000 | 02710nam a22002057a 4500 | ||
---|---|---|---|
005 | 20220202230950.0 | ||
008 | 220202s2021 ii ||||| |||| 00| 0 eng d | ||
040 | _cOCLC | ||
082 |
_223 _a929.605 _bTAN |
||
100 | 1 |
_aTanenbaum, Andrew S. _910461 |
|
245 |
_aComputer Networks / _cAndrew S Tanenbaum, Nick Feamster and D Wetherall. |
||
260 |
_aUnited Kingdom: _bPearson Education; _c2021. |
||
300 | _axxii, 922 p. | ||
505 | _aTable of contents: 1. Introduction Uses of Computer Networks Types of Computer Networks Network Technology, from Local to Global Examples of Networks Network Protocols Reference Models Standardization Policy, Legal, and Social Issues Metric Units Outline of the Rest of the Book Summary 2. The Physical Layer Guided Transmission Media Wireless Transmission Using the Spectrum for Transmission From Waveforms to Bits The Public Switched Telephone Network Cellular Networks Cable Networks Communication Satellites Comparing Different Access Networks Policy at the Physical Layer Summary 3. The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Improving Efficiency Data Link Protocols in Practice Summary 4. The Medium Access ControlSublayer The Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Bluetooth DOCSIS Data Link Layer Switching Summary 5. The Network Layer Network Layer Design Issues Routing Algorithms in a Single Network Traffic Management at the Network Layer Quality of Service and Application QoE Internetworking Software Defined Networking The Network Layer in the Internet Policy at the Network layer Summary 6. The Transport Layer The Transport Service Elements of Transport Protocols Congestion Control The Internet Transport Protocols: UDP The Internet Transport Protocols: TCP, QUIC, BBR Performance Monitoring Delay-Tolerant Networking Summary 7. The Application Layer DNS - The Domain Name System Electronic Mail The World Wide Web HTTP/2 Streaming Audio and Video Content Delivery Networks and Distributed Cloud Services Summary 8. Security Fundamentals of Network Security The Core Ingredients of an Attack Firewalls and Intrusion Detection Systems Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Authentication Protocols Communication Security Email Security Web Security Social Issues Summary 9. List and Bibliography Suggestions for Further Reading Alphabetical Bibliography | ||
700 |
_aFeamster, Nick. _910464 |
||
700 |
_aWetherall, D. _910465 |
||
773 | _aPearson Education eBooks | ||
856 | _uhttp://classify.oclc.org/classify2/ClassifyDemo?owi=10894493657 | ||
942 |
_2ddc _cEBK _y12 _z Babita Kumari |
||
999 |
_c4452 _d4452 |