目 录 第1章 计算机网络概论 ···························································1 1.1 计算机网络发展概述 ································································1 1.1.1 计算机网络 ···································································1 1.1.2 计算机网络的演变和发展 ·················································1 1.2 计算机网络的组成与功能 ··························································6 1.2.1 计算机网络的组成要素 ····················································6 1.2.2 计算机网络的组成 ··························································7 1.2.3 计算机网络的功能 ··························································8 1.3 计算机网络的类别 ··································································10 1.3.1 按网络拓扑结构分类 ······················································10 1.3.2 按网络控制方式分类 ······················································14 1.3.3 按网络作用范围分类 ······················································15 1.3.4 按通信传输方式分类 ······················································17 1.3.5 按网络配置分类 ····························································18 1.3.6 按使用范围分类 ····························································19 1.3.7 其他分类方式 ·······························································19 1.4 计算机网络的体系结构 ····························································20 1.4.1 网络系统的体系结构 ······················································21 1.4.2 网络系统结构参考模型ISO/OSI ········································23 1.4.3 TCP/IP模型 ··································································33 1.4.4 OSI协议参考模型与TCP/IP模型的比较 ·····························36 1.5 计算机网络的发展趋势 ····························································37 1.5.1 计算机网络发展的简要回顾 ·············································37 1.5.2 计算机网络发展的新需求 ················································37 1.5.3 计算机网络研究的问题 ···················································38 1.5.4 计算机网络的未来方向 ···················································39 本章小结 ·····················································································42 思考题 ························································································42 第2章 计算机网络的基本原理 ················································43 2.1 数据通信的基本概念 ·······························································43 2.1.1 数据、信息和信号 ·························································43 2.1.2 通信系统模型 ·······························································44 2.1.3 数据传输方式 ·······························································45 2.1.4 串行通信与并行通信 ······················································47 2.1.5 数据通信方式 ·······························································48 2.1.6 数字化是信息社会发展的必然趋势 ····································49 2.2 数字信号的频谱与数字信道的特性 ·············································51 2.2.1 傅里叶分析 ··································································51 2.2.2 周期矩形脉冲信号的频谱 ················································51 2.2.3 数字信道的特性 ····························································53 2.2.4 基带传输、频带传输和宽带传输 ·······································55 2.3 模拟传输 ··············································································56 2.3.1 模拟传输系统 ·······························································57 2.3.2 调制方式 ·····································································58 2.4 数字传输 ··············································································59 2.4.1 脉码调制 ·····································································59 2.4.2 数字数据信号编码 ·························································62 2.4.3 字符编码 ·····································································63 2.5 量子通信 ··············································································64 2.5.1 量子密钥分发 ·······························································64 2.5.2 量子隐形传态 ·······························································66 2.5.3 量子安全直接通信 ·························································67 2.6 多路复用技术 ········································································68 2.6.1 频分多路复用 ·······························································68 2.6.2 时分多路复用 ·······························································69 2.6.3 光波分多路复用 ····························································70 2.6.4 频分多路复用、时分多路复用和光波分多路复用的比较 ·········73 2.7 数据交换方式 ········································································73 2.7.1 线路交换 ·····································································75 2.7.2 报文交换 ·····································································76 2.7.3 分组交换 ·····································································77 2.7.4 高速交换 ·····································································81 2.8 流量控制 ··············································································85 2.8.1 流量控制概述 ·······························································85 VI 计算机网络技术及应用第2版 4校 文前.indd 6 2023/6/15 14:15:56 目 录 VII 2.8.2 流量控制技术 ·······························································86 2.9 差错控制 ··············································································88 2.9.1 差错产生的原因与差错类型 ·············································88 2.9.2 差错检验与校正 ····························································88 2.10 路由选择技术 ······································································93 2.10.1 路由选择算法 ······························································93 2.10.2 路由选择协议 ····························································101 2.11 无线通信 ···········································································103 2.11.1 蜂窝无线通信概述 ······················································103 2.11.2 数字蜂窝移动通信系统及主要通信技术 ···························107 2.11.3 Ad-Hoc无线网络通信 ··················································113 2.11.4 短距离无线通信技术 ···················································117 2.12 卫星通信 ··········································································119 2.12.1 卫星通信系统的原理及其组成 ·······································119 2.12.2 卫星通信的多址接入方式 ·············································120 2.12.3 卫星通信技术的特性 ···················································122 2.12.4 卫星移动通信系统 ······················································122 2.12.5 卫星定位系统 ····························································124 2.12.6 甚小孔径终端技术 ······················································126 2.12.7 宽带卫星通信技术 ······················································127 2.12.8 卫星互联网 ·······························································128 本章小结 ···················································································131 思考题 ······················································································131 第3章 计算机网络的组网技术 ···············································133 3.1 以太网技术 ·········································································133 3.1.1 以太网概述 ································································133 3.1.2 交换以太网 ································································136 3.1.3 虚拟局域网 ································································140 3.1.4 100G以太网 ·······························································144 3.1.5 以太网发展趋势 ··························································147 3.2 帧中继技术 ·········································································147 3.2.1 帧中继概述 ································································147 3.2.2 帧格式和呼叫控制 ·······················································149 3.2.3 帧中继的应用 ·····························································150 3.3 ATM技术 ···········································································151 3.3.1 ATM概述 ··································································152 3.3.2 ATM信元格式 ····························································153 3.3.3 ATM协议参考模型 ······················································154 3.3.4 ATM的工作原理 ·························································156 3.3.5 ATM应用 ··································································158 3.4 无线局域网 ·········································································160 3.4.1 无线局域网概述 ··························································160 3.4.2 无线局域网标准IEEE 802.11 ··········································161 3.4.3 无线局域网组网模式 ····················································165 3.4.4 无线局域网的主要类型 ·················································166 3.4.5 无线局域网的应用 ·······················································168 本章小结 ···················································································169 思考题 ······················································································169 第4章计算机网络硬件系统 ··················································170 4.1 传输介质 ············································································170 4.1.1 双绞线 ······································································170 4.1.2 同轴电缆 ···································································174 4.1.3 光缆 ·········································································176 4.1.4 自由空间 ···································································179 4.2 工作站与网络服务器 ·····························································185 4.2.1 工作站 ······································································185 4.2.2 网络服务器 ································································185 4.3 网络设备 ············································································191 4.3.1 网络接口卡 ································································191 4.3.2 调制解调器 ································································194 4.3.3 中继器 ······································································196 4.3.4 集线器 ······································································197 4.3.5 网桥 ·········································································201 4.3.6 交换机 ······································································203 4.3.7 路由器 ······································································208 4.3.8 网关 ·········································································212 VIII 计算机网络技术及应用第2版 4校 文前.indd 8 2023/6/15 14:15:56 目 录 4.3.9 无线接入点 ································································214 4.3.10 网闸 ········································································215 4.3.11 光纤收发器 ·······························································219 本章小结 ···················································································221 思考题 ······················································································221 第5章 计算机网络操作系统 ··················································222 5.1 操作系统及网络操作系统概述 ·················································223 5.1.1 操作系统概述 ·····························································223 5.1.2 网络操作系统概述 ·······················································227 5.2 Windows系列操作系统 ··························································232 5.2.1 Windows系列操作系统的发展与演变 ·······························232 5.2.2 Windows NT操作系统 ··················································233 5.2.3 Windows 10操作系统 ···················································237 5.2.4 Windows Server 2019操作系统 ········································241 5.3 UNIX操作系统 ····································································244 5.3.1 UNIX操作系统的发展 ··················································244 5.3.2 UNIX操作系统的组成和特点 ·········································244 5.3.3 UNIX操作系统的网络操作 ············································247 5.4 Linux操作系统 ····································································247 5.4.1 Linux操作系统的发展 ··················································247 5.4.2 Linux操作系统的组成和特点 ·········································248 5.4.3 Linux的网络功能配置 ··················································249 5.5 国产操作系统 ······································································253 5.5.1 国产操作系统发展概况 ·················································253 5.5.2 几种典型的国产操作系统 ··············································255 本章小结 ···················································································257 思考题 ······················································································258 第6章 Internet ··································································259 6.1 Internet概述 ········································································259 6.1.1 Internet的基本概念 ······················································259 6.1.2 Internet的发展历程 ······················································261 6.1.3 Internet的管理组织 ······················································265 6.2 Internet工作原理··································································267 6.2.1 分组交换原理 ·····························································267 6.2.2 TCP/IP ······································································268 6.2.3 Internet的工作模式 ······················································279 6.3 IP地址 ···············································································282 6.3.1 IPv4 ··········································································282 6.3.2 子网划分 ···································································284 6.3.3 IPv6 ··········································································289 6.4 地址解析与域名 ···································································295 6.4.1 地址解析 ···································································295 6.4.2 域名机制 ···································································297 6.4.3 域名解析 ···································································300 6.4.4 动态主机配置协议 ·······················································304 6.5 Internet接入技术··································································305 6.5.1 接入方式概述 ·····························································305 6.5.2 xDSL接入 ·································································306 6.5.3 HFC接入 ···································································311 6.5.4 光纤接入 ···································································314 6.5.5 以太网接入技术 ··························································317 6.5.6 无线接入 ···································································318 6.6 互联网服务和应用 ································································325 6.6.1 WWW服务 ································································326 6.6.2 电子邮件服务 ·····························································329 6.6.3 文件传输服务 ·····························································332 6.6.4 P2P技术特点及应用 ·····················································332 6.6.5 互联网上的音频/视频服务············································334 6.7 Intranet和Extranet ································································336 6.7.1 Intranet ······································································336 6.7.2 Extranet ·····································································340 6.7.3 Internet、Intranet及Extranet的比较·································341 本章小结 ···················································································342 思考题 ······················································································342 X 计算机网络技术及应用第2版 4校 文前.indd 10 2023/6/15 14:15:56 目 录 第7章 网络安全 ·································································343 7.1 网络安全概述 ······································································343 7.1.1 网络安全的概念 ··························································343 7.1.2 网络安全风险 ·····························································346 7.1.3 网络安全策略 ·····························································348 7.1.4 网络安全措施 ·····························································349 7.2 密码编码技术 ······································································351 7.2.1 密码基础知识 ·····························································351 7.2.2 传统密码编码技术 ·······················································353 7.2.3 对称密钥密码技术 ·······················································354 7.2.4 公开密钥密码技术 ·······················································357 7.2.5 混合加密算法 ·····························································362 7.2.6 网络加密方法 ·····························································363 7.3 网络鉴别与认证 ···································································364 7.3.1 鉴别与身份认证 ··························································364 7.3.2 数字签名 ···································································365 7.3.3 常用身份认证技术 ·······················································368 7.3.4 数字证书 ···································································370 7.3.5 公钥基础设施 ·····························································373 7.3.6 区块链认证技术 ··························································376 7.4 防火墙技术 ·········································································377 7.4.1 防火墙概述 ································································377 7.4.2 防火墙的主要技术 ·······················································379 7.4.3 防火墙的体系结构 ·······················································382 7.4.4 新一代防火墙及其体系结构的发展趋势 ····························384 7.5 反病毒技术 ·········································································385 7.5.1 计算机病毒概述 ··························································385 7.5.2 网络病毒 ···································································387 7.5.3 特洛伊木马 ································································390 7.5.4 网络蠕虫 ···································································392 7.5.5 移动智能终端病毒 ·······················································394 7.5.6 病毒防治技术 ·····························································395 7.6 入侵检测与防御技术 ·····························································397 7.6.1 入侵检测技术概述 ·······················································397 7.6.2 入侵检测方法 ·····························································400 7.6.3 入侵检测系统 ·····························································401 7.6.4 漏洞扫描技术 ·····························································404 7.6.5 入侵防护技术 ·····························································405 7.6.6 网络欺骗技术 ·····························································407 7.7 网络攻击技术 ······································································410 7.7.1 网络攻击的目的、手段与工具 ········································411 7.7.2 网络攻击类型 ·····························································413 7.8 VPN技术 ···········································································416 7.8.1 VPN概述 ···································································417 7.8.2 隧道协议 ···································································420 7.9 无线局域网安全技术 ·····························································422 7.9.1 无线局域网的安全问题 ·················································422 7.9.2 增强无线局域网安全的主要技术 ·····································424 7.10 云计算安全 ·······································································426 7.10.1 云计算安全的概念 ······················································426 7.10.2 云计算面临的安全威胁 ················································427 7.10.3 云计算安全的关键技术 ················································429 本章小结 ···················································································432 思考题 ······················································································432 第8章局域网的设计与安全管理············································434 8.1 局域网的规划与设计 ·····························································434 8.1.1 局域网规划 ································································434 8.1.2 局域网设计 ································································436 8.2 企业网的设计与安全管理 ·······················································439 8.2.1 企业网拓扑结构设计 ····················································440 8.2.2 企业网IP地址分配和VLAN划分 ···································441 8.2.3 路由器协议选择 ··························································443 8.2.4 企业网安全设计与管理 ·················································444 8.3 校园网的安全管理 ································································446 8.3.1 校园网的特点 ·····························································446 8.3.2 校园网安全策略体系 ····················································448 8.3.3 网络接入认证技术的选择 ··············································449 XII 计算机网络技术及应用第2版 4校 文前.indd 12 2023/6/15 14:15:56 目 录 8.3.4 校园网中常见的安全管理问题 ········································454 本章小结 ···················································································460 思考题 ······················································································460 第9章 计算机网络实验 ························································461 实验1 局域网组网 ····································································461 一、实验题目 ······································································461 二、实验课时 ······································································461 三、实验目的 ······································································461 四、实验内容和要求 ·····························································461 实验2 使用交换机的命令行管理界面 ············································462 一、实验题目 ······································································462 二、实验课时 ······································································462 三、实验目的 ······································································462 四、实验内容和要求 ·····························································462 五、实验步骤 ······································································462 实验3 交换机的基本配置 ···························································463 一、实验题目 ······································································463 二、实验课时 ······································································463 三、实验目的 ······································································463 四、实验内容和要求 ·····························································463 五、实验步骤 ······································································463 实验4 VLAN ···········································································464 一、实验题目 ······································································464 二、实验课时 ······································································464 三、实验目的 ······································································464 四、实验内容和要求 ·····························································464 五、实验设备 ······································································464 六、实验拓扑 ······································································464 七、实验步骤 ······································································465 实验5 跨交换机实现VLAN ························································466 一、实验题目 ······································································466 二、实验课时 ······································································466 三、实验目的 ······································································466 四、实验内容和要求 ·····························································466 五、实验设备 ······································································466 六、实验拓扑 ······································································466 七、实验步骤 ······································································467 实验6 Windows网络操作系统的配置与使用 ···································467 一、实验题目 ······································································467 二、实验课时 ······································································467 三、实验目的 ······································································467 四、实验内容和要求 ·····························································467 实验7 Windows文件系统和共享资源管理 ······································468 一、实验题目 ······································································468 二、实验课时 ······································································468 三、实验目的 ······································································468 四、实验内容和要求 ·····························································468 五、实验步骤 ······································································468 实验8 Web服务器的建立和管理··················································468 一、实验题目 ······································································468 二、实验课时 ······································································468 三、实验目的 ······································································469 四、实验内容和要求 ·····························································469 五、实验步骤 ······································································469 实验9 活动目录的创建和管理 ·····················································469 一、实验题目 ······································································469 二、实验课时 ······································································469 三、实验目的 ······································································469 四、实验内容和要求 ·····························································470 五、实验步骤 ······································································470 实验10 软件防火墙和硬件防火墙的配置 ········································470 一、实验题目 ······································································470 二、实验课时 ······································································470 三、实验目的 ······································································470 四、实验内容和要求 ·····························································470 五、实验步骤 ······································································471 参考文献 ·············································································472 XIV 计算机网络技术及应用第2版 4校 文前.indd 14 2023/6/15 14:15:56