java自学网(www.javazx.com)-java论坛,java电子书推荐:《 计算机网络:系统方法(英文版第5版)(计算机网络方面的经典图书,被国外多所名校采用)》 W K6 i5 u+ Q) m. d' p2 Y/ I7 d
java电子书推荐理由:本书是计算机网络方面的经典教科书,凝聚了两位*网络专家几十年的理论研究、实践经验和大量第一手资料,自出版以来已经成为网络课程主流教材,被哈佛大学、斯坦福大学、卡内基一梅隆大学、康奈尔大学、普林斯顿大学等众多名校采用。* j/ B1 [( D2 @9 z; b0 Q8 p" r
第5版秉承了前4版的特点,通过丰富的网络和协议设计实例,来阐述计算机网络关键原理。全书的重点在于“为什么这样设计网络”——不仅详细叙述当今网络系统的组成,而且还阐述关键技术和协议如何在实际应用中发挥作用,从而解决具体的问题。本版对内容进行了全面更新,覆盖P2P、无线技术、网络安全和应用等重要主题,更关注网络研究和设计中涉及的应用层问题。
2 Y$ L/ u! `! J/ n, {3 k5 |" C- r% x1 q+ x
作者:彼得森 戴维' u& R( P: z; y Q& I- ^
出版社:机械工业出版社# j8 \! N h" T' e0 q/ L5 b
出版时间:2012-04-01 2 h* b( ^: q) V5 t- Y" @
书籍价格:109.80元
) M7 A( t, ^7 Q3 L( f$ c5 d
& ~" g6 s+ F3 h1 f8 z
. l% z/ I! a" b! q1 P3 `. ~' {% v$ H/ \: \8 M
; e- c# P' j- ujava电子书目录:
! |/ I. m- A. }$ m7 T2 d0 F1 Foundation( b: }7 X5 y$ F0 w+ a4 F
Problem: Building a Network8 m0 e3 G3 [4 M6 `( Z7 w
1.1 Applications
6 X& G/ q. M0 _6 O8 R# K1.1.1 Classes of Applications* N. B A( p; v7 w* J
1.2 Requirements0 h' ?* o5 A' m( v0 @
1.2.1 Perspectives
1 k) V- b2 K' s$ r- @5 B! e# A1.2.2 Scalable Connectivity
5 S# z- n' k4 g c i7 c4 R# [1.2.3 Cost-Effective Resource Sharing
* o% D; f5 p2 ^2 L7 R; @5 \1.2.4 Support for Common Services y+ B: \) C; P$ j) y8 r* H
1.2.5 Manageability8 G N* R, h# A7 Z4 _9 N' I
1.3 Network Architecture
0 B+ ^, g/ Z9 C' v8 T1.3.1 Layering and Protocols7 }" h; ^4 Z. X& ~; p
1.3.2 Internet Architecture/ y# @& }! C4 }$ {4 P0 N
1.4 Implementing Network Software
( H6 a w {! T5 Y; D8 w1.4.1 Application Programming Interface(Sockets)6 S; L! A7 u9 H6 U8 @8 S" K( |
1.4.2 Example Application9 N, X9 s& H# {6 s
1.5 Performance
- U; u/ A$ E9 m' F0 h: W3 z1.5.1 Bandwidth and Latency
( I! }. f9 b, R. t' ]9 R$ u4 G0 `1.5.2 Delay x Bandwidth Product
# a* o3 i! Q) {1.5.3 High-Speed Networks- g+ }$ V p. J
1.5.4 Application Performance Needs9 w) |# m( x8 `* C1 `! V
1.6 Summary8 D1 A% r3 e Z9 w% r$ K& Z
What's Next: Cloud Computing
6 y( C" n$ i2 B4 BFurther Reading
3 A( P, W& @ g% sExercises 2 Getting Connected0 K; N# f5 T# P- f2 f8 E1 a+ x* _& `
Problem: Connecting to a Network% Z, I6 _) U$ H' n! Q* L
2.1 Perspectives on Connecting, _8 e3 V) F8 z' a: l
2.1.1 Classes of Links
) v0 I& m2 q6 `* P2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B)1 L% ^- l4 O! R4 X+ z* M
2.3 Framing x9 C- a; K! [. I9 O) R0 }
2.3.1 Byte-Oriented Protocols(BISYNC,PPP,DDCMP)0 R0 g3 {- L5 E* n! }) i
2.3.2 Bit-Oriented Protocols (HDLC).6 _! E$ v9 C% q$ w# E {
2.3.3 Clock-Based Framing (SONET)
: @7 a* m8 k2 I1 J: o% w- [2.4 Error Detection
& Q! q6 N; m+ ?% Y' m5 a$ k3 K2.4.1 Two-Dimensional Parity
( b- r. V1 {. I0 a7 W; w2.4.2 Internet Checksum Algorithm
. Y2 s' x; d4 I2.4.3 Cyclic Redundancy Check" N+ e! U1 D$ ~
2.5 Reliable Transmission) Y/ c4 V+ J* u2 \
2.5.1 Stop-and-Wait.
1 l5 J" p5 Q, f! W4 q. o/ V% \2.5.2 Sliding Window. s3 j8 C9 w* q+ B8 j
2.5.3 Concurrent Logical Channels! |7 ~: b( Y' I: Y P5 T& P
2.6 Ethernet and Multiple Access Networks (802.3)
7 y5 h& {4 F) I8 b2.6.1 Physical Properties' _( H$ w8 |6 N' p( v/ B7 {% S/ Q
2.6.2 Access Protocol
6 h# L6 x; J$ F. {2.6.3 Experience with Ethernet9 Z, E. [ h( e7 T( ^
2.7 Wireless
3 `+ @% z+ m+ e7 R2.7.1 802.11/Wi-Fi
, o" n3 B2 Y+ R1 C/ {' p1 M2.7.2 Bluetooth(802.1 5.1 )
; l" |+ j+ m; e2.7.3 CeLIPhone Technologies1 W" d8 @$ y. C' s2 H
2.8 Summary
( a" S% \$ a1 N* w2 nWhat's Next: "The Internet of Things"6 M+ \7 ], f7 L" m
Further Reading
# Y4 u7 }1 t/ K4 D3 @+ K v- wExercises 3 Internetworking" r' p' P2 A! ~
Problem: Not All Networks are Directly Connected+ t4 Z: Q# l! J. v
3.1 Switching and Bridging
! z4 n5 z6 z+ t' e3.1.1 Datagrams
* Q% H/ ^3 I" o8 o# R$ t7 d* [/ V3.1.2 VirtuaI Circuit Switching' Y- r; b, _! }" i0 B- I. y
3.1.3 Source Routing3 o& ^: u4 q; i- ]" H
3.1.4 Bridges and LAN Switches, X3 R9 D# B' ^ @
3.2 Basic Internetworking (IP)- c6 E- K7 @! R: ^- t5 p
3.2.1 What Is an Internetwork?/ x: A& E- N9 E/ X) h4 \' _% J& X# F
3.2.2 Service Model! ~( U; y# u) _$ d- u/ `
3.2.3 Global Addresses
. m% G r5 } F- ^3.2.4 Datagram Forwarding in IP
7 @3 Y$ j# o6 ^8 @3.2.5 Subnetting and Classless Addressing* U- F2 v- n: J; H( W
……
( D, T3 q1 H: O; J: e4 Advaned Internetworking6 b% N7 s9 g- v ]8 T, c
5 End-to-End Protocols
) i$ G9 N, s. ]' K6 Congestion Control and Resource Allocation
4 Y2 v9 i" j. Z2 g0 B/ N+ B7 End-to-End Data
" T/ s. ~! h$ Y, G+ L1 O8 D* ~& n: N8 Network Security
$ |/ E$ }4 |) U8 {$ ?) g. s; Z9 Applications
$ I! A E% `5 C6 o8 vJava资料百度网盘下载地址链接(百度云):java自学网(javazx.com) 计算机网络:系统方法(英文版第5版)(计算机网络方面的经典图书,被国外多所名校采用) PDF 高清 电子书 百度云.rar【密码回帖可见】! |& K! [! w( c
8 n: J0 T5 P% Y4 a
" E; y1 s( {" a' l, z1 V
: X' }+ t) Q/ q: k. \; N
y" f! W' M2 ^! F. _
|