protocol ap3.1
8.4.5. Authentication Protocol ap4.0
8.5. Securing E-Mail
8.5.1. Secure E-Mail
8.5.2. PGP
8.6. Securing TCP Connections: SSL
8.6.1. The Big Picture
8.6.2. A More Complete Picture
8.7. Network-Layer Security: IPsec and Virtual Private Networks
8.7.1. IPsec and Virtual Private Networks (VPNs)
8.7.2. The AH and ESP Protocols
8.7.3. Security Associations
8.7.4. The IPsec Datagram
8.7.5. IKE: Key Management in IPsec
8.8. Securing Wireless LANs
8.8.1. Wired Equivalent Privacy (WEP)
8.8.2. IEEE 802.11i
8.9. Operational Security: Firewalls and Intrusion Detection Systems
8.9.1. Firewalls
8.9.2. Intrusion Detection Systems
8.10. Summary
Homework Problems and Questions
Wireshark Lab
IPsec Lab
Interview: Steven M. Bellovin
9. Multimedia Networking
9.1. Multimedia Networking Applications
9.1.1. Properties of Video
9.1.2. Properties of Audio
9.1.3. Types of Multimedia Network Applications
9.2. Streaming Stored Video
9.2.1. UDP Streaming
9.2.2. HTTP Streaming
9.3. Voice-over-IP
9.3.1. Limitations of the Best-Effort IP Service
9.3.2. Removing Jitter at the Receiver for Audio
9.3.3. Recovering from Packet Loss
9.3.4. Case Study: VoIP with Skype
9.4. Protocols for Real-Time Conversational Applications
9.4.1. RTP
9.4.2. SIP
9.5. Network Support for Multimedia
9.5.1. Dimensioning Best-Effort Networks
9.5.2. Providing Multiple Classes of Service
9.5.3. Diffserv
9.5.4. Per-Connection Quality-of-Service (QoS) Guarantees: Resource Reservation and Call Admission
9.6. Summary
Homework Problems and Questions
Programming Assignment
Interview: Henning Schulzrinne
References
Index (direct linking)
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Back Cover
GLOBAL EDITION Computer Networking A Top-Down Approach SEVENTH EDITION Kurose • Ross
Digital Resources for Students Your new textbook provides 12-month access to digital resources that may include VideoNotes, interactive exercises, programming assignments, Wireshark labs, additional technical material, and more. Refer to the preface in the textbook for a detailed list of resources. Follow the instructions below to register for the Companion Website for Computer Networking: A Top-Down Approach, Seventh Edition. 1. Go to www.pearsonglobaleditions.com/kurose 2. Find the title of your textbook. 3. Click Companion Website 4. Click Register and follow the on-screen instructions to create a login name and password. Use a coin to scratch of the coating and reveal your access code. Do not use a sharp knife or other sharp object as it may damage the code. Use the login name and password you created during registration to start using the digital resources that accompany your textbook. This access code can only be used once. This subscription is valid for 12 months upon activation and is not transferrable. If the access code has already been revealed it may no longer be valid. IMPORTANT: For technical support go to https://support.pearson.com/getsupport
###E###
Vice President, Editorial Director, ECS: Marcia Horton Acquisitions Editor: Matt Goldstein Editorial Assistant: Kristy Alaura Acquisitions Editor, Global Editions: Aditee Agarwal Vice President of Marketing: Christy Lesko Director of Field Marketing: Tim Galligan Product Marketing Manager: Bram Van Kempen Field Marketing Manager: Demetrius Hall Marketing Assistant: Jon Bryant Director of Product Management: Erin Gregg Team Lead, Program and Project Management: Scott Disanno Project Editor, Global Editions: K.K. Neelakantan Senior Manufacturing Controller, Global Editions: Kay Holman Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia Cover Designer: Lumina Datamatics Manager, Rights and Permissions: Ben Ferrini Project Manager, Rights and Permissions: Jenny Hoffman, Aptara Corporation Inventory Manager: Ann Lam Cover Image: ISebyI/Shutterstock.com Media Project Manager: Steve Wright Media Production Manager, Global Editions: Program Manager: Joanne Manning and Carole Snyder Project Manager: Katrina Ostler, Ostler Editorial, Inc. Vikram Kumar Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2017 The rights of James F. Kurose and Keith W. Ross to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988. Authorized adaptation from the United States edition, entitled Computer Networking: A Top-Down Approach, Seventh Edition, ISBN 978-0-13-359414-0, by James F. Kurose and Keith W. Ross published by Pearson Education © 2017. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS. All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 10 9 8 7 6 5 4 3 2 1 ISBN 10: 1-292-15359-8 ISBN 13: 978-1-292-15359-9 Typeset by Cenveo Publisher Services Printed and bound in Malaysia.
About the Authors Jim Kurose Jim Kurose is a Distinguished University Professor of Computer Science at the University of Massachusetts, Amherst. He is currently on leave from the University of Massachusetts, serving as an Assistant Director at the US National Science Foundation, where he leads the Directorate of Computer and Information Science and Engineering. Dr. Kurose has received a number of recognitions for his educational activ- ities including Outstanding Teacher Awards from the National Technological University (eight times), the University of Massachusetts, and the Northeast Association of Graduate Schools. He received the IEEE Taylor Booth Education Medal and was recognized for his leadership of Massachusetts’ Commonwealth Information Technology Initiative. He has won several confer- ence best paper awards and received the IEEE Infocom Achievement Award and the ACM Sigcomm Test of Time Award. Dr. Kurose is a former Editor-in-Chief of IEEE Transactions on Communications and of IEEE/ACM Transactions on Networking. He has served as Technical Program co-Chair for IEEE Infocom, ACM SIGCOMM, ACM Internet Measurement Conference, and ACM SIGMETRICS. He is a Fellow of the IEEE and the ACM. His research interests include network proto- cols and architecture, network measurement, multimedia communication, and modeling and performance evaluation. He holds a PhD in Computer Science from Columbia University. Keith Ross Keith Ross is the Dean of Engineering and Computer Science at NYU Shanghai and the Leonard J. Shustek Chair Professor in the Computer Science and Engineering Department at NYU. Previously he was at University of Pennsylvania (13 years), Eurecom Institute (5 years) and Polytechnic University (10 years). He received a B.S.E.E from Tufts University, a M.S.E.E. from Columbia University, and a Ph.D. in Computer and Control Engineering from The University of Michigan. Keith Ross is also the co-founder and original CEO of Wimba, which develops online multimedia applications for e-learning and was acquired by Blackboard in 2010. Professor Ross’s research interests are in privacy, social networks, peer-to-peer networking, Internet measurement, content distribution networks, and stochastic modeling. He is an ACM Fellow, an IEEE Fellow, recipient 3
4 ABOUT THE AUTHORS of the Infocom 2009 Best Paper Award, and recipient of 2011 and 2008 Best Paper Awards for Multimedia Communications (awarded by IEEE Communications Society). He has served on numerous journal editorial boards and conference program committees, including IEEE/ACM Transactions on Networking, ACM SIGCOMM, ACM CoNext, and ACM Internet Measurement Conference. He also has served as an advisor to the Federal Trade Commission on P2P file sharing.
To Julie and our three precious ones—Chris, Charlie, and Nina JFK A big THANKS to my professors, colleagues, and students all over the world. KWR
This page intentionally left blank
分享到:
收藏