000 02625cam a22002174a 4500
020 _a9780130661029
020 _a0130661023
020 _a9788120321755
020 _a8120321758
082 0 0 _a004.6
_bTAN
100 1 _aTanenbaum, Andrew S.,
245 1 0 _aComputer networks
250 _a4th Edition.
260 _aNew Dlhi:
_bPHI Learning,
_c2004.
300 _axx, 891 p. :
_billustrations ;
500 _aIncludes index
505 _a1. Introduction -- 1.1. Uses of Computer Networks -- 1.2. Network Hardware -- 1.3. Network Software -- 1.4. Reference Models -- 1.5. Example Networks -- 1.6. Network Standardization -- 1.7. Metric Units -- 1.8. Outline of the Rest of the Book -- 2. Physical Layer -- 2.1. Theoretical Basis for Data Communication -- 2.2. Guided Transmission Media -- 2.3. Wireless Transmission -- 2.4. Communication Satellites -- 2.5. Public Switched Telephone Network -- 2.6. Mobile Telephone System -- 2.7. Cable Television -- 3. Data Link Layer -- 3.1. Data Link Layer Design Issues -- 3.2. Error Detection and Correction -- 3.3. Elementary Data Link Protocols -- 3.4. Sliding Window Protocols -- 3.5. Protocol Verification -- 3.6. Example Data Link Protocols -- 4. Medium Access Control Sublayer -- 4.1. Channel Allocation Problem -- 4.2. Multiple Access Protocols -- 4.3. Ethernet -- 4.4. Wireless Lans -- 4.5. Broadband Wireless -- 4.6. Bluetooth -- 4.7. Data Link Layer Switching -- 5. Network Layer -- 5.1. Network Layer Design Issues -- 5.2. Routing Algorithms -- 5.3. Congestion Control Algorithms -- 5.4. Quality of Service -- 5.5. Internetworking -- 5.6. Network Layer in the Internet -- 6. Transport Layer -- 6.1. Transport Service -- 6.2. Elements of Transport Protocols -- 6.3. Simple Transport Protocol -- 6.4. Internet Transport Protocols: UDP -- 6.5. Internet Transport Protocols: TCP -- 6.6. Performance Issues -- 7. Application Layer -- 7.1. DNS -- The Domain Name System -- 7.2. Electronic Mail -- 7.3. World Wide Web -- 7.4. Multimedia -- 8. Network Security -- 8.1. Cryptography -- 8.2. Symmetric-Key Algorithms -- 8.3. Public-Key Algorithms -- 8.4. Digital Signatures -- 8.5. Management of Public Keys 8.7. Authentication Protocols -- 8.8. E-mail Security -- 8.9. Web Security -- 8.10. Social Issues -- 9. Reading List and Bibliography -- 9.1. Suggestions for Further Reading -- 9.2. Alphabetical Bibliography.
520 _aDetails descriptions of the principles associated with each layer and presents many examples drawn the Internet and wireless networks
650 0 _aComputer networks.
942 _cBK
999 _c11301
_d11301