Computer networking
a top-down approach
By James F. Kurose and Keith W. Ross

"Computer networking" was published by Pearson in 2007 - Boston, it has 852 pages and the language of the book is English.
“Computer networking” Metadata:
- Title: Computer networking
- Authors: James F. KuroseKeith W. Ross
- Language: English
- Number of Pages: 852
- Publisher: Pearson
- Publish Date: 2007
- Publish Location: Boston
“Computer networking” Subjects and Themes:
- Subjects: ➤ Computer networks - Internet - Rechnernetz - Datanät - Datakommunikation - Computer Communication Networks - Réseaux d'ordinateurs - Computers and IT - Redes de computadores - Tk5105.875.i57 k88 2010 - 004.6
Edition Specifications:
- Pagination: xxiv, 852 p. :
Edition Identifiers:
- The Open Library ID: OL17955154M - OL56272W
- Online Computer Library Center (OCLC) ID: 79004271
- Library of Congress Control Number (LCCN): 2007002094
- ISBN-13: 9780321497703
- ISBN-10: 0321497708
- All ISBNs: 0321497708 - 9780321497703
AI-generated Review of “Computer networking”:
"Computer networking" Table Of Contents:
- 1- Computer Networks and the Internet
- 2- What Is the Internet?
- 3- A Nuts-and-Bolts Description
- 4- A Services Description
- 5- What Is a Protocol?
- 6- The Network Edge
- 7- Client and Server Programs
- 8- Access Networks
- 9- Physical Media
- 10- The Network Core
- 11- Circuit Switching and Packet Switching
- 12- How Do Packets Make Their Way Through Packet-Switched Networks?
- 13- ISPs and Internet Backbones
- 14- Delay, Loss, and Throughput in Packet-Switched Networks
- 15- Overview of Delay in Packet-Switched Networks
- 16- Queuing Delay and Packet Loss
- 17- End-to-End Delay
- 18- Throughput in Computer Networks
- 19- Protocol Layers and Their Service Models
- 20- Layered Architecture
- 21- Messages, Segments, Datagrams, and Frames
- 22- Networks Under Attack
- 23- History of Computer Networking and the Internet
- 24- The Development of Packet Switching: 1961-1972
- 25- Proprietary Networks and Internetworking: 1972-1980
- 26- A Proliferation of Networks: 1980-1990
- 27- The Internet Explosion: The 1990s
- 28- Recent Developments
- 29- Summary
- 30- Road-Mapping This Book
- 31- Homework Problems and Questions
- 32- Problems
- 33- Discussion Questions
- 34- Ethereal Lab
- 35- Interview: Leonard Kleinrock
- 36- Application Layer
- 37- Principles of Network Applications
- 38- Network Application Architectures
- 39- Processes Communicating
- 40- Transport Services Available to Applications
- 41- Transport Services Provided by the Internet
- 42- Application-Layer Protocols
- 43- Network Applications Covered in This Book
- 44- The Web and HTTP
- 45- Overview of HTTP
- 46- Non-persistent and Persistent Connections
- 47- HTTP Message Format
- 48- User-Server Interaction: Cookies
- 49- Web Caching
- 50- The Conditional GET
- 51- File Transfer: FTP
- 52- FTP Commands and Replies
- 53- Electronic Mail in the Internet
- 54- SMTP
- 55- Comparison with HTTP
- 56- Mail Message Formats and MIME
- 57- Mail Access Protocols
- 58- DNS - The Internet's Directory Service
- 59- Services Provided by DNS
- 60- Overview of How DNS Works
- 61- DNS Records and Messages
- 62- Peer-to-Peer Applications
- 63- P2P File Distribution
- 64- Searching for Information in a P2P Community
- 65- Case Study: P2P Internet Telephony with Skype
- 66- Socket Programming with TCP
- 67- Socket Programming with TCP
- 68- An Example Client-Server Application in Java
- 69- Socket Programming with UDP
- 70- Summary
- 71- Homework Problems and Questions
- 72- Problems
- 73- Discussion Questions
- 74- Socket Programming Assignments
- 75- Ethereal Labs
- 76- Interview: Bram Cohen
- 77- Transport Layer
- 78- Introduction and Transport-Layer Services
- 79- Relationship Between Transport and Network Layers
- 80- Overview of the Transport Layer in the Internet
- 81- Multiplexing and Demultiplexing
- 82- Connectionless Transport: UDP
- 83- UDP Segment Structure
- 84- UDP Checksum
- 85- Principles of Reliable Data Transfer
- 86- Building a Reliable Data Transfer Protocol
- 87- Pipelined Reliable Data Transfer Protocols
- 88- Go-Back-N (GBN)
- 89- Selective Repeat (SR)
- 90- Connection-Oriented Transport: TCP
- 91- The TCP Connection
- 92- TCP Segment Structure
- 93- Round-Trip Time Estimation and Timeout
- 94- Reliable Data Transfer
- 95- Flow Control
- 96- TCP Connection Management
- 97- Principles of Congestion Control
- 98- The Causes and the Costs of Congestion
- 99- Approaches to Congestion Control
- 100- Network-Assisted Congestion-Control Example: ATM ABR Congestion Control
- 101- TCP Congestion Control
- 102- Fairness
- 103- Summary
- 104- Homework Problems and Questions
- 105- Problems
- 106- Discussion Questions
- 107- Programming Assignments
- 108- Ethereal Labs
- 109- Interview: Sally Floyd
- 110- The Network Layer
- 111- Introduction
- 112- Forwarding and Routing
- 113- Network Service Models
- 114- Virtual Circuit and Datagram Networks
- 115- Virtual-Circuit Networks
- 116- Datagram Networks
- 117- Origins of VC and Datagram Networks
- 118- What's Inside a Router?
- 119- Input Ports
- 120- Switching Fabric
- 121- Output Ports
- 122- Where Does Queuing Occur?
- 123- The Internet Protocol (IP): Forwarding and Addressing in the Internet
- 124- Datagram Format
- 125- IPv4 Addressing
- 126- Internet Control Message Protocol (ICMP)
- 127- IPv6
- 128- A Brief Introduction into IP Security VPNs
- 129- Routing Algorithms
- 130- The Link-State (LS) Routing Algorithm
- 131- The Distance-Vector (DV) Routing Algorithm
- 132- Hierarchical Routing
- 133- Routing in the Internet
- 134- Intra-AS Routing in the Internet: RIP
- 135- Intra-AS Routing in the Internet: OSPF
- 136- Inter-AS Routing: BGP
- 137- Broadcast and Multicast Routing
- 138- Broadcast Routing Algorithms
- 139- Multicast
- 140- Summary
- 141- Homework Problems and Questions
- 142- Problems
- 143- Discussion Questions
- 144- Programming Assignment
- 145- Ethereal Labs
- 146- Interview: Vinton G. Cerf
- 147- The Link Layer and Local Area Networks
- 148- Link Layer: Introduction and Services
- 149- The Services Provided by the Link Layer
- 150- Where Is the Link Layer Implemented?
- 151- Error-Detection and -Correction Techniques
- 152- Parity Checks
- 153- Checksumming Methods
- 154- Cyclic Redundancy Check (CRC)
- 155- Multiple Access Protocols
- 156- Channel Partitioning Protocols
- 157- Random Access Protocols
- 158- Taking-Turns Protocols
- 159- Local Area Networks (LANs)
- 160- Link-Layer Addressing
- 161- MAC Addresses
- 162- Address Resolution Protocol (ARP)
- 163- Ethernet
- 164- Ethernet Frame Structure
- 165- CSMA/CD: Ethernet's Multiple Access Protocol
- 166- Ethernet Technologies
- 167- Link-Layer Switches
- 168- Forwarding and Filtering
- 169- Self-Learning
- 170- Properties of Link-Layer Switching
- 171- Switches Versus Routers
- 172- PPP: The Point-to-Point Protocol
- 173- PPP Data Framing
- 174- Link Virtualization: A Network as a Link Layer
- 175- Asynchronous Transfer Mode (ATM) Networks
- 176- Multiprotocol Label Switching (MPLS)
- 177- Summary
- 178- Homework Problems and Questions
- 179- Problems
- 180- Discussion Questions
- 181- Ethereal Labs
- 182- Interview: Simon S. Lam
- 183- Wireless and Mobile Networks
- 184- Introduction
- 185- Wireless Links and Network Characteristics
- 186- CDMA
- 187- WiFi: 802.11 Wireless LANs
- 188- The 802.11 Architecture
- 189- The 802.11 MAC Protocol
- 190- The IEEE 802.11 Frame
- 191- Mobility in the Same IP Subnet
- 192- Advanced Features in 802.11
- 193- Beyond 802.11: Bluetooth and WiMAX
- 194- Cellular Internet Access
- 195- An Overview of Cellular Architecture
- 196- Cellular Standards and Technologies: A Brief Survey
- 197- Mobility Management: Principles
- 198- Addressing
- 199- Routing to a Mobile Node
- 200- Mobile IP
- 201- Managing Mobility in Cellular Networks
- 202- Routing Calls to a Mobile User
- 203- Handoffs in GSM
- 204- Wireless and Mobility: Impact on Higher-layer Protocols
- 205- Summary
- 206- Homework Problems and Questions
- 207- Problems
- 208- Discussion Questions
- 209- Ethereal Labs
- 210- Interview: Charlie Perkins
- 211- Multimedia Networking
- 212- Multimedia Networking Applications
- 213- Examples of Multimedia Applications
- 214- Hurdles for Multimedia in Today's Internet
- 215- How Should the Internet Evolve to Support Multimedia Better?
- 216- Audio and Video Compression
- 217- Streaming Stored Audio and Video
- 218- Accessing Audio and Video Through a Web Server
- 219- Sending Multimedia from a Streaming Server to a Helper Application
- 220- Real-Time Streaming Protocol (RTSP)
- 221- Making the Best of the Best-Effort Service
- 222- The Limitations of a Best-Effort Service
- 223- Removing Jitter at the Receiver for Audio
- 224- Recovering from Packet Loss
- 225- Distributing Multimedia in Today's Internet: Content Distribution Networks
- 226- Dimensioning Best-Effort Networks to Provide Quality of Service
- 227- Protocols for Real-Time Interactive Applications
- 228- RTP
- 229- RTP Control Protocol (RTCP)
- 230- SIP
- 231- H.323
- 232- Providing Multiple Classes of Service
- 233- Motivating Scenarios
- 234- Scheduling and Policing Mechanisms
- 235- Diffserv
- 236- Providing Quality of Service Guarantees
- 237- A Motivating Example
- 238- Resource Reservation, Call Admission, Call Setup
- 239- Guaranteed QoS in the Internet: Intserv and RSVP
- 240- Summary
- 241- Homework Problems and Questions
- 242- Problems
- 243- Discussion Questions
- 244- Programming Assignment
- 245- Interview: Henning Schulzrinne
- 246- Security in Computer Networks
- 247- What Is Network Security?
- 248- Principles of Cryptography
- 249- Symmetric Key Cryptography
- 250- Public Key Encryption
- 251- Message Integrity
- 252- Cryptographic Hash Functions
- 253- Message Authentication Code
- 254- Digital Signatures
- 255- End-Point Authentication
- 256- Authentication Protocol ap1.0
- 257- Authentication Protocol ap2.0
- 258- Authentication Protocol ap3.0
- 259- Authentication Protocol ap3.1
- 260- Authentication Protocol ap4.0
- 261- Authentication Protocol ap5.0
- 262- Securing E-mail
- 263- Secure E-mail
- 264- PGP
- 265- Securing TCP Connections: SSL
- 266- The Big Picture
- 267- A More Complete Picture
- 268- Network-Layer Security: IPsec
- 269- Authentication Header (AH) Protocol
- 270- The ESP Protocol
- 271- SA and Key Management
- 272- Securing Wireless LANs
- 273- Wired Equivalent Privacy (WEP)
- 274- IEEE 802.11i
- 275- Operational Security: Firewalls and Intrusion Detection Systems
- 276- Firewalls
- 277- Intrusion Detection Systems
- 278- Summary
- 279- Homework Problems and Questions
- 280- Problems
- 281- Discussion Questions
- 282- Ethereal Lab
- 283- Interview: Steven M. Bellovin
- 284- Network Management
- 285- What Is Network Management?
- 286- The Infrastructure for Network Management
- 287- The Internet-Standard Management Framework
- 288- Structure of Management Information: SMI
- 289- Management Information Base: MIB
- 290- SNMP Protocol Operations and Transport Mappings
- 291- Security and Administration
- 292- ASN.1
- 293- Conclusion
- 294- Homework Problems and Questions
- 295- Problems
- 296- Discussion Questions
- 297- Interview: Jeff Case
- 298- References
- 299- Index
Read “Computer networking”:
Read “Computer networking” by choosing from the options below.
Search for “Computer networking” downloads:
Visit our Downloads Search page to see if downloads are available.
Borrow "Computer networking" Online:
Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.
- Is Online Borrowing Available: Yes
- Preview Status: restricted
- Check if available: The Open Library & The Internet Archive
Find “Computer networking” in Libraries Near You:
Read or borrow “Computer networking” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Computer networking” at a library near you.
Buy “Computer networking” online:
Shop for “Computer networking” on popular online marketplaces.