000 02710nam a22002057a 4500
005 20220202230950.0
008 220202s2021 ii ||||| |||| 00| 0 eng d
040 _cOCLC
082 _223
_a929.605
_bTAN
100 1 _aTanenbaum, Andrew S.
_910461
245 _aComputer Networks /
_cAndrew S Tanenbaum, Nick Feamster and D Wetherall.
260 _aUnited Kingdom:
_bPearson Education;
_c2021.
300 _axxii, 922 p.
505 _aTable of contents: 1. Introduction Uses of Computer Networks Types of Computer Networks Network Technology, from Local to Global Examples of Networks Network Protocols Reference Models Standardization Policy, Legal, and Social Issues Metric Units Outline of the Rest of the Book Summary 2. The Physical Layer Guided Transmission Media Wireless Transmission Using the Spectrum for Transmission From Waveforms to Bits The Public Switched Telephone Network Cellular Networks Cable Networks Communication Satellites Comparing Different Access Networks Policy at the Physical Layer Summary 3. The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Improving Efficiency Data Link Protocols in Practice Summary 4. The Medium Access ControlSublayer The Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Bluetooth DOCSIS Data Link Layer Switching Summary 5. The Network Layer Network Layer Design Issues Routing Algorithms in a Single Network Traffic Management at the Network Layer Quality of Service and Application QoE Internetworking Software Defined Networking The Network Layer in the Internet Policy at the Network layer Summary 6. The Transport Layer The Transport Service Elements of Transport Protocols Congestion Control The Internet Transport Protocols: UDP The Internet Transport Protocols: TCP, QUIC, BBR Performance Monitoring Delay-Tolerant Networking Summary 7. The Application Layer DNS - The Domain Name System Electronic Mail The World Wide Web HTTP/2 Streaming Audio and Video Content Delivery Networks and Distributed Cloud Services Summary 8. Security Fundamentals of Network Security The Core Ingredients of an Attack Firewalls and Intrusion Detection Systems Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Authentication Protocols Communication Security Email Security Web Security Social Issues Summary 9. List and Bibliography Suggestions for Further Reading Alphabetical Bibliography
700 _aFeamster, Nick.
_910464
700 _aWetherall, D.
_910465
773 _aPearson Education eBooks
856 _uhttp://classify.oclc.org/classify2/ClassifyDemo?owi=10894493657
942 _2ddc
_cEBK
_y12
_z Babita Kumari
999 _c4452
_d4452