首页 诗词 字典 板报 句子 名言 友答 励志 学校 网站地图
当前位置: 首页 > 图书频道 > 教育科技 > 电子与通信 >

通信网基本概念与主体结构(英文版)(第2版)

2010-04-10 
基本信息·出版社:清华大学出版社 ·页码:900 页 ·出版日期:2008年02月 ·ISBN:7302078734 ·条形码:9787302078739 ·版本:第1版 ·装帧:平装 · ...
商家名称 信用等级 购买信息 订购本书
通信网基本概念与主体结构(英文版)(第2版) 去商家看看
通信网基本概念与主体结构(英文版)(第2版) 去商家看看

 通信网基本概念与主体结构(英文版)(第2版)


基本信息·出版社:清华大学出版社
·页码:900 页
·出版日期:2008年02月
·ISBN:7302078734
·条形码:9787302078739
·版本:第1版
·装帧:平装
·开本:16
·正文语种:英语
·丛书名:计算机科学与技术学科研究生系列教材
·外文书名:Communication Netwoeks Fundamental Concepts and key Architectures Second Edition

内容简介 《通信网基本概念与主体结构》(英文版)(第2版)除对第1版内容进行了更新外,还广泛引入了网络协议分析仪分析各种协议的操作过程。《通信网基本概念与主体结构》内容大致分为三部分。第一部分为综述,由前两章组成。主要通过广泛应用的网络业务介绍网络的变革与发展;并通过网络提供的服务讨论网络协议的分层模型和不同层之间的交互作用。
第二部分以电话网、局域网、分组交换网这些基础网络为例,介绍网络体系结构的基本概念和低层协议的主要技术。这部分包含第3章至第7章,其中,第3章介绍数字传输技术的基础知识,内容有不同媒体信息的数字化描述、数字调制、编码、检错、纠错、信道特性及各种传输媒质特性等。第4章介绍电路交换网络中的几种复用和交换技术,重点是SONET。第5章讨论对等层协议,主要讨论数据链路层的ARQ差错控制协议,滑动窗机理,以及实用的PPP协议和HDLC协议。第6章首先详细讨论媒质访问控制技术,包括随机访问、预约访问、信道化访问,然后对以太网、令牌环、FDDI和无线局域网的基本知识和协议作了简要介绍。第7章讨论分组交换网,介绍了几种常用的路由算法,并对不同类型的流量管理机制作了较为深入的分析。
第三部分讨论TCP/IP和ATM这两种主体网络,并进一步阐明基本的网络概念如何体现在这两种主体网络之中。此外,对当前某些热点课题也作了必要介绍。这部分由5章组成,其中,第8章讨论TCP/IP网络的结构和相关协议,包括IP、IPv6、TCP、UDP、内部路由协议和组播路由协议等。第9章讨论ATM网络,主要介绍ATM层和ATM适配层,并对信令和PNNI路由选择作了基本介绍。第10章介绍现代网络结构中的基本概念和主要协议,包括综合服务、区分服务、互连模型以及RSVP、MPLS、RTTP、SCP等协议。第11章介绍网络安全协议和加密算法。第12章讨论网络中的多媒体技术和相关标准,包括数据压缩、信号编码以及分别用于图像和视频编码的JPEG、MPEG标准。
编辑推荐 概括而言,《通信网基本概念与主体结构》(英文版)(第2版)取材广泛,内容新颖,结合实际,既有基本的介绍,又有较为深入的分析,还有大量的习题,可作为计算机、电子等专业本科生、研究生的教学用书,或作为各行业网络技术人员、服务人员的参考读物。
The material in the book has been rearranged so that optional sections can be skipped without a disruption in the topic flow. The sections that contain optional material are indicated by a diamond (◆) in the heading. The optional sections that contain detailed mathematics are now indicated by a sidebar.
  Chapter 1 has been shortened and the discussion of network evolution has been simplified. The functions associated with each layer are introduced along with the discussion on network evolution.
  In Chapter 2 the discussion on how all the layers work together has been improved by introducing examples using Ethereal packet captures. The section on application layer protocols has been expanded and a new section provides an introduction to network protocol analyzers.
  PCM speech coding has been moved from Chapter 12 to Chapter 3. Chapter 4 provides more detail on SONET and optical transport networks. Satellite cellular networks have been dropped.
  Chapter 5 now consists of two parts. The first part deals with peer-to-peer protocols using reliable data transfer protocols as an example. The first part also includes TCP reliable byte stream service. The second part focuses on data link layer protocols and now includes a section on framing.
  Chapter 6 has also been divided into the principles of medium access control protocols Part I and LANs (Part II). We have simplified the mathematical discussion of medium access controls and provide details in a separate section.
  In Chapter 7 we have streamlined the discussion of packet networks, and we have separated clearly the more advanced discussion of traffic management.
  Chapter 8 makes extensive use of packet capture examples to illustrate the operation of TCP/IP protocols.
  Chapter 10 on advanced network architectures has been revised extensively. The discussion of ATMover IP has been replaced by a discussion of the overlay and peer models to network interconnection. The chapter now contains discussion on virtual networks and GMPLS. The material on RTP and SIP has been updated and moved from Chapter 12 to this chapter.
  Chapter 11 has been updated with brief discussions of the Advanced Encryption Standard and 802.1 I security.
目录
Preface

About the Authors
1 Communication Networks and Services
1.1 Evolution of Network Architecture and Services
1.1.1 Telegraph Networks and Message Switching
1.1.2 Telephone Networks and Circuit Switching
1.1.3 The Intemet, Computer Networks, and Packet Switching
1.2 Future Network Architectures and Their Services
1.3 Key Factors in Communication Network Evolution
1.3.1 Role of Technology
1.3.2 Role of Regulation
1.3.3 Role of the Market
1.3.4 Role of Standards
Checklist of Important Terms
Further Reading
Problems

2 Applications and Layered Architectures
2.1 Examples of Protocols, Services, and Layering
2.1.1 HTTP, DNS, and SMTP
2.1.2 TCP and UDP Transport Layer Services
2.2 The OSI Reference Model
2.2.1 The Seven-Layer OSI Reference Model
2.2.2 Unified View of Layers, Protocols, and Services
2.3 Overview of TCP/IP Architecture
2.3.1 TCP/IP Architecture
2.3.2 TCP/IP Protocol: How the Layers Work Together
2.3.3 Protocol Overview
2.4 The Berkeley API
2.4.1 Socket System Calls
2.4.2 Network Utility Functions
2.5 Application Layer Protocols and TCP/IP Utilities
2.5.1 Telnet
2.5.2 File Transfer Protocol
2.5.3 Hypertext Transfer Protocol and the World Wide Web
2.5.4 IP Utilities
2.5.5 Tcpdump and Network Protocol Analyzers
Summary
Checklist of Important Terms
Further Reading
Problems

3 Digital Transmission Fundamentals
3.1 Digital Representation of Information
3.1.1 Block-Oriented Information
3.1.2 Stream Information
3.2 Why Digital Communications?
3.2.1 Comparison of Analog and Digital Transmission
3.2.2 Basic Properties of Digital Transmission Systems
3.3 Digital Representation of Analog Signals
3.3.1 Bandwidth of Analog Signals
3.3.2 Sampling of an Analog Signal
3.3.3 Digital Transmission of Analog Signals
3.3.4 SNR Performance of Quantizers
3.4 Characterization of Communication Channels
3.4.1 Frequency Domain Characterization
3.4.2 Time Domain Characterization
3.5 Fundamental Limits in Digital Transmission
3.5.1 The Nyquist Signaling Rate
3.5.2 The Shannon Channel Capacity
3.6 Line Coding
3.7 Modems and Digital Modulation
3.7.1 Binary Phase Modulation
3.7.2 QAM and Signal Constellations
3.7.3 Telephone Modem Standards
3.8 Properties of Media and Digital Transmission Systems
3.8.1 Twisted Pair
3.8.2 Coaxial Cable
3.8.3 Optical Fiber
3.8.4 Radio Transmission
3.8.5 lnfrared Light
3.9 Error Detection and Correction
3.9.1 Error Detection
3.9.2 Two-Dimensional Parity Checks
3.9.3 Internet Checksum
3.9.4 Polynomial Codes
3.9.5 Standardized Polynomial Codes
3.9.6 Error-Detecting Capability of a Polynomial Code
3.9.7 Linear Codes
3.9.8 Error Correction
Summary
Checklist of Important Terms
Further Reading
Problems
Appendix 3A: Asynchronous Data Transmission
Appendix 3B: Fourier Series
Appendix 3C: Sampling Theorem

4 Circuit-Switching Networks
4.1 Multiplexing
4.1.1 Frequency-Division Multiplexing
4.1.2 Time-Division Multiplexing
4.1.3 Wavelength-Division Multiplexing
4.2 SONET
4.2.1 SONET Multiplexing
4.2.2 SONET Frame Structure
4.3 Transport Networks
4.3.1 SONET Networks
4.3.2 Optical Transport Networks
4.4 Circuit Switches
4.4.1 Space-Division Switches
4.4.2 Time-Division Switches
4.5 The Telephone Network
4.5.1 Transmission Facilities
4.5.2 End-to-End Digital Services
4.6 Signaling
4.6.1 Signaling in the Telephone Network
4.6.2 Signaling System #7Architecture
4.7 Traffic and Overload Control in Telephone Networks
4.7.1 Concentration
4.7.2 Routing Control
4.7.3 Overload Controls
4.8 Cellular Telephone Networks
Summary
Checklist of Important Terms
Further Reading
Problems

5 Peer-to-Peer Protocols and Data Link Layer
Part I: Peer-to-Peer Protocols
5.1 Peer-to-Peer Protocols and Service Models
5.1.1 Service Models
5.1.2 Examples of Services
5.1.3 End to End versus Hop by Hop
5.2 ARQ Protocols and Reliable Data Transfer Service
5.2.1 Stop-and-Wait ARQ
5.2.2 Go-Back-N ARQ
5.2.3 Selective Repeat ARQ
5.3 Other Peer-to-Peer Protocols
5.3.1 Sliding-Window Flow Control
5.3.2 Timing Recovery for Synchronous Services
5.3.3 TCP Reliable Stream Service and Flow Control
Part II: Data Link Controls
5.4 Framing
5.5 Point-to-Point Protocol
5.6 HDLC Data Link Control
5.6.1 Data Link Services
5.6.2 HDLC Configurations and Transfer Modes
5.6.3 HDLC Frame Format
5.6.4 Typical Frame Exchanges
5.7 Link Sharing Using Packet Multiplexers
5.7.1 Statistical Multiplexing
5.7.2 Speech Interpolation and the Multiplexing of Packetized Speech
Summary
Checklist of Important Terms
Further Reading
Problems
Appendix 5A: Derivation of Efficiency of ARQ Protocols

6 Medium Access Control Protocols and Local Area Networks
Part I: Medium Access Control Protocols
6.1 Multiple Access Communications
6.2 Random Access
6.2.1 ALOHA
6.2.2 Slotted ALOHA
6.2.3 Carrier Sense Multiple Access
6.2.4 Carrier Sense Multiple Access with Collision Detection
6.3 Scheduling Approaches to Medium Access Control
6.3.1 Reservation Systems
6.3.2 Polling
6.3.3 Token-Passing Rings
6.3.4 Comparison of Scheduling Approaches in Medium Access Control
6.3.5 Comparison of Random Access and Scheduling Medium Access Controls
6.4 Channelization
6.4.1 FDMA
6.4.2 TDMA
6.4.3 CDMA
6.4.4 Channelization in Telephone Cellular Networks
6.5 Delay Performance of MAC and Channelization Schemes
6.5.1 Performance of Channelization Techniques with Bursty Traffic
6.5.2 Performance of Polling and Token Ring Systems
6.5.3 Random Access and CSMA-CD
Part II: Local Area Networks
6.6 LAN Protocols
6.6.1 LAN Structure
6.6.2 The Medium Access Control Sublayer
6.6.3 The Logical Link Control Sublayer
6.7 Ethernet and IEEE 802.3 LAN Standard
6.7.1 Ethernet Protocol
6.7.2 Frame Structure
6.7.3 Physical Layers
6.7.4 Fast Ethernet
6.7.5 Gigabit Ethernet
6.7.6 10 Gigabit Ethernet
6.8 Token-Ring and IEEE 802.5 LAN Standard
6.8.1 Token-Ring Protocol
6.8.2 Frame Structure
6.9 FDDI
6.10 Wireless LANs and IEEE 802.11 Standard
6.10.1 Ad hoc and Infrastructure Networks
6.10.2 Frame Structure and Addressing
6.10.3 Medium Access Control
6.10.4 Physical Layers
6.11 LAN Bridges and Ethernet Switches
6.11.1 Transparent Bridges
6.11.2 Source Routing Bridges
6.11.3 Mixed-Media Bridges
6.11.4 Virtual LANs
Summary
Checklist of Important Terms
Further Reading
Problems

