Introduction This book describes the TCP/IP protocol suite, but from a different perspective than other texts on TCP/IP. Instead of just describing the protocols and what they do, we'll use a popular diagnostic tool to watch the protocols in action. Seeing how the protocols operate in varying circumstances provides a greater understanding of how they work and why certain design decisions were made. It also provides a look into the implementation of the protocols, without having to wade through thousands of lines of source code. When networking protocols were being developed in the 1960s through the 1980s, expensive, dedicated hardware was required to see the packets going "across the wire." Extreme familiarity with the protocols was also required to comprehend the packets displayed by the hardware. Functionality of the hardware analyzers was limited to that built in by the hardware designers. Today this has changed dramatically with the ability of the ubiquitous workstation to monitor a local area network Mogul 1990. Just attach a workstation to your network, run some publicly available software (described in Appendix A), and watch what goes by on the wire. While many people consider this a tool to be used for diagnosing network problems, it is also a powerful tool for understanding how the network protocols operate, which is the goal of this book. This book is intended for anyone wishing to understand how the TCP/IP protocols operate: programmers writing network applications, system administrators responsible for maintaining computer systems and networks utilizing TCP/IP, and users who deal with TCP/IP applications on a daily basis. Organization of the Book We take a bottom-up approach to the TCP/IP protocol suite. After providing a basic introduction to TCP/IP in Chapter 1, we will start at the link layer in Chapter 2 and work our way up the protocol stack. This provides the required background for later chapters for readers who aren't familiar with TCP/IP or networking in general. This book also uses a functional approach instead of following a strict bottom-to-top order. For example, Chapter 3 describes the IP layer and the IP header. But there are numerous fields in the IP header that are best described in the context of an application that uses or is affected by a particular field. Fragmentation, for example, is best understood in terms of UDP (Chapter 11), the protocol often affected by it. The time-to-live field is fully described when we look at the Traceroute program in Chapter 8, because this field is the basis for the operation of the program. Similarly, many features of ICMP are described in the later chapters, in terms of how a particular ICMP message is used by a protocol or an application. We also don't want to save all the good stuff until the end, so we describe TCP/IP applications as soon as we have the foundation to understand them. Ping and Traceroute are described after IP and ICMP have been discussed. The applications built on UDP (multicasting, the DNS, TFTP, and BOOTP) are described after UDP has been examined. The TCP applications, however, along with network management, must be saved until the end, after we've thoroughly described TCP. This text focuses on how these applications use the TCP/IP protocols. We do not provide all the details on running these applications. Readers This book is self-contained and assumes no specific knowledge of networking or TCP/IP. Numerous references are provided for readers interested in additional details on specific topics. This book can be used in many ways. It can be used as a self-study reference and covered from start to finish by someone interested in all the details on the TCP/IP protocol suite. Readers with some TCP/IP background might want to skip ahead and start with Chapter 7, and then focus on the specific chapters in which they're interested. Exercises are provided at the end of the chapters, and most solutions are in Appendix D. This is to maximize the usefulness of the text as a self-study reference. When used as part of a one- or two-semester course in computer networking, the focus should be on IP (Chapters 3 and 9), UDP (Chapter 11), and TCP (Chapters 17-24), along with some of the application chapters. Many forward and backward references are provided throughout the text, along with a thorough index, to allow individual chapters to be studied by themselves. A list of all the acronyms used throughout the text, along with the compound term for the acronym, appears on the inside back covers. If you have access to a network you are encouraged to obtain the software used in this book (Appendix F) and experiment on your own. Hands-on experimentation with the protocols will provide the greatest knowledge (and make it more fun). Systems Used for Testing Every example in the book was run on an actual network and the resulting output saved in a file for inclusion in the text. Figure 1.11 (p. 18) shows a diagram of the different hosts, routers, and networks that are used. (This figure is also duplicated on the inside front cover for easy reference while reading the book.) This collection of networks is simple enough that the topology doesn't confuse the examples, and with four systems acting as routers, we can see the error messages generated by routers. Most of the systems have a name that indicates the type of software being used: bsdi, svr4, sun, solaris, aix, slip, and so on. In this way we can identify the type of software that we're dealing with by looking at the system name in the printed output. A wide range of different operating systems and TCP/IP implementations are used: BSD/386 Version 1.0 from Berkeley Software Design, Inc., on the hosts named bsdi and slip. This system is derived from the BSD Networking Software, Release 2.0. (We show the lineage of the various BSD releases in Figure 1.10 on p. 17.) Unix System V/386 Release 4.0 Version 2.0 from U.H. Corporation, on the host named svr4. This is vanilla SVR4 and contains the standard implementation of TCP/IP from Lachman Associates used with most versions of SVR4. SunOS 4.1.3 from Sun Microsystems, on the host named sun. The SunOS 4.1.x systems are probably the most widely used TCP/IP implementations. The TCP/IP code is derived from 4.2BSD and 4.3BSD. Solaris 2.2 from Sun Microsystems, on the host named solaris. The Solaris 2.x systems have a different implementation of TCP/IP from the earlier SunOS 4.1.x systems, and from SVR4. (This operating system is really SunOS 5.2, but is commonly called Solaris 2.2.) AIX 3.2.2 from IBM on the host named aix. The TCP/IP implementation is based on the 4.3BSD Reno release. 4.4BSD from the Computer Systems Research Group at the University of California at Berkeley, on the host vangogh.cs.berkeley.edu. This system has the latest release of TCP/IP from Berkeley. (This system isn't shown in the figure on the inside front cover, but is reachable across the Internet.) Although these are all Unix systems, TCP/IP is operating system independent, and is available on almost every popular non-Unix system. Most of this text also applies to these non-Unix implementations, although some programs (such as Traceroute) may not be provided on all systems. Typographical Conventions When we display interactive input and output we'll show our typed input in a bold font, and the computer output like this. Comments are added in italics. Also, we always include the name of the system as part of the shell prompt (bsdi in this example) to show on which host the command was run. Throughout the text we'll use indented, parenthetical notes such as this to describe historical points or implementation details. We sometimes refer to the complete description of a command in the Unix manual as in ifconfig(8). This notation, the name of the command followed by a number in parentheses, is the normal way of referring to Unix commands. The number in parentheses is the section number in the Unix manual of the "manual page" for the command, where additional information can be located. Unfortunately not all Unix systems organize their manuals the same, with regard to the section numbers used for various groupings of commands. We'll use the BSD-style section numbers (which is the same for BSD-derived systems such as SunOS 4.1.3), but your manuals may be organized differently. Acknowledgments Although the author's name is the only one to appear on the cover, the combined effort of many people is required to produce a quality text book. First and foremost is the author's family, who put up with the long and weird hours that go into writing a book. Thank you once again, Sally, Bill, Ellen, and David. The consulting editor, Brian Kernighan, is undoubtedly the best in the busin...
2023-06-02 10:31:24 19.51MB TCP/IP Illustrated Vol1 second
1
西电网络程序设计大作业 题目:设计一个基于TCP套接字的类似于QQ的聊天系统 实现的基本功能: 1.新用户注册; 2.用户登录和退出; 3.聊天服务; 4.在线用户查询; 5.附加功能: 6.文件传送服务; 本项目实现的其他功能: 1.用户注销功能 2.用户密码安全传输功能 3.用户错误登录次数限制功能
2023-06-01 09:20:48 1.4MB 网络 程序设计 tcp 网络程序设计
1
文件包含项目源码、展示ppt、展示视频、设计文档
2023-05-31 20:01:18 244.32MB 浙软 井字棋 项目 tcp
1
用VB6.0开发的TCP服务器+客户端,适合新手学习
2023-05-31 10:06:04 14KB VB TCP通讯
1
TCP/IP详解,免费下载, 卷一 卷二 卷三
2023-05-29 21:40:49 29.56MB TCP/IP详解 卷一 卷二 卷三
1
ModBus测试工具精简版,标准modbus协议,免安装,本身具有客户端角色,同时具有rtu或TCP协议的服务器端协议,方便调试
2023-05-25 14:41:08 1.22MB modbus rtu/tcp协议
1
tcp协议 客户端程序,支持发送16进制与ASCII数据,可以模拟并发压力测试
2023-05-23 17:55:24 197KB 压力测试 socket tcpip
1
由技术即使在最小的数据通信网络中也是基本的要素。在某种程度上,路由技术和路由器的配置是相当简单的。但是当互联网络的规模越来越人,并且越来越复杂的时候,路山选择问题就变得比较突出和难以控制了。或许,有点不恰当地说,作为一名网络系统顾问,我应该感谢当前出现的大规模路由技术难题,这些问题给了我谋生的手段。假设没有它们,"你何以为生?"这句习语町能就会不幸地成为我每天生活词汇的一部分了。 Cisco认证互联网络专家(CCIE)在大型互联网络的设计、故障排除和管理能力方面得到广泛的认同。   本书由浅入深地详细阐述了各种常用的IP内部路由选择协议,包括RIP、RIPv2、EIGRP、OSPFv2、OSPFv3以及IS-IS协议。除了讲述每一种具体协议外,本书还讨论了一些重要的主题,例如,路由重新分配、缺省路由与末梢路由选择、路由过滤、路由映射,以及支持IPv6的路由选择等。本书着重讲述的一些实际技巧可以有效地运用各种IP路由选择协议来进行网络设计。通过阅读本书读者能够深入了解IP路由选择协议方面的知识,并可以掌握在Cisco路由器上实现这些路由选择协议所需的技巧,以便获取最接近实践的专业技能。   “对于任何希望完善地了解TCP/IP网络实际是如何运行的读者,包括路由选择算法的设计原则、编址设计的发展,以及有关大型自主系统中路由选择设计与配置的实践经验,本书适合你。”
2023-05-19 09:41:14 20.89MB tcp-ip
1
欧姆龙plc网络通讯 欧姆龙plc作为客户端 使用TCPIP-Modbus读取称重数据,进行处理
2023-05-19 07:52:45 4KB 欧姆龙 plc 网络通讯
1