目 录

第1章 计算机网络概论 ···························································1

1.1 计算机网络发展概述 ································································1

1.1.1 计算机网络 ···································································1

1.1.2 计算机网络的演变和发展 ·················································1

1.2 计算机网络的组成与功能 ··························································6

1.2.1 计算机网络的组成要素 ····················································6

1.2.2 计算机网络的组成 ··························································7

1.2.3 计算机网络的功能 ··························································8

1.3 计算机网络的类别 ··································································10

1.3.1 按网络拓扑结构分类 ······················································10

1.3.2 按网络控制方式分类 ······················································14

1.3.3 按网络作用范围分类 ······················································15

1.3.4 按通信传输方式分类 ······················································17

1.3.5 按网络配置分类 ····························································18

1.3.6 按使用范围分类 ····························································19

1.3.7 其他分类方式 ·······························································19

1.4 计算机网络的体系结构 ····························································20

1.4.1 网络系统的体系结构 ······················································21

1.4.2 网络系统结构参考模型ISO/OSI ········································23

1.4.3 TCP/IP模型 ··································································33

1.4.4 OSI协议参考模型与TCP/IP模型的比较 ·····························36

1.5 计算机网络的发展趋势 ····························································37

1.5.1 计算机网络发展的简要回顾 ·············································37

1.5.2 计算机网络发展的新需求 ················································37

1.5.3 计算机网络研究的问题 ···················································38

1.5.4 计算机网络的未来方向 ···················································39

本章小结 ·····················································································42

思考题 ························································································42

第2章 计算机网络的基本原理 ················································43

2.1 数据通信的基本概念 ·······························································43



2.1.1 数据、信息和信号 ·························································43

2.1.2 通信系统模型 ·······························································44

2.1.3 数据传输方式 ·······························································45

2.1.4 串行通信与并行通信 ······················································47

2.1.5 数据通信方式 ·······························································48

2.1.6 数字化是信息社会发展的必然趋势 ····································49

2.2 数字信号的频谱与数字信道的特性 ·············································51

2.2.1 傅里叶分析 ··································································51

2.2.2 周期矩形脉冲信号的频谱 ················································51

2.2.3 数字信道的特性 ····························································53

2.2.4 基带传输、频带传输和宽带传输 ·······································55

2.3 模拟传输 ··············································································56

2.3.1 模拟传输系统 ·······························································57

2.3.2 调制方式 ·····································································58

2.4 数字传输 ··············································································59

2.4.1 脉码调制 ·····································································59

2.4.2 数字数据信号编码 ·························································62

2.4.3 字符编码 ·····································································63

2.5 量子通信 ··············································································64

2.5.1 量子密钥分发 ·······························································64

2.5.2 量子隐形传态 ·······························································66

2.5.3 量子安全直接通信 ·························································67

2.6 多路复用技术 ········································································68

2.6.1 频分多路复用 ·······························································68

2.6.2 时分多路复用 ·······························································69

2.6.3 光波分多路复用 ····························································70

2.6.4 频分多路复用、时分多路复用和光波分多路复用的比较 ·········73

2.7 数据交换方式 ········································································73

2.7.1 线路交换 ·····································································75

2.7.2 报文交换 ·····································································76

2.7.3 分组交换 ·····································································77

2.7.4 高速交换 ·····································································81

2.8 流量控制 ··············································································85

2.8.1 流量控制概述 ·······························································85

VI


计算机网络技术及应用第2版 4校 文前.indd 6


2023/6/15 14:15:56


目 录

VII

2.8.2 流量控制技术 ·······························································86

2.9 差错控制 ··············································································88

2.9.1 差错产生的原因与差错类型 ·············································88

2.9.2 差错检验与校正 ····························································88

2.10 路由选择技术 ······································································93

2.10.1 路由选择算法 ······························································93

2.10.2 路由选择协议 ····························································101

2.11 无线通信 ···········································································103

2.11.1 蜂窝无线通信概述 ······················································103

2.11.2 数字蜂窝移动通信系统及主要通信技术 ···························107

2.11.3 Ad-Hoc无线网络通信 ··················································113

2.11.4 短距离无线通信技术 ···················································117

2.12 卫星通信 ··········································································119

2.12.1 卫星通信系统的原理及其组成 ·······································119

2.12.2 卫星通信的多址接入方式 ·············································120

2.12.3 卫星通信技术的特性 ···················································122

2.12.4 卫星移动通信系统 ······················································122

2.12.5 卫星定位系统 ····························································124

2.12.6 甚小孔径终端技术 ······················································126

2.12.7 宽带卫星通信技术 ······················································127

2.12.8 卫星互联网 ·······························································128

本章小结 ···················································································131

思考题 ······················································································131

第3章 计算机网络的组网技术 ···············································133

3.1 以太网技术 ·········································································133

3.1.1 以太网概述 ································································133

3.1.2 交换以太网 ································································136

3.1.3 虚拟局域网 ································································140

3.1.4 100G以太网 ·······························································144

3.1.5 以太网发展趋势 ··························································147

3.2 帧中继技术 ·········································································147

3.2.1 帧中继概述 ································································147

3.2.2 帧格式和呼叫控制 ·······················································149



3.2.3 帧中继的应用 ·····························································150

3.3 ATM技术 ···········································································151

3.3.1 ATM概述 ··································································152

3.3.2 ATM信元格式 ····························································153

3.3.3 ATM协议参考模型 ······················································154

3.3.4 ATM的工作原理 ·························································156

3.3.5 ATM应用 ··································································158

3.4 无线局域网 ·········································································160

3.4.1 无线局域网概述 ··························································160

3.4.2 无线局域网标准IEEE 802.11 ··········································161

3.4.3 无线局域网组网模式 ····················································165

3.4.4 无线局域网的主要类型 ·················································166

3.4.5 无线局域网的应用 ·······················································168
本章小结 ···················································································169
思考题 ······················································································169

第4章计算机网络硬件系统 ··················································170

4.1 传输介质 ············································································170

4.1.1 双绞线 ······································································170

4.1.2 同轴电缆 ···································································174

4.1.3 光缆 ·········································································176

4.1.4 自由空间 ···································································179

4.2 工作站与网络服务器 ·····························································185

4.2.1 工作站 ······································································185

4.2.2 网络服务器 ································································185

4.3 网络设备 ············································································191

4.3.1 网络接口卡 ································································191

4.3.2 调制解调器 ································································194

4.3.3 中继器 ······································································196

4.3.4 集线器 ······································································197

4.3.5 网桥 ·········································································201

4.3.6 交换机 ······································································203

4.3.7 路由器 ······································································208

4.3.8 网关 ·········································································212


VIII

计算机网络技术及应用第2版 4校 文前.indd 8


2023/6/15 14:15:56


目 录

4.3.9 无线接入点 ································································214

4.3.10 网闸 ········································································215

4.3.11 光纤收发器 ·······························································219

本章小结 ···················································································221

思考题 ······················································································221

第5章 计算机网络操作系统 ··················································222

5.1 操作系统及网络操作系统概述 ·················································223

5.1.1 操作系统概述 ·····························································223

5.1.2 网络操作系统概述 ·······················································227

5.2 Windows系列操作系统 ··························································232

5.2.1 Windows系列操作系统的发展与演变 ·······························232

5.2.2 Windows NT操作系统 ··················································233

5.2.3 Windows 10操作系统 ···················································237

5.2.4 Windows Server 2019操作系统 ········································241

5.3 UNIX操作系统 ····································································244

5.3.1 UNIX操作系统的发展 ··················································244

5.3.2 UNIX操作系统的组成和特点 ·········································244

5.3.3 UNIX操作系统的网络操作 ············································247

5.4 Linux操作系统 ····································································247

5.4.1 Linux操作系统的发展 ··················································247

5.4.2 Linux操作系统的组成和特点 ·········································248

5.4.3 Linux的网络功能配置 ··················································249

5.5 国产操作系统 ······································································253

5.5.1 国产操作系统发展概况 ·················································253

5.5.2 几种典型的国产操作系统 ··············································255

本章小结 ···················································································257

思考题 ······················································································258

第6章 Internet ··································································259

6.1 Internet概述 ········································································259

6.1.1 Internet的基本概念 ······················································259

6.1.2 Internet的发展历程 ······················································261

6.1.3 Internet的管理组织 ······················································265



6.2 Internet工作原理··································································267

6.2.1 分组交换原理 ·····························································267

6.2.2 TCP/IP ······································································268

6.2.3 Internet的工作模式 ······················································279

6.3 IP地址 ···············································································282

6.3.1 IPv4 ··········································································282

6.3.2 子网划分 ···································································284

6.3.3 IPv6 ··········································································289

6.4 地址解析与域名 ···································································295

6.4.1 地址解析 ···································································295

6.4.2 域名机制 ···································································297

6.4.3 域名解析 ···································································300

6.4.4 动态主机配置协议 ·······················································304

6.5 Internet接入技术··································································305

6.5.1 接入方式概述 ·····························································305

6.5.2 xDSL接入 ·································································306

6.5.3 HFC接入 ···································································311

6.5.4 光纤接入 ···································································314

6.5.5 以太网接入技术 ··························································317

6.5.6 无线接入 ···································································318

6.6 互联网服务和应用 ································································325

6.6.1 WWW服务 ································································326

6.6.2 电子邮件服务 ·····························································329

6.6.3 文件传输服务 ·····························································332

6.6.4 P2P技术特点及应用 ·····················································332

6.6.5 互联网上的音频/视频服务············································334

6.7 Intranet和Extranet ································································336

6.7.1 Intranet ······································································336

6.7.2 Extranet ·····································································340

6.7.3 Internet、Intranet及Extranet的比较·································341
本章小结 ···················································································342
思考题 ······················································································342


X

计算机网络技术及应用第2版 4校 文前.indd 10


2023/6/15 14:15:56


目 录

第7章 网络安全 ·································································343

7.1 网络安全概述 ······································································343

7.1.1 网络安全的概念 ··························································343

7.1.2 网络安全风险 ·····························································346

7.1.3 网络安全策略 ·····························································348

7.1.4 网络安全措施 ·····························································349

7.2 密码编码技术 ······································································351

7.2.1 密码基础知识 ·····························································351

7.2.2 传统密码编码技术 ·······················································353

7.2.3 对称密钥密码技术 ·······················································354

7.2.4 公开密钥密码技术 ·······················································357

7.2.5 混合加密算法 ·····························································362

7.2.6 网络加密方法 ·····························································363

7.3 网络鉴别与认证 ···································································364

7.3.1 鉴别与身份认证 ··························································364

7.3.2 数字签名 ···································································365

7.3.3 常用身份认证技术 ·······················································368

7.3.4 数字证书 ···································································370

7.3.5 公钥基础设施 ·····························································373

7.3.6 区块链认证技术 ··························································376

7.4 防火墙技术 ·········································································377

7.4.1 防火墙概述 ································································377

7.4.2 防火墙的主要技术 ·······················································379

7.4.3 防火墙的体系结构 ·······················································382

7.4.4 新一代防火墙及其体系结构的发展趋势 ····························384

7.5 反病毒技术 ·········································································385

7.5.1 计算机病毒概述 ··························································385

7.5.2 网络病毒 ···································································387

7.5.3 特洛伊木马 ································································390

7.5.4 网络蠕虫 ···································································392

7.5.5 移动智能终端病毒 ·······················································394

7.5.6 病毒防治技术 ·····························································395

7.6 入侵检测与防御技术 ·····························································397

7.6.1 入侵检测技术概述 ·······················································397



7.6.2 入侵检测方法 ·····························································400

7.6.3 入侵检测系统 ·····························································401

7.6.4 漏洞扫描技术 ·····························································404

7.6.5 入侵防护技术 ·····························································405

7.6.6 网络欺骗技术 ·····························································407

7.7 网络攻击技术 ······································································410

7.7.1 网络攻击的目的、手段与工具 ········································411

7.7.2 网络攻击类型 ·····························································413

7.8 VPN技术 ···········································································416

7.8.1 VPN概述 ···································································417

7.8.2 隧道协议 ···································································420

7.9 无线局域网安全技术 ·····························································422

7.9.1 无线局域网的安全问题 ·················································422

7.9.2 增强无线局域网安全的主要技术 ·····································424

7.10 云计算安全 ·······································································426

7.10.1 云计算安全的概念 ······················································426

7.10.2 云计算面临的安全威胁 ················································427

7.10.3 云计算安全的关键技术 ················································429
本章小结 ···················································································432
思考题 ······················································································432

第8章局域网的设计与安全管理············································434

8.1 局域网的规划与设计 ·····························································434

8.1.1 局域网规划 ································································434

8.1.2 局域网设计 ································································436

8.2 企业网的设计与安全管理 ·······················································439

8.2.1 企业网拓扑结构设计 ····················································440

8.2.2 企业网IP地址分配和VLAN划分 ···································441

8.2.3 路由器协议选择 ··························································443

8.2.4 企业网安全设计与管理 ·················································444

8.3 校园网的安全管理 ································································446

8.3.1 校园网的特点 ·····························································446

8.3.2 校园网安全策略体系 ····················································448

8.3.3 网络接入认证技术的选择 ··············································449


XII

计算机网络技术及应用第2版 4校 文前.indd 12


2023/6/15 14:15:56


目 录

8.3.4 校园网中常见的安全管理问题 ········································454

本章小结 ···················································································460

思考题 ······················································································460

第9章 计算机网络实验 ························································461

实验1 局域网组网 ····································································461

一、实验题目 ······································································461

二、实验课时 ······································································461

三、实验目的 ······································································461

四、实验内容和要求 ·····························································461

实验2 使用交换机的命令行管理界面 ············································462

一、实验题目 ······································································462

二、实验课时 ······································································462

三、实验目的 ······································································462

四、实验内容和要求 ·····························································462

五、实验步骤 ······································································462

实验3 交换机的基本配置 ···························································463

一、实验题目 ······································································463

二、实验课时 ······································································463

三、实验目的 ······································································463

四、实验内容和要求 ·····························································463

五、实验步骤 ······································································463

实验4 VLAN ···········································································464

一、实验题目 ······································································464

二、实验课时 ······································································464

三、实验目的 ······································································464

四、实验内容和要求 ·····························································464

五、实验设备 ······································································464

六、实验拓扑 ······································································464

七、实验步骤 ······································································465

实验5 跨交换机实现VLAN ························································466

一、实验题目 ······································································466

二、实验课时 ······································································466

三、实验目的 ······································································466



四、实验内容和要求 ·····························································466
五、实验设备 ······································································466
六、实验拓扑 ······································································466
七、实验步骤 ······································································467
实验6 Windows网络操作系统的配置与使用 ···································467
一、实验题目 ······································································467
二、实验课时 ······································································467
三、实验目的 ······································································467
四、实验内容和要求 ·····························································467
实验7 Windows文件系统和共享资源管理 ······································468
一、实验题目 ······································································468
二、实验课时 ······································································468
三、实验目的 ······································································468
四、实验内容和要求 ·····························································468
五、实验步骤 ······································································468
实验8 Web服务器的建立和管理··················································468
一、实验题目 ······································································468
二、实验课时 ······································································468
三、实验目的 ······································································469
四、实验内容和要求 ·····························································469
五、实验步骤 ······································································469
实验9 活动目录的创建和管理 ·····················································469
一、实验题目 ······································································469
二、实验课时 ······································································469
三、实验目的 ······································································469
四、实验内容和要求 ·····························································470
五、实验步骤 ······································································470
实验10 软件防火墙和硬件防火墙的配置 ········································470
一、实验题目 ······································································470
二、实验课时 ······································································470
三、实验目的 ······································································470
四、实验内容和要求 ·····························································470
五、实验步骤 ······································································471

参考文献 ·············································································472


XIV

计算机网络技术及应用第2版 4校 文前.indd 14


2023/6/15 14:15:56