"Computer networking" - Information and Links:

Computer networking

a top-down approach

Book's cover
The cover of “Computer networking” - Open Library.

"Computer networking" was published by Pearson in 2007 - Boston, it has 852 pages and the language of the book is English.


“Computer networking” Metadata:

  • Title: Computer networking
  • Authors:
  • Language: English
  • Number of Pages: 852
  • Publisher: Pearson
  • Publish Date:
  • Publish Location: Boston

“Computer networking” Subjects and Themes:

Edition Specifications:

  • Pagination: xxiv, 852 p. :

Edition Identifiers:

AI-generated Review of “Computer networking”:


"Computer networking" Table Of Contents:

  • 1- Computer Networks and the Internet
  • 2- What Is the Internet?
  • 3- A Nuts-and-Bolts Description
  • 4- A Services Description
  • 5- What Is a Protocol?
  • 6- The Network Edge
  • 7- Client and Server Programs
  • 8- Access Networks
  • 9- Physical Media
  • 10- The Network Core
  • 11- Circuit Switching and Packet Switching
  • 12- How Do Packets Make Their Way Through Packet-Switched Networks?
  • 13- ISPs and Internet Backbones
  • 14- Delay, Loss, and Throughput in Packet-Switched Networks
  • 15- Overview of Delay in Packet-Switched Networks
  • 16- Queuing Delay and Packet Loss
  • 17- End-to-End Delay
  • 18- Throughput in Computer Networks
  • 19- Protocol Layers and Their Service Models
  • 20- Layered Architecture
  • 21- Messages, Segments, Datagrams, and Frames
  • 22- Networks Under Attack
  • 23- History of Computer Networking and the Internet
  • 24- The Development of Packet Switching: 1961-1972
  • 25- Proprietary Networks and Internetworking: 1972-1980
  • 26- A Proliferation of Networks: 1980-1990
  • 27- The Internet Explosion: The 1990s
  • 28- Recent Developments
  • 29- Summary
  • 30- Road-Mapping This Book
  • 31- Homework Problems and Questions
  • 32- Problems
  • 33- Discussion Questions
  • 34- Ethereal Lab
  • 35- Interview: Leonard Kleinrock
  • 36- Application Layer
  • 37- Principles of Network Applications
  • 38- Network Application Architectures
  • 39- Processes Communicating
  • 40- Transport Services Available to Applications
  • 41- Transport Services Provided by the Internet
  • 42- Application-Layer Protocols
  • 43- Network Applications Covered in This Book
  • 44- The Web and HTTP
  • 45- Overview of HTTP
  • 46- Non-persistent and Persistent Connections
  • 47- HTTP Message Format
  • 48- User-Server Interaction: Cookies
  • 49- Web Caching
  • 50- The Conditional GET
  • 51- File Transfer: FTP
  • 52- FTP Commands and Replies
  • 53- Electronic Mail in the Internet
  • 54- SMTP
  • 55- Comparison with HTTP
  • 56- Mail Message Formats and MIME
  • 57- Mail Access Protocols
  • 58- DNS - The Internet's Directory Service
  • 59- Services Provided by DNS
  • 60- Overview of How DNS Works
  • 61- DNS Records and Messages
  • 62- Peer-to-Peer Applications
  • 63- P2P File Distribution
  • 64- Searching for Information in a P2P Community
  • 65- Case Study: P2P Internet Telephony with Skype
  • 66- Socket Programming with TCP
  • 67- Socket Programming with TCP
  • 68- An Example Client-Server Application in Java
  • 69- Socket Programming with UDP
  • 70- Summary
  • 71- Homework Problems and Questions
  • 72- Problems
  • 73- Discussion Questions
  • 74- Socket Programming Assignments
  • 75- Ethereal Labs
  • 76- Interview: Bram Cohen
  • 77- Transport Layer
  • 78- Introduction and Transport-Layer Services
  • 79- Relationship Between Transport and Network Layers
  • 80- Overview of the Transport Layer in the Internet
  • 81- Multiplexing and Demultiplexing
  • 82- Connectionless Transport: UDP
  • 83- UDP Segment Structure
  • 84- UDP Checksum
  • 85- Principles of Reliable Data Transfer
  • 86- Building a Reliable Data Transfer Protocol
  • 87- Pipelined Reliable Data Transfer Protocols
  • 88- Go-Back-N (GBN)
  • 89- Selective Repeat (SR)
  • 90- Connection-Oriented Transport: TCP
  • 91- The TCP Connection
  • 92- TCP Segment Structure
  • 93- Round-Trip Time Estimation and Timeout
  • 94- Reliable Data Transfer
  • 95- Flow Control
  • 96- TCP Connection Management
  • 97- Principles of Congestion Control
  • 98- The Causes and the Costs of Congestion
  • 99- Approaches to Congestion Control
  • 100- Network-Assisted Congestion-Control Example: ATM ABR Congestion Control
  • 101- TCP Congestion Control
  • 102- Fairness
  • 103- Summary
  • 104- Homework Problems and Questions
  • 105- Problems
  • 106- Discussion Questions
  • 107- Programming Assignments
  • 108- Ethereal Labs
  • 109- Interview: Sally Floyd
  • 110- The Network Layer
  • 111- Introduction
  • 112- Forwarding and Routing
  • 113- Network Service Models
  • 114- Virtual Circuit and Datagram Networks
  • 115- Virtual-Circuit Networks
  • 116- Datagram Networks
  • 117- Origins of VC and Datagram Networks
  • 118- What's Inside a Router?
  • 119- Input Ports
  • 120- Switching Fabric
  • 121- Output Ports
  • 122- Where Does Queuing Occur?
  • 123- The Internet Protocol (IP): Forwarding and Addressing in the Internet
  • 124- Datagram Format
  • 125- IPv4 Addressing
  • 126- Internet Control Message Protocol (ICMP)
  • 127- IPv6
  • 128- A Brief Introduction into IP Security VPNs
  • 129- Routing Algorithms
  • 130- The Link-State (LS) Routing Algorithm
  • 131- The Distance-Vector (DV) Routing Algorithm
  • 132- Hierarchical Routing
  • 133- Routing in the Internet
  • 134- Intra-AS Routing in the Internet: RIP
  • 135- Intra-AS Routing in the Internet: OSPF
  • 136- Inter-AS Routing: BGP
  • 137- Broadcast and Multicast Routing
  • 138- Broadcast Routing Algorithms
  • 139- Multicast
  • 140- Summary
  • 141- Homework Problems and Questions
  • 142- Problems
  • 143- Discussion Questions
  • 144- Programming Assignment
  • 145- Ethereal Labs
  • 146- Interview: Vinton G. Cerf
  • 147- The Link Layer and Local Area Networks
  • 148- Link Layer: Introduction and Services
  • 149- The Services Provided by the Link Layer
  • 150- Where Is the Link Layer Implemented?
  • 151- Error-Detection and -Correction Techniques
  • 152- Parity Checks
  • 153- Checksumming Methods
  • 154- Cyclic Redundancy Check (CRC)
  • 155- Multiple Access Protocols
  • 156- Channel Partitioning Protocols
  • 157- Random Access Protocols
  • 158- Taking-Turns Protocols
  • 159- Local Area Networks (LANs)
  • 160- Link-Layer Addressing
  • 161- MAC Addresses
  • 162- Address Resolution Protocol (ARP)
  • 163- Ethernet
  • 164- Ethernet Frame Structure
  • 165- CSMA/CD: Ethernet's Multiple Access Protocol
  • 166- Ethernet Technologies
  • 167- Link-Layer Switches
  • 168- Forwarding and Filtering
  • 169- Self-Learning
  • 170- Properties of Link-Layer Switching
  • 171- Switches Versus Routers
  • 172- PPP: The Point-to-Point Protocol
  • 173- PPP Data Framing
  • 174- Link Virtualization: A Network as a Link Layer
  • 175- Asynchronous Transfer Mode (ATM) Networks
  • 176- Multiprotocol Label Switching (MPLS)
  • 177- Summary
  • 178- Homework Problems and Questions
  • 179- Problems
  • 180- Discussion Questions
  • 181- Ethereal Labs
  • 182- Interview: Simon S. Lam
  • 183- Wireless and Mobile Networks
  • 184- Introduction
  • 185- Wireless Links and Network Characteristics
  • 186- CDMA
  • 187- WiFi: 802.11 Wireless LANs
  • 188- The 802.11 Architecture
  • 189- The 802.11 MAC Protocol
  • 190- The IEEE 802.11 Frame
  • 191- Mobility in the Same IP Subnet
  • 192- Advanced Features in 802.11
  • 193- Beyond 802.11: Bluetooth and WiMAX
  • 194- Cellular Internet Access
  • 195- An Overview of Cellular Architecture
  • 196- Cellular Standards and Technologies: A Brief Survey
  • 197- Mobility Management: Principles
  • 198- Addressing
  • 199- Routing to a Mobile Node
  • 200- Mobile IP
  • 201- Managing Mobility in Cellular Networks
  • 202- Routing Calls to a Mobile User
  • 203- Handoffs in GSM
  • 204- Wireless and Mobility: Impact on Higher-layer Protocols
  • 205- Summary
  • 206- Homework Problems and Questions
  • 207- Problems
  • 208- Discussion Questions
  • 209- Ethereal Labs
  • 210- Interview: Charlie Perkins
  • 211- Multimedia Networking
  • 212- Multimedia Networking Applications
  • 213- Examples of Multimedia Applications
  • 214- Hurdles for Multimedia in Today's Internet
  • 215- How Should the Internet Evolve to Support Multimedia Better?
  • 216- Audio and Video Compression
  • 217- Streaming Stored Audio and Video
  • 218- Accessing Audio and Video Through a Web Server
  • 219- Sending Multimedia from a Streaming Server to a Helper Application
  • 220- Real-Time Streaming Protocol (RTSP)
  • 221- Making the Best of the Best-Effort Service
  • 222- The Limitations of a Best-Effort Service
  • 223- Removing Jitter at the Receiver for Audio
  • 224- Recovering from Packet Loss
  • 225- Distributing Multimedia in Today's Internet: Content Distribution Networks
  • 226- Dimensioning Best-Effort Networks to Provide Quality of Service
  • 227- Protocols for Real-Time Interactive Applications
  • 228- RTP
  • 229- RTP Control Protocol (RTCP)
  • 230- SIP
  • 231- H.323
  • 232- Providing Multiple Classes of Service
  • 233- Motivating Scenarios
  • 234- Scheduling and Policing Mechanisms
  • 235- Diffserv
  • 236- Providing Quality of Service Guarantees
  • 237- A Motivating Example
  • 238- Resource Reservation, Call Admission, Call Setup
  • 239- Guaranteed QoS in the Internet: Intserv and RSVP
  • 240- Summary
  • 241- Homework Problems and Questions
  • 242- Problems
  • 243- Discussion Questions
  • 244- Programming Assignment
  • 245- Interview: Henning Schulzrinne
  • 246- Security in Computer Networks
  • 247- What Is Network Security?
  • 248- Principles of Cryptography
  • 249- Symmetric Key Cryptography
  • 250- Public Key Encryption
  • 251- Message Integrity
  • 252- Cryptographic Hash Functions
  • 253- Message Authentication Code
  • 254- Digital Signatures
  • 255- End-Point Authentication
  • 256- Authentication Protocol ap1.0
  • 257- Authentication Protocol ap2.0
  • 258- Authentication Protocol ap3.0
  • 259- Authentication Protocol ap3.1
  • 260- Authentication Protocol ap4.0
  • 261- Authentication Protocol ap5.0
  • 262- Securing E-mail
  • 263- Secure E-mail
  • 264- PGP
  • 265- Securing TCP Connections: SSL
  • 266- The Big Picture
  • 267- A More Complete Picture
  • 268- Network-Layer Security: IPsec
  • 269- Authentication Header (AH) Protocol
  • 270- The ESP Protocol
  • 271- SA and Key Management
  • 272- Securing Wireless LANs
  • 273- Wired Equivalent Privacy (WEP)
  • 274- IEEE 802.11i
  • 275- Operational Security: Firewalls and Intrusion Detection Systems
  • 276- Firewalls
  • 277- Intrusion Detection Systems
  • 278- Summary
  • 279- Homework Problems and Questions
  • 280- Problems
  • 281- Discussion Questions
  • 282- Ethereal Lab
  • 283- Interview: Steven M. Bellovin
  • 284- Network Management
  • 285- What Is Network Management?
  • 286- The Infrastructure for Network Management
  • 287- The Internet-Standard Management Framework
  • 288- Structure of Management Information: SMI
  • 289- Management Information Base: MIB
  • 290- SNMP Protocol Operations and Transport Mappings
  • 291- Security and Administration
  • 292- ASN.1
  • 293- Conclusion
  • 294- Homework Problems and Questions
  • 295- Problems
  • 296- Discussion Questions
  • 297- Interview: Jeff Case
  • 298- References
  • 299- Index

Read “Computer networking”:

Read “Computer networking” by choosing from the options below.

Search for “Computer networking” downloads:

Visit our Downloads Search page to see if downloads are available.

Borrow "Computer networking" Online:

Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.

Find “Computer networking” in Libraries Near You:

Read or borrow “Computer networking” from your local library.

Buy “Computer networking” online:

Shop for “Computer networking” on popular online marketplaces.


Related Books

Related Ebooks

Source: The Open Library

E-Books

Related Ebooks from the Open Library and The Internet Archive.

1Computer networking - Ebook

Please note that the files availability may be limited due to copyright restrictions.
Check the files availability here.

“Computer networking - Ebook” Metadata:

  • Title: Computer networking - Ebook