Computer networks / Andrew S. Tanenbaum, David J. Wetherall.
Material type:
TextPublication details: Boston : Pearson Prentice Hall, c2011.Edition: 5th edDescription: xxii, 933 p. : ill. ; 24 cmISBN: - 9780132126953 (alk. paper)
- 0132126958 (alk. paper)
- 004.6 22
| Item type | Current library | Call number | Status | Barcode | |
|---|---|---|---|---|---|
Books - Open Access
|
Faculty of Technology - Book Bank | 004.6 TAN (Browse shelf(Opens below)) | Available | 001230623 |
Includes bibliographical references and index.
1. Introduction. Uses of computer networks : Business applications ; Home applications ; Mobile users ; Social issues -- Network hardware : Personal area networks ; Local area networks ; Metropolitan area netwo rks ; Wide area networks ; Internetworks -- Network software : Protocol hierarchies ; Design issues for the layers ; Connection-oriented versu s connectionless service ; Service primitives ; The relationship of ser vices to protocols -- Reference models : The OSI reference model ; The TCP/IP reference model ; The model used in this book ; A comparison of the OSI and TCP/IP reference models ; A critique of the OSI model and p rotocols ; A critique of the TCP/IP reference model -- Example networks : The internet ; Third-generation mobile phone networks ; Wireless LAN s: 802.11 ; RFID and sensor networks -- Network standardization : Who's who in the telecommunications world ; Who's who in the international s tandards world ; Who's who in the internet standards world -- Metric un its -- Outline of the rest of the book -- 2. The physical layer. The th eoretical basis for data communication : Fourier analysis ; Bandwidth-l imited signals ; The maximum data rate of a channel -- Guided transmiss ion media : Magnetic media ; Twisted pairs ; Coaxial cable ; Power line s ; Fiber optics -- Wireless transmission : The electromagnetic spectru m ; Radio transmission ; Microwave transmission ; Infrared transmission ; Light transmission -- Communication satellites : Geostationary satel lites ; Medium-earth orbit satellites ; Low-earth orbit satellites ; Sa tellites versus fiber -- Digital modulation and multiplexing : Baseband transmission ; Passband transmission ; Frequency division multiplexing ; Time division multiplexing ; Code division multiplexing -- The publi c switched telephone network : Structure of the telephone system ; The politics of telephones ; The local loop: modems, ADSL, and fiber ; Trun ks and multiplexing ; Switching -- The mobile telephone system : First- generation (coco1G) mobile phones: analog voice ; Second-generation (2G ) mobile phones: digital voice ; Third-generation (3G) mobile phones: d igital voice and date -- Cable television : Community antenna televisio n ; Internet over cable ; Spectrum allocation ; Cable modems ; ADSL ver sus cable -- 3. The data link layer. Data link layer design issues : Se rvices provided to the network layer ; Framing ; Error control ; Flow c ontrol -- Error detection and correction : Error-correcting codes ; Err or-detecting codes -- Elementary data link protocols : A Utopian simple x protocol ; A simplex stop-and-wait protocol for an error-free channel ; A simplex stop-and-wait protocol for a noisy channel -- Sliding wind ow protocols : A one-bit sliding window protocol ; A protocol using go- back-n ; A protocol using selective repeat -- Example data link protoco ls : Packet over SONET ; ADSL (asymmetric digital subscriber loop) --
4. The medium access control sublayer. The channel allocation proble m : Static channel allocation ; Assumptions for dynamic channel allocat ion -- Multiple access protocols : ALOHA ; Carrier sense multiple acces s protocols ; Collision-free protocols ; Limited-contention protocols ; Wireless LAN protocols -- Ethernet : Classic ethernet physical layer ; Classic ethernet MAC sublayer protocol ; Ethernet performance ; Switch ed ethernet ; Fast ethernet ; Gigabit ethernet ; 10-gigabit ethernet ; Retrospective on ethernet -- Wireless LANs : The 802.11 architecture an d protocol stack ; The 802.11 physical layer ; The 802.11 MAC sublayer protocol ; The 802.11 frame structure ; Services -- Broadband wireless : Comparison of 802.16 with 802.11 and 3G ; The 802.16 architecture and protocol stack ; The 802.16 physical layer ; The 802.16 MAC sublayer p rotocol ; The 802.16 frame structure -- Bluetooth : Bluetooth architect ure ; Bluetooth applications ; The bluetooth protocol stack ; The bluet ooth radio layer ; The bluetooth link layers ; The bluetooth frame stru cture -- RFID : EPC gen 2 architecture ; EPC gen 2 physical layer ; EPC gen 2 tag identification layer ; Tag identification message formats -- Data link layer switching : Uses of bridges ; Learning bridges ; Spann ing tree bridges ; Repeaters, hubs, bridges, switches, routers, and gat eways ; Virtual LANs -- 5. The network layer. Network layer design issu es : Store-and-forward packet switching ; Services provided to the tran sport layer ; Implementation of connectionless service ; Implementation of connection-oriented service ; Comparison of virtual-circuit and dat agram networks -- Routing algorithms : The optimality principle ; Short est path algorithm ; Flooding ; Distance vector routing ; Link state ro uting ; Hierarchical routing ; Broadcast routing ; Multicast routing ; Anycast routing ; Routing for mobile hosts ; Routing in ad hoc networks -- Congestion control algorithms : Approaches to congestion control : Traffic-aware routing ; Admission control ; Traffic throttling ; Load s hedding -- Quality of service : Application requirements ; Traffic shap ing ; Packet scheduling ; Admission control ; Integrated services ; Dif ferentiated services -- Internetworking : How networks differ ; How net works can be connected ; Tunneling ; Internetwork routing ; Packet frag mentation -- The network layer in the internet : The IP version 4 proto col ; IP addresses ; IP version ; Internet control protocols ; Label sw itching and MPLS ; OSPF, an interior gateway routing protocol ; BGP, th e exterior gateway routing protocol ; Internet multicasting ; Mobile IP -- 6. The transport layer. The transport service : Services provided t o the upper layers ; Transport service primitives ; Berkeley sockets ; An example of socket programming: an internet file server -- Elements o f transport protocols : Addressing ; Connection establishment ; Connect ion release ; Error control and flow control ; Multiplexing ; Crash rec overy -- Congestion control : Desirable bandwidth allocation ; Regulati ng the sending rate ; Wireless issues -- The internet transport protoco ls: UDP : Introduction to UDP ; Remote procedure call ; Real-time trans port protocols ; The internet transport protocols: TCP : Introduction t o TCP ; The TCP service model ; The TCP protocol ; The TCP segment head er ; TCP connection establishment ; TCP connection release ; TCP connec tion management modeling ; TCP sliding window ; TCP timer management ; TCP congestion control : The future of TCP -- Performance issues : Perf ormance problems in computer networks ; Network performance measurement ; Host design for fast networks ; Fast segment processing ; Header com pression ; Protocols for long fat networks -- Delay-tolerant networking : DTN architecture ; The bundle protocol --
7. The application layer. DNS, the domain name system : The DNS name space ; Domain resource records ; Name servers -- Electronic mail : Ar chitecture and services ; The user agent ; Message formats ; Message tr ansfer ; Final delivery -- The world wide web : Architectural overview ; Static web pages ; Dynamic web pages and web applications ; HTTP, the hypertext transfer protocol ; The mobile web ; Web search -- Streaming audio and video : Digital audio ; Digital video ; Streaming stored med ia ; Streaming live media ; Real-time conferencing -- Content delivery : Content and internet traffic ; Server farms and web proxies ; Content delivery networks ; Peer-to-peer networks -- 8. Network security. Cryp tography : Introduction to cryptography ; Substitution ciphers ; Transp osition ciphers ; One-time pads ; Two fundamental cryptographic princip les -- Symmetric-key algorithms : DES, the data encryption standard ; A ES, the advanced encryption standard ; Cipher modes ; Other ciphers ; C ryptanalysis -- Public-key algorithms : RSA ; Other public-key algorith ms -- Digital signatures : Symmetric-key signatures ; Public-key signat ures ; Message digests ; The birthday attack -- Management of public ke ys : Certificates ; X.509 ; Public key infrastructures -- Communication security : IPsec ; Firewalls ; Virtual private networks ; Wireless sec urity -- Authentication protocols : Authentication based on a shared se cret key ; Establishing a shared key: the Diffie-Hellman key exchange ; Authentication using a key distribution center ; Authentication using Kerberos ; Authentication using public-key cryptography -- Email securi ty : PGP, pretty good privacy ; S/MIME -- Web security : Threats ; Secu re naming ; SSL, the secure sockets layer ; Mobile code security -- Soc ial issues : Privacy ; Freedom of speech ; Copyright -- 9. Reading list and bibliography. Suggestions for further reading : Introduction and g eneral works ; The physical layer ; The data link layer ; The medium ac cess control sublayer ; The network layer ; The transport layer ; The a pplication layer ; Network security -- Alphabetical bibliography.
There are no comments on this title.