Computer networks : (Record no. 195209)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 09942cam a2200181 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781259001567 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | FOR/C |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Forouzan, Behrouz A. |
245 10 - TITLE STATEMENT | |
Title | Computer networks : |
Sub title | a top-down approach/ |
Statement of responsibility, etc. | Behrouz A. Forouzan and Firouz Mosharraf. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New York, NY : |
Name of publisher, distributor, etc. | McGraw-Hill, |
Date of publication, distribution, etc. | c2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiii, 931 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: ch. 1 Introduction --<br/>1.1. Overview of the Internet --<br/>1.1.1. Networks --<br/>1.1.2. Switching --<br/>1.1.3. Internet --<br/>1.1.4. Accessing the Internet --<br/>1.1.5. Hardware and Software --<br/>1.2. Protocol Layering --<br/>1.2.1. Scenarios --<br/>1.2.2. TCP/IP Protocol Suite --<br/>1.2.3. OSI Model --<br/>1.3. Internet History --<br/>1.3.1. Early History --<br/>1.3.2. Birth of the Internet --<br/>1.3.3. Internet Today --<br/>1.4. Standards and Administration --<br/>1.4.1. Internet Standards --<br/>1.4.2. Internet Administration --<br/>1.5. End-Chapter Materials --<br/>1.5.1. Further Reading --<br/>1.5.2. Key Terms --<br/>1.5.3. Summary --<br/>1.6. Practice Set --<br/>1.6.1. Quizzes --<br/>1.6.2. Questions --<br/>1.6.3. Problems --<br/>1.7. Simulation Experiments --<br/>1.7.1. Applets --<br/>1.7.2. Lab Assignments --<br/>ch. 2 Application Layer --<br/>2.1. Introduction --<br/>2.1.1. Providing Services --<br/>2.1.2. Application-Layer Paradigms --<br/>2.2. Client-Server Paradigm --<br/>2.2.1. Application Programming Interface --<br/>2.2.2. Using Services of the Transport Layer --<br/>2.3. Standard Client-Server Applications --<br/>2.3.1. World Wide Web and HTTP --<br/>2.3.2. FTP --<br/>2.3.3. Electronic Mail --<br/>2.3.4. Telnet --<br/>2.3.5. Secure Shell (SSH) --<br/>2.3.6. Domain Name System (DNS) --<br/>2.4. Peer-to-Peer Paradigm --<br/>2.4.1. P2P Networks --<br/>2.4.2. Distributed Hash Table (DHT) --<br/>2.4.3. Chord --<br/>2.4.4. Pastry --<br/>2.4.5. Kademlia --<br/>2.4.6. Popular P2P Network: BitTorrent --<br/>2.5. Socket Interface Programming --<br/>2.5.1. Socket Interface in C --<br/>2.6. End-Chapter Materials --<br/>2.6.1. Further Reading --<br/>2.6.2. Key Terms --<br/>2.6.3. Summary --<br/>2.7. Practice Set --<br/>2.7.1. Quizzes --<br/>2.7.2. Questions --<br/>2.7.3. Problems --<br/>2.8. Simulation Experiments --<br/>2.8.1. Applets --<br/>2.8.2. Lab Assignments --<br/>2.9. Programming Assignment --<br/>ch. 3 Transport Layer --<br/>3.1. Introduction --<br/>3.1.1. Transport-Layer Services --<br/>3.2. Transport-Layer Protocols --<br/>3.2.1. Simple Protocol --<br/>3.2.2. Stop-and-Wait Protocol --<br/>3.2.3. Go-Back-N Protocol (GBN) --<br/>3.2.4. Selective-Repeat Protocol --<br/>3.2.5. Bidirectional Protocols: Piggybacking --<br/>3.2.6. Internet Transport-Layer Protocols --<br/>3.3. User Datagram Protocol (UDP) --<br/>3.3.1. User Datagram --<br/>3.3.2. UDP Services --<br/>3.3.3. UDP Applications --<br/>3.4. Transmission Control Protocol (TCP) --<br/>3.4.1. TCP Services --<br/>3.4.2. TCP Features --<br/>3.4.3. Segment --<br/>3.4.4. TCP Connection --<br/>3.4.5. State Transition Diagram --<br/>3.4.6. Windows in TCP --<br/>3.4.7. Flow Control --<br/>3.4.8. Error Control --<br/>3.4.9. TCP Congestion Control --<br/>3.4.10. TCP Timers --<br/>3.4.11. Options --<br/>3.5. End-Chapter Materials --<br/>3.5.1. Further Reading --<br/>3.5.2. Key Terms --<br/>3.5.3. Summary --<br/>3.6. Practice Set --<br/>3.6.1. Quizzes --<br/>3.6.2. Questions --<br/>3.6.3. Problems --<br/>3.7. Simulation Experiments --<br/>3.7.1. Applets --<br/>3.7.2. Lab Assignments --<br/>3.8. Programming Assignment --<br/>ch. 4 Network Layer --<br/>4.1. Introduction --<br/>4.1.1. Network-Layer Services --<br/>4.1.2. Packet Switching --<br/>4.1.3. Network-Layer Performance --<br/>4.1.4. Network-Layer Congestion --<br/>4.1.5. Structure of A Router --<br/>4.2. Network-Layer Protocols --<br/>4.2.1. IPv4 Datagram Format --<br/>4.2.2. IPv4 Addresses --<br/>4.2.3. Forwarding of IP Packets --<br/>4.2.4. ICMPv4 --<br/>4.3. Unicast Routing --<br/>4.3.1. General Idea --<br/>4.3.2. Routing Algorithms --<br/>4.3.3. Unicast Routing Protocols --<br/>4.4. Multicast Routing --<br/>4.4.1. Introduction --<br/>4.4.2. Multicasting Basics --<br/>4.4.3. Intradomain Routing Protocols --<br/>4.4.4. Interdomain Routing Protocols --<br/>4.5. Next Generation IP --<br/>4.5.1. Packet Format --<br/>4.5.2. IPv6 Addressing --<br/>4.5.3. Transition from IPv4 to IPv6 --<br/>4.5.4. ICMPv6 --<br/>4.6. End-Chapter Materials --<br/>4.6.1. Further Reading --<br/>4.6.2. Key Terms --<br/>4.6.3. Summary --<br/>4.7. Practice Set --<br/>4.7.1. Quizzes --<br/>4.7.2. Questions --<br/>4.7.3. Problems --<br/>4.8. Simulation Experiments --<br/>4.8.1. Applets --<br/>4.8.2. Lab Assignments --<br/>4.9. Programming Assignment --<br/>ch. 5 Data-Link Layer: Wired Networks --<br/>5.1. Introduction --<br/>5.1.1. Nodes and Links --<br/>5.1.2. Two Types of Links --<br/>5.1.3. Two Sublayers --<br/>5.2. Data Link Control (DLC) --<br/>5.2.1. Framing --<br/>5.2.2. Flow and Error Control --<br/>5.2.3. Error Detection and Correction --<br/>5.2.4. Two DLC Protocols --<br/>5.3. Multiple Access Protocols --<br/>5.3.1. Random Access --<br/>5.3.2. Controlled Access --<br/>5.3.3. Channelization --<br/>5.4. Link-Layer Addressing --<br/>5.5. Wired Lans: Ethernet Protocol --<br/>5.5.1. IEEE Project 802 --<br/>5.5.2. Standard Ethernet --<br/>5.5.3. Fast Ethernet (100 Mbps) --<br/>5.5.4. Gigabit Ethernet --<br/>5.5.5. 10-Gigabit Ethernet --<br/>5.5.6. Virtual LANs --<br/>5.6. Other Wired Networks --<br/>5.6.1. Point-to-Point Networks --<br/>5.6.2. Sonet --<br/>5.6.3. Switched Network: ATM --<br/>5.7. Connecting Devices --<br/>5.7.1. Repeaters or Hubs --<br/>5.7.2. Link-Layer Switches --<br/>5.7.3. Routers --<br/>5.8. End-Chapter Materials --<br/>5.8.1. Recommended Reading --<br/>5.8.2. Key Terms --<br/>5.8.3. Summary --<br/>5.9. Practice Set --<br/>5.9.1. Quizzes --<br/>5.9.2. Questions --<br/>5.9.3. Problems --<br/>5.10. Simulation Experiments --<br/>5.10.1. Applets --<br/>5.10.2. Lab Assignments --<br/>5.11. Programming Assignments --<br/>ch. 6 Wireless Networks and Mobile IP --<br/>6.1. Wireless LANs --<br/>6.1.1. Introduction --<br/>6.1.2. IEEE 802.11 Project --<br/>6.1.3. Bluetooth --<br/>6.1.4. WiMAX --<br/>6.2. Other Wireless Networks --<br/>6.2.1. Channelization --<br/>6.2.2. Cellular Telephony --<br/>6.2.3. Satellite Networks --<br/>6.3. Mobile IP --<br/>6.3.1. Addressing --<br/>6.3.2. Agents --<br/>6.3.3. Three Phases --<br/>6.3.4. Inefficiency in Mobile IP --<br/>6.4. End-Chapter Materials --<br/>6.4.1. Further Reading --<br/>6.4.2. Key Terms --<br/>6.4.3. Summary --<br/>6.5. Practice Set --<br/>6.5.1. Quizzes --<br/>6.5.2. Questions --<br/>6.5.3. Problems --<br/>6.6. Simulation Experiments --<br/>6.6.1. Applets --<br/>6.6.2. Lab Assignments --<br/>6.7. Programming Assignment --<br/>ch. 7 Physical Layer and Transmission Media --<br/>7.1. Data and Signals --<br/>7.1.1. Analog and Digital --<br/>7.1.2. Transmission Impairment --<br/>7.1.3. Data Rate Limits --<br/>7.1.4. Performance --<br/>7.2. Digital Transmission --<br/>7.2.1. Digital-to-Digital Conversion --<br/>7.2.2. Analog-to-Digital Conversion --<br/>7.3. Analog Transmission --<br/>7.3.1. Digital-to-Analog Conversion --<br/>7.3.2. Analog-to-Analog Conversion --<br/>7.4. Bandwidth Utilization --<br/>7.4.1. Multiplexing --<br/>7.4.2. Spread Spectrum --<br/>7.5. Transmission Media --<br/>7.5.1. Guided Media --<br/>7.5.2. Unguided Media: Wireless --<br/>7.6. End-Chapter Materials --<br/>7.6.1. Recommended Reading --<br/>7.6.2. Key Terms --<br/>7.6.3. Summary --<br/>7.7. Practice Set --<br/>7.7.1. Quizzes --<br/>7.7.2. Questions --<br/>7.7.3. Problems --<br/>ch. 8 Multimedia and Quality of Service --<br/>8.1. Compression --<br/>8.1.1. Lossless Compression --<br/>8.1.2. Lossy Compression --<br/>8.2. Multimedia Data --<br/>8.2.1. Text --<br/>8.2.2. Image --<br/>8.2.3. Video --<br/>8.2.4. Audio --<br/>8.3. Multimedia in the Internet --<br/>8.3.1. Streaming Stored Audio/Video --<br/>8.3.2. Streaming Live Audio/Video --<br/>8.3.3. Real-Time Interactive Audio/Video --<br/>8.4. Real-Time Interactive Protocols --<br/>8.4.1. Rationale for New Protocols --<br/>8.4.2. RTP --<br/>8.4.3. RTCP --<br/>8.4.4. Session Initialization Protocol (SIP) --<br/>8.4.5. H.323 --<br/>8.4.6. SCTP --<br/>8.5. Quality of Service --<br/>8.5.1. Data-Flow Characteristics --<br/>8.5.2. Flow Classes --<br/>8.5.3. Flow Control to Improve QoS --<br/>8.5.4. Integrated Services (IntServ) --<br/>8.5.5. Differentiated Services (DiffServ) --<br/>8.6. End-Chapter Materials --<br/>8.6.1. Recommended Reading --<br/>8.6.2. Key Terms --<br/>8.6.3. Summary --<br/>8.7. Practice Set --<br/>8.7.1. Quizzes --<br/>8.7.2. Questions --<br/>8.7.3. Problems --<br/>8.8. Simulation Experiments --<br/>8.8.1. Applets --<br/>8.8.2. Lab Assignments --<br/>8.9. Programming Assignments --<br/>ch. 9 Network Management --<br/>9.1. Introduction --<br/>9.1.1. Configuration Management --<br/>9.1.2. Fault Management --<br/>9.1.3. Performance Management --<br/>9.1.4. Security Management --<br/>9.1.5. Accounting Management --<br/>9.2. SNMP --<br/>9.2.1. Managers and Agents --<br/>9.2.2. Management Components --<br/>9.2.3. Overview --<br/>9.2.4. SMI --<br/>9.2.5. MIB --<br/>9.2.6. SNMP --<br/>9.3. ASN. I --<br/>9.3.1. Language Basics --<br/>9.3.2. Data Types --<br/>9.3.3. Encoding --<br/>9.4. End-Chapter Materials --<br/>9.4.1. Further Reading --<br/>9.4.2. Key Terms --<br/>9.4.3. Summary --<br/>9.5. Practice Set --<br/>9.5.1. Quizzes --<br/>9.5.2. Questions --<br/>9.5.3. Problems --<br/>ch. 10 Network Security --<br/>10.1. Introduction --<br/>10.1.1. Security Goals --<br/>10.1.2. Attacks --<br/>10.1.3. Services and Techniques --<br/>10.2. Confidentiality --<br/>10.2.1. Symmetric-Key Ciphers --<br/>10.2.2. Asymmetric-Key Ciphers --<br/>10.3. Other Aspects of Security --<br/>10.3.1. Message Integrity --<br/>10.3.2. Message Authentication --<br/>10.3.3. Digital Signature --<br/>10.3.4. Entity Authentication --<br/>10.3.5. Key Management --<br/>10.4. Internet Security --<br/>10.4.1. Application-Layer Security --<br/>10.4.2. Transport-Layer Security --<br/>10.4.3. Network-Layer Security --<br/>10.5. Firewalls --<br/>10.5.1. Packet-Filter Firewall --<br/>10.5.2. Proxy Firewall --<br/>10.6. End-Chapter Materials --<br/>10.6.1. Further Reading --<br/>10.6.2. Key Terms --<br/>10.6.3. Summary --<br/>10.7. Practice Set --<br/>10.7.1. Quizzes --<br/>10.7.2. Questions --<br/>10.7.3. Problems --<br/>10.8. Simulation Experiments --<br/>10.8.1. Applets --<br/>10.8.2. Lab Assignments --<br/>10.9. Programming Assignments --<br/>ch. 11 Socket Programming In Java --<br/>11.1. Introduction. Note continued: 11.1.1. Addresses and Ports --<br/>11.1.2. Client-Server Paradigm --<br/>11.2. Programming with UDP --<br/>11.2.1. Iterative Approach --<br/>11.2.2. Concurrent Approach --<br/>11.3. Programming with TCP --<br/>11.3.1. Iterative Approach --<br/>11.3.2. Concurrent Approach --<br/>11.4. End-Chapter Materials --<br/>11.4.1. Further Reading --<br/>11.4.2. Key Terms --<br/>11.4.3. Summary --<br/>11.5. Practice Set --<br/>11.5.1. Quizzes --<br/>11.5.2. Questions --<br/>11.5.3. Problems --<br/>11.6. Programming Assignments. |
650 #0 - SUBJECT | |
Keyword | Computer networks. |
650 #0 - SUBJECT | |
Keyword | Internet. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | 01/05/2018 | 14 | 8995.99 | 004.6 FOR/C | 46474 | 12/01/2024 | 12/01/2024 | General Books |