Computer networks : (Record no. 195209)

MARC details
000 -LEADER
fixed length control field 09942cam a2200181 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781259001567
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Item number FOR/C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Forouzan, Behrouz A.
245 10 - TITLE STATEMENT
Title Computer networks :
Sub title a top-down approach/
Statement of responsibility, etc. Behrouz A. Forouzan and Firouz Mosharraf.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York, NY :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 931 p. :
Other physical details ill. ;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: ch. 1 Introduction --<br/>1.1. Overview of the Internet --<br/>1.1.1. Networks --<br/>1.1.2. Switching --<br/>1.1.3. Internet --<br/>1.1.4. Accessing the Internet --<br/>1.1.5. Hardware and Software --<br/>1.2. Protocol Layering --<br/>1.2.1. Scenarios --<br/>1.2.2. TCP/IP Protocol Suite --<br/>1.2.3. OSI Model --<br/>1.3. Internet History --<br/>1.3.1. Early History --<br/>1.3.2. Birth of the Internet --<br/>1.3.3. Internet Today --<br/>1.4. Standards and Administration --<br/>1.4.1. Internet Standards --<br/>1.4.2. Internet Administration --<br/>1.5. End-Chapter Materials --<br/>1.5.1. Further Reading --<br/>1.5.2. Key Terms --<br/>1.5.3. Summary --<br/>1.6. Practice Set --<br/>1.6.1. Quizzes --<br/>1.6.2. Questions --<br/>1.6.3. Problems --<br/>1.7. Simulation Experiments --<br/>1.7.1. Applets --<br/>1.7.2. Lab Assignments --<br/>ch. 2 Application Layer --<br/>2.1. Introduction --<br/>2.1.1. Providing Services --<br/>2.1.2. Application-Layer Paradigms --<br/>2.2. Client-Server Paradigm --<br/>2.2.1. Application Programming Interface --<br/>2.2.2. Using Services of the Transport Layer --<br/>2.3. Standard Client-Server Applications --<br/>2.3.1. World Wide Web and HTTP --<br/>2.3.2. FTP --<br/>2.3.3. Electronic Mail --<br/>2.3.4. Telnet --<br/>2.3.5. Secure Shell (SSH) --<br/>2.3.6. Domain Name System (DNS) --<br/>2.4. Peer-to-Peer Paradigm --<br/>2.4.1. P2P Networks --<br/>2.4.2. Distributed Hash Table (DHT) --<br/>2.4.3. Chord --<br/>2.4.4. Pastry --<br/>2.4.5. Kademlia --<br/>2.4.6. Popular P2P Network: BitTorrent --<br/>2.5. Socket Interface Programming --<br/>2.5.1. Socket Interface in C --<br/>2.6. End-Chapter Materials --<br/>2.6.1. Further Reading --<br/>2.6.2. Key Terms --<br/>2.6.3. Summary --<br/>2.7. Practice Set --<br/>2.7.1. Quizzes --<br/>2.7.2. Questions --<br/>2.7.3. Problems --<br/>2.8. Simulation Experiments --<br/>2.8.1. Applets --<br/>2.8.2. Lab Assignments --<br/>2.9. Programming Assignment --<br/>ch. 3 Transport Layer --<br/>3.1. Introduction --<br/>3.1.1. Transport-Layer Services --<br/>3.2. Transport-Layer Protocols --<br/>3.2.1. Simple Protocol --<br/>3.2.2. Stop-and-Wait Protocol --<br/>3.2.3. Go-Back-N Protocol (GBN) --<br/>3.2.4. Selective-Repeat Protocol --<br/>3.2.5. Bidirectional Protocols: Piggybacking --<br/>3.2.6. Internet Transport-Layer Protocols --<br/>3.3. User Datagram Protocol (UDP) --<br/>3.3.1. User Datagram --<br/>3.3.2. UDP Services --<br/>3.3.3. UDP Applications --<br/>3.4. Transmission Control Protocol (TCP) --<br/>3.4.1. TCP Services --<br/>3.4.2. TCP Features --<br/>3.4.3. Segment --<br/>3.4.4. TCP Connection --<br/>3.4.5. State Transition Diagram --<br/>3.4.6. Windows in TCP --<br/>3.4.7. Flow Control --<br/>3.4.8. Error Control --<br/>3.4.9. TCP Congestion Control --<br/>3.4.10. TCP Timers --<br/>3.4.11. Options --<br/>3.5. End-Chapter Materials --<br/>3.5.1. Further Reading --<br/>3.5.2. Key Terms --<br/>3.5.3. Summary --<br/>3.6. Practice Set --<br/>3.6.1. Quizzes --<br/>3.6.2. Questions --<br/>3.6.3. Problems --<br/>3.7. Simulation Experiments --<br/>3.7.1. Applets --<br/>3.7.2. Lab Assignments --<br/>3.8. Programming Assignment --<br/>ch. 4 Network Layer --<br/>4.1. Introduction --<br/>4.1.1. Network-Layer Services --<br/>4.1.2. Packet Switching --<br/>4.1.3. Network-Layer Performance --<br/>4.1.4. Network-Layer Congestion --<br/>4.1.5. Structure of A Router --<br/>4.2. Network-Layer Protocols --<br/>4.2.1. IPv4 Datagram Format --<br/>4.2.2. IPv4 Addresses --<br/>4.2.3. Forwarding of IP Packets --<br/>4.2.4. ICMPv4 --<br/>4.3. Unicast Routing --<br/>4.3.1. General Idea --<br/>4.3.2. Routing Algorithms --<br/>4.3.3. Unicast Routing Protocols --<br/>4.4. Multicast Routing --<br/>4.4.1. Introduction --<br/>4.4.2. Multicasting Basics --<br/>4.4.3. Intradomain Routing Protocols --<br/>4.4.4. Interdomain Routing Protocols --<br/>4.5. Next Generation IP --<br/>4.5.1. Packet Format --<br/>4.5.2. IPv6 Addressing --<br/>4.5.3. Transition from IPv4 to IPv6 --<br/>4.5.4. ICMPv6 --<br/>4.6. End-Chapter Materials --<br/>4.6.1. Further Reading --<br/>4.6.2. Key Terms --<br/>4.6.3. Summary --<br/>4.7. Practice Set --<br/>4.7.1. Quizzes --<br/>4.7.2. Questions --<br/>4.7.3. Problems --<br/>4.8. Simulation Experiments --<br/>4.8.1. Applets --<br/>4.8.2. Lab Assignments --<br/>4.9. Programming Assignment --<br/>ch. 5 Data-Link Layer: Wired Networks --<br/>5.1. Introduction --<br/>5.1.1. Nodes and Links --<br/>5.1.2. Two Types of Links --<br/>5.1.3. Two Sublayers --<br/>5.2. Data Link Control (DLC) --<br/>5.2.1. Framing --<br/>5.2.2. Flow and Error Control --<br/>5.2.3. Error Detection and Correction --<br/>5.2.4. Two DLC Protocols --<br/>5.3. Multiple Access Protocols --<br/>5.3.1. Random Access --<br/>5.3.2. Controlled Access --<br/>5.3.3. Channelization --<br/>5.4. Link-Layer Addressing --<br/>5.5. Wired Lans: Ethernet Protocol --<br/>5.5.1. IEEE Project 802 --<br/>5.5.2. Standard Ethernet --<br/>5.5.3. Fast Ethernet (100 Mbps) --<br/>5.5.4. Gigabit Ethernet --<br/>5.5.5. 10-Gigabit Ethernet --<br/>5.5.6. Virtual LANs --<br/>5.6. Other Wired Networks --<br/>5.6.1. Point-to-Point Networks --<br/>5.6.2. Sonet --<br/>5.6.3. Switched Network: ATM --<br/>5.7. Connecting Devices --<br/>5.7.1. Repeaters or Hubs --<br/>5.7.2. Link-Layer Switches --<br/>5.7.3. Routers --<br/>5.8. End-Chapter Materials --<br/>5.8.1. Recommended Reading --<br/>5.8.2. Key Terms --<br/>5.8.3. Summary --<br/>5.9. Practice Set --<br/>5.9.1. Quizzes --<br/>5.9.2. Questions --<br/>5.9.3. Problems --<br/>5.10. Simulation Experiments --<br/>5.10.1. Applets --<br/>5.10.2. Lab Assignments --<br/>5.11. Programming Assignments --<br/>ch. 6 Wireless Networks and Mobile IP --<br/>6.1. Wireless LANs --<br/>6.1.1. Introduction --<br/>6.1.2. IEEE 802.11 Project --<br/>6.1.3. Bluetooth --<br/>6.1.4. WiMAX --<br/>6.2. Other Wireless Networks --<br/>6.2.1. Channelization --<br/>6.2.2. Cellular Telephony --<br/>6.2.3. Satellite Networks --<br/>6.3. Mobile IP --<br/>6.3.1. Addressing --<br/>6.3.2. Agents --<br/>6.3.3. Three Phases --<br/>6.3.4. Inefficiency in Mobile IP --<br/>6.4. End-Chapter Materials --<br/>6.4.1. Further Reading --<br/>6.4.2. Key Terms --<br/>6.4.3. Summary --<br/>6.5. Practice Set --<br/>6.5.1. Quizzes --<br/>6.5.2. Questions --<br/>6.5.3. Problems --<br/>6.6. Simulation Experiments --<br/>6.6.1. Applets --<br/>6.6.2. Lab Assignments --<br/>6.7. Programming Assignment --<br/>ch. 7 Physical Layer and Transmission Media --<br/>7.1. Data and Signals --<br/>7.1.1. Analog and Digital --<br/>7.1.2. Transmission Impairment --<br/>7.1.3. Data Rate Limits --<br/>7.1.4. Performance --<br/>7.2. Digital Transmission --<br/>7.2.1. Digital-to-Digital Conversion --<br/>7.2.2. Analog-to-Digital Conversion --<br/>7.3. Analog Transmission --<br/>7.3.1. Digital-to-Analog Conversion --<br/>7.3.2. Analog-to-Analog Conversion --<br/>7.4. Bandwidth Utilization --<br/>7.4.1. Multiplexing --<br/>7.4.2. Spread Spectrum --<br/>7.5. Transmission Media --<br/>7.5.1. Guided Media --<br/>7.5.2. Unguided Media: Wireless --<br/>7.6. End-Chapter Materials --<br/>7.6.1. Recommended Reading --<br/>7.6.2. Key Terms --<br/>7.6.3. Summary --<br/>7.7. Practice Set --<br/>7.7.1. Quizzes --<br/>7.7.2. Questions --<br/>7.7.3. Problems --<br/>ch. 8 Multimedia and Quality of Service --<br/>8.1. Compression --<br/>8.1.1. Lossless Compression --<br/>8.1.2. Lossy Compression --<br/>8.2. Multimedia Data --<br/>8.2.1. Text --<br/>8.2.2. Image --<br/>8.2.3. Video --<br/>8.2.4. Audio --<br/>8.3. Multimedia in the Internet --<br/>8.3.1. Streaming Stored Audio/Video --<br/>8.3.2. Streaming Live Audio/Video --<br/>8.3.3. Real-Time Interactive Audio/Video --<br/>8.4. Real-Time Interactive Protocols --<br/>8.4.1. Rationale for New Protocols --<br/>8.4.2. RTP --<br/>8.4.3. RTCP --<br/>8.4.4. Session Initialization Protocol (SIP) --<br/>8.4.5. H.323 --<br/>8.4.6. SCTP --<br/>8.5. Quality of Service --<br/>8.5.1. Data-Flow Characteristics --<br/>8.5.2. Flow Classes --<br/>8.5.3. Flow Control to Improve QoS --<br/>8.5.4. Integrated Services (IntServ) --<br/>8.5.5. Differentiated Services (DiffServ) --<br/>8.6. End-Chapter Materials --<br/>8.6.1. Recommended Reading --<br/>8.6.2. Key Terms --<br/>8.6.3. Summary --<br/>8.7. Practice Set --<br/>8.7.1. Quizzes --<br/>8.7.2. Questions --<br/>8.7.3. Problems --<br/>8.8. Simulation Experiments --<br/>8.8.1. Applets --<br/>8.8.2. Lab Assignments --<br/>8.9. Programming Assignments --<br/>ch. 9 Network Management --<br/>9.1. Introduction --<br/>9.1.1. Configuration Management --<br/>9.1.2. Fault Management --<br/>9.1.3. Performance Management --<br/>9.1.4. Security Management --<br/>9.1.5. Accounting Management --<br/>9.2. SNMP --<br/>9.2.1. Managers and Agents --<br/>9.2.2. Management Components --<br/>9.2.3. Overview --<br/>9.2.4. SMI --<br/>9.2.5. MIB --<br/>9.2.6. SNMP --<br/>9.3. ASN. I --<br/>9.3.1. Language Basics --<br/>9.3.2. Data Types --<br/>9.3.3. Encoding --<br/>9.4. End-Chapter Materials --<br/>9.4.1. Further Reading --<br/>9.4.2. Key Terms --<br/>9.4.3. Summary --<br/>9.5. Practice Set --<br/>9.5.1. Quizzes --<br/>9.5.2. Questions --<br/>9.5.3. Problems --<br/>ch. 10 Network Security --<br/>10.1. Introduction --<br/>10.1.1. Security Goals --<br/>10.1.2. Attacks --<br/>10.1.3. Services and Techniques --<br/>10.2. Confidentiality --<br/>10.2.1. Symmetric-Key Ciphers --<br/>10.2.2. Asymmetric-Key Ciphers --<br/>10.3. Other Aspects of Security --<br/>10.3.1. Message Integrity --<br/>10.3.2. Message Authentication --<br/>10.3.3. Digital Signature --<br/>10.3.4. Entity Authentication --<br/>10.3.5. Key Management --<br/>10.4. Internet Security --<br/>10.4.1. Application-Layer Security --<br/>10.4.2. Transport-Layer Security --<br/>10.4.3. Network-Layer Security --<br/>10.5. Firewalls --<br/>10.5.1. Packet-Filter Firewall --<br/>10.5.2. Proxy Firewall --<br/>10.6. End-Chapter Materials --<br/>10.6.1. Further Reading --<br/>10.6.2. Key Terms --<br/>10.6.3. Summary --<br/>10.7. Practice Set --<br/>10.7.1. Quizzes --<br/>10.7.2. Questions --<br/>10.7.3. Problems --<br/>10.8. Simulation Experiments --<br/>10.8.1. Applets --<br/>10.8.2. Lab Assignments --<br/>10.9. Programming Assignments --<br/>ch. 11 Socket Programming In Java --<br/>11.1. Introduction. Note continued: 11.1.1. Addresses and Ports --<br/>11.1.2. Client-Server Paradigm --<br/>11.2. Programming with UDP --<br/>11.2.1. Iterative Approach --<br/>11.2.2. Concurrent Approach --<br/>11.3. Programming with TCP --<br/>11.3.1. Iterative Approach --<br/>11.3.2. Concurrent Approach --<br/>11.4. End-Chapter Materials --<br/>11.4.1. Further Reading --<br/>11.4.2. Key Terms --<br/>11.4.3. Summary --<br/>11.5. Practice Set --<br/>11.5.1. Quizzes --<br/>11.5.2. Questions --<br/>11.5.3. Problems --<br/>11.6. Programming Assignments.
650 #0 - SUBJECT
Keyword Computer networks.
650 #0 - SUBJECT
Keyword Internet.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Full call number Accession number Date last seen Date last checked out Koha item type
        Central Library, Sikkim University Central Library, Sikkim University 01/05/2018 14 8995.99 004.6 FOR/C 46474 12/01/2024 12/01/2024 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha