Корично изображение Книга

Computer networking : a top-down approach /

Overview: Building on the successful top-down approach of previous editions, the Sixth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With...

Пълно описание

Основен автор: Kurose, James F.
Други автори: Ross, Keith W., 1956-
Формат: Книга
Език: English
Публикувано: Boston : Pearson, 2013.
Издание: 6th ed.
Предмети:
Съдържание:
  • Computer Networks And The Internet:
  • What is the Internet?:
  • Nuts-and-bolts description
  • Services description
  • What is a protocol?
  • Network edge:
  • Access networks
  • Physical media
  • Network core:
  • Packet switching
  • Circuit switching
  • Network of networks
  • Delay, loss, and throughput in packet-switched networks:
  • Overview of delay in packet-switched networks
  • Queuing delay and packet loss
  • End-to-end delay
  • Throughput in computer networks
  • Protocol layers and their service models:
  • Layered architecture
  • Encapsulation
  • Networks under attack
  • History of computer networking and the Internet:
  • Development of packet switching: 1961-1972
  • Proprietary networks and Internetworking: 1972-1980
  • Proliferation of networks: 1980-1990
  • Internet explosion: 1990s
  • New millennium
  • Summary
  • Homework problems and questions
  • Wireshark Lab
  • Interview: Leonard Kleinrock
  • Application Layer:
  • Principles of network applications:
  • Network application architectures
  • Processes communicating
  • Transport services available to applications
  • Transport services provided by the Internet
  • Application-layer protocols
  • Network applications covered in this book
  • Web and HTTP:
  • Overview of HTTP
  • Non-persistent and persistent connections
  • HTTP message format
  • User-server interaction: cookies
  • Web caching
  • Conditional GET
  • File Transfer: FTP:
  • FTP commands and replies
  • Electronic mail in the Internet:
  • SMTP
  • Comparison with HTTP
  • Mail message formats
  • Mail access protocols
  • DNS-Internet's directory service:
  • Services provided by DNS
  • Overview of how DNS works
  • DNS records and messages
  • Peer-to-peer applications:
  • P2P File distribution
  • Distributed Hash Tables (DHTs)
  • Socket programming: creating network applications:
  • Socket programming with UDP
  • Socket programming with TCP
  • Summary
  • Homework problems and questions
  • Socket programming assignments
  • Wireshark Labs: HTTP, DNS
  • Interview: Marc Andreessen
  • Transport Layer:
  • Introduction and transport-layer services:
  • Relationship between transport and network layers
  • Overview of the transport layer in the Internet
  • Multiplexing and demultiplexing
  • Connectionless transport: UDP:
  • UDP Segment structure
  • UDP Checksum
  • Principles of reliable data transfer:
  • Building a reliable data transfer protocol
  • Pipelined reliable data transfer protocols
  • Go-Back-N (GBN)
  • Selective Repeat (SR)
  • Connection-Oriented Transport: TCP:
  • TCP Connection
  • TCP Segment structure
  • Round-trip time estimation and timeout
  • Reliable data transfer
  • Flow control
  • TCP connection management
  • Principles of congestion control:
  • Causes and the costs of congestion
  • Approaches to congestion control
  • Network-assisted congestion-control example: ATM ABR congestion control
  • TCP congestion control:
  • Fairness
  • Summary
  • Homework problems and questions
  • Programming assignments
  • Wireshark Labs: TCP, UDP
  • Interview: Van Jacobson
  • Network Layer:
  • Introduction:
  • Forwarding and routing
  • Network service models
  • Virtual circuit and datagram networks:
  • Virtual-circuit networks
  • Datagram networks
  • Origins of VC and datagram networks
  • What's inside a router?:
  • Input processing
  • Switching
  • Output processing
  • Where does queuing occur?
  • Routing control plane
  • Internet Protocol (IP): forwarding and addressing in the Internet:
  • Datagram format
  • IPv4 addressing
  • Internet Control Message Protocol (ICMP)
  • IPv6
  • Brief foray into IP security
  • Routing algorithms:
  • Link-State (LS) routing algorithm
  • Distance-Vector (DV) routing algorithm
  • Hierarchical routing
  • Routing in the Internet:
  • Intra-AS routing in the Internet: RIP
  • Intra-AS routing in the Internet: OSPF
  • Inter-AS routing: BGP
  • Broadcast and multicast routing:
  • Broadcast routing algorithms
  • Multicast
  • Summary
  • Homework problems and questions
  • Programming assignments
  • Wireshark Labs: IP, ICMP
  • Interview: Vinton G Cerf.
  • Link Layer: Links, Access Networks, And LANs:
  • Introduction to the link layer:
  • Services provided by the link layer
  • Where is the link layer implemented?
  • Error detection and -correction techniques:
  • Parity checks
  • Checksumming methods
  • Cyclic Redundancy Check (CRC)
  • Multiple access links and protocols:
  • Channel partitioning protocols
  • Random access protocols
  • Taking-turns protocols
  • DOCSIS: Link-layer protocol for cable Internet access
  • Switched local area networks:
  • Link-layer addressing and ARP
  • Ethernet
  • Link-layer switches
  • Virtual Local Area Networks (VLANs)
  • Link virtualization: network as a link layer:
  • Multiprotocol Label Switching (MPLS)
  • Data center networking:
  • Retrospective: Day in the life of a web page request:
  • Getting started: DHCP, UDP, IP, and Ethernet
  • Still getting started: DNS and ARP
  • Still getting started: intra-domain routing to the DNS server
  • Web client-server interaction: TCP and HTTP
  • Summary
  • Homework problems and questions
  • Wireshark Labs: Ethernet and ARP, DHCP
  • Interview: Simon S Lam
  • Wireless And Mobile Networks:
  • Introduction
  • Wireless links and network characteristics:
  • CDMA
  • WiFi: 802_11 wireless LANs
  • 802_11 Architecture
  • 802_11 MAC Protocol
  • IEEE 802_11 Frame
  • Mobility in the same IP subnet
  • Advanced features in 802_11
  • Personal area networks: Bluetooth and Zigbee
  • Cellular Internet access:
  • Overview of cellular network architecture
  • 3G cellular data networks: extending the Internet to cellular subscribers
  • On to 4G: LTE
  • Mobility management: principles:
  • Addressing
  • Routing to a mobile node
  • Mobile IP
  • Managing mobility in cellular networks:
  • Routing calls to a mobile user
  • Handoffs in GSM
  • Wireless and mobility: impact on higher-layer protocols
  • Summary
  • Homework problems and questions
  • Wireshark Lab: IEEE 802_11 (WiFi)
  • Interview: Deborah Estrin
  • Multimedia Networking:
  • Multimedia networking applications:
  • Properties of video
  • Properties of audio
  • Types of multimedia network applications
  • Streaming stored video:
  • UDP Streaming
  • HTTP Streaming
  • Adaptive streaming and DASH
  • Content distribution networks
  • Case Studies: Netflix, YouTube, and KanKan
  • Voice-over-IP:
  • Limitations of the best-effort IP service
  • Removing jitter at the receiver for audio
  • Recovering from packet loss
  • Case Study: VoIP with Skype
  • Protocols for real-time conversational applications
  • RTP
  • SIP
  • Network support for multimedia:
  • Dimensioning best-effort networks
  • Providing multiple classes of service
  • Diffserv
  • Per-connection Quality-of-Service (QoS) guarantees: resource reservation and call admission
  • Summary
  • Homework problems and questions
  • Programming assignment
  • Interview: Henning Schulzrinne
  • Security In Computer Networks:
  • What is network security?
  • Principles of cryptography:
  • Symmetric key cryptography
  • Public key encryption
  • Message integrity and digital signatures:
  • Cryptographic hash functions
  • Message authentication code
  • Digital signatures
  • End-point authentication:
  • Authentication Protocol ap1-0
  • Authentication Protocol ap2-0
  • Authentication Protocol ap3-0
  • Authentication Protocol ap3-1
  • Authentication Protocol ap4_0
  • Securing E-mail:
  • Secure E-mail
  • PGP
  • Securing TCP connections: SSL
  • Big picture
  • More complete picture
  • Network-layer security: IPsec and virtual private networks:
  • IPsec and Virtual Private Networks (VPNs)
  • AH and ESP protocols
  • Security associations
  • IPsec datagram
  • IKE: Key management in IPsec
  • Securing wireless LANs:
  • Wired Equivalent Privacy (WEP)
  • IEEE802_11i
  • Operational security: firewalls and intrusion detection systems:
  • Firewalls
  • Intrusion detection systems
  • Summary
  • Homework problems and questions
  • Wireshark Lab: SSL
  • IPsec Lab
  • Interview: Steven M Bellovin
  • Network Management:
  • What is network management?
  • Infrastructure for network management
  • Internet-standard management framework:
  • Structure of Management Information: SMI
  • Management Information Base: MIB
  • SNMP Protocol operations and transport mappings
  • Security and administration
  • ASN-
  • Conclusion
  • Homework problems and questions
  • Interview: Jennifer Rexford
  • References
  • Index.