Computer Networking. (Record no. 25587)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 10606nam a22003973i 4500 |
001 - CONTROL NUMBER | |
control field | EBC5126474 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190105114322.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181231s2009 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131739297 |
Qualifying information | (electronic bk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC5126474 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL5126474 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL269302 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1024279036 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23rd |
Classification number | 004.6 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kurose, James F. |
245 10 - TITLE STATEMENT | |
Title | Computer Networking. |
250 ## - EDITION STATEMENT | |
Edition statement | 5th ed. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (889 pages) |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Table of Contents -- Chapter 1 Computer Networks and the Internet -- 1.1 What Is the Internet? -- 1.1.1 A Nuts-and-Bolts Description -- 1.1.2 A Services Description -- 1.1.3 What Is a Protocol? -- 1.2 The Network Edge -- 1.2.1 Client and Server Programs -- 1.2.2 Access Networks -- 1.2.3 Physical Media -- 1.3 The Network Core -- 1.3.1 Circuit Switching and Packet Switching -- 1.3.2 How Do Packets Make Their Way Through Packet-Switched Networks? -- 1.3.3 ISPs and Internet Backbones -- 1.4 Delay, Loss, and Throughput in Packet-Switched Networks -- 1.4.1 Overview of Delay in Packet-Switched Networks -- 1.4.2 Queuing Delay and Packet Loss -- 1.4.3 End-to-End Delay -- 1.4.4 Throughput in Computer Networks -- 1.5 Protocol Layers and Their Service Models -- 1.5.1 Layered Architecture -- 1.5.2 Messages, Segments, Datagrams, and Frames -- 1.6 Networks Under Attack -- 1.7 History of Computer Networking and the Internet -- 1.7.1 The Development of Packet Switching: 1961-1972 -- 1.7.2 Proprietary Networks and Internetworking: 1972-1980 -- 1.7.3 A Proliferation of Networks: 1980-1990 -- 1.7.4 The Internet Explosion: The 1990s -- 1.7.5 Recent Developments -- 1.8 Summary -- Road-Mapping This Book -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Chapter 2 Application Layer -- 2.1 Principles of Network Applications -- 2.1.1 Network Application Architectures -- 2.1.2 Processes Communicating -- 2.1.3 Transport Services Available to Applications -- 2.1.4 Transport Services Provided by the Internet -- 2.1.5 Application-Layer Protocols -- 2.1.6 Network Applications Covered in This Book -- 2.2 The Web and HTTP -- 2.2.1 Overview of HTTP -- 2.2.2 Non-Persistent and Persistent Connections -- 2.2.3 HTTP Message Format -- 2.2.4 User-Server Interaction: Cookies -- 2.2.5 Web Caching. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.2.6 The Conditional GET -- 2.3 File Transfer: FTP -- 2.3.1 FTP Commands and Replies -- 2.4 Electronic Mail in the Internet -- 2.4.1 SMTP -- 2.4.2 Comparison with HTTP -- 2.4.3 Mail Message Formats -- 2.4.4 Mail Access Protocols -- 2.5 DNS-The Internet's Directory Service -- 2.5.1 Services Provided by DNS -- 2.5.2 Overview of How DNS Works -- 2.5.3 DNS Records and Messages -- 2.6 Peer-to-Peer Applications -- 2.6.1 P2P File Distribution -- 2.6.2 Distributed Hash Tables (DHTs) -- 2.6.3 Case Study: P2P Internet Telephony with Skype -- 2.7 Socket Programming with TCP -- 2.7.1 Socket Programming with TCP -- 2.7.2 An Example Client-Server Application in Java -- 2.8 Socket Programming with UDP -- 2.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Socket Programming Assignments -- Wireshark Labs -- Interview: Bram Cohen -- Chapter 3 Transport Layer -- 3.1 Introduction and Transport-Layer Services -- 3.1.1 Relationship Between Transport and Network Layers -- 3.1.2 Overview of the Transport Layer in the Internet -- 3.2 Multiplexing and Demultiplexing -- 3.3 Connectionless Transport: UDP -- 3.3.1 UDP Segment Structure -- 3.3.2 UDP Checksum -- 3.4 Principles of Reliable Data Transfer -- 3.4.1 Building a Reliable Data Transfer Protocol -- 3.4.2 Pipelined Reliable Data Transfer Protocols -- 3.4.3 Go-Back-N (GBN) -- 3.4.4 Selective Repeat (SR) -- 3.5 Connection-Oriented Transport: TCP -- 3.5.1 The TCP Connection -- 3.5.2 TCP Segment Structure -- 3.5.3 Round-Trip Time Estimation and Timeout -- 3.5.4 Reliable Data Transfer -- 3.5.5 Flow Control -- 3.5.6 TCP Connection Management -- 3.6 Principles of Congestion Control -- 3.6.1 The Causes and the Costs of Congestion -- 3.6.2 Approaches to Congestion Control -- 3.6.3 Network-Assisted Congestion-Control Example: ATM ABR Congestion Control -- 3.7 TCP Congestion Control. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.7.1 Fairness -- 3.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignments -- Wireshark Lab: Exploring TCP -- Interview: Sally Floyd -- Chapter 4 The Network Layer -- 4.1 Introduction -- 4.1.1 Forwarding and Routing -- 4.1.2 Network Service Models -- 4.2 Virtual Circuit and Datagram Networks -- 4.2.1 Virtual-Circuit Networks -- 4.2.2 Datagram Networks -- 4.2.3 Origins of VC and Datagram Networks -- 4.3 What's Inside a Router? -- 4.3.1 Input Ports -- 4.3.2 Switching Fabric -- 4.3.3 Output Ports -- 4.3.4 Where Does Queuing Occur? -- 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet -- 4.4.1 Datagram Format -- 4.4.2 IPv4 Addressing -- 4.4.3 Internet Control Message Protocol (ICMP) -- 4.4.4 IPv6 -- 4.4.5 A Brief Foray into IP Security -- 4.5 Routing Algorithms -- 4.5.1 The Link-State (LS) Routing Algorithm -- 4.5.2 The Distance-Vector (DV) Routing Algorithm -- 4.5.3 Hierarchical Routing -- 4.6 Routing in the Internet -- 4.6.1 Intra-AS Routing in the Internet: RIP -- 4.6.2 Intra-AS Routing in the Internet: OSPF -- 4.6.3 Inter-AS Routing: BGP -- 4.7 Broadcast and Multicast Routing -- 4.7.1 Broadcast Routing Algorithms -- 4.7.2 Multicast -- 4.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Wireshark Labs -- Interview: Vinton G. Cerf -- Chapter 5 The Link Layer and Local Area Networks -- 5.1 Link Layer: Introduction and Services -- 5.1.1 The Services Provided by the Link Layer -- 5.1.2 Where Is the Link Layer Implemented? -- 5.2 Error-Detection and -Correction Techniques -- 5.2.1 Parity Checks -- 5.2.2 Checksumming Methods -- 5.2.3 Cyclic Redundancy Check (CRC) -- 5.3 Multiple Access Protocols -- 5.3.1 Channel Partitioning Protocols -- 5.3.2 Random Access Protocols -- 5.3.3 Taking-Turns Protocols. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 5.3.4 Local Area Networks (LANs) -- 5.4 Link-Layer Addressing -- 5.4.1 MAC Addresses -- 5.4.2 Address Resolution Protocol (ARP) -- 5.5 Ethernet -- 5.5.1 Ethernet Frame Structure -- 5.5.2 CSMA/CD: Ethernet's Multiple Access Protocol -- 5.5.3 Ethernet Technologies -- 5.6 Link-Layer Switches -- 5.6.1 Forwarding and Filtering -- 5.6.2 Self-Learning -- 5.6.3 Properties of Link-Layer Switching -- 5.6.4 Switches Versus Routers -- 5.6.5 Virtual Local Area Networks (VLANs) -- 5.7 PPP: The Point-to-Point Protocol -- 5.7.1 PPP Data Framing -- 5.8 Link Virtualization: A Network as a Link Layer -- 5.9 A Day in the Life of a Web Page Request -- 5.10 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Simon S. Lam -- Chapter 6 Wireless and Mobile Networks -- 6.1 Introduction -- 6.2 Wireless Links and Network Characteristics -- 6.2.1 CDMA -- 6.3 WiFi: 802.11 Wireless LANs -- 6.3.1 The 802.11 Architecture -- 6.3.2 The 802.11 MAC Protocol -- 6.3.3 The IEEE 802.11 Frame -- 6.3.4 Mobility in the Same IP Subnet -- 6.3.5 Advanced Features in 802.11 -- 6.3.6 Beyond 802.11: Bluetooth and WiMAX -- 6.4 Cellular Internet Access -- 6.4.1 An Overview of Cellular Architecture -- 6.5 Mobility Management: Principles -- 6.5.1 Addressing -- 6.5.2 Routing to a Mobile Node -- 6.6 Mobile IP -- 6.7 Managing Mobility in Cellular Networks -- 6.7.1 Routing Calls to a Mobile User -- 6.7.2 Handoffs in GSM -- 6.8 Wireless and Mobility: Impact on Higher-layer Protocols -- 6.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Charlie Perkins -- Chapter 7 Multimedia Networking -- 7.1 Multimedia Networking Applications -- 7.1.1 Examples of Multimedia Applications -- 7.1.2 Hurdles for Multimedia in Today's Internet. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 7.1.3 How Should the Internet Evolve to Support Multimedia Better? -- 7.1.4 Audio and Video Compression -- 7.2 Streaming Stored Audio and Video -- 7.2.1 Accessing Audio and Video Through a Web Server -- 7.2.2 Sending Multimedia from a Streaming Server to a Helper Application -- 7.2.3 Real-Time Streaming Protocol (RTSP) -- 7.3 Making the Best of the Best-Effort Service -- 7.3.1 The Limitations of a Best-Effort Service -- 7.3.2 Removing Jitter at the Receiver for Audio -- 7.3.3 Recovering from Packet Loss -- 7.3.4 Distributing Multimedia in Today's Internet: Content Distribution Networks -- 7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service -- 7.4 Protocols for Real-Time Interactive Applications -- 7.4.1 RTP -- 7.4.2 RTP Control Protocol (RTCP) -- 7.4.3 SIP -- 7.4.4 H.323 -- 7.5 Providing Multiple Classes of Service -- 7.5.1 Motivating Scenarios -- 7.5.2 Scheduling and Policing Mechanisms -- 7.5.3 Diffserv -- 7.6 Providing Quality of Service Guarantees -- 7.6.1 A Motivating Example -- 7.6.2 Resource Reservation, Call Admission, Call Setup -- 7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP -- 7.7 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Interview: Henning Schulzrinne -- Chapter 8 Security in Computer Networks -- 8.1 What Is Network Security? -- 8.2 Principles of Cryptography -- 8.2.1 Symmetric Key Cryptography -- 8.2.2 Public Key Encryption -- 8.3 Message Integrity and End-Point Authentication -- 8.3.1 Cryptographic Hash Functions -- 8.3.2 Message Authentication Code -- 8.3.3 Digital Signatures -- 8.3.4 End-Point Authentication -- 8.4 Securing E-mail -- 8.4.1 Secure E-mail -- 8.4.2 PGP -- 8.5 Securing TCP Connections: SSL -- 8.5.1 The Big Picture -- 8.5.2 A More Complete Picture -- 8.6 Network-Layer Security: IPsec and Virtual Private Networks. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 8.6.1 IPsec and Virtual Private Networks (VPNs). |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ross, Keith W. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Kurose, James F. |
Title | Computer Networking: A Top-Down Approach |
Place, publisher, and date of publication | : Pearson India,c2009 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126474">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126474</a> |
Public note | Click to View |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Online access | CENTRAL LIBRARY | Digital Library | Digital Library | 05/01/2019 | 004.6 KUR-C5 | E0110 | 05/01/2019 | 05/01/2019 | E- Books |