Computer Networking. (Record no. 25587)

MARC details
000 -LEADER
fixed length control field 10606nam a22003973i 4500
001 - CONTROL NUMBER
control field EBC5126474
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190105114322.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2009 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131739297
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5126474
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5126474
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL269302
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024279036
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 004.6
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kurose, James F.
245 10 - TITLE STATEMENT
Title Computer Networking.
250 ## - EDITION STATEMENT
Edition statement 5th ed.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (889 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Table of Contents -- Chapter 1 Computer Networks and the Internet -- 1.1 What Is the Internet? -- 1.1.1 A Nuts-and-Bolts Description -- 1.1.2 A Services Description -- 1.1.3 What Is a Protocol? -- 1.2 The Network Edge -- 1.2.1 Client and Server Programs -- 1.2.2 Access Networks -- 1.2.3 Physical Media -- 1.3 The Network Core -- 1.3.1 Circuit Switching and Packet Switching -- 1.3.2 How Do Packets Make Their Way Through Packet-Switched Networks? -- 1.3.3 ISPs and Internet Backbones -- 1.4 Delay, Loss, and Throughput in Packet-Switched Networks -- 1.4.1 Overview of Delay in Packet-Switched Networks -- 1.4.2 Queuing Delay and Packet Loss -- 1.4.3 End-to-End Delay -- 1.4.4 Throughput in Computer Networks -- 1.5 Protocol Layers and Their Service Models -- 1.5.1 Layered Architecture -- 1.5.2 Messages, Segments, Datagrams, and Frames -- 1.6 Networks Under Attack -- 1.7 History of Computer Networking and the Internet -- 1.7.1 The Development of Packet Switching: 1961-1972 -- 1.7.2 Proprietary Networks and Internetworking: 1972-1980 -- 1.7.3 A Proliferation of Networks: 1980-1990 -- 1.7.4 The Internet Explosion: The 1990s -- 1.7.5 Recent Developments -- 1.8 Summary -- Road-Mapping This Book -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Chapter 2 Application Layer -- 2.1 Principles of Network Applications -- 2.1.1 Network Application Architectures -- 2.1.2 Processes Communicating -- 2.1.3 Transport Services Available to Applications -- 2.1.4 Transport Services Provided by the Internet -- 2.1.5 Application-Layer Protocols -- 2.1.6 Network Applications Covered in This Book -- 2.2 The Web and HTTP -- 2.2.1 Overview of HTTP -- 2.2.2 Non-Persistent and Persistent Connections -- 2.2.3 HTTP Message Format -- 2.2.4 User-Server Interaction: Cookies -- 2.2.5 Web Caching.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2.6 The Conditional GET -- 2.3 File Transfer: FTP -- 2.3.1 FTP Commands and Replies -- 2.4 Electronic Mail in the Internet -- 2.4.1 SMTP -- 2.4.2 Comparison with HTTP -- 2.4.3 Mail Message Formats -- 2.4.4 Mail Access Protocols -- 2.5 DNS-The Internet's Directory Service -- 2.5.1 Services Provided by DNS -- 2.5.2 Overview of How DNS Works -- 2.5.3 DNS Records and Messages -- 2.6 Peer-to-Peer Applications -- 2.6.1 P2P File Distribution -- 2.6.2 Distributed Hash Tables (DHTs) -- 2.6.3 Case Study: P2P Internet Telephony with Skype -- 2.7 Socket Programming with TCP -- 2.7.1 Socket Programming with TCP -- 2.7.2 An Example Client-Server Application in Java -- 2.8 Socket Programming with UDP -- 2.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Socket Programming Assignments -- Wireshark Labs -- Interview: Bram Cohen -- Chapter 3 Transport Layer -- 3.1 Introduction and Transport-Layer Services -- 3.1.1 Relationship Between Transport and Network Layers -- 3.1.2 Overview of the Transport Layer in the Internet -- 3.2 Multiplexing and Demultiplexing -- 3.3 Connectionless Transport: UDP -- 3.3.1 UDP Segment Structure -- 3.3.2 UDP Checksum -- 3.4 Principles of Reliable Data Transfer -- 3.4.1 Building a Reliable Data Transfer Protocol -- 3.4.2 Pipelined Reliable Data Transfer Protocols -- 3.4.3 Go-Back-N (GBN) -- 3.4.4 Selective Repeat (SR) -- 3.5 Connection-Oriented Transport: TCP -- 3.5.1 The TCP Connection -- 3.5.2 TCP Segment Structure -- 3.5.3 Round-Trip Time Estimation and Timeout -- 3.5.4 Reliable Data Transfer -- 3.5.5 Flow Control -- 3.5.6 TCP Connection Management -- 3.6 Principles of Congestion Control -- 3.6.1 The Causes and the Costs of Congestion -- 3.6.2 Approaches to Congestion Control -- 3.6.3 Network-Assisted Congestion-Control Example: ATM ABR Congestion Control -- 3.7 TCP Congestion Control.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.7.1 Fairness -- 3.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignments -- Wireshark Lab: Exploring TCP -- Interview: Sally Floyd -- Chapter 4 The Network Layer -- 4.1 Introduction -- 4.1.1 Forwarding and Routing -- 4.1.2 Network Service Models -- 4.2 Virtual Circuit and Datagram Networks -- 4.2.1 Virtual-Circuit Networks -- 4.2.2 Datagram Networks -- 4.2.3 Origins of VC and Datagram Networks -- 4.3 What's Inside a Router? -- 4.3.1 Input Ports -- 4.3.2 Switching Fabric -- 4.3.3 Output Ports -- 4.3.4 Where Does Queuing Occur? -- 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet -- 4.4.1 Datagram Format -- 4.4.2 IPv4 Addressing -- 4.4.3 Internet Control Message Protocol (ICMP) -- 4.4.4 IPv6 -- 4.4.5 A Brief Foray into IP Security -- 4.5 Routing Algorithms -- 4.5.1 The Link-State (LS) Routing Algorithm -- 4.5.2 The Distance-Vector (DV) Routing Algorithm -- 4.5.3 Hierarchical Routing -- 4.6 Routing in the Internet -- 4.6.1 Intra-AS Routing in the Internet: RIP -- 4.6.2 Intra-AS Routing in the Internet: OSPF -- 4.6.3 Inter-AS Routing: BGP -- 4.7 Broadcast and Multicast Routing -- 4.7.1 Broadcast Routing Algorithms -- 4.7.2 Multicast -- 4.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Wireshark Labs -- Interview: Vinton G. Cerf -- Chapter 5 The Link Layer and Local Area Networks -- 5.1 Link Layer: Introduction and Services -- 5.1.1 The Services Provided by the Link Layer -- 5.1.2 Where Is the Link Layer Implemented? -- 5.2 Error-Detection and -Correction Techniques -- 5.2.1 Parity Checks -- 5.2.2 Checksumming Methods -- 5.2.3 Cyclic Redundancy Check (CRC) -- 5.3 Multiple Access Protocols -- 5.3.1 Channel Partitioning Protocols -- 5.3.2 Random Access Protocols -- 5.3.3 Taking-Turns Protocols.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.3.4 Local Area Networks (LANs) -- 5.4 Link-Layer Addressing -- 5.4.1 MAC Addresses -- 5.4.2 Address Resolution Protocol (ARP) -- 5.5 Ethernet -- 5.5.1 Ethernet Frame Structure -- 5.5.2 CSMA/CD: Ethernet's Multiple Access Protocol -- 5.5.3 Ethernet Technologies -- 5.6 Link-Layer Switches -- 5.6.1 Forwarding and Filtering -- 5.6.2 Self-Learning -- 5.6.3 Properties of Link-Layer Switching -- 5.6.4 Switches Versus Routers -- 5.6.5 Virtual Local Area Networks (VLANs) -- 5.7 PPP: The Point-to-Point Protocol -- 5.7.1 PPP Data Framing -- 5.8 Link Virtualization: A Network as a Link Layer -- 5.9 A Day in the Life of a Web Page Request -- 5.10 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Simon S. Lam -- Chapter 6 Wireless and Mobile Networks -- 6.1 Introduction -- 6.2 Wireless Links and Network Characteristics -- 6.2.1 CDMA -- 6.3 WiFi: 802.11 Wireless LANs -- 6.3.1 The 802.11 Architecture -- 6.3.2 The 802.11 MAC Protocol -- 6.3.3 The IEEE 802.11 Frame -- 6.3.4 Mobility in the Same IP Subnet -- 6.3.5 Advanced Features in 802.11 -- 6.3.6 Beyond 802.11: Bluetooth and WiMAX -- 6.4 Cellular Internet Access -- 6.4.1 An Overview of Cellular Architecture -- 6.5 Mobility Management: Principles -- 6.5.1 Addressing -- 6.5.2 Routing to a Mobile Node -- 6.6 Mobile IP -- 6.7 Managing Mobility in Cellular Networks -- 6.7.1 Routing Calls to a Mobile User -- 6.7.2 Handoffs in GSM -- 6.8 Wireless and Mobility: Impact on Higher-layer Protocols -- 6.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Charlie Perkins -- Chapter 7 Multimedia Networking -- 7.1 Multimedia Networking Applications -- 7.1.1 Examples of Multimedia Applications -- 7.1.2 Hurdles for Multimedia in Today's Internet.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7.1.3 How Should the Internet Evolve to Support Multimedia Better? -- 7.1.4 Audio and Video Compression -- 7.2 Streaming Stored Audio and Video -- 7.2.1 Accessing Audio and Video Through a Web Server -- 7.2.2 Sending Multimedia from a Streaming Server to a Helper Application -- 7.2.3 Real-Time Streaming Protocol (RTSP) -- 7.3 Making the Best of the Best-Effort Service -- 7.3.1 The Limitations of a Best-Effort Service -- 7.3.2 Removing Jitter at the Receiver for Audio -- 7.3.3 Recovering from Packet Loss -- 7.3.4 Distributing Multimedia in Today's Internet: Content Distribution Networks -- 7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service -- 7.4 Protocols for Real-Time Interactive Applications -- 7.4.1 RTP -- 7.4.2 RTP Control Protocol (RTCP) -- 7.4.3 SIP -- 7.4.4 H.323 -- 7.5 Providing Multiple Classes of Service -- 7.5.1 Motivating Scenarios -- 7.5.2 Scheduling and Policing Mechanisms -- 7.5.3 Diffserv -- 7.6 Providing Quality of Service Guarantees -- 7.6.1 A Motivating Example -- 7.6.2 Resource Reservation, Call Admission, Call Setup -- 7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP -- 7.7 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Interview: Henning Schulzrinne -- Chapter 8 Security in Computer Networks -- 8.1 What Is Network Security? -- 8.2 Principles of Cryptography -- 8.2.1 Symmetric Key Cryptography -- 8.2.2 Public Key Encryption -- 8.3 Message Integrity and End-Point Authentication -- 8.3.1 Cryptographic Hash Functions -- 8.3.2 Message Authentication Code -- 8.3.3 Digital Signatures -- 8.3.4 End-Point Authentication -- 8.4 Securing E-mail -- 8.4.1 Secure E-mail -- 8.4.2 PGP -- 8.5 Securing TCP Connections: SSL -- 8.5.1 The Big Picture -- 8.5.2 A More Complete Picture -- 8.6 Network-Layer Security: IPsec and Virtual Private Networks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8.6.1 IPsec and Virtual Private Networks (VPNs).
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ross, Keith W.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Kurose, James F.
Title Computer Networking: A Top-Down Approach
Place, publisher, and date of publication : Pearson India,c2009
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126474">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126474</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online access     CENTRAL LIBRARY Digital Library Digital Library 05/01/2019   004.6 KUR-C5 E0110 05/01/2019 05/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery