000 | 10606nam a22003973i 4500 | ||
---|---|---|---|
999 |
_c25587 _d25587 |
||
001 | EBC5126474 | ||
003 | MiAaPQ | ||
005 | 20190105114322.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 181231s2009 xx o ||||0 eng d | ||
020 |
_a9788131739297 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC5126474 | ||
035 | _a(Au-PeEL)EBL5126474 | ||
035 | _a(CaONFJC)MIL269302 | ||
035 | _a(OCoLC)1024279036 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
082 |
_223rd _a004.6 |
||
100 | 1 | _aKurose, James F. | |
245 | 1 | 0 | _aComputer Networking. |
250 | _a5th ed. | ||
300 | _a1 online resource (889 pages) | ||
505 | 0 | _aCover -- Table of Contents -- Chapter 1 Computer Networks and the Internet -- 1.1 What Is the Internet? -- 1.1.1 A Nuts-and-Bolts Description -- 1.1.2 A Services Description -- 1.1.3 What Is a Protocol? -- 1.2 The Network Edge -- 1.2.1 Client and Server Programs -- 1.2.2 Access Networks -- 1.2.3 Physical Media -- 1.3 The Network Core -- 1.3.1 Circuit Switching and Packet Switching -- 1.3.2 How Do Packets Make Their Way Through Packet-Switched Networks? -- 1.3.3 ISPs and Internet Backbones -- 1.4 Delay, Loss, and Throughput in Packet-Switched Networks -- 1.4.1 Overview of Delay in Packet-Switched Networks -- 1.4.2 Queuing Delay and Packet Loss -- 1.4.3 End-to-End Delay -- 1.4.4 Throughput in Computer Networks -- 1.5 Protocol Layers and Their Service Models -- 1.5.1 Layered Architecture -- 1.5.2 Messages, Segments, Datagrams, and Frames -- 1.6 Networks Under Attack -- 1.7 History of Computer Networking and the Internet -- 1.7.1 The Development of Packet Switching: 1961-1972 -- 1.7.2 Proprietary Networks and Internetworking: 1972-1980 -- 1.7.3 A Proliferation of Networks: 1980-1990 -- 1.7.4 The Internet Explosion: The 1990s -- 1.7.5 Recent Developments -- 1.8 Summary -- Road-Mapping This Book -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Chapter 2 Application Layer -- 2.1 Principles of Network Applications -- 2.1.1 Network Application Architectures -- 2.1.2 Processes Communicating -- 2.1.3 Transport Services Available to Applications -- 2.1.4 Transport Services Provided by the Internet -- 2.1.5 Application-Layer Protocols -- 2.1.6 Network Applications Covered in This Book -- 2.2 The Web and HTTP -- 2.2.1 Overview of HTTP -- 2.2.2 Non-Persistent and Persistent Connections -- 2.2.3 HTTP Message Format -- 2.2.4 User-Server Interaction: Cookies -- 2.2.5 Web Caching. | |
505 | 8 | _a2.2.6 The Conditional GET -- 2.3 File Transfer: FTP -- 2.3.1 FTP Commands and Replies -- 2.4 Electronic Mail in the Internet -- 2.4.1 SMTP -- 2.4.2 Comparison with HTTP -- 2.4.3 Mail Message Formats -- 2.4.4 Mail Access Protocols -- 2.5 DNS-The Internet's Directory Service -- 2.5.1 Services Provided by DNS -- 2.5.2 Overview of How DNS Works -- 2.5.3 DNS Records and Messages -- 2.6 Peer-to-Peer Applications -- 2.6.1 P2P File Distribution -- 2.6.2 Distributed Hash Tables (DHTs) -- 2.6.3 Case Study: P2P Internet Telephony with Skype -- 2.7 Socket Programming with TCP -- 2.7.1 Socket Programming with TCP -- 2.7.2 An Example Client-Server Application in Java -- 2.8 Socket Programming with UDP -- 2.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Socket Programming Assignments -- Wireshark Labs -- Interview: Bram Cohen -- Chapter 3 Transport Layer -- 3.1 Introduction and Transport-Layer Services -- 3.1.1 Relationship Between Transport and Network Layers -- 3.1.2 Overview of the Transport Layer in the Internet -- 3.2 Multiplexing and Demultiplexing -- 3.3 Connectionless Transport: UDP -- 3.3.1 UDP Segment Structure -- 3.3.2 UDP Checksum -- 3.4 Principles of Reliable Data Transfer -- 3.4.1 Building a Reliable Data Transfer Protocol -- 3.4.2 Pipelined Reliable Data Transfer Protocols -- 3.4.3 Go-Back-N (GBN) -- 3.4.4 Selective Repeat (SR) -- 3.5 Connection-Oriented Transport: TCP -- 3.5.1 The TCP Connection -- 3.5.2 TCP Segment Structure -- 3.5.3 Round-Trip Time Estimation and Timeout -- 3.5.4 Reliable Data Transfer -- 3.5.5 Flow Control -- 3.5.6 TCP Connection Management -- 3.6 Principles of Congestion Control -- 3.6.1 The Causes and the Costs of Congestion -- 3.6.2 Approaches to Congestion Control -- 3.6.3 Network-Assisted Congestion-Control Example: ATM ABR Congestion Control -- 3.7 TCP Congestion Control. | |
505 | 8 | _a3.7.1 Fairness -- 3.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignments -- Wireshark Lab: Exploring TCP -- Interview: Sally Floyd -- Chapter 4 The Network Layer -- 4.1 Introduction -- 4.1.1 Forwarding and Routing -- 4.1.2 Network Service Models -- 4.2 Virtual Circuit and Datagram Networks -- 4.2.1 Virtual-Circuit Networks -- 4.2.2 Datagram Networks -- 4.2.3 Origins of VC and Datagram Networks -- 4.3 What's Inside a Router? -- 4.3.1 Input Ports -- 4.3.2 Switching Fabric -- 4.3.3 Output Ports -- 4.3.4 Where Does Queuing Occur? -- 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet -- 4.4.1 Datagram Format -- 4.4.2 IPv4 Addressing -- 4.4.3 Internet Control Message Protocol (ICMP) -- 4.4.4 IPv6 -- 4.4.5 A Brief Foray into IP Security -- 4.5 Routing Algorithms -- 4.5.1 The Link-State (LS) Routing Algorithm -- 4.5.2 The Distance-Vector (DV) Routing Algorithm -- 4.5.3 Hierarchical Routing -- 4.6 Routing in the Internet -- 4.6.1 Intra-AS Routing in the Internet: RIP -- 4.6.2 Intra-AS Routing in the Internet: OSPF -- 4.6.3 Inter-AS Routing: BGP -- 4.7 Broadcast and Multicast Routing -- 4.7.1 Broadcast Routing Algorithms -- 4.7.2 Multicast -- 4.8 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Wireshark Labs -- Interview: Vinton G. Cerf -- Chapter 5 The Link Layer and Local Area Networks -- 5.1 Link Layer: Introduction and Services -- 5.1.1 The Services Provided by the Link Layer -- 5.1.2 Where Is the Link Layer Implemented? -- 5.2 Error-Detection and -Correction Techniques -- 5.2.1 Parity Checks -- 5.2.2 Checksumming Methods -- 5.2.3 Cyclic Redundancy Check (CRC) -- 5.3 Multiple Access Protocols -- 5.3.1 Channel Partitioning Protocols -- 5.3.2 Random Access Protocols -- 5.3.3 Taking-Turns Protocols. | |
505 | 8 | _a5.3.4 Local Area Networks (LANs) -- 5.4 Link-Layer Addressing -- 5.4.1 MAC Addresses -- 5.4.2 Address Resolution Protocol (ARP) -- 5.5 Ethernet -- 5.5.1 Ethernet Frame Structure -- 5.5.2 CSMA/CD: Ethernet's Multiple Access Protocol -- 5.5.3 Ethernet Technologies -- 5.6 Link-Layer Switches -- 5.6.1 Forwarding and Filtering -- 5.6.2 Self-Learning -- 5.6.3 Properties of Link-Layer Switching -- 5.6.4 Switches Versus Routers -- 5.6.5 Virtual Local Area Networks (VLANs) -- 5.7 PPP: The Point-to-Point Protocol -- 5.7.1 PPP Data Framing -- 5.8 Link Virtualization: A Network as a Link Layer -- 5.9 A Day in the Life of a Web Page Request -- 5.10 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Simon S. Lam -- Chapter 6 Wireless and Mobile Networks -- 6.1 Introduction -- 6.2 Wireless Links and Network Characteristics -- 6.2.1 CDMA -- 6.3 WiFi: 802.11 Wireless LANs -- 6.3.1 The 802.11 Architecture -- 6.3.2 The 802.11 MAC Protocol -- 6.3.3 The IEEE 802.11 Frame -- 6.3.4 Mobility in the Same IP Subnet -- 6.3.5 Advanced Features in 802.11 -- 6.3.6 Beyond 802.11: Bluetooth and WiMAX -- 6.4 Cellular Internet Access -- 6.4.1 An Overview of Cellular Architecture -- 6.5 Mobility Management: Principles -- 6.5.1 Addressing -- 6.5.2 Routing to a Mobile Node -- 6.6 Mobile IP -- 6.7 Managing Mobility in Cellular Networks -- 6.7.1 Routing Calls to a Mobile User -- 6.7.2 Handoffs in GSM -- 6.8 Wireless and Mobility: Impact on Higher-layer Protocols -- 6.9 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Wireshark Labs -- Interview: Charlie Perkins -- Chapter 7 Multimedia Networking -- 7.1 Multimedia Networking Applications -- 7.1.1 Examples of Multimedia Applications -- 7.1.2 Hurdles for Multimedia in Today's Internet. | |
505 | 8 | _a7.1.3 How Should the Internet Evolve to Support Multimedia Better? -- 7.1.4 Audio and Video Compression -- 7.2 Streaming Stored Audio and Video -- 7.2.1 Accessing Audio and Video Through a Web Server -- 7.2.2 Sending Multimedia from a Streaming Server to a Helper Application -- 7.2.3 Real-Time Streaming Protocol (RTSP) -- 7.3 Making the Best of the Best-Effort Service -- 7.3.1 The Limitations of a Best-Effort Service -- 7.3.2 Removing Jitter at the Receiver for Audio -- 7.3.3 Recovering from Packet Loss -- 7.3.4 Distributing Multimedia in Today's Internet: Content Distribution Networks -- 7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service -- 7.4 Protocols for Real-Time Interactive Applications -- 7.4.1 RTP -- 7.4.2 RTP Control Protocol (RTCP) -- 7.4.3 SIP -- 7.4.4 H.323 -- 7.5 Providing Multiple Classes of Service -- 7.5.1 Motivating Scenarios -- 7.5.2 Scheduling and Policing Mechanisms -- 7.5.3 Diffserv -- 7.6 Providing Quality of Service Guarantees -- 7.6.1 A Motivating Example -- 7.6.2 Resource Reservation, Call Admission, Call Setup -- 7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP -- 7.7 Summary -- Homework Problems and Questions -- Problems -- Discussion Questions -- Programming Assignment -- Interview: Henning Schulzrinne -- Chapter 8 Security in Computer Networks -- 8.1 What Is Network Security? -- 8.2 Principles of Cryptography -- 8.2.1 Symmetric Key Cryptography -- 8.2.2 Public Key Encryption -- 8.3 Message Integrity and End-Point Authentication -- 8.3.1 Cryptographic Hash Functions -- 8.3.2 Message Authentication Code -- 8.3.3 Digital Signatures -- 8.3.4 End-Point Authentication -- 8.4 Securing E-mail -- 8.4.1 Secure E-mail -- 8.4.2 PGP -- 8.5 Securing TCP Connections: SSL -- 8.5.1 The Big Picture -- 8.5.2 A More Complete Picture -- 8.6 Network-Layer Security: IPsec and Virtual Private Networks. | |
505 | 8 | _a8.6.1 IPsec and Virtual Private Networks (VPNs). | |
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | _aElectronic books. | |
700 | 1 | _aRoss, Keith W. | |
776 | 0 | 8 |
_iPrint version: _aKurose, James F. _tComputer Networking: A Top-Down Approach _d : Pearson India,c2009 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126474 _zClick to View |
942 |
_2ddc _cBK |