Computer networks : a top-down approach/ Behrouz A. Forouzan and Firouz Mosharraf.

By: Forouzan, Behrouz AMaterial type: TextTextPublication details: New York, NY : McGraw-Hill, c2012Edition: 1st edDescription: xxiii, 931 p. : ill. ; 24 cmISBN: 9781259001567Subject(s): Computer networks | InternetDDC classification: 004.6
Contents:
Machine generated contents note: ch. 1 Introduction -- 1.1. Overview of the Internet -- 1.1.1. Networks -- 1.1.2. Switching -- 1.1.3. Internet -- 1.1.4. Accessing the Internet -- 1.1.5. Hardware and Software -- 1.2. Protocol Layering -- 1.2.1. Scenarios -- 1.2.2. TCP/IP Protocol Suite -- 1.2.3. OSI Model -- 1.3. Internet History -- 1.3.1. Early History -- 1.3.2. Birth of the Internet -- 1.3.3. Internet Today -- 1.4. Standards and Administration -- 1.4.1. Internet Standards -- 1.4.2. Internet Administration -- 1.5. End-Chapter Materials -- 1.5.1. Further Reading -- 1.5.2. Key Terms -- 1.5.3. Summary -- 1.6. Practice Set -- 1.6.1. Quizzes -- 1.6.2. Questions -- 1.6.3. Problems -- 1.7. Simulation Experiments -- 1.7.1. Applets -- 1.7.2. Lab Assignments -- ch. 2 Application Layer -- 2.1. Introduction -- 2.1.1. Providing Services -- 2.1.2. Application-Layer Paradigms -- 2.2. Client-Server Paradigm -- 2.2.1. Application Programming Interface -- 2.2.2. Using Services of the Transport Layer -- 2.3. Standard Client-Server Applications -- 2.3.1. World Wide Web and HTTP -- 2.3.2. FTP -- 2.3.3. Electronic Mail -- 2.3.4. Telnet -- 2.3.5. Secure Shell (SSH) -- 2.3.6. Domain Name System (DNS) -- 2.4. Peer-to-Peer Paradigm -- 2.4.1. P2P Networks -- 2.4.2. Distributed Hash Table (DHT) -- 2.4.3. Chord -- 2.4.4. Pastry -- 2.4.5. Kademlia -- 2.4.6. Popular P2P Network: BitTorrent -- 2.5. Socket Interface Programming -- 2.5.1. Socket Interface in C -- 2.6. End-Chapter Materials -- 2.6.1. Further Reading -- 2.6.2. Key Terms -- 2.6.3. Summary -- 2.7. Practice Set -- 2.7.1. Quizzes -- 2.7.2. Questions -- 2.7.3. Problems -- 2.8. Simulation Experiments -- 2.8.1. Applets -- 2.8.2. Lab Assignments -- 2.9. Programming Assignment -- ch. 3 Transport Layer -- 3.1. Introduction -- 3.1.1. Transport-Layer Services -- 3.2. Transport-Layer Protocols -- 3.2.1. Simple Protocol -- 3.2.2. Stop-and-Wait Protocol -- 3.2.3. Go-Back-N Protocol (GBN) -- 3.2.4. Selective-Repeat Protocol -- 3.2.5. Bidirectional Protocols: Piggybacking -- 3.2.6. Internet Transport-Layer Protocols -- 3.3. User Datagram Protocol (UDP) -- 3.3.1. User Datagram -- 3.3.2. UDP Services -- 3.3.3. UDP Applications -- 3.4. Transmission Control Protocol (TCP) -- 3.4.1. TCP Services -- 3.4.2. TCP Features -- 3.4.3. Segment -- 3.4.4. TCP Connection -- 3.4.5. State Transition Diagram -- 3.4.6. Windows in TCP -- 3.4.7. Flow Control -- 3.4.8. Error Control -- 3.4.9. TCP Congestion Control -- 3.4.10. TCP Timers -- 3.4.11. Options -- 3.5. End-Chapter Materials -- 3.5.1. Further Reading -- 3.5.2. Key Terms -- 3.5.3. Summary -- 3.6. Practice Set -- 3.6.1. Quizzes -- 3.6.2. Questions -- 3.6.3. Problems -- 3.7. Simulation Experiments -- 3.7.1. Applets -- 3.7.2. Lab Assignments -- 3.8. Programming Assignment -- ch. 4 Network Layer -- 4.1. Introduction -- 4.1.1. Network-Layer Services -- 4.1.2. Packet Switching -- 4.1.3. Network-Layer Performance -- 4.1.4. Network-Layer Congestion -- 4.1.5. Structure of A Router -- 4.2. Network-Layer Protocols -- 4.2.1. IPv4 Datagram Format -- 4.2.2. IPv4 Addresses -- 4.2.3. Forwarding of IP Packets -- 4.2.4. ICMPv4 -- 4.3. Unicast Routing -- 4.3.1. General Idea -- 4.3.2. Routing Algorithms -- 4.3.3. Unicast Routing Protocols -- 4.4. Multicast Routing -- 4.4.1. Introduction -- 4.4.2. Multicasting Basics -- 4.4.3. Intradomain Routing Protocols -- 4.4.4. Interdomain Routing Protocols -- 4.5. Next Generation IP -- 4.5.1. Packet Format -- 4.5.2. IPv6 Addressing -- 4.5.3. Transition from IPv4 to IPv6 -- 4.5.4. ICMPv6 -- 4.6. End-Chapter Materials -- 4.6.1. Further Reading -- 4.6.2. Key Terms -- 4.6.3. Summary -- 4.7. Practice Set -- 4.7.1. Quizzes -- 4.7.2. Questions -- 4.7.3. Problems -- 4.8. Simulation Experiments -- 4.8.1. Applets -- 4.8.2. Lab Assignments -- 4.9. Programming Assignment -- ch. 5 Data-Link Layer: Wired Networks -- 5.1. Introduction -- 5.1.1. Nodes and Links -- 5.1.2. Two Types of Links -- 5.1.3. Two Sublayers -- 5.2. Data Link Control (DLC) -- 5.2.1. Framing -- 5.2.2. Flow and Error Control -- 5.2.3. Error Detection and Correction -- 5.2.4. Two DLC Protocols -- 5.3. Multiple Access Protocols -- 5.3.1. Random Access -- 5.3.2. Controlled Access -- 5.3.3. Channelization -- 5.4. Link-Layer Addressing -- 5.5. Wired Lans: Ethernet Protocol -- 5.5.1. IEEE Project 802 -- 5.5.2. Standard Ethernet -- 5.5.3. Fast Ethernet (100 Mbps) -- 5.5.4. Gigabit Ethernet -- 5.5.5. 10-Gigabit Ethernet -- 5.5.6. Virtual LANs -- 5.6. Other Wired Networks -- 5.6.1. Point-to-Point Networks -- 5.6.2. Sonet -- 5.6.3. Switched Network: ATM -- 5.7. Connecting Devices -- 5.7.1. Repeaters or Hubs -- 5.7.2. Link-Layer Switches -- 5.7.3. Routers -- 5.8. End-Chapter Materials -- 5.8.1. Recommended Reading -- 5.8.2. Key Terms -- 5.8.3. Summary -- 5.9. Practice Set -- 5.9.1. Quizzes -- 5.9.2. Questions -- 5.9.3. Problems -- 5.10. Simulation Experiments -- 5.10.1. Applets -- 5.10.2. Lab Assignments -- 5.11. Programming Assignments -- ch. 6 Wireless Networks and Mobile IP -- 6.1. Wireless LANs -- 6.1.1. Introduction -- 6.1.2. IEEE 802.11 Project -- 6.1.3. Bluetooth -- 6.1.4. WiMAX -- 6.2. Other Wireless Networks -- 6.2.1. Channelization -- 6.2.2. Cellular Telephony -- 6.2.3. Satellite Networks -- 6.3. Mobile IP -- 6.3.1. Addressing -- 6.3.2. Agents -- 6.3.3. Three Phases -- 6.3.4. Inefficiency in Mobile IP -- 6.4. End-Chapter Materials -- 6.4.1. Further Reading -- 6.4.2. Key Terms -- 6.4.3. Summary -- 6.5. Practice Set -- 6.5.1. Quizzes -- 6.5.2. Questions -- 6.5.3. Problems -- 6.6. Simulation Experiments -- 6.6.1. Applets -- 6.6.2. Lab Assignments -- 6.7. Programming Assignment -- ch. 7 Physical Layer and Transmission Media -- 7.1. Data and Signals -- 7.1.1. Analog and Digital -- 7.1.2. Transmission Impairment -- 7.1.3. Data Rate Limits -- 7.1.4. Performance -- 7.2. Digital Transmission -- 7.2.1. Digital-to-Digital Conversion -- 7.2.2. Analog-to-Digital Conversion -- 7.3. Analog Transmission -- 7.3.1. Digital-to-Analog Conversion -- 7.3.2. Analog-to-Analog Conversion -- 7.4. Bandwidth Utilization -- 7.4.1. Multiplexing -- 7.4.2. Spread Spectrum -- 7.5. Transmission Media -- 7.5.1. Guided Media -- 7.5.2. Unguided Media: Wireless -- 7.6. End-Chapter Materials -- 7.6.1. Recommended Reading -- 7.6.2. Key Terms -- 7.6.3. Summary -- 7.7. Practice Set -- 7.7.1. Quizzes -- 7.7.2. Questions -- 7.7.3. Problems -- ch. 8 Multimedia and Quality of Service -- 8.1. Compression -- 8.1.1. Lossless Compression -- 8.1.2. Lossy Compression -- 8.2. Multimedia Data -- 8.2.1. Text -- 8.2.2. Image -- 8.2.3. Video -- 8.2.4. Audio -- 8.3. Multimedia in the Internet -- 8.3.1. Streaming Stored Audio/Video -- 8.3.2. Streaming Live Audio/Video -- 8.3.3. Real-Time Interactive Audio/Video -- 8.4. Real-Time Interactive Protocols -- 8.4.1. Rationale for New Protocols -- 8.4.2. RTP -- 8.4.3. RTCP -- 8.4.4. Session Initialization Protocol (SIP) -- 8.4.5. H.323 -- 8.4.6. SCTP -- 8.5. Quality of Service -- 8.5.1. Data-Flow Characteristics -- 8.5.2. Flow Classes -- 8.5.3. Flow Control to Improve QoS -- 8.5.4. Integrated Services (IntServ) -- 8.5.5. Differentiated Services (DiffServ) -- 8.6. End-Chapter Materials -- 8.6.1. Recommended Reading -- 8.6.2. Key Terms -- 8.6.3. Summary -- 8.7. Practice Set -- 8.7.1. Quizzes -- 8.7.2. Questions -- 8.7.3. Problems -- 8.8. Simulation Experiments -- 8.8.1. Applets -- 8.8.2. Lab Assignments -- 8.9. Programming Assignments -- ch. 9 Network Management -- 9.1. Introduction -- 9.1.1. Configuration Management -- 9.1.2. Fault Management -- 9.1.3. Performance Management -- 9.1.4. Security Management -- 9.1.5. Accounting Management -- 9.2. SNMP -- 9.2.1. Managers and Agents -- 9.2.2. Management Components -- 9.2.3. Overview -- 9.2.4. SMI -- 9.2.5. MIB -- 9.2.6. SNMP -- 9.3. ASN. I -- 9.3.1. Language Basics -- 9.3.2. Data Types -- 9.3.3. Encoding -- 9.4. End-Chapter Materials -- 9.4.1. Further Reading -- 9.4.2. Key Terms -- 9.4.3. Summary -- 9.5. Practice Set -- 9.5.1. Quizzes -- 9.5.2. Questions -- 9.5.3. Problems -- ch. 10 Network Security -- 10.1. Introduction -- 10.1.1. Security Goals -- 10.1.2. Attacks -- 10.1.3. Services and Techniques -- 10.2. Confidentiality -- 10.2.1. Symmetric-Key Ciphers -- 10.2.2. Asymmetric-Key Ciphers -- 10.3. Other Aspects of Security -- 10.3.1. Message Integrity -- 10.3.2. Message Authentication -- 10.3.3. Digital Signature -- 10.3.4. Entity Authentication -- 10.3.5. Key Management -- 10.4. Internet Security -- 10.4.1. Application-Layer Security -- 10.4.2. Transport-Layer Security -- 10.4.3. Network-Layer Security -- 10.5. Firewalls -- 10.5.1. Packet-Filter Firewall -- 10.5.2. Proxy Firewall -- 10.6. End-Chapter Materials -- 10.6.1. Further Reading -- 10.6.2. Key Terms -- 10.6.3. Summary -- 10.7. Practice Set -- 10.7.1. Quizzes -- 10.7.2. Questions -- 10.7.3. Problems -- 10.8. Simulation Experiments -- 10.8.1. Applets -- 10.8.2. Lab Assignments -- 10.9. Programming Assignments -- ch. 11 Socket Programming In Java -- 11.1. Introduction. Note continued: 11.1.1. Addresses and Ports -- 11.1.2. Client-Server Paradigm -- 11.2. Programming with UDP -- 11.2.1. Iterative Approach -- 11.2.2. Concurrent Approach -- 11.3. Programming with TCP -- 11.3.1. Iterative Approach -- 11.3.2. Concurrent Approach -- 11.4. End-Chapter Materials -- 11.4.1. Further Reading -- 11.4.2. Key Terms -- 11.4.3. Summary -- 11.5. Practice Set -- 11.5.1. Quizzes -- 11.5.2. Questions -- 11.5.3. Problems -- 11.6. Programming Assignments.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
004.6 FOR/C (Browse shelf(Opens below)) Available 46474
Total holds: 0

Machine generated contents note: ch. 1 Introduction --
1.1. Overview of the Internet --
1.1.1. Networks --
1.1.2. Switching --
1.1.3. Internet --
1.1.4. Accessing the Internet --
1.1.5. Hardware and Software --
1.2. Protocol Layering --
1.2.1. Scenarios --
1.2.2. TCP/IP Protocol Suite --
1.2.3. OSI Model --
1.3. Internet History --
1.3.1. Early History --
1.3.2. Birth of the Internet --
1.3.3. Internet Today --
1.4. Standards and Administration --
1.4.1. Internet Standards --
1.4.2. Internet Administration --
1.5. End-Chapter Materials --
1.5.1. Further Reading --
1.5.2. Key Terms --
1.5.3. Summary --
1.6. Practice Set --
1.6.1. Quizzes --
1.6.2. Questions --
1.6.3. Problems --
1.7. Simulation Experiments --
1.7.1. Applets --
1.7.2. Lab Assignments --
ch. 2 Application Layer --
2.1. Introduction --
2.1.1. Providing Services --
2.1.2. Application-Layer Paradigms --
2.2. Client-Server Paradigm --
2.2.1. Application Programming Interface --
2.2.2. Using Services of the Transport Layer --
2.3. Standard Client-Server Applications --
2.3.1. World Wide Web and HTTP --
2.3.2. FTP --
2.3.3. Electronic Mail --
2.3.4. Telnet --
2.3.5. Secure Shell (SSH) --
2.3.6. Domain Name System (DNS) --
2.4. Peer-to-Peer Paradigm --
2.4.1. P2P Networks --
2.4.2. Distributed Hash Table (DHT) --
2.4.3. Chord --
2.4.4. Pastry --
2.4.5. Kademlia --
2.4.6. Popular P2P Network: BitTorrent --
2.5. Socket Interface Programming --
2.5.1. Socket Interface in C --
2.6. End-Chapter Materials --
2.6.1. Further Reading --
2.6.2. Key Terms --
2.6.3. Summary --
2.7. Practice Set --
2.7.1. Quizzes --
2.7.2. Questions --
2.7.3. Problems --
2.8. Simulation Experiments --
2.8.1. Applets --
2.8.2. Lab Assignments --
2.9. Programming Assignment --
ch. 3 Transport Layer --
3.1. Introduction --
3.1.1. Transport-Layer Services --
3.2. Transport-Layer Protocols --
3.2.1. Simple Protocol --
3.2.2. Stop-and-Wait Protocol --
3.2.3. Go-Back-N Protocol (GBN) --
3.2.4. Selective-Repeat Protocol --
3.2.5. Bidirectional Protocols: Piggybacking --
3.2.6. Internet Transport-Layer Protocols --
3.3. User Datagram Protocol (UDP) --
3.3.1. User Datagram --
3.3.2. UDP Services --
3.3.3. UDP Applications --
3.4. Transmission Control Protocol (TCP) --
3.4.1. TCP Services --
3.4.2. TCP Features --
3.4.3. Segment --
3.4.4. TCP Connection --
3.4.5. State Transition Diagram --
3.4.6. Windows in TCP --
3.4.7. Flow Control --
3.4.8. Error Control --
3.4.9. TCP Congestion Control --
3.4.10. TCP Timers --
3.4.11. Options --
3.5. End-Chapter Materials --
3.5.1. Further Reading --
3.5.2. Key Terms --
3.5.3. Summary --
3.6. Practice Set --
3.6.1. Quizzes --
3.6.2. Questions --
3.6.3. Problems --
3.7. Simulation Experiments --
3.7.1. Applets --
3.7.2. Lab Assignments --
3.8. Programming Assignment --
ch. 4 Network Layer --
4.1. Introduction --
4.1.1. Network-Layer Services --
4.1.2. Packet Switching --
4.1.3. Network-Layer Performance --
4.1.4. Network-Layer Congestion --
4.1.5. Structure of A Router --
4.2. Network-Layer Protocols --
4.2.1. IPv4 Datagram Format --
4.2.2. IPv4 Addresses --
4.2.3. Forwarding of IP Packets --
4.2.4. ICMPv4 --
4.3. Unicast Routing --
4.3.1. General Idea --
4.3.2. Routing Algorithms --
4.3.3. Unicast Routing Protocols --
4.4. Multicast Routing --
4.4.1. Introduction --
4.4.2. Multicasting Basics --
4.4.3. Intradomain Routing Protocols --
4.4.4. Interdomain Routing Protocols --
4.5. Next Generation IP --
4.5.1. Packet Format --
4.5.2. IPv6 Addressing --
4.5.3. Transition from IPv4 to IPv6 --
4.5.4. ICMPv6 --
4.6. End-Chapter Materials --
4.6.1. Further Reading --
4.6.2. Key Terms --
4.6.3. Summary --
4.7. Practice Set --
4.7.1. Quizzes --
4.7.2. Questions --
4.7.3. Problems --
4.8. Simulation Experiments --
4.8.1. Applets --
4.8.2. Lab Assignments --
4.9. Programming Assignment --
ch. 5 Data-Link Layer: Wired Networks --
5.1. Introduction --
5.1.1. Nodes and Links --
5.1.2. Two Types of Links --
5.1.3. Two Sublayers --
5.2. Data Link Control (DLC) --
5.2.1. Framing --
5.2.2. Flow and Error Control --
5.2.3. Error Detection and Correction --
5.2.4. Two DLC Protocols --
5.3. Multiple Access Protocols --
5.3.1. Random Access --
5.3.2. Controlled Access --
5.3.3. Channelization --
5.4. Link-Layer Addressing --
5.5. Wired Lans: Ethernet Protocol --
5.5.1. IEEE Project 802 --
5.5.2. Standard Ethernet --
5.5.3. Fast Ethernet (100 Mbps) --
5.5.4. Gigabit Ethernet --
5.5.5. 10-Gigabit Ethernet --
5.5.6. Virtual LANs --
5.6. Other Wired Networks --
5.6.1. Point-to-Point Networks --
5.6.2. Sonet --
5.6.3. Switched Network: ATM --
5.7. Connecting Devices --
5.7.1. Repeaters or Hubs --
5.7.2. Link-Layer Switches --
5.7.3. Routers --
5.8. End-Chapter Materials --
5.8.1. Recommended Reading --
5.8.2. Key Terms --
5.8.3. Summary --
5.9. Practice Set --
5.9.1. Quizzes --
5.9.2. Questions --
5.9.3. Problems --
5.10. Simulation Experiments --
5.10.1. Applets --
5.10.2. Lab Assignments --
5.11. Programming Assignments --
ch. 6 Wireless Networks and Mobile IP --
6.1. Wireless LANs --
6.1.1. Introduction --
6.1.2. IEEE 802.11 Project --
6.1.3. Bluetooth --
6.1.4. WiMAX --
6.2. Other Wireless Networks --
6.2.1. Channelization --
6.2.2. Cellular Telephony --
6.2.3. Satellite Networks --
6.3. Mobile IP --
6.3.1. Addressing --
6.3.2. Agents --
6.3.3. Three Phases --
6.3.4. Inefficiency in Mobile IP --
6.4. End-Chapter Materials --
6.4.1. Further Reading --
6.4.2. Key Terms --
6.4.3. Summary --
6.5. Practice Set --
6.5.1. Quizzes --
6.5.2. Questions --
6.5.3. Problems --
6.6. Simulation Experiments --
6.6.1. Applets --
6.6.2. Lab Assignments --
6.7. Programming Assignment --
ch. 7 Physical Layer and Transmission Media --
7.1. Data and Signals --
7.1.1. Analog and Digital --
7.1.2. Transmission Impairment --
7.1.3. Data Rate Limits --
7.1.4. Performance --
7.2. Digital Transmission --
7.2.1. Digital-to-Digital Conversion --
7.2.2. Analog-to-Digital Conversion --
7.3. Analog Transmission --
7.3.1. Digital-to-Analog Conversion --
7.3.2. Analog-to-Analog Conversion --
7.4. Bandwidth Utilization --
7.4.1. Multiplexing --
7.4.2. Spread Spectrum --
7.5. Transmission Media --
7.5.1. Guided Media --
7.5.2. Unguided Media: Wireless --
7.6. End-Chapter Materials --
7.6.1. Recommended Reading --
7.6.2. Key Terms --
7.6.3. Summary --
7.7. Practice Set --
7.7.1. Quizzes --
7.7.2. Questions --
7.7.3. Problems --
ch. 8 Multimedia and Quality of Service --
8.1. Compression --
8.1.1. Lossless Compression --
8.1.2. Lossy Compression --
8.2. Multimedia Data --
8.2.1. Text --
8.2.2. Image --
8.2.3. Video --
8.2.4. Audio --
8.3. Multimedia in the Internet --
8.3.1. Streaming Stored Audio/Video --
8.3.2. Streaming Live Audio/Video --
8.3.3. Real-Time Interactive Audio/Video --
8.4. Real-Time Interactive Protocols --
8.4.1. Rationale for New Protocols --
8.4.2. RTP --
8.4.3. RTCP --
8.4.4. Session Initialization Protocol (SIP) --
8.4.5. H.323 --
8.4.6. SCTP --
8.5. Quality of Service --
8.5.1. Data-Flow Characteristics --
8.5.2. Flow Classes --
8.5.3. Flow Control to Improve QoS --
8.5.4. Integrated Services (IntServ) --
8.5.5. Differentiated Services (DiffServ) --
8.6. End-Chapter Materials --
8.6.1. Recommended Reading --
8.6.2. Key Terms --
8.6.3. Summary --
8.7. Practice Set --
8.7.1. Quizzes --
8.7.2. Questions --
8.7.3. Problems --
8.8. Simulation Experiments --
8.8.1. Applets --
8.8.2. Lab Assignments --
8.9. Programming Assignments --
ch. 9 Network Management --
9.1. Introduction --
9.1.1. Configuration Management --
9.1.2. Fault Management --
9.1.3. Performance Management --
9.1.4. Security Management --
9.1.5. Accounting Management --
9.2. SNMP --
9.2.1. Managers and Agents --
9.2.2. Management Components --
9.2.3. Overview --
9.2.4. SMI --
9.2.5. MIB --
9.2.6. SNMP --
9.3. ASN. I --
9.3.1. Language Basics --
9.3.2. Data Types --
9.3.3. Encoding --
9.4. End-Chapter Materials --
9.4.1. Further Reading --
9.4.2. Key Terms --
9.4.3. Summary --
9.5. Practice Set --
9.5.1. Quizzes --
9.5.2. Questions --
9.5.3. Problems --
ch. 10 Network Security --
10.1. Introduction --
10.1.1. Security Goals --
10.1.2. Attacks --
10.1.3. Services and Techniques --
10.2. Confidentiality --
10.2.1. Symmetric-Key Ciphers --
10.2.2. Asymmetric-Key Ciphers --
10.3. Other Aspects of Security --
10.3.1. Message Integrity --
10.3.2. Message Authentication --
10.3.3. Digital Signature --
10.3.4. Entity Authentication --
10.3.5. Key Management --
10.4. Internet Security --
10.4.1. Application-Layer Security --
10.4.2. Transport-Layer Security --
10.4.3. Network-Layer Security --
10.5. Firewalls --
10.5.1. Packet-Filter Firewall --
10.5.2. Proxy Firewall --
10.6. End-Chapter Materials --
10.6.1. Further Reading --
10.6.2. Key Terms --
10.6.3. Summary --
10.7. Practice Set --
10.7.1. Quizzes --
10.7.2. Questions --
10.7.3. Problems --
10.8. Simulation Experiments --
10.8.1. Applets --
10.8.2. Lab Assignments --
10.9. Programming Assignments --
ch. 11 Socket Programming In Java --
11.1. Introduction. Note continued: 11.1.1. Addresses and Ports --
11.1.2. Client-Server Paradigm --
11.2. Programming with UDP --
11.2.1. Iterative Approach --
11.2.2. Concurrent Approach --
11.3. Programming with TCP --
11.3.1. Iterative Approach --
11.3.2. Concurrent Approach --
11.4. End-Chapter Materials --
11.4.1. Further Reading --
11.4.2. Key Terms --
11.4.3. Summary --
11.5. Practice Set --
11.5.1. Quizzes --
11.5.2. Questions --
11.5.3. Problems --
11.6. Programming Assignments.

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha