Computer Networks / Andrew S Tanenbaum, Nick Feamster and D Wetherall.

By: Tanenbaum, Andrew S
Contributor(s): Feamster, Nick | Wetherall, D
Material type: TextTextPublisher: United Kingdom: Pearson Education; 2021Description: xxii, 922 pDDC classification: 929.605 Online resources: Click here to access online
Contents:
Table of contents: 1. Introduction Uses of Computer Networks Types of Computer Networks Network Technology, from Local to Global Examples of Networks Network Protocols Reference Models Standardization Policy, Legal, and Social Issues Metric Units Outline of the Rest of the Book Summary 2. The Physical Layer Guided Transmission Media Wireless Transmission Using the Spectrum for Transmission From Waveforms to Bits The Public Switched Telephone Network Cellular Networks Cable Networks Communication Satellites Comparing Different Access Networks Policy at the Physical Layer Summary 3. The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Improving Efficiency Data Link Protocols in Practice Summary 4. The Medium Access ControlSublayer The Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Bluetooth DOCSIS Data Link Layer Switching Summary 5. The Network Layer Network Layer Design Issues Routing Algorithms in a Single Network Traffic Management at the Network Layer Quality of Service and Application QoE Internetworking Software Defined Networking The Network Layer in the Internet Policy at the Network layer Summary 6. The Transport Layer The Transport Service Elements of Transport Protocols Congestion Control The Internet Transport Protocols: UDP The Internet Transport Protocols: TCP, QUIC, BBR Performance Monitoring Delay-Tolerant Networking Summary 7. The Application Layer DNS - The Domain Name System Electronic Mail The World Wide Web HTTP/2 Streaming Audio and Video Content Delivery Networks and Distributed Cloud Services Summary 8. Security Fundamentals of Network Security The Core Ingredients of an Attack Firewalls and Intrusion Detection Systems Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Authentication Protocols Communication Security Email Security Web Security Social Issues Summary 9. List and Bibliography Suggestions for Further Reading Alphabetical Bibliography
In: Pearson Education eBooks
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Table of contents:
1. Introduction Uses of Computer Networks Types of Computer Networks Network Technology, from Local to Global Examples of Networks Network Protocols Reference Models Standardization Policy, Legal, and Social Issues Metric Units Outline of the Rest of the Book Summary
2. The Physical Layer Guided Transmission Media Wireless Transmission Using the Spectrum for Transmission From Waveforms to Bits The Public Switched Telephone Network Cellular Networks Cable Networks Communication Satellites Comparing Different Access Networks Policy at the Physical Layer Summary
3. The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Improving Efficiency Data Link Protocols in Practice Summary
4. The Medium Access ControlSublayer The Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Bluetooth DOCSIS Data Link Layer Switching Summary
5. The Network Layer Network Layer Design Issues Routing Algorithms in a Single Network Traffic Management at the Network Layer Quality of Service and Application QoE Internetworking Software Defined Networking The Network Layer in the Internet Policy at the Network layer Summary
6. The Transport Layer The Transport Service Elements of Transport Protocols Congestion Control The Internet Transport Protocols: UDP The Internet Transport Protocols: TCP, QUIC, BBR Performance Monitoring Delay-Tolerant Networking Summary
7. The Application Layer DNS - The Domain Name System Electronic Mail The World Wide Web HTTP/2 Streaming Audio and Video Content Delivery Networks and Distributed Cloud Services Summary
8. Security Fundamentals of Network Security The Core Ingredients of an Attack Firewalls and Intrusion Detection Systems Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Authentication Protocols Communication Security Email Security Web Security Social Issues Summary
9. List and Bibliography Suggestions for Further Reading Alphabetical Bibliography

There are no comments on this title.

to post a comment.
Supported by Central Library, NIT Hamirpur
Powered by KOHA