Networks for computer scientists and engineers/ (Record no. 164597)

MARC details
000 -LEADER
fixed length control field 00390nam a2200145Ia 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 019568575x
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Item number ZHE/N
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Zheng,Youlu
245 #0 - TITLE STATEMENT
Title Networks for computer scientists and engineers/
Statement of responsibility, etc. Youlu Zheng, Shakil Akhtar
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York:
Name of publisher, distributor, etc. Oxford University Press,
Date of publication, distribution, etc. 2002.
300 ## - PHYSICAL DESCRIPTION
Extent 575p.
Other physical details ill.
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction<br/>1.1: Evolution of Data Communications and Networks<br/>1.1.1: Recent Changes in Telecommunications<br/>1.1.2: The Progress and Future of Telecommunications<br/>1.1.3: Present Solutions<br/>1.2: Telephone System and Computer Telephony<br/>1.2.1: Telephone and Call Progress<br/>1.2.2: Telephone Network<br/>1.2.3: Telephone Numbering<br/>1.3: Computer Telephony<br/>1.3.1: Computer Telephony<br/>1.3.2: Internet Telephony<br/>1.3.3: Unified Messaging<br/>1.4: Distributed Systems and Client-Server Model<br/>1.4.1: Centralized Computing vs. Distributed and Client-Server Systems<br/>1.4.2: Three-Tiered Client-Server Systems<br/>1.4.3: Web-Based Application Server and Electronic Commerce<br/>1.5: Protocols and Standardization<br/>1.5.1: Protocol Syntax and Semantics<br/>1.5.2: National and International Standards<br/>1.5.3: Telecommunication Standards and Organizations<br/>1.5.4: Networks Standards and Organizations<br/>1.6: Chapter Summary<br/>1.7: References<br/><br/>Chapter 2. Data Communications<br/>2.1: Advantages of Digital Communications<br/>2.2: Transmission Media<br/>2.2.1: Shielded and Unshielded Twisted Pair (STP and UTP) Wiring<br/>2.2.2: Coaxial Cable<br/>2.2.3: Optical Fiber<br/>2.2.4: Radio and Microwave<br/>2.2.5: Satellite Communications<br/>2.3: Fundamentals of Digital Transmission<br/>2.3.1: Frequency Spectrum, Bandwidth, and Data Rate<br/>2.3.2: Shannon's Theorem<br/>2.3.3: Sampling (Nyquist) Theorem<br/>2.4: Digitization and Multilevel Transmission<br/>2.4.1: Pulse Code Modulation (PCM)<br/>2.4.2: Advanced Digitization Techniques—CPCM, DPCM and ADPCM<br/>2.5: Modulation Techniques and Modems<br/>2.5.1: Amplitude Modulation<br/>2.5.2: Frequency Modulation<br/>2.5.3: Phase Modulation<br/>2.5.4: Modem Technologies<br/>2.6: Terminal Devices<br/>2.6.1: Dumb and Intelligent Terminals<br/>2.6.2: Data Terminal Equipment and Data Communications Equipment<br/>2.7: Wireless Communication<br/>2.7.1: Digital Cellular Telephone and Personal Communication Services (PCS)<br/>2.7.2: Wireless Data Services<br/>2.7.3: Geographic Position Systems (GPS) and Applications<br/>2.8: Videoconference<br/>2.8.1: Desktop Videoconference Systems<br/>2.8.2: Document Conference<br/>2.8.3: Videoconference Standards<br/>2.9: Chapter Summary<br/>2.10: Problems<br/>2.11: References<br/><br/>Chapter 3. OSI Seveln Layer Network Model<br/>3.1: Physical Layer<br/>3.1.1: Data Encoding<br/>3.1.2: Multiplexing Schemes<br/>3.2: Data Link Layer<br/>3.2.1: Asynchronous and Synchronous Communications<br/>3.2.2: Error Detection and Correction<br/>3.2.3: Framing and Flow Control<br/>3.2.4: High-Level Data Link Control (HDLC)<br/>3.3: Network Layer<br/>3.3.1: Subnet Concept<br/>3.3.2: Overview of Switching Techniques<br/>3.3.3: Routing Strategies<br/>3.3.4: Congestion Control<br/>3.4: Transport Layer and Session Layer<br/>3.5: Presentation Layer and Application Layer<br/>3.5.1: Data Compression<br/>3.5.2: Encryption and Decryption<br/>3.5.3: Network Applications<br/>3.6: Network Performance<br/>3.6.1: Delay<br/>3.6.2: Throughput<br/>3.6.3: Bandwidth Utilization<br/>3.6.4: Error Rate, Congesting, and Network Reliability<br/>3.7: Chapter Summary<br/>3.8: Problems<br/>3.9: References<br/><br/>Chapter 4. LAN Technologies<br/>4.1: LAN Overview<br/>4.2: Protocols and Standards<br/>4.2.1: IEEE Standards<br/>4.2.2: CSMA/CD, Ethernet and IEEE 802.3<br/>4.2.3: Token Bus and IEEE 802.4<br/>4.2.4: Token Ring and IEEE 802.5<br/>4.2.5: Commercial LAN Systems<br/>4.2.6: Wireless LAN and IEEE 802.11<br/>4.3: LAN Hardware<br/>4.3.1: Connecting Components: Cabling, Connectors, Transceivers, Repeater and Network Interface Card<br/>4.3.2: Workstations and Network Server<br/>4.3.3: Network Storage Systems and Hierarchical Storage Management (HSM)<br/>4.4: LAN Services and LAN Operating Systems<br/>4.4.1: Network File System<br/>4.4.2: Network Directory Services<br/>4.4.3: Network Printing and Fax Services<br/>4.4.4: Backup<br/>4.4.5: LAN Operating Systems<br/>4.5: Chapter Summary<br/>4.6: Problems<br/>4.7: References<br/><br/>Chapter 5. TCP/IP and Internet<br/>5.1: Internet Architecture<br/>5.1.1: Internet Addresses<br/>5.1.2: Gateway Addressing<br/>5.1.3: Network and Broadcast Addressing<br/>5.1.4: Dotted Decimal Notation<br/>5.1.5: Loopback Address<br/>5.1.6: Weaknesses in Internet Addressing<br/>5.1.7: Mapping of Physical and IP Addresses<br/>5.1.8: RARP (Reverse Address Resolution Protocol)<br/>5.2: Internet Protocol (IP) and Datagram<br/>5.2.1: IP Datagram Format and Type of Services<br/>5.2.2: Datagram Encapsulation and Fragmentation<br/>5.2.3: Reassembly and Fragmentation Control<br/>5.2.4: Other Fields<br/>5.2.5: Error and Control Message Protocol (ICMP)<br/>5.2.6: IPv6<br/>5.3: Routing Protocols<br/>5.3.1: Routing Table and Routing Mechanism<br/>5.3.2: Subnet Routing<br/>5.3.3: Internet Routing<br/>5.4: User Datagram Protocol (UDP)<br/>5.5: Transmission Control Protocol (TCP)<br/>5.5.1: TCP Header and Services<br/>5.5.2: Connection Establishment and Termination<br/>5.5.3: Flow Control and Window Size Advertising<br/>5.5.4: TCP Time Out and Retransmission<br/>5.6: Internet Standard Services<br/>5.6.1: File Transfer Protocol (FTP)<br/>5.6.2: Simple Mail Transfer Protocol (SMTP) and Examples<br/>5.6.3: POP3 (Post Office Protocol)<br/>5.6.4: Remote Login and Telnet<br/>5.7: Domain Name System (DNS)<br/>5.7.1: Mapping Domain Names to IP