Computer Networking: A Top-down Approach Featuring the Internet / Edition 3

Computer Networking: A Top-down Approach Featuring the Internet / Edition 3

by James Kurose, Keith Ross
     
 

ISBN-10: 0321227352

ISBN-13: 9780321227355

Pub. Date: 05/13/2004

Publisher: Pearson

Computer Networking provides a top-down approach to this study by beginning with applications-level protocols and then working down the protocol stack. Focuses on a specific motivating example of a network-the Internet-as well as introducing students to protocols in a more theoretical context. New short "interlude" on "putting it all together

Overview

Computer Networking provides a top-down approach to this study by beginning with applications-level protocols and then working down the protocol stack. Focuses on a specific motivating example of a network-the Internet-as well as introducing students to protocols in a more theoretical context. New short "interlude" on "putting it all together" that follows the coverage of application, transport, network, and datalink layers ties together the various components of the Internet architecture and identifying aspects of the architecture that have made the Internet so successful. A new chapter covers wireless and mobile networking, including in-depth coverage of Wi-Fi, Mobile IP and GSM. Also included is expanded coverage on BGP, wireless security and DNS. This book is designed for readers who need to learn the fundamentals of computer networking. It also has extensive material, on the very latest technology, making it of great interest to networking professionals.

Product Details

ISBN-13:
9780321227355
Publisher:
Pearson
Publication date:
05/13/2004
Edition description:
Older Edition
Pages:
848
Product dimensions:
7.60(w) x 9.20(h) x 1.50(d)

Table of Contents

Chapter 1Computer Networks and the Internet1
1.1What Is the Internet?2
1.2The Network Edge9
1.3The Network Core14
1.4Access Networks and Physical Media24
1.5ISPs and Internet Backbones34
1.6Delay and Loss in Packet-Switched Networks37
1.7Protocol Layers and Their Service Models44
1.8History of Computer Networking and the Internet52
1.9Summary59
Interview: Leonard Kleinrock71
Chapter 2Application Layer73
2.1Principles of Network Applications74
2.2The Web and HTTP87
2.3File Transfer: FTP106
2.4Electronic Mail in the Internet109
2.5DNS--The Internet's Directory Service123
2.6P2P File Sharing136
2.7Socket Programming with TCP146
2.8Socket Programming with UDP156
2.9Building a Simple Web Server164
2.10Summary169
Interview: Tim Berners-Lee181
Chapter 3Transport Layer183
3.1Introduction and Transport-Layer Services184
3.2Multiplexing and Demultiplexing189
3.3Connectionless Transport: UDP196
3.4Principles of Reliable Data Transfer201
3.5Connection-Oriented Transport: TCP228
3.6Principles of Congestion Control254
3.7TCP Congestion Control264
3.8Summary284
Interview: Sally Floyd297
Chapter 4The Network Layer299
4.1Introduction300
4.2Virtual Circuit and Datagram Networks307
4.3What's Inside a Router?314
4.4The Internet Protocol (IP): Forwarding and Addressing in the Internet323
4.5Routing Algorithms351
4.6Routing in the Internet370
4.7Broadcast and Multicast Routing384
4.8Summary399
Interview: Vinton G. Cerf414
Chapter 5The Link Layer and Local Area Networks417
5.1Link Layer: Introduction and Services419
5.2Error-Detection and -Correction Techniques423
5.3Multiple Access Protocols430
5.4Link-Layer Addressing445
5.5Ethernet455
5.6Interconnections: Hubs and Switches465
5.7PPP: The Point-to-Point Protocol477
5.8Link Virtualization: A Network as a Link Layer482
5.9Summary491
Interview: Simon S. Lam500
Chapter 6Wireless and Mobile Networks503
6.1Introduction504
6.2Wireless Links and Network Characteristics508
6.3Wi-Fi: 802.11 Wireless LANs513
6.4Cellular Internet Access529
6.5Mobility Management: Principles536
6.6Mobile IP546
6.7Managing Mobility in Cellular Networks551
6.8Wireless and Mobility: Impact on Higher-layer Protocols556
6.9Summary559
Interview: Charlie Perkins563
Chapter 7Multimedia Networking565
7.1Multimedia Networking Applications566
7.2Streaming Stored Audio and Video574
7.3Making the Best of the Best-Effort Service: An Internet Phone Example584
7.4Protocols for Real-Time Interactive Applications594
7.5Distributing Multimedia: Content Distribution Networks610
7.6Beyond Best Effort614
7.7Scheduling and Policing Mechanisms620
7.8Integrated Services and Differentiated Services628
7.9RSVP636
7.10Summary643
Interview: Henning Schulzrinne651
Chapter 8Security in Computer Networks653
8.1What Is Network Security?654
8.2Principles of Cryptography657
8.3Authentication670
8.4Integrity678
8.5Key Distribution and Certification684
8.6Access Control: Firewalls691
8.7Attacks and Countermeasures697
8.8Security in Many Layers: Case Studies702
8.9Summary721
Interview: Steven M. Bellovin726
Chapter 9Network Management729
9.1What Is Network Management?730
9.2The Infrastructure for Network Management734
9.3The Internet-Standard Management Framework738
9.4ASN.1753
9.5Conclusion757
Interview: Jeff Case761
References763
Index797

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >