Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

TCP/IP Protocol Family (4th Edition)

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Link: https://pan.baidu.com/s/1Pia2by1s83kiVXEyU-dPRg password: ruur

The World famous computer textbook selected TCP/IP Protocol Family (4th Edition) can be used as a teaching material for college students and graduate students, and it also has a good reference value for teaching and research personnel engaged in computer network, as well as engineers and technicians.

Catalogue

The first part is introduction and underlying technology.

Chapter 1 introduction 3

1.1 A brief history of development 3

1.1.1 arpa 3

1.1.2 the birth of the Internet 4

1.1.3 Transmission Control Protocol / Internet Protocol (tcp/ip) 4

1.1.4 mil 4

1.1.5 cs 5

1.1.6 nsf 5

1.1.7 ans 5

1.1.8 Today's Internet 5

1.1.9 backbone isp 6

1.1.10 area isp 6

1.1.11 Local isp 6

1.1.12 Chronicle 7

1.1.13 Development of the Internet 7

1.2 protocols and Standards 7

1.2.1 Protocol 7

1.2.2 Standard 8

1.3 Standardization Organization 8

.1.3.1 Standard creation Committee 9

1.3.2 Forum 10

1.3.3 Regulatory body 10

1.4 Internet standard 10

1.4.1 maturity 11

1.4.2 demand level 11

1.5 the governing body of the Internet 12

1.5.1 Internet Association (isoc) 13

1.5.2 Internet Architecture Research Committee (iab) 13

1.5.3 Internet Engineering (ietf) 13

1.5.4 Internet Research Department (irtf) 13

1.5.5 Internet numbering Authority and Internet name and number assignment Company 14

1.5.6 Network Information Center (nic) 14

1.6 Deep Reading 14

1.6.1 Books and papers 14

1.6.2 website 14

1.7 important terms 14

1.8 Summary of this chapter 15

1.9 practical arrangements 16

1.9.1 exercise 16

1.9.2 Research activities 16

Chapter 2 osi Model and tcp/ip Protocol Family 17

2.1 Protocol layering 17

2.1.1 hierarchical structure 18

2.1.2 Services 18

2.2 osi Model 19

2.2.1 hierarchical architecture 19

2.2.2 layer-to-layer communication 20

2.2.3 Encapsulation 21

2.2.4 layers in the osi model 21

2.2.5 osi summary of each layer 24

2.3 tcp/ip protocol family 25

2.3.1 comparison of osi and tcp/ip protocol families 25

2.3.2 layering of the tcp/ip protocol family 26

2.4 addressing 30

2.4.1 physical address 31

2.4.2 logical address 32

2.5 Deep Reading 35

2.5.1 reference books 35

2.5.2 rfc 35

2.6 important terms 35

2.7 Summary of this chapter 36

2.8 practical arrangements 36

2.8.1 exercise 36

2.8.2 Research activities 38

Chapter 3 underlying Technology 39

3.1 Wired Local area Network 39

3.1.1 ieee Standard 40

3.1.2 frame format 40

3.1.3 addressing 42

3.1.4 the development of Ethernet 43

3.1.5 Standard Ethernet 43

3.1.6 Fast Ethernet 47

3.1.7 Gigabit Ethernet 48

3.1.8 10g Ethernet 49

3.2 Wireless LAN 50

3.2.1 ieee 802.11 50

3.2.2 addressing mechanism 55

3.2.3 Bluetooth 57

3.3 Point-to-point WAN 59

3.3.1 56k modem 59

3.3.2 dsl Technology 60

3.3.3 Cable modem 61

3.3.4 t line 63

3.3.5 so 64

3.3.6 ppp 64

3.4 switched WAN 65

3.4.1 x.25 65

3.4.2 frame Relay 66

3.4.3 atm 66

3.5 connecting devices 70

3.5.1 transponder 70

3.5.2 Bridge 71

3.5.3 Router 73

3.6 in-depth reading 74

3.7 important terms 74

3.8 Summary of this chapter 75

3.9 practical arrangements 76

3.9.1 exercise 76

3.9.2 Research activities 77

The second part is the network layer

Chapter 4 introduction to the Network layer 81

4.1 introduction 81

4.2 Exchange 82

4.2.1 Circuit switching 82

4.2.2 packet switching 83

4.3 packet switching at the network layer 83

4.3.1 Connectionless Services 83

4.3.2 connection-oriented services 85

4.4 Services at the network layer 88

4.4.1 an example 89

4.4.2 logical addressing 90

4.4.3 Services provided by the source computer 90

4.4.4 Services provided by routers 91

4.4.5 Services provided by the destination computer 92

4.5 other issues related to the network layer 93

4.5.1 error Control 93

4.5.2 flow control 94

4.5.3 congestion control 94

4.6 further reading 96

4.7 important terms 96

4.8 Summary of this chapter 96

4.9 practical arrangements 97

4.9.1 exercise 97

Chapter 5 ipv4 address 98

5.1 introduction 98

5.1.1 address space 99

5.1.2 notation 99

5.1.3 address field 101

5.1.4 Operation 101

5.2 classified addressing 104

5.2.1 Classification 104

5.2.2 address class and address block 106

5.2.3 two-level addressing 107

5.2.4 an example 110

5.2.5 level 3 addressing: subnetting 112

5.2.6 Construction of supernet 114

5.3 unclassified addressing 115

5.3.1 variable length address block 116

5.3.2 two-level addressing 116

5.3.3 allocation of address blocks 120

5.3.4 Subnetting 121

5.4 Special address 125

5.4.1 Special address block 125

5.4.2 Special address 126 in each address block

5.5 nat 127

5.5.1 address Translation 127

5.5.2 convert Table 128

5.6 in-depth reading 129

5.6.1 reference Books 129

5.6.2 rfc 130

5.7 important terms 130

5.8 Summary of this chapter 130

5.9 practical arrangements 131

5.9.1 exercise 131

Chapter 6 delivery and forwarding of ip packets

6.1 delivery 135

6.1.1 Direct delivery 135

6.1.2 indirect delivery 136

6.2 forward 136

6.2.1 forwarding based on destination address 136

6.2.2 tag-based forwarding 148

6.3 the structure of the router 150

6.3.1 component 150

6.4 in-depth reading 153

6.4.1 reference Books 153

6.4.2 rfc 153

6.5 important term 153

6.6 Summary of this chapter 153

6.7 practical arrangements 154

6.7.1 exercise 154

6.7.2 Research activities 155

Chapter 7 Internet Protocol version 4 (ipv4) 156

7.1 introduction 156

7.2 Datagram 157

7.3 fragment 161

7.3.1 maximum transfer Unit (mtu) 161

7.3.2 Fields related to fragmentation 162

7.4 option 165

7.4.1 format 165

7.4.2 option type 166

7.5 testing and 171

7.5.1 calculate the check and 172 on the sending side

7.5.2 calculate the check and 172 at the receiving end

7.5.3 Inspection and 173in ip grouping

7.6 ip runs on atm 174

7.6.1 atm wide area network 174

7.6.2 routing of cells 175

7.7 Security 176

7.7.1 Security questions 176

7.7.2 ipsec 176

7.8 ip package 177

7.8.1 first add module 178

7.8.2 processing module 178

7.8.3 queue 179

7.8.4 routing Table 179

7.8.5 forwarding module 179

7.8.6 mtu Table 179

7.8.7 sharding module 180

7.8.8 reinstall Table 181

7.8.9 reinstall module 181

7.9 in-depth reading 182

7.9.1 reference Book 182

7.9.2 rfc 182

7.10 important term 182

7.11 Summary of this chapter 183

7.12 practical arrangements 184

7.12.1 exercise 184

7.12.2 Research activities 185

Chapter 8 address Resolution Protocol (arp) 186

8.1 address Mapping 186

8.1.1 static mapping 187

8.1.2 dynamic mapping 187

8.2 arp protocol 187

8.2.1 grouping format 189

8.2.2 Encapsulation 190

8.2.3 Operation 190

8.2.4 Agent arp 192

8.3 atmarp 193

8.3.1 grouping format 193

8.3.2 Operation of atmarp 194

8.3.3 logical ip Subnet (lis) 197

8.4 arp package 197

8.4.1 cache table 198

8.4.2 queue 199

8.4.3 output module 199

8.4.4 input module 200

8.4.5 cache control module 201

8.4.6 more examples 203

8.5 in-depth reading 204

8.5.1 reference Books 204

8.5.2 rfc 205

8.6 important term 205

8.7 Summary of this chapter 205

8.8 practical arrangements 206

8.8.1 exercise 206

Chapter 9 Internet Control message Protocol (icmp) 207

9.1 introduction 207

9.2 message 208

9.2.1 message format 208

9.2.2 error report message 209

9.2.3 Enquiry 214

9.2.4 Inspection and 216

9.3 debugging tool 217

9.3.1 ping 217

9.3.2 traceroute 219

9.4 icmp package 221

9.4.1 input module 222

9.4.2 output module 222

9.5 in-depth reading 223

9.5.1 reference Books 223

9.5.2 rfc 224

9.6 important terminology 224

9.7 Summary of this chapter 224

9.8 practice arrangement 224

9.8.1 exercise 224

9.8.2 Research activities 226

Chapter 10 Mobile ip 227

10.1 addressing 227

10.1.1 fixed host 227

10.1.2 Mobile host 228

10.2 Agent 228

10.2.1 Home Agent 229

10.2.2 Foreign agents 229

10.3 three stages 229

10.3.1 Agent Discovery 230

10.3.2 Registration 231

10.3.3 data transfer 233

10.4 inefficiency of mobile ip 234

10.4.1 two passes through 234

10.4.2 Triangle routing selection 235

10.4.3 solution 235

10.5 in-depth reading 235

10.5.1 reference Books 235

10.5.2 rfc 236

10.6 important terminology 236

10.7 Summary of this chapter 236

10.8 practice arrangement 236

10.8.1 exercise 236

10.8.2 Research activities 237

Chapter 11 Unicast routing protocols (rip, ospf, and bgp) 238

11.1 introduction 238

11.1.1 consideration or metric 239

11.1.2 static or dynamic routing table 239

11.1.3 routing Protocol 239

11.2 intra-domain and inter-domain routing 239

11.3 distance vector routing 240

11.3.1 bellman-ford algorithm 241

11.3.2 distance vector routing algorithm 242

11.3.3 count to infinity 246

11.4 rip 248

11.4.1 message format of rip 249

11.4.2 requests and responses 250

11.4.3 timer for rip 251

11.4.4 rip version 2 252

11.4.5 package 253

11.5 Link-state routing 253

11.5.1 construct routing table 254

11.6 ospf 257

11.6.1 area 257

11.6.2 Metrics 258

11.6.3 Type of link 258

11.6.4 graphical representation 260

11.6.5 ospf grouping 260

11.6.6 Link State Update packet 261

11.6.7 other groups 268

11.6.8 Encapsulation 270

11.7 path vector routing 270

11.7.1 accessibility 271

11.7.2 routing Table 272

11.8 bgp 273

11.8.1 Type of autonomous system 273

11.8.2 path attributes 274

11.8.3 bgp session 274

11.8.4 external bgp and internal bgp 274

11.8.5 Type of grouping 275

11.8.6 grouping format 275

11.8.7 Encapsulation 278

11.9 in-depth reading 278

11.9.1 reference Books 278

11.9.2 rfc 278

11.10 important terms 279

11.11 Summary of this chapter 279

11.12 practical arrangements 280

11.12.1 exercise 280

11.12.2 Research activities 282

Chapter 12 Multicast and Multicast routing Protocol 283

12.1 introduction 283

12.1.1 Unicast 284

12.1.2 Multicast 284

12.1.3 broadcast 286

12.2 Multicast address 286

12.2.1 Multicast address 286 in ipv4

12.2.2 Select Multicast address 289

12.2.3 delivery of data link layer multicast packets 289

12.3 igmp 291

12.3.1 Group Management 291

12.3.2 igmp message 292

12.3.3 apply igmp protocol 294 on the host

12.3.4 igmp protocol is applied to router 297

12.3.5 the role of igmp in forwarding

12.3.6 variables and timers 300

12.3.7 Encapsulation 301

12.3.8 compatibility with older versions 301

12.4 Multicast routing 301

12.4.1 Best routing: shortest path Tree 302

12.5 routing Protocol 304

12.5.1 Multicast link-state routing: mospf 304

12.5.2 Multicast distance Vector routing 305

12.5.3 dvmrp 309

12.5.4 cbt 309

12.5.5 pim 311

12.6 mbone 311

12.7 in-depth reading 312

12.7.1 reference Books 312

12.7.2 rfc 312

12.8 important term 313

12.9 Summary of this chapter 313

12.10 practical arrangements 313

12.10.1 exercise 313

12.10.2 Research activities 315

Part III: transport layer

Chapter 13 introduction to the transport layer 319

13.1 Transport layer services 319

13.1.1 process-to-process communication 319

13.1.2 addressing: Port number 320

13.1.3 Encapsulation and unencapsulation 322

13.1.4 Multiplexing and demultiplexing 323

13.1.5 flow Control 323

13.1.6 error control 325

13.1.7 combination of flow control and error control 326

13.1.8 congestion Control 327

13.1.9 Connectionless and connection-oriented services 328

13.2 Transport layer Protocol 331

13.2.1 simple Protocol 331

13.2.2 stop waiting for Protocol 333

13.2.3 return n protocol 336

13.2.4 Select retransmission protocol 342

13.2.5 two-way protocol: piggyback 347

13.3 in-depth reading 348

13.4 important terminology 348

13.5 Summary of this chapter 349

13.6 practical arrangements 349

13.6.1 exercise 349

13.6.2 Research activities 351

Chapter 14 user Datagram Protocol (udp) 352

14.1 introduction 352

14.2 user Datagram 353

14.3 udp Service 354

14.3.1 process-to-process communication 355

14.3.2 Connectionless Services 355

14.3.3 flow control 355

14.3.4 error control 356

14.3.5 congestion Control 357

14.3.6 Encapsulation and Unencapsulation 357

14.3.7 queue 358

14.3.8 Multiplexing and demultiplexing 359

14.3.9 comparison between udp and simple Protocol 360

14.4 Application of udp 360

14.4.1 Features of udp

14.4.2 typical applications 362

14.5 udp package 362

14.5.1 Control Block Table 362

14.5.2 input queue 362

14.5.3 Control Block Module 363

14.5.4 input module 363

14.5.5 output module 364

14.5.6 examples 364

14.6 in-depth reading 366

14.6.1 reference Books 366

14.6.2 rfc 366

14.7 important term 366

14.8 Summary of this chapter 366

14.9 practical arrangements 367

14.9.1 exercise 367

Chapter 15 Transmission Control Protocol (tcp) 368

15.1 tcp Services 368

15.1.1 process-to-process communication 368

15.1.2 Stream delivery Service 369

15.1.3 full-duplex communication 371

15.1.4 Multiplexing and demultiplexing 371

15.1.5 connection-oriented services 371

15.1.6 reliable service 372

Features of 15.2 tcp 372

15.2.1 numbering system 372

15.2.2 flow control 373

15.2.3 error Control 373

15.2.4 congestion Control 374

15.3 message segment 374

15.3.1 format 374

15.3.2 Encapsulation 376

15.4 tcp connection 376

15.4.1 connection Establishment 376

15.4.2 data transfer 378

15.4.3 connection termination 380

15.4.4 connection reset 382

15.5 State transition figure 382

15.5.1 several cases 384

Window 390 in 15.6 tcp

15.6.1 send window 390

15.6.2 receive window 391

15.7 flow control 391

15.7.1 Open and close window 392

15.7.2 window contraction 394

15.7.3 confused window syndrome 395

15.8 error control 396

15.8.1 Inspection and 397

15.8.2 confirm 397

15.8.3 retransmission 398

15.8.4 out-of-order message segment 398

15.8.5 fsm 399 for tcp data transfer

15.8.6 several situations 400

15.9 congestion control 404

15.9.1 congestion window 404

15.9.2 congestion strategy 404

15.10 tcp timer 408

15.10.1 retransmission timer 408

15.10.2 persistent timer 411

15.10.3 Survival timer 411

15.10.4 time-wait timer 411

15.11 option 411

15.12 tcp package 418

15.12.1 Transmission control block (tcb) 418

15.12.2 timer 419

15.12.3 main module 419

15.12.4 input processing module 423

15.12.5 output processing module 424

15.13 in-depth reading 424

15.13.1 reference books 424

15.13.2 rfc 424

15.14 important term 424

15.15 Summary of this chapter 425

15.16 practical arrangements 426

15.16.1 exercise 426

15.16.2 Research activities 429

Chapter 16 flow Control transfer Protocol (sctp) 430

16.1 introduction 430

16.2 sctp services 431

16.2.1 process-to-process communication 431

16.2.2 multiple streams 432

16.2.3 multiple attribution 432

16.2.4 full-duplex communication 433

16.2.5 connection-oriented services 433

16.2.6 reliable service 433

Characteristics of sctp 433

16.3.1 Transmission sequence number (tsn) 434

16.3.2 Stream Identifier (si) 434

16.3.3 sequence number (ssn) 434

16.3.4 grouping 434

16.3.5 confirmation number 436

16.3.6 flow control 436

16.3.7 error control 437

16.3.8 congestion Control 437

16.4 grouping format 437

16.4.1 GM first 437

16.4.2 yuan (chunk) 438

16.5 sctp association 444

16.5.1 Association Establishment 445

16.5.2 data transfer 447

16.5.3 Association termination 449

16.5.4 abnormal termination of association 449

16.6 State transition figure 450

16.6.1 several cases 451

16.6.2 other cases 453

16.7 flow control 454

16.7.1 recipient 454

16.7.2 sender 454

16.7.3 one case 455

16.8 error control 456

16.8.1 recipient 456

16.8.2 Sender 457

16.8.3 send block 458

16.8.4 generate sack block 458

16.9 congestion control 459

16.9.1 congestion control and multi-homing 459

16.9.2 explicit congestion Notification 459

16.10 in-depth reading 459

16.10.1 reference Books 460

16.10.2 rfc 460

16.11 important term 460

16.12 Summary of this chapter 460

16.13 practical arrangements 461

16.13.1 exercise 461

16.13.2 Research activities 463

Part IV Application layer

Chapter 17 introduction to the application layer 467

17.1 client-server paradigm 467

17.1.1 Server 468

17.1.2 customer 468

17.1.3 concurrent 468

17.1.4 socket interface 470

17.1.5 Communications using udp 477

17.1.6 Communications using tcp 480

17.1.7 predefined client-server applications 486

17.2 P2P Paradigm 486

17.3 in-depth reading 487

17.4 important terms 487

17.5 Summary of this chapter 487

17.6 practical arrangements 488

17.6.1 exercise 488

Chapter 18 Host configuration: dhcp 489

18.1 introduction 489

18.1.1 protocols used 490

18.2 dhcp Operation 490

18.2.1 same network 491

18.2.2 different networks 491

18.2.3 udp Port 492

18.2.4 using tftp 493

18.2.5 error Control 493

18.2.6 grouping format 493

18.3 configuration 495

18.3.1 static address assignment 495

18.3.2 dynamic address allocation 496

18.3.3 transition status 496

18.3.4 other 497

18.3.5 Exchange message 498

18.4 in-depth reading 498

18.4.1 reference books and rfc 499

18.5 important term 499

18.6 Summary of this chapter 499

18.7 practice arrangement 499

18.7.1 exercise 499

18.7.2 Research activities 500

Chapter 19 Domain name system (dns) 501

19.1 necessity of dns

19.2 Namespace 502

19.2.1 flat namespace 503

19.2.2 hierarchical namespace 503

19.2.3 Domain name space 503

19.2.4 Domain 505

19.2.5 Distribution of domain name space 505

19.3 dns 507 in the Internet

19.3.1 generic domain 507

19.3.2 country Domain 508

19.3.3 reverse domain 508

19.4 parsing 509

19.4.1 Parser 509

19.4.2 name-to-address mapping 510

19.4.3 address-to-name mapping 510

19.4.4 Recursive parsing 510

19.4.5 iterative analysis 511

19.4.6 Cache 511

19.5 dns message 512

19.5.1 first 512

19.6 Type of record 514

19.6.1 problem record 514

19.6.2 Resource record 515

19.7 Compression 516

19.8 package 519

19.9 registered institutions 519

19.10 ddns 520

19.11 Security of dns 520

19.12 in-depth reading 521

19.12.1 reference Books 521

19.12.2 rfc 521

19.13 important term 521

19.14 Summary of this chapter 521

19.15 practice arrangement 522

19.15.1 exercise 522

19.15.2 Research activities 523

Chapter 20 Telnet: tel and ssh 525

20.1 tel 525

20.1.1 concept 525

20.1.2 timeshare environment 526

20.1.3 Network Virtual Terminal (nvt) 527

20.1.4 embedded 528

20.1.5 option 529

20.1.6 Symmetry 532

20.1.7 Sub-option negotiation 532

20.1.8 Control of the server 532

20.1.9 out-of-band signaling 533

20.1.10 escape character 534

20.1.11 Mode of operation 535

20.1.12 user interface 536

20.1.13 Security issues 537

20.2 ssh 537

20.2.1 version 537

20.2.2 composition 537

20.2.3 Port forwarding 538

20.2.4 ssh grouping format 539

20.3 in-depth reading 539

20.3.1 reference Books 539

20.3.2 rfc 539

20.4 important term 540

20.5 Summary of this chapter 540

20.6 practical arrangements 541

20.6.1 exercise 541

20.6.2 Research activities 541

Chapter 21 File transfer: ftp and tftp 543

21.1 File transfer Protocol (ftp) 543

21.1.1 connection 544

21.1.2 Communications 545

21.1.3 Command processing 547

21.1.4 File transfer 550

21.1.5 Anonymous ftp 553

21.2 simple File transfer Protocol (tftp) 554

21.2.1 message 555

21.2.2 Connect 557

21.2.3 data transmission 557

21.2.4 udp Port 559

21.2.5 tftp example 560

21.2.6 tftp option 561

21.2.7 Security 561

21.2.8 Application 561

21.3 in-depth reading 561

21.3.1 reference books 562

21.3.2 rfc 562

21.4 important term 562

21.5 Summary of this chapter 562

21.6 practical arrangements 563

21.6.1 problem set 563

21.6.2 Research activities 564

Chapter 22 World wide Web and 565

22.1 Architecture 565

22.1.1 Hypertext and hypermedia 566

22.1.2 web customer (browser) 567

22.1.3 web Server 567

22.1.4 uniform Resource Locator (url) 567

22.2 web documentation 568

22.2.1 static document 568

22.2.2 dynamic documents 568

22.2.3 active document 570

22.3 571

22.3.1 transaction 571

22.3.2 conditional request 577

22.3.3 continuous connection 577

22.3.4 cookie 579

22.3.5 web cache: proxy server 581

22.3.6 Safety 581

22.4 in-depth reading 582

22.4.1 reference Books 582

22.4.2 rfc 582

22.5 important terms 582

22.6 Summary of this chapter 583

22.7 practical arrangements 583

22.7.1 exercises 583

22.7.2 Research activities 584

Chapter 23 email: smtp, pop, imap and mime 585

23.1 Architecture 585

23.1.1 first case 586

23.1.2 second case 586

23.1.3 third case 587

23.1.4 fourth case 587

23.2 user Agent 588

23.2.1 Services provided by user agents 589

23.2.2 user Agent Type 589

23.2.3 send email 589

23.2.4 receiving mail 590

23.2.5 address 590

23.2.6 dispatch list or grouping list 590

23.3 message delivery Agent: smtp 590

23.3.1 commands and responses 591

23.3.2 Mail delivery phase 594

Message reading agents: pop and imap 596

23.4.1 pop3 597

23.4.2 imap4 597

23.5 mime 598

23.5.1 mime head 598

23.6 World wide Web-based mail 602

23.6.1 case one 602

23.6.2 case II 603

23.7 Security of email 603

23.8 in-depth reading 604

23.8.1 reference Book 604

23.8.2 rfc 604

23.9 important term 604

23.10 Summary of this chapter 604

23.11 practical arrangements 605

23.11.1 exercise 605

23.11.2 Research activities 606

Chapter 24 Network Management (snmp) 607

24.1 concept 607

24.1.1 Manager and Agent 608

24.2 Management component 608

24.2.1 the role of snmp 609

24.2.2 the role of smi

24.2.3 role of mib 609

24.2.4 analogy 609

24.2.5 Overview 610

24.3 smi 611

24.3.1 name 611

24.3.2 Type 612

24.3.3 Encoding method 613

24.4 mib 615

24.4.1 access to mib variable 615

24.4.2 lexicographic sort 618

24.5 snmp 618

24.5.1 pdu 618

24.5.2 format 620

24.5.3 message 621

24.6 udp port 623

24.7 Security 624

24.8 in-depth reading 624

24.8.1 reference Books 624

24.8.2 rfc 624

24.9 important term 625

24.10 Summary of this chapter 625

24.11 practical arrangements 625

24.11.1 exercise 625

24.11.2 Research activities 626

Chapter 25 Multimedia 627

25.1 introduction 627

25.2 Digital Audio and Video 628

25.2.1 Digital Audio 628

25.2.2 Digital Video 628

25.3 Audio and video compression 629

25.3.1 Audio Compression 629

25.3.2 Video compression 630

25.4 streaming storage audio / video 633

25.4.1 first method: use World wide Web server 633

25.4.2 second method: using a World wide Web server with metafiles 633

25.4.3 third method: use Media Server 634

25.4.4 fourth method: use Media Server and rtsp 634

25.5 Live streaming audio / video 635

25.6 Real-time interactive audio / video 636

25.6.1 feature 636

25.7 rtp 639

25.7.1 rtp grouping format 640

25.7.2 udp port 641

25.8 rtcp 641

25.8.1 Sender report 641

25.8.2 recipient report 642

25.8.3 Source Point description message 642

25.8.4 Bye message 642

25.8.5 Application-specific message 642

25.8.6 udp port 642

25.9 ip Voice 642

25.9.1 sip 642

25.9.2 h.323 644

25.10 quality of service 646

25.10.1 characteristics of stream 646

25.10.2 Classification of streams 647

25.10.3 Technology to improve qos 647

25.10.4 Resources reserved 650

25.10.5 license Control 650

25.11 Integrated Services 650

25.11.1 signaling 651

25.11.2 stream specification 651

25.11.3 license 651

25.11.4 Service Category 651

25.11.5 rsvp 652

25.11.6 problems in integrated services 653

25.12 DiffServ 654

25.13 in-depth reading 655

25.13.1 reference books 655

25.13.2 rfc 656

25.14 important term 656

25.15 Summary of this chapter 656

25.16 practice arrangement 657

25.16.1 exercise 657

Part V the next generation

Chapter 26 ipv6 addressing 661

26.1 introduction 661

26.1.1 notation 661

26.1.2 address space 664

26.1.3 three address types 664

26.1.4 broadcast and Multicast 665

26.2 address space allocation 665

26.2.1 assigned and reserved address blocks 667

26.3 Global unicast address 670

26.3.1 three-tier structure 670

26.4 automatic configuration 672

26.5 renumber 673

26.6 in-depth reading 673

26.6.1 reference Books 673

26.6.2 rfc 673

26.7 important terms 673

26.8 Summary of this chapter 674

26.9 practical arrangements 674

26.9.1 exercise 674

Chapter 27 ipv6 Agreement 676

27.1 introduction 676

27.1.1 reasons for change 676

27.1.2 reasons for slow adoption 677

27.2 grouping format 677

27.2.1 basic title 677

27.2.2 Stream label 678

27.2.3 comparison of ipv4 header and ipv6 header 679

27.2.4 extension header 680

27.2.5 comparison of ipv4 and ipv6 684

Transition from ipv4 to ipv6 684

27.3.1 dual stack 684

27.3.2 Tunnel Technology 685

27.3.3 head conversion 685

27.4 in-depth reading 686

27.4.1 reference Books 686

27.4.2 rfc 686

27.5 important term 686

27.6 Summary of this chapter 686

27.7 practical arrangements 687

27.7.1 exercise 687

27.7.2 Research activities 687

Chapter 28 icmpv6 688

28.1 introduction 688

28.2 error message 689

28.2.1 end point unreachable message 689

28.2.2 packet too large message 690

28.2.3 timeout message 690

28.2.4 Parameter problem message 691

28.3 Information message 691

28.3.1 return request message 691

28.3.2 return reply message 692

28.4 neighboring station found message 692

28.4.1 Router query message 692

28.4.2 Router advertisement message 692

28.4.3 neighboring station inquiry message 693

28.4.4 neighboring station notification message 694

28.4.5 change routing message 694

28.4.6 reverse neighboring station inquiry message 695

28.4.7 reverse neighbor Notification message 695

28.5 group membership message 695

28.5.1 membership query message 696

28.5.2 membership report message 696

28.5.3 functional 696

28.6 in-depth reading 698

28.6.1 reference books 698

28.6.2 rfc 698

28.7 important term 698

28.8 Summary of this chapter 698

28.9 practice arrangement 699

28.9.1 exercise 699

28.9.2 Research activities 699

Part VI completeness

Chapter 29 encryption and Network Security 703

29.1 introduction 703

29.1.1 Security goal 704

29.1.2 * 704

29.1.3 Services 706

29.1.4 Technology 706

29.2 traditional encryption methods 706

29.2.1 key 707

29.2.2 alternative encryption method 708

29.2.3 permutation encryption method 710

29.2.4 Stream and Block encryption method 711

29.3 Modern encryption methods 711

29.3.1 Modern block encryption methods 711

29.3.2 data encryption Standard (des) 713

29.3.3 Modern stream encryption method 714

29.4 asymmetric key encryption method 715

29.4.1 key 716

29.4.2 General thinking 716

29.4.3 rsa encryption system 718

29.4.4 Application 720

29.5 message integrity 720

29.5.1 messages and message abstracts 720

29.5.2 Hash function 721

29.6 message authentication 721

29.6.1 hmac 722

29.7 Digital signature 722

29.7.1 comparison 723

29.7.2 process 723

29.7.3 signature of the digest 724

29.7.4 Service 725

29.7.5 rsa digital signature mechanism 726

29.7.6 Digital signature Standard 727

29.8 entity Identification 727

29.8.1 comparison between entity authentication and message authentication 727

29.8.2 Verification Category 727

29.8.3 password 728

29.8.4 question-response 728

29.9 key Management 729

29.9.1 Distribution of symmetric keys 730

29.9.2 symmetric key negotiation 732

29.9.3 Public key distribution 733

29.10 in-depth reading 734

29.11 important term 734

29.12 Summary of this chapter 735

29.13 practical arrangements 736

29.13.1 exercise 736

29.13.2 Research activities 737

Chapter 30 Internet Security 739

30.1 Network layer Security 739

30.1.1 two ways 740

30.1.2 two security protocols 741

30.1.3 Services provided by ipsec 743

30.1.4 Security Association 744

30.1.5 Internet key Exchange (ike) 747

30.1.6 Virtual Private Network (*) 747

30.2 Transport layer Security 748

30.2.1 Architecture of ssl 748

30.2.2 four agreements 750

30.3 Security of the application layer 752

30.3.1 email security 753

30.3.2 fairly good confidentiality (pgp) 753

30.3.3 key ring 755

30.3.4 Certificate of pgp 756

30.3.5 s/mime 758

30.3.6 Application of s/mime 761

30.4 Firewall 761

30.4.1 packet filtering Firewall 762

30.4.2 proxy Firewall 762

30.5 in-depth reading 763

30.6 important terms 763

30.7 Summary of this chapter 764

30.8 practice arrangement 764

30.8.1 exercise 764

30.8.2 Research activities 765

Part VII is attached.

Appendix a unicode 769

A.1 plane 769

A.1.1 basic multilingual plane (bmp) 770

A.1.2 other planes 770

A.2 ascii 770

Appendix b carry counting system 773

B.1 different systems 773

B.1.1 Base 10: decimal 773

B.1.2 Radix 2: binary 773

B.1.3 base 16: hexadecimal 774

B.1.4 Radix 256: dotted decimal notation 774

B.1.5 compare 775

B.2 convert 775

B. 2.1 conversion from arbitrary number system to decimal system 775

B.2.2 conversion from decimal to arbitrary number system 776

B.2.3 other conversions 777

Appendix c error detection code 779

C.1 introduction 779

C.1.1 Type of error 779

C.1.2 redundancy 779

C.1.3 comparison of error detection and correction 779

C.1.4 Encoding 780

C.2 block code 780

C.2.1 error detection 781

C. 2.2 hamming distance 781

C.2.3 minimum hamming distance 781

C. 3 linear block code 782

C.3.1 minimum distance of linear block codes 782

C.4 cyclic code 783

C.4.1 cyclic redundancy check 783

C. 4.2 advantages of cyclic codes 785

C. 4.3 other cyclic codes 785

Appendix d Inspection and 786

D.1 traditional testing and 786

D.1.1 thought 786

D.1.2 Internet testing and 787

D.2 fletcher test and 788

D. 3 adler test and 789

Appendix e html, xhtml, xml and xsl 791

E.1 html 791

E.1.1 label 791

E.1.2 xhtml 794

E.2 xml and xsl 794

Client-server programming in appendix f java 796

F.1 udp Program 796

F.2 tcp Program 798

Appendix g additional information 801

G.1 Port number 801

G.2 rfc 802

G.3 contact address 803

Glossary 804

827 refs.

Introduction to the author

Author: (USA) Behrouz A.Forouzan translator: Wang Hai, Zhang Juan, Zhu Xiaoyang, etc. Commentary: Xie Xiren

Abstract

Illustration:

The Internet is a structured and organized system. Talking about how the Internet works, and how it and

Before the relationship between TCP/P, let's take a look at the brief history of the development of the Internet. Then we define the concepts of protocols and standards and how they relate to each other. We will also discuss the various organizations related to the development of Internet standards. These standards are not developed by any particular organization, but come from the consensus of Internet users. We will discuss the whole mechanism of these standards from initiation to maturity. Of course, as an introduction, this chapter also has some content to introduce the management organization of the Internet.

target

This chapter has the following objectives:

Understand the brief history of the development of the Internet.

Define two terms that people often mention when discussing the Internet: protocols and standards.

Classify the Internet-related standard organizations and briefly introduce them one by one.

Define the concept of Internet standards and explain the mechanisms that these standards need to go through.

Discuss the management structure of the Internet and briefly introduce each management branch.

1.1 A brief history of development

A work is a group of interconnected communication devices, such as computers and printers. The Internet (note: this refers to the intemet that begins with the lowercase letter I) refers to two or more networks that can communicate with each other. The most famous Internet is the Internet (Intemet starting with capital I), which is made up of thousands of interconnected networks. The Internet is used by individuals and different organizations in more than 100 countries and regions, such as government agencies, schools, research institutions, companies and libraries. There are hundreds of millions of Internet users. However, this extraordinary communication system was not invented until 1969.

1.1.1 ARPANET

In the mid-1960s, the mainframe computers owned by research institutions were independent devices. Computers made by different manufacturers cannot communicate with each other. The Defense Department's long-term Research projects Agency (ARPA) hopes to find a way to connect computers so that the researchers they fund can share their research, thus reducing costs and avoiding duplication of effort.

Preface

In today's civilized life, the development and change of technologies related to the Internet and networking may be the fastest. Many experts, scholars and students have made suggestions after reviewing or learning to use the third edition of the book, hoping to include these changes when the new edition of the book is released. In the fourth edition, I reorganized the content of the book, not only incorporating many technical changes, but also adding several new chapters and appendices.

The fourth edition of this book assumes that the reader does not have a preliminary knowledge of the TCP/IP protocol family, but it is best to take a course in data communication in advance.

Content structure

The book is divided into seven parts.

The first part (introduction and underlying technology), including chapters 1-3, reviews some basic concepts and basic technologies. Although this part is not included in the TCP/IP protocol, the TCP/IP protocol needs their support.

The second part (network layer), including chapters 4-12, discusses IPv4 addressing technology, IPv4 protocol, auxiliary protocols of all IPv4 protocols, and unicast and multicast routing protocols.

The third part (transport layer), including chapters 13-16, introduces the overall concept of transport layer (Chapter 13), and then comprehensively discusses three transport layer protocols: UDP, TCP and SCTP (chapters 14, 15, 16).

The fourth part (application layer), including chapters 17-25, introduces the overall concept of the application layer, including client / server mode programming (chapter 17), and then comprehensively discusses seven application layer protocols (chapters 18-24). Chapter 25 is devoted to multimedia technology on the Internet.

The fifth part (new generation), including chapters 26-28, introduces the new generation of IP protocol, IPv6 addressing technology (chapter 26), IPv6 protocol (chapter 27) and ICMPv6 (chapter 28).

The sixth part (security), including chapters 29-30, discusses some unavoidable topics, such as encryption and network security (Chapter 29) and Internet security (Chapter 30).

Part VII (Appendix) contains a total of seven appendices that you may need as you read this book.

Characteristics

In order to make it easier for students to learn TCP/IP, the compilation of this book has the following characteristics.

In an intuitive way

This book describes the highly technical content in a graphic and textual way, but does not use complex formulas. More than 650 illustrations, together with the text, provide an intuitive way to understand this content. Illustrations are particularly important when explaining the concept of a network because the concept of a network is based on connection and transmission. It is easier to understand these concepts with illustrations than with words.

Highlight the key points

Some important concepts are prompted repeatedly, so that readers can quickly find these key points and attract attention.

Examples and applications

As long as appropriate, we will use examples to illustrate the concepts given in the manual. In addition, we put a lot of real-life applications in each chapter to enhance the interest of readers.

Protocol software package

. Although we do not try to give detailed code to implement each protocol, a section is included in many chapters to discuss the general ideas behind each protocol implementation. These contents can help to understand the ideas and related issues of each protocol, but they can also be used as optional readings.

Important terms

The new terms that appear in this chapter are listed at the end of each chapter, and the definitions of these terms are included in the glossary.

Summary

At the end of each chapter is a summary of the content of this chapter. The summary begins with key symbols and lists all the key contents in this chapter.

Practical project

Each chapter includes a practical content to consolidate important concepts while encouraging students to apply them. The practice project consists of two parts: exercises and research activities. To complete the exercises, you need to have a real understanding of what you have learned, and the research activities are arranged for you to delve deeper into them.

Appendix

The purpose of the appendix is to provide quick reference or some content that needs to be reviewed in order to understand the concepts in this book. The appendices in previous editions have been revised and sorted out here, and some new appendices have been added at the same time.

Glossary and

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report