Addresses<br/>5.7.2: DNS Message<br/>5.7.3: Recent Advances in Internet Domain Name Hierarchy<br/>5.8: TCP/IP for PCs<br/>5.8.1: Serial Line Internet Protocol (SLIP)<br/>5.8.2: Point-to-Point (PPP)<br/>5.8.3: Winsock<br/>5.9: Internet Applications<br/>5.9.1: World Wide Web (WWW)<br/>5.9.2: Recent Developments<br/>5.10: Chapter Summary<br/>5.11: Problems<br/>5.11: References<br/><br/>Chapter 6. Access & High Speed Networking Technologies<br/>6.1: Integrated Service Digital Network (ISDN)<br/>6.1.1: ISDN Signaling and Architecture<br/>6.1.2: ISDN Protocols<br/>6.1.3: ISDN Advantages<br/>6.1.4: Broadband ISDN<br/>6.2: Cable Modem System<br/>6.3: Digital Subscriber Line (DSL) Technology<br/>6.4: Switched Multimegabit Data Service (SMDS)<br/>6.4.1: SMDS Features<br/>6.4.2: SMDS Addressing and Protocols<br/>6.5: Frame Relay<br/>6.5.1: Protocol and Architecture<br/>6.5.2: Implementation<br/>6.5.3: Frame Relay Performance Analysis and Congestion Control<br/>6.5.4: Voice over Frame Relay<br/>6.5.5: Migration towards ATM<br/>6.6: Fast Ethernet, 100VG-AnyLAN and Gigabit Ethernet<br/>6.6.1: 100VG-AnyLAN<br/>6.6.2: Fast Ethernet<br/>6.6.3: Gigabit Ethernet<br/>6.7: FDDI and CDDI<br/>6.8: Asynchronous Transfer Mode (ATM) Networks<br/>6.8.1: ATM Advantages<br/>6.8.2: ATM Switching<br/>6.8.3: ATM Internetworking with Frame Relay<br/>6.8.4: IP Over ATM<br/>6.8.5: ATM Future<br/>6.9: SONET<br/>6.9.1: SONET Signals and Architecture<br/>6.9.2: SONET Layers and Frames<br/>6.9.3: SONET Overhead<br/>6.9.4: SONET Fault Tolerance<br/>6.10: Chapter Summary<br/>6.11: Problems<br/>6.12: References<br/><br/>Chapter 7. Switching and Virtual LAN<br/>7.1: Hub Technology<br/>7.1.1: Early Hubs<br/>7.1.2: Intelligent Hub and Its Component<br/>7.1.3: Interconnecting LANs and Collapsed Backbone Network<br/>7.2: Switching Technology for LAN and Internetworking<br/>7.2.1: Switching Architectures<br/>7.2.2: Ethernet Switch<br/>7.2.3: Token Ring Switches<br/>7.2.4: FDDI Switches<br/>7.2.5: Switching Network Management<br/>7.3: Non-ATM Virtual LANs<br/>7.3.1: Segment-Based VLAN<br/>7.3.2: Media Access Control (MAC)-Based VLAN<br/>7.3.3: IP-Address Based VLAN<br/>7.4: ATM Virtual LAN<br/>7.4.1: ATM LAN Emulation<br/>7.4.2: ATM Edge Routers<br/>7.4.3: ATM Virtual Routers<br/>7.4.4: ATM Relational Networks<br/>7.5: Chapter Summary<br/>7.6: Problems<br/>7.7: References<br/><br/>Chapter 8. Network Performance<br/>8.1: Why Study Network Performance?<br/>8.2: Analytical Approaches<br/>8.2.1: Delay Throughput Analysis<br/>8.2.2: Probability Techniques<br/>8.2.3.1: M/M/1 Queues<br/>8.2.3.2: M/M/? Queues<br/>8.2.4: Markov Models<br/>8.2.4.1: Discrete Time Markov Model<br/>8.2.4.2: Continuous Time Markov Model<br/>8.2.5: Reliability Models<br/>8.3: Simulation<br/>8.3.1: Continuous Simulation<br/>8.3.2: Discrete Event Simulation (DEVS)<br/>8.3.3: Simulation Models<br/>8.3.3.1: Simulation of Token Bus Scheme<br/>8.3.3.2: Using COMNET III for Network Simulation<br/>8.3.3.3: Using OPNET Modeler for Network Simulation and Modeling<br/>8.4: Network Traffic Monitoring<br/>8.4.1: Windows-Based Traffic Monitoring<br/>8.4.2: Ethernet Traffic Monitoring<br/>8.4.2.1: DOS-Based EtherVision by Triticom<br/>8.4.2.2: Windows-Based Jetlan Traffic Monitor<br/>8.5: Chapter Summary<br/>8.6: Problems<br/>8.7: References<br/><br/>Chapter 9. Network Management<br/>9.1: SNMP<br/>9.1.1: Introduction<br/>9.1.2: SNMP Model<br/>9.1.3: Structure of Management Information<br/>9.1.4: SNMPv2<br/>9.1.5: SNMPv3<br/>9.2: RMON and RMONv2<br/>9.2.1: RMON Model<br/>9.2.2: RMON2<br/>9.3: TMN<br/>9.3.1: Physical Architecture<br/>9.3.2: Differences between TMN and OSI<br/>9.4: Next Generation Directory Services<br/>9.5: Web-Based Network Management<br/>9.6: Chapter Summary<br/>9.7: Problems<br/>9.8: References<br/><br/>Chapter 10. Communication and Network Security<br/>10.1: Cryptography<br/>10.1.1: Secret Key Cryptography<br/>10.1.2: Public Key Cryptography<br/>10.1.3: The Data Encryption Standard (DES) and Advanced Encryption Standard (AES)<br/>10.1.4: Serial Encryption<br/>10.1.5: Link-Level, Network-Level, and Application-Level Encryption<br/>10.1.6: Digital Signatures, Message Digest (MD5), and Digital Certification<br/>10.2: Kerberos<br/>10.3: Firewalls<br/>10.3.1: Packet Filtering Principle<br/>10.3.2: Router-Based Packet Filtering Firewall<br/>10.3.3: Application Gateway Firewall<br/>10.3.4: Circuit Gateway Firewall<br/>10.3.5: Firewall Architectures<br/>10.4: Anti-Virus<br/>10.4.1: Rogue Programs and Viruses<br/>10.4.2: Hiding a Virus<br/>10.4.3: What Do Viruses Do?<br/>10.4.4: Virus Detection and Prevention<br/>10.4.5: Survivor's Guide to Virus Infection<br/>10.4.6: Anti-Virus Software<br/>10.5: New Technologies in Network Security Applications<br/>10.5.1: Internet Commerce and Electronic Money<br/>10.5.2: Secure Internet Commerce and Virtual Private Network (VPN)<br/>10.5.3: Secure Container for Electronic Publishing<br/>10.5.4: Smartcard and Secure Electronic Transaction (SET)<br/>10.5.5: Random One-Time Pad and No-Key Encryption<br/>10.6: Chapter Summary<br/>10.7: Problems<br/>10.8: References<br/><br/>Chapter 11. Network Programming<br/>11.1: Serial Port and Parallel Port Programming<br/>11.1.1: Serial Port Programming<br/>11.1.2: Parallel Port Programming<br/>11.2: NetBios Programming<br/>11.3: TCP/IP and Socket Programming<br/>11.3.1: Interprocess Communication and Pipes<br/>11.3.2: Creation of Sockets<br/>11.3.4: Socket Connection between Client and Server<br/>11.3.3: Using Internet Library and DNS<br/>11.3.5: Blocking, Synchronization and Timing<br/>11.3.6: Sample Client/Server Programs<br/>11.4: Winsock Programming<br/>11.4.1: Using Winsock<br/>11.4.2: Example Program<br/>11.5: RPC Programming<br/>11.6: JAVA Programming<br/>11.7: Chapter Summary
650 ## - SUBJECT
Keyword Computer networks
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Akhtar, Shakil
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Full call number Accession number Date last seen Koha item type
        Central Library, Sikkim University Central Library, Sikkim University 29/08/2016 004.6 ZHE/N P19509 29/08/2016 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha