Computer networks/ Andrew S. Tanenbaum.

By: Tanenbaum, Andrew SMaterial type: TextTextPublication details: Delhi: Pearson, 2003Edition: 4th edDescription: xx, 891 p. : ill. ; 25 cmISBN: 9788177581652 Subject(s): Computer NetworksDDC classification: 004.6
Contents:
1. Introduction. 1.1. Uses of Computer Networks. 1.2. Network Hardware. 1.3. Network Software. 1.4. Reference Models. 1.5. Example Networks. 1.6. Network Standardization. 1.7. Metric Units. 1.8. Outline of the Rest of the Book -- 2. The Physical Layer. 2.1. The Theoretical Basis for Data Communication. 2.2. Guided Transmission Media. 2.3. Wireless Transmission. 2.4. Communication Satellites. 2.5. The Public Switched Telephone Network. 2.6. The Mobile Telephone System. 2.7. Cable Television. 3. The Data Link Layer. 3.1. Data Link Layer Design Issues. 3.2. Error Detection and Correction. 3.3. Elementary Data Link Protocols. 3.4. Sliding Window Protocols. 3.5. Protocol Verification. 3.6. Example Data Link Protocols -- 4. The Medium Access Control Sublayer. 4.1. The Channel Allocation Problem. 4.2. Multiple Access Protocols. 4.3. Ethernet. 4.4. Wireless Lans. 4.5. Broadband Wireless. 4.6. Bluetooth. 4.7. Data Link Layer Switching --
5. The Network Layer. 5.1. Network Layer Design Issues. 5.2. Routing Algorithms. 5.3. Congestion Control Algorithms. 5.4. Quality of Service. 5.5. Internetworking. 5.6. The Network Layer in the Internet -- 6. The Transport Layer. 6.1. The Transport Service. 6.2. Elements of Transport Protocols. 6.3. A Simple Transport Protocol. 6.4. The Internet Transport Protocols: UDP. 6.5. The Internet Transport Protocols: TCP. 6.6. Performance Issues -- 7. The Application Layer. 7.1. DNS - The Domain Name System. 7.2. Electronic Mail. 7.3. The World Wide Web. 7.4. Multimedia -- 8. Network Security. 8.1. Cryptography. 8.2. Symmetric-Key Algorithms. 8.3. Public-Key Algorithms. 8.4. Digital Signatures. 8.5. Management of Public Keys. 8.6. Communication Security. 8.7. Authentication Protocols. 8.8. E-mail Security. 8.9. Web Security. 8.10. Social Issues -- 9. Reading List and Bibliography. 9.1. Suggestions for Further Reading. 9.2. Alphabetical Bibliography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
004.6 TAN/C (Browse shelf(Opens below)) Available P18841
Total holds: 0

1. Introduction. 1.1. Uses of Computer Networks. 1.2. Network Hardware. 1.3. Network Software. 1.4. Reference Models. 1.5. Example Networks. 1.6. Network Standardization. 1.7. Metric Units. 1.8. Outline of the Rest of the Book -- 2. The Physical Layer. 2.1. The Theoretical Basis for Data Communication. 2.2. Guided Transmission Media. 2.3. Wireless Transmission. 2.4. Communication Satellites. 2.5. The Public Switched Telephone Network. 2.6. The Mobile Telephone System. 2.7. Cable Television. 3. The Data Link Layer. 3.1. Data Link Layer Design Issues. 3.2. Error Detection and Correction. 3.3. Elementary Data Link Protocols. 3.4. Sliding Window Protocols. 3.5. Protocol Verification. 3.6. Example Data Link Protocols -- 4. The Medium Access Control Sublayer. 4.1. The Channel Allocation Problem. 4.2. Multiple Access Protocols. 4.3. Ethernet. 4.4. Wireless Lans. 4.5. Broadband Wireless. 4.6. Bluetooth. 4.7. Data Link Layer Switching --

5. The Network Layer. 5.1. Network Layer Design Issues. 5.2. Routing Algorithms. 5.3. Congestion Control Algorithms. 5.4. Quality of Service. 5.5. Internetworking. 5.6. The Network Layer in the Internet -- 6. The Transport Layer. 6.1. The Transport Service. 6.2. Elements of Transport Protocols. 6.3. A Simple Transport Protocol. 6.4. The Internet Transport Protocols: UDP. 6.5. The Internet Transport Protocols: TCP. 6.6. Performance Issues -- 7. The Application Layer. 7.1. DNS - The Domain Name System. 7.2. Electronic Mail. 7.3. The World Wide Web. 7.4. Multimedia -- 8. Network Security. 8.1. Cryptography. 8.2. Symmetric-Key Algorithms. 8.3. Public-Key Algorithms. 8.4. Digital Signatures. 8.5. Management of Public Keys. 8.6. Communication Security. 8.7. Authentication Protocols. 8.8. E-mail Security. 8.9. Web Security. 8.10. Social Issues -- 9. Reading List and Bibliography. 9.1. Suggestions for Further Reading. 9.2. Alphabetical Bibliography.

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha