Computer Networks, Global Edition

Höfundur Andrew S. Tanenbaum; David J. Wetherall

Útgefandi Pearson International Content

Snið Page Fidelity

Print ISBN 9781292374062

Útgáfa 6

Höfundarréttur 2021

4.990 kr.

Description

Efnisyfirlit

  • Half Title
  • Title Page
  • Copyright
  • Dedication
  • Contents
  • Preface
  • 1. Introduction
  • 1.1 Uses of Computer Networks
  • 1.1.1 Access to Information
  • 1.1.2 Person-to-Person Communication
  • 1.1.3 Electronic Commerce
  • 1.1.4 Entertainment
  • 1.1.5 The Internet of Things
  • 1.2 Types of Computer Networks
  • 1.2.1 Broadband Access Networks
  • 1.2.2 Mobile and Wireless Access Networks
  • 1.2.3 Content Provider Networks
  • 1.2.4 Transit Networks
  • 1.2.5 Enterprise Networks
  • 1.3 Network Technology, from Local to Global
  • 1.3.1 Personal Area Networks
  • 1.3.2 Local Area Networks
  • 1.3.3 Home Networks
  • 1.3.4 Metropolitan Area Networks
  • 1.3.5 Wide Area Networks
  • 1.3.6 Internetworks
  • 1.4 Examples of Networks
  • 1.4.1 The Internet
  • 1.4.2 Mobile Networks
  • 1.4.3 Wireless Networks (WiFi)
  • 1.5 Network Protocols
  • 1.5.1 Design Goals
  • 1.5.2 Protocol Layering
  • 1.5.3 Connections and Reliability
  • 1.5.4 Service Primitives
  • 1.5.5 The Relationship of Services to Protocols
  • 1.6 Reference Models
  • 1.6.1 The OSI Reference Model
  • 1.6.2 The TCP/IP Reference Model
  • 1.6.3 A Critique of the OSI Model and Protocols
  • 1.6.4 A Critique of the TCP/IP Reference Model and Protocols
  • 1.6.5 The Model Used in This Book
  • 1.7 Standardization
  • 1.7.1 Standardization and Open Source
  • 1.7.2 Who’s Who in the Telecommunications World
  • 1.7.3 Who’s Who in the International Standards World
  • 1.7.4 Who’s Who in the Internet Standards World
  • 1.8 Policy, Legal, and Social Issues
  • 1.8.1 Online Speech
  • 1.8.2 Net Neutrality
  • 1.8.3 Security
  • 1.8.4 Privacy
  • 1.8.5 Disinformation
  • 1.9 Metric Units
  • 1.10 Outline of the Rest of the Book
  • 1.11 Summary
  • 2. The Physical Layer
  • 2.1 Guided Transmission Media
  • 2.1.1 Persistent Storage
  • 2.1.2 Twisted Pairs
  • 2.1.3 Coaxial Cable
  • 2.1.4 Power Lines
  • 2.1.5 Fiber Optics
  • 2.2 Wireless Transmission
  • 2.2.1 The Electromagnetic Spectrum
  • 2.2.2 Frequency Hopping Spread Spectrum
  • 2.2.3 Direct Sequence Spread Spectrum
  • 2.2.4 Ultra-Wideband Communication
  • 2.3 Using the Spectrum for Transmission
  • 2.3.1 Radio Transmission
  • 2.3.2 Microwave Transmission
  • 2.3.3 Infrared Transmission
  • 2.3.4 Light Transmission
  • 2.4 From Waveforms to Bits
  • 2.4.1 The Theoretical Basis for Data Communication
  • 2.4.2 The Maximum Data Rate of a Channel
  • 2.4.3 Digital Modulation
  • 2.4.4 Multiplexing
  • 2.5 The Public Switched Telephone Network
  • 2.5.1 Structure of the Telephone System
  • 2.5.2 The Local Loop: Telephone Modems, ADSL, and Fiber
  • 2.5.3 Trunks and Multiplexing
  • 2.5.4 Switching
  • 2.6 Cellular Networks
  • 2.6.1 Common Concepts: Cells, Handoff, Paging
  • 2.6.2 First-Generation (1G) Technology: Analog Voice
  • 2.6.3 Second-Generation (2G) Technology: Digital Voice
  • 2.6.4 GSM: The Global System for Mobile Communications
  • 2.6.5 Third-Generation (3G) Technology: Digital Voice and Data
  • 2.6.6 Fourth-Generation (4G) Technology: Packet Switching
  • 2.6.7 Fifth-Generation (5G) Technology
  • 2.7 Cable Networks
  • 2.7.1 A History of Cable Networks: Community Antenna Television
  • 2.7.2 Broadband Internet Access Over Cable: HFC Networks
  • 2.7.3 DOCSIS
  • 2.7.4 Resource Sharing in DOCSIS Networks: Nodes and Minislots
  • 2.8 Communication Satellites
  • 2.8.1 Geostationary Satellites
  • 2.8.2 Medium-Earth Orbit Satellites
  • 2.8.3 Low-Earth Orbit Satellites
  • 2.9 Comparing Different Access Networks
  • 2.9.1 Terrestrial Access Networks: Cable, Fiber, and ADSL
  • 2.9.2 Satellites Versus Terrestrial Networks
  • 2.10 Policy at the Physical Layer
  • 2.10.1 Spectrum Allocation
  • 2.10.2 The Cellular Network
  • 2.10.3 The Telephone Network
  • 2.11 Summary
  • 3. The Data Link Layer
  • 3.1 Data Link Layer Design Issues
  • 3.1.1 Services Provided to the Network Layer
  • 3.1.2 Framing
  • 3.1.3 Error Control
  • 3.1.4 Flow Control
  • 3.2 Error Detection and Correction
  • 3.2.1 Error-Correcting Codes
  • 3.2.2 Error-Detecting Codes
  • 3.3 Elementary Data Link Protocols
  • 3.3.1 Initial Simplifying Assumptions
  • 3.3.2 Basic Transmission and Receipt
  • 3.3.3 Simplex Link-Layer Protocols
  • 3.4 Improving Efficiency
  • 3.4.1 Goal: Bidirectional Transmission, Multiple Frames in Flight
  • 3.4.2 Examples of Full-Duplex, Sliding Window Protocols
  • 3.5 Data Link Protocols in Practice
  • 3.5.1 Packet over SONET
  • 3.5.2 ADSL (Asymmetric Digital Subscriber Loop)
  • 3.5.3 Data Over Cable Service Interface Specification (DOCSIS)
  • 3.6 Summary
  • 4. The Medium Access Control Sublayer
  • 4.1 The Channel Allocation Problem
  • 4.1.1 Static Channel Allocation
  • 4.1.2 Assumptions for Dynamic Channel Allocation
  • 4.2 Multiple Access Protocols
  • 4.2.1 ALOHA
  • 4.2.2 Carrier Sense Multiple Access Protocols
  • 4.2.3 Collision-Free Protocols
  • 4.2.4 Limited-Contention Protocols
  • 4.2.5 Wireless LAN Protocols
  • 4.3 Ethernet
  • 4.3.1 Classic Ethernet Physical Layer
  • 4.3.2 Classic Ethernet MAC Sublayer Protocol
  • 4.3.3 Ethernet Performance
  • 4.3.4 Switched Ethernet
  • 4.3.5 Fast Ethernet
  • 4.3.6 Gigabit Ethernet
  • 4.3.7 10-Gigabit Ethernet
  • 4.3.8 40- and 100-Gigabit Ethernet
  • 4.3.9 Retrospective on Ethernet
  • 4.4 Wireless Lans
  • 4.4.1 The 802.11 Architecture and Protocol Stack
  • 4.4.2 The 802.11 Physical Layer
  • 4.4.3 The 802.11 MAC Sublayer Protocol
  • 4.4.4 The 802.11 Frame Structure
  • 4.4.5 Services
  • 4.5 Bluetooth
  • 4.5.1 Bluetooth Architecture
  • 4.5.2 Bluetooth Applications
  • 4.5.3 The Bluetooth Protocol Stack
  • 4.5.4 The Bluetooth Radio Layer
  • 4.5.5 The Bluetooth Link Layers
  • 4.5.6 The Bluetooth Frame Structure
  • 4.5.7 Bluetooth 5
  • 4.6 DOCSIS
  • 4.6.1 Overview
  • 4.6.2 Ranging
  • 4.6.3 Channel Bandwidth Allocation
  • 4.7 Data Link Layer Switching
  • 4.7.1 Uses of Bridges
  • 4.7.2 Learning Bridges
  • 4.7.3 Spanning-Tree Bridges
  • 4.7.4 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways
  • 4.7.5 Virtual LANs
  • 4.8 Summary
  • 5. The Network Layer
  • 5.1 Network Layer Design Issues
  • 5.1.1 Store-and-Forward Packet Switching
  • 5.1.2 Services Provided to the Transport Layer
  • 5.1.3 Implementation of Connectionless Service
  • 5.1.4 Implementation of Connection-Oriented Service
  • 5.1.5 Comparison of Virtual-Circuit and Datagram Networks
  • 5.2 Routing Algorithms in a Single Network
  • 5.2.1 The Optimality Principle
  • 5.2.2 Shortest Path Algorithm
  • 5.2.3 Flooding
  • 5.2.4 Distance Vector Routing
  • 5.2.5 Link State Routing
  • 5.2.6 Hierarchical Routing within a Network
  • 5.2.7 Broadcast Routing
  • 5.2.8 Multicast Routing
  • 5.2.9 Anycast Routing
  • 5.3 Traffic Management at the Network Layer
  • 5.3.1 The Need for Traffic Management: Congestion
  • 5.3.2 Approaches to Traffic Management
  • 5.4 Quality of Service and Application QoE
  • 5.4.1 Application QoS Requirements
  • 5.4.2 Overprovisioning
  • 5.4.3 Packet Scheduling
  • 5.4.4 Integrated Services
  • 5.4.5 Differentiated Services
  • 5.5 Internetworking
  • 5.5.1 Internetworks: An Overview
  • 5.5.2 How Networks Differ
  • 5.5.3 Connecting Heterogeneous Networks
  • 5.5.4 Connecting Endpoints Across Heterogeneous Networks
  • 5.5.5 Internetwork Routing: Routing Across Multiple Networks
  • 5.5.6 Supporting Different Packet Sizes: Packet Fragmentation
  • 5.6 Software-Defined Networking
  • 5.6.1 Overview
  • 5.6.2 The SDN Control Plane: Logically Centralized Software Control
  • 5.6.3 The SDN Data Plane: Programmable Hardware
  • 5.6.4 Programmable Network Telemetry
  • 5.7 The Network Layer in the Internet
  • 5.7.1 The IP Version 4 Protocol
  • 5.7.2 IP Addresses
  • 5.7.3 IP Version 6
  • 5.7.4 Internet Control Protocols
  • 5.7.5 Label Switching and MPLS
  • 5.7.6 OSPF—An Interior Gateway Routing Protocol
  • 5.7.7 BGP—The Exterior Gateway Routing Protocol
  • 5.7.8 Internet Multicasting
  • 5.8 Policy at the Network Layer
  • 5.8.1 Peering Disputes
  • 5.8.2 Traffic Prioritization
  • 5.9 Summary
  • 6. The Transport Layer
  • 6.1 The Transport Service
  • 6.1.1 Services Provided to the Upper Layers
  • 6.1.2 Transport Service Primitives
  • 6.1.3 Berkeley Sockets
  • 6.1.4 An Example of Socket Programming: An Internet File Server
  • 6.2 Elements of Transport Protocols
  • 6.2.1 Addressing
  • 6.2.2 Connection Establishment
  • 6.2.3 Connection Release
  • 6.2.4 Error Control and Flow Control
  • 6.2.5 Multiplexing
  • 6.2.6 Crash Recovery
  • 6.3 Congestion Control
  • 6.3.1 Desirable Bandwidth Allocation
  • 6.3.2 Regulating the Sending Rate
  • 6.3.3 Wireless Issues
  • 6.4 The Internet Transport Protocols: UDP
  • 6.4.1 Introduction to UDP
  • 6.4.2 Remote Procedure Call
  • 6.4.3 Real-Time Transport Protocols
  • 6.5 The Internet Transport Protocols: TCP
  • 6.5.1 Introduction to TCP
  • 6.5.2 The TCP Service Model
  • 6.5.3 The TCP Protocol
  • 6.5.4 The TCP Segment Header
  • 6.5.5 TCP Connection Establishment
  • 6.5.6 TCP Connection Release
  • 6.5.7 TCP Connection Management Modeling
  • 6.5.8 TCP Sliding Window
  • 6.5.9 TCP Timer Management
  • 6.5.10 TCP Congestion Control
  • 6.5.11 TCP CUBIC
  • 6.6 Transport Protocols and Congestion Control
  • 6.6.1 QUIC: Quick UDP Internet Connections
  • 6.6.2 BBR: Congestion Control Based on Bottleneck Bandwidth
  • 6.6.3 The Future of TCP
  • 6.7 Performance Issues
  • 6.7.1 Performance Problems in Computer Networks
  • 6.7.2 Network Performance Measurement
  • 6.7.3 Measuring Access Network Throughput
  • 6.7.4 Measuring Quality of Experience
  • 6.7.5 Host Design for Fast Networks
  • 6.7.6 Fast Segment Processing
  • 6.7.7 Header Compression
  • 6.7.8 Protocols for Long Fat Networks
  • 6.8 Summary
  • 7. The Application Layer
  • 7.1 The Domain Name System (DNS)
  • 7.1.1 History and Overview
  • 7.1.2 The DNS Lookup Process
  • 7.1.3 The DNS Name Space and Hierarchy
  • 7.1.4 DNS Queries and Responses
  • 7.1.5 Name Resolution
  • 7.1.6 Hands on with DNS
  • 7.1.7 DNS Privacy
  • 7.1.8 Contention Over Names
  • 7.2 Electronic Mail
  • 7.2.1 Architecture and Services
  • 7.2.2 The User Agent
  • 7.2.3 Message Formats
  • 7.2.4 Message Transfer
  • 7.2.5 Final Delivery
  • 7.3 The World Wide Web
  • 7.3.1 Architectural Overview
  • 7.3.2 Static Web Objects
  • 7.3.3 Dynamic Web Pages and Web Applications
  • 7.3.4 HTTP and HTTPS
  • 7.3.5 Web Privacy
  • 7.4 Streaming Audio and Video
  • 7.4.1 Digital Audio
  • 7.4.2 Digital Video
  • 7.4.3 Streaming Stored Media
  • 7.4.4 Real-Time Streaming
  • 7.5 Content Delivery
  • 7.5.1 Content and Internet Traffic
  • 7.5.2 Server Farms and Web Proxies
  • 7.5.3 Content Delivery Networks
  • 7.5.4 Peer-to-Peer Networks
  • 7.5.5 Evolution of the Internet
  • 7.6 Summary
  • 8. Network Security
  • 8.1 Fundamentals of Network Security
  • 8.1.1 Fundamental Security Principles
  • 8.1.2 Fundamental Attack Principles
  • 8.1.3 From Threats to Solutions
  • 8.2 The Core Ingredients of an Attack
  • 8.2.1 Reconnaissance
  • 8.2.2 Sniffing and Snooping (with a Dash of Spoofing)
  • 8.2.3 Spoofing (beyond ARP)
  • 8.2.4 Disruption
  • 8.3 Firewalls and Intrusion Detection Systems
  • 8.3.1 Firewalls
  • 8.3.2 Intrusion Detection and Prevention
  • 8.4 Cryptography
  • 8.4.1 Introduction to Cryptography
  • 8.4.2 Two Fundamental Cryptographic Principles
  • 8.4.3 Substitution Ciphers
  • 8.4.4 Transposition Ciphers
  • 8.4.5 One-Time Pads
  • 8.5 Symmetric-Key Algorithms
  • 8.5.1 The Data Encryption Standard
  • 8.5.2 The Advanced Encryption Standard
  • 8.5.3 Cipher Modes
  • 8.6 Public-Key Algorithms
  • 8.6.1 RSA
  • 8.6.2 Other Public-Key Algorithms
  • 8.7 Digital Signatures
  • 8.7.1 Symmetric-Key Signatures
  • 8.7.2 Public-Key Signatures
  • 8.7.3 Message Digests
  • 8.7.4 The Birthday Attack
  • 8.8 Management of Public Keys
  • 8.8.1 Certificates
  • 8.8.2 X.509
  • 8.8.3 Public Key Infrastructures
  • 8.9 Authentication Protocols
  • 8.9.1 Authentication Based on a Shared Secret Key
  • 8.9.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange
  • 8.9.3 Authentication Using a Key Distribution Center
  • 8.9.4 Authentication Using Kerberos
  • 8.9.5 Authentication Using Public-Key Cryptography
  • 8.10 Communication Security
  • 8.10.1 IPsec
  • 8.10.2 Virtual Private Networks
  • 8.10.3 Wireless Security
  • 8.11 Email Security
  • 8.11.1 Pretty Good Privacy
  • 8.11.2 S/MIME
  • 8.12 Web Security
  • 8.12.1 Threats
  • 8.12.2 Secure Naming and DNSSEC
  • 8.12.3 Transport Layer Security
  • 8.12.4 Running Untrusted Code
  • 8.13 Social Issues
  • 8.13.1 Confidential and Anonymous Communication
  • 8.13.2 Freedom of Speech
  • 8.13.3 Copyright
  • 8.14 Summary
  • 9. Reading List and Bibliography
  • 9.1 Suggestions for Further Reading
  • 9.1.1 Introduction and General Works
  • 9.1.2 The Physical Layer
  • 9.1.3 The Data Link Layer
  • 9.1.4 The Medium Access Control Sublayer
  • 9.1.5 The Network Layer
  • 9.1.6 The Transport Layer
  • 9.1.7 The Application Layer
  • 9.1.8 Network Security
  • 9.2 Alphabetical Bibliography
  • Index
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • X
  • Z
  • About the authors
Show More

Additional information

Veldu vöru

Leiga á rafbók í 365 daga, Rafbók til eignar, Leiga á rafbók í 180 daga, Leiga á rafbók í 90 daga

Reviews

There are no reviews yet.

Be the first to review “Computer Networks, Global Edition”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð