***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 mobi 下载 网盘 caj lrf pdf txt 阿里云

***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社电子书下载地址
- 文件名
- [epub 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 epub格式电子书
- [azw3 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 azw3格式电子书
- [pdf 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 pdf格式电子书
- [txt 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 txt格式电子书
- [mobi 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 mobi格式电子书
- [word 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 word格式电子书
- [kindle 下载] ***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社 kindle格式电子书
寄语:
新华书店正版,关注店铺成为会员可享店铺专属优惠,团购客户请咨询在线客服!
内容简介:
《***P/IP详解》是已故网络专家、有名技术作家W. Richard Stevens的传世之作,内容详尽且极具非常不错,被誉为***P/IP领域的不朽名著。
本书是《***P/IP详解》的第1卷,主要讲述***P/IP协议,结合大量实例讲述***P/IP协议族的定义原因,以及在各种不同的操作系统中的应用及工作方式。第2版在保留Stevens很好的知识体系和写作风格的基础上,新加入的作者Kevin R. Fall结合其作为***P/IP协议研究领域的很好经验来更新本书,反映了近期新的协议和很好的实践方法。首先,他介绍了***P/IP的核心目标和体系结构概念,展示了它们如何能连接不同的网络和支持多个服务同时运行。接着,他详细解释了IPv4和IPv6网络中的互联网地址。然后,他采用自底向上的方式来介绍***P/IP的结构和功能:从链路层协议(如Ethernet和Wi-Fi),经网络层、传输层到应用层。
书中依次全面介绍了ARP、DHCP、NAT、防火墙、ICMPv4/ICMPv6、广播、多播、UDP、DNS等,并详细介绍了可靠传输和***P,包括连接管理、超时、重传、交互式数据流和拥塞控制。此外,还介绍了安全和加密的基础知识,阐述了当前用于保护安全和***的重要协议,包括EAP、IPsec、TLS、DNSSEC和DKIM。
本书适合任何希望理解***P/IP协议如何实现的人阅读,更是***P/IP领域研究人员和开发人员的非常不错参考书。无论你是初学者还是功底深厚的网络领域高手,本书都是案头推荐,将帮助你更深入和直观地理解整个协议族,构建更好的应用和运行更可靠、更高效的网络。
书籍目录:
Foreword v
Chapter 1 Introduction
1.1 Architectural Principles
1.1.1 Packets, Connecti***, and Datagrams
1.1.2 The End-to-End Argument and Fate Sharing
1.1.3 Error Control and Flow Control
1.2 Design and Implementation
1.2.1 Layering
1.2.2 Multiplexing, Demultiplexing, and Encapsulation in Layered
Implementati***
1.3 The Architecture and Protocols of the ***P/IP Suite
1.3.1 The ARPANET Reference Model
1.3.2 Multiplexing, Demultiplexing, and Encapsulation in ***P/IP
1.3.3 Port Numbers
1.3.4 Names, Addresses, and the DNS
1.4 Internets, Intranets, and Extranets
1.5 Designing Applicati***
1.5.1 Client/Server
1.5.2 Peer-to-Peer
1.5.3 Application Programming Interfaces (APIs)
Preface to the Second Edition vii
Adapted Preface to the First Edition xiii
1.6 Standardization Process
1.6.1 Request for Comments (RFC)
1.6.2 Other Standards
1.7 Implementati*** and Software Distributi***
1.8 Attacks Involving the Internet Architecture
1.9 Summary
1.10 References
Chapter 2 The Internet Address Architecture
2.1 Introduction
2.2 Expressing IP Addresses
2.3 Basic IP Address Structure
2.3.1 Classful Addressing
2.3.2 Subnet Addressing
2.3.3 Subnet Masks
2.3.4 Variable-Length Subnet Masks (VL***)
2.3.5 Broadcast Addresses
2.3.6 IPv6 Addresses and Interface Identifiers
2.4 CIDR and Aggregation
2.4.1 Prefixes
2.4.2 Aggregation
2.5 Spe-Use Addresses
2.5.1 Addressing IPv4/IPv6 Translators
2.5.2 Multicast Addresses
2.5.3 IPv4 Multicast Addresses
2.5.4 IPv6 Multicast Addresses
2.5.5 Anycast Addresses
2.6 Allocation
2.6.1 Unicast
2.6.2 Multicast
2.7 Unicast Address Assignment
2.7.1 Single Provider/No Network/Single Address
2.7.2 Single Provider/Single Network/Single Address
2.7.3 Single Provider/Multiple Networks/Multiple Addresses
2.7.4 Multiple Providers/Multiple Networks/Multiple Addresses
(Multihoming)
Contents xvii
2.8 Attacks Involving IP Addresses
2.9 Summary
2.10 References
Chapter 3 Link Layer
3.1 Introduction
3.2 Ethernet and the IEEE 802 LAN/MAN Standards
3.2.1 The IEEE 802 LAN/MAN Standards
3.2.2 The Ethernet Frame Format
3.2.3 802.1p/q: Virtual LANs and QoS Tagging
3.2.4 802.1AX: Link Aggregation (Formerly 802.3ad)
3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control
3.3.1 Duplex Mismatch
3.3.2 Wake-on LAN (WoL), Power Saving, and Magic Packets
3.3.3 Link-Layer Flow Control
3.4 Bridges and Switches
3.4.1 Spanning Tree Protocol (STP)
3.4.2 802.1ak: Multiple Registration Protocol (MRP)
3.5 Wireless LANs—IEEE 802.11(Wi-Fi)
3.5.1 802.11 Frames
3.5.2 Power Save Mode and the Time Sync Function (T***)
3.5.3 802.11 Media Access Control
3.5.4 Physical-Layer Details: Rates, Channels, and Frequencies
3.5.5 Wi-Fi Security
3.5.6 Wi-Fi Mesh (802.11s)
3.6 Point-to-Point Protocol (PPP)
3.6.1 Link Control Protocol (LCP)
3.6.2 Multi link PPP (MP)
3.6.3 Compression Control Protocol (CCP)
3.*** PPP Authentication
3.6.5 Network Control Protocols (NCPs)
3.6.6 Header Compression
3.6.7 Example
3.7 Loopback
3.8 MTU and Path MTU
3.9 Tunneling Basics
3.9.1 Unidirectional Links
x viii Contents
3.10 Attacks on the Link Layer
3.11 Summary
3.12 References
Chapter 4 ARP: Address Resolution Protocol
4.1 Introduction
4.2 An Example
4.2.1 Direct Delivery and ARP
4.3 ARP Cache
4.4 ARP Frame Format
4.5 ARP Examples
4.5.1 Normal Example
4.5.2 ARP Request to a Nonexistent Host
4.6 ARP Cache Timeout
4.7 Proxy ARP
4.8 Gratuitous ARP and Address Conflict Detection (ACD)
4.9 The arp Command
4.10 Using ARP to Set an Embedded Device’s IPv4 Address
4.11 Attacks Involving ARP
4.12 Summary
4.13 References
Chapter 5 The Internet Protocol (IP)
5.1 Introduction
5.2 IPv4 and IPv6 Headers
5.2.1 IP Header Fields
5.2.2 The Internet Checksum
5.2.3 DS Field and ECN (Formerly Called the ToS Byte or IPv6 Traffic Class)
5.2.4 IP Opti***
5.3 IPv6 Extension Headers
5.3.1 IPv6 Opti***
5.3.2 Routing Header
5.3.3 Fragment Header
5.4 IP Forwarding
5.4.1 Forwarding Table
5.4.2 IP Forwarding Acti***
Contents xix
5.4.3 Examples
5.4.4 Discussion
5.5 Mobile IP
5.5.1 The Basic Model: Bidirectional Tunneling
5.5.2 Route Optimization (RO)
5.5.3 Discussion
5.6 Host Processing of IP Datagrams
5.6.1 Host Models
5.6.2 Address Selection
5.7 Attacks Involving IP
5.8 Summary
5.9 References
Chapter 6 System Configuration: DHCP and Autoconfiguration
6.1 Introduction
6.2 Dynamic Host Configuration Protocol (DHCP)
6.2.1 Address Pools and Leases
6.2.2 DHCP and BOOTP Message Format
6.2.3 DHCP and BOOTP Opti***
6.2.4 DHCP Protocol Operation
6.2.5 DHCPv6
6.2.6 Using DHCP with Relays
6.2.7 DHCP Authentication
6.2.8 Reconfigure Extension
6.2.9 Rapid Commit
6.2.10 Location Information (LCI and LoST)
6.2.11 Mobility and Handoff Information (MoS and AND***)
6.2.12 DHCP Snooping
6.3 Stateless Address Autoconfiguration (SLAAC)
6.3.1 Dynamic Configuration of IPv4 Link-Local Addresses
6.3.2 IPv6 SLAAC for Link-Local Addresses
*** DHCP and DNS In***ction
6.5 PPP over Ethernet (PPPoE)
6.6 Attacks Involving System Configuration
6.7 Summary
6.8 References
xx Contents
Chapter 7 Firewalls and Network Address Translation (NAT)
7.1 Introduction
7.2 Firewalls
7.2.1 Packet-Filtering Firewalls
7.2.2 Proxy Firewalls
7.3 Network Address Translation (NAT)
7.3.1 Traditional NAT: Basic NAT and NAPT
7.3.2 Address and Port Translation Behavior
7.3.3 Filtering Behavior
7.3.4 Servers behind NATs
7.3.5 Hairpinning and NAT Loopback
7.3.6 NAT Editors
7.3.7 Service Provider NAT (SPNAT) and Service Provider IPv
Transition
7.4 NAT Traversal
7.4.1 Pin***s and Hole Punching
7.4.2 UNila***l Self-Address Fixing (UNSAF)
7.4.3 Session Traversal Utilities for NAT (STUN)
7.4.4 Traversal Using Relays around NAT (TURN)
7.4.5 In***ctive Connectivity Establishment (ICE)
7.5 Configuring Packet-Filtering Firewalls and NATs
7.5.1 Firewall Rules
7.5.2 NAT Rules
7.5.3 Direct In***ction with NATs and Firewalls: UPnP, NAT-PMP,
and PCP
7.6 NAT for IPv4/IPv6 Coexistence and Transition
7.6.1 Dual-Stack Lite (DS-Lite)
7.6.2 IPv4/IPv6 Translation Using NATs and ALGs
7.7 Attacks Involving Firewalls and NATs
7.8 Summary
7.9 References
Chapter 8 ICMPv4 and ICMPv6: Internet Control Message Protocol
8.1 Introduction
8.1.1 Encapsulation in IPv4 and IPv6
8.2 ICMP Messages
8.2.1 ICMPv4 Messages
Contents xxi
8.2.2 ICMPv6 Messages
8.2.3 Processing of ICMP Messages
8.3 ICMP Error Messages
8.3.1 Extended ICMP and Multipart Messages
8.3.2 Destination Unreachable (ICMPv4 Type 3, ICMPv6 Type 1)
and Packet Too Big (ICMPv6 Type 2)
8.3.3 Redirect (ICMPv4 Type 5, ICMPv6 Type 137)
8.3.4 ICMP Time Exceeded (ICMPv4 Type 11, ICMPv6 Type 3)
8.3.5 Parameter Problem (ICMPv4 Type 12, ICMPv6 Type 4)
8.4 ICMP Query/Informational Messages
8.4.1 Echo Request/Reply (ping) (ICMPv4 Types 0/8, ICMPv6 Types
129/128)
8.4.2 Router Discovery: Router Solicitation and Adverti***t
(ICMPv4 Types 9, 10)
8.4.3 Home Agent Address Discovery Request/Reply (ICMPv6 Types
144/145)
8.4.4 Mobile Prefix Solicitation/Adverti***t (ICMPv6 Types 146/147)
8.4.5 Mobile IPv6 Fast Handover Messages (ICMPv6 Type 154)
8.4.6 Multicast Listener Query/Report/Done (ICMPv6 Types
130/131/132)
8.4.7 Version 2 Multicast Listener Discovery (MLDv2) (ICMPv
Type 143)
8.4.8 Multicast Router Discovery (MRD) (I***P Types 48/49/50,
ICMPv6 Types 151/152/153)
8.5 Neighbor Discovery in IPv6
8.5.1 ICMPv6 Router Solicitation and Adverti***t (ICMPv6 Types
133, 134)
8.5.2 ICMPv6 Neighbor Solicitation and Adverti***t (IMCPv6 Types
135, 136)
8.5.3 ICMPv6 Inverse Neighbor Discovery Solicitation/Adverti***t
(ICMPv6 Types 141/142)
8.5.4 Neighbor Unreachability Detection (NUD)
8.5.5 Secure Neighbor Discovery (SEND)
8.5.6 ICMPv6 Neighbor Discovery (ND) Opti***
8.6 Translating ICMPv4 and ICMPv6
8.6.1 Translating ICMPv4 to ICMPv6
8.6.2 Translating ICMPv6 to ICMPv4
8.7 Attacks Involving ICMP
x xii Contents
8.8 Summary
8.9 References
Chapter 9 Broadcasting and Local Multicasting (I***P and MLD)
9.1 Introduction
9.2 Broadcasting
9.2.1 Using Broadcast Addresses
9.2.2 Sending Broadcast Datagrams
9.3 Multicasting
9.3.1 Converting IP Multicast Addresses to 802 MAC/Ethernet Addresses
9.3.2 Examples
9.3.3 Sending Multicast Datagrams
9.3.4 Receiving Multicast Datagrams
9.3.5 Host Address Filtering
9.4 The Internet Group Management Protocol (I***P) and Multicast Listener
Discovery Protocol (MLD)
9.4.1 I***P and MLD Processing by Group Members (“Group
Member Part”)
9.4.2 I***P and MLD Processing by Multicast Routers (“Multicast
Router Part”)
9.4.3 Examples
9.4.4 Lightweight I***Pv3 and MLDv2
9.4.5 I***P and MLD Robustness
9.4.6 I***P and MLD Counters and Variables
9.4.7 I***P and MLD Snooping
9.5 Attacks Involving I***P and MLD
9.6 Summary
9.7 References
Chapter 10 User Datagram Protocol (UDP) and IP Fragmentation
10.1 Introduction
10.2 UDP Header
10.3 UDP Checksum
10.4 Examples
10.5 UDP and IPv6
10.5.1 Teredo: Tunneling IPv6 through IPv4 Networks
Contents xxiii
10.6 UDP-Lite
10.7 IP Fragmentation
10.7.1 Example: UDP/IPv4 Fragmentation
10.7.2 Reassembly Timeout
10.8 Path MTU Discovery with UDP
10.8.1 Example
10.9 In***ction between IP Fragmentation and ARP/ND
10.10 Maximum UDP Datagram Size
10.10.1 Implementation Limitati***
10.10.2 Datagram Truncation
10.11 UDP Server Design
10.11.1 IP Addresses and UDP Port Numbers
10.11.2 Restricting Local IP Addresses
10.11.3 Using Multiple Addresses
10.11.4 Restricting Foreign IP Address
10.11.5 Using Multiple Servers per Port
10.11.6 Spanning Address Families: IPv4 and IPv6
10.11.7 Lack of Flow and Congestion Control
10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams
10.13 UDP in the Internet
10.14 Attacks Involving UDP and IP Fragmentation
10.15 Summary
10.16 References
Chapter 11 Name Resolution and the Domain Name System (DNS)
11.1 Introduction
11.2 The DNS Name Space
11.2.1 DNS Naming Syntax
11.3 Name Servers and Zones
11.4 Caching
11.5 The DNS Protocol
11.5.1 DNS Message Format
11.5.2 The DNS Extension Format (EDNS0)
11.5.3 UDP or ***P
11.5.4 Question (Query) and Zone Section Format
11.5.5 Answer, Authority, and Additional Information Section Formats
11.5.6 Resource Record Types
x xiv Contents
11.5.7 Dynamic Updates (DNS UPDATE)
11.5.8 Zone Transfers and DNS NOTIFY
11.6 Sort Lists, Round-Robin, and Split DNS
11.7 Open DNS Servers and DynDNS
11.8 Transparency and Extensibility
11.9 Translating DNS from IPv4 to IPv6 (DNS64)
11.10 LLMNR and mDNS
11.11 LDAP
11.12 Attacks on the DNS
11.13 Summary
11.14 References
Chapter 12 ***P: The Transmission Control Protocol (Preliminaries)
12.1 Introduction
12.1.1 ARQ and Retransmission
12.1.2 Windows of Packets and Sliding Windows
12.1.3 Variable Windows: Flow Control and Congestion Control
12.1.4 Setting the Retransmission Timeout
12.2 Introduction to ***P
12.2.1 The ***P Service Model
12.2.2 Reliability in ***P
12.3 ***P Header and Encapsulation
12.4 Summary
12.5 References
Chapter 13 ***P Connection Management
13.1 Introduction
13.2 ***P Connection Establishment and Termination
13.2.1 ***P Half-Close
13.2.2 Simultaneous Open and Close
13.2.3 Initial Sequence Number (ISN)
13.2.4 Example
13.2.5 Timeout of Connection Establishment
13.2.6 Connecti*** and Translators
13.3 ***P Opti***
13.3.1 Maximum Segment Size (MSS) Option
Contents xxv
13.3.2 Selective Acknowledgment (SACK) Opti***
13.3.3 Window Scale (WSCALE or WSOPT) Option
13.3.4 Timestamps Option and Protection against Wrapped
Sequence Numbers (PAWS)
13.3.5 User Timeout (UTO) Option
13.3.6 Authentication Option (***P-AO)
13.4 Path MTU Discovery with ***P
13.4.1 Example
13.5 ***P State Transiti***
13.5.1 ***P State Transition Diagram
13.5.2 TIME_WAIT (2MSL Wait) State
13.5.3 Quiet Time Concept
13.5.4 FIN_WAIT_2 State
13.5.5 Simultaneous Open and Close Transiti***
13.6 Reset Segments
13.6.1 Connection Request to Nonexistent Port
13.6.2 Aborting a Connection
13.6.3 Half-Open Connecti***
13.*** TIME-WAIT Assassination (TWA)
13.7 ***P Server Operation
13.7.1 ***P Port Numbers
13.7.2 Restricting Local IP Addresses
13.7.3 Restricting Foreign Endpoints
13.7.4 Incoming Connection Queue
13.8 Attacks Involving ***P Connection Management
13.9 Summary
13.10 References
Chapter 14 ***P Timeout and Retransmission
14.1 Introduction
14.2 Simple Timeout and Retransmission Example
14.3 Setting the Retransmission Timeout (RTO)
14.3.1 The Classic Method
14.3.2 The Standard Method
14.3.3 The Linux Method
14.3.4 RTT Estimator Behaviors
14.3.5 RTTM Robustness to Loss and Reordering
x xvi Contents
14.4 Timer-Based Retransmission
14.4.1 Example
14.5 Fast Retransmit
14.5.1 Example
14.6 Retransmission with Selective Acknowledgments
14.6.1 SACK Receiver Behavior
14.6.2 SACK Sender Behavior
14.6.3 Example
14.7 Spurious Timeouts and Retransmissi***
14.7.1 Duplicate SACK (DSACK) Extension
14.7.2 The Eifel Detection Algorithm
14.7.3 Forward-RTO Recovery (F-RTO)
14.7.4 The Eifel Resp***e Algorithm
14.8 Packet Reordering and Duplication
14.8.1 Reordering
14.8.2 Duplication
14.9 Destination Metrics
14.10 Repacketization
14.11 Attacks Involving ***P Retransmission
14.12 Summary
14.13 References
Chapter 15 ***P Data Flow and Window Management
15.1 Introduction
15.2 In***ctive Communication
15.3 Delayed Acknowledgments
15.4 Nagle Algorithm
15.4.1 Delayed ACK and Nagle Algorithm In***ction
15.4.2 Disabling the Nagle Algorithm
15.5 Flow Control and Window Management
15.5.1 Sliding Windows
15.5.2 Zero Windows and the ***P Persist Timer
15.5.3 Silly Window Syndrome (SWS)
15.5.4 Large Buffers and Auto-Tuning
15.6 Urgent Mechanism
15.6.1 Example
15.7 Attacks Involving Window Management
Contents xxvii
15.8 Summary
15.9 References
Chapter 16 ***P Congestion Control
16.1 Introduction
16.1.1 Detection of Congestion in ***P
16.1.2 Slowing Down a ***P Sender
16.2 The Classic Algorithms
16.2.1 Slow Start
16.2.2 Congestion Avoidance
16.2.3 Selecting between Slow Start and Congestion Avoidance
16.2.4 Tahoe, Reno, and Fast Recovery
16.2.5 Standard ***P
16.3 Evolution of the Standard Algorithms
16.3.1 NewReno
16.3.2 ***P Congestion Control with SACK
16.3.3 Forward Acknowledgment (FACK) and Rate Halving
16.3.4 Limited Transmit
16.3.5 Congestion Window Validation (CWV)
1*** Handling Spurious RTOs—the Eifel Resp***e Algorithm
16.5 An Extended Example
16.5.1 Slow Start Behavior
16.5.2 Sender Pause and Local Congestion (Event 1)
16.5.3 Stretch ACKs and Recovery from Local Congestion
16.5.4 Fast Retransmission and SACK Recovery (Event 2)
16.5.5 Additional Local Congestion and Fast Retransmit Events
16.5.6 Timeouts, Retransmissi***, and Undoing cwnd Changes
16.5.7 Connection Completion
16.6 Sharing Congestion State
16.7 ***P Friendliness
16.8 ***P in High-Speed Environments
16.8.1 HighSpeed ***P (HS***P) and Limited Slow Start
16.8.2 Binary Increase Congestion Control (BIC and CUBIC)
16.9 Delay-Based Congestion Control
16.9.1 Vegas
16.9.2 FAST
x xviii Contents
16.9.3 ***P Westwood and Westwood+
16.9.4 Compound ***P
16.10 Buffer Bloat
16.11 Active Queue Management and ECN
16.12 Attacks Involving ***P Congestion Control
16.13 Summary
16.14 References
Chapter 17 ***P Keepalive
17.1 Introduction
17.2 Deion
17.2.1 Keepalive Examples
17.3 Attacks Involving ***P Keepalives
17.4 Summary
17.5 References
Chapter 18 Security: EAP, IPsec, TLS, DNSSEC, and DKIM
18.1 Introduction
18.2 Basic Principles of Information Security
18.3 Threats to Network Communication
18.4 Basic Cryptography and Security Mechanisms
18.4.1 Cryptosystems
18.4.2 Rivest, Shamir, and Adleman (RSA) Public Key Cryptography
18.4.3 Diffie-Hellman-Merkle Key Agreement (aka Diffie-Hellman or DH)
18.4.4 Signcryption and Elliptic Curve Cryptography (ECC)
18.4.5 Key Derivation and Perfect Forward Secrecy (PFS)
18.4.6 Pseudorandom Numbers, Generators, and Function Families
18.4.7 Nonces and Salt
18.4.8 Cryptographic Hash Functi*** and Message Digests
18.4.9 Message Authentication Codes (MACs, HMAC, CMAC, and ***AC)
18.4.10 Cryptographic Suites and Cipher Suites
18.5 Certificates, Certificate Authorities (CAs), and Is
18.5.1 Public Key Certificates, Certificate Authorities, and X.509
18.5.2 Validating and Revoking Certificates
18.5.3 Attribute Certificates
Contents xxix
18.6 ***P/IP Security Protocols and Layering
18.7 Network Access Control: 802.1X, 802.1AE, EAP, and PANA
18.7.1 EAP Methods and Key Derivation
18.7.2 The EAP Re-authentication Protocol (ERP)
18.7.3 Protocol for Carrying Authentication for Network Access (PANA)
18.8 Layer 3 IP Security (IPsec)
18.8.1 Internet Key Exchange (IKEv2) Protocol
18.8.2 Authentication Header (AH)
18.8.3 Encapsulating Security Payload (ESP)
18.8.4 Multicast
18.8.5 L2TP/IPsec
18.8.6 IPsec NAT Traversal
18.8.7 Example
18.9 Transport Layer Security (TLS and DTLS)
18.9.1 TLS 1.2
18.9.2 TLS with Datagrams (DTLS)
18.10 DNS Security (DNSSEC)
18.10.1 DNSSEC Resource Records
18.10.2 DNSSEC Operation
18.10.3 Transaction Authentication (TSIG, TKEY, and SIG(0))
18.10.4 DNSSEC with DNS64
18.11 DomainKeys Identified Mail (DKIM)
18.11.1 DKIM Signatures
18.11.2 Example
18.12 Attacks on Security Protocols
18.13 Summary
18.14 References
Glossary of Acronyms
Index
作者介绍:
Kevin R. Fall博士有超过25年的***P/IP工作经验,并且是互联网架构委员会成员。他是互联网研究任务组中延迟容忍网络研究组(DTNRG)的联席主席,该组致力于在特别和挑战性能的环境中探索网络。他是一位IEEE院士。
W. Richard Stevens博士(1951—1999)是靠前知名的Unix和网络专家,受人尊敬的技术作家和咨询顾问。他教会了一代网络专业人员使用***P/IP的技能,使互联网成为人们日常生活的中心。Stevens于1999年9月1日去世,年仅48岁。在短暂但精彩的人生中,他著有多部经典的传世之作,包括《***P/IP 详解》(三卷本)、《UNIX网络编程》(两卷本)以及《UNIX环境不错编程》。2000年他被靠前非常不错机构Usenix追授“终身成就奖”。
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
ARP应答是直接送到请求端主机的,而是广播的。
The ARP reply is thus sent directly to the requesting host; it is not ordinarilly broadcast (see Section 4.8 for some cases where this rule is altered).
internet这个词第一个字母是否大写决定了它具有不同的含义。internet意思是用一个共同的协议族把多个网络连接在一起。而Internet指的是世界范围内通过***P/IP互相通信的所有主机集合(超过1 0 0 万台)。 Internet是一个internet,但internet不等 于Internet。
IP has a *** error handling algorithm: throw away the
datagram and try to send an ICMP message back to the source.
以太网数据帧的物理特性是其长度必须在4 6~1 5 0 0字节之间,而数据帧在进入每一层协议栈的时候均会做一些封装。
当目的主机收到一个以太网帧时,就在协议栈中从底向上升,同时去掉各层协议加上的报文首部。每层协议盒都要去检查报文首部的协议标识,以确定接收数据的上层协议。这个过程称作分用。
其它内容:
编辑推荐
· W. Richard Stevens传奇般的***P/IP指南,现在被很好网络专家Kevin R. Fall更新,反映了新一代的基于***P/IP的网络技术。
·展示每种协议的实际工作原理,并解释其来龙去脉。
·新增加的内容包括RPC、访问控制、身份认证、***保护、NFS、***B/CIFS、DHCP、NAT、防火墙、电子邮件、Web、Web服务、无线、无线安全等。
书籍介绍
【编辑推荐】
本书第1版自1994年出版以来,深受读者欢迎。但是时至今日,第1版的内容有些已经比较陈旧,而且没有涉及IPv6。现在,这部世界领先的***P/IP畅销书已经被彻底更新,反映了新一代基于***P/IP的网络技术。这本书仍保留了Stevens卓越的写作风格,简明、清晰,并且可以快速找到要点。这本书虽然超过一千页,但是并不啰嗦,每章解释一个协议或概念,复杂的***P被分散到多章。我很欣赏本书的一个地方是每章都描述了已有的针对协议的攻击方法。如果你必须自己实现这些协议,并且不希望自己和前人一样遭受同样的攻击,这些信息将是无价的。这本书是日常工作中经常和***P/IP打交道或进行网络软件开发的人必需的,即使你的工作并不基于IP协议,这本书仍然包含很多你可以用到的好想法。”
——摘自Amazon读者评论
【内容简介】
《***P/IP详解》是已故网络专家、著名技术作家W. Richard Stevens的传世之作,内容详尽且极具权威,被誉为***P/IP领域的不朽名著。
本书是《***P/IP详解》的第1卷,主要讲述***P/IP协议,结合大量实例讲述***P/IP协议族的定义原因,以及在各种不同的操作系统中的应用及工作方式。第2版在保留Stevens卓越的知识体系和写作风格的基础上,新加入的作者Kevin R. Fall结合其作为***P/IP协议研究领域领导者的尖端经验来更新本书,反映了最新的协议和最佳的实践方法。首先,他介绍了***P/IP的核心目标和体系结构概念,展示了它们如何能连接不同的网络和支持多个服务同时运行。接着,他详细解释了IPv4和IPv6网络中的互联网地址。然后,他采用自底向上的方式来介绍***P/IP的结构和功能:从链路层协议(如Ethernet和Wi-Fi),经网络层、传输层到应用层。
书中依次全面介绍了ARP、DHCP、NAT、防火墙、ICMPv4/ICMPv6、广播、多播、UDP、DNS等,并详细介绍了可靠传输和***P,包括连接管理、超时、重传、交互式数据流和拥塞控制。此外,还介绍了安全和加密的基础知识,阐述了当前用于保护安全和***的重要协议,包括EAP、IPsec、TLS、DNSSEC和DKIM。
本书适合任何希望理解***P/IP协议如何实现的人阅读,更是***P/IP领域研究人员和开发人员的权威参考书。无论你是初学者还是功底深厚的网络领域高手,本书都是案头必备,将帮助你更深入和直观地理解整个协议族,构建更好的应用和运行更可靠、更高效的网络。
本书特色:
W. Richard Stevens传奇般的***P/IP指南,现在被顶级网络专家Kevin R. Fall更新,反映了新一代的基于***P/IP的网络技术。
展示每种协议的实际工作原理,并解释其来龙去脉。
新增加的内容包括RPC、访问控制、身份认证、***保护、NFS、***B/CIFS、DHCP、NAT、防火墙、电子邮件、Web、Web服务、无线、无线安全等。
网站评分
书籍多样性:9分
书籍信息完全性:8分
网站更新速度:5分
使用便利性:6分
书籍清晰度:9分
书籍格式兼容性:6分
是否包含广告:6分
加载速度:3分
安全性:3分
稳定性:8分
搜索功能:3分
下载便捷性:9分
下载点评
- 超值(103+)
- 一星好评(592+)
- 下载速度快(294+)
- 还行吧(326+)
- 排版满分(151+)
- 购买多(149+)
- 推荐购买(452+)
- 无漏页(402+)
- 收费(101+)
- 品质不错(461+)
下载评价
- 网友 曹***雯:
为什么许多书都找不到?
- 网友 菱***兰:
特好。有好多书
- 网友 习***蓉:
品相完美
- 网友 蓬***之:
好棒good
- 网友 仰***兰:
喜欢!很棒!!超级推荐!
- 网友 龚***湄:
差评,居然要收费!!!
- 网友 益***琴:
好书都要花钱,如果要学习,建议买实体书;如果只是娱乐,看看这个网站,对你来说,是很好的选择。
- 网友 师***怀:
好是好,要是能免费下就好了
- 网友 融***华:
下载速度还可以
- 网友 敖***菡:
是个好网站,很便捷
- 网友 薛***玉:
就是我想要的!!!
- 网友 堵***格:
OK,还可以
喜欢"***P/IP详解卷1:协议(英文版.第2版) 机械工业出版社"的人也看了
***疑难问题案例精解 mobi 下载 网盘 caj lrf pdf txt 阿里云
石板塘 mobi 下载 网盘 caj lrf pdf txt 阿里云
零起步学画漫画美少女.服装与配饰 mobi 下载 网盘 caj lrf pdf txt 阿里云
精密测量技术 李岩 花国梁 中国计量出版社【无忧售后 正版图书】 mobi 下载 网盘 caj lrf pdf txt 阿里云
2004考研英语毕金献冲刺试题解析(最新版)( mobi 下载 网盘 caj lrf pdf txt 阿里云
给孩子一颗感恩的心 mobi 下载 网盘 caj lrf pdf txt 阿里云
2025版《考研*** 真题解析篇(一)》英语(二) mobi 下载 网盘 caj lrf pdf txt 阿里云
物流横向协作体系(一种基于多智能体建模法的仿真研究英文版)(精) mobi 下载 网盘 caj lrf pdf txt 阿里云
机床电气控制线路故障维修 mobi 下载 网盘 caj lrf pdf txt 阿里云
中国古代城市二十讲 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 中外物理学精品书系:现代粒子物理学导论(第三版)(英文影印版) mobi 下载 网盘 caj lrf pdf txt 阿里云
- GB50500-2013建设工程工程量清单计价规范 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 论方法 第一哲学沉思 上海人民出版社 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 发现者旅行指南:山西 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 中华人民***国反有组织犯罪法释义 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 商务职场指导 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 2012农村信用社招聘考试专用系(江苏省):计算机、公共基础知识、法律、经济、金融、会计、 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 桥牌做庄一点通 龚启英 北京体育大学出版社【正版】 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 9787564324971 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 我的光荣与信仰:大律师丹诺回忆录 (美国)克莱伦斯·丹诺(Clarence Darrow) 金城出版社【正版书】 mobi 下载 网盘 caj lrf pdf txt 阿里云
书籍真实打分
故事情节:6分
人物塑造:8分
主题深度:7分
文字风格:7分
语言运用:5分
文笔流畅:8分
思想传递:8分
知识深度:8分
知识广度:7分
实用性:5分
章节划分:4分
结构布局:6分
新颖与独特:5分
情感共鸣:4分
引人入胜:8分
现实相关:8分
沉浸感:7分
事实准确性:8分
文化贡献:8分