图书介绍

TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构
  • (美)Douglas E.Comer著 著
  • 出版社: 北京:人民邮电出版社
  • ISBN:7115099200
  • 出版时间:2002
  • 标注页数:750页
  • 文件大小:30MB
  • 文件页数:782页
  • 主题词:互连网络 协议(计算机) 高等学校 教材 英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

TCP/IP网络互连 英文版 第1卷 原理 协议和体系结构PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1.1 The Motivation For Internetworking1

Chapter 1 Introduction And Overview1

1.2 The TCP/IP Internet2

1.3 Internet Services3

1.4 History And Scope Of The Internet6

1.5 The Internet Architecture Board8

1.6 The IAB Reorganization9

1.7 The Internet Society11

1.8 Internet Request For Comments11

1.10 Future Growth And Technology12

1.9 Internet Protocols And Standardization12

1.11 Organization Of The Text13

1.12 Summary14

Chapter 2 Review Of Underlying Network Technologies17

2.1 Introduction17

2.2 Two Approaches To Network Communication18

2.3 Wide Area And Local Area Networks19

2.4 Ethernet Iechnology20

2.5 Fiber Distributed Data Interconnect (FDDI)33

17.19 Consequences Of TRPF35

2.6 Asynchronous Transfer Mode37

2.7 WAN Technologies: ARPANET38

2.8 National Science Foundation Networking40

2.9 ANSNET44

2.10 A Very High Speed Backbone (vBNS)45

2.11 Other Technologies Over Which TCP/IP Has Been Used46

2.12 Summary And Conclusion50

Chapter 3 Internetworking Concept And Architectural Model53

3.1 Introduction53

3.2 Application-Level Interconnection53

3.3 Network-Level Interconnection54

3.4 Pronerties Of The Internet55

3.5 Internet Architecture56

3.6 Interconnection Through IP Routers56

3.7 The User s View58

3.8 All Networks Are Equal58

3.9 The Unanswered Questions59

3.10 Summary60

Chapter 4 Classful Internet Addresses63

4.1 Introduction63

4.2 Universal Identifiers63

4.3 The Original Classful Addressing Scheme64

4.4 Addresses Specify Network Connections65

4.5 Network And Directed Broadcast Addresses65

4.6 Limited Broadcast66

4.8 Subnet And Supernet Extensions67

4.7 Interpreting Zero To Mean This67

4.9 IP Multicast Addresses68

4.10 Weakenesses In Internet Addressing68

4.11 Dotted Decimal Notation69

4.12 Loopback Address70

4.13 Summary Of Special Address Conventions70

4.14 Internet Addressing Authority71

4.15 Reserved Address Prefixes72

4.16 An ExAmple72

4.17 Network Byte Order74

4.18 Summary75

5.2 The Address Resolution Problem77

5.1 Introduction77

Chapter 5 Mapping Internet Addresses To Physical Addresses (ARP)77

5.4 Resolution Through Direct Mapping78

5.3 Two Types Of Physical Addresses78

5.5 Resolution Through Dynamic Binding79

5.6 The Address Resolution Cache80

5.7 ARP Cache Timeout81

5.8 ARP Refinements82

5.9 Relationship Of ARP To Other Protocols82

5.10 ARP Implementation82

5.11 ARP Encapsulation And Identification84

5.12 ARP Protocol Format84

5.13 Summary86

6.1 Introduction89

Chapter 6 Determining An Internet Address At Startup (RARP)89

6.2 Reverse Address Resolution Protocol (RARP)90

6.3 Timing RARP Transactions92

6.4 Primary And Backup RARP Servers92

6.5 Summary93

Chapter 7 Internet Protocol: Connectionless Datagram Delivery95

7.1 Introduction95

7.2 A Virtual Network95

7.3 Internet Architecture And Philosophy96

7.4 The Conceptual Service Organization96

7.7 The Internet Datagram97

7.5 Connectionless Delivery System97

7.6 Purpose Of The Internet Protocot97

7.8 Internet Datagram Options107

7.9 Summary113

Chapter 8 Internet Protocol: Routing IP Datagrams115

8.1 Introduction115

8.2 Routing In An Internet115

8.3 Direct And Indirect Delivery117

8.4 Table-Driven IP Routing119

8.5 Next-Hop Routing119

8.6 Default Routes121

8.7 Host-Specific Routes121

8.8 The IP Routing Algorithm121

8.9 Routing With IP Addresses122

8.10 Handling Incoming Datagrams124

8.11 Establishing Routing Tables125

8.12 Summary125

Chapter 9 Internet Protocol: Error And Control Messages (ICMP)129

9.1 Introduction129

9.2 The Internet Control Message Protocol129

9.3 Error Reporting vs. Error Correction130

9.4 ICMP Message Delivery131

9.5 ICMP Message Format132

9.6 Testing Destination Reachability And Status (Ping)133

9.8 Reports Of Unreachable Destinations134

9.7 Echo Request And Reply Message Format134

9.10 Source Quench Format136

9.9 Congestion And Datagram Flow Control136

9.11 Route Change Requests From Routers137

9.12 Detecting Circular Or Excessively Long Routes139

9.14 Clock Synchronization And Transit Time Estimation140

9.13 Reporting Other Problems140

9.15 Information Request And Reply Messages142

9.16 Obtaining A Subnet Mask142

9.17 Router Discovery143

9.18 Router Solicitation144

9.19 Summary145

Chapter 10 Classless And Subnet Address Extensions (CIDR)147

10.1 Introduction147

10.2 Review Of Relevant Facts147

10.3 Minimizing Network Numbers148

10.4 Transparent Routers149

10.5 Proxy ARP150

10.6 Subnet Addressing152

10.7 Flexibility In Subnet Address Assignment154

10.8 Variable-Length Subnets155

10.9 Implementation Of Subnets With Masks156

10.10 Subnet Mask Kepresentation157

10.11 Routing In The Presence Of Subnets158

10.12 The Subnet Routing Algorithm159

10.13 A Unified Routing Algorithm160

10.14 Maintenance Of Subnet Masks161

10.15 Broadcasting To Subnets161

10.16 Anonymous Point-To-Point Networks162

10.17 Classless Addressing (Supernetting)164

10.18 The Effect Of Supernetting On Routing165

10.19 CIDR Address Blocks And Bit Masks165

10.20 Address Blocks And CIDR Notation166

10.21 A Classless Addressing Example167

10.22 Data Structures And Algorithms For Classless Lookup167

10.23 Longest-Match Routing And Mixtures Of Route Types170

10.24 CIDR Blocks Reserved For Private Networks172

10.25 Summary173

11.1 Introduction177

Chapter 11 Protocol Layering177

11.2 The Need For Multiple Protocols177

11.3 The Conceptual Layers Of Protocol Software178

11.4 Functionality Of The Layers181

11.5 X.25 And Its Relation To The ISO Model182

11.6 Differences Between ISO And Internet Layering185

11.7 The Protocol Layering Principle187

11.8 Layering In The Presence Of Network Substructure189

11.9 Two Important Boundaries In The TCP/IP Model191

11.10 The Disadvantage Of Layering192

11.11 The Basic Idea Behind Multiplexing And Demultiplexing192

11.12 Summary194

Chapter 12 User Datagram Protocol (UDP)197

12.1 Introduction197

12.2 Identifying The Ultimate Destination197

12.3 The User Datagram Protocol198

12.4 Format Of UDP Messages199

12.5 UDP Pseudo-Header200

12.6 UDP Encapsulation And Protocol Layering201

12.7 Layering And The UDP Checksum Computation203

12.8 UDP Multiplexing, Demultiplexing, And Ports203

12.9 Reserved And Available UDP Port Numbers204

12.10 Summary206

Chapter 13 Reliable Stream Transport Service (TCP)209

13.1 Introduction209

13.2 The Need For Stream Delivery209

13.3 Properties Of The Reliable Delivery Service210

13.4 Providing Reliability211

13.5 The Idea Behind Sliding Windows213

13.6 The Transmission Control Protocol215

13.7 Ports, Connections, And Endpoints216

13.8 Passive And Active Opens218

13.9 Segments,Streams,And Sequence Numbers219

13.10 Variable Window Size And Flow Control220

13.11 TCP Segment Format221

13.12 Out Of Band Data222

13.13 Maximum Segment Size Option223

13.14 TCP Checksum Computation224

13.15 Acknowledgements And Retransmission225

13.16 Timeout And Retransmission226

13.17 Accurate Measurement Of Round Trip Samples228

13.18 Karn s Algorithm And Timer Backoff229

13.19 Responding To High Variance In Delay230

13.20 Response To Congestion232

13.21 Congestion, Tail Drop, And TCP234

13.22 Random Early Discard (RED)235

13.23 Establishing A TCP Connection237

13.24 Initial Sequence Numbers239

13.25 Closing a TCP Connection239

13.26 TCP Connection Reset241

13.27 TCP Performance243

13.30 TCP Performance243

13.28 Forcing Data Delivery243

13.29 Reserved TCP Port Numbers243

13.31 Silly Window Syndrome And Small Packets245

13.32 Avoiding Silly Window Syndrome246

13.33 Summary249

Chapter 14 Routing: Cores, Peers, And Algorithms253

14.1 Introduction253

14.2 The Origin Of Routing Tables254

14.3 Routing With Partial Information255

14.4 Original Internet Architecture And Cores256

14.5 Core Routers257

14.6 Beyond The Core Architecture To Peer Backbones260

14.7 Automatic Route Propagation262

14.8 Distance Vector (Bellman-Ford) Routing262

14.9 Gateway-To-Gateway Protocol (GGP)264

14.11 Reliability And Routing Protocols265

14.10 Distance Factoring265

14.12 Link-State (SPF) Routing266

14.13 Summary267

Chapter 15 Routing: Exterior Gateway Protocols And Autonomous Systems(BGP)269

15.1 Introduction269

15.2 Adding Complexity To The Architectural Model269

15.3 Determining A Practical Limit On Group Size270

15.4 A Fundamental Idea: Extra Hops271

15.5 Hidden Networks273

15.6 Autonomous System Concept274

15.7 Form A Core To Independent Autonomous Systems275

15.8 An Exterior Gateway Protocol276

15.9 BGP Characteristics277

15.10 BGP Functionality And Message Types278

15.11 BGP Message Header278

15.12 BGP OPEN Message279

15.13 BGP UPDATE Message280

15.14 Compressed Mask-Address Pairs281

15.15 BGP Path Attributes282

15.16 Bap KEEPALIVE Message283

15.17 Information From The Receiver s Perspective284

15.18 The Key Restriction Of Exterior Gateway Protocols285

15.19 The Internet Routing Arbiter System287

15.20 BGP NOTIFICATION Message288

15.21 Decentralization Of Internet Architecture289

15.22 Summary290

Chapter 16 Routing: In An Autonomous System (RIP, OSPF, HELLO)293

16.1 Introduction293

16.2 Static Vs, Dynamic Interior Routes293

16.3 Routing Information Protocol (RIP)296

16.4 The Hello Protocol305

16.5 Delay Metrics And Oscillation305

16.6 Combining RIP, Hello, And BGP307

16.7 Inter-Autonomous System Routing307

16.9 The Open SPF Protocol (OSPF)308

16.8 Gated: Inter-Autonomous System Communication308

16.10 Routing With Partial Information315

16.11 Summary315

Chapter 17 Internet Multicasting319

17.1 Introduction319

17.2 Hardware Broadcast319

17.3 Hardware Origins Of Multicast320

17.4 Ethernet Multicast321

17.5 IP Multicast321

17.6 The Conceptual Pieces322

17.7 IP Multicast Addresses323

17.8 Multicast Address Semantics325

17.9 Mapping IP Multicast To Ethernet Multicast325

17.10 Hosts And Multicast Delivery326

17.11 Multicast Scope326

17.12 Extending Host Software To Handle Multicasting327

17.13 Internet Group Management Protocol328

17.14 IGMP Implementation328

17.15 Group Membership State Transitions329

17.16 IGMP Message Formal331

17.17 Multicast Forwarding And Routing Information332

17.18 Basic Multicast Routing Paradigms334

17.20 Multicast Trees337

17.21 The Essence Of Multicast Routing338

17.22 Reverse Path Multicasting338

17.23 Distance Vector Multicast Routing Protocol339

17.24 The Mrouted Program340

17.25 Alternative Protocols343

17.26 Core Based Trees (CBT)343

17.27 Protocol Independent Multicast (PIM)344

17.28 Multicast Extensions To OSPF (MOSPF)347

17.29 Reliable Multicast And ACK Implosions347

17.30 Summary349

Chapter 18 TCP/IP Over ATM Networks353

18.1 Introduction353

18.3 Large ATM Networks354

18.2 ATM Hardware354

18.4 The Logical View Of An ATM Network355

18.5 The Two ATM Connection Paradigms356

18.6 Paths, Circuits, And Identifiers357

18.7 ATM Cell Transport358

18.8 ATM Adaptation Layers358

18.9 ATM Adaptation Layer5360

18.11 Datagram Encapsulation And IP MTU Size361

18.10 AAL5 Convergence, Segmentation, And Reassembly361

18.12 Packet Type And Multiplexing362

18.13 IP Address Binding In An ATM Network363

18.14 Logical IP Subnet Concept364

18.15 Connection Management365

18.16 Address Binding Within An LIS366

18.17 ATMARP Packet Format366

18.18 Using ATMARP Packets To Determine An Address369

18.20 Timing Out ATMARP Information In A Server370

18.19 Obtaining Entries For A Server Database370

18.21 Timing Out ATMARP Information In A Host Or Router371

18.22 IP Switching Technologies371

18.23 Switch Operation372

18.24 Optimized IP Forwarding372

18.25 Classification, Flows, And Higher Layer Switching373

18.26 Applicability Of Switching Technology374

18.27 Summary374

Chapter 19 Mobile IP377

19.1 Introduction377

19.2 Mobility, Routing, and Addressing377

19.3 Mobile IP Characteristics378

19.4 Overview Of Mobile IP Operation378

19.5 Mobile Addressing Details379

19.6 Foreign Agent Discovery380

19.7 Agent Registration381

19.8 Registration Message Format381

19.10 Datagram Transmission And Reception383

19.9 Communication With A Foreign Agent383

19.11 The Two-Crossing Problem384

19.12 Communication With Computers On the Home Network385

19.13 Summary386

Chapter 20 Private Network Interconnection (NAT,VPN)389

20.1 Introduction389

20.2 Private And Hybrid Networks389

20.3 A Virtual Private Network (VPN)390

20.4 VPN Addressing And Routing392

20.5 A VPN With Private Addresses393

20.6 Network Address Translation (NAT)394

20.7 NAT Translation Table Creation395

20.8 Multi-Address NAT396

20.9 Port-Mapped NAT396

20.10 Interaction Between NAT And ICMP398

20.11 Interaction Between NAT And Applications398

20.13 Slirp And Masquerade399

20.12 Conceptual Address Domains399

20.14 Summary400

Chapter 21 Client-Server Model Of Interaction403

21.1 Introduction403

21.2 The Client-Server Model403

21.3 A Simple Example: UDP Echo Server404

21.4 Time And Date Service406

21.5 The Complexity of Servers407

21.6 RARP Server408

21.7 Alternatives To The Client-Server Model409

21.8 Summary410

Chapter 22 The Socket Interface413

22.1 Introduction413

22.2 The UNIX IIO Paradigm And Network IIO414

22.3 Adding Network IIO to UNIX414

22.4 The Socket Abstraction415

22.5 Creating A Socket415

22.6 Socket Inheritance And Termination416

22.7 Specify A Local Address417

22.8 Connecting Sockets To Destination Addresses418

22.9 Sending Data Through A Socket419

22.10 Receiving Data Through A Socket421

22.14 How A Server Accepts Connections421

22.11 Obtaining Local And Remote Socket Addresses422

22.12 Obtaining And Setting Socket Options423

22.13 Spectfying A Queue Length For A Server424

22.15 Servers That Handle Multiple Services425

22.16 Obtaining And Setting Host Names426

22.18 Socket Library Calls427

22.17 Obtaining And Setting The Internal Host Domain427

22.19 Network Byte Order Conversion Routines428

22.20 IP Address Manipulation Routines429

22.21 Accessing The Domain Name System431

22.22 Obtaining Information About Hosts432

22.23 Obtaining Information About Networks433

22.24 Obtaining Information About Protocols434

22.25 Obtaining Information About Network Services434

22.26 An Example Client435

22.27 An Example Server437

22.28 Summary440

Chapter 23 Bootstrap And Autoconfiguration (BOOTP, DHCP)443

23.1 Introduction443

23.2 The Need For An Alternative To RARP444

23.3 Using IP To Determine An IP Address444

23.4 The BOOTP Retransmission Policy445

23.5 The BOOTP Message Format446

23.6 The Two-Step Bootstrap Procedure447

23.7 Vendor-Specific Field448

23.8 The Need For Dynamic Configuration448

23.9 Dynamic Host Configuration450

23.10 Dynamic IP Address Assignment450

23.11 Obtaining Multiple Addresses451

23.12 Address Acquisition States452

23.13 Early Lease Termination452

23.14 Lease Renewal States454

23.15 DHCP Message Format455

23.16 DHCP Options And Message Type456

23.17 Option Overload457

23.18 DHCP And Domain Names457

23.19 Summary458

Chapter 24 The Domain Name System (DNS)461

24.1 Introduction461

24.2 Names For Machines462

24.3 Flat Namespace462

24.4 Hierarchical Names463

24.5 Delegation Of Authority For Names464

24.6 Subset Authority464

24.7 Internet Domain Names465

24.8 Official And Unofficial Internet Domain Names466

24.9 Named Items And Syntax Of Names468

24.10 Mapping Domain Names To Addresses469

24.11 Domain Name Resolution471

24.12 Efficient Translation472

24.13 Caching The Key To Efficiency473

24.14 Domain Server Message Format474

24.15 Compressed Name Format477

24.16 Abbreviation Of Domain Names477

24.17 Inverse Mappings478

24.18 Pointer Queries479

24.19 Object Types And Resource Record Contents479

24.20 Obtaining Authority For A Subdomain480

24.21 Summary481

25.2 Remote Interactive Computing485

Chapter 25 Applications: Remote Login (TELNET, Riogin)485

25.1 Introduction485

25.3 TELNET Protocol486

25.4 Accommodating Heterogeneity488

25.5 Passing Commands That Control The Remote Side490

25.6 Forcing The Server To Read A Control Function492

25.7 TELNET Options492

25.8 TELNET Option Negotiation493

25.9 Rlogin (BSD UNIX)494

25.10 Summary495

Chapter 26 Applications: File Transfer And Access (FTP, TFTP, NFS)497

26.1 Introduction497

26.2 File Access And Transfer497

26.3 On-line Shared Access498

26.4 Sharing By File Transfer499

26.5 FTP: The Major TCP/IP File Transfer Protocol499

26.6 FTP Features500

26.7 FTP Process Model500

26.8 TCP Port Number Assignment502

26.9 The User s View Of FTP502

26.10 An Example Anonymous FTP Session504

26.11 TFTP505

26.12 NFS507

26.13 NFS Implementation507

26.14 Remote Procedure Call (RPC)508

26.15 Summary509

27.1 Introduction511

27.2 Electronic Mail511

Chapter 27 Applications: Electronic Mail (SMTP, POP, IMAP, MIME)511

27.3 Mailbox Names And Aliases513

27.4 Alias Expansion And Mail Forwarding513

27.5 The Relationship Of Internetworking And Mail514

27.6 TCP/IP Standards For Electronic Mail Service516

27.7 Electronic Mail Addresses516

27.9 Simple Mail Transfer Protocol (SMTP)518

27.8 Pseudo Domain Addresses518

27.10 Mail Retrieval And Mailbox Manipulation Protocols521

27.11 The MIME Extension For Non-ASCII Data522

27.12 MIME Multipart Messages523

27.13 Summary524

Chapter 28 Applications: World Wide Web (HTTP)527

28.1 Introduction527

28.2 Importance Of The Web527

28.4 Uniform Resource Locators528

28.3 Architectural Components528

28.5 An Example Document529

28.6 Hypertext Transfer Protocol530

28.7 HTTP GET Request530

28.8 Error Messages531

28.9 Persistent Connections And Lengths532

28.10 Data Length And Program Output532

28.11 Length Encoding And Headers533

28.12 Negotiation534

28.13 Conditional Requests535

28.14 Support For Proxy Servers535

28.15 Caching536

28.16 Summary537

Chapter 29 Applications: Voice And Video Over IP (RTP)539

29.1 Introduction539

29.2 Audio Clips And Encoding Standards539

29.3 Audio And Video Transmission And Reproduction540

29.4 Jitter And Playback Delay541

29.5 Real-Time Transport Protocol (RTP)542

29.6 Streams, Mixing, And Multicasting543

29.7 RTP Encapsulation544

29.8 RTP Control Protocol (RTCP)544

29.9 RTCP Operation545

29.10 IP Telephony And Signaling546

29.11 Resource Reservation And Quality Of Service548

29.12 QoS Utilization And Capacity549

29.13 RSVP549

29.14 COPS550

29.15 Summary551

Chapter 30 Applications: Internet Management (SNMP)553

30.1 Introduction553

30.2 The Level Of Management Protocols553

30.3 Architectural Model554

30.4 Protocol Framework556

30.5 Examples of MIB Variables557

30.6 The Structure Of Management Information558

30.8 Structure And Representation Of MIB Object Names559

30.7 Formal Definitions Using ASN.1559

30.9 Simple Network Management Protocol564

30.10 SNMP Message Format566

30.11 Example Encoded SNMP Message569

30.12 New Features In SNMPv3572

30.13 Summary572

Chapter 31 Summary Of Protocol Dependencies575

31.1 Introduction575

31.2 Protocol Dependencies575

31.3 The Hourglass Model577

31.4 Application Program Access578

31.5 Summary579

Chapter 32 Internet Security And Firewall Design (IPsec)581

32.1 Introduction581

32.2 Protecting Resources582

32.3 Information Policy583

32.4 Internet Security583

32.6 IPsec Authentication Header584

32.5 IP Security (IPsec)584

32.7 Security Association585

32.8 IPsec Encapsulating Security Payload586

32.9 Authentication And Mutable Header Fields587

32.10 IPsec Tunneling588

32.11 Required Security Algorithms588

32.12 Secure Sockets589

32.13 Firewalls And Internet Access589

32.14 Multiple Connections And Weakest Links589

32.15 Firewall Implementation590

32.16 Packet-Level Filters590

32.17 Security And Packet Filter Specification591

32.18 The Consequence Of Restricted Access For Clients592

32.19 Proxy Access Through A Firewall592

32.20 The Details Of Firewall Architeetare593

32.21 Stub Network594

32.22 An Alternative Firewall Implementation595

32.24 Summary596

32.23 Monitoring And Logging596

Chapter 33 The Future Of TCP/IP (IPv6)599

33.1 Introduction599

33.2 Why Change?600

33.3 New Policies600

33.4 Motivation For Changing IPv4600

33.5 The Road To A New Version Of IP601

33.7 Features Of IPv6602

33.6 The Name Of The Next IP602

33.8 General Form Of An IPv6 Datagram603

33.9 IPv6 Base Header Format603

33.10 IPv6 Extension Headers605

33.11 Parsing An IPv6 Datagram606

33.12 IPv6 Fragmentation And Reassembly607

33.13 The Consequence Of End-To-End Fragmentation607

33.14 IPv6 Source Routing608

33.15 IPv6 Options609

33.17 IPv6 Colon Hexadecimal Notation610

33.16 Size Of The IPv6 Address Space610

33.18 Three Basic IPv6 Address Types612

33.19 The Duality Of Broadcast And Multicast612

33.20 An Engineering Choice And Simulated Broadcast613

33.21 Proposed IPv6 Address Space Assignment613

33.22 Embedded IPv4 Addresses And Transition614

33.23 Unspecified And Loopback Addresses616

33.24 Unicast Address Hierarchy616

33.25 Aggregatable Global Unicast Address Structure617

33.26 Interface Identifiers618

33.27 Additional Hierarchy619

33.28 Local Addresses619

33.29 Autoconfiguration And Renumbering620

33.30 Summary620

Appendix 1 A Guide to RFCs623

Appendix 2 Glossary Of Internetworking Terms And Abbreviations673

Bibliography721

Index729

热门推荐