Computer networks (Record no. 1605)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 11765nam a22001577a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788177581652 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Tanenbaum, Andrew S. |
245 ## - TITLE STATEMENT | |
Title | Computer networks |
Statement of responsibility, etc. | Andrew S. Tanenbaum |
250 ## - EDITION STATEMENT | |
Edition statement | 4th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Pearson Education,Inc , |
Date of publication, distribution, etc. | 2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 891p. ill. : |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1 INTRODUCTION<br/>1.1 USES OF COMPUTER NETWORKS<br/>1.1.1 Business Applications<br/>1.1.2 Home Applications<br/>1.1.3 Mobile Users<br/>1.1.4 Social Issues<br/>1.2 NETWORK HARDWARE<br/>1.2.1 Local Area Networks<br/>1.2.2 Metropolitan Area Networks i<br/>1.2.3 Wide Area Networks<br/>1.2.4 Wireless Networks<br/>1.2.5 Home Networks<br/>1.2.6 Internetworks<br/>1.3 NETWORK SOFTWARE<br/>1.3.1 Protocol Hierarchies :<br/>1.3.2 Design Issues for the Layers<br/>1.3.3 Connection-Oriented and Connectionless Services<br/>1.3.4 Service Primitives<br/>1.3.5 The Relationship of Services to Protocols<br/>1.4 REFERENCE MODELS 37<br/>1.4.1 The OSl Reference Model 37<br/>1.4.2 The TCP/IP Reference Model 41<br/>1.4.3 A Comparison of the OSl and TCP/IP Reference Models 44<br/>1.4.4 A Critique of the OSl Model and Protocols 46<br/>1.4.5 A Critique of the TCP/IP Reference Model 48<br/>1.5 EXAMPLE NETWORKS 49<br/>1.5.1 The Internet 50<br/>1.5.2 Connection-Oriented Networks: X.25, Frame Relay, and ATM 59<br/>1.5.3 Ethernet 65<br/>1.5.4 Wireless LANs: 802.11 68<br/>1.6 NETWORK STANDARDIZATION 71<br/>1.6.1 Who's Who in the Telecommunications World 71<br/>1.6.2 Who's Who in the International Standards World 74<br/>1.6.3 Who's Who in the Internet Standards World 75<br/>1.7 METRIC UNITS 77<br/>1.8 OUTLINE OF THE REST OF THE BOOK 78<br/>1.9 SUMMARY 79<br/>2 THE PHYSICAL LAYER<br/>2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION<br/>2.1.1 Fourier Analysis 86<br/>2.1.2 Bandwidth-Limited Signals 86<br/>2.1.3 The Maximum Data Rate of a Channel 89<br/>2.2 GUIDED TRANSMISSION MEDIA 90<br/>2.2.1 Magnetic Media 90<br/>2.2.2 Twisted Pair 91<br/>2.2.3 Coaxial Cable 92<br/>2.2.4 Fiber Optics 93<br/>2.3 WIRELESS TRAI^SMISSION 100<br/>2.3.1 The Electromagnetic Spectrum 100<br/>2.3.2 Radio Transmission 103<br/>2.3.3 Microwave Transmission 104<br/>2.3.4 Infrared and Millimeter Waves 106<br/>2.3.5 Lightwave Transmission 107<br/>2.4 COMMUNICATION SATELLITES 109<br/>2.4.1 Geostationary Satellites 109<br/>2.4.2 Medium-Earth Orbit Satellites 113<br/>2.4.3 Low-Earth Orbit Satellites 114<br/>2.4.4 Satellites versus Fiber 117<br/>2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK 118<br/>2.5.1 Structure of the Telephone System 119<br/>2.5.2 The Politics of Telephones 122<br/>2.5.3 The Local Loop: Modems, ADSL, and Wireless 124<br/>2.5.4 Trunks and Multiplexing 137<br/>2.5.5 Switching 146<br/>2.6 THE MOBILE TELEPHONE SYSTEM 152<br/>2.6.1 First-Generation Mobile Phones: Analog Voice 153<br/>2.6.2 Second-Generation Mobile Phones: Digital Voice 157<br/>2.6.3 Third-Generation Mobile Phones: Digital Voice and Data 166<br/>2.7 CABLE TELEVISION 169<br/>2.7.1 Community Antenna Television 169 /<br/>2.7.2 Internet over Cable 170<br/>2.7.3 Spectrum Allocation 172<br/>2.7.4 Cable Modems 173<br/>2.7.5 ADSL versus Cable 175<br/>2.8 SUMMARY 177<br/>3 THE DATA LIHK LAYER<br/>3.1 DATA LINK LAYER DESIGN ISSUES 184<br/>3.1.1 Services Provided to the Network Layer 184<br/>3.1.2 Framing 187<br/>3.1.3 Error Control 191<br/>3.1.4 Flow Control 192<br/>3.2 ERROR DETECTION AND CORRECTION 192<br/>3.2.1 Error-Correcting Codes 193<br/>3.2.2 Error-Detecting Codes 196<br/>3.3 ELEMENTARY DATA LINK PROTOCOLS 200<br/>3.3.1 An Unrestricted Simplex Protocol 204<br/>3.3.2 A Simplex Stop-and-Wait Protocol 206<br/>3.3.3 A Simplex Protocol for a Noisy Channel 208<br/>3.4 SLIDING WINDOW PROTOCOLS 211<br/>3.4.1 A One-Bit Sliding Window Protocol 214<br/>3.4.2 A Protocol Using Go Back N 216<br/>3.4.3 A Protocol Using Selective Repeat 223<br/>3.5 PROTOCOL VERIFICATION 229<br/>3.5.1 Finite State Machine Models 229<br/>3.5.2 Petri Net Models 232<br/>3.6 EXAMPLE DATA LINK PROTOCOLS 234<br/>3.6.1 HDLC—High-Level Data Link Control 234<br/>3.6.2 The Data Link Layer in the Internet 237<br/>3.7 SUMMARY 242<br/>4 THE MEDIUM ACCESS CONTROL SUBLAYER<br/>4.1 THE CHANNEL ALLOCATION PROBLEM 248<br/>4.1.1 Static Channel Allocation in LANs and MANs 248<br/>4.1.2 Dynamic Channel Allocation in LANs and MANs 249<br/>4.2 MULTIPLE ACCESS PROTOCOLS 251<br/>4.2.1 ALOHA 251<br/>4.2.2 Carrier Sense Multiple Access Protocols 255<br/>4.2.3 Collision-Free Protocols 259<br/>4.2.4 Limited-Contention Protocols 261<br/>4.2.5 Wavelength Division Multiple Access Protocols 265<br/>4.2.6 Wireless LAN Protocols 267<br/>4.3 ETHERNET 271<br/>4.3.1 Ethernet Cabling 271<br/>4.3.2 Manchester Encoding 274<br/>4.3.3 The Ethernet MAC Sublayer Protocol 275<br/>4.3.4 The Binary Exponential Backoff Algorithm 278<br/>4.3.5 Ethernet Performance 279<br/>4.3.6 Switched Ethernet 281<br/>4.3.7 Fast Ethernet 283<br/>4.3.8 Gigabit Ethernet 286<br/>4.3.9 IEEE 802.2: Logical Link Control 290<br/>4.3.10 Retrospective on Ethernet 291<br/>4.4 WIRELESS LANS 292<br/>4.4.1 The 802.11 Protocol Stack 292<br/>4.4.2 The 802.11 Physical Layer 293<br/>4.4.3 The 802.11 MAC Sublayer Protocol 295<br/>4.4.4 The 802.11 Frame Structure 299<br/>4.4.5 Services 3-1<br/>4.5 BROADBAND WIRELESS 302<br/>4.5.1 Comparison of 802.11 with 802.16 303<br/>4.5.2 The 802.16 Protocol Stack 305<br/>4.5.3 The 802.16 Physical Layer 306<br/>4.5.4 The 802.16 MAC Sublayer Protocol 307<br/>4.5.5 The 802.16 Frame Structure 309<br/>4.6 BLUETOOTH 310<br/>4.6.1 Bluetooth Architecture 311<br/>4.6.2 Bluetooth Applications 312<br/>4.6.3 The Bluetooth Protocol Stack 313<br/>4.6.4 The Bluetooth Radio Layer 315<br/>4.6.5 The Bluetooth Baseband Layer 315<br/>4.6.6 The Bluetooth L2CAP Layer 316<br/>4.6.7 The Bluetooth Frame Structure 316<br/>4.7 DATA LINK LAYER SWITCHING 318<br/>4.7.1 Bridges from 802.x to 802.y 320<br/>4.7.2 Local Internetworking 322<br/>4.7.3 Spanning Tree Bridges 324<br/>4.7.4 Remote Bridges 325<br/>4.7.5 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways<br/>4.7.6 Virtual LANs 329<br/>5 THE NETWORK LAYER<br/>5.1 NETWORK LAYER DESIGN ISSUES 343<br/>5.1.1 Store-and-Forward Packet Switching 344<br/>5.1.2 Services Provided to the Transport Layer 344<br/>5.1.3 Implementation of Connectionless Service 345<br/>5.1.4 Implementation of Connection-Oriented Service 347<br/>5.1.5 Comparison of Virtual-Circuit and Datagram Subnets 348<br/>5.2 ROUTING ALGORITHMS 350<br/>5.2.1 The Optimality Principle 352<br/>5.2.2 Shortest Path Routing 353<br/>5.2.3 Flooding 355<br/>5.2.4 Distance Vector Routing 357<br/>5.2.5 Link State Routing 360<br/>5.2.6 Hierarchical Routing 366<br/>5.2.7 Broadcast Routing 368<br/>5.2.8 Multicast Routing 370<br/>5.2.9 Routing for Mobile Hosts 372<br/>5.2.10 Routing in Ad Hoc Networks 373<br/>5.2.11 Node Lookup in Peer-to-Peer Networks 380<br/>5.3 CONGESTION CONTROL ALGORITHMS 384<br/>5.3.1 General Principles of Congestion Control 386<br/>5.3.2 Congestion Prevention Policies 388<br/>5.3.3 Congestion Control in Virtual-Circuit Subnets 389<br/>5.3.4 Congestion Control in Datagram Subnets 391<br/>5.3.5 Load Shedding 394<br/>5.3.6 Jitter Control 395<br/>5.4 QUALITY OF SERVICE 397<br/>5.4.1 Requirements 397<br/>5.4.2 Techniques for Achieving Good Quality of Service 398<br/>5.4.3 Integrated Services 409<br/>5.4.4 Differentiated Services 412<br/>5.4.5 Label Switching and MPLS 415<br/>5.5 INTERNETWORKING 418<br/>5.5.1 How Networks Differ 419<br/>5.5.2 How Networks Can Be Connected 420<br/>5.5.3 Concatenated Virtual Circuits 422<br/>5.5.4 Connectionless Internetworking 423<br/>5.5.5 Tunneling 425<br/>5.5.6 Internetwork Routing 426<br/>5.5.7 Fragmentation 427<br/>5.6 THE NETWORK LAYER IN THE INTERNET- 431<br/>5.6.1 The IP Protocol 433<br/>5.6.2 IP Addresses 436<br/>5.6.3 Internet Control Protocols 449<br/>5.6.4 OSPF—The Interior Gateway Routing Protocol 454<br/>5.6.5 BOP—^The Exterior Gateway Routing Protocol 459<br/>5.6.6 Internet Multicasting 461<br/>5.6J Mobile IP 462<br/>5.6.8 IPv6 464<br/>5.7 SUMMARY 473<br/>6 THE TRANSPORT LAYER<br/>6.1 THE TRANSPORT SERVICE 481<br/>6.1.1 Services Provided to the Upper Layers 481<br/>6.1.2 Transport Service Primitives 483<br/>6.1.3 Berkeley Sockets 487<br/>6.1.4 An Example of Socket Programming: An Internet File Server 488<br/>6.2 ELEMENTS OF TRANSPORT PROTOCOLS 492<br/>6.2.1 Addressing 493<br/>6.2.2 Connection Establishment 496<br/>6.2.3 Connection Release 502<br/>6.2.4 Flow Control and Buffering 506<br/>6.2.5 Multiplexing 510<br/>6.2.6 Crash Recovery 511<br/>6.3 A SIMPLE TRANSPORT PROTOCOL 513<br/>6.3.1 The Example Service Primitives 513<br/>6.3.2 The Example Transport Entity 515<br/>6.3.3 The Example as a Finite State Machine 522<br/>6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP 524<br/>6.4.1 Introduction to UDP 525<br/>6.4.2 Remote Procedure Call 526<br/>6.4.3 The Real-Time Transport Protocol 529<br/>XIV<br/>6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP 532<br/>6.5.1 Introduction to TCP 532<br/>6.5.2 The TCP Service Model 533<br/>6.5.3 The TCP Protocol 535<br/>6.5.4 The TCP Segment Header 536<br/>6.5.5 TCP Connection Establishment 539<br/>6.5.6 TCP Connection Release 541<br/>6.5.7 Modeling TCP Connection Management 541<br/>6.5.8 TCP Transmission Policy 543<br/>6.5.9 TCP Congestion Control 547<br/>6.5.10 TCP Timer Management 550<br/>6.5.11 Wireless TCP and UDP 553<br/>6.5.12 Transactional TCP 555<br/>6.6 PERFORMANCE ISSUES 557<br/>6.6.1 Performance Problems in Computer Networks 557<br/>6.6.2 Network Performance Measurement 560<br/>6.6.3 System Design for Better Performance 562<br/>6.6.4 Fast TPDU Processing 566<br/>6.6.5 Protocols for Gigabit Networks 569<br/>6.7 SUMMARY 573<br/>7 THE APPLICATION LAYER<br/>7.1 DNS—THE DOMAIN NAME SYSTEM 579<br/>7.1.1 The DNS Name Space 580<br/>7.1.2 Resource Records 582<br/>7.1.3 Name Servers 586<br/>7.2 ELECTRONIC MAIL 588<br/>7.2.1 Architecture and Services 59.0<br/>7.2.2 The User Agent 591<br/>7.2.3 Message Formats 594<br/>7.2.4 Message Transfer 602<br/>7.2.5 Final Delivery 605<br/>7.3 THE WORLD WIDE WEB 611<br/>7.3.1 Architectural Overview" 612<br/>7.3.2 Static Web Documents 629<br/>7.3.3 Dynamic Web Documents 643<br/>7.3.4 HTTP—The HyperText Transfer Protocol 651<br/>7.3.5 Performance Enhancements 656<br/>7.3.6 The Wireless Web 662<br/>7.4 MULTIMEDIA 674<br/>7.4.1 Introduction to Digital Audio 674<br/>7.4.2 Audio Compression 676<br/>7.4.3 Streaming Audio 679<br/>7.4.4 Internet Radio 683<br/>7.4.5 Voice over IP 685<br/>7.4.6 Introduction to Video 692<br/>7.4.7 Video Compression 696<br/>7.4.8 Video on Demand 704<br/>7.4.9 The MBone—The Multicast Backbone 711<br/>7.5 SUMMARY 714<br/>8 NETWORK SECURITY<br/>8.1 CRYPTOGRAPHY 724<br/>8.1.1 Introduction to Cryptography 725<br/>8.1.2 Substitution Ciphers 727<br/>8.1.3 Transposition Ciphers 729<br/>8.1.4 One-Time Pads 730<br/>8.1.5 Two Fundamental Cryptographic Principles 735<br/>8.2 SYMMETRIC-KEY ALGORITHMS 737<br/>8.2.1 DES—The Data Encryption Standard 738<br/>8.2.2 AES—The Advanced Encryption Standard 741<br/>8.2.3 Cipher Modes 745<br/>8.2.4 Other Ciphers 750<br/>8.2.5 Cryptanalysis 750<br/>8.3 PUBLIC-KEY ALGORITHMS 752<br/>8.3.1 RSA 753<br/>8.3.2 Other Public-Key Algorithms 755<br/>8.4 DIGITAL SIGNATURES 755<br/>8.4.1 Symmetric-Key Signatures 756<br/>8.4.2 Public-Key Signatures 757<br/>8.4.3 Message Digests 759<br/>8.4.4 The Birthday Attack 763<br/>8.5 MANAGEMENT OF PUBLIC KEYS 765<br/>8.5.1 Certificates 765<br/>8.5.2 X.509 767<br/>8.5.3 Public Key Infrastructures 768<br/>8.6 COMMUNICATION SECURITY 772<br/>8.6.1 IPsec 772<br/>8.6.2 Firewalls 776<br/>8.6.3 Virtual Private Networks 779<br/>8.6.4 Wireless Security 780<br/>8.7 AUTHENTICATION PROTOCOLS 785<br/>8.7.1 Authentication Based on a Shared Secret Key 786<br/>8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange 19<br/>8.7.3 Authentication Using a Key Distribution Center 793<br/>8.7.4 Authentication Using Kerberos 796<br/>8.7.5 Authentication Using Public-Key Cryptography 798<br/>8.8 E-MAIL SECURITY 799<br/>8.8.1 PGP—Pretty Good Privacy 799<br/>8.8.2 PEM—^Privacy Enhanced Mail 803<br/>8.8.3 S/MIME 804<br/>8.9 WEB SECURITY 805<br/>8.9.1 Threats 8-5<br/>8.9.2 Secure Naming 806<br/>8.9.3 SSL—^The Secure Sockets Layer 813<br/>8.9.4 Mobile Code Security 816<br/>8.10 SOCIAL ISSUES 819<br/>8.10.1 Privacy 819<br/>8.10.2 Freedom of Speech 922<br/>8.10.3 Copyright 826<br/>9 READING LIST AND BIBLIOGRAPHY<br/>9.1 SUGGESTIONS FOR FURTHER READING 835<br/>9.1.1 Introduction and General Works 836<br/>9.1.2 The Physical Layer 838<br/>9.1.3 The Data Link Layer 840<br/>9.1.4 The Medium Access Control Sublayer 840<br/>9.1.5 The Network Layer 842<br/>9.1.6 The Transport Layer 844<br/>9.1.7 The Application Layer 844<br/>9.1.8 Network Security 846 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 31/05/2016 | 004.6 TAN/C | P21218 | 20/03/2023 | 09/03/2023 | General Books |