000 | 02625cam a22002174a 4500 | ||
---|---|---|---|
020 | _a9780130661029 | ||
020 | _a0130661023 | ||
020 | _a9788120321755 | ||
020 | _a8120321758 | ||
082 | 0 | 0 |
_a004.6 _bTAN |
100 | 1 | _aTanenbaum, Andrew S., | |
245 | 1 | 0 | _aComputer networks |
250 | _a4th Edition. | ||
260 |
_aNew Dlhi: _bPHI Learning, _c2004. |
||
300 |
_axx, 891 p. : _billustrations ; |
||
500 | _aIncludes index | ||
505 | _a1. Introduction -- 1.1. Uses of Computer Networks -- 1.2. Network Hardware -- 1.3. Network Software -- 1.4. Reference Models -- 1.5. Example Networks -- 1.6. Network Standardization -- 1.7. Metric Units -- 1.8. Outline of the Rest of the Book -- 2. Physical Layer -- 2.1. Theoretical Basis for Data Communication -- 2.2. Guided Transmission Media -- 2.3. Wireless Transmission -- 2.4. Communication Satellites -- 2.5. Public Switched Telephone Network -- 2.6. Mobile Telephone System -- 2.7. Cable Television -- 3. Data Link Layer -- 3.1. Data Link Layer Design Issues -- 3.2. Error Detection and Correction -- 3.3. Elementary Data Link Protocols -- 3.4. Sliding Window Protocols -- 3.5. Protocol Verification -- 3.6. Example Data Link Protocols -- 4. Medium Access Control Sublayer -- 4.1. Channel Allocation Problem -- 4.2. Multiple Access Protocols -- 4.3. Ethernet -- 4.4. Wireless Lans -- 4.5. Broadband Wireless -- 4.6. Bluetooth -- 4.7. Data Link Layer Switching -- 5. Network Layer -- 5.1. Network Layer Design Issues -- 5.2. Routing Algorithms -- 5.3. Congestion Control Algorithms -- 5.4. Quality of Service -- 5.5. Internetworking -- 5.6. Network Layer in the Internet -- 6. Transport Layer -- 6.1. Transport Service -- 6.2. Elements of Transport Protocols -- 6.3. Simple Transport Protocol -- 6.4. Internet Transport Protocols: UDP -- 6.5. Internet Transport Protocols: TCP -- 6.6. Performance Issues -- 7. Application Layer -- 7.1. DNS -- The Domain Name System -- 7.2. Electronic Mail -- 7.3. World Wide Web -- 7.4. Multimedia -- 8. Network Security -- 8.1. Cryptography -- 8.2. Symmetric-Key Algorithms -- 8.3. Public-Key Algorithms -- 8.4. Digital Signatures -- 8.5. Management of Public Keys 8.7. Authentication Protocols -- 8.8. E-mail Security -- 8.9. Web Security -- 8.10. Social Issues -- 9. Reading List and Bibliography -- 9.1. Suggestions for Further Reading -- 9.2. Alphabetical Bibliography. | ||
520 | _aDetails descriptions of the principles associated with each layer and presents many examples drawn the Internet and wireless networks | ||
650 | 0 | _aComputer networks. | |
942 | _cBK | ||
999 |
_c11301 _d11301 |