Computer and Communications Networks. (Record no. 25596)

MARC details
000 -LEADER
fixed length control field 07615nam a22003493i 4500
001 - CONTROL NUMBER
control field EBC5126671
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190105120718.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2006 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131735763
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5126671
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5126671
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL260689
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024233799
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 005.71
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mir.
245 10 - TITLE STATEMENT
Title Computer and Communications Networks.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (650 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Contents -- Preface -- About the Author -- PART I: Fundamental Concepts -- 1 Packet-Switched Networks -- 1.1 Basic Definitions in Data Networks -- 1.2 Types of Packet-Switched Networks -- 1.3 Packet Size and Optimizations -- 1.4 Summary -- 1.5 Exercises -- 2 Foundation of Networking Protocols -- 2.1 5-Layer TCP/IP Model -- 2.2 7-Layer OSI Model -- 2.3 Internet Protocols and Addressing -- 2.4 Equal-Sized Packets Model: ATM -- 2.5 Summary -- 2.6 Exercises -- 3 Networking Devices -- 3.1 Multiplexers -- 3.2 Modems and Internet Access Devices -- 3.3 Switching and Routing Devices -- 3.4 Router Structure -- 3.5 Summary -- 3.6 Exercises -- 4 Data Links and Transmission -- 4.1 Data Links -- 4.2 Wired Links and Transmission -- 4.3 Wireless Links and Transmission -- 4.4 Methods of Channel Access on Links -- 4.5 Error Detection and Correction -- 4.6 Link-Level Flow Control -- 4.7 Summary -- 4.8 Exercises -- 5 Local Area Networks and Networks of LANs -- 5.1 LANs and Basic Topologies -- 5.2 LAN Protocols -- 5.3 MAC and IP Addresses -- 5.4 Classification of MAC Protocols -- 5.5 Contention-Access MAC -- 5.6 Round-Robin-Access MAC -- 5.7 Network of LANs -- 5.8 Summary -- 5.9 Exercises -- 6 Wireless Networks and Mobile IP -- 6.1 Infrastructure of Wireless Networks -- 6.2 Wireless LAN Technologies -- 6.3 IEEE 802.11 Wireless Standard -- 6.4 Cellular Networks -- 6.5 Mobile IP -- 6.6 Wireless Mesh Networks (WMNs) -- 6.7 Summary -- 6.8 Exercises -- 7 Routing and Internetworking -- 7.1 Network-Layer Routing -- 7.2 Least-Cost-Path Algorithms -- 7.3 Non-Least-Cost-Path Routing -- 7.4 Intradomain Routing Protocols -- 7.5 Interdomain Routing Protocols -- 7.6 Congestion Control at Network Layer -- 7.7 Summary -- 7.8 Exercises -- 8 Transport and End-to-End Protocols -- 8.1 Transport Layer -- 8.2 Transmission Control Protocol (TCP) -- 8.3 User Datagram Protocol (UDP).
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8.4 Mobile Transport Protocols -- 8.5 TCP Congestion Control -- 8.6 Summary -- 8.7 Exercises -- 9 Applications and Network Management -- 9.1 Application-Layer Overview -- 9.2 Domain Name System (DNS) -- 9.3 Remote Login Protocols -- 9.4 Electronic Mail (E-mail) -- 9.5 File Transfer and FTP -- 9.6 World Wide Web (WWW) and HTTP -- 9.7 Network Management -- 9.8 Summary -- 9.9 Exercises -- 10 Network Security -- 10.1 Overview of Network Security -- 10.2 Overview of Security Methods -- 10.3 Secret-Key Encryption Protocols -- 10.4 Public-Key Encryption Protocols -- 10.5 Authentication -- 10.6 Authentication and Digital Signature -- 10.7 Security of IP and Wireless Networks -- 10.8 Firewalls -- 10.9 Summary -- 10.10 Exercises -- PART II: Advanced Concepts -- 11 Packet Queues and Delay Analysis -- 11.1 Little's Theorem -- 11.2 Birth-and-Death Process -- 11.3 Queueing Disciplines -- 11.4 Markovian FIFO Queueing Systems -- 11.5 Non-Markovian and Self-Similar Models -- 11.6 Networks of Queues -- 11.7 Summary -- 11.8 Exercises -- 12 Quality of Service and Resource Allocation -- 12.1 Overview of QoS -- 12.2 Integrated Services QoS -- 12.3 Differentiated Services QoS -- 12.4 Resource Allocation -- 12.5 Summary -- 12.6 Exercises -- 13 Networks in Switch Fabrics -- 13.1 Characteristics and Features of Switch Fabrics -- 13.2 Crossbar Switch Fabrics -- 13.3 Blocking Switch Fabrics -- 13.4 Nonblocking Switch Fabrics: Clos Networks -- 13.5 Concentration and Expansion Switches -- 13.6 Shared-Memory Switch Fabrics -- 13.7 Techniques for Improving Performance -- 13.8 Case Study: Multipath Buffered Crossbar -- 13.9 Summary -- 13.10 Exercises -- 14 Optical Networks and WDM Systems -- 14.1 Overview of Optical Networks -- 14.2 Basic Optical Networking Devices -- 14.3 Large-Scale Optical Switches -- 14.4 Optical Routers -- 14.5 Wavelength Allocation in Networks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 14.6 Case Study: An All-Optical Switch -- 14.7 Summary -- 14.8 Exercises -- 15 Multicasting Techniques and Protocols -- 15.1 Basic Definitions and Techniques -- 15.2 Intradomain Multicast Protocols -- 15.3 Interdomain Multicast Protocols -- 15.4 Node-Level Multicast Algorithms -- 15.5 Summary -- 15.6 Exercises -- 16 VPNs, Tunneling, and Overlay Networks -- 16.1 Virtual Private Networks (VPNs) -- 16.2 Multiprotocol Label Switching (MPLS) -- 16.3 Overlay Networks -- 16.4 Summary -- 16.5 Exercises -- 17 Compression of Digital Voice and Video -- 17.1 Overview of Data Compression -- 17.2 Digital Voice and Compression -- 17.3 Still Images and JPEG Compression -- 17.4 Moving Images and MPEG Compression -- 17.5 Limits of Compression with Loss -- 17.6 Compression Methods Without Loss -- 17.7 Case Study: FAX Compression for Transmission -- 17.8 Summary -- 17.9 Exercises -- 18 VoIP and Multimedia Networking -- 18.1 Overview of IP Telephony -- 18.2 VoIP Signaling Protocols -- 18.3 Real-Time Media Transport Protocols -- 18.4 Distributed Multimedia Networking -- 18.5 Stream Control Transmission Protocol (SCTP) -- 18.6 Self-Similarity and Non-Markovian Streaming Analysis -- 18.7 Summary -- 18.8 Exercises -- 19 Mobile Ad-Hoc Networks -- 19.1 Overview of Wireless Ad-Hoc Networks -- 19.2 Routing in Ad-Hoc Networks -- 19.3 Routing Protocols for Ad-Hoc Networks -- 19.4 Security of Ad-Hoc Networks -- 19.5 Summary -- 19.6 Exercises -- 20 Wireless Sensor Networks -- 20.1 Sensor Networks and Protocol Structures -- 20.2 Communication Energy Model -- 20.3 Clustering Protocols -- 20.4 Routing Protocols -- 20.5 Case Study: Simulation of a Sensor Network -- 20.6 Other Related Technologies -- 20.7 Summary -- 20.8 Exercises -- Appendix A: Glossary of Acronyms -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Appendix B: RFCs -- Appendix C: Probabilities and Stochastic Processes -- C.1 Probability Theory -- C.1.1 Bernulli and Binomial Sequential Laws -- C.1.2 Counting and Sampling Methods -- C.2 Random Variables -- C.2.1 Basic Functions -- C.2.2 Conditional Functions -- C.2.3 Popular Random Variables -- C.2.4 Expected Value and Variance -- C.2.5 A Function of Random Variable -- C.3 Multiple Random Variables -- C.3.1 Basic Functions of Two Random Variables -- C.3.2 Two Independent Random Variables -- C.4 Stochastic (Random) Processes -- C.4.1 IID Random Process -- C.4.2 Brownian Motion Random Process -- C.5 Theory of Markov Chains -- C.5.1 Continuous-Time Markov Chains -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Z.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Mir
Title Computer and Communications Networks
Place, publisher, and date of publication Noida : Pearson India,c2006
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126671">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126671</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online access     CENTRAL LIBRARY Digital Library Digital Library 05/01/2019   005.71 MIR-C E0119 05/01/2019 05/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery