The Internet book: everything you need to know about computer networking and how the Internet works/ (Record no. 3171)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 16369cam a22001814a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0130308528 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.67/8 |
Item number | COM/T |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Comer, Douglas |
245 14 - TITLE STATEMENT | |
Title | The Internet book: everything you need to know about computer networking and how the Internet works/ |
Statement of responsibility, etc. | Douglas E. Comer |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Upper Saddle River, NJ: |
Name of publisher, distributor, etc. | Prentice Hall, |
Date of publication, distribution, etc. | c2000. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvi, 351 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 The Internet Has Arrived<br/>The World Is Changing 1<br/>Numbers Do Not Tell The Story 2<br/>Learning About The Internet 3<br/>Understanding The Big Picture 3<br/>Terminology And Technology 4<br/>Growth And Adaptability 4<br/>The Impact Of The Internet 4<br/>Organization Of The Book 4<br/>A Personal Note 5<br/>Chapter 2 Getting Started: Hands-On Experience<br/>Introduction 7<br/>The Web: Sites And Pages 8<br/>Web Browsers and Browsing 8<br/>Using A Browser 8<br/>Examples Of Web Sites And Services 9<br/>Summary 11<br/>PART I Introduction To Networking<br/>Chapter 3 Telephones Everywhere<br/>Introduction 15<br/>A Communication Service 15<br/>Selling Communication 15<br/>Limited Access 16<br/>High Cost 17<br/>The Difficult Transition 17<br/>Ubiquitous Access 18<br/>Relevance To The Internet 19<br/>Chapter 4 The World Was Once Analog<br/>Introduction 21<br/>Sound, Vibrations, And Analog Recording 21<br/>Analog Electronic Devices 22<br/>Many Electronic Devices Are Analog 23<br/>The First Analog Communication 23<br/>Analog Is Simple But Inaccurate 23<br/>Sending An Analog Signal Across A Wire 24<br/>Digital Music 25<br/>The Digital Revolution 25<br/>Computers Are Digital 26<br/>Digital Recording 26<br/>Using Digital To Recreate Analog. 26<br/>Why Digital Music? 28<br/>Summary 28<br/>Chapter 5 The Once And Future Digital Network<br/>Introduction 31<br/>The World Was Once Digital 31<br/>A Telegraph Is Digital 32<br/>Morse Code 32<br/>Letters And Digits In Morse Code 33<br/>Users Did Not Encounter Morse Code 34<br/>Virtually Instant Commumcation 34<br/>Speed Is Relative 34<br/>The Telephone Became Digital 35<br/>Relevance To The Internet 35<br/>Binary Encoding Of Data On The Internet 36<br/>Why Use Two Symbols? 36<br/>Summary 36<br/>Chapter 6 Basic Communication<br/>Introduction 37<br/>Communication Using Electricity 37<br/>Signals On Wires 38<br/>Information Coding 38<br/>Modems Allow Two-Way Traffic 39<br/>A Character Code For Digital Information 40<br/>Detecting Errors 41<br/>Summary 43<br/><br/>Chapter 7 The Locai Area Network Arrives<br/>Introduction 45<br/>Motivation 45<br/>Interchangeable Media 46<br/>A Computer Consists Of Circuit Boards 46<br/>Circuit Boards Plug Into A Computer 46<br/>Connecting One Computer To Another 47<br/>LAN Technologies 48<br/>Connecting A Computer To A LAN 49<br/>The Importance Of LAN Technology 50<br/>Relationship To The Internet 51<br/>PART II A Brief History Of The Internet<br/>Chapter 8 Internet: The Early Years<br/>Many Independent Networks 55<br/>The Proliferation Of LANs 55<br/>Facts About LANs 56<br/>LANs Are Incompatible 57<br/>Wide Area Technologies Exist 57<br/>Few WANs, Many LANs 58<br/>WANs and LANs Are Incompatible 58<br/>The Desirability Of A Single Network 59<br/>The Department Of Defense Had Multiple Networks 59<br/>Connecting Disconnected Machines 60<br/>The Internet Emerges 60<br/>The ARPANET Backbone 60<br/>Internet Software 61<br/>The Name Is TCP/IP 61<br/>The Shock Of An Open System 61<br/>Open Systems Are Necessary 62<br/>TCP/IP Documentation Is Online 63<br/>The Military Adopts TCP/IP 64<br/>Summary 64<br/>A Personal Note 64<br/>Chapters Two Decades Of Incredible Growth<br/>Introduction 67<br/>Disseminating The Software 67<br/>Meanwhile, Back In Computer Science 68<br/>The Internet Meets UNIX 68<br/>The U.S. Military Makes A Commitmmt 69<br/>The Internet Doubles In Size In One Year 69<br/>Every Computer Science Department 70<br/>Graduate Students Volunteer Their Time 70<br/>The lAB evolves 71<br/>The IETF 12<br/>Doubling Again In A Year 72<br/>The Internet Improves Science 72<br/>NSF Takes A Leadership Role 73<br/>Target: All Of Science And Engineering 73<br/>NSF's Approach 73<br/>The NSFNET Backbone 74<br/>The ANS Backbone 74<br/>Exponential Growth 75<br/>A Commercial Assessment 77<br/>The End Of Growth 77<br/>Chapter 10 The Global Internet<br/>Introduction 79<br/>Early ARPA Networks 79<br/>Electronic Mail Among Computers 79<br/>BFTNET And FIDONET 80<br/>Networks In Europe 80<br/>EBONE: The Internet In Europe 82<br/>Backbones And Internet Hierarchy 82<br/>Internet On All Continents 83<br/>The World Of Internet after 1998 84<br/>A Personal Note 85<br/>Chapter 11 A Global Information Infrastructure<br/>Introduction 87<br/>Existing Infrastructure 87<br/>Communication Infrastructure 88<br/>The Internet Infrastructure 90<br/>The Internet C^ers Diverse Information Services 90<br/>TCP/IP Provides Communication Facilities 90<br/>A Personal Note 91<br/>PART III How The Internet Works<br/>Chapter 12 Packet Switching<br/>Introduction 95<br/>Sharing Saves Money 95<br/>Sharing Introduces Delays 95<br/>Sharing Wires 96<br/>Selectable Channels 96<br/>Sharing By Taking Turns 97<br/>Packet Switching Avoids Delays 98<br/>Each Packet Must Be Labeled 98<br/>Computers Have Addresses 98<br/>Packets Are Not All The Same Size 99<br/>Packet Transmission Seems Instantaneous 99<br/>Sharing Is Automatic 99<br/>Network Hardware. Handles Sharing 1(K)<br/>Many Devices Can Use Packet Switching 100<br/>Relevance To The Internet 100<br/>Summary 101<br/>Chapter 13 internet: A Network Of Networks<br/>Introduction 103<br/>Network Technologies Are Incompatible 103<br/>Coping With Incompatibility 104<br/>Two Fundamental Concepts 104<br/>Using A Computer To Interconnect Networks 106<br/>Interconnecting Computers Pass Packets 107<br/>Interconnecting Computers Are Called Routers 107<br/>Routers Are The Building Blocks Of The Internet 108<br/>Routers Accommodate Multiple Types Of Networks 108<br/>Routers Can Interconnect WANs And LANs 109<br/>Interconnecting Networks Was Revolutionary 110<br/>Summary 110<br/>Chapter 14 ISPs And Network Connections<br/>Introduction 111<br/>Internet Service Providers And Fees 111<br/>Customer Connections Form The Last Mile 112<br/>Leased Circuits Are Expensive 112<br/>Most Individuals Choose Dial-up Access 113<br/>The Important Concept Of Continuous Connectivity 113<br/>Instantaneous Access Changes Use 114<br/>Newer Technologies Offer Inexpensive Dedicated Access 115<br/>Wireless Can Reach Everyone 117<br/>A Personal Note 117<br/>Chapter 15 IP: Software To Create A Virtual Network<br/>•<br/>Introduction 119<br/>Protocol: An Agreement For Communication 119<br/>Basic Functionality: The Internet Protocol 120<br/>IP Software On Every Machine 120<br/>Internet Packets Are Called Datagrams 120<br/>The Illusion Of A Giant Network 121<br/>The Reality Of Internal Structure 122<br/>Datagrams Travel In Packets 123<br/>Every Computer Is Assigned A Unique Address 123<br/>Internet Addresses 124<br/>An Odd IP Address Syntax 124<br/>IP Addresses Are Not Random 124<br/>An