Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
PEOPLES
Corey
ciencias
Cortney
Cyberlaw
Swingmag
Danish
语录
Prehispanica
Steflitsch
Scientif
Troppo
Woodland
Tatler
里察哈丁
sazialen
ciencia
Silat
Dubliner
Darkhawk
Dodo
Freewheelin
Sightlines
Devoured
Rochlin
Dominio
Patriarchal
1779
双星
Dictionaries
enactments
Doone
lifestyles
Download
Effectively
Demento
Eighteenth
Encyclop
Extending
Benjes
Foolproof
Fukta
Mikrokosmos
Fran
Inagaki
Grandmaster
Zuill
Sheherazade
Hanessian
Lapeyre
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking 网络互连技术
Posted on 2010-04-28
|
前 言本书讲述了在互联网上传送数据的“盒子”的内部是如何工作的,这些“盒子”有不同的名称:网桥、路由器、交换机和集线器。本书也讲述了连接到网络上的设备。在这个领域有不少的混乱。大多数术语的定义不准确,使用时相互抵触;术语及规范的数量惊人;一些知识分布在不同的文档中,还有很多非书面的民间智慧。引起混乱的还有教条。信念被当成真理,对任何教条的置疑都会引起不满的回应。但良好的工程要求我们懂得我们在做什么,以及为什么这样做;要求我们保持开放的思想,从经验中获得知识。在本书中,我没有直接讨论某个协议的细节,而是首先集中在所要解决的问题上。我考查了每个问题的多种解决方法,讨论其中涉及的工程折衷。然后我检查已经应用的方案,对这些方案进行比较。对任何观点,我都给出了技术上的理由,如果你认为我遗落了某些论据,欢迎通过电子邮件与我进行讨论。我的电子邮件地址附在书后,希望你从头到尾读过本书后才能找到它。在本书第1版中,我的意图是帮助人们理解问题和通常的解决方案,而假定他们会去阅读规范以得到特定协议的细节。但人们不仅利用本书来理解问题,还把它当作参考书。因此在本版中,我收录了更多的协议细节。我认为,要深入了解某件东西必须把它与其它东西作比较。第1版是“最小化”的,因为我常只举两个例子:两种网桥,网桥与路由器,面向连接的与无连接的网络层协议,两个无连接的协议(CLNP和IP)。在本版中我增加了更多的例子,包括ATM、IPv6、IPX、AppleTalk和DECnet。这样做,部分是因为这些协议存在着,并且较难找到相关的信息。但更主要的,是因为这些协议体现了不该错过的有趣的想法。当我们设计新协议时,应该学习以前的想法,无论是好的还是坏的。另外,在对问题作了一般描述之后,就很容易讨论一些例子。本书导读前四章与第1版中的相应部分没有明显的不同,但其余部分已大量重写。第1章至第4章包括了一般网络概念、数据链路问题(如编址和复用)、透明桥和生成树算法及源路由网桥。第5章是全新的,解释了交换的概念如何演变到重新发现网桥。它也包括了VLAN和快速以太网。余下部分集中在第三层(网络层)。第6章是网络层概览,第7章涉及面向连接的网络,包括ATM和X.25。第8章讨论无连接网络层的一般问题,第9章包括了第三层中的一般编址技术,详尽比较了IP、IPv6、CLNP、DECnet、AppleTalk和IPX。第10章谈到在网络层报头中应出现的信息及几种协议报头的对比。第11章涉及自动配置和近邻发现,包括ARP和DHCP协议。第12章是一般的路由选择算法。第13章讨论最长前缀匹配问题,这在快速转发IP包时需要。第14章讨论各种路由选择协议的特点,包括RIP、IS-IS、OSPF、PNNI、NLSP和BGP。第15章是网络层组播。第16章说明如何设计免受破坏的网络,这在将来会有用。最后两章总结了本书,我希望它们是轻松有趣的。第17章探究了将网桥和路由器区别开来的秘密,第18章试图收集人们有关如何设计协议的经验知识。最后有一张术语表。我在第一次使用某个术语时会给出定义,但如果我没有给出定义,你也可以从术语表中找到。
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: