Computer networks Andrew S. Tanenbaum

By: Tanenbaum, Andrew SMaterial type: TextTextPublication details: New Delhi : Pearson Education,Inc , 2003Edition: 4th edDescription: 891p. illISBN: 9788177581652DDC classification: 004.6
Contents:
1 INTRODUCTION 1.1 USES OF COMPUTER NETWORKS 1.1.1 Business Applications 1.1.2 Home Applications 1.1.3 Mobile Users 1.1.4 Social Issues 1.2 NETWORK HARDWARE 1.2.1 Local Area Networks 1.2.2 Metropolitan Area Networks 1.2.3 Wide Area Networks 1.2.4 Wireless Networks 1.2.5 Home Networks 1.2.6 Internetworks 1.3 NETWORK SOFTWARE 1.3.1 Protocol Hierarchies 1.3.2 Design Issues for the Layers 1.3.3 Connection-Oriented and Connectionless Services 1.3.4 Service Primitives 1.3.5 The Relationship of Services to Protocols 1.4 REFERENCE MODELS 1.4.1 The OSI Reference Model 1.4.2 The TCP/IP Reference Model 1.4.3 A Comparison of the OSI and TCP/IP Reference Models 1.4.4 A Critique of the OSI Model and Protocols 1.4.5 A Critique of the TCP/IP Reference Model 1.5 EXAMPLE NETWORKS 1.5.1 The Internet 1.5.2 Connection-Oriented Networks: X.25, Frame Relay, and ATM 1.5.3 Ethernet 1.5.4 Wireless LANs: 802.11 1.6 NETWORK STANDARDIZATION 1.6.1 Who's Who in the Telecommunications World 1.6.2 Who's Who in the International Standards World 1.6.3 Who's Who in the Internet Standards World 1.7 METRIC UNITS 1.8 OUTLINE OF THE REST OF THE BOOK 2 THE PHYSICAL LAYER 2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION 2.1.1 Fourier Analysis 2.1.2 Bandwidth-Limited Signals 2.1.3 The Maximum Data Rate of a Channel 2.2 GUIDED TRANSMISSION MEDIA 2.2.1 Magnetic Media 2.2.2 Twisted Pair 2.2.3 Coaxial Cable 2.2.4 Fiber Optics 2.3 WIRELESS TRAI^ISMISSION 2.3.1 The Electromagnetic Spectrum 2.3.2 Radio Transmission 2.3.3 Microwave Transmission 2.3.4 Infrared and Millimeter Waves 2.3.5 Lightwave Transmission 2.4 COMMUNICATION SATELLITES 2.4.1 Geostationary Satellites 2.4.2 Medium-Earth Orbit Satellites 2.4.3 Low-Earth Orbit Satellites 2.4.4 Satellites versus Fiber 2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK 2.5.1 Structure of the Telephone System 2.5.2 The Politics of Telephones 2.5.3 The Local Loop: Modems, ADSL, and Wireless 2.5.4 Trunks and Multiplexing 2.5.5 Switching 2.6 THE MOBILE TELEPHONE SYSTEM 2.6.1 First-Generation Mobile Phones: Analog Voice 2.6.2 Second-Generation Mobile Phones: Digital Voice 2.6.3 Third-Generation Mobile Phones: Digital Voice and Data 2.7 CABLE TELEVISION 2.7.1 Community Antenna Television 2.7.2 Internet over Cable 2.7.3 Spectrum Allocation 2.7.4 Cable Modems 2.7.5 ADSL versus Cable 3 THE DATA LINK LAYER 3.1 DATA LINK LAYER DESIGN ISSUES 3.1.1 Services Provided to the Network Layer 3.1.2 Framing 3.1.3 Error Control 3.1.4 Flow Control 3.2 ERROR DETECTION AND CORRECTION 3.2.1 Error-Correcting Codes 3.2 2 Error-Detecting Codes 3.3 ELEMENTARY DATA LINK PROTOCOLS 3.3.1 An Unrestricted Simplex Protocol 3.3.2 A Simplex Stop-and-Wait Protocol 3.3.3 A Simplex Protocol for a Noisy Channel 3.4 SLIDING WINDOW PROTOCOLS 3.4.1 A One-Bit Sliding Window Protocol 3.4.2 A Protocol Using Go Back N 3.4.3 A Protocol Using Selective Repeat 3.5 PROTOCOL VERIFICATION 3.5.1 Finite State Machine Models 3.5.2 Petri Net Models 3.6 EXAMPLE DATA LINK PROTOCOLS 3.6.1 HDLC—High-Level Data Link Control 3.6.2 The Data Link Layer in the Internet 4 THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.1.1 Static Channel Allocation in LANs and MANs 4.1.2 Dynamic Channel Allocation in LANs and MANs 4.2 MULTIPLE ACCESS PROTOCOLS 4.2.1 ALOHA 4.2.2 Carrier Sense Multiple Access Protocols 4.2.3 Collision-Free Protocols 4.2.4 Limited-Contention Protocols 4.2.5 Wavelength Division Multiple Access Protocols 4.2.6 Wireless LAN Protocols 4.3 ETHERNET 4.3.1 Ethernet Cabling 4.3.2 Manchester Encoding 4.3.3 The Ethernet MAC Sublayer Protocol 4.3.4 The Binary Exponential Backoff Algorithm 4.3.5 Ethernet Performance 4.3.6 Switched Ethernet 4.3.7 Fast Ethernet 4.3.8 Gigabit Ethernet 4.3.9 IEEE 802.2: Logical Link Control 4.3.10 Retrospective on Ethernet 4.4 WIRELESS LANS 4.4.1 The 802.11 Protocol Stack 4.4.2 The 802.11 Physical Layer 4.4.3 The 802.11 MAC Sublayer Protocol 4.4.4 The 802.11 Frame Structure 4.4.5 Services 4.5 BROADBAND WIRELESS 4.5.1 Comparison of 802.11 with 802.16 4.5.2 The 802.16 Protocol Stack 4.5.3 The 802.16 Physical Layer 4.5.4 The 802.16 MAC Sublayer Protocol 4.5.5 The 802.16 Frame Structure 4.6 BLUETOOTH 4.6.1 Bluetooth Architecture 4.6.2 Bluetooth Applications 4.6.3 The Bluetooth Protocol Stack 4.6.4 The Bluetooth Radio Layer 4.6.5 The Bluetooth Baseband Layer 4.6.6 The Bluetooth L2CAP Layer 4.6.7 The Bluetooth Frame Structure 4.7 DATA LINK LAYER SWITCHING 4.7.1 Bridges from 802.x to 802.y 4.7.2 Local Internetworking 4.7.3 Spanning Tree Bridges 4.7.4 Remote Bridges 4.7.5 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways 4.7.6 Virtual LANs 5 THE NETWORK LAYER 5.1 NETWORK LAYER DESIGN ISSUES 5.1.1 Store-and-Forward Packet Switching 5.1.2 Services Provided to the Transport Layer 5.1.3 Implementation of Connectionless Service 5.1.4 Implementation of Connection-Oriented Service 5.1.5 Comparison of Virtual-Circuit and Datagram Subnets 5.2 ROUTING ALGORITHMS 5.2.1 The Optimality Principle 5.2.2 Shortest Path Routing 5.2.3 Flooding 5.2.4 Distance Vector Routing 5.2.5 Link State Routing 5.2.6 Hierarchical Routing 5.2.7 Broadcast Routing 5.2.8 Multicast Routing 5.2.9 Routing for Mobile Hosts 5.2.10 Routing in Ad Hoc Networks 5.2.11 Node Lookup in Peer-to-Peer Networks 5.3 CONGESTION CONTROL ALGORITHMS 5.3.1 General Principles of Congestion Control 5.3.2 Congestion Prevention Policies 5.3.3 Congestion Control in Virtual-Circuit Subnets 5.3.4 Congestion Control in Datagram Subnets 5.3.5 Load Shedding 5.3.6 Jitter Control 5.4 QUALITY OF SERVICE 5.4.1 Requirements 5.4.2 Techniques for Achieving CSood Quality of Service 5.4.3 Integrated Services 5.4.4 Differentiated Services 5.4.5 Label Switching and MPLS 5.5 INTERNETWORKING 5.5.1 How Networks Differ 5.5.2 How Networks Can Be Connected 5.5.3 Concatenated Virtual Circuits 5.5.4 Connectionless Internetworking 5.5.5 Tunneling 5.5.6 Internetwork Routing 5.5.7 Fragmentation 5.6 THE NETWORK LAYER IN THE INTERNET 5.6.1 The IP Protocol 5.6.2 IP Addresses 5.6.3 Internet Control Protocols 5.6.4 OSPF—The Interior Gateway Routing Protocol 5.6.5 BOP—The Exterior Gateway Routing Protocol 5.6.6 Internet Multicasting 5.6J Mobile IP 5.6.8 IPv6 6 THE TRANSPORT LAYER 6.1 THE TRANSPORT SERVICE 6.1.1 Services Provided to the Upper Layers 6.1.2 Transport Service Primitives 6.1.3 Berkeley Sockets 6.1.4 An Example of Socket Programming: An Internet File Server 6.2 ELEMENTS OF TRANSPORT PROTOCOLS 6.2.1 Addressing 6.2.2 Connection Establishment 6.2.3 Connection Release 6.2.4 Flow Control and Buffering 6.2.5 Multiplexing 6.2.6 Crash Recovery 6.3 A SIMPLE TRANSPORT PROTOCOL 6.3.1 The Example Service Primitives 6.3.2 The Example Transport Entity 6.3.3 The Example as a Finite State Machine 6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP 6.4.1 Introduction to UDP 6.4.2 Remote Procedure Call 6.4.3 The Real-Time Transport Protocol 6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP 6.5.1 Introduction to TCP 6.5.2 The TCP Service Model 6.5.3 The TCP Protocol 6.5.4 The TCP Segment Header 6.5.5 TCP Connection Establishment 6.5.6 TCP Connection Release 6.5.7 Modeling TCP Connection Management 6.5.8 TCP Transmission Policy 6.5.9 TCP Congestion Control 6.5.10 TCP Timer Management 6.5.11 Wireless TCP and UDP 6.5.12 Transactional TCP 6.6 PERFORMANCE ISSUES 6.6.1 Performance Problems in Computer Networks 6.6.2 Network Performance Measurement 6.6.3 System Design for Better Performance 6.6.4 Fast TPDU Processing 6.6.5 Protocols for Gigabit Networks 7 THE APPLICATION LAYER 7.1 DNS—THE DOMAIN NAME SYSTEM 7.1.1 The DNS Name Space 7.1.2 Resource Records 7.1.3 Name Servers 7.2 ELECTRONIC MAIL 7.2.1 Architecture and Services 7.2.2 The User Agent 7.2.3 Message Formats 7.2.4 Message Transfer 7.2.5 Final Delivery 7.3 THE WORLD WIDE WEB 7.3.1 Architectural Overview" 7.3.2 Static Web Documents 7.3.3 Dynamic Web Documents 7.3.4 HTTP—The HyperText Transfer Protocol 7.3.5 Performance Enhancements 7.3.6 The Wireless Web 7.4 MULTIMEDIA 7.4.1 Introduction to Digital Audio 7.4.2 Audio Compression 7.4.3 Streaming Audio 7.4.4 Internet Radio 7.4.5 Voice over IP 7.4.6 Introduction to Video 7.4.7 Video Compression 7.4.8 Video on Demand 7.4.9 The MBone—^The Multicast Backbone 8 NETWORK SECURITY 8.1 CRYPTOGRAPHY 8.1.1 Introduction to Cryptography 8.1.2 Substitution Ciphers 8.1.3 Transposition Ciphers 8.1.4 One-Time Pads 8.1.5 Two Fundamental Cryptographic Principles 8.2 SYMMETRIC-KEY ALGORITHMS 8.2.1 DES—The Data Encryption Standard 8.2.2 AES—The Advanced Encryption Standard 8.2.3 Cipher Modes 8.2.4 Other Ciphers 8.2.5 Cryptanalysis 8.3 PUBLIC-KEY ALGORITHMS 8.3.1 RSA 8.3.2 Other Public-Key Algorithms 8.4 DIGITAL SIGNATURES 8.4.1 Symmetric-Key Signatures 8.4.2 Public-Key Signatures 8.4.3 Message Digests 8.4.4 The Birthday Attack 8.5 MANAGEMENT OF PUBLIC KEYS 8.5.1 Certificates 8.5.2 X.509 8.5.3 Public Key Infrastructures 8.6 COMMUNICATION SECURITY 8.6.1 IPsec 8.6.2 Firewalls 8.6.3 Virtual Private Networks 8.6.4 Wireless Security 8.7 AUTHENTICATION PROTOCOLS 8.7.1 Authentication Based on a Shared Secret Key 8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange 8.7.3 Authentication Using a Key Distribution Center 8.7.4 Authentication Using Kerberos 8.7.5 Authentication Using Public-Key Cryptography 8.8 E-MAIL SECURITY 8.8.1 PGP—Pretty Good Privacy 8.8.2 PEM—^Privacy Enhanced Mail 8.8.3 S/MIME 8.9 WEB SECURITY 8.9.1 Threats 8.9.2 Secure Naming 8.9.3 SSL—^The Securp Sockets Layer 8.9.4 Mobile Code Security 8.10 SOCIAL ISSUES 8.10.1 Privacy 8.10.2 Freedom of Speech 8.10.3 Copyright 9 READING LIST AND BIBLIOGRAPHY 9.1 SUGGESTIONS FOR FURTHER READING 9.1.1 Introduction and General Works 9.1.2 The Physical Layer 9.1.3 The Data Link Layer 9.1.4 The Medium Access Control Sublayer 9.1.5 The Network Layer 9.1.6 The Transport Layer 9.1.7 The Application Layer 9.1.8 Network Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
004.6 (Browse shelf(Opens below)) Available P18839
Total holds: 0

1 INTRODUCTION
1.1 USES OF COMPUTER NETWORKS
1.1.1 Business Applications
1.1.2 Home Applications
1.1.3 Mobile Users
1.1.4 Social Issues
1.2 NETWORK HARDWARE
1.2.1 Local Area Networks
1.2.2 Metropolitan Area Networks
1.2.3 Wide Area Networks
1.2.4 Wireless Networks
1.2.5 Home Networks
1.2.6 Internetworks
1.3 NETWORK SOFTWARE
1.3.1 Protocol Hierarchies
1.3.2 Design Issues for the Layers
1.3.3 Connection-Oriented and Connectionless Services
1.3.4 Service Primitives
1.3.5 The Relationship of Services to Protocols
1.4 REFERENCE MODELS
1.4.1 The OSI Reference Model
1.4.2 The TCP/IP Reference Model
1.4.3 A Comparison of the OSI and TCP/IP Reference Models
1.4.4 A Critique of the OSI Model and Protocols
1.4.5 A Critique of the TCP/IP Reference Model
1.5 EXAMPLE NETWORKS
1.5.1 The Internet
1.5.2 Connection-Oriented Networks: X.25, Frame Relay, and ATM
1.5.3 Ethernet
1.5.4 Wireless LANs: 802.11
1.6 NETWORK STANDARDIZATION
1.6.1 Who's Who in the Telecommunications World
1.6.2 Who's Who in the International Standards World
1.6.3 Who's Who in the Internet Standards World
1.7 METRIC UNITS
1.8 OUTLINE OF THE REST OF THE BOOK
2 THE PHYSICAL LAYER
2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION
2.1.1 Fourier Analysis
2.1.2 Bandwidth-Limited Signals
2.1.3 The Maximum Data Rate of a Channel
2.2 GUIDED TRANSMISSION MEDIA
2.2.1 Magnetic Media
2.2.2 Twisted Pair
2.2.3 Coaxial Cable
2.2.4 Fiber Optics
2.3 WIRELESS TRAI^ISMISSION
2.3.1 The Electromagnetic Spectrum
2.3.2 Radio Transmission
2.3.3 Microwave Transmission
2.3.4 Infrared and Millimeter Waves
2.3.5 Lightwave Transmission
2.4 COMMUNICATION SATELLITES
2.4.1 Geostationary Satellites
2.4.2 Medium-Earth Orbit Satellites
2.4.3 Low-Earth Orbit Satellites
2.4.4 Satellites versus Fiber
2.5 THE PUBLIC SWITCHED TELEPHONE NETWORK
2.5.1 Structure of the Telephone System
2.5.2 The Politics of Telephones
2.5.3 The Local Loop: Modems, ADSL, and Wireless
2.5.4 Trunks and Multiplexing
2.5.5 Switching
2.6 THE MOBILE TELEPHONE SYSTEM
2.6.1 First-Generation Mobile Phones: Analog Voice
2.6.2 Second-Generation Mobile Phones: Digital Voice
2.6.3 Third-Generation Mobile Phones: Digital Voice and Data
2.7 CABLE TELEVISION
2.7.1 Community Antenna Television
2.7.2 Internet over Cable
2.7.3 Spectrum Allocation
2.7.4 Cable Modems
2.7.5 ADSL versus Cable
3 THE DATA LINK LAYER
3.1 DATA LINK LAYER DESIGN ISSUES
3.1.1 Services Provided to the Network Layer
3.1.2 Framing
3.1.3 Error Control
3.1.4 Flow Control
3.2 ERROR DETECTION AND CORRECTION
3.2.1 Error-Correcting Codes
3.2 2 Error-Detecting Codes
3.3 ELEMENTARY DATA LINK PROTOCOLS
3.3.1 An Unrestricted Simplex Protocol
3.3.2 A Simplex Stop-and-Wait Protocol
3.3.3 A Simplex Protocol for a Noisy Channel
3.4 SLIDING WINDOW PROTOCOLS
3.4.1 A One-Bit Sliding Window Protocol
3.4.2 A Protocol Using Go Back N
3.4.3 A Protocol Using Selective Repeat
3.5 PROTOCOL VERIFICATION
3.5.1 Finite State Machine Models
3.5.2 Petri Net Models
3.6 EXAMPLE DATA LINK PROTOCOLS
3.6.1 HDLC—High-Level Data Link Control
3.6.2 The Data Link Layer in the Internet
4 THE MEDIUM ACCESS CONTROL SUBLAYER
4.1 THE CHANNEL ALLOCATION PROBLEM
4.1.1 Static Channel Allocation in LANs and MANs
4.1.2 Dynamic Channel Allocation in LANs and MANs
4.2 MULTIPLE ACCESS PROTOCOLS
4.2.1 ALOHA
4.2.2 Carrier Sense Multiple Access Protocols
4.2.3 Collision-Free Protocols
4.2.4 Limited-Contention Protocols
4.2.5 Wavelength Division Multiple Access Protocols
4.2.6 Wireless LAN Protocols
4.3 ETHERNET
4.3.1 Ethernet Cabling
4.3.2 Manchester Encoding
4.3.3 The Ethernet MAC Sublayer Protocol
4.3.4 The Binary Exponential Backoff Algorithm
4.3.5 Ethernet Performance
4.3.6 Switched Ethernet
4.3.7 Fast Ethernet
4.3.8 Gigabit Ethernet
4.3.9 IEEE 802.2: Logical Link Control
4.3.10 Retrospective on Ethernet
4.4 WIRELESS LANS
4.4.1 The 802.11 Protocol Stack
4.4.2 The 802.11 Physical Layer
4.4.3 The 802.11 MAC Sublayer Protocol
4.4.4 The 802.11 Frame Structure
4.4.5 Services
4.5 BROADBAND WIRELESS
4.5.1 Comparison of 802.11 with 802.16
4.5.2 The 802.16 Protocol Stack
4.5.3 The 802.16 Physical Layer
4.5.4 The 802.16 MAC Sublayer Protocol
4.5.5 The 802.16 Frame Structure
4.6 BLUETOOTH
4.6.1 Bluetooth Architecture
4.6.2 Bluetooth Applications
4.6.3 The Bluetooth Protocol Stack
4.6.4 The Bluetooth Radio Layer
4.6.5 The Bluetooth Baseband Layer
4.6.6 The Bluetooth L2CAP Layer
4.6.7 The Bluetooth Frame Structure
4.7 DATA LINK LAYER SWITCHING
4.7.1 Bridges from 802.x to 802.y
4.7.2 Local Internetworking
4.7.3 Spanning Tree Bridges
4.7.4 Remote Bridges
4.7.5 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways
4.7.6 Virtual LANs
5 THE NETWORK LAYER
5.1 NETWORK LAYER DESIGN ISSUES
5.1.1 Store-and-Forward Packet Switching
5.1.2 Services Provided to the Transport Layer
5.1.3 Implementation of Connectionless Service
5.1.4 Implementation of Connection-Oriented Service
5.1.5 Comparison of Virtual-Circuit and Datagram Subnets
5.2 ROUTING ALGORITHMS
5.2.1 The Optimality Principle
5.2.2 Shortest Path Routing
5.2.3 Flooding
5.2.4 Distance Vector Routing
5.2.5 Link State Routing
5.2.6 Hierarchical Routing
5.2.7 Broadcast Routing
5.2.8 Multicast Routing
5.2.9 Routing for Mobile Hosts
5.2.10 Routing in Ad Hoc Networks
5.2.11 Node Lookup in Peer-to-Peer Networks
5.3 CONGESTION CONTROL ALGORITHMS
5.3.1 General Principles of Congestion Control
5.3.2 Congestion Prevention Policies
5.3.3 Congestion Control in Virtual-Circuit Subnets
5.3.4 Congestion Control in Datagram Subnets
5.3.5 Load Shedding
5.3.6 Jitter Control
5.4 QUALITY OF SERVICE
5.4.1 Requirements
5.4.2 Techniques for Achieving CSood Quality of Service
5.4.3 Integrated Services
5.4.4 Differentiated Services
5.4.5 Label Switching and MPLS
5.5 INTERNETWORKING
5.5.1 How Networks Differ
5.5.2 How Networks Can Be Connected
5.5.3 Concatenated Virtual Circuits
5.5.4 Connectionless Internetworking
5.5.5 Tunneling
5.5.6 Internetwork Routing
5.5.7 Fragmentation
5.6 THE NETWORK LAYER IN THE INTERNET
5.6.1 The IP Protocol
5.6.2 IP Addresses
5.6.3 Internet Control Protocols
5.6.4 OSPF—The Interior Gateway Routing Protocol
5.6.5 BOP—The Exterior Gateway Routing Protocol
5.6.6 Internet Multicasting
5.6J Mobile IP
5.6.8 IPv6
6 THE TRANSPORT LAYER
6.1 THE TRANSPORT SERVICE
6.1.1 Services Provided to the Upper Layers
6.1.2 Transport Service Primitives
6.1.3 Berkeley Sockets
6.1.4 An Example of Socket Programming: An Internet File Server
6.2 ELEMENTS OF TRANSPORT PROTOCOLS
6.2.1 Addressing
6.2.2 Connection Establishment
6.2.3 Connection Release
6.2.4 Flow Control and Buffering
6.2.5 Multiplexing
6.2.6 Crash Recovery
6.3 A SIMPLE TRANSPORT PROTOCOL
6.3.1 The Example Service Primitives
6.3.2 The Example Transport Entity
6.3.3 The Example as a Finite State Machine
6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP
6.4.1 Introduction to UDP
6.4.2 Remote Procedure Call
6.4.3 The Real-Time Transport Protocol
6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP
6.5.1 Introduction to TCP
6.5.2 The TCP Service Model
6.5.3 The TCP Protocol
6.5.4 The TCP Segment Header
6.5.5 TCP Connection Establishment
6.5.6 TCP Connection Release
6.5.7 Modeling TCP Connection Management
6.5.8 TCP Transmission Policy
6.5.9 TCP Congestion Control
6.5.10 TCP Timer Management
6.5.11 Wireless TCP and UDP
6.5.12 Transactional TCP
6.6 PERFORMANCE ISSUES
6.6.1 Performance Problems in Computer Networks
6.6.2 Network Performance Measurement
6.6.3 System Design for Better Performance
6.6.4 Fast TPDU Processing
6.6.5 Protocols for Gigabit Networks
7 THE APPLICATION LAYER
7.1 DNS—THE DOMAIN NAME SYSTEM
7.1.1 The DNS Name Space
7.1.2 Resource Records
7.1.3 Name Servers
7.2 ELECTRONIC MAIL
7.2.1 Architecture and Services
7.2.2 The User Agent
7.2.3 Message Formats
7.2.4 Message Transfer
7.2.5 Final Delivery
7.3 THE WORLD WIDE WEB
7.3.1 Architectural Overview"
7.3.2 Static Web Documents
7.3.3 Dynamic Web Documents
7.3.4 HTTP—The HyperText Transfer Protocol
7.3.5 Performance Enhancements
7.3.6 The Wireless Web
7.4 MULTIMEDIA
7.4.1 Introduction to Digital Audio
7.4.2 Audio Compression
7.4.3 Streaming Audio
7.4.4 Internet Radio
7.4.5 Voice over IP
7.4.6 Introduction to Video
7.4.7 Video Compression
7.4.8 Video on Demand
7.4.9 The MBone—^The Multicast Backbone
8 NETWORK SECURITY
8.1 CRYPTOGRAPHY
8.1.1 Introduction to Cryptography
8.1.2 Substitution Ciphers
8.1.3 Transposition Ciphers
8.1.4 One-Time Pads
8.1.5 Two Fundamental Cryptographic Principles
8.2 SYMMETRIC-KEY ALGORITHMS
8.2.1 DES—The Data Encryption Standard
8.2.2 AES—The Advanced Encryption Standard
8.2.3 Cipher Modes
8.2.4 Other Ciphers
8.2.5 Cryptanalysis
8.3 PUBLIC-KEY ALGORITHMS
8.3.1 RSA
8.3.2 Other Public-Key Algorithms
8.4 DIGITAL SIGNATURES
8.4.1 Symmetric-Key Signatures
8.4.2 Public-Key Signatures
8.4.3 Message Digests
8.4.4 The Birthday Attack
8.5 MANAGEMENT OF PUBLIC KEYS
8.5.1 Certificates
8.5.2 X.509
8.5.3 Public Key Infrastructures
8.6 COMMUNICATION SECURITY
8.6.1 IPsec
8.6.2 Firewalls
8.6.3 Virtual Private Networks
8.6.4 Wireless Security
8.7 AUTHENTICATION PROTOCOLS
8.7.1 Authentication Based on a Shared Secret Key
8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange
8.7.3 Authentication Using a Key Distribution Center
8.7.4 Authentication Using Kerberos
8.7.5 Authentication Using Public-Key Cryptography
8.8 E-MAIL SECURITY
8.8.1 PGP—Pretty Good Privacy
8.8.2 PEM—^Privacy Enhanced Mail
8.8.3 S/MIME
8.9 WEB SECURITY
8.9.1 Threats
8.9.2 Secure Naming
8.9.3 SSL—^The Securp Sockets Layer
8.9.4 Mobile Code Security
8.10 SOCIAL ISSUES
8.10.1 Privacy
8.10.2 Freedom of Speech
8.10.3 Copyright
9 READING LIST AND BIBLIOGRAPHY
9.1 SUGGESTIONS FOR FURTHER READING
9.1.1 Introduction and General Works
9.1.2 The Physical Layer
9.1.3 The Data Link Layer
9.1.4 The Medium Access Control Sublayer
9.1.5 The Network Layer
9.1.6 The Transport Layer
9.1.7 The Application Layer
9.1.8 Network Security

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha