Computer networks (Record no. 1607)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 10519nam a22001577a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788177581652 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | TAN/C |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Tanenbaum, Andrew S. |
245 ## - TITLE STATEMENT | |
Title | Computer networks |
Statement of responsibility, etc. | Andrew S. Tanenbaum |
250 ## - EDITION STATEMENT | |
Edition statement | 4th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Pearson Education,Inc , |
Date of publication, distribution, etc. | 2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 891p. ill. : |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1 INTRODUCTION<br/>1.1 USES OF COMPUTER NETWORKS<br/>1.1.1 Business Applications<br/>1.1.2 Home Applications<br/>1.1.3 Mobile Users<br/>1.1.4 Social Issues<br/>1.2 NETWORK HARDWARE<br/>1.2.1 Local Area Networks<br/>1.2.2 Metropolitan Area Networks<br/>1.2.3 Wide Area Networks<br/>1.2.4 Wireless Networks<br/>1.2.5 Home Networks<br/>1.2.6 Internetworks<br/>1.3 NETWORK SOFTWARE<br/>1.3.1 Protocol Hierarchies<br/>1.3.2 Design Issues for the Layers<br/>1.3.3 Connection-Oriented and Connectionless Services<br/>1.3.4 Service Primitives<br/>1.3.5 The Relationship of Services to Protocols<br/>1.4 REFERENCE MODELS<br/>1.4.1 The OSI Reference Model<br/>1.4.2 The TCP/IP Reference Model<br/>1.4.3 A Comparison of the OSI and TCP/IP Reference Models<br/>1.4.4 A Critique of the OSI Model and Protocols<br/>1.4.5 A Critique of the TCP/IP Reference Model<br/>1.5 EXAMPLE NETWORKS<br/>1.5.1 The Internet<br/>1.5.2 Connection-Oriented Networks: X.25, Frame Relay, and ATM<br/>1.5.3 Ethernet<br/>1.5.4 Wireless LANs: 802.11<br/>1.6 NETWORK STANDARDIZATION<br/>1.6.1 Who's Who in the Telecommunications World<br/>1.6.2 Who's Who in the International Standards World<br/>1.6.3 Who's Who in the Internet Standards World<br/>1.7 METRIC UNITS<br/>1.8 OUTLINE OF THE REST OF THE BOOK<br/>2 THE PHYSICAL LAYER<br/>2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION<br/>2.1.1 Fourier Analysis<br/>2.1.2 Bandwidth-Limited Signals<br/>2.1.3 The Maximum Data Rate of a Channel<br/>2.2 GUIDED TRANSMISSION MEDIA<br/>2.2.1 Magnetic Media<br/>2.2.2 Twisted Pair<br/>2.2.3 Coaxial Cable<br/>2.2.4 Fiber Optics<br/>2.3 WIRELESS TRAI^ISMISSION<br/>2.3.1 The Electromagnetic Spectrum<br/>2.3.2 Radio Transmission<br/>2.3.3 Microwave Transmission<br/>2.3.4 Infrared and Millimeter Waves<br/>2.3.5 Lightwave Transmission<br/>2.4 COMMUNICATION SATELLITES<br/>2.4.1 Geostationary Satellites<br/>2.4.2 Medium-Earth Orbit Satellites<br/>2.4.3 Low-Earth Orbit Satellites<br/>2.4.4 Satellites versus Fiber<br/>2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK<br/>2.5.1 Structure of the Telephone System<br/>2.5.2 The Politics of Telephones<br/>2.5.3 The Local Loop: Modems, ADSL, and Wireless<br/>2.5.4 Trunks and Multiplexing<br/>2.5.5 Switching<br/>2.6 THE MOBILE TELEPHONE SYSTEM<br/>2.6.1 First-Generation Mobile Phones: Analog Voice<br/>2.6.2 Second-Generation Mobile Phones: Digital Voice<br/>2.6.3 Third-Generation Mobile Phones: Digital Voice and Data<br/>2.7 CABLE TELEVISION<br/>2.7.1 Community Antenna Television<br/>2.7.2 Internet over Cable<br/>2.7.3 Spectrum Allocation<br/>2.7.4 Cable Modems<br/>2.7.5 ADSL versus Cable<br/>3 THE DATA LINK LAYER<br/>3.1 DATA LINK LAYER DESIGN ISSUES<br/>3.1.1 Services Provided to the Network Layer<br/>3.1.2 Framing<br/>3.1.3 Error Control<br/>3.1.4 Flow Control<br/>3.2 ERROR DETECTION AND CORRECTION<br/>3.2.1 Error-Correcting Codes<br/>3.2 2 Error-Detecting Codes<br/>3.3 ELEMENTARY DATA LINK PROTOCOLS<br/>3.3.1 An Unrestricted Simplex Protocol<br/>3.3.2 A Simplex Stop-and-Wait Protocol<br/>3.3.3 A Simplex Protocol for a Noisy Channel<br/>3.4 SLIDING WINDOW PROTOCOLS<br/>3.4.1 A One-Bit Sliding Window Protocol<br/>3.4.2 A Protocol Using Go Back N<br/>3.4.3 A Protocol Using Selective Repeat<br/>3.5 PROTOCOL VERIFICATION<br/>3.5.1 Finite State Machine Models<br/>3.5.2 Petri Net Models<br/>3.6 EXAMPLE DATA LINK PROTOCOLS<br/>3.6.1 HDLC—High-Level Data Link Control<br/>3.6.2 The Data Link Layer in the Internet<br/>4 THE MEDIUM ACCESS CONTROL SUBLAYER<br/>4.1 THE CHANNEL ALLOCATION PROBLEM<br/>4.1.1 Static Channel Allocation in LANs and MANs<br/>4.1.2 Dynamic Channel Allocation in LANs and MANs<br/>4.2 MULTIPLE ACCESS PROTOCOLS<br/>4.2.1 ALOHA<br/>4.2.2 Carrier Sense Multiple Access Protocols<br/>4.2.3 Collision-Free Protocols<br/>4.2.4 Limited-Contention Protocols<br/>4.2.5 Wavelength Division Multiple Access Protocols<br/>4.2.6 Wireless LAN Protocols<br/>4.3 ETHERNET<br/>4.3.1 Ethernet Cabling<br/>4.3.2 Manchester Encoding<br/>4.3.3 The Ethernet MAC Sublayer Protocol<br/>4.3.4 The Binary Exponential Backoff Algorithm<br/>4.3.5 Ethernet Performance<br/>4.3.6 Switched Ethernet<br/>4.3.7 Fast Ethernet<br/>4.3.8 Gigabit Ethernet<br/>4.3.9 IEEE 802.2: Logical Link Control<br/>4.3.10 Retrospective on Ethernet<br/>4.4 WIRELESS LANS<br/>4.4.1 The 802.11 Protocol Stack<br/>4.4.2 The 802.11 Physical Layer<br/>4.4.3 The 802.11 MAC Sublayer Protocol<br/>4.4.4 The 802.11 Frame Structure<br/>4.4.5 Services<br/>4.5 BROADBAND WIRELESS<br/>4.5.1 Comparison of 802.11 with 802.16<br/>4.5.2 The 802.16 Protocol Stack<br/>4.5.3 The 802.16 Physical Layer<br/>4.5.4 The 802.16 MAC Sublayer Protocol<br/>4.5.5 The 802.16 Frame Structure<br/>4.6 BLUETOOTH<br/>4.6.1 Bluetooth Architecture<br/>4.6.2 Bluetooth Applications<br/>4.6.3 The Bluetooth Protocol Stack<br/>4.6.4 The Bluetooth Radio Layer<br/>4.6.5 The Bluetooth Baseband Layer<br/>4.6.6 The Bluetooth L2CAP Layer<br/>4.6.7 The Bluetooth Frame Structure<br/>4.7 DATA LINK LAYER SWITCHING<br/>4.7.1 Bridges from 802.x to 802.y<br/>4.7.2 Local Internetworking<br/>4.7.3 Spanning Tree Bridges<br/>4.7.4 Remote Bridges<br/>4.7.5 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways<br/>4.7.6 Virtual LANs<br/>5 THE NETWORK LAYER<br/>5.1 NETWORK LAYER DESIGN ISSUES<br/>5.1.1 Store-and-Forward Packet Switching<br/>5.1.2 Services Provided to the Transport Layer<br/>5.1.3 Implementation of Connectionless Service<br/>5.1.4 Implementation of Connection-Oriented Service<br/>5.1.5 Comparison of Virtual-Circuit and Datagram Subnets<br/>5.2 ROUTING ALGORITHMS<br/>5.2.1 The Optimality Principle<br/>5.2.2 Shortest Path Routing<br/>5.2.3 Flooding<br/>5.2.4 Distance Vector Routing<br/>5.2.5 Link State Routing<br/>5.2.6 Hierarchical Routing<br/>5.2.7 Broadcast Routing<br/>5.2.8 Multicast Routing<br/>5.2.9 Routing for Mobile Hosts<br/>5.2.10 Routing in Ad Hoc Networks<br/>5.2.11 Node Lookup in Peer-to-Peer Networks<br/>5.3 CONGESTION CONTROL ALGORITHMS<br/>5.3.1 General Principles of Congestion Control<br/>5.3.2 Congestion Prevention Policies<br/>5.3.3 Congestion Control in Virtual-Circuit Subnets<br/>5.3.4 Congestion Control in Datagram Subnets<br/>5.3.5 Load Shedding<br/>5.3.6 Jitter Control<br/>5.4 QUALITY OF SERVICE<br/>5.4.1 Requirements<br/>5.4.2 Techniques for Achieving CSood Quality of Service<br/>5.4.3 Integrated Services<br/>5.4.4 Differentiated Services<br/>5.4.5 Label Switching and MPLS<br/>5.5 INTERNETWORKING<br/>5.5.1 How Networks Differ<br/>5.5.2 How Networks Can Be Connected<br/>5.5.3 Concatenated Virtual Circuits<br/>5.5.4 Connectionless Internetworking<br/>5.5.5 Tunneling<br/>5.5.6 Internetwork Routing<br/>5.5.7 Fragmentation<br/>5.6 THE NETWORK LAYER IN THE INTERNET<br/>5.6.1 The IP Protocol<br/>5.6.2 IP Addresses<br/>5.6.3 Internet Control Protocols<br/>5.6.4 OSPF—The Interior Gateway Routing Protocol<br/>5.6.5 BOP—The Exterior Gateway Routing Protocol<br/>5.6.6 Internet Multicasting<br/>5.6J Mobile IP<br/>5.6.8 IPv6<br/>6 THE TRANSPORT LAYER<br/>6.1 THE TRANSPORT SERVICE<br/>6.1.1 Services Provided to the Upper Layers<br/>6.1.2 Transport Service Primitives<br/>6.1.3 Berkeley Sockets<br/>6.1.4 An Example of Socket Programming: An Internet File Server<br/>6.2 ELEMENTS OF TRANSPORT PROTOCOLS<br/>6.2.1 Addressing<br/>6.2.2 Connection Establishment<br/>6.2.3 Connection Release<br/>6.2.4 Flow Control and Buffering<br/>6.2.5 Multiplexing<br/>6.2.6 Crash Recovery<br/>6.3 A SIMPLE TRANSPORT PROTOCOL<br/>6.3.1 The Example Service Primitives<br/>6.3.2 The Example Transport Entity<br/>6.3.3 The Example as a Finite State Machine<br/>6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP<br/>6.4.1 Introduction to UDP<br/>6.4.2 Remote Procedure Call<br/>6.4.3 The Real-Time Transport Protocol<br/>6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP<br/>6.5.1 Introduction to TCP<br/>6.5.2 The TCP Service Model<br/>6.5.3 The TCP Protocol<br/>6.5.4 The TCP Segment Header<br/>6.5.5 TCP Connection Establishment<br/>6.5.6 TCP Connection Release<br/>6.5.7 Modeling TCP Connection Management<br/>6.5.8 TCP Transmission Policy<br/>6.5.9 TCP Congestion Control<br/>6.5.10 TCP Timer Management<br/>6.5.11 Wireless TCP and UDP<br/>6.5.12 Transactional TCP<br/>6.6 PERFORMANCE ISSUES<br/>6.6.1 Performance Problems in Computer Networks<br/>6.6.2 Network Performance Measurement<br/>6.6.3 System Design for Better Performance<br/>6.6.4 Fast TPDU Processing<br/>6.6.5 Protocols for Gigabit Networks<br/>7 THE APPLICATION LAYER<br/>7.1 DNS—THE DOMAIN NAME SYSTEM<br/>7.1.1 The DNS Name Space<br/>7.1.2 Resource Records<br/>7.1.3 Name Servers<br/>7.2 ELECTRONIC MAIL<br/>7.2.1 Architecture and Services<br/>7.2.2 The User Agent<br/>7.2.3 Message Formats<br/>7.2.4 Message Transfer<br/>7.2.5 Final Delivery<br/>7.3 THE WORLD WIDE WEB<br/>7.3.1 Architectural Overview"<br/>7.3.2 Static Web Documents<br/>7.3.3 Dynamic Web Documents<br/>7.3.4 HTTP—The HyperText Transfer Protocol<br/>7.3.5 Performance Enhancements<br/>7.3.6 The Wireless Web<br/>7.4 MULTIMEDIA<br/>7.4.1 Introduction to Digital Audio<br/>7.4.2 Audio Compression<br/>7.4.3 Streaming Audio<br/>7.4.4 Internet Radio<br/>7.4.5 Voice over IP<br/>7.4.6 Introduction to Video<br/>7.4.7 Video Compression<br/>7.4.8 Video on Demand<br/>7.4.9 The MBone—^The Multicast Backbone<br/>8 NETWORK SECURITY<br/>8.1 CRYPTOGRAPHY<br/>8.1.1 Introduction to Cryptography<br/>8.1.2 Substitution Ciphers<br/>8.1.3 Transposition Ciphers<br/>8.1.4 One-Time Pads<br/>8.1.5 Two Fundamental Cryptographic Principles<br/>8.2 SYMMETRIC-KEY ALGORITHMS<br/>8.2.1 DES—The Data Encryption Standard<br/>8.2.2 AES—The Advanced Encryption Standard<br/>8.2.3 Cipher Modes<br/>8.2.4 Other Ciphers<br/>8.2.5 Cryptanalysis<br/>8.3 PUBLIC-KEY ALGORITHMS<br/>8.3.1 RSA<br/>8.3.2 Other Public-Key Algorithms<br/>8.4 DIGITAL SIGNATURES<br/>8.4.1 Symmetric-Key Signatures<br/>8.4.2 Public-Key Signatures<br/>8.4.3 Message Digests<br/>8.4.4 The Birthday Attack<br/>8.5 MANAGEMENT OF PUBLIC KEYS<br/>8.5.1 Certificates<br/>8.5.2 X.509<br/>8.5.3 Public Key Infrastructures<br/>8.6 COMMUNICATION SECURITY<br/>8.6.1 IPsec<br/>8.6.2 Firewalls<br/>8.6.3 Virtual Private Networks<br/>8.6.4 Wireless Security<br/>8.7 AUTHENTICATION PROTOCOLS<br/>8.7.1 Authentication Based on a Shared Secret Key<br/>8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange<br/>8.7.3 Authentication Using a Key Distribution Center<br/>8.7.4 Authentication Using Kerberos<br/>8.7.5 Authentication Using Public-Key Cryptography<br/>8.8 E-MAIL SECURITY<br/>8.8.1 PGP—Pretty Good Privacy<br/>8.8.2 PEM—^Privacy Enhanced Mail<br/>8.8.3 S/MIME<br/>8.9 WEB SECURITY<br/>8.9.1 Threats<br/>8.9.2 Secure Naming<br/>8.9.3 SSL—^The Securp Sockets Layer<br/>8.9.4 Mobile Code Security<br/>8.10 SOCIAL ISSUES<br/>8.10.1 Privacy<br/>8.10.2 Freedom of Speech<br/>8.10.3 Copyright<br/>9 READING LIST AND BIBLIOGRAPHY<br/>9.1 SUGGESTIONS FOR FURTHER READING<br/>9.1.1 Introduction and General Works<br/>9.1.2 The Physical Layer<br/>9.1.3 The Data Link Layer<br/>9.1.4 The Medium Access Control Sublayer<br/>9.1.5 The Network Layer<br/>9.1.6 The Transport Layer<br/>9.1.7 The Application Layer<br/>9.1.8 Network Security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 31/05/2016 | 004.6 | P18839 | 16/03/2023 | 24/02/2023 | General Books |