Forouzan, Behrouz A.

Computer networks : a top-down approach/ Behrouz A. Forouzan and Firouz Mosharraf. - 1st ed. - New York, NY : McGraw-Hill, c2012. - xxiii, 931 p. : ill. ; 24 cm.

Machine generated contents note: ch. 1 Introduction --
1.1. Overview of the Internet --
1.1.1. Networks --
1.1.2. Switching --
1.1.3. Internet --
1.1.4. Accessing the Internet --
1.1.5. Hardware and Software --
1.2. Protocol Layering --
1.2.1. Scenarios --
1.2.2. TCP/IP Protocol Suite --
1.2.3. OSI Model --
1.3. Internet History --
1.3.1. Early History --
1.3.2. Birth of the Internet --
1.3.3. Internet Today --
1.4. Standards and Administration --
1.4.1. Internet Standards --
1.4.2. Internet Administration --
1.5. End-Chapter Materials --
1.5.1. Further Reading --
1.5.2. Key Terms --
1.5.3. Summary --
1.6. Practice Set --
1.6.1. Quizzes --
1.6.2. Questions --
1.6.3. Problems --
1.7. Simulation Experiments --
1.7.1. Applets --
1.7.2. Lab Assignments --
ch. 2 Application Layer --
2.1. Introduction --
2.1.1. Providing Services --
2.1.2. Application-Layer Paradigms --
2.2. Client-Server Paradigm --
2.2.1. Application Programming Interface --
2.2.2. Using Services of the Transport Layer --
2.3. Standard Client-Server Applications --
2.3.1. World Wide Web and HTTP --
2.3.2. FTP --
2.3.3. Electronic Mail --
2.3.4. Telnet --
2.3.5. Secure Shell (SSH) --
2.3.6. Domain Name System (DNS) --
2.4. Peer-to-Peer Paradigm --
2.4.1. P2P Networks --
2.4.2. Distributed Hash Table (DHT) --
2.4.3. Chord --
2.4.4. Pastry --
2.4.5. Kademlia --
2.4.6. Popular P2P Network: BitTorrent --
2.5. Socket Interface Programming --
2.5.1. Socket Interface in C --
2.6. End-Chapter Materials --
2.6.1. Further Reading --
2.6.2. Key Terms --
2.6.3. Summary --
2.7. Practice Set --
2.7.1. Quizzes --
2.7.2. Questions --
2.7.3. Problems --
2.8. Simulation Experiments --
2.8.1. Applets --
2.8.2. Lab Assignments --
2.9. Programming Assignment --
ch. 3 Transport Layer --
3.1. Introduction --
3.1.1. Transport-Layer Services --
3.2. Transport-Layer Protocols --
3.2.1. Simple Protocol --
3.2.2. Stop-and-Wait Protocol --
3.2.3. Go-Back-N Protocol (GBN) --
3.2.4. Selective-Repeat Protocol --
3.2.5. Bidirectional Protocols: Piggybacking --
3.2.6. Internet Transport-Layer Protocols --
3.3. User Datagram Protocol (UDP) --
3.3.1. User Datagram --
3.3.2. UDP Services --
3.3.3. UDP Applications --
3.4. Transmission Control Protocol (TCP) --
3.4.1. TCP Services --
3.4.2. TCP Features --
3.4.3. Segment --
3.4.4. TCP Connection --
3.4.5. State Transition Diagram --
3.4.6. Windows in TCP --
3.4.7. Flow Control --
3.4.8. Error Control --
3.4.9. TCP Congestion Control --
3.4.10. TCP Timers --
3.4.11. Options --
3.5. End-Chapter Materials --
3.5.1. Further Reading --
3.5.2. Key Terms --
3.5.3. Summary --
3.6. Practice Set --
3.6.1. Quizzes --
3.6.2. Questions --
3.6.3. Problems --
3.7. Simulation Experiments --
3.7.1. Applets --
3.7.2. Lab Assignments --
3.8. Programming Assignment --
ch. 4 Network Layer --
4.1. Introduction --
4.1.1. Network-Layer Services --
4.1.2. Packet Switching --
4.1.3. Network-Layer Performance --
4.1.4. Network-Layer Congestion --
4.1.5. Structure of A Router --
4.2. Network-Layer Protocols --
4.2.1. IPv4 Datagram Format --
4.2.2. IPv4 Addresses --
4.2.3. Forwarding of IP Packets --
4.2.4. ICMPv4 --
4.3. Unicast Routing --
4.3.1. General Idea --
4.3.2. Routing Algorithms --
4.3.3. Unicast Routing Protocols --
4.4. Multicast Routing --
4.4.1. Introduction --
4.4.2. Multicasting Basics --
4.4.3. Intradomain Routing Protocols --
4.4.4. Interdomain Routing Protocols --
4.5. Next Generation IP --
4.5.1. Packet Format --
4.5.2. IPv6 Addressing --
4.5.3. Transition from IPv4 to IPv6 --
4.5.4. ICMPv6 --
4.6. End-Chapter Materials --
4.6.1. Further Reading --
4.6.2. Key Terms --
4.6.3. Summary --
4.7. Practice Set --
4.7.1. Quizzes --
4.7.2. Questions --
4.7.3. Problems --
4.8. Simulation Experiments --
4.8.1. Applets --
4.8.2. Lab Assignments --
4.9. Programming Assignment --
ch. 5 Data-Link Layer: Wired Networks --
5.1. Introduction --
5.1.1. Nodes and Links --
5.1.2. Two Types of Links --
5.1.3. Two Sublayers --
5.2. Data Link Control (DLC) --
5.2.1. Framing --
5.2.2. Flow and Error Control --
5.2.3. Error Detection and Correction --
5.2.4. Two DLC Protocols --
5.3. Multiple Access Protocols --
5.3.1. Random Access --
5.3.2. Controlled Access --
5.3.3. Channelization --
5.4. Link-Layer Addressing --
5.5. Wired Lans: Ethernet Protocol --
5.5.1. IEEE Project 802 --
5.5.2. Standard Ethernet --
5.5.3. Fast Ethernet (100 Mbps) --
5.5.4. Gigabit Ethernet --
5.5.5. 10-Gigabit Ethernet --
5.5.6. Virtual LANs --
5.6. Other Wired Networks --
5.6.1. Point-to-Point Networks --
5.6.2. Sonet --
5.6.3. Switched Network: ATM --
5.7. Connecting Devices --
5.7.1. Repeaters or Hubs --
5.7.2. Link-Layer Switches --
5.7.3. Routers --
5.8. End-Chapter Materials --
5.8.1. Recommended Reading --
5.8.2. Key Terms --
5.8.3. Summary --
5.9. Practice Set --
5.9.1. Quizzes --
5.9.2. Questions --
5.9.3. Problems --
5.10. Simulation Experiments --
5.10.1. Applets --
5.10.2. Lab Assignments --
5.11. Programming Assignments --
ch. 6 Wireless Networks and Mobile IP --
6.1. Wireless LANs --
6.1.1. Introduction --
6.1.2. IEEE 802.11 Project --
6.1.3. Bluetooth --
6.1.4. WiMAX --
6.2. Other Wireless Networks --
6.2.1. Channelization --
6.2.2. Cellular Telephony --
6.2.3. Satellite Networks --
6.3. Mobile IP --
6.3.1. Addressing --
6.3.2. Agents --
6.3.3. Three Phases --
6.3.4. Inefficiency in Mobile IP --
6.4. End-Chapter Materials --
6.4.1. Further Reading --
6.4.2. Key Terms --
6.4.3. Summary --
6.5. Practice Set --
6.5.1. Quizzes --
6.5.2. Questions --
6.5.3. Problems --
6.6. Simulation Experiments --
6.6.1. Applets --
6.6.2. Lab Assignments --
6.7. Programming Assignment --
ch. 7 Physical Layer and Transmission Media --
7.1. Data and Signals --
7.1.1. Analog and Digital --
7.1.2. Transmission Impairment --
7.1.3. Data Rate Limits --
7.1.4. Performance --
7.2. Digital Transmission --
7.2.1. Digital-to-Digital Conversion --
7.2.2. Analog-to-Digital Conversion --
7.3. Analog Transmission --
7.3.1. Digital-to-Analog Conversion --
7.3.2. Analog-to-Analog Conversion --
7.4. Bandwidth Utilization --
7.4.1. Multiplexing --
7.4.2. Spread Spectrum --
7.5. Transmission Media --
7.5.1. Guided Media --
7.5.2. Unguided Media: Wireless --
7.6. End-Chapter Materials --
7.6.1. Recommended Reading --
7.6.2. Key Terms --
7.6.3. Summary --
7.7. Practice Set --
7.7.1. Quizzes --
7.7.2. Questions --
7.7.3. Problems --
ch. 8 Multimedia and Quality of Service --
8.1. Compression --
8.1.1. Lossless Compression --
8.1.2. Lossy Compression --
8.2. Multimedia Data --
8.2.1. Text --
8.2.2. Image --
8.2.3. Video --
8.2.4. Audio --
8.3. Multimedia in the Internet --
8.3.1. Streaming Stored Audio/Video --
8.3.2. Streaming Live Audio/Video --
8.3.3. Real-Time Interactive Audio/Video --
8.4. Real-Time Interactive Protocols --
8.4.1. Rationale for New Protocols --
8.4.2. RTP --
8.4.3. RTCP --
8.4.4. Session Initialization Protocol (SIP) --
8.4.5. H.323 --
8.4.6. SCTP --
8.5. Quality of Service --
8.5.1. Data-Flow Characteristics --
8.5.2. Flow Classes --
8.5.3. Flow Control to Improve QoS --
8.5.4. Integrated Services (IntServ) --
8.5.5. Differentiated Services (DiffServ) --
8.6. End-Chapter Materials --
8.6.1. Recommended Reading --
8.6.2. Key Terms --
8.6.3. Summary --
8.7. Practice Set --
8.7.1. Quizzes --
8.7.2. Questions --
8.7.3. Problems --
8.8. Simulation Experiments --
8.8.1. Applets --
8.8.2. Lab Assignments --
8.9. Programming Assignments --
ch. 9 Network Management --
9.1. Introduction --
9.1.1. Configuration Management --
9.1.2. Fault Management --
9.1.3. Performance Management --
9.1.4. Security Management --
9.1.5. Accounting Management --
9.2. SNMP --
9.2.1. Managers and Agents --
9.2.2. Management Components --
9.2.3. Overview --
9.2.4. SMI --
9.2.5. MIB --
9.2.6. SNMP --
9.3. ASN. I --
9.3.1. Language Basics --
9.3.2. Data Types --
9.3.3. Encoding --
9.4. End-Chapter Materials --
9.4.1. Further Reading --
9.4.2. Key Terms --
9.4.3. Summary --
9.5. Practice Set --
9.5.1. Quizzes --
9.5.2. Questions --
9.5.3. Problems --
ch. 10 Network Security --
10.1. Introduction --
10.1.1. Security Goals --
10.1.2. Attacks --
10.1.3. Services and Techniques --
10.2. Confidentiality --
10.2.1. Symmetric-Key Ciphers --
10.2.2. Asymmetric-Key Ciphers --
10.3. Other Aspects of Security --
10.3.1. Message Integrity --
10.3.2. Message Authentication --
10.3.3. Digital Signature --
10.3.4. Entity Authentication --
10.3.5. Key Management --
10.4. Internet Security --
10.4.1. Application-Layer Security --
10.4.2. Transport-Layer Security --
10.4.3. Network-Layer Security --
10.5. Firewalls --
10.5.1. Packet-Filter Firewall --
10.5.2. Proxy Firewall --
10.6. End-Chapter Materials --
10.6.1. Further Reading --
10.6.2. Key Terms --
10.6.3. Summary --
10.7. Practice Set --
10.7.1. Quizzes --
10.7.2. Questions --
10.7.3. Problems --
10.8. Simulation Experiments --
10.8.1. Applets --
10.8.2. Lab Assignments --
10.9. Programming Assignments --
ch. 11 Socket Programming In Java --
11.1. Introduction. Note continued: 11.1.1. Addresses and Ports --
11.1.2. Client-Server Paradigm --
11.2. Programming with UDP --
11.2.1. Iterative Approach --
11.2.2. Concurrent Approach --
11.3. Programming with TCP --
11.3.1. Iterative Approach --
11.3.2. Concurrent Approach --
11.4. End-Chapter Materials --
11.4.1. Further Reading --
11.4.2. Key Terms --
11.4.3. Summary --
11.5. Practice Set --
11.5.1. Quizzes --
11.5.2. Questions --
11.5.3. Problems --
11.6. Programming Assignments.

9781259001567


Computer networks.
Internet.

004.6 / FOR/C