欢迎光临
免费的PDF电子书下载网站

TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版) PDF下载

编辑推荐

. ;

内容简介

本书说详尽地讲解了网络互连的原理、网络体系结构、TCP/IP协议族以及近年来互联网发展的*技术。本书包括了TCP/IP、网络互连各个组成部分的设计及其工作,以基工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP网络互连的经典图书,可读性极强,是任何一个想要了解网络互连技术的人所必不可少的参考书。

本书适合为高等院样计算机专业网络相关课程的教材,也适合各类网络技术开发人员阅读。

作者简介

暂无

TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版) PDF下载

目录

Chapter 1 Introduction And Overview 1
1.1 The Motivation For Internetworking 1
1.2 The TCP/IP Internet 2
1.3 Internet Services 3
1.4 History And Scope Of The Internet 6
1.5 The Internet Architecture Board 8
1.6 The IAB Reorganization 9
1.7 The Internet Society 11
1.8 Internet Request For Comments 11
1.9 Internet Protocols And Standardization 12
1.10 Future Growth And Technology 12
1.11 Organization Of The Text 13
1.12 Summary 14

Chapter2 Review Of Underlying Network Technologies 17
2.1 Introduction 17
2.2 Two Approaches To Network Communication 18
2.3 Wide Area And Local Area Networks 19
2.4 Ethernet Technology 20
2.5 Fiber Distributed Data Interconnect(FDDI) 33
2.6 Asynchronous Transfer Mode 37
2.7 WAN Technologies:ARPANET 38
2.8 National Science Foundation Networking 40
2.9 ANSNET 44
2.10 A Very High Speed Backbone(vBNS) 45
2.11 Other Technologies Over Which TCP/IP Has Been Used 46
2.12 Summary And Conclusion 50

Chapter 3 Internetworking Concept And Architectural Model 53
3.1 Introduction 53
3.2 Application-Level Interconnection 53
3.3 Network-Level Interconnection 54
3.4 Properties Of The Internet 55
3.5 Internet Architecture 56
3.6 Interconnection Through IP Routers 56
3.7 The Users View 58
3.9 The Unanswered Questions 59
3.10 Summary 60

Chapter 4 Classful Internet Addresses 63
4.1 Introduction 63
4.2 Universal Identifiers 63
4.3 The Original Classful Addressing Scheme 64
4.4 Addresses Specify Network Connections 65
4.5 Network And Directed Broadcast Addresses 65
4.6 Limited Broadcast 66
4.7 Interpreting Zero To Mean “This” 67
4.8 Subnet And Supernet Extensions 67
4.9 IP Multicast Addresses 68
4.10 Weaknesses In Internet Addressing 68
4.11 Dotted Decimal Notation 69
4.12 Loopback Address 70
4.13 Summary Of Special Address Conventions 70
4.14 Internet Addressing Authority 71
4.15 Reserved Address Prefixes 72
4.16 An Example 72
4.17 Network Bye Order 74
4.18 Summary 75

Chapter 5 Mapping Internet Addresses To Physical Addresses(ARP) 77
5.1 Introduction 77
5.2 The Address Resolution Problem 77
5.3 Two Types Of Physical Addresses 78
5.4 Resolution Through Direct Mapping 78
5.5 The Address Resolution Cache 80
5.6 The Address Resolution Cache 80
5.7 ARP Cache Timeout 81
5.8 ARP Refinements 82
5.9 Relationship Of ARP To Other Protocols 82
5.10 ARP Encapsulation And Identification 84
5.12 ARP Protocol Format 84
5.13  Summary 86

Chapter 6 Determining An Internet Address At Startup(RARP) 89
6.1 Introduction 89
6.2 Reverse Address Resolution Protocol(RARP) 90
6.3 Timing RARP Transactions 92
6.4 Primary And Backup RARP Servers 92
6.5 Summary 93

Chapter 7 Internet Protocol:Connectionless Datagram Delivery 95
7.1 Introduction 95
7.2 A Virtual Network 95
7.3 Internet Architecture And Philosophy 96
7.4 The Conceptual Service Organization 96
7.5 Connectionless Delivery System 97
7.6 Purpose Of The Internet Protocol 97
7.7 The Internet Datagram 97
7.8 Internet Datagram Options 107
7.9 Summary 113

Chapter 8 Internet Protocol:Routing IP Datagrams 115
8.1 Introduction 115
8.2 Routing In An Internet 115
8.3 Direct And Indirect Delivery 117
8.4 Table-Driven IP Routing 119
8.5 Next-Hop Routing 119
8.6 Default Routes 121
8.7 Host-Specific Routes 121
8.8 The IP Routing Algorithm 121
8.9 Routing With IP Addresses 122
8.10 Handling Incoming Datagrams 124
8.11 Establishing Routing Tables 125
8.12 Summary 125

Chapter 9 Internet Protocol:Error And Control Messages(ICMP) 129
9.1 Introduction 129
9.2 The Internet Control Message Protocol 129
9.3 Error Reporting vs. Error Correction 130
9.4 ICMP Message Delivery 131
9.5 ICMP Message Format 132
9.6 Testing Destination Reachability And Status(Ping) 133
9.7 Echo Request And Reply Message Format 134
9.8 Reports Of Unreachable Destinations 134
9.9 Congestion And Datagram Flow Control 136
9.10 Source Quench Format 136
9.11 Route Change Requests From Routers 137
9.12 Detecting Circular Or Excessively Long Routes 139
9.13 Reporting Other Problems 140
9.14 Clock Synchronization And Transit Time Estimation 140
9.15 Information Request And Reply Messages 142
9.16 Obtaining A Subnet Mask 142
9.17 Router Discovery 143
9.18 Router Solicitation 144
9.19 Summary 145

Chapter 10 Classless And Subnet Address Extensions(CIDR) 147
10.1 Introduction 147
10.2 Review Of Relevant Facts 147
10.3 Minimizing Network Numbers 148
10.4 Transparent Routers 149
10.5 Proxy ARP 150
10.6 Subnet Addressing 152
10.7 Flexibility In Subnet Address Assignment 154
10.8 Variable-Length Subnets 155
10.9 Implementation Of Subnets With Masks 156
10.10 Subnet Mask Representation 157
10.11 Routing In The Presence Of Subnets 158
10.12 The Subnet Routing Algorithm 159
10.13 A Unified Routing Algorithm 160
10.14 Maintenance Of Subnet Masks 161
10.15 Broadcasting To Subnets 161
10.16 Anonymous Point-To-Point Networks 162
10.17 Classless Addressing(Supernetting) 164
10.18 The Effect Of Supernetting On Routing 165
10.19 CIDR Address Blocks And Bit Masks 165
10.20 Address Blocks And CIDR Notation 166
10.21 A Classless Addressing Example 167
10.22 Data Structures And Algorithms For Classless Lookup 167
10.23 Longest-Match Routing And Mixtures Of Route Types 170
10.24 CIDR Blocks Reserved For Private Networks 172
10.25 Summary 173

Chapter 11 Protocol Layering 177
11.1 Introduction 177
11.2 The Need For Multiple Protocols 177
11.3 The Conceptual Layers Of Protocol Software 178
11.4 Functionality Of The Layers 181
11.5 X.25 And Its Relation To The ISO Model 182
11.6 Differences Between ISO And Internet Layering 185
11.7 The Protocol Layering Principle 187
11.8 Layering In The Presence Of Network Substructure 189
11.9 Two Important Boundaries In The TCP/IP Model 191
11.10 The Disadvantage Of Layering 192
11.11 The Basic Idea Behind Multiplexing And Demultiplexing 192
11.12 Summary 194

Chapter 12 User Datagram Protocol(UDP) 197
12.1 Introduction 197
12.2 Identifying The Ultimate Destination 197
12.3 The User Datagram Protocol 198
12.4 Format Of UDP Messages 199
12.5 UDP Pseudo-Header 200
12.6 UDP Encapsulation And Protocol Layering 201
12.7 Layering And The UDP Checksum Computation 203
12.8 UDP Multiplexing,Demultiplexing,And Ports 203
12.9 Reserved And Available UDP Port Numbers 204
12.10 Summary 206

Chapter 13 Reliable Stream Transport Service(TCP) 209
13.1 Introduction 209
13.2 The Need For Stream Delivery 209
13.3 Properties Of The Reliable Delivery Service 210
13.4 Providing Reliability 211
13.5 The Idea Behind Sliding Windows 213
13.6 The Transmission Control Protocol 215
13.7 Ports,Connections,And Endpoints 216
13.8 Passive And Active Opens 218
13.9 Segments,Streams,And Sequence Numbers 219
13.10 Variable Window Size And Flow Control 220
13.11 TCP Segment Format 221
13.12 Out Of Band Data 222
13.13 Maximum Segment Size Option 223
13.14 TCP Checksum Computation 224
13.15 Acknowledgements And Retransmission 225
13.16 Timeout And Retransmission 226
13.17 Accurate Measurement Of Round Trip Samples 228
13.18 Karns Algorithm And Timer Backoff 229
13.19 Responding To High Variance In Delay 230
13.20 Response To Congestion 232
13.21 Congestion,Tail Drop,And TCP 234
13.22 Random Early Discard(RED) 235
13.23 Establishing A TCP Connection 237
13.24 Initial Sequence Numbers 239
13.25 Closing a TCP Connection 239
13.26 TCP Connection Reset 241
13.27 TCP State Machine 241
13.28 Forcing Data Delivery 243
13.29 Reserved TCP Port Numbers 243
13.30 TCP Performance 243
13.31 Silly Window Syndrome And Small Packets 245
13.32 Avoiding Silly Window Syndrome 246
13.33 Summary 249

Chapter 14 Routing:Cores,Peers,And Algorithms 253
14.1 Introduction 253
14.2 The Origin Of Routing Tables 254
14.3 Routing With Partial Information 255
14.4 Original Internet Architecture And Cores 256
14.5 Core Routers 257
14.6 Beyond The Core Architecture To Peer Backbones 260
14.7 Automatic Route Propagation 262
14.8 Distance Vector (Bellman-Ford)Routing 262
14.9 Gateway-To-Gateway Protocol(GGP) 264
14.10 Distance Factoring 265
14.11 Reliability And Routing Protocols 265
14.12 Link-State(SPE)Routing 266
14.13 Summary 267

Chapter 15 Routing:Exterior Gateway Protocols And Autonomous 269
Systems(BGP)
15.1 Introduction 269
15.2 Adding Complexity To The Architectural Model 269
15.3 Determining A Practical Limit On Group Size 270
15.4 A Fundamental Idea:Extra Hops 271
15.5 Hidden Networks 273
15.6 Autonomous System Concept 274
15.7 From A Core To Independent Autonomous Systems 275
15.8 An Exterior Gateway Protocol 276
15.9 BGP Characteristics 277
15.10 BGP Functionality And Message Types 278
15.11 BGP Message Header 278
15.12 BGP OPEN Message 279
15.13 BGP UPDATE Message 280
15.14 Compressed Mask-Address Pairs 281
15.15 BGP Path Attributes 282
15.16 BGP KEEPALIVE Message 283
15.17 Information From The Receivers Perspective 284
15.18 The Key Restriction Of Exterior Gateway Protocols 285
15.19 The Internet Routing Arbiter System 287
15.20 BGP NOTIFICATION Message 288
15.21 Decentralization Of Internet Architecture 289
15.22 Summary 290

Chapter 16 Routing:In An Autonomous System(RIP,OSPF,HELLO) 293
16.1 Introduction 293
16.2 Static Vs. Dynamic Interior Routes 293
16.3 Routing Information Protocol(RIP) 296
16.4 The Hello Protocol 305
16.5 Delay Metrics And Oscillation 305
16.6 Combining RIP,Hello,And BGP 307
16.7 Inter-Autonomous System Routing 307
16.8 Gated:Inter-Autonomous System Communication 308
16.9 The Open SPF Protocol(OSPF) 308
16.10 Routing With Partial Information 315
16.11 Summary 315

Chapter 17 Internet Multicasting 319
17.1 Introduction 319
17.2 Hardware Broadcast 319
17.3 Hardware Origins Of Multicast 320
17.4 Ethernet Multicast 321
17.5 IP Multicast 321
17.6 The Conceptual Pieces 322
17.7 IP Multicast Addresses 323
17.8 Multicast Address Semantics 325
17.9 Mapping IP Multicast To Ethernet Multicast 325
17.10 Hosts And Multicast Delivery 326
17.11 Multicast Scope 326
17.12 Extending Host Software To Handle Multicasting 327
17.13 Internet Group Management Protocol 328
17.14 IGMP Implementation 328
17.15 Group Membership State Transitions 329
17.16 IGMP Message Format 331
17.17 Multicast Forwarding And Routing Information 332
17.18 Basic Multicast Routing Paradigms 334
17.19 Consequences Of TRPF 335
17.20 Multicast Trees 337
17.21 The Essence Of Multicast Routing 338
17.22 Reverse Path Multicasting 338
17.23 Distance Vector Multicast Routing Protocol 339
17.24 The Mrouted Program 340
17.25 Alternative Protocols 343
17.26 Core Based Trees(CBT) 343
17.27 Protocol Independent Multicast(PIM) 344
17.28 Multicast Extensions To OSPF(MOSPF) 347
17.29 Reliable Multicast And ACK Implosions 347
17.30 Summary 349

Chapter 18 TCP/IP Over ATM Networks 353
18.1 Introduction 353
18.2 ATM Hardware 354
18.3 Large ATM Networks 354
18.4 The Logical View Of An ATM Network 355
18.5 The Two Connection Paradigms 356
18.6 Paths,Circuits,And Identifiers 357
18.7 ATM Cell Transport 358
18.8 ATM Adaptaion Layers 358
18.9 ATM Adaptation Layer 5 360
18.10 AAL5 Convergence,Segmentation,And Reassembly 361
18.11 Datagram Encapsulation And IP MTU Size 361
18.12 Packet Type And Multiplexing 362
18.13 IP Address Binding In An ATM Network 363
18.14 Logical IP Subnet Concept 364
18.15 Connection Management 365
18.16 Address Binding Within An LIS 366
18.17 ATMARP Packet Format 366
18.18 Using ATMARP packets To Determine An Address 369
18.19 Obtaining Entries For A Server Database 370
18.20 Timing Out ATMARP Information In A Server 370
18.21 Timing Out ATMARP Information In A Host Or Router 371
18.22 IP Switching Technologies 371
18.23 Switch Operation 372
18.24 Optimized IP Forwarding 372
18.25 Classification,Flows,And Higher Layer Switching 373
18.26 Applicability Of Switching Technology 374
18.27 Summary 374

Chapter 19 Mobile IP 377
19.1 Introduction 377
19.2 Mobility,Routing,and Addressing 377
19.3 Mobile IP Characteristics 378
19.4 Overview Of Mobile IP Operation 378
19.5 Mobile Addressing Details 379
19.6 Foreign Agent Discovery 380
19.7 Agent Registration 381
19.8 Registration Message Format 381
19.9 Communication With A Foreign Agent 383
19.10 Datagram Transmission And Reception 383
19.11 The Two-Crossing Problem 384
19.12 Communication With Computers On the Home Network 385
19.13 Summary 386

Chapter 20 Private Network Interconnection(NAT,VPA) 389
20.1 Introduction 389
20.2 Private And Hybrid Networks 389
20.3 A Virtual Private Network(VPN) 390
20.4 VPN Addressing And Routing 392
20.5 AVPN With Private Addresses 393
20.6 Network Address Translation(NAT) 394
20.7 NAT Translation Table Creation 395
20.8 Multi-Address NAT 396
20.9 Port-Mapped NAT 396
20.10 Interaction Between NAT And ICMP 398
20.11 Interaction Between NAT And Applications 398
20.12 Conceptual Address Domains 399
20.13 Slirp And Masquerade 399
20.14 Summary 400

Chapter 21 Client-Server Model Of Interaction 403
21.1 Introduction 403
21.2 The Client-Server Model 403
21.3 A Simple Example:UDP Echo Server 404
21.4 Time And Date Service 406
21.5 The Complexity of Servers 407
21.6 RARP Server 408
21.7 Alternatives To The Client-Server Model 409
21.8 Summary 410

Chapter 22 The Socket Interface 413
22.1 Introduction 413
22.2 The UNIX I/O Paradigm And Network I/O 414
22.3 Adding Network I/O to UNIX 414
22.4 The Socket Abstraction 415
22.5 Creating A Socket 415
22.6 Socket Inheritance And Termination 416
22.7 Specifying A Local Address 417
22.8 Connecting Sockets To Destination Addresses 418
22.9 Sending Data Through A Socket 421
22.10 Receiving Data Through A Socket Addresses 422
22.11 Obtaining Local And Remote Socket Addresses 422
22.12 Obtaining And Setting Socket Options 423
22.13 Specifying A Queue Length For A Server 424
22.14 How A Server Accepts Connections 424
22.15 Servers That Handle Multiple Services 425
22.16 Obtaining And Setting Host Names 426
22.17 Obtaining And Setting The Internal Host Domain 427
22.18 Socket Library Calls 427
22.19 Network Byte Order Conversion Routines 428
22.20 IP Address Manipulation Routines 428
22.21 Accessing The Domain Name System 431
22.22 Obtaining Information About Hosts 432
22.23 Obtaining Information About Networks 433
22.24 Obtaining Information About Protocols 434
22.25 Obtaining Information About Network Services 434
22.26 An Example Client 435
22.27 An Example Server 437
22.28 Summary 440

Chapter 23 Bootstrap And Autoconfiguration(NOOTP,DHCP) 443
23.1 Introduction 443
23.2 The Need An Alternative To RARP 444
23.3 Using IP To Determine An IP Address 444
23.4 The BOOTP Retransmission Policy 445
23.5 The BOOTP Message Format 446
23.6 The Two-Step Bootstrap Procedure 447
23.7 Vendor-Specific Field 448
23.8 The Need For Dynamic Configuration 448
23.9 Dynamic Host Configuration 450
23.10 Dynamic IP Address Assignment 450
23.11 Obtaining Multiple Addresses 451
23.12 Address Acquisition States 452
23.14 Lease Renewal States 454
23.15 DHCP Message Format 455
23.16 DHCP Options And Message Type 456
23.17 Option Overload 457
23.18 DHCP And Domain Names 457
23.19 Summary 458

Chapter 24 The Domain Name System(DNS) 461
24.1 Introduction 461
24.2 Names For Machines 462
24.4 Hierarchical Names 463
24.5 Delegation Of Authority For Names 464
24.6 Subset Authority 464
24.7 Internet Domain Names 465
24.8 Official And Unofficial Internet Domain Names 466
24.9 Named Items And Syntax Of Names 468
24.10 Mapping Domain Names To Addresses 469
24.11 Domain Name Resolution 471
24.12 Efficient Translation 472
24.13 Caching:The Key To Efficiency 473
24.14 Domain Server Message Format 474
24.15 Compressed Name Format 477
24.16 Abbreviation Of Domain Names 477
24.17 Inverse Mappings 478
24.18 Pointer Queries 479
24.19 Object Types And Resource Record Contents 479
24.20 Obtaining Authority For A Subdomain 480
24.21 Summary 481

Chapter 25 Applications:Remote Login(TELNET,Rlogin) 485
25.1 Introduction 485
25.2 Remote Interactive Computing 485
25.3 TELNET Protocol 486
25.4 Accommodating Heterogeneity 488
25.5 Passing Commands That Control The Remote Side 490
25.6 Forcing The Server To Read A Control Function 492
25.7 TELNET Options 492
25.8 TELNET Option Negotiation 493
25.9 Rlogin(BSD UNIX) 494
25.10 Summary 495

Chapter 26 Applications:File Transfer And Access(FTP,TFTP,NFS) 497
26.1 Introduction 497
26.2 File Access And Transfer 497
26.3 On-line Shared Access 498
26.4 Sharing By File Transfer 499
26.5 FTP:The Major TCP/IP File Transfer Protocol 499
26.6 FTP Features 500
26.7 FTP Process Model 500
26.8 TCP Port Number Assignment 502
26.9 The Users View Of FTP 502
26.10 An Example Anonymous FTP Session 504
26.11 TFTP 505
26.12 NFS 507
26.13 NFS Implementation 507
26.14 Remote Procedure Call(RPC) 508
26.15 Summary 509

Chapter 27 Applications:Electronic Mail(SMTP,POP,IMAP,MIME) 511
27.1 Introduction 511
27.2 Electronic Mail 511
27.3 Mailbox Names And Aliases 513
27.4 Alias Expansion And Mail Forwarding 513
27.5 The Relationship Of Internetworking And Mail 514
27.6 TCP?IP Standards For Electronic Mail Service 516
27.7 Electronic Mail Addresses 516
27.8 Pseudo Domain Addresses 518
27.9 Simple Mail Transfer Protocol(SMTP) 518
27.10 Mail Retrieval And Mailbox Manipulation Protocols 521
27.11 The MIME Extension for Non-ASCII Data 522
27.12 MIME Multipart Messages 523
27.13 Summary 524

Chapter 28 Applications :World Wide Web(HTTP) 527
28.1 Introduction 527
28.2 Importance Of The Web 527
28.3 Architectural Components 528
28.4 Uniform Resource Locators 528
28.5 An Example Document 529
28.6 Hypertext Transfer Protocol 530
28.7 HTTP GET Request 530
28.8 Error Messages 531
28.9 Persistent Connections And Lengths 532
28.10 Data Length And Program Output 532
28.11 Length Encoding And Headers 533
28.12 Negotiation 534
28.13 Conditional Requests 535
28.14 Support For Proxy Servers 535
28.15 Caching 536
28.16 Summary 537

Chapter 29 Applications :Voice And Video Over IP(RTP) 539
29.1 Introduction 539
29.2 Audio Clips And Encoding Standards 539
29.3 Audio And Video Transmission And Reproduction 540
29.4 Jitter And Playback Delay 541
29.5 Real-Time Transport Protocol(RTP) 542
29.6 Streams,Mixing,And Multicasting 543
29.7 RTP Encapsulation 544
29.8 RTP Control Protocol(RTCP) 544
29.9 RTCP Operation 545
29.10 IP Telephony And Signaling 546
29.11 Resource Reservation And Quality Of Service 548
29.12 QoS,Utilization,And Capacity 549
29.13 RSVP 549
29.14 COPS 550
29.15 Summary 551

Chapter 30 Applications :Internet Management(SNMP) 553
30.1 Introduction 553
30.2 The Level Of Management Protocols 553
30.3 Architectural Model 554
30.4 Protocol Framework 556
30.5 Examples of MIB Variables 557
30.6 The Structure Of Management Information 558
30.7 Formal Definitions Using ASN.1 559
30.8 Structure And Representation Of MIB Object Names 559
30.9 Simple Network Management Protocol 564
30.10 SNMP Message Format 566
30.11 Example Encoded SNMP Message 569
30.12 New Features In SNMPv3 572
30.13 Summary 572

Chapter 31 Summary Of Protocol Dependencies 575
31.1 Introduction 575
31.2 Protocol Dependencies 575
31.3 The Hourglass Model 577
31.4 Application Program Access 578
31.5 Summary 579

Chapter 32 Internet Security And Firewall Design(Ipsec) 581
32.1 Introduction 581
32.2 Protecting Resources 582
32.3 Information Policy 583
32.4 Internet Security 583
32.5 IP Security(IPsec) 584
32.6 IPsec Authentication Header 584
32.7 Security Association 585
32.8 IPsec Encapsulating Security Payload 586
32.9 Authentication And Mutable Header Fields 587
32.10 IPsec Tunneling 588
32.11 Required Security Algorithms 588
32.12 Secure Sockets 589
32.13 Firewalls And Internet Access 589
32.14 Multiple Connections And Weakest Links 589
32.15 Firewall Implementation 590
32.16 Packet-Level Filters 590
32.17 Security And Packet Filter Specification 591
32.18 The Consequence Of Restricted Access For Clients 592
32.19 Proxy Access Through A Firewall 592
32.20 The Details Of Firewall Architecture 593
32.21 Stub Network 594
32.22 An Alternative Firewall Implementation 595
32.23 Monitoring And Logging 596
32.24 Summary 596

Chapter 33 The Future Of TCP/IP(Ipv6) 599
33.1 Introduction 599
33.2 Why Change? 600
33.3 New Policies 600
33.4 Motivation For Changing Ipv4 600
33.5 The Road To A New Version Of IP 601
33.6 The Name Of The Next IP 602
33.7 Features Of Ipv6 602
33.8 General Form Of An Ipv6 Datagram 603
33.9 Ipv6 Base Header Format 603
33.10 Ipv6 Extension Headers 605
33.11 Parsing An Ipv6 Datagram 606
33.12 Ipv6 Fragmentation And Reassembly 607
33.13 The Consequence Of End-To-End Fragmentation 607
33.14 Ipv6 Source Routing 608
33.15 Ipv6 Options 609
33.16 Size Of The Ipv6 Address Space 610
33.17 Ipv6 Colon Hexadecimal Notation 610
33.18 Three Basic IPv6 Address Types 612
33.19 The Duality Of Broadcast And Multicast 612
33.20 An Engineering Choice And Simulated Broadcast 613
33.21 Proposed Ipv6 Address Space Assignment 613
33.22 Embedded Ipv4 Addresses And Transition 614
33.23 Unspecified And Loopback Addresses 616
33.24 Unicast Address Hierarchy 616
33.25 Aggregatable Global Unicast Address Structure 617
33.26 Interface Identifiers 618
33.27 Additional Hierarchy 619
33.28 Local Addresses 619
33.29 Autoconfiguration And Renumbering 620
33.30 Summary 620

Appendix 1 A Guide To RFCs 523

Appendix 2 Glossary Of Internetworking Terms And Abbreviations 673

Bibliography 721

Index 729

TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版) pdf下载声明

本pdf资料下载仅供个人学习和研究使用,不能用于商业用途,请在下载后24小时内删除。如果喜欢,请购买正版

pdf下载地址

版权归出版社和作者所有,下载链接已删除。如果喜欢,请购买正版!

链接地址:TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版)