Title:
Computer networking : a top-down approach featuring the Internet
Personal Author:
Edition:
3rd ed.
Publication Information:
Boston : Pearson/Addison Wesley, c2005.
Physical Description:
xxiv, 821 p. : ill. ; 24 cm.
ISBN:
9780321227355
General Note:
Accompanied by study guides : TK5105.875.I57 K883 2005
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010124921 | TK5105.875.I57 K88 2005 | Open Access Book | Book | Searching... |
Searching... | 30000010124920 | TK5105.875.I57 K88 2005 | Open Access Book | Book | Searching... |
Searching... | 30000010081706 | TK5105.875 .I57K88 2005c.1 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Appropriate for a first course on computer networking, this textbook describes the architecture and function of the application, transport, network, and link layers of the internet protocol stack, then examines audio and video networking applications, the underpinnings of encryption and network security, and the key issues of network management. Th
Author Notes
James F. Kurose, University of Massachusetts, Amherst
Keith W. Ross, Polytechnic University
Table of Contents
Chapter 1 Computer Networks and the Internet | p. 1 |
1.1 What Is the Internet? | p. 2 |
1.2 The Network Edge | p. 9 |
1.3 The Network Core | p. 14 |
1.4 Access Networks and Physical Media | p. 24 |
1.5 ISPs and Internet Backbones | p. 34 |
1.6 Delay and Loss in Packet-Switched Networks | p. 37 |
1.7 Protocol Layers and Their Service Models | p. 44 |
1.8 History of Computer Networking and the Internet | p. 52 |
1.9 Summary | p. 59 |
Interview: Leonard Kleinrock | p. 71 |
Chapter 2 Application Layer | p. 73 |
2.1 Principles of Network Applications | p. 74 |
2.2 The Web and HTTP | p. 87 |
2.3 File Transfer: FTP | p. 106 |
2.4 Electronic Mail in the Internet | p. 109 |
2.5 DNS--The Internet's Directory Service | p. 123 |
2.6 P2P File Sharing | p. 136 |
2.7 Socket Programming with TCP | p. 146 |
2.8 Socket Programming with UDP | p. 156 |
2.9 Building a Simple Web Server | p. 164 |
2.10 Summary | p. 169 |
Interview: Tim Berners-Lee | p. 181 |
Chapter 3 Transport Layer | p. 183 |
3.1 Introduction and Transport-Layer Services | p. 184 |
3.2 Multiplexing and Demultiplexing | p. 189 |
3.3 Connectionless Transport: UDP | p. 196 |
3.4 Principles of Reliable Data Transfer | p. 201 |
3.5 Connection-Oriented Transport: TCP | p. 228 |
3.6 Principles of Congestion Control | p. 254 |
3.7 TCP Congestion Control | p. 264 |
3.8 Summary | p. 284 |
Interview: Sally Floyd | p. 297 |
Chapter 4 The Network Layer | p. 299 |
4.1 Introduction | p. 300 |
4.2 Virtual Circuit and Datagram Networks | p. 307 |
4.3 What's Inside a Router? | p. 314 |
4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet | p. 323 |
4.5 Routing Algorithms | p. 351 |
4.6 Routing in the Internet | p. 370 |
4.7 Broadcast and Multicast Routing | p. 384 |
4.8 Summary | p. 399 |
Interview: Vinton G. Cerf | p. 414 |
Chapter 5 The Link Layer and Local Area Networks | p. 417 |
5.1 Link Layer: Introduction and Services | p. 419 |
5.2 Error-Detection and -Correction Techniques | p. 423 |
5.3 Multiple Access Protocols | p. 430 |
5.4 Link-Layer Addressing | p. 445 |
5.5 Ethernet | p. 455 |
5.6 Interconnections: Hubs and Switches | p. 465 |
5.7 PPP: The Point-to-Point Protocol | p. 477 |
5.8 Link Virtualization: A Network as a Link Layer | p. 482 |
5.9 Summary | p. 491 |
Interview: Simon S. Lam | p. 500 |
Chapter 6 Wireless and Mobile Networks | p. 503 |
6.1 Introduction | p. 504 |
6.2 Wireless Links and Network Characteristics | p. 508 |
6.3 Wi-Fi: 802.11 Wireless LANs | p. 513 |
6.4 Cellular Internet Access | p. 529 |
6.5 Mobility Management: Principles | p. 536 |
6.6 Mobile IP | p. 546 |
6.7 Managing Mobility in Cellular Networks | p. 551 |
6.8 Wireless and Mobility: Impact on Higher-layer Protocols | p. 556 |
6.9 Summary | p. 559 |
Interview: Charlie Perkins | p. 563 |
Chapter 7 Multimedia Networking | p. 565 |
7.1 Multimedia Networking Applications | p. 566 |
7.2 Streaming Stored Audio and Video | p. 574 |
7.3 Making the Best of the Best-Effort Service: An Internet Phone Example | p. 584 |
7.4 Protocols for Real-Time Interactive Applications | p. 594 |
7.5 Distributing Multimedia: Content Distribution Networks | p. 610 |
7.6 Beyond Best Effort | p. 614 |
7.7 Scheduling and Policing Mechanisms | p. 620 |
7.8 Integrated Services and Differentiated Services | p. 628 |
7.9 RSVP | p. 636 |
7.10 Summary | p. 643 |
Interview: Henning Schulzrinne | p. 651 |
Chapter 8 Security in Computer Networks | p. 653 |
8.1 What Is Network Security? | p. 654 |
8.2 Principles of Cryptography | p. 657 |
8.3 Authentication | p. 670 |
8.4 Integrity | p. 678 |
8.5 Key Distribution and Certification | p. 684 |
8.6 Access Control: Firewalls | p. 691 |
8.7 Attacks and Countermeasures | p. 697 |
8.8 Security in Many Layers: Case Studies | p. 702 |
8.9 Summary | p. 721 |
Interview: Steven M. Bellovin | p. 726 |
Chapter 9 Network Management | p. 729 |
9.1 What Is Network Management? | p. 730 |
9.2 The Infrastructure for Network Management | p. 734 |
9.3 The Internet-Standard Management Framework | p. 738 |
9.4 ASN.1 | p. 753 |
9.5 Conclusion | p. 757 |
Interview: Jeff Case | p. 761 |
References | p. 763 |
Index | p. 797 |