7 Packet-Switching Networks
7.1 Network Services and Internal Network Operation
7.2 Packet Network Topology
7.3 Datagrams and Virtual Circuits
7.3.1 Connectionless Packet Switching
7.3.2 Virtual-Circuit Packet Switching
7.3.3 Structure of a Packet Switch
7.4 Routing in Packet Networks
7.4.1 Routing Algorithm Classification
7.4.2 Routing Tables
7.4.3 Hierarchical Routing
7.4.4 Specialized Routing
7.5 Shortest-Path Routing
7.5.1 The Bellman-Ford Algorithm
7.5.2 Dijkstra's Algorithm
7.5.3 Source Routing versus Hop-by-Hop Routing
7.5.4 Link-State Routing versus Distance-Vector Routing
7.6 ATM Networks
7.7 Traffic Management at the Packet Level
7.7.1 FIFO and Priority Queues
7.7.2 Fair Queueing
7.7.3 Weighted Fair Queueing
7.7.4 Random Early Detection
7.8 Traffic Management at the Flow Level
7.8.1 Open-Loop Control
7.8.2 Closed-Loop Control
7.9 Traffic Management at the Flow-Aggregate Level
Summary
Checklist of Important Terms
Further Reading
Problems

8 TCP/IP
8.1 The TCP/IP Architecture
8.2 The Internet Protocol
8.2.1 IP Packet
8.2.2 IP Addressing
8.2.3 Subnet Addressing
8.2.4 IP Routing
8.2.5 Classless Interdomain Routing (CIDR)
8.2.6 Address Resolution
8.2.7 Reverse Address Resolution
8.2.8 Fragmentation and Reassembly
8.2.9 ICMP: Error and Control Messages
8.3 IPv6
8.3.1 Header Format
8.3.2 Network Addressing
8.3.3 Extension Headers
8.3.4 Migration Issues from IPv4 to IPv6
8.4 User Datagram Protocol
8.5 Transmission Control Protocol
8.5.1 TCP Operation and Reliable Stream Service
8.5.2 TCP Protocol
8.5.3 TCP Congestion Control
8.6 Internet Routing Protocols
8.6.1 Routing Information Protocol
8.6.2 Open Shortest Path First
8.6.3 Border Gateway Protocol
8.7 Multicast Routing
8.7.1 Reverse-Path Broadcasting
8.7.2 Intemet Group Management Protocol
8.7.3 Reverse-Pa& Multicasting
8.7.4 Distance-Vector Multicast Routing Protocol
8.8 DHCP, NAT, and Mobile IP
8.8.1 Dynamic Host Configuration Protocol
8.8.2 Network Address Translation
8.8.3 Mobile IP
Summary
Checklist of Important Terms
Further Reading
Problems

9 ATM Networks
9.1 Why ATM?
9.2 BISDN Reference Model
9.3 ATM Layer
9.3.1 ATM Cell Header
9.3.2 Virtual Connections
9.3.3 QoS Parameters
9.3.4 Traffic Descriptors
9.3.5 ATM Service Categories
9.3.6 Traffic Contracts, Connection Admission Control,and Traffic Management
9.4 ATM Adaptation Layer
9.4.1 AAL1
9.4.2 AAL2
9.4.3 AAL3/4
9.4.4 AAL5
9.4.5 Signaling AAL
9.4.6 Applications, AALs, and ATM Service Categories
9.5 ATM Signaling
9.5.1 ATM Addressing
9.5.2 UNI Signaling
9.5.3 PNNI Signaling
9.6 PNNI Routing
9.7 Classical IP Over ATM
Summary
Checklist of Important Terms
Further Reading
Problems

10 Advanced Network Architectures
10.1 Integrated Services in the Internet
10.1.1 Guaranteed Service
10.1.2 Controlled-Load Service
10.2 RSVP
10.2.1 Receiver-Initiated Reservation
10.2.2 Reservation Merging
10.2.3 Reservation Styles
10.2.4 Soft State
10.2.5 RSVP Message Format
10.3 Differentiated Services
10.3.1 DS Field
10.3.2 Per-Hop Behaviors
10.3.3 Traffic Conditioner
10.3.4 Bandwidth Broker
10.4 Network Interconnection Models
10.4.1 Overlay Model
10.4.2 Peer-to-Peer Model
10.5 MPLS
10.5.1 Fundamentals of Labels
10.5.2 Label Stack and LSP Hierarchy
10.5.3 VC Merging
10.5.4 Label Distribution Protocols
10.5.5 MPLS Support for Virtual Networks
10.5.6 Survivability
10.5.7 GMPLS
10.6 Real-Time Transport Protocol
10.6.1 RTP Scenarios and Terminology
10.6.2 RTP Packet Format
10.6.3 RTP Control Protocol (RTCP)
10.7 Session Control Protocols
10.7.1 Session Initiation Protocol
10.7.2 H. 323 Multimedia Communication Systems
10.7.3 Media Gateway Control Protocols
Summary
Checklist of Important Terms
Further Reading
Problems

11 Security Protocols
11.1 Security and Cryptographic Algorithms
11.1.1 Applications of Cryptography to Security
11.1.2 Key Distribution
11.2 Security Protocols
11.2.1 Application Scenarios
11.2.2 Types of Security Service
11.2.3 Setting Up a Security Association
11.2.4 IPSec
11.2.5 Secure Sockets Layer and Transport Layer Security
11.2.6 802.11 and Wired Equivalent Privacy
11.3 Cryptographic Algorithms
11.3.1 DES
11.3.2 RSA
Summary
Checklist of Important Terms
Further Reading
Problems

12 Multimedia Information
12.1 Lossless Data Compression
12.1.1 Huffman Codes
12.1.2 Run-Length Codes
12.1.3 Adaptive Data Compression Codes
12.2 Compression of Analog Signals
12.2.1 Adaptive Quantizers
12.2.2 Predictive Coding
12.2.3 Transform and Subband Coding
12.3 Image and Video Coding
12.3.1 Discrete Cosine Transform Coding
12.3.2 The JPEG Image-Coding Standard
12.3.3 Compression of Video Signals
12.3.4 The MPEG Video-Coding Standards
12.3.5 MPEG Multiplexing
Summary
Checklist of Important Terms
Further Reading
Problems

Epilogue

Appendices
A Delay and Loss Performance
A.1 Delay Analysis and Little's Formula
A.1.1 Arrival Rates and Traffic Load Definitions
A.1.2 Little's Formula
A.2 Basic Queueing Models
A.2.1 Arrival Processes
A.2.2 Service Times
A.2.3 Queueing System Classification
A.3 M/M/1: A Basic Multiplexer Model
A.3.1 M/M/1 Steady State Probabilities and the Notion of Stability
A.3.2 Effect of Scale on Performance
A.3.3 Average Packet Delay in a Network
A.4 The M/G/1 Model
A.4.1 Service Time Variability and Delay
A.4.2 Priority Queueing Systems
A.4.3 Vacation Models and Multiplexer Performance
A.5 Erlang B Formula: M/M/c/c System
Further Reading

B Network Management
B.1 Network Management Overview
B.2 Simple Network Management Protocol (SNMP)
B.3 Structure of Management Information
B.4 Management Information Base
B.5 Remote Network Monitoring
Further Reading
Index
……
序言 未来的社会是信息化的社会,计算机科学与技术在其中占据了最重要的地位,这对高素质创新型计算机人才的培养提出了迫切的要求。计算机科学与技术已经成为一门基础技术学科,理论性和技术性都很强。与传统的数学、物理和化学等基础学科相比,该学科的教育工作者既要培养学科理论研究和基本系统的开发人才,还要培养应用系统开发人才,甚至是应用人才。从层次上来讲,则需要培养系统的设计、实现、使用与维护等各个层次的人才。这就要求我们的计算机教育按照定位的需要,从知识、能力、素质三个方面进行人才培养。
硕士研究生的教育需突出"研究
文摘 插图:

热点排行