Example Trip Through The Internet 125<br/>Summary 126<br/>Chapter 16 TCP: Software For Reliable Communication<br/>Introduction 127<br/>A Packet Switching System Can Be Overrun 127<br/>TCP Helps IP Guarantee Delivery 129<br/>TCP Provides A Connection Between Computer Programs 130<br/>The Magic Of Recovering Lost Datagrams 130<br/>TCP Retransmission Is Automatic 131<br/>TCP And IP Work Together 131<br/>Summary 132<br/>Chapter 17 Clients + Servers s Distributed Computing<br/>Introduction 133<br/>Large Computers Use Networks For Input And Output 133<br/>Small Computers Use Networks To Interact 134<br/>Distributed Computing On The Internet 134<br/>A Single Paradigm Explains All Distributed Computing 135<br/>Programs Are Clients Or Servers 136<br/>A Server Must Always Run 137<br/>Summary 137<br/>Chapter 18 Names For Computers<br/>Introduction 139<br/>People Prefer Names To Numbers 139<br/>Naming A Computer Can Be Difficult Or Fun 140<br/>Computer Names Must Be Unique 141<br/>Suffixes On Computer Names 141<br/>Names With Many Parts 142<br/>Domain Names Outside The US 143<br/>Translating A Name To An Equivalent IP Address 143<br/>Domain Name System Works Like Directory Assistance 144<br/>Computer Name Lookup Is Automatic 144<br/>IP Addresses And Domain Names Are Unrelated 146<br/>Summary 147<br/>Chapter 19 Why The internet Works Weil<br/>Introduction 149<br/>The Internet Works Well 149<br/>IP Provides Flexibility 150<br/>TCP Provides Reliability 151<br/>TCP/IP Software Was Engineered For Efficiency 151<br/>TCP/IP Research Emphasized Practical Results 152<br/>The Formula For Success 152<br/>Summary 153<br/>PART IV Services Available On The Internet<br/>Chapter 20 Electronic Mall<br/>Introduction 157<br/>Description Of Functionality 157<br/>The Best Of All Worlds 158<br/>Each User Has A Mailbox For E-mail 158<br/>Sending An E-mail Message 158<br/>Notification That E-mail has Arrived 158<br/>Reading An E-mail Message 159<br/>E-mail Messages Look Like Interoffice Memos 159<br/>E-mail Software Fills In Header Information 160<br/>How E-mail Works 161<br/>Using E-mail From A Personal Computer 162<br/>Mailbox Address Format 162<br/>Abbreviations Make E-mail Friendly 163<br/>Aliases Permit Arbitrary Abbreviations 163<br/>Aliases Shared By All Users Of A Computer System 164<br/>Sending To Multiple Recipients 164<br/>Mailing List: An Alias for Multiple Recipients 165<br/>Public Mailing Lists And Mail Exploders 165<br/>E-mail To And From Non-Intemet Sites 166<br/>Access To Services Via E-mail 167<br/>Speed, Reliability, And Expectations 167<br/>Impact And Significance Of Electronic Mail 168<br/>Joining A Mailing List 169<br/>Chapter 21 Bulletin Board Service (Network News)<br/>Introduction 171<br/>Description Of Functionality 171<br/>Many Bulletin Boards With Diverse Topics 172<br/>Network News 173<br/>Newsgroup Names 173<br/>Obtaining Network News And The Software To Read Articles 174<br/>How Network News Appears To A User 175<br/>Checking For News Articles 175<br/>Article Expiration 175<br/>Reading Network News 176<br/>Selecting Articles 176 s ,,<br/>Subscribing And Unsubscribing To Newsgroups 178<br/>Submitting An Article 178<br/>Moderated Newsgroups 178<br/>Size Of Network News 179<br/>How Network News Works 179<br/>Redundant Newsfeeds And Duplicate Elimination 180<br/>Relationship Between Netnews And Electronic Mail 181<br/>Impact And Significance Of Network News And Mailing Lists 181<br/>Hints And Conventions For Participating In Discussions 182<br/>Summary 183<br/>Chapter 22 Browsing The World Wide Web<br/>Introduction 185<br/>Description Of Functionality 185<br/>Browsing Vs. Information Retrieval 186<br/>Early Browsing Services Used Menus 186<br/>A Mqnu Item Can Point To Another Computer 187<br/>How A Browser Works 187<br/>An Example Point-And-Click Interface 188<br/>Combining Menu Items With Text 189<br/>The Importance Of Integrated Menus 191<br/>Menus Embedded In Text Are Called Hypertext 191<br/>Multimedia 193<br/>Video And Audio References Can Be Embedded In Text 194<br/>The World Wide Web 195<br/>Browser Software Used To Access The Web 195<br/>An Example Hypermedia Display 196<br/>Control Of The Browser 198<br/>External References 199<br/>Recording The Location Of Information 199<br/>Bookmarks 201<br/>How The World Wide Web Works 202<br/>A URL Tells A Browser Which Computer To Contact 202<br/>A URL Tells A Browser Which Server To Contact 202<br/>Use Of The Name WWW In URLs 203<br/>A Browser Provides Access To Multiple Services 204<br/>Inside A Browser Program 204<br/>Summary 205<br/>An Observation About Hypermedia Browsing 206<br/>Chapter 23 World Wide Web Documents (HTML)<br/>Introduction 207<br/>Display Hardware Varies 207<br/>A Browser Translates And Displays A Web Document 208<br/>A Consequence Of The Web Approach 208<br/>HTML, The Language Used For Web Documents 209<br/>Instructions In A Web Page Control The Output 210<br/>A Web Page Is Divided Into Two Main Sections 210<br/>Indentation Can Make HTML Readable 211<br/>The Body Of A Web Page Can Contain Text 212<br/>Indentation Can Make Paragraphs Easier To Find 213<br/>A Web Page Can Link To Another Page 214<br/>HTML Allows Numbered And Unnumbered Lists 215<br/>Images On A Web Page Are Digital 216<br/>HTML Allows A Web Page To Include An Image 217<br/>Text Can Appear Adjacent To An Image 218<br/>Images Can Link To Another Web Page 219<br/>Some Browsers Can Stretch Or Shrink Images 220<br/>The Background Can Be Controlled 220<br/>Other Features Of HTML 220<br/>Importance Of HTML 221<br/>GUI Tools Help With Web Page Creation 221<br/>Summary 222<br/>Chapter 24 Advanced Web Technologies (Forms, Frames, Plugins,<br/>CGI,<br/>Java,<br/>JavaScript)<br/>Introduction 223<br/>Conventional Web Pages Are Static 223<br/>How A Server Stores Static Web Pages 224<br/>Fetching Items One At A Time 226<br/>Conventional Web Pages Use The Entire Screen 226<br/>A Web Page Can Change Part Of the Screen Til<br/>The Web, Advertising, And Frames 229<br/>Static Documents Have Disadvantages 230<br/>XX O<br/>Controlling How A Browser Processes Data 230<br/>Plugins Allow Variety 232<br/>A Server Can Compute A Web Page On Demand 232<br/>How CGI Works 233<br/>Professional Programmers Build CGI Programs 235<br/>Personalized Web Pages 235<br/>Personalized Advertisements 236<br/>Web Pages Can Interact 236<br/>Shopping Carts 237<br/>Cookies 237<br/>Should You Accept Cookies? 238<br/>A Web Page Can Display Single Animations 238<br/>Active Documents Are More Powerful 239<br/>Java Is An Active Document Technology 241<br/>JavaScript Is An Active Document Technology 241<br/>The Importance Of Advanced Web Technologies 242<br/>Chapter 25 Automated Web Search (Search Engines)<br/>Introduction 243<br/>Description Of Functionality 243<br/>Browsing Vs. Automated Searching 244<br/>A Search Engine Helps Users Get Started 244<br/>A Search Tool Can Help Recover From Loss 245<br/>Automated Searching By Name 245<br/>How An Automated Search Service Operates 246<br/>Modem Systems Search Web Page Contents 248<br/>How A Web Search Appears To A User 248<br/>How A Search Engine Returns Results 249<br/>Automated Search Services Use String Matching 250<br/>The Advantages And Disadvantages Of String Matching 251<br/>Advanced Search Programs That Use Multiple Keys 252<br/>Advanced Services Offer More Sophisticated Matching 252<br/>Personalized Search Results 253<br/>How An Automated Content Search Works 254<br/>Searches Are Restricted 255<br/>Advertising Pays For Searching 255<br/>Examples OfAutomated Search Services 256<br/>Significance Of Automated Web Search 256<br/>Chapter 26 Audio And Video Communication<br/>Introduction 257<br/>Description Of Functionality 257<br/>Audio And Video Require Special Hardware 258<br/>An Audio Clip Resembles An Audio CD 259<br/>Real-Time Means No Delay 259<br/>Internet Audio In Real-Time 259<br/>Radio Programs On The Internet 260<br/>Real-Time Transmission Is Called Webcasting 261<br/>Internet Telephone Service Is Possible 261<br/>Audio Teleconferencing 262<br/>A Cooperative Document Markup Service 262<br/>Marking A Document 264<br/>The Participants Discuss And Mark A Document 265<br/>Video Teleconferencing 266<br/>Video Teleconference Among Groups Of People 267<br/>A Combined Audio, Video, And Whiteboard Service 267<br/>Summary 267<br/>A Personal Note 268<br/>Chapter 27 Faxes And Fiies (FTP)<br/>Introduction 269<br/>Sending A Fax 269<br/>The Internet Can Be Used To Copy Files 270<br/>Data Stored In Files 270<br/>Copying A File 271<br/>FTP Is Interactive 271<br/>Example FTP Commands 271<br/>A User Can Store Or Retrieve A File 272<br/>Commands For Binary And Text File Format 272<br/>Choosing ASCII or Binary Transfer 273<br/>Commands For Authorization And Anonymous FTP 273<br/>A Browser Can Use FTP 21A ^<br/>How FTP Works 21A<br/>Impact And Significance Of FTP 275<br/>Summary 275<br/>Chapter 28 Remote Login And Remote Desktops (TELNET)<br/>Introduction 277<br/>Early Computers Used Textual Interfaces 211<br/>A Timesharing System Requires User Identification 278<br/>Remote Login Resembles Conventional Login 278<br/>How Remote Login Works 279<br/>Escaping From Remote Login 280<br/>Displays And Windows 280<br/>The Internet Remote Login Standard Is TELNET 280<br/>Remote Access Can Display A Desktop 281<br/>How Remote Desktops Operate 282<br/>Assessment Of Remote Login And Desktops 282<br/>Remote Access Is General 283<br/>Generality Makes Remote Login And Desktops Powerful 283<br/>Remote Access Accommodates Multiple Types Of Computers 283<br/>Unexpected Results From Remote Access 284<br/>Summary 284<br/>Chapter 29 Facilities For Secure Communication<br/>Introduction 287<br/>The Internet Is Unsecure 287<br/>Lack Of Security Can Be Important 288<br/>Authentication And Privacy Are Primary Problems 288<br/>Data May Be Changed 289<br/>Encoding Keeps Messages Private 289<br/>Computer Encryption Uses Mathematics 289<br/>No Network Is Absolutely Secure 290<br/>Encryption Makes E-mail Private 290<br/>Encryption Software Needs A Key 291<br/>Two Keys Means Never Having To Trust Anyone 291<br/>Secure E-Mail In Practice 293<br/>Summary 293<br/>Chapter 30 Electronic Commerce And Business<br/>Introduction 295<br/>E-Commerce Is Big Business 295<br/>Security Made E-Commerce Possible 296<br/>Secure Sockets 296<br/>Public Key Encryption Provides Authenticity 297<br/>Digital Signatures 298<br/>Certificates Contain Public Keys 298<br/>What Is Digital Money? 299<br/>Digital Cash Is Not Widely Available 299<br/>Business And E-Commerce 300<br/>A Business Must Protect Its Networks 300<br/>Firewalls Protect Networks 300<br/>A Firewall Filters Packets 301<br/>Firewalls Guard Against Trojan Horses 301<br/>Chapter 31 The Global Digital Library<br/>Introduction 303<br/>A Cornucopia Of Services 303<br/>New Services Appear Regularly 304<br/>Flexibility Permits Change 304<br/>A Digital Library 305<br/>Card Catalogs And Search Tools 305<br/>Internet Services Can Be Integrated 305<br/>Mr. Dewey, Where Are You? 306<br/>Information In The Digital Library 307<br/>What Is The Internet? • 307<br/>A Personal Note 301 |
650 #0 - SUBJECT | |
Keyword | Internet. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 20/06/2016 | 004.67/8 COM/T | P00161 | 06/06/2023 | 06/06/2023 | General Books |