楼主: ishaolin
429 1

[新手尝试] Computer Networking A Top Down Approach Global Edition 8th [推广有奖]

  • 0关注
  • 0粉丝

大专生

65%

还不是VIP/贵宾

-

威望
0
论坛币
2464 个
通用积分
2.8366
学术水平
0 点
热心指数
0 点
信用等级
0 点
经验
438 点
帖子
13
精华
0
在线时间
90 小时
注册时间
2022-11-20
最后登录
2024-4-7

相似文件 换一批

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币

1669207902588.jpg



What’s New in the Eighth Edition?

We think one important reason for this success has been that our book continues tooffer a fresh and timely approach to computer networking instruction. We’ve madechanges in this eighth edition, but we’ve also kept unchanged what we believe (andthe instructors and students who have used our book have confirmed) to be the mostimportant aspects of this book: its top-down approach, its focus on the Internet and amodern treatment of computer networking, its attention to both principles and prac-tice, and its accessible style and approach toward learning about computer network-ing. Nevertheless, the eighth edition has been revised and updated substantially.

Readers of earlier editions of our book may recall that in moving from the sixth tothe seventh edition, we deepened our coverage of the network layer, expanding materialwhich had been previously covered in a single chapter into a new chapter focusedon the so-called “data plane” component of the network layer (Chapter 4) and a newchapter focused on the network layer’s “control plane” (Chapter 5). That changeturned out to be prescient, as software-defined networking (SDN), arguably the mostimportant and exciting advance in networking in decades, has been rapidly adoptedin practice—so much so that it’s already hard to imagine an introduction to moderncomputer networking that doesn’t cover SDN. SDN has also enabled new advancesin the practice of network management, which we also cover in modernized and deep-er detail in this edition. And as we’ll see in Chapter 7 of this eighth edition, the separa-tion of the data and control planes is now also deeply embedded in 4G/5G mobilecellular network architectures, as is an “all-IP” approach to their core networks. Therapid adoption of 4G/5G networks and the mobile applications they enable are un-doubtedly the most significant changes we’ve seen in networking since the publicationof our seventh edition. We’ve thus significantly updated and deepened our treatmentof this exciting area. Indeed, the ongoing wireless network revolution is so importantthat we think it has become a critical part of an introductory networking course.

In addition to these changes, we’ve also updated many sections throughout thebook and added new material to reflect changes across the breadth of networking.In some cases, we have also retired material from the previous edition. As always, material that has been retired from the printed text can always be found on our book’sCompanion Website. The most important changes in this eighth edition are the following:
  • Chapter 1 has been updated to reflect the ever-growing reach and use of the In-ternet, and of 4G/5G networks.
  • Chapter 2, which covers the application layer, has been significantly updated,including material on the new HTTP/2 and HTTP/3 protocols for the Web.
  • Chapter 3, has been updated to reflect advances in, and evolution in use of,transport-layer congestion control and error-control protocols over the past fiveyears. While this material had remained relatively stable for quite some time,there have been a number of important advances since the seventh edition. Severalnew congestion-control algorithms have been developed and deployed beyondthe “classic” TCP algorithms. We provide a deeper coverage of TCP CUBIC, thedefault TCP protocol in many deployed systems, and examine delay-based ap-proaches to congestion control, including the new BBR protocol, which is de-ployed in Google’s backbone network. We also study the QUIC protocol, whichis being incorporated into the HTTP/3 standard. Although QUIC is technicallynot a transport-layer protocol—it provides application-layer reliability, conges-tion control, and connection multiplexing services at the application layer—ituses many of the error- and congestion-control principles that we develop in theearly sections of Chapter 3.
  • Chapter 4, which covers the network-layer data plane, has general updatesthroughout. We’ve added a new section on so-called middleboxes, which per-form network-layer functions other than routing and forwarding, such as firewall-ing and load balancing. Middleboxes build naturally on the generalized “matchplus action” forwarding operation of network-layer devices that we cover earlierin Chapter 4. We’ve also added timely new material on topics such as the amountof buffering that is “just right” in network routers, on net neutrality, and on thearchitectural principles of the Internet.
  • Chapter 5, which cover the network-layer’s control plane, contains updated ma-terial on SDN, and a significantly new treatment of network management. Theuse of SDN has evolved beyond management of packet-forwarding tables to in-clude configuration management of network devices as well. We introduce twonew protocols, NETCONF and YANG, whose adoption and use have fueled thisnew approach toward network management.
  • Chapter 6, which covers the link layer, has been updated to reflect the continu-ing evolution of link-layer technologies such as Ethernet. We have also updatedand expanded our treatment of datacenter networks, which are at the heart of thetechnology driving much of today’s Internet commerce.
  • As noted earlier, Chapter 7 has been significantly updated and revised to reflect the many changes in wireless networking since the seventh edition, from short- range Bluetooth piconets, to medium-range wireless 802.11 local area networks (WLANs), to wide-area 4G/5G wireless cellular networks. We have retired our coverage of earlier 2G and 3G networks in favor of a broader and deeper treat- ment of today’s 4G LTE networks and tomorrow’s 5G networks. We have also updated our coverage of mobility issues, from the local issue of handover of mo- bile devices between base stations to the global issue of identity management and mobile device roaming among different global cellular networks.
  • Chapter 8, which covers network security, has been updated to reflect changes in wireless network security in particular, with new material on WPA3 security in WLANs, and mutual device/network mutual authentication and confidentiality in 4G/5G networks.

We have also retired Chapter 9, on multimedia networking, from this edition. Overtime, as multimedia applications became more prevalent, we had already migratedChapter 9 material on topics such as video streaming, packet scheduling, and contentdistribution networks into earlier chapters. As noted earlier, all retired material fromthis and earlier editions can be found on our book’s Companion Website.
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Networking Computer Approach working compute

Computer Networking A Top Down Approach Global Edition 8th.pdf

58.94 MB

需要: 15 个论坛币  [购买]

计算机网络:自顶向下方法(第8版)

沙发
三江鸿 发表于 2022-11-23 23:44:27 来自手机 |只看作者 |坛友微信交流群
点个赞感谢分享

使用道具

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加JingGuanBbs
拉您进交流群

京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明   免责及隐私声明

GMT+8, 2024-4-19 15:18