Front cover image for Computer networking : a top-down approach

Computer networking : a top-down approach

Print Book, English, ©2008
Addison-Wesley, Harlow, ©2008
xxiv, 852 pages
9780321497703, 0321497708
173238196
Chapter 1 Computer Networks and the Internet1.1 What Is the Internet?1.2 The Network Edge1.3 The Network Core1.4 Delay, Loss, and Throughput in Packet-Switched Networks1.5 Protocol Layers and Their Service Models1.6 Networks Under Attack1.7 History of Computer Networking and the Internet1.8 SummaryChapter 2 Application Layer2.1 Principles of Network Applications2.2 The Web and HTTP2.3 File Transfer: FTP2.4 Electronic Mail in the Internet2.5 DNS—The Internet’s Directory Service2.6 Peer-to-Peer Applications2.7 Socket Programming with TCP2.8 Socket Programming with UDP2.9 SummaryChapter 3 Transport Layer3.1 Introduction and Transport-Layer Services3.2 Multiplexing and Demultiplexing3.3 Connectionless Transport: UDP3.4 Principles of Reliable Data Transfer3.5 Connection-Oriented Transport: TCP3.6 Principles of Congestion Control3.7 TCP Congestion Control3.8 SummaryChapter 4 The Network Layer4.1 Introduction4.2 Virtual Circuit and Datagram Networks4.3 What’s Inside a Router?4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet4.5 Routing Algorithms4.6 Routing in the Internet4.7 Broadcast and Multicast Routing4.8 SummaryChapter 5 The Link Layer and Local Area Networks5.1 Link Layer: Introduction and Services5.2 Error-Detection and -Correction Techniques5.3 Multiple Access Protocols5.4 Link-Layer Addressing5.5 Ethernet5.6 Link-Layer Switches5.7 PPP: The Point-to-Point Protocol5.8 Link Virtualization: A Network as a Link Layer5.9 SummaryChapter 6 Wireless and Mobile Networks 6.1 Introduction6.2 Wireless Links and Network Characteristics6.3 WiFi: 802.11 Wireless LANs6.4 Cellular Internet Access6.5 Mobility Management: Principles6.6 Mobile IP6.7 Managing Mobility in Cellular Networks6.8 Wireless and Mobility: Impact on Higher-layer Protocols6.9 SummaryChapter 7 Multimedia Networking7.1 Multimedia Networking Applications7.2 Streaming Stored Audio and Video7.3 Making the Best of the Best-Effort Service7.4 Protocols for Real-Time Interactive Applications7.5 Providing Multiple Classes of Service7.6 Providing Quality of Service Guarantees7.7 SummaryChapter 8 Security in Computer Networks8.1 What Is Network Security?8.2 Principles of Cryptography8.3 Message Integrity8.4 End-Point Authentication8.5 Securing E-mail8.6 Securing TCP Connections: SSL8.7 Network-Layer Security: IPsec8.8 Securing Wireless LANs8.9 Operational Security: Firewalls and Intrusion Detection Systems8.10 SummaryChapter 9 Network Management9.1 What Is Network Management?9.2 The Infrastructure for Network Management9.3 The Internet-Standard Management Framework9.4 ASN.19.5 ConclusionReferencesIndex
Previous edition: Boston, Mass.: Pearson/Addison-Wesley, 2005