图书介绍

控制协议/因特网协议经典教程 TCP/IP 英文版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

控制协议/因特网协议经典教程 TCP/IP 英文版
  • 特洛华·梅蒂著 著
  • 出版社: 北京:北京希望电子出版社
  • ISBN:7900071172
  • 出版时间:2001
  • 标注页数:751页
  • 文件大小:72MB
  • 文件页数:767页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

控制协议/因特网协议经典教程 TCP/IP 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART ONE Architecture and Core Protocols1

CHAPTER 1 Introduction to TCP/IP-History,Architecture and Standards2

1.1 Internet History-Where It All Came From3

1.1.1 Internetworks4

1.1.2 The Internet5

1.1.3 ARPANET5

1.1.4 NSFNET6

1.1.5 Commercial Use of the Internet8

1.1.6 Information Superhighway9

1.1.7 Internet210

1.1.8 The Open Systems Interconnect(OSI)Model10

1.2 TCP/IP Architectural Model-What It Is All About12

1.2.1 Internetworking12

1.2.2 The TCP/IP Protocol Stack14

1.2.3 TCP/IP Applications16

1.2.4 Bridges,Routers and Gateways17

1.3 Finding Standards for TCP/IP and the Internet19

1.3.1 Request For Comments(RFC)20

1.3.2 Internet Standards22

1.3.3 Major Internet Protocols23

1.4 Future of the Internet24

1.5 IBM and the Internet25

1.5.1 The Network Computing Framework25

CHAPTER 2 Internetworking and Transport Layer Protocols32

2.1 Internet Protocol(IP)33

2.1.1 IP Addressing34

2.1.2 IP Subnets37

2.1.3 IP Routing41

2.1.4 Methods of Delivery-Unicast,Broadcast,Multicast and Anycast47

2.1.5 The IP Address Exhaustion Problem49

2.1.6 Intranets(Private IP Addresses)52

2.1.7 Classless Inter-Domain Routing(CIDR)53

2.1.8 IP Datagram56

2.2 Internet Control Message Protocol(ICMP)67

2.2.1 ICMP Messages68

2.2.2 ICMP Applications76

2.3 Internet Group Management Protocol(IGMP)77

2.4 Address Resolution Protocol(ARP)78

2.4.1 ARP Overview78

2.4.2 ARP Detailed Concept78

2.4.3 ARP and Subnets80

2.4.4 Proxy-ARP or Transparent Subnetting81

2.5 Reverse Address Resolution Protocol(RARP)83

2.5.1 RARP Concept83

2.6 Ports and Sockets84

2.6.1 Ports84

2.6.2 Sockets85

2.7 User Datagram Protocol(UDP)86

2.7.1 UDP Datagram Format87

2.7.2 UDP Application Programming Interface88

2.8 Transmission Control Protocol(TCP)89

2.8.1 TCP Concept89

2.8.2 TCP Application Programming Interface100

2.8.3 TCP Congestion Control Algorithms101

2.9 References105

CHAPTER 3 Routing Protocols108

3.1 Basic IP Routing109

3.1.1 Routing Processes111

3.1.2 Autonomous Systems112

3.2 Routing Algorithms113

3.2.1 Static Routing113

3.2.2 Distance Vector Routing114

3.2.3 Link State Routing119

3.3 Interior Gateway Protocols(IGP)121

3.3.1 Routing Information Protocol(RIP)121

3.3.2 Routing Information Protocol Version 2(RIP-2)123

3.3.3 RIPng for IPv6126

3.3.4 Open Shortest Path First(OSPF)128

3.4 Exterior Routing Protocols150

3.4.1 Exterior Gateway Protocol(EGP)150

3.4.2 Border Gateway Protocol(BGP-4)151

3.5 References163

CHAPTER 4 Application Protocols164

4.1 Characteristics of Applications165

4.1.1 Client/Server Model166

4.2 Domain Name System(DNS)166

4.2.1 The Hierarchical Namespace167

4.2.2 Fully Qualified Domain Names(FQDNs)167

4.2.3 Generic Domains168

4.2.4 Country Domains169

4.2.5 Mapping Domain Names to IP Addresses169

4.2.6 Mapping IP Addresses to Domain Names-Pointer Queries170

4.2.7 The Distributed Name Space170

4.2.8 Domain Name Resolution170

4.2.9 Domain Name System Resource Records174

4.2.10 Domain Name System Messages176

4.2.11 A Simple Scenario180

4.2.12 Extended Scenario182

4.2.13 Transport183

4.2.14 DNS Applications184

4.2.15 References184

4.3 TELNET184

4.3.1 TELNET Operation185

4.3.2 Terminal Emulation(Telnet 3270)191

4.3.3 TN3270 Enhancements(TN3270E)192

4.3.4 References194

4.4 File Transfer Protocol(FTP)194

4.4.1 Overview of FTP194

4.4.2 FTP Operations195

4.4.3 Reply Codes197

4.4.4 FTP Scenario198

4.4.5 A Sample FTP Session199

4.4.6 Anonymous FTP199

4.4.7 Remote Job Entry Using FTP199

4.5 Trivial File Transfer Protocol(TFTP)199

4.5.1 TFTP Usage200

4.5.2 Protocol Description200

4.5.3 TFTP Multicast Option202

4.5.4 Security Issue202

4.6 Remote Execution Command Protocol(REXEC and RSH)202

4.6.1 Principle of Operation203

4.7 Simple Mail Transfer Protocol(SMTP)203

4.7.1 How SMTP Works205

4.7.2 SMTP and the Domain Name System211

4.7.3 References212

4.8 Multipurpose Internet Mail Extensions(MIME)213

4.8.1 How MIME Works215

4.8.2 The Content-Type Field216

4.8.3 The Content-Transfer-Encoding Field222

4.8.4 Using Non-ASCII Characters in Message Headers227

4.8.5 References228

4.9 Post Office Protocol(POP)229

4.9.1 POP3 Commands and Responses229

4.9.2 References230

4.10 Internet Message Access Protocol Version 4(IMAP4)231

4.10.1 IMAP4 Underlying Electronic Mail Models231

4.10.2 IMAP4 Commands and Responses231

4.10.3 Message Numbers232

4.10.4 IMAP4 States233

4.10.5 Client Commands234

4.10.6 References236

4.11 Network Management236

4.11.1 Standards237

4.11.2 Bootstrap Protocol(BOOTP)237

4.11.3 Structure and Identification of Management Information(SMI)237

4.11.4 Management Information Base(MIB)239

4.11.5 Simple Network Management Protocol(SNMP)243

4.11.6 Simple Network Management Protocol Version 2(SNMPv2)245

4.11.7 MIB for SNMPv2248

4.11.8 Single Authentication and Privacy Protocol249

4.11.9 The New Administrative Model250

4.11.10 Simple Network Management Protocol Version 3(SNMPv3)251

4.11.11 References252

4.12 Remote Printing(LPR and LPD)253

4.13 Network File System(NFS)253

4.13.1 NFS Concept254

4.13.2 WebNFS258

4.13.3 References259

4.14 X Window System259

4.14.1 Functional Concept260

4.14.2 Protocol264

4.15 Finger Protocol264

4.16 NETSTAT265

4.17 Network Information System(NIS)265

4.18 NetBIOS over TCP/IP266

4.18.1 NetBIOS over TCP/IP in IBM OS/2 Warp 4268

4.18.2 NetBIOS over TCP/IP in Microsoft Windows Systems270

4.18.3 NetBIOS Name Server(NBNS)Implementations272

4.19 Application Programming Interfaces(APIs)273

4.19.1 The Socket API273

4.19.2 Remote Procedure Call(RPC)277

4.19.3 Windows Sockets Version 2(Winsock V2.0)281

4.19.4 SNMP Distributed Programming Interface(SNMP DPI)281

4.19.5 FTP API284

4.19.6 CICS Socket Interface285

4.19.7 IMS Socket Interface285

4.19.8 Sockets Extended285

4.19.9 REXX Sockets286

PART TWO Special Purpose Protocols and New Technologies288

CHAPTER 5 TCP/IP Security Overview290

5.1.1 Common Attacks Against Security291

5.1 Security Exposures and Solutions291

5.1.2 Solutions to Network Security Problems292

5.1.3 Implementations of Security Solutions293

5.1.4 Network Security Policy295

5.2 A Short Introduction to Cryptography296

5.2.1 Terminology296

5.2.2 Symmetric or Secret-Key Algorithms298

5.2.3 Asymmetric or Public-Key Algorithms299

5.2.4 Hash Functions303

5.2.5 Digital Certificates and Certification Authorities307

5.2.6 Random-Number Generators309

5.2.7 Export/Import Restrictions on Cryptography309

5.3 Firewalls310

5.3.1 Firewall Concept311

5.3.2 Components of A Firewall System312

5.3.3 Packet-Filtering Router312

5.3.4 Application Level Gateway(Proxy)314

5.3.5 Circuit Level Gateway318

5.3.6 Firewall Examples319

5.4 Network Address Translation(NAT)323

5.4.1 NAT Concept324

5.4.2 Translation Mechanism325

5.4.3 NAT Limitations327

5.5 The IP Security Architecture(IPSec)327

5.5.1 Concepts328

5.5.2 Authentication Header(AH)330

5.5.3 Encapsulating Security Payload(ESP)334

5.5.4 Combining IPSec Protocols339

5.5.5 The Internet Key Exchange Protocol(IKE)344

5.5.6 References358

5.6 SOCKS359

5.6.1 SOCKS Version 5(SOCKSv5)360

5.7 Secure Sockets Layer(SSL)364

5.7.1 SSL Overview364

5.7.2 SSL Protocol366

5.8 Transport Layer Security(TLS)371

5.9 Secure Multipurpose Internet Mail Extension(S-MIME)371

5.10 Virtual Private Networks(VPN)Overview372

5.10.1 VPN Introduction and Benefits372

5.11 Kerberos Authentication and Authorization System373

5.11.1 Assumptions374

5.11.2 Naming374

5.11.3 Kerberos Authentication Process375

5.11.4 Kerberos Database Management378

5.11.5 Kerberos Authorization Model379

5.11.6 Kerberos Version 5 Enhancements379

5.12 Remote Access Authentication Protocols380

5.13 Layer 2 Tunneling Protocol(L2TP)382

5.13.1 Terminology382

5.13.2 Protocol Overview383

5.13.3 L2TP Security Issues385

5.14 Secure Electronic Transactions(SET)386

5.14.1 SET Roles386

5.14.2 SET Transactions387

5.14.3 The SET Certificate Scheme389

5.15 References391

CHAPTER 6 IP Version 6392

6.2 The IPv6 Header Format394

6.1 IPv6 Overview394

6.2.1 Packet Sizes397

6.2.2 Extension Headers398

6.2.3 IPv6 Addressing404

6.2.4 Priority409

6.2.5 Flow Labels409

6.3 Internet Control Message Protocol Version 6(ICMPv6)409

6.3.1 Neighbor Discovery411

6.3.2 Stateless Address Autoconfiguration419

6.3.3 Multicast Listener Discovery(MLD)421

6.4 DNS in IPv6423

6.4.1 Format of IPv6 Resource Records423

6.5 DHCP in IPv6426

6.5.1 Differences between DHCPv6 and DHCPv4426

6.5.2 DHCPv6 Messages427

6.6 Mobility Support in IPv6428

6.7 Internet Transition-Migrating from IPv4 to IPv6428

6.7.1 Dual IP Stack Implementation-The IPv6/IPv4 Node429

6.7.2 Tunneling430

6.7.3 Header Translation435

6.7.4 Interoperability Summary435

6.8 The Drive Towards IPv6436

6.9 References437

CHAPTER 7 Dynamic IP,Mobile IP and Network Computers438

7.1 Bootstrap Protocol(BOOTP)439

7.1.1 BOOTP Forwarding443

7.1.2 BOOTP Considerations444

7.2 Dynamic Host Configuration Protocol(DHCP)444

7.2.1 The DHCP Message Format445

7.2.2 DHCP Message Types447

7.2.3 Allocating a New Network Address448

7.2.4 DHCP Lease Renewal Process449

7.2.5 Reusing a Previously Allocated Network Address451

7.2.6 Configuration Parameters Repository451

7.2.7 DHCP Considerations452

7.2.8 BOOTP and DHCP Interoperability452

7.3 Dynamic Domain Name System453

7.3.1 The UPDATE DNS Message Format454

7.3.2 IBM s Implementation of DDNS456

7.3.3 Proxy A Record Update(ProxyArec)464

7.4 Mobile IP466

7.4.1 Mobile IP Overview466

7.4.2 Mobile IP Operation467

7.4.3 Mobility Agent Advertisement Extensions468

7.4.4 Mobile IP Registration Process470

7.4.5 Tunneling472

7.4.6 Broadcast Datagrams473

7.4.7 Move Detection473

7.4.8 ARP Considerations474

7.4.9 Mobile IP Security Considerations474

7.5 IP Masquerading475

7.6 The Network Computer475

7.7 References476

CHAPTER 8 Internet Protocols and Applications478

8.1 The World Wide Web(WWW)479

8.1.1 Web Browsers480

8.1.2 Web Servers480

8.1.3 Web Server Application Technologies481

8.2 Hypertext Transfer Protocol(HTTP)483

8.2.1 Overview of HTTP483

8.2.2 HTTP Operation484

8.3 Hypertext Markup Language(HTML)492

8.4 The Extensible Markup Language(XML)492

8.5 Java493

8.5.1 Java Components Overview493

8.5.2 JavaScript495

8.5.3 Java in the World Wide Web496

8.5.4 Java Security496

8.5.5 Distributed Objects498

8.6.1 Business Requirements499

8.6 Accessing Legacy Applications from the Web499

8.6.2 Technical Issues500

8.6.3 Security Issues501

8.6.4 IBM e-business Solutions501

8.7 Network News Transfer Protocol(NNTP)504

8.8 Gopher505

8.9 Internet2507

8.9.1 Mission508

8.9.2 Project Description508

8.9.3 Internet2 and NGI510

CHAPTER 9 Multicast and Multimedia512

9.1 Multicasting513

9.2 Internet Group Management Protocol(IGMP)516

9.2.2 IGMP Operation516

9.3.1 Distance Vector Multicast Routing Protocol(DVMRP)519

9.3 Multicast Routing Protocols519

9.3.2 Multicast OSPF(MOSPF)524

9.3.3 Protocol Independent Multicast(PIM)525

9.4 The Multicast Backbone530

9.4.1 MBONE Routing530

9.4.2 MBONE Applications532

9.5 The Real-Time Protocols RTP and RTCP533

9.5.1 The Real-Time Transport Protocol(RTP)533

9.5.2 The Real-Time Control Protocol538

9.5.3 RTP Translators and Mixers543

9.5.4 Real-Time Applications545

9.6 Voice over IP547

9.6.1 ITU-T Recommendation H.323548

9.6.2 Voice Compression(G.723.1 and G.729)551

9.6.3 The VoIP Protocol Stack552

9.7 References554

CHAPTER 10 Quality of Service556

10.1 Why QoS557

10.2 Integrated Services558

10.2.1 Service Classes560

10.2.2 The Reservation Protocol(RSVP)564

10.2.3 The Future of Integrated Services575

10.3 Differentiated Services576

10.3.1 Differentiated Services Architecture577

10.3.2 Using RSVP with Differentiated Services585

10.3.3 Configuration and Administration of DS Components with LDAP586

10.3.4 Using Differentiated Services with IPSec587

10.3.5 Internet Drafts on Differentiated Services589

10.4 References589

CHAPTER 11 Availability,Scalability and Load Balancing590

11.1 Virtual Router Redundancy Protocol(VRRP)592

11.1.1 Introduction593

11.1.2 VRRP Definitions594

11.1.3 VRRP Overview594

11.1.4 Sample Configuration595

11.1.5 VRRP Packet Format597

11.2 Round-Robin DNS599

11.3 IBM eNetwork Dispatcher600

11.3.1 eNetwork Dispatcher Components600

11.3.2 Load Balancing with Weights604

11.3.3 High Availability605

11.3.4 Server Affinity606

11.3.5 Rules-Based Balancing606

11.3.6 Wide Area Network Dispatcher607

11.3.7 Combining ISS and Dispatcher608

11.3.8 Advisors and Custom Advisors609

11.3.9 SNMP Support609

11.3.10 Co-Location Option610

11.3.11 ISP Configuration611

11.3.12 OS/390 Parallel Sysplex Support612

11.4 Alternative Solutions to Load Balancing613

11.4.1 Network Address Translation613

11.4.2 Encapsulation615

11.4.3 HTTP Redirection616

11.5 TCP/IP for OS/390 Using Workload Manager(WLM)616

11.5.1 Related Terminology and Products616

11.5.2 Overview of WLM617

11.6 OSPF Equal-Cost Multipath618

11.7 OS/390 VIPA Connection Recovery620

CHAPTER 12 Directory Protocols and Distributed Computing622

12.1 Introduction to the Distributed Computing Environment(DCE)623

12.1.1 DCE Directory Service624

12.1.2 DCE Security Service627

12.1.3 DCE Threads631

12.1.4 DCE Remote Procedure Call632

12.1.5 Distributed Time Service633

12.1.6 Distributed File Service(DFS)634

12.2 The Andrew File System(AFS)637

12.3 Lightweight Directory Access Protocol(LDAP)638

12.3.1 LDAP-Lightweight Access to X.500639

12.3.2 The LDAP Directory Server640

12.3.3 Overview of LDAP Architecture642

12.3.4 LDAP Models643

12.3.5 LDAP Security649

12.3.6 LDAP URLs651

12.3.7 LDAP and DCE652

12.3.8 The Directory-Enabled Networks Initiative(DEN)654

12.3.9 References654

PART THREE Connection Protocols and Platform Implementations656

CHAPTER 13 Connection Protocols658

13.1 Ethernet and IEEE 802.x Local Area Networks(LANs)659

13.2 Fiber Distributed Data Interface(FDDI)662

13.3 Asynchronous Transfer Mode(ATM)663

13.3.1 Address Resolution(ATMARP and InATMARP)663

13.3.2 Classical IP over ATM666

13.3.3 ATM LAN Emulation671

13.4 Data Link Switching:Switch-to-Switch Protocol674

13.3.4 Classical IP over ATM versus LAN Emulation674

13.4.1 Introduction675

13.4.2 Functional Description675

13.5 Serial Line IP(SLIP)677

13.6 Point-to-Point Protocol(PPP)678

13.6.1 Point-to-Point Encapsulation679

13.7 Integrated Services Digital Network(ISDN)679

13.8 TCP/IP and X.25681

13.9 Frame Relay683

13.9.1 Frame Format683

13.9.2 Interconnect Issues684

13.9.3 Data Link Layer Parameter Negotiation684

13.9.4 IP over Frame Relay685

13.10 PPP over SONET and SDH Circuits685

13.10.1 Physical Layer686

13.11 Multiprotocol Label Switching(MPLS)687

13.11.1 Forwarding Methods687

13.11.2 MPLS Usefulness688

13.12 Enterprise Extender688

13.12.1 Performance and Recovery689

13.13 Multiprotocol Transport Network(MPTN)689

13.13.1 Requirements for Mixed-Protocol Networking689

13.13.2 MPTN Architecture690

13.13.3 MPTN Methodology690

13.13.4 MPTN Major Components691

13.14 Multi-Path Channel+(MPC+)693

13.15 S/390 Open Systems Adapter 2694

13.15.1 OSA-2 Modes694

13.15.3 Open Systems Adapter/Support Facility(OSA/SF)696

13.15.2 S/390 Unit Addresses Correlate with OSA-2 LAN Port Numbers696

13.16 Multiprotocol over ATM(MPOA)697

13.16.1 Benefits of MPOA697

13.16.2 MPOA Logical Components698

13.16.3 MPOA Functional Components698

13.16.4 MPOA Operation700

13.17 Private Network-to-Network Interface(PNNI)701

13.17.1 PNNI Overview702

13.17.2 PNNI Routing702

13.17.3 PNNI Signalling705

13.18 References706

CHAPTER 14 Platform Implementations708

14.1.1 IBM OS/390 V2R6709

14.1 Software Operating System Implementations709

14.1.2 IBM TCP/IP V2R4 for VM715

14.1.3 IBM OS/400 V4R3718

14.1.4 IBM AIX 4.3723

14.1.5 IBM TCP/IP 4.1 for OS/2726

14.1.6 Functional Comparisons729

14.2 IBM Hardware Platform Implementations734

14.2.1 The IBM Nways Router Family735

14.2.2 The IBM Multiprotocol Switch Hub Family737

14.2.3 The IBM Workgroup Hubs and Workgroup Switches739

14.2.4 The IBM High Performance Controllers743

14.2.5 The IBM Nways Wide Area Switches743

14.2.6 Functional Comparisons744

APPENDIX A Special Notices748

热门推荐