In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Link: https://pan.baidu.com/s/1Pia2by1s83kiVXEyU-dPRg password: ruur
The World famous computer textbook selected TCP/IP Protocol Family (4th Edition) can be used as a teaching material for college students and graduate students, and it also has a good reference value for teaching and research personnel engaged in computer network, as well as engineers and technicians.
Catalogue
The first part is introduction and underlying technology.
Chapter 1 introduction 3
1.1 A brief history of development 3
1.1.1 arpa 3
1.1.2 the birth of the Internet 4
1.1.3 Transmission Control Protocol / Internet Protocol (tcp/ip) 4
1.1.4 mil 4
1.1.5 cs 5
1.1.6 nsf 5
1.1.7 ans 5
1.1.8 Today's Internet 5
1.1.9 backbone isp 6
1.1.10 area isp 6
1.1.11 Local isp 6
1.1.12 Chronicle 7
1.1.13 Development of the Internet 7
1.2 protocols and Standards 7
1.2.1 Protocol 7
1.2.2 Standard 8
1.3 Standardization Organization 8
.1.3.1 Standard creation Committee 9
1.3.2 Forum 10
1.3.3 Regulatory body 10
1.4 Internet standard 10
1.4.1 maturity 11
1.4.2 demand level 11
1.5 the governing body of the Internet 12
1.5.1 Internet Association (isoc) 13
1.5.2 Internet Architecture Research Committee (iab) 13
1.5.3 Internet Engineering (ietf) 13
1.5.4 Internet Research Department (irtf) 13
1.5.5 Internet numbering Authority and Internet name and number assignment Company 14
1.5.6 Network Information Center (nic) 14
1.6 Deep Reading 14
1.6.1 Books and papers 14
1.6.2 website 14
1.7 important terms 14
1.8 Summary of this chapter 15
1.9 practical arrangements 16
1.9.1 exercise 16
1.9.2 Research activities 16
Chapter 2 osi Model and tcp/ip Protocol Family 17
2.1 Protocol layering 17
2.1.1 hierarchical structure 18
2.1.2 Services 18
2.2 osi Model 19
2.2.1 hierarchical architecture 19
2.2.2 layer-to-layer communication 20
2.2.3 Encapsulation 21
2.2.4 layers in the osi model 21
2.2.5 osi summary of each layer 24
2.3 tcp/ip protocol family 25
2.3.1 comparison of osi and tcp/ip protocol families 25
2.3.2 layering of the tcp/ip protocol family 26
2.4 addressing 30
2.4.1 physical address 31
2.4.2 logical address 32
2.5 Deep Reading 35
2.5.1 reference books 35
2.5.2 rfc 35
2.6 important terms 35
2.7 Summary of this chapter 36
2.8 practical arrangements 36
2.8.1 exercise 36
2.8.2 Research activities 38
Chapter 3 underlying Technology 39
3.1 Wired Local area Network 39
3.1.1 ieee Standard 40
3.1.2 frame format 40
3.1.3 addressing 42
3.1.4 the development of Ethernet 43
3.1.5 Standard Ethernet 43
3.1.6 Fast Ethernet 47
3.1.7 Gigabit Ethernet 48
3.1.8 10g Ethernet 49
3.2 Wireless LAN 50
3.2.1 ieee 802.11 50
3.2.2 addressing mechanism 55
3.2.3 Bluetooth 57
3.3 Point-to-point WAN 59
3.3.1 56k modem 59
3.3.2 dsl Technology 60
3.3.3 Cable modem 61
3.3.4 t line 63
3.3.5 so 64
3.3.6 ppp 64
3.4 switched WAN 65
3.4.1 x.25 65
3.4.2 frame Relay 66
3.4.3 atm 66
3.5 connecting devices 70
3.5.1 transponder 70
3.5.2 Bridge 71
3.5.3 Router 73
3.6 in-depth reading 74
3.7 important terms 74
3.8 Summary of this chapter 75
3.9 practical arrangements 76
3.9.1 exercise 76
3.9.2 Research activities 77
The second part is the network layer
Chapter 4 introduction to the Network layer 81
4.1 introduction 81
4.2 Exchange 82
4.2.1 Circuit switching 82
4.2.2 packet switching 83
4.3 packet switching at the network layer 83
4.3.1 Connectionless Services 83
4.3.2 connection-oriented services 85
4.4 Services at the network layer 88
4.4.1 an example 89
4.4.2 logical addressing 90
4.4.3 Services provided by the source computer 90
4.4.4 Services provided by routers 91
4.4.5 Services provided by the destination computer 92
4.5 other issues related to the network layer 93
4.5.1 error Control 93
4.5.2 flow control 94
4.5.3 congestion control 94
4.6 further reading 96
4.7 important terms 96
4.8 Summary of this chapter 96
4.9 practical arrangements 97
4.9.1 exercise 97
Chapter 5 ipv4 address 98
5.1 introduction 98
5.1.1 address space 99
5.1.2 notation 99
5.1.3 address field 101
5.1.4 Operation 101
5.2 classified addressing 104
5.2.1 Classification 104
5.2.2 address class and address block 106
5.2.3 two-level addressing 107
5.2.4 an example 110
5.2.5 level 3 addressing: subnetting 112
5.2.6 Construction of supernet 114
5.3 unclassified addressing 115
5.3.1 variable length address block 116
5.3.2 two-level addressing 116
5.3.3 allocation of address blocks 120
5.3.4 Subnetting 121
5.4 Special address 125
5.4.1 Special address block 125
5.4.2 Special address 126 in each address block
5.5 nat 127
5.5.1 address Translation 127
5.5.2 convert Table 128
5.6 in-depth reading 129
5.6.1 reference Books 129
5.6.2 rfc 130
5.7 important terms 130
5.8 Summary of this chapter 130
5.9 practical arrangements 131
5.9.1 exercise 131
Chapter 6 delivery and forwarding of ip packets
6.1 delivery 135
6.1.1 Direct delivery 135
6.1.2 indirect delivery 136
6.2 forward 136
6.2.1 forwarding based on destination address 136
6.2.2 tag-based forwarding 148
6.3 the structure of the router 150
6.3.1 component 150
6.4 in-depth reading 153
6.4.1 reference Books 153
6.4.2 rfc 153
6.5 important term 153
6.6 Summary of this chapter 153
6.7 practical arrangements 154
6.7.1 exercise 154
6.7.2 Research activities 155
Chapter 7 Internet Protocol version 4 (ipv4) 156
7.1 introduction 156
7.2 Datagram 157
7.3 fragment 161
7.3.1 maximum transfer Unit (mtu) 161
7.3.2 Fields related to fragmentation 162
7.4 option 165
7.4.1 format 165
7.4.2 option type 166
7.5 testing and 171
7.5.1 calculate the check and 172 on the sending side
7.5.2 calculate the check and 172 at the receiving end
7.5.3 Inspection and 173in ip grouping
7.6 ip runs on atm 174
7.6.1 atm wide area network 174
7.6.2 routing of cells 175
7.7 Security 176
7.7.1 Security questions 176
7.7.2 ipsec 176
7.8 ip package 177
7.8.1 first add module 178
7.8.2 processing module 178
7.8.3 queue 179
7.8.4 routing Table 179
7.8.5 forwarding module 179
7.8.6 mtu Table 179
7.8.7 sharding module 180
7.8.8 reinstall Table 181
7.8.9 reinstall module 181
7.9 in-depth reading 182
7.9.1 reference Book 182
7.9.2 rfc 182
7.10 important term 182
7.11 Summary of this chapter 183
7.12 practical arrangements 184
7.12.1 exercise 184
7.12.2 Research activities 185
Chapter 8 address Resolution Protocol (arp) 186
8.1 address Mapping 186
8.1.1 static mapping 187
8.1.2 dynamic mapping 187
8.2 arp protocol 187
8.2.1 grouping format 189
8.2.2 Encapsulation 190
8.2.3 Operation 190
8.2.4 Agent arp 192
8.3 atmarp 193
8.3.1 grouping format 193
8.3.2 Operation of atmarp 194
8.3.3 logical ip Subnet (lis) 197
8.4 arp package 197
8.4.1 cache table 198
8.4.2 queue 199
8.4.3 output module 199
8.4.4 input module 200
8.4.5 cache control module 201
8.4.6 more examples 203
8.5 in-depth reading 204
8.5.1 reference Books 204
8.5.2 rfc 205
8.6 important term 205
8.7 Summary of this chapter 205
8.8 practical arrangements 206
8.8.1 exercise 206
Chapter 9 Internet Control message Protocol (icmp) 207
9.1 introduction 207
9.2 message 208
9.2.1 message format 208
9.2.2 error report message 209
9.2.3 Enquiry 214
9.2.4 Inspection and 216
9.3 debugging tool 217
9.3.1 ping 217
9.3.2 traceroute 219
9.4 icmp package 221
9.4.1 input module 222
9.4.2 output module 222
9.5 in-depth reading 223
9.5.1 reference Books 223
9.5.2 rfc 224
9.6 important terminology 224
9.7 Summary of this chapter 224
9.8 practice arrangement 224
9.8.1 exercise 224
9.8.2 Research activities 226
Chapter 10 Mobile ip 227
10.1 addressing 227
10.1.1 fixed host 227
10.1.2 Mobile host 228
10.2 Agent 228
10.2.1 Home Agent 229
10.2.2 Foreign agents 229
10.3 three stages 229
10.3.1 Agent Discovery 230
10.3.2 Registration 231
10.3.3 data transfer 233
10.4 inefficiency of mobile ip 234
10.4.1 two passes through 234
10.4.2 Triangle routing selection 235
10.4.3 solution 235
10.5 in-depth reading 235
10.5.1 reference Books 235
10.5.2 rfc 236
10.6 important terminology 236
10.7 Summary of this chapter 236
10.8 practice arrangement 236
10.8.1 exercise 236
10.8.2 Research activities 237
Chapter 11 Unicast routing protocols (rip, ospf, and bgp) 238
11.1 introduction 238
11.1.1 consideration or metric 239
11.1.2 static or dynamic routing table 239
11.1.3 routing Protocol 239
11.2 intra-domain and inter-domain routing 239
11.3 distance vector routing 240
11.3.1 bellman-ford algorithm 241
11.3.2 distance vector routing algorithm 242
11.3.3 count to infinity 246
11.4 rip 248
11.4.1 message format of rip 249
11.4.2 requests and responses 250
11.4.3 timer for rip 251
11.4.4 rip version 2 252
11.4.5 package 253
11.5 Link-state routing 253
11.5.1 construct routing table 254
11.6 ospf 257
11.6.1 area 257
11.6.2 Metrics 258
11.6.3 Type of link 258
11.6.4 graphical representation 260
11.6.5 ospf grouping 260
11.6.6 Link State Update packet 261
11.6.7 other groups 268
11.6.8 Encapsulation 270
11.7 path vector routing 270
11.7.1 accessibility 271
11.7.2 routing Table 272
11.8 bgp 273
11.8.1 Type of autonomous system 273
11.8.2 path attributes 274
11.8.3 bgp session 274
11.8.4 external bgp and internal bgp 274
11.8.5 Type of grouping 275
11.8.6 grouping format 275
11.8.7 Encapsulation 278
11.9 in-depth reading 278
11.9.1 reference Books 278
11.9.2 rfc 278
11.10 important terms 279
11.11 Summary of this chapter 279
11.12 practical arrangements 280
11.12.1 exercise 280
11.12.2 Research activities 282
Chapter 12 Multicast and Multicast routing Protocol 283
12.1 introduction 283
12.1.1 Unicast 284
12.1.2 Multicast 284
12.1.3 broadcast 286
12.2 Multicast address 286
12.2.1 Multicast address 286 in ipv4
12.2.2 Select Multicast address 289
12.2.3 delivery of data link layer multicast packets 289
12.3 igmp 291
12.3.1 Group Management 291
12.3.2 igmp message 292
12.3.3 apply igmp protocol 294 on the host
12.3.4 igmp protocol is applied to router 297
12.3.5 the role of igmp in forwarding
12.3.6 variables and timers 300
12.3.7 Encapsulation 301
12.3.8 compatibility with older versions 301
12.4 Multicast routing 301
12.4.1 Best routing: shortest path Tree 302
12.5 routing Protocol 304
12.5.1 Multicast link-state routing: mospf 304
12.5.2 Multicast distance Vector routing 305
12.5.3 dvmrp 309
12.5.4 cbt 309
12.5.5 pim 311
12.6 mbone 311
12.7 in-depth reading 312
12.7.1 reference Books 312
12.7.2 rfc 312
12.8 important term 313
12.9 Summary of this chapter 313
12.10 practical arrangements 313
12.10.1 exercise 313
12.10.2 Research activities 315
Part III: transport layer
Chapter 13 introduction to the transport layer 319
13.1 Transport layer services 319
13.1.1 process-to-process communication 319
13.1.2 addressing: Port number 320
13.1.3 Encapsulation and unencapsulation 322
13.1.4 Multiplexing and demultiplexing 323
13.1.5 flow Control 323
13.1.6 error control 325
13.1.7 combination of flow control and error control 326
13.1.8 congestion Control 327
13.1.9 Connectionless and connection-oriented services 328
13.2 Transport layer Protocol 331
13.2.1 simple Protocol 331
13.2.2 stop waiting for Protocol 333
13.2.3 return n protocol 336
13.2.4 Select retransmission protocol 342
13.2.5 two-way protocol: piggyback 347
13.3 in-depth reading 348
13.4 important terminology 348
13.5 Summary of this chapter 349
13.6 practical arrangements 349
13.6.1 exercise 349
13.6.2 Research activities 351
Chapter 14 user Datagram Protocol (udp) 352
14.1 introduction 352
14.2 user Datagram 353
14.3 udp Service 354
14.3.1 process-to-process communication 355
14.3.2 Connectionless Services 355
14.3.3 flow control 355
14.3.4 error control 356
14.3.5 congestion Control 357
14.3.6 Encapsulation and Unencapsulation 357
14.3.7 queue 358
14.3.8 Multiplexing and demultiplexing 359
14.3.9 comparison between udp and simple Protocol 360
14.4 Application of udp 360
14.4.1 Features of udp
14.4.2 typical applications 362
14.5 udp package 362
14.5.1 Control Block Table 362
14.5.2 input queue 362
14.5.3 Control Block Module 363
14.5.4 input module 363
14.5.5 output module 364
14.5.6 examples 364
14.6 in-depth reading 366
14.6.1 reference Books 366
14.6.2 rfc 366
14.7 important term 366
14.8 Summary of this chapter 366
14.9 practical arrangements 367
14.9.1 exercise 367
Chapter 15 Transmission Control Protocol (tcp) 368
15.1 tcp Services 368
15.1.1 process-to-process communication 368
15.1.2 Stream delivery Service 369
15.1.3 full-duplex communication 371
15.1.4 Multiplexing and demultiplexing 371
15.1.5 connection-oriented services 371
15.1.6 reliable service 372
Features of 15.2 tcp 372
15.2.1 numbering system 372
15.2.2 flow control 373
15.2.3 error Control 373
15.2.4 congestion Control 374
15.3 message segment 374
15.3.1 format 374
15.3.2 Encapsulation 376
15.4 tcp connection 376
15.4.1 connection Establishment 376
15.4.2 data transfer 378
15.4.3 connection termination 380
15.4.4 connection reset 382
15.5 State transition figure 382
15.5.1 several cases 384
Window 390 in 15.6 tcp
15.6.1 send window 390
15.6.2 receive window 391
15.7 flow control 391
15.7.1 Open and close window 392
15.7.2 window contraction 394
15.7.3 confused window syndrome 395
15.8 error control 396
15.8.1 Inspection and 397
15.8.2 confirm 397
15.8.3 retransmission 398
15.8.4 out-of-order message segment 398
15.8.5 fsm 399 for tcp data transfer
15.8.6 several situations 400
15.9 congestion control 404
15.9.1 congestion window 404
15.9.2 congestion strategy 404
15.10 tcp timer 408
15.10.1 retransmission timer 408
15.10.2 persistent timer 411
15.10.3 Survival timer 411
15.10.4 time-wait timer 411
15.11 option 411
15.12 tcp package 418
15.12.1 Transmission control block (tcb) 418
15.12.2 timer 419
15.12.3 main module 419
15.12.4 input processing module 423
15.12.5 output processing module 424
15.13 in-depth reading 424
15.13.1 reference books 424
15.13.2 rfc 424
15.14 important term 424
15.15 Summary of this chapter 425
15.16 practical arrangements 426
15.16.1 exercise 426
15.16.2 Research activities 429
Chapter 16 flow Control transfer Protocol (sctp) 430
16.1 introduction 430
16.2 sctp services 431
16.2.1 process-to-process communication 431
16.2.2 multiple streams 432
16.2.3 multiple attribution 432
16.2.4 full-duplex communication 433
16.2.5 connection-oriented services 433
16.2.6 reliable service 433
Characteristics of sctp 433
16.3.1 Transmission sequence number (tsn) 434
16.3.2 Stream Identifier (si) 434
16.3.3 sequence number (ssn) 434
16.3.4 grouping 434
16.3.5 confirmation number 436
16.3.6 flow control 436
16.3.7 error control 437
16.3.8 congestion Control 437
16.4 grouping format 437
16.4.1 GM first 437
16.4.2 yuan (chunk) 438
16.5 sctp association 444
16.5.1 Association Establishment 445
16.5.2 data transfer 447
16.5.3 Association termination 449
16.5.4 abnormal termination of association 449
16.6 State transition figure 450
16.6.1 several cases 451
16.6.2 other cases 453
16.7 flow control 454
16.7.1 recipient 454
16.7.2 sender 454
16.7.3 one case 455
16.8 error control 456
16.8.1 recipient 456
16.8.2 Sender 457
16.8.3 send block 458
16.8.4 generate sack block 458
16.9 congestion control 459
16.9.1 congestion control and multi-homing 459
16.9.2 explicit congestion Notification 459
16.10 in-depth reading 459
16.10.1 reference Books 460
16.10.2 rfc 460
16.11 important term 460
16.12 Summary of this chapter 460
16.13 practical arrangements 461
16.13.1 exercise 461
16.13.2 Research activities 463
Part IV Application layer
Chapter 17 introduction to the application layer 467
17.1 client-server paradigm 467
17.1.1 Server 468
17.1.2 customer 468
17.1.3 concurrent 468
17.1.4 socket interface 470
17.1.5 Communications using udp 477
17.1.6 Communications using tcp 480
17.1.7 predefined client-server applications 486
17.2 P2P Paradigm 486
17.3 in-depth reading 487
17.4 important terms 487
17.5 Summary of this chapter 487
17.6 practical arrangements 488
17.6.1 exercise 488
Chapter 18 Host configuration: dhcp 489
18.1 introduction 489
18.1.1 protocols used 490
18.2 dhcp Operation 490
18.2.1 same network 491
18.2.2 different networks 491
18.2.3 udp Port 492
18.2.4 using tftp 493
18.2.5 error Control 493
18.2.6 grouping format 493
18.3 configuration 495
18.3.1 static address assignment 495
18.3.2 dynamic address allocation 496
18.3.3 transition status 496
18.3.4 other 497
18.3.5 Exchange message 498
18.4 in-depth reading 498
18.4.1 reference books and rfc 499
18.5 important term 499
18.6 Summary of this chapter 499
18.7 practice arrangement 499
18.7.1 exercise 499
18.7.2 Research activities 500
Chapter 19 Domain name system (dns) 501
19.1 necessity of dns
19.2 Namespace 502
19.2.1 flat namespace 503
19.2.2 hierarchical namespace 503
19.2.3 Domain name space 503
19.2.4 Domain 505
19.2.5 Distribution of domain name space 505
19.3 dns 507 in the Internet
19.3.1 generic domain 507
19.3.2 country Domain 508
19.3.3 reverse domain 508
19.4 parsing 509
19.4.1 Parser 509
19.4.2 name-to-address mapping 510
19.4.3 address-to-name mapping 510
19.4.4 Recursive parsing 510
19.4.5 iterative analysis 511
19.4.6 Cache 511
19.5 dns message 512
19.5.1 first 512
19.6 Type of record 514
19.6.1 problem record 514
19.6.2 Resource record 515
19.7 Compression 516
19.8 package 519
19.9 registered institutions 519
19.10 ddns 520
19.11 Security of dns 520
19.12 in-depth reading 521
19.12.1 reference Books 521
19.12.2 rfc 521
19.13 important term 521
19.14 Summary of this chapter 521
19.15 practice arrangement 522
19.15.1 exercise 522
19.15.2 Research activities 523
Chapter 20 Telnet: tel and ssh 525
20.1 tel 525
20.1.1 concept 525
20.1.2 timeshare environment 526
20.1.3 Network Virtual Terminal (nvt) 527
20.1.4 embedded 528
20.1.5 option 529
20.1.6 Symmetry 532
20.1.7 Sub-option negotiation 532
20.1.8 Control of the server 532
20.1.9 out-of-band signaling 533
20.1.10 escape character 534
20.1.11 Mode of operation 535
20.1.12 user interface 536
20.1.13 Security issues 537
20.2 ssh 537
20.2.1 version 537
20.2.2 composition 537
20.2.3 Port forwarding 538
20.2.4 ssh grouping format 539
20.3 in-depth reading 539
20.3.1 reference Books 539
20.3.2 rfc 539
20.4 important term 540
20.5 Summary of this chapter 540
20.6 practical arrangements 541
20.6.1 exercise 541
20.6.2 Research activities 541
Chapter 21 File transfer: ftp and tftp 543
21.1 File transfer Protocol (ftp) 543
21.1.1 connection 544
21.1.2 Communications 545
21.1.3 Command processing 547
21.1.4 File transfer 550
21.1.5 Anonymous ftp 553
21.2 simple File transfer Protocol (tftp) 554
21.2.1 message 555
21.2.2 Connect 557
21.2.3 data transmission 557
21.2.4 udp Port 559
21.2.5 tftp example 560
21.2.6 tftp option 561
21.2.7 Security 561
21.2.8 Application 561
21.3 in-depth reading 561
21.3.1 reference books 562
21.3.2 rfc 562
21.4 important term 562
21.5 Summary of this chapter 562
21.6 practical arrangements 563
21.6.1 problem set 563
21.6.2 Research activities 564
Chapter 22 World wide Web and 565
22.1 Architecture 565
22.1.1 Hypertext and hypermedia 566
22.1.2 web customer (browser) 567
22.1.3 web Server 567
22.1.4 uniform Resource Locator (url) 567
22.2 web documentation 568
22.2.1 static document 568
22.2.2 dynamic documents 568
22.2.3 active document 570
22.3 571
22.3.1 transaction 571
22.3.2 conditional request 577
22.3.3 continuous connection 577
22.3.4 cookie 579
22.3.5 web cache: proxy server 581
22.3.6 Safety 581
22.4 in-depth reading 582
22.4.1 reference Books 582
22.4.2 rfc 582
22.5 important terms 582
22.6 Summary of this chapter 583
22.7 practical arrangements 583
22.7.1 exercises 583
22.7.2 Research activities 584
Chapter 23 email: smtp, pop, imap and mime 585
23.1 Architecture 585
23.1.1 first case 586
23.1.2 second case 586
23.1.3 third case 587
23.1.4 fourth case 587
23.2 user Agent 588
23.2.1 Services provided by user agents 589
23.2.2 user Agent Type 589
23.2.3 send email 589
23.2.4 receiving mail 590
23.2.5 address 590
23.2.6 dispatch list or grouping list 590
23.3 message delivery Agent: smtp 590
23.3.1 commands and responses 591
23.3.2 Mail delivery phase 594
Message reading agents: pop and imap 596
23.4.1 pop3 597
23.4.2 imap4 597
23.5 mime 598
23.5.1 mime head 598
23.6 World wide Web-based mail 602
23.6.1 case one 602
23.6.2 case II 603
23.7 Security of email 603
23.8 in-depth reading 604
23.8.1 reference Book 604
23.8.2 rfc 604
23.9 important term 604
23.10 Summary of this chapter 604
23.11 practical arrangements 605
23.11.1 exercise 605
23.11.2 Research activities 606
Chapter 24 Network Management (snmp) 607
24.1 concept 607
24.1.1 Manager and Agent 608
24.2 Management component 608
24.2.1 the role of snmp 609
24.2.2 the role of smi
24.2.3 role of mib 609
24.2.4 analogy 609
24.2.5 Overview 610
24.3 smi 611
24.3.1 name 611
24.3.2 Type 612
24.3.3 Encoding method 613
24.4 mib 615
24.4.1 access to mib variable 615
24.4.2 lexicographic sort 618
24.5 snmp 618
24.5.1 pdu 618
24.5.2 format 620
24.5.3 message 621
24.6 udp port 623
24.7 Security 624
24.8 in-depth reading 624
24.8.1 reference Books 624
24.8.2 rfc 624
24.9 important term 625
24.10 Summary of this chapter 625
24.11 practical arrangements 625
24.11.1 exercise 625
24.11.2 Research activities 626
Chapter 25 Multimedia 627
25.1 introduction 627
25.2 Digital Audio and Video 628
25.2.1 Digital Audio 628
25.2.2 Digital Video 628
25.3 Audio and video compression 629
25.3.1 Audio Compression 629
25.3.2 Video compression 630
25.4 streaming storage audio / video 633
25.4.1 first method: use World wide Web server 633
25.4.2 second method: using a World wide Web server with metafiles 633
25.4.3 third method: use Media Server 634
25.4.4 fourth method: use Media Server and rtsp 634
25.5 Live streaming audio / video 635
25.6 Real-time interactive audio / video 636
25.6.1 feature 636
25.7 rtp 639
25.7.1 rtp grouping format 640
25.7.2 udp port 641
25.8 rtcp 641
25.8.1 Sender report 641
25.8.2 recipient report 642
25.8.3 Source Point description message 642
25.8.4 Bye message 642
25.8.5 Application-specific message 642
25.8.6 udp port 642
25.9 ip Voice 642
25.9.1 sip 642
25.9.2 h.323 644
25.10 quality of service 646
25.10.1 characteristics of stream 646
25.10.2 Classification of streams 647
25.10.3 Technology to improve qos 647
25.10.4 Resources reserved 650
25.10.5 license Control 650
25.11 Integrated Services 650
25.11.1 signaling 651
25.11.2 stream specification 651
25.11.3 license 651
25.11.4 Service Category 651
25.11.5 rsvp 652
25.11.6 problems in integrated services 653
25.12 DiffServ 654
25.13 in-depth reading 655
25.13.1 reference books 655
25.13.2 rfc 656
25.14 important term 656
25.15 Summary of this chapter 656
25.16 practice arrangement 657
25.16.1 exercise 657
Part V the next generation
Chapter 26 ipv6 addressing 661
26.1 introduction 661
26.1.1 notation 661
26.1.2 address space 664
26.1.3 three address types 664
26.1.4 broadcast and Multicast 665
26.2 address space allocation 665
26.2.1 assigned and reserved address blocks 667
26.3 Global unicast address 670
26.3.1 three-tier structure 670
26.4 automatic configuration 672
26.5 renumber 673
26.6 in-depth reading 673
26.6.1 reference Books 673
26.6.2 rfc 673
26.7 important terms 673
26.8 Summary of this chapter 674
26.9 practical arrangements 674
26.9.1 exercise 674
Chapter 27 ipv6 Agreement 676
27.1 introduction 676
27.1.1 reasons for change 676
27.1.2 reasons for slow adoption 677
27.2 grouping format 677
27.2.1 basic title 677
27.2.2 Stream label 678
27.2.3 comparison of ipv4 header and ipv6 header 679
27.2.4 extension header 680
27.2.5 comparison of ipv4 and ipv6 684
Transition from ipv4 to ipv6 684
27.3.1 dual stack 684
27.3.2 Tunnel Technology 685
27.3.3 head conversion 685
27.4 in-depth reading 686
27.4.1 reference Books 686
27.4.2 rfc 686
27.5 important term 686
27.6 Summary of this chapter 686
27.7 practical arrangements 687
27.7.1 exercise 687
27.7.2 Research activities 687
Chapter 28 icmpv6 688
28.1 introduction 688
28.2 error message 689
28.2.1 end point unreachable message 689
28.2.2 packet too large message 690
28.2.3 timeout message 690
28.2.4 Parameter problem message 691
28.3 Information message 691
28.3.1 return request message 691
28.3.2 return reply message 692
28.4 neighboring station found message 692
28.4.1 Router query message 692
28.4.2 Router advertisement message 692
28.4.3 neighboring station inquiry message 693
28.4.4 neighboring station notification message 694
28.4.5 change routing message 694
28.4.6 reverse neighboring station inquiry message 695
28.4.7 reverse neighbor Notification message 695
28.5 group membership message 695
28.5.1 membership query message 696
28.5.2 membership report message 696
28.5.3 functional 696
28.6 in-depth reading 698
28.6.1 reference books 698
28.6.2 rfc 698
28.7 important term 698
28.8 Summary of this chapter 698
28.9 practice arrangement 699
28.9.1 exercise 699
28.9.2 Research activities 699
Part VI completeness
Chapter 29 encryption and Network Security 703
29.1 introduction 703
29.1.1 Security goal 704
29.1.2 * 704
29.1.3 Services 706
29.1.4 Technology 706
29.2 traditional encryption methods 706
29.2.1 key 707
29.2.2 alternative encryption method 708
29.2.3 permutation encryption method 710
29.2.4 Stream and Block encryption method 711
29.3 Modern encryption methods 711
29.3.1 Modern block encryption methods 711
29.3.2 data encryption Standard (des) 713
29.3.3 Modern stream encryption method 714
29.4 asymmetric key encryption method 715
29.4.1 key 716
29.4.2 General thinking 716
29.4.3 rsa encryption system 718
29.4.4 Application 720
29.5 message integrity 720
29.5.1 messages and message abstracts 720
29.5.2 Hash function 721
29.6 message authentication 721
29.6.1 hmac 722
29.7 Digital signature 722
29.7.1 comparison 723
29.7.2 process 723
29.7.3 signature of the digest 724
29.7.4 Service 725
29.7.5 rsa digital signature mechanism 726
29.7.6 Digital signature Standard 727
29.8 entity Identification 727
29.8.1 comparison between entity authentication and message authentication 727
29.8.2 Verification Category 727
29.8.3 password 728
29.8.4 question-response 728
29.9 key Management 729
29.9.1 Distribution of symmetric keys 730
29.9.2 symmetric key negotiation 732
29.9.3 Public key distribution 733
29.10 in-depth reading 734
29.11 important term 734
29.12 Summary of this chapter 735
29.13 practical arrangements 736
29.13.1 exercise 736
29.13.2 Research activities 737
Chapter 30 Internet Security 739
30.1 Network layer Security 739
30.1.1 two ways 740
30.1.2 two security protocols 741
30.1.3 Services provided by ipsec 743
30.1.4 Security Association 744
30.1.5 Internet key Exchange (ike) 747
30.1.6 Virtual Private Network (*) 747
30.2 Transport layer Security 748
30.2.1 Architecture of ssl 748
30.2.2 four agreements 750
30.3 Security of the application layer 752
30.3.1 email security 753
30.3.2 fairly good confidentiality (pgp) 753
30.3.3 key ring 755
30.3.4 Certificate of pgp 756
30.3.5 s/mime 758
30.3.6 Application of s/mime 761
30.4 Firewall 761
30.4.1 packet filtering Firewall 762
30.4.2 proxy Firewall 762
30.5 in-depth reading 763
30.6 important terms 763
30.7 Summary of this chapter 764
30.8 practice arrangement 764
30.8.1 exercise 764
30.8.2 Research activities 765
Part VII is attached.
Appendix a unicode 769
A.1 plane 769
A.1.1 basic multilingual plane (bmp) 770
A.1.2 other planes 770
A.2 ascii 770
Appendix b carry counting system 773
B.1 different systems 773
B.1.1 Base 10: decimal 773
B.1.2 Radix 2: binary 773
B.1.3 base 16: hexadecimal 774
B.1.4 Radix 256: dotted decimal notation 774
B.1.5 compare 775
B.2 convert 775
B. 2.1 conversion from arbitrary number system to decimal system 775
B.2.2 conversion from decimal to arbitrary number system 776
B.2.3 other conversions 777
Appendix c error detection code 779
C.1 introduction 779
C.1.1 Type of error 779
C.1.2 redundancy 779
C.1.3 comparison of error detection and correction 779
C.1.4 Encoding 780
C.2 block code 780
C.2.1 error detection 781
C. 2.2 hamming distance 781
C.2.3 minimum hamming distance 781
C. 3 linear block code 782
C.3.1 minimum distance of linear block codes 782
C.4 cyclic code 783
C.4.1 cyclic redundancy check 783
C. 4.2 advantages of cyclic codes 785
C. 4.3 other cyclic codes 785
Appendix d Inspection and 786
D.1 traditional testing and 786
D.1.1 thought 786
D.1.2 Internet testing and 787
D.2 fletcher test and 788
D. 3 adler test and 789
Appendix e html, xhtml, xml and xsl 791
E.1 html 791
E.1.1 label 791
E.1.2 xhtml 794
E.2 xml and xsl 794
Client-server programming in appendix f java 796
F.1 udp Program 796
F.2 tcp Program 798
Appendix g additional information 801
G.1 Port number 801
G.2 rfc 802
G.3 contact address 803
Glossary 804
827 refs.
Introduction to the author
Author: (USA) Behrouz A.Forouzan translator: Wang Hai, Zhang Juan, Zhu Xiaoyang, etc. Commentary: Xie Xiren
Abstract
Illustration:
The Internet is a structured and organized system. Talking about how the Internet works, and how it and
Before the relationship between TCP/P, let's take a look at the brief history of the development of the Internet. Then we define the concepts of protocols and standards and how they relate to each other. We will also discuss the various organizations related to the development of Internet standards. These standards are not developed by any particular organization, but come from the consensus of Internet users. We will discuss the whole mechanism of these standards from initiation to maturity. Of course, as an introduction, this chapter also has some content to introduce the management organization of the Internet.
target
This chapter has the following objectives:
Understand the brief history of the development of the Internet.
Define two terms that people often mention when discussing the Internet: protocols and standards.
Classify the Internet-related standard organizations and briefly introduce them one by one.
Define the concept of Internet standards and explain the mechanisms that these standards need to go through.
Discuss the management structure of the Internet and briefly introduce each management branch.
1.1 A brief history of development
A work is a group of interconnected communication devices, such as computers and printers. The Internet (note: this refers to the intemet that begins with the lowercase letter I) refers to two or more networks that can communicate with each other. The most famous Internet is the Internet (Intemet starting with capital I), which is made up of thousands of interconnected networks. The Internet is used by individuals and different organizations in more than 100 countries and regions, such as government agencies, schools, research institutions, companies and libraries. There are hundreds of millions of Internet users. However, this extraordinary communication system was not invented until 1969.
1.1.1 ARPANET
In the mid-1960s, the mainframe computers owned by research institutions were independent devices. Computers made by different manufacturers cannot communicate with each other. The Defense Department's long-term Research projects Agency (ARPA) hopes to find a way to connect computers so that the researchers they fund can share their research, thus reducing costs and avoiding duplication of effort.
Preface
In today's civilized life, the development and change of technologies related to the Internet and networking may be the fastest. Many experts, scholars and students have made suggestions after reviewing or learning to use the third edition of the book, hoping to include these changes when the new edition of the book is released. In the fourth edition, I reorganized the content of the book, not only incorporating many technical changes, but also adding several new chapters and appendices.
The fourth edition of this book assumes that the reader does not have a preliminary knowledge of the TCP/IP protocol family, but it is best to take a course in data communication in advance.
Content structure
The book is divided into seven parts.
The first part (introduction and underlying technology), including chapters 1-3, reviews some basic concepts and basic technologies. Although this part is not included in the TCP/IP protocol, the TCP/IP protocol needs their support.
The second part (network layer), including chapters 4-12, discusses IPv4 addressing technology, IPv4 protocol, auxiliary protocols of all IPv4 protocols, and unicast and multicast routing protocols.
The third part (transport layer), including chapters 13-16, introduces the overall concept of transport layer (Chapter 13), and then comprehensively discusses three transport layer protocols: UDP, TCP and SCTP (chapters 14, 15, 16).
The fourth part (application layer), including chapters 17-25, introduces the overall concept of the application layer, including client / server mode programming (chapter 17), and then comprehensively discusses seven application layer protocols (chapters 18-24). Chapter 25 is devoted to multimedia technology on the Internet.
The fifth part (new generation), including chapters 26-28, introduces the new generation of IP protocol, IPv6 addressing technology (chapter 26), IPv6 protocol (chapter 27) and ICMPv6 (chapter 28).
The sixth part (security), including chapters 29-30, discusses some unavoidable topics, such as encryption and network security (Chapter 29) and Internet security (Chapter 30).
Part VII (Appendix) contains a total of seven appendices that you may need as you read this book.
Characteristics
In order to make it easier for students to learn TCP/IP, the compilation of this book has the following characteristics.
In an intuitive way
This book describes the highly technical content in a graphic and textual way, but does not use complex formulas. More than 650 illustrations, together with the text, provide an intuitive way to understand this content. Illustrations are particularly important when explaining the concept of a network because the concept of a network is based on connection and transmission. It is easier to understand these concepts with illustrations than with words.
Highlight the key points
Some important concepts are prompted repeatedly, so that readers can quickly find these key points and attract attention.
Examples and applications
As long as appropriate, we will use examples to illustrate the concepts given in the manual. In addition, we put a lot of real-life applications in each chapter to enhance the interest of readers.
Protocol software package
. Although we do not try to give detailed code to implement each protocol, a section is included in many chapters to discuss the general ideas behind each protocol implementation. These contents can help to understand the ideas and related issues of each protocol, but they can also be used as optional readings.
Important terms
The new terms that appear in this chapter are listed at the end of each chapter, and the definitions of these terms are included in the glossary.
Summary
At the end of each chapter is a summary of the content of this chapter. The summary begins with key symbols and lists all the key contents in this chapter.
Practical project
Each chapter includes a practical content to consolidate important concepts while encouraging students to apply them. The practice project consists of two parts: exercises and research activities. To complete the exercises, you need to have a real understanding of what you have learned, and the research activities are arranged for you to delve deeper into them.
Appendix
The purpose of the appendix is to provide quick reference or some content that needs to be reviewed in order to understand the concepts in this book. The appendices in previous editions have been revised and sorted out here, and some new appendices have been added at the same time.
Glossary and
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.