Networks for computer scientists and engineers / (Record no. 1920)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 12374cam a22001574a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0195113985 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | ZHE/N |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Zheng, Youlu. |
245 10 - TITLE STATEMENT | |
Title | Networks for computer scientists and engineers / |
Statement of responsibility, etc. | Youlu Zheng, Shakil Akhtar. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New York : |
Name of publisher, distributor, etc. | Oxford University Press, |
Date of publication, distribution, etc. | 2002. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvi, 575 p. : |
Dimensions | 24 cm. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 Introduction 1<br/>1.1 EVOLUTION OF DATA COMMUNICATIONS AND<br/>NETWORKS 2<br/>1.1.1 Changes in Telecommunications in the Late Twentieth<br/>Century 2<br/>1.1.2 The Progress and Future of Telecommunications 4<br/>1.1.3 Present Solutions 5<br/>1.2 TELEPHONE SYSTEMS AND COMPUTER TELEPHONY 6<br/>1.2.1 Telephone Functioning 7<br/>1.2.2 Telephone Networks 10<br/>1.2.3 Telephone Numbering 12<br/>1.3 COMPUTER TELEPHONY 14<br/>1.3.1 Overview of Computer Telephony 15<br/>1.3.2 Internet Telephony 18<br/>1.3.3 Unified Messaging 20<br/>1.3.4 Network Structures and Network Topologies 21<br/>1.4 DISTRIBUTED SYSTEMS AND CLIENT-SERVER<br/>MODELS 24<br/>1.4.1 Centralized Computing vs Distributed and Client-Server<br/>Systems 24<br/>1.4.2 Three-Tier Client-Server Systems 26<br/>1.4.3 Web-Based Application Servers and Electronic<br/>Commerce 28<br/>1.5 PROTOCOLS AND STANDARDIZATION 30<br/>1.5.1 Protocol Syntax and Semantics 30<br/>1.5.2 National and International Standards 31<br/>1.5.3 Telecommunication Standards and Organizations 31<br/>1.5.4 Networks Standards and Organizations 32<br/>ARTICLES 35<br/>RFCS 35<br/>WORLD WIDE WEB SITES 36<br/>Chapter 2 Data Communications<br/>2.1 ADVANTAGES OF DIGITAL COMMUNICATIONS 39<br/>2.2 TRANSMISSION MEDIA 41<br/>2.2.1 Shielded and Unshielded Twisted-Pair (STP and UTP)<br/>Wiring 41<br/>2.2.2 Coaxial Cable 42<br/>2.2.3 Optical Fiber 43<br/>2.2.4 Radio and Microwave 45<br/>2.2.5 Satellite Communications 46<br/>2.3 FUNDAMENTALS OF DIGITAL TRANSMISSION 49<br/>2.3.1 Frequency Spectrum, Bandwidth, and Data Rate 49<br/>2.3.2 Shannon's Law 53<br/>2.3.3 The Sampling (Nyquist) Theorem 55<br/>2.4 DIGITIZATION AND MULTILEVEL TRANSMISSION 56<br/>2.4.1 Pulse Code Modulation (PCM) 56<br/>2.4.2 Advanced Digitization Techniques: CPCM, DPCM, and<br/>ADPCM 59<br/>2.5 MODULATION TECHNIQUES AND MODEMS 60<br/>2.5.1 Amplitude Modulation 60<br/>2.5.2 Frequency Modulation 62<br/>2.5.3 Phase Modulation 63<br/>2.5.4 Modem Technologies 64<br/>2.6 TERMINAL DEVICES 67<br/>2.6.1 Dumb and Intelligent Terminals 67<br/>2.6.2 Data Terminal Equipment and Data Communications<br/>Equipment 68<br/>2.7 WIRELESS t2©MMUNICATION 71<br/>2.7.1 Digitdf Cellular Telephone and Personal Communication<br/>Services (PCS) 73<br/>2.7.2 Wireless Data Services 76<br/>2.7.3 Geographic Position Systems and Their Applications 81<br/>2.8 VIDEOCONFERENCING 85<br/>2.8.1 Desktop Videoconference Systems 86<br/>2.8.2 Document Conference Systems 87<br/>2.8.3 Videoconference Standards 88<br/>2.9 CHAPTER SUMMARY 92<br/>2.10 PROBLEMS 92<br/>2.11 REFERENCES 95<br/>BOOKS 95<br/>ARTICLES 96<br/>WORLD WIDE WEB SITES 96<br/>Chapter 3 The OSI Seven-Layer Network Model<br/>3.1 PHYSICAL LAYER 99<br/>3.1.1 Data Encoding 100<br/>3.1.2 Multiplexing Schemes 102<br/>3.2 DATA LINK LAYER 110<br/>3.2.1 Asynchronous and Synchronous Communications 110<br/>3.2.2 Error Detection and Correction 111<br/>3.2.3 Framing and Flow Control 115<br/>3.2.4 High-Level Data LinkvControl (HDLC) 121<br/>3.3 NETWORK LAYER 123<br/>3.3.1 Subnet Concept 123<br/>3.3.2 Overview of Switching Techniques 124<br/>3.3.3 Routing Strategies 127<br/>3.3.4 Congestion Control 128<br/>3.4 TRANSPORT LAYER AND SESSION LAYER 129<br/>3.5 PRESENTATION LAYER AND APPLICATION LAYER 129<br/>3.5.1 Data Compression 130<br/>3.5.2 Encryption and Decryption 135<br/>3.5.3 Network Applications 135<br/>3.6 NETWORK PERFORMANCE 136<br/>3.6.1 Delay 137<br/>3.6.2 Throughput 137<br/>3.6.3 Bandwidth Utilization 137<br/>3.6.4 Error Rate, Congestion, and Network Reliability 137<br/>3.7 CHAPTER SUMMARY 139<br/>3.8 PROBLEMS 140<br/>3.9 REFERENCES 144<br/>BOOKS 144<br/>WORLD WIDE WEB SITES 145<br/>Chapter 4 LAN Technologies<br/>4.1 LAN OVERVIEW 147<br/>4.2 PROTOCOLS AND STANDARDS 149<br/>4.2.1 IEEE Standards 149<br/>4.2.2 CSMA/CD, Ethernet, and IEEE 802.3 150<br/>4.2.3 Token Bus and IEEE 802.4 153<br/>4.2.4 Token Ring and IEEE 802.5 154<br/>4.2.5 Commercial LAN Systems 155<br/>4.2.6 Wireless LAN and IEEE 802.11 155<br/>4.3 LAN HARDWARE 156<br/>4.3.1 Connecting Components: Cabling, Connectors,<br/>Transceivers, Repeaters, and Network Interface<br/>Cards 156<br/>4.3.2 Workstations and Network Servers 160<br/>4.3.3 Network Storage Systems and Hierarchical Storage<br/>Management (HSM) 162<br/>4.4 LAN SERVICES AND LAN OPERATING SYSTEMS 168<br/>4.4.1 Network File System 168<br/>4.4.2 Network Directory Services 169<br/>4.4.3 Network Printing and Fax Services 170<br/>4.4.4 Backup 171<br/>4.4.5 LAN Operating Systems 173<br/>4.5 CHAPTER SUMMARY 180<br/>4.6 PROBLEMS 181<br/>4.7 REFERENCES 182<br/>BOOKS 182<br/>ARTICLES 184<br/>WORLD WIDE WEB SITES 184<br/>Chapters TCP/IP and the Internet 185<br/>5.1 INTERNET ARCHITECTURE 187<br/>5.1.1 Internet Addresses 187<br/>5.1.2 Gateway Addressing 188<br/>5.1.3 Network and Broadcast Addressing 188<br/>5.1.4 Dotted Decimal Notation 188<br/>5.1.5 Loopback Addressing 189<br/>5.1.6 Weaknesses in Internet Addressing 189<br/>5.1.7 Mapping of Physical and IP Addresses 189<br/>5.1.8 Reverse Address Resolution Protocol (RARP) 191<br/>5.2 INTERNET PROTOCOL (IP) AND DATAGRAMS 192<br/>5.2.1 IP Datagram Format and Types of Service 194<br/>5.2.2 Datagram Encapsulation and Fragmentation 195<br/>5.2.3 Reassembly and Fragmentation Control 196<br/>5.2.4 Other Fields 197<br/>5.2.5 Error and Internet Control Message Protocol (ICMP) 200<br/>5.2.6 IPv6 206<br/>5.3 ROUTING PROTOCOLS 208<br/>5.3.1 Routing Tables and Routing Mechanisms 208<br/>5.3.2 Subnet Routing 214<br/>5.3.3 Internet Routing 216<br/>5.4 USER DATAGRAM PROTOCOL(UDP) 218<br/>5.5 TRANSMISSION CONTROL PROTOCOL (TCP) 219<br/>5.5.1 TCP Headers and Services 220<br/>5.5.2 Connection Establishment and Termination 222<br/>5.5.3 Flow Control and Window Size Advertising 222<br/>5.5.4 TCP Time-Out and Retransmission 223<br/>5.6 INTERNET STANDARD SERVICES 223<br/>5.6.1 File Transfer Protocol (FTP) 224<br/>5.6.2 Simple Mail Transfer Protocol (SMTP) and<br/>Examples 224<br/>5.6.3 Post Office Protocol (POP3) 229<br/>5.6.4 Remote Login and Telnet 233<br/>5.7 DOMAIN NAME SYSTEM (DNS) 233<br/>5.7.1 Mapping Domain Names to IP Addresses 234<br/>5.7.2 DNS Messages 234<br/>5.7.3 Recent Advances in Internet Domain Name<br/>Hierarchy 235<br/>5.8 TCP/IP FOR PCS 236<br/>5.8.1 Serial Line Internet Protocol (SLIP) 236<br/>5.8.2 Point-to-Point (PPP) 236<br/>5.8.3 Winsock 238<br/>5.9 INTERNET APPLICATIONS 238<br/>5.9.1 World Wide Web (WWW) 238<br/>5.9.2 Recent Developments 240<br/>5.10 CHAPTER SUMMARY 242<br/>5.11 PROBLEMS 243<br/>5.12 REFERENCES 249<br/>BOOKS 249<br/>ARTICLES 250<br/>WORLD WIDE WEB SITES 250<br/>RFCS 251<br/>Chapter 6 Access and High-Speed Networking<br/>Technologies 252<br/>6.1 INTEGRATED SERVICE DIGITAL NETWORK (ISDN) 255<br/>6.1.1 ISDN Signaling and Architecture 255<br/>6.1.2 ISDN Protocols 257<br/>6.1.3 ISDN Advantages 258<br/>6.1.4 Broadband ISDN 259<br/>6.2 CABLE MODEM SYSTEMS 261<br/>6.3 DIGITAL SUBSCRIBER LINE (DSL) TECHNOLOGY 263<br/>6.4 SWITCHED MULTIMEGABIT DATA SERVICE (SMDS) 266<br/>6.4.1 SMDS Features 266<br/>6.4.2 SMDS Addressing and Protocols 269<br/>6.5 FRAME RELAY 272<br/>6.5.1 Protocol and Architecture 273<br/>6.5.2 Implementation 276<br/>6.5.3 Frame Relay Performance Analysis and Congestion<br/>Control 281<br/>6.5.4 Voice over Frame Relay 285<br/>6.5.5 Migration Toward ATM 286<br/>6.6 FAST ETHERNET, 1OOVG-ANYLAN, AND GIGABIT<br/>ETHERNET 288<br/>6.6.1 lOOVG-AnyLAN 288<br/>6.6.2 Fast Ethernet 290<br/>6.6.3 Gigabit and 10-Gigabit Ethernet 292<br/>6.7 FDDI AND CDDI 294<br/>6.8 ASYNCHRONOUS TRANSFER MODE (ATM)<br/>NETWORKS 298<br/>6.8.1 ATM Advantages 299<br/>6.8.2 ATM Protocol and ATM Layers 300<br/>6.8.3 ATM Switching 303<br/>6.8.4 ATM Internetworking with Frame Relay 303<br/>6.8.5 IP over ATM 304<br/>6.8.6 ATM Future 305<br/>6.9 SONET 306<br/>6.9.1 SONET Signals and Architecture 307<br/>6.9.2 SONET Layers and Frames 309<br/>6.9.3 SONET Overhead 310<br/>6.9.4 SONET Fault Tolerance 313<br/>6.10 DENSE WAVELENGTH DIVISION MULTIPLEXING<br/>(DWDM) COMMUNICATION 314<br/>6.11 CHAPTER SUMMARY 316<br/>6.12 PROBLEMS 317<br/>6.13 REFERENCES 318<br/>BOOKS 318<br/>WORLD WIDE WEB SITES 319<br/>Chapter 7 Switching and Virtual LAN 321<br/>7.1- HUB TECHNOLOGY 322<br/>7.1.1 Early Hubs 322<br/>7.1.2 Intelligent Hubs and Their Components 322<br/>7.1.3 Interconnecting LANs and Collapsed Backbone<br/>Networks 325<br/>7.2 SWITCHING TECHNOLOGY FOR LAN AND<br/>INTERNETWORKING 327<br/>7.2.1 Switching Architectures 329<br/>7.2.2 Ethernet Switches 331<br/>7.2.3 Token Ring Switches 333<br/>7.2.4 FDDI Switches 336<br/>7.2.5 Switching Network Management 337<br/>7.3 NON-ATM VIRTUAL LANS 338<br/>7.3.1 Segment-Based VLAN 339<br/>7.3.2 MAC-Based VLAN 339<br/>7.3.3 IP-Address-Based VLAN 340<br/>7.4 ATM VIRTUAL LAN 343<br/>7.4.1 ATM LAN Emulation 343<br/>7.4.2 ATM Edge Routers 344<br/>7.4.3 ATM Virtual Routers 346<br/>7.4.4 ATM Relational Networks 347<br/>7.5 IEEE 802.1 Q VLAN STANDARD 349<br/>7.6 CHAPTER SUMMARY 350<br/>7.7 PROBLEMS 350<br/>7.8 REFERENCES 352<br/>BOOKS 352<br/>WORLD WIDE WEB SITES 352<br/>Chapter 8 Network Performance 353<br/>8.1 WHY STUDY NETWORK PERFORMANCE? 353<br/>8.2 ANALYTICAL APPROACHES 355<br/>8.2.1 Delay Throughput Analysis 355<br/>8.2.2 Probability Techniques 358<br/>8.2.3 Queuing Theory Techniques 364<br/>8.2.4 Markov Models 372<br/>8.2.5 Reliability Models 376<br/>8.3 SIMULATION 379<br/>8.3.1 Continuous Simulation 381<br/>8.3.2 Discrete Event Simulation (DEVS) 381<br/>8.3.3 Web-Based Simulation 382<br/>8.3.4 Simulation Models 387<br/>8.4 NETWORK TRAFFIC MONITORING 398<br/>8.4.1 Windows-Based Traffic Monitoring 398<br/>8.4.2 Ethernet Traffic Monitoring 402<br/>8.5 CHAPTER SUMMARY 406<br/>8.6 PROBLEMS 407<br/>8.7 REFERENCES 413<br/>BOOKS 413<br/>WORLD WIDE WEB SITES 414<br/>Chapter 9 Network Management 415<br/>9.1 SNMP 418<br/>9.1.1 Introduction 418<br/>9.1.2 SNMP Model 418<br/>9.1.3 Structure of Management Information 420<br/>9.1.4 SNMPv2 421<br/>9.1.5 SNMPv3 424<br/>9.2 RMON AND RMONV2 425<br/>9.2.1 RMON Model 426<br/>9.2.2 RM0N2 428<br/>9.3 TMN 429<br/>9.3.1 Physical Architecture 431<br/>9.3.2 Interfaces 432<br/>9.3.3 Differences Between TMN and OSI 433<br/>9.4 DIRECTORY SERVICES AND NETWORK<br/>MANAGEMENT 433<br/>9.5 WEB-BASED NETWORK MANAGEMENT 437<br/>9.6 CHAPTER SUMMARY 438<br/>9.7 PROBLEMS 439<br/>9.8 REFERENCES 440<br/>BOOKS 440<br/>WORLD WIDE WEB SITES 440<br/>chapter 10 Communication and Network Security 441<br/>10.1 CRYPTOGRAPHY 444<br/>10.1.1 Secret Key Cryptography 444<br/>10.1.2 Public Key Cryptography 447<br/>10.1.3 The Data Encryption Standard ODES) and Advanced<br/>Encryption Standard (AES) 451<br/>10.1.4 Seri^ Encryption 454<br/>10.1.5 Link-Level, Network-Level, and Application-Level<br/>Encryption 455<br/>10.1.6 Digital Signatures, Message Digest (MD5), and Digital<br/>Certification 457<br/>10.1.7 Pretty Good Privacy (PGP) for E-mail 460<br/>10.1.8 Write Your Onw Encryption Algorithms 461<br/>10.2 DIGITAL CERTIFICATE AND PUBLIC KEY<br/>INFRASTRUCTURE (PKI) 461<br/>10.3 FIREWALLS 464<br/>10.3.1 Packet-Filtering Principle 466<br/>10.3.2 Router-Based Packet-Filtering Firewalls 469<br/>10.3.3 Application Gateway Firewalls 471<br/>10.3.4 Circuit Gateway Firewalls 472<br/>10.3.5 Firewall Architectures 472<br/>10.4 KERBEROS 475<br/>10.5 SECURE SOCKET LAYER (SSL) AND VIRTUAL PRIVATE<br/>NETWORK (VPN) 478<br/>10.5.1 Secure Sockets Layer (SSL) Protocol 478<br/>10.5.2 Virtual Private Network 479<br/>10.6 NEW TECHNOLOGIES IN NETWORK SECURITY<br/>APPLICATIONS 487<br/>10.6.1 Internet Commerce and Electronic Money 488<br/>10.6.2 Secure Containers for Electronic Publishing 488<br/>10.6.3 Smart Cards and Secure Electronic Transactions<br/>(SET) 490<br/>10.6.4 Random One-Time-Pad and No-Key Encryption 492<br/>10.7 CHAPTER SUMMARY 493<br/>10.8 PROBLEMS 494<br/>•10.9 REFERENCES 495<br/>BOOKS 495<br/>ARTICLES, PAPERS, AND PUBLIC DOCUMENTS 496<br/>WORLD WIDE WEB SITES 497<br/>INFORMATION ON FIREWALLS 49/<br/>Chapter 11 Network Programming 498<br/>11.1 SOFTWARE ARCHITECTURES THAT SUPPORT NETWORK<br/>PROGRAMMING 499<br/>11.1.1 Mainframe Architecture 499<br/>11.1.2 File-Sharing Architecture 499<br/>11.1.3 Peer-to-Peer Architecture 499<br/>11.1.4 Client/Server Architecture 500<br/>11.1.5 Two-Tier Architecture 501<br/>11.1.6 Three-Tier Architecture 501<br/>11.2 SERIAL PORT AND PARALLEL PORT<br/>PROGRAMMING 504<br/>11.2.1 Serial Port Programming 504<br/>11.2.2 Parallel Port Programming 512<br/>11.3 NETBIOS PROGRAMMING 514<br/>11.4 TCP/IP AND SOCKET PROGRAMMING 517<br/>11.4.1 Interprocess Communication and Pipes 518<br/>11.4.2 Creation of Sockets 519<br/>11.4.3 Using Internet Library and DNS 521<br/>11.4.4 Socket Connection between Client and Server 524<br/>11.4.5 Blocking, Synchronization, and Timing 530<br/>11.4.6 Sample Client/Server Programs 532<br/>11.5 WINSOCK PROGRAMMING 540<br/>11.5.1 Using Winsock 541<br/>11.5.2 Example Program 543<br/>11.6 RPC PROGRAMMING 544<br/>11.7 JAVA PROGRAMMING 548<br/>11.8 CHAPTER SUMMARY 553<br/>11.9 PROBLEMS 554<br/>11.10 REFERENCES 556<br/>BOOKS 556<br/>ARTICLES 557<br/>WORLD WIDE WEB SITES 557 |
650 #0 - SUBJECT | |
Keyword | Computer Networks. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 01/06/2016 | 004.6 ZHE/N | P19510 | 14/07/2018 | 14/07/2018 | General Books | ||||
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 01/06/2016 | 004.6 ZHE/N | P19508 | 14/07/2018 | 14/07/2018 | General Books |