Computer Networks. 5th ed. hardcover 912 p.
Tanenbaum, Andrew S., Wetherall, David 著
目次
CHAPTER 1 INTRODUCTION 1.1 USES OF COMPUTER NETWORKS 1.1.1 BusinessApplications 1.1.2 Home Applications 1.1.3 Mobile Users 1.1.4 SocialIssues 1.2 NETWORK HARDWARE 1.2.1 Personal Area Networks 1.2.2 LocalArea Networks 1.2.3 Metropolitan Area Networks +1.2.4 Wide Area Networks1.2.5 Internetworks 1.3 NETWORK SOFTWARE 1.3.1 Protocol Hierarchies1.3.2 Design Issues for the Layers 1.3.3 Connection-Oriented VersusConnectionless Service 1.3.4 Service Primitives 1.3.5 The Relationship ofServices to Protocols 1.4 REFERENCE MODELS 1.4.1 The OSI Reference Model1.4.2 The TCP/IP Reference Model 1.4.3 The Model Used in this Book**1.4.4 A Comparison of the OSI and TCP/IP Reference Models **1.4.5 ACritique of the OSI Model and Protocols **1.4.6 A Critique of the TCP/IPReference Model 1.5 EXAMPLE NETWORKS +1.5.1 The Internet +**1.5.2Third-Generation Mobile Phone Networks +**1.5.3 Wireless LANs: 802.11++**1.5.4 RFID and Sensor Networks **1.6 NETWORK STANDARDIZATION **1.6.1Who's Who in the Telecommunications World **1.6.2 Who's Who in theInternational Standards World **1.6.3 Who's Who in the Internet StandardsWorld 1.7 METRIC UNITS 1.8 OUTLINE OF THE REST OF THE BOOK 1.9 SUMMARYCHAPTER 2 THE PHYSICAL LAYER 2.1 THE THEORETICAL BASIS FOR DATACOMMUNICATION 2.1.1 Fourier Analysis 2.1.2 Bandwidth-Limited Signals2.1.3 The Maximum Data Rate of a Channel 2.2 GUIDED TRANSMISSION MEDIA2.2.1 Magnetic Media 2.2.2 Twisted Pairs 2.2.3 Coaxial Cable ++2.2.4Power Lines 2.2.5 Fiber Optics 2.3 WIRELESS TRANSMISSION +2.3.1 TheElectromagnetic Spectrum 2.3.2 Radio Transmission +2.3.3 MicrowaveTransmission +**2.3.4 Infrared Transmission +**2.3.5 Light Transmission**2.4 COMMUNICATION SATELLITES **2.4.1 Geostationary Satellites **2.4.2Medium-Earth Orbit Satellites **2.4.3 Low-Earth Orbit Satellites **2.4.4Satellites Versus Fiber 2.5 DIGITAL MODULATION AND MULTIPLEXING ++2.5.1Baseband Transmission ++2.5.2 Passband Transmission +2.5.3 FrequencyDivision Multiplexing 2.5.4 Time Division Multiplexing +2.5.5 CodeDivision Multiplexing 2.6 THE PUBLIC SWITCHED TELEPHONE NETWORK 2.6.1Structure of the Telephone System 2.6.2 The Politics of Telephones +2.6.3The Local Loop: Modems, ADSL, and Fiber 2.6.4 Trunks and Multiplexing2.6.5 Switching **2.7 THE MOBILE TELEPHONE SYSTEM **2.7.1First-Generation (1G) Mobile Phones: Analog Voice **2.7.2 Second-Generation(2G) Mobile Phones: Digital Voice +**2.7.3 Third-Generation (3G) MobilePhones: Digital Voice and Data **2.8 CABLE TELEVISION **2.8.1 CommunityAntenna Television **2.8.2 Internet over Cable **2.8.3 SpectrumAllocation **2.8.4 Cable Modems **2.8.5 ADSL Versus Cable 2.9 SUMMARYCHAPTER 3 THE DATA LINK LAYER 3.1 DATA LINK LAYER DESIGN ISSUES 3.1.1Services Provided to the Network Layer 3.1.2 Framing 3.1.3 Error Control3.1.4 Flow Control +3.2 ERROR DETECTION AND CORRECTION +3.2.1Error-Correcting Codes +3.2.2 Error-Detecting Codes 3.3 ELEMENTARY DATALINK PROTOCOLS 3.3.1 A Utopian Simplex Protocol 3.3.2 A SimplexStop-and-Wait Protocol for an Error-Free Channel 3.3.3 A SimplexStop-and-Wait Protocol for a Noisy Channel 3.4 SLIDING WINDOW PROTOCOLS3.4.1 A One-Bit Sliding Window Protocol 3.4.2 A Protocol Using Go-Back-N3.4.3 A Protocol Using Selective Repeat 3.5 EXAMPLE DATA LINK PROTOCOLS++3.5.1 Packet over SONET ++3.5.2 ADSL (Asymmetric Digital SubscriberLoop) 3.6 SUMMARY CHAPTER 4 THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THECHANNEL ALLOCATION PROBLEM 4.1.1 Static Channel Allocation 4.1.2Assumptions for Dynamic Channel Allocation 4.2 MULTIPLE ACCESS PROTOCOLS4.2.1 ALOHA 4.2.2 Carrier Sense Multiple Access Protocols +4.2.3Collision-Free Protocols 4.2.4 Limited-Contention Protocols 4.2.5Wireless LAN Protocols 4.3 ETHERNET 4.3.1 Classic Ethernet Physical Layer4.3.2 Classic Ethernet MAC Sublayer Protocol 4.3.3 Ethernet Performance4.3.4 Switched Ethernet 4.3.5 Fast Ethernet +4.3.6 Gigabit Ethernet+4.3.7 10 Gigabit Ethernet 4.3.8 Retrospective on Ethernet 4.4 WIRELESSLANS 4.4.1 The 802.11 Architecture and Protocol Stack +4.4.2 The 802.11Physical Layer +4.4.3 The 802.11 MAC Sublayer Protocol 4.4.4 The 802.11Frame Structure 4.4.5 Services +**4.5 BROADBAND WIRELESS +**4.5.1Comparison of 802.16 with 802.11 and 3G +**4.5.2 The 802.16 Architectureand Protocol Stack +**4.5.3 The 802.16 Physical Layer +**4.5.4 The 802.16MAC Sublayer Protocol +**4.5.5 The 802.16 Frame Structure **4.6 BLUETOOTH**4.6.1 Bluetooth Architecture **4.6.2 Bluetooth Applications **4.6.3The Bluetooth Protocol Stack **4.6.4 The Bluetooth Radio Layer **4.6.5The Bluetooth Link Layers **4.6.6 The Bluetooth Frame Structure ++**4.7RFID ++**4.7.1 EPC Gen 2 Architecture ++**4.7.2 EPC Gen 2 Physical Layer++**4.7.3 EPC Gen 2 Tag Identification Layer ++**4.7.4 Tag IdentificationMessage Formats 4.8 DATA LINK LAYER SWITCHING 4.8.1 Uses of Bridges+4.8.2 Learning Bridges +4.8.3 Spanning Tree Bridges 4.8.4 Repeaters,Hubs, Bridges, Switches, Routers, and Gateways +4.8.5 Virtual LANs 4.9SUMMARY CHAPTER 5 THE NETWORK LAYER 5.1 NETWORK LAYER DESIGN ISSUES5.1.1 Store-and-Forward Packet Switching 5.1.2 Services Provided to theTransport Layer 5.1.3 Implementation of Connectionless Service 5.1.4Implementation of Connection-Oriented Service 5.1.5 Comparison ofVirtual-Circuit and Datagram Networks 5.2 ROUTING ALGORITHMS 5.2.1 TheOptimality Principle 5.2.2 Shortest Path Algorithm 5.2.3 Flooding 5.2.4Distance Vector Routing 5.2.5 Link State Routing 5.2.6 HierarchicalRouting 5.2.7 Broadcast Routing +5.2.8 Multicast Routing ++**5.2.9Anycast Routing 5.2.10 Routing for Mobile Hosts **5.2.11 Routing in AdHoc Networks 5.3 CONGESTION CONTROL ALGORITHMS 5.3.1 Approaches toCongestion Control 5.3.2 Traffic-Aware Routing 5.3.3 Admission Control5.3.4 Traffic Throttling +5.3.5 Load Shedding 5.4 QUALITY OF SERVICE5.4.1 Application Requirements +5.4.2 Traffic Shaping +5.4.3 PacketScheduling +5.4.4 Admission Control 5.4.5 Integrated Services 5.4.6Differentiated Services 5.5 INTERNETWORKING 5.5.1 How Networks Differ5.5.2 How Networks Can Be Connected +5.5.3 Tunneling +5.5.4 InternetworkRouting +5.5.5 Packet Fragmentation 5.6 THE NETWORK LAYER IN THE INTERNET5.6.1 The IP Version 4 Protocol +5.6.2 IP Addresses **5.6.3 IP Version6 +5.6.4 Internet Control Protocols 5.6.5 Label Switching and MPLS+5.6.6 OSPF--An Interior Gateway Routing Protocol +5.6.7 BGP--The ExteriorGateway Routing Protocol **5.6.8 Internet Multicasting **5.6.9 Mobile IP5.7 SUMMARY CHAPTER 6 THE TRANSPORT LAYER 6.1 THE TRANSPORT SERVICE6.1.1 Services Provided to the Upper Layers 6.1.2 Transport ServicePrimitives 6.1.3 Berkeley Sockets 6.1.4 An Example of Socket Programming:An Internet File Server 6.2 ELEMENTS OF TRANSPORT PROTOCOLS 6.2.1Addressing 6.2.2. Connection Establishment 6.2.3 Connection Release6.2.4 Flow Control and Buffering 6.2.5 Multiplexing 6.2.6 Crash Recovery++6.3 CONGESTION CONTROL ALGORITHMS ++6.3.1 Desirable BandwidthAllocation ++6.3.2 Regulating the Sending Rate ++6.3.3 Wireless Issues6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP 6.4.1 Introduction to UDP**6.4.2 Remote Procedure Call +6.4.3 The Real-Time Transport Protocol 6.5THE INTERNET TRANSPORT PROTOCOLS: TCP 6.5.1 Introduction to TCP 6.5.2The TCP Service Model 6.5.3 The TCP Protocol 6.5.4 The TCP Segment Header6.5.5 TCP Connection Establishment 6.5.6 TCP Connection Release 6.5.7TCP Connection Management Modeling 6.5.8 TCP Transmission Policy 6.5.9TCP Timer Management ++6.5.10 TCP Congestion Control ++6.5.11 The Futureof TCP **6.6 PERFORMANCE ISSUES **6.6.1 Performance Problems in ComputerNetworks **6.6.2 Network Performance Measurement **6.6.3 Host Design forFast Networks **6.6.4 Fast Segment Processing ++**6.6.5 HeaderCompression **6.6.6 Protocols for Long Fat Networks ++**6.7 DELAYTOLERANT NETWORKS ++**6.7.1 DTN Architecture ++**6.7.2 The BundleProtocol 6.8 SUMMARY CHAPTER 7 THE APPLICATION LAYER 7.1 DNS--THEDOMAIN NAME SYSTEM 7.1.2 The DNS Name Space 7.1.3 Resource Records 7.1.4Name Servers +**7.2 ELECTRONIC MAIL +**7.2.1 Architecture and Services+**7.2.2 The User Agent **7.2.3 Message Formats +**7.2.4 MessageTransfer +**7.2.5 Final Delivery +7.3 THE WORLD WIDE WEB +7.3.1Architectural Overview +7.3.2 Static Web Pages +7.3.3 Dynamic Web Pagesand Web Applications +7.3.4 HTTP--The HyperText Transfer Protocol +**7.3.5Mobile Web ++**7.3.6 Web Search 7.4 REALTIME AUDIO AND VIDEO 7.4.1Introduction to Digital Audio 7.4.2 Audio Compression 7.4.3 StreamingAudio 7.4.4 Internet Radio 7.4.5 Voice over IP 7.4.6 Introduction toVideo 7.4.7 Video Compression 7.4.8 Video on Demand ++7.5 CONTENTDELIVERY AND PEER-TO-PEER ++7.5.1 Server Replication ++7.5.2 ContentDelivery Networks ++7.5.3 Peer-to-Peer Networks ++7.5.4 Overlay Networks7.5 SUMMARY CHAPTER 8 NETWORK SECURITY 8.1 CRYPTOGRAPHY 8.1.1Introduction to Cryptography 8.1.2 Substitution Ciphers 8.1.3Transposition Ciphers 8.1.4 One-Time Pads 8.1.5 Two FundamentalCryptographic Principles 8.2 SYMMETRIC-KEY ALGORITHMS 8.2.1 DES--The DataEncryption Standard 8.2.2 AES--The Advanced Encryption Standard 8.2.3Cipher Modes 8.2.4 Other Ciphers 8.2.5 Cryptanalysis 8.3 PUBLIC-KEYALGORITHMS 8.3.1 RSA 8.3.2 Other Public-Key Algorithms 8.4 DIGITALSIGNATURES 8.4.1 Symmetric-Key Signatures 8.4.2 Public-Key Signatures8.4.3 Message Digests 8.4.4 The Birthday Attack 8.5 MANAGEMENT OF PUBLICKEYS 8.5.1 Certificates 8.5.2 X.509 8.5.3 Public Key Infrastructures8.6 COMMUNICATION SECURITY 8.6.1 IPsec +8.6.2 Firewalls +8.6.3 VirtualPrivate Networks +8.6.4 Wireless Security 8.7 AUTHENTICATION PROTOCOLS8.7.1 Authentication Based on a Shared Secret Key **8.7.2 Establishing aShared Key: The Diffie-Hellman Key Exchange **8.7.3 Authentication Using aKey Distribution Center +**8.7.4 Authentication Using Kerberos 8.7.5Authentication Using Public-Key Cryptography **8.8 EMAIL SECURITY **8.8.1PGP--Pretty Good Privacy **8.8.2 S/MIME 8.9 WEB SECURITY 8.9.1 Threats8.9.2 Secure Naming 8.9.3 SSL--The Secure Sockets Layer +8.9.4 MobileCode Security 8.10 SOCIAL ISSUES 8.10.1 Privacy 8.10.2 Freedom ofSpeech 8.10.3 Copyright 8.11 SUMMARY CHAPTER 9 READING LIST ANDBIBLIOGRAPHY **9.1 SUGGESTIONS FOR FURTHER READING **9.1.1 Introductionand General Works **9.1.2 The Physical Layer **9.1.3 The Data Link Layer**9.1.4 The Medium Access Control Sublayer **9.1.5 The Network Layer**9.1.6 The Transport Layer **9.1.7 The Application Layer **9.1.8Network Security ++9.2 ALPHABETICAL BIBLIOGRAPHY