Networks for computer scientists and engineers/ (Record no. 164597)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 00390nam a2200145Ia 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 019568575x |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | ZHE/N |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Zheng,Youlu |
245 #0 - TITLE STATEMENT | |
Title | Networks for computer scientists and engineers/ |
Statement of responsibility, etc. | Youlu Zheng, Shakil Akhtar |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New York: |
Name of publisher, distributor, etc. | Oxford University Press, |
Date of publication, distribution, etc. | 2002. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 575p. |
Other physical details | ill. |
Dimensions | 24 cm. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1. Introduction<br/>1.1: Evolution of Data Communications and Networks<br/>1.1.1: Recent Changes in Telecommunications<br/>1.1.2: The Progress and Future of Telecommunications<br/>1.1.3: Present Solutions<br/>1.2: Telephone System and Computer Telephony<br/>1.2.1: Telephone and Call Progress<br/>1.2.2: Telephone Network<br/>1.2.3: Telephone Numbering<br/>1.3: Computer Telephony<br/>1.3.1: Computer Telephony<br/>1.3.2: Internet Telephony<br/>1.3.3: Unified Messaging<br/>1.4: Distributed Systems and Client-Server Model<br/>1.4.1: Centralized Computing vs. Distributed and Client-Server Systems<br/>1.4.2: Three-Tiered Client-Server Systems<br/>1.4.3: Web-Based Application Server and Electronic Commerce<br/>1.5: Protocols and Standardization<br/>1.5.1: Protocol Syntax and Semantics<br/>1.5.2: National and International Standards<br/>1.5.3: Telecommunication Standards and Organizations<br/>1.5.4: Networks Standards and Organizations<br/>1.6: Chapter Summary<br/>1.7: References<br/><br/>Chapter 2. Data Communications<br/>2.1: Advantages of Digital Communications<br/>2.2: Transmission Media<br/>2.2.1: Shielded and Unshielded Twisted Pair (STP and UTP) Wiring<br/>2.2.2: Coaxial Cable<br/>2.2.3: Optical Fiber<br/>2.2.4: Radio and Microwave<br/>2.2.5: Satellite Communications<br/>2.3: Fundamentals of Digital Transmission<br/>2.3.1: Frequency Spectrum, Bandwidth, and Data Rate<br/>2.3.2: Shannon's Theorem<br/>2.3.3: Sampling (Nyquist) Theorem<br/>2.4: Digitization and Multilevel Transmission<br/>2.4.1: Pulse Code Modulation (PCM)<br/>2.4.2: Advanced Digitization Techniques—CPCM, DPCM and ADPCM<br/>2.5: Modulation Techniques and Modems<br/>2.5.1: Amplitude Modulation<br/>2.5.2: Frequency Modulation<br/>2.5.3: Phase Modulation<br/>2.5.4: Modem Technologies<br/>2.6: Terminal Devices<br/>2.6.1: Dumb and Intelligent Terminals<br/>2.6.2: Data Terminal Equipment and Data Communications Equipment<br/>2.7: Wireless Communication<br/>2.7.1: Digital Cellular Telephone and Personal Communication Services (PCS)<br/>2.7.2: Wireless Data Services<br/>2.7.3: Geographic Position Systems (GPS) and Applications<br/>2.8: Videoconference<br/>2.8.1: Desktop Videoconference Systems<br/>2.8.2: Document Conference<br/>2.8.3: Videoconference Standards<br/>2.9: Chapter Summary<br/>2.10: Problems<br/>2.11: References<br/><br/>Chapter 3. OSI Seveln Layer Network Model<br/>3.1: Physical Layer<br/>3.1.1: Data Encoding<br/>3.1.2: Multiplexing Schemes<br/>3.2: Data Link Layer<br/>3.2.1: Asynchronous and Synchronous Communications<br/>3.2.2: Error Detection and Correction<br/>3.2.3: Framing and Flow Control<br/>3.2.4: High-Level Data Link Control (HDLC)<br/>3.3: Network Layer<br/>3.3.1: Subnet Concept<br/>3.3.2: Overview of Switching Techniques<br/>3.3.3: Routing Strategies<br/>3.3.4: Congestion Control<br/>3.4: Transport Layer and Session Layer<br/>3.5: Presentation Layer and Application Layer<br/>3.5.1: Data Compression<br/>3.5.2: Encryption and Decryption<br/>3.5.3: Network Applications<br/>3.6: Network Performance<br/>3.6.1: Delay<br/>3.6.2: Throughput<br/>3.6.3: Bandwidth Utilization<br/>3.6.4: Error Rate, Congesting, and Network Reliability<br/>3.7: Chapter Summary<br/>3.8: Problems<br/>3.9: References<br/><br/>Chapter 4. LAN Technologies<br/>4.1: LAN Overview<br/>4.2: Protocols and Standards<br/>4.2.1: IEEE Standards<br/>4.2.2: CSMA/CD, Ethernet and IEEE 802.3<br/>4.2.3: Token Bus and IEEE 802.4<br/>4.2.4: Token Ring and IEEE 802.5<br/>4.2.5: Commercial LAN Systems<br/>4.2.6: Wireless LAN and IEEE 802.11<br/>4.3: LAN Hardware<br/>4.3.1: Connecting Components: Cabling, Connectors, Transceivers, Repeater and Network Interface Card<br/>4.3.2: Workstations and Network Server<br/>4.3.3: Network Storage Systems and Hierarchical Storage Management (HSM)<br/>4.4: LAN Services and LAN Operating Systems<br/>4.4.1: Network File System<br/>4.4.2: Network Directory Services<br/>4.4.3: Network Printing and Fax Services<br/>4.4.4: Backup<br/>4.4.5: LAN Operating Systems<br/>4.5: Chapter Summary<br/>4.6: Problems<br/>4.7: References<br/><br/>Chapter 5. TCP/IP and Internet<br/>5.1: Internet Architecture<br/>5.1.1: Internet Addresses<br/>5.1.2: Gateway Addressing<br/>5.1.3: Network and Broadcast Addressing<br/>5.1.4: Dotted Decimal Notation<br/>5.1.5: Loopback Address<br/>5.1.6: Weaknesses in Internet Addressing<br/>5.1.7: Mapping of Physical and IP Addresses<br/>5.1.8: RARP (Reverse Address Resolution Protocol)<br/>5.2: Internet Protocol (IP) and Datagram<br/>5.2.1: IP Datagram Format and Type of Services<br/>5.2.2: Datagram Encapsulation and Fragmentation<br/>5.2.3: Reassembly and Fragmentation Control<br/>5.2.4: Other Fields<br/>5.2.5: Error and Control Message Protocol (ICMP)<br/>5.2.6: IPv6<br/>5.3: Routing Protocols<br/>5.3.1: Routing Table and Routing Mechanism<br/>5.3.2: Subnet Routing<br/>5.3.3: Internet Routing<br/>5.4: User Datagram Protocol (UDP)<br/>5.5: Transmission Control Protocol (TCP)<br/>5.5.1: TCP Header and Services<br/>5.5.2: Connection Establishment and Termination<br/>5.5.3: Flow Control and Window Size Advertising<br/>5.5.4: TCP Time Out and Retransmission<br/>5.6: Internet Standard Services<br/>5.6.1: File Transfer Protocol (FTP)<br/>5.6.2: Simple Mail Transfer Protocol (SMTP) and Examples<br/>5.6.3: POP3 (Post Office Protocol)<br/>5.6.4: Remote Login and Telnet<br/>5.7: Domain Name System (DNS)<br/>5.7.1: Mapping Domain Names to IP Addresses<br/>5.7.2: DNS Message<br/>5.7.3: Recent Advances in Internet Domain Name Hierarchy<br/>5.8: TCP/IP for PCs<br/>5.8.1: Serial Line Internet Protocol (SLIP)<br/>5.8.2: Point-to-Point (PPP)<br/>5.8.3: Winsock<br/>5.9: Internet Applications<br/>5.9.1: World Wide Web (WWW)<br/>5.9.2: Recent Developments<br/>5.10: Chapter Summary<br/>5.11: Problems<br/>5.11: References<br/><br/>Chapter 6. Access & High Speed Networking Technologies<br/>6.1: Integrated Service Digital Network (ISDN)<br/>6.1.1: ISDN Signaling and Architecture<br/>6.1.2: ISDN Protocols<br/>6.1.3: ISDN Advantages<br/>6.1.4: Broadband ISDN<br/>6.2: Cable Modem System<br/>6.3: Digital Subscriber Line (DSL) Technology<br/>6.4: Switched Multimegabit Data Service (SMDS)<br/>6.4.1: SMDS Features<br/>6.4.2: SMDS Addressing and Protocols<br/>6.5: Frame Relay<br/>6.5.1: Protocol and Architecture<br/>6.5.2: Implementation<br/>6.5.3: Frame Relay Performance Analysis and Congestion Control<br/>6.5.4: Voice over Frame Relay<br/>6.5.5: Migration towards ATM<br/>6.6: Fast Ethernet, 100VG-AnyLAN and Gigabit Ethernet<br/>6.6.1: 100VG-AnyLAN<br/>6.6.2: Fast Ethernet<br/>6.6.3: Gigabit Ethernet<br/>6.7: FDDI and CDDI<br/>6.8: Asynchronous Transfer Mode (ATM) Networks<br/>6.8.1: ATM Advantages<br/>6.8.2: ATM Switching<br/>6.8.3: ATM Internetworking with Frame Relay<br/>6.8.4: IP Over ATM<br/>6.8.5: ATM Future<br/>6.9: SONET<br/>6.9.1: SONET Signals and Architecture<br/>6.9.2: SONET Layers and Frames<br/>6.9.3: SONET Overhead<br/>6.9.4: SONET Fault Tolerance<br/>6.10: Chapter Summary<br/>6.11: Problems<br/>6.12: References<br/><br/>Chapter 7. Switching and Virtual LAN<br/>7.1: Hub Technology<br/>7.1.1: Early Hubs<br/>7.1.2: Intelligent Hub and Its Component<br/>7.1.3: Interconnecting LANs and Collapsed Backbone Network<br/>7.2: Switching Technology for LAN and Internetworking<br/>7.2.1: Switching Architectures<br/>7.2.2: Ethernet Switch<br/>7.2.3: Token Ring Switches<br/>7.2.4: FDDI Switches<br/>7.2.5: Switching Network Management<br/>7.3: Non-ATM Virtual LANs<br/>7.3.1: Segment-Based VLAN<br/>7.3.2: Media Access Control (MAC)-Based VLAN<br/>7.3.3: IP-Address Based VLAN<br/>7.4: ATM Virtual LAN<br/>7.4.1: ATM LAN Emulation<br/>7.4.2: ATM Edge Routers<br/>7.4.3: ATM Virtual Routers<br/>7.4.4: ATM Relational Networks<br/>7.5: Chapter Summary<br/>7.6: Problems<br/>7.7: References<br/><br/>Chapter 8. Network Performance<br/>8.1: Why Study Network Performance?<br/>8.2: Analytical Approaches<br/>8.2.1: Delay Throughput Analysis<br/>8.2.2: Probability Techniques<br/>8.2.3.1: M/M/1 Queues<br/>8.2.3.2: M/M/? Queues<br/>8.2.4: Markov Models<br/>8.2.4.1: Discrete Time Markov Model<br/>8.2.4.2: Continuous Time Markov Model<br/>8.2.5: Reliability Models<br/>8.3: Simulation<br/>8.3.1: Continuous Simulation<br/>8.3.2: Discrete Event Simulation (DEVS)<br/>8.3.3: Simulation Models<br/>8.3.3.1: Simulation of Token Bus Scheme<br/>8.3.3.2: Using COMNET III for Network Simulation<br/>8.3.3.3: Using OPNET Modeler for Network Simulation and Modeling<br/>8.4: Network Traffic Monitoring<br/>8.4.1: Windows-Based Traffic Monitoring<br/>8.4.2: Ethernet Traffic Monitoring<br/>8.4.2.1: DOS-Based EtherVision by Triticom<br/>8.4.2.2: Windows-Based Jetlan Traffic Monitor<br/>8.5: Chapter Summary<br/>8.6: Problems<br/>8.7: References<br/><br/>Chapter 9. Network Management<br/>9.1: SNMP<br/>9.1.1: Introduction<br/>9.1.2: SNMP Model<br/>9.1.3: Structure of Management Information<br/>9.1.4: SNMPv2<br/>9.1.5: SNMPv3<br/>9.2: RMON and RMONv2<br/>9.2.1: RMON Model<br/>9.2.2: RMON2<br/>9.3: TMN<br/>9.3.1: Physical Architecture<br/>9.3.2: Differences between TMN and OSI<br/>9.4: Next Generation Directory Services<br/>9.5: Web-Based Network Management<br/>9.6: Chapter Summary<br/>9.7: Problems<br/>9.8: References<br/><br/>Chapter 10. Communication and Network Security<br/>10.1: Cryptography<br/>10.1.1: Secret Key Cryptography<br/>10.1.2: Public Key Cryptography<br/>10.1.3: The Data Encryption Standard (DES) and Advanced Encryption Standard (AES)<br/>10.1.4: Serial Encryption<br/>10.1.5: Link-Level, Network-Level, and Application-Level Encryption<br/>10.1.6: Digital Signatures, Message Digest (MD5), and Digital Certification<br/>10.2: Kerberos<br/>10.3: Firewalls<br/>10.3.1: Packet Filtering Principle<br/>10.3.2: Router-Based Packet Filtering Firewall<br/>10.3.3: Application Gateway Firewall<br/>10.3.4: Circuit Gateway Firewall<br/>10.3.5: Firewall Architectures<br/>10.4: Anti-Virus<br/>10.4.1: Rogue Programs and Viruses<br/>10.4.2: Hiding a Virus<br/>10.4.3: What Do Viruses Do?<br/>10.4.4: Virus Detection and Prevention<br/>10.4.5: Survivor's Guide to Virus Infection<br/>10.4.6: Anti-Virus Software<br/>10.5: New Technologies in Network Security Applications<br/>10.5.1: Internet Commerce and Electronic Money<br/>10.5.2: Secure Internet Commerce and Virtual Private Network (VPN)<br/>10.5.3: Secure Container for Electronic Publishing<br/>10.5.4: Smartcard and Secure Electronic Transaction (SET)<br/>10.5.5: Random One-Time Pad and No-Key Encryption<br/>10.6: Chapter Summary<br/>10.7: Problems<br/>10.8: References<br/><br/>Chapter 11. Network Programming<br/>11.1: Serial Port and Parallel Port Programming<br/>11.1.1: Serial Port Programming<br/>11.1.2: Parallel Port Programming<br/>11.2: NetBios Programming<br/>11.3: TCP/IP and Socket Programming<br/>11.3.1: Interprocess Communication and Pipes<br/>11.3.2: Creation of Sockets<br/>11.3.4: Socket Connection between Client and Server<br/>11.3.3: Using Internet Library and DNS<br/>11.3.5: Blocking, Synchronization and Timing<br/>11.3.6: Sample Client/Server Programs<br/>11.4: Winsock Programming<br/>11.4.1: Using Winsock<br/>11.4.2: Example Program<br/>11.5: RPC Programming<br/>11.6: JAVA Programming<br/>11.7: Chapter Summary |
650 ## - SUBJECT | |
Keyword | Computer networks |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Akhtar, Shakil |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Full call number | Accession number | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | 29/08/2016 | 004.6 ZHE/N | P19509 | 29/08/2016 | General Books |