Computer networking

a top-down approach

4th ed.
  • 3.4 (5 ratings) ·
  • 61 Want to read
  • 5 Currently reading
  • 8 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 3.4 (5 ratings) ·
  • 61 Want to read
  • 5 Currently reading
  • 8 Have read

Buy this book

Last edited by Drini
August 26, 2024 | History

Computer networking

a top-down approach

4th ed.
  • 3.4 (5 ratings) ·
  • 61 Want to read
  • 5 Currently reading
  • 8 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Publisher
Pearson, Addison Wesley
Language
English
Pages
852

Buy this book

Previews available in: English Mandarin

Edition Availability
Cover of: Computer networking
Computer networking: A Top-Down Approach
2013, Pearson
Paperback in English - 6th ed.; international edition
Cover of: Computer networking
Computer networking: a top-down approach
2007, Pearson, Addison Wesley
in English - 4th ed.
Cover of: Computer Networking
Computer Networking: A Top-Down Approach (4th Edition)
March 23, 2007, Addison Wesley
Hardcover in English - 4 edition
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2006, Pearson Education, Dorling Kindersley
in English - 3rd ed.; low price ed.
Cover of: 计算机网络 = Computer networking
计算机网络 = Computer networking: 自顶向下方法与Internet 特色 = a top-down approach featuring the Internet
2005, 高等教育出版社 = Higher Education Press
in Mandarin and English - 第三版 = 3rd ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the internet
2003, Pearson Education
Paperback in English - 2nd ed.; low price ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2003, Addison-Wesley
in English - 2nd ed.; international edition
Cover of: Computer Networking
Computer Networking: A Top-Down Approach Featuring the Internet
2002, Addison Wesley
in English - 2nd ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2002, Addison Wesley
in English - 2nd ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2001, Addison-Wesley
in English

Add another edition?

Book Details


Table of Contents

Chapter 1. Computer Networks and the Internet
Page 1
1.1. What Is the Internet?
Page 2
1.1.1. A Nuts-and-Bolts Description
Page 2
1.1.2. A Services Description
Page 5
1.1.3. What Is a Protocol?
Page 7
1.2. The Network Edge
Page 9
1.2.1. Client and Server Programs
Page 12
1.2.2. Access Networks
Page 19
1.2.3. Physical Media
Page 22
1.3. The Network Core
Page 22
1.3.1. Circuit Switching and Packet Switching
Page 22
1.3.2. How Do Packets Make Their Way Through Packet-Switched Networks?
Page 30
1.3.3. ISPs and Internet Backbones
Page 31
1.4. Delay, Loss, and Throughput in Packet-Switched Networks
Page 33
1.4.1. Overview of Delay in Packet-Switched Networks
Page 33
1.4.2. Queuing Delay and Packet Loss
Page 37
1.4.3. End-to-End Delay
Page 40
1.4.4. Throughput in Computer Networks
Page 42
1.5. Protocol Layers and Their Service Models
Page 45
1.5.1. Layered Architecture
Page 45
1.5.2. Messages, Segments, Datagrams, and Frames
Page 51
1.6. Networks Under Attack
Page 53
1.7. History of Computer Networking and the Internet
Page 58
1.7.1. The Development of Packet Switching: 1961-1972
Page 58
1.7.2. Proprietary Networks and Internetworking: 1972-1980
Page 60
1.7.3. A Proliferation of Networks: 1980-1990
Page 62
1.7.4. The Internet Explosion: The 1990s
Page 63
1.7.5. Recent Developments
Page 64
1.8. Summary
Page 65
Road-Mapping This Book
Page 66
Homework Problems and Questions
Page 67
Problems
Page 69
Discussion Questions
Page 75
Ethereal Lab
Page 76
Interview: Leonard Kleinrock
Page 78
Chapter 2. Application Layer
Page 81
2.1. Principles of Network Applications
Page 82
2.1.1. Network Application Architectures
Page 82
2.1.2. Processes Communicating
Page 85
2.1.3. Transport Services Available to Applications
Page 88
2.1.4. Transport Services Provided by the Internet
Page 90
2.1.5. Application-Layer Protocols
Page 94
2.1.6. Network Applications Covered in This Book
Page 95
2.2. The Web and HTTP
Page 96
2.2.1. Overview of HTTP
Page 96
2.2.2. Non-persistent and Persistent Connections
Page 98
2.2.3. HTTP Message Format
Page 101
2.2.4. User-Server Interaction: Cookies
Page 106
2.2.5. Web Caching
Page 108
2.2.6. The Conditional GET
Page 112
2.3. File Transfer: FTP
Page 114
2.3.1. FTP Commands and Replies
Page 116
2.4. Electronic Mail in the Internet
Page 16
2.4.1. SMTP
Page 119
2.4.2. Comparison with HTTP
Page 122
2.4.3. Mail Message Formats and MIME
Page 123
2.4.4. Mail Access Protocols
Page 126
2.5. DNS - The Internet's Directory Service
Page 130
2.5.1. Services Provided by DNS
Page 131
2.5.2. Overview of How DNS Works
Page 133
2.5.3. DNS Records and Messages
Page 139
2.6. Peer-to-Peer Applications
Page 144
2.6.1. P2P File Distribution
Page 145
2.6.2. Searching for Information in a P2P Community
Page 151
2.6.3. Case Study: P2P Internet Telephony with Skype
Page 157
2.7. Socket Programming with TCP
Page 159
2.7.1. Socket Programming with TCP
Page 160
2.7.2. An Example Client-Server Application in Java
Page 162
2.8. Socket Programming with UDP
Page 169
2.9. Summary
Page 177
Homework Problems and Questions
Page 178
Problems
Page 180
Discussion Questions
Page 187
Socket Programming Assignments
Page 188
Ethereal Labs
Page 190
Interview: Bram Cohen
Page 192
Chapter 3. Transport Layer
Page 195
3.1. Introduction and Transport-Layer Services
Page 196
3.1.1. Relationship Between Transport and Network Layers
Page 196
3.1.2. Overview of the Transport Layer in the Internet
Page 199
3.2. Multiplexing and Demultiplexing
Page 201
3.3. Connectionless Transport: UDP
Page 208
3.3.1. UDP Segment Structure
Page 212
3.3.2. UDP Checksum
Page 212
3.4. Principles of Reliable Data Transfer
Page 214
3.4.1. Building a Reliable Data Transfer Protocol
Page 216
3.4.2. Pipelined Reliable Data Transfer Protocols
Page 225
3.4.3. Go-Back-N (GBN)
Page 228
3.4.4. Selective Repeat (SR)
Page 233
3.5. Connection-Oriented Transport: TCP
Page 240
3.5.1. The TCP Connection
Page 241
3.5.2. TCP Segment Structure
Page 243
3.5.3. Round-Trip Time Estimation and Timeout
Page 248
3.5.4. Reliable Data Transfer
Page 252
3.5.5. Flow Control
Page 260
3.5.6. TCP Connection Management
Page 262
3.6. Principles of Congestion Control
Page 269
3.6.1. The Causes and the Costs of Congestion
Page 270
3.6.2. Approaches to Congestion Control
Page 276
3.6.3. Network-Assisted Congestion-Control Example: ATM ABR Congestion Control
Page 277
3.7. TCP Congestion Control
Page 279
3.7.1. Fairness
Page 287
3.8. Summary
Page 290
Homework Problems and Questions
Page 293
Problems
Page 295
Discussion Questions
Page 304
Programming Assignments
Page 305
Ethereal Labs
Page 305
Interview: Sally Floyd
Page 307
Chapter 4. The Network Layer
Page 309
4.1. Introduction
Page 310
4.1.1. Forwarding and Routing
Page 312
4.1.2. Network Service Models
Page 314
4.2. Virtual Circuit and Datagram Networks
Page 31
4.2.1. Virtual-Circuit Networks
Page 318
4.2.2. Datagram Networks
Page 321
4.2.3. Origins of VC and Datagram Networks
Page 323
4.3. What's Inside a Router?
Page 324
4.3.1. Input Ports
Page 326
4.3.2. Switching Fabric
Page 328
4.3.3. Output Ports
Page 331
4.3.4. Where Does Queuing Occur?
Page 331
4.4. The Internet Protocol (IP): Forwarding and Addressing in the Internet
Page 334
4.4.1. Datagram Format
Page 336
4.4.2. IPv4 Addressing
Page 342
4.4.3. Internet Control Message Protocol (ICMP)
Page 357
4.4.4. IPv6
Page 360
4.4.5. A Brief Introduction into IP Security VPNs
Page 366
4.5. Routing Algorithms
Page 368
4.5.1. The Link-State (LS) Routing Algorithm
Page 371
4.5.2. The Distance-Vector (DV) Routing Algorithm
Page 375
4.5.3. Hierarchical Routing
Page 383
4.6. Routing in the Internet
Page 387
4.6.1. Intra-AS Routing in the Internet: RIP
Page 388
4.6.2. Intra-AS Routing in the Internet: OSPF
Page 392
4.6.3. Inter-AS Routing: BGP
Page 395
4.7. Broadcast and Multicast Routing
Page 402
4.7.1. Broadcast Routing Algorithms
Page 403
4.7.2. Multicast
Page 408
4.8. Summary
Page 415
Homework Problems and Questions
Page 416
Problems
Page 419
Discussion Questions
Page 429
Programming Assignment
Page 430
Ethereal Labs
Page 431
Interview: Vinton G. Cerf
Page 432
Chapter 5. The Link Layer and Local Area Networks
Page 435
5.1. Link Layer: Introduction and Services
Page 437
5.1.1. The Services Provided by the Link Layer
Page 437
5.1.2. Where Is the Link Layer Implemented?
Page 440
5.2. Error-Detection and -Correction Techniques
Page 442
5.2.1. Parity Checks
Page 444
5.2.2. Checksumming Methods
Page 446
5.2.3. Cyclic Redundancy Check (CRC)
Page 446
5.3. Multiple Access Protocols
Page 449
5.3.1. Channel Partitioning Protocols
Page 451
5.3.2. Random Access Protocols
Page 453
5.3.3. Taking-Turns Protocols
Page 460
5.3.4. Local Area Networks (LANs)
Page 461
5.4. Link-Layer Addressing
Page 463
5.4.1. MAC Addresses
Page 463
5.4.2. Address Resolution Protocol (ARP)
Page 465
5.5. Ethernet
Page 469
5.5.1. Ethernet Frame Structure
Page 471
5.5.2. CSMA/CD: Ethernet's Multiple Access Protocol
Page 475
5.5.3. Ethernet Technologies
Page 477
5.6. Link-Layer Switches
Page 480
5.6.1. Forwarding and Filtering
Page 481
5.6.2. Self-Learning
Page 483
5.6.3. Properties of Link-Layer Switching
Page 484
5.6.4. Switches Versus Routers
Page 485
5.7. PPP: The Point-to-Point Protocol
Page 487
5.7.1. PPP Data Framing
Page 489
5.8. Link Virtualization: A Network as a Link Layer
Page 491
5.8.1. Asynchronous Transfer Mode (ATM) Networks
Page 492
5.8.2. Multiprotocol Label Switching (MPLS)
Page 497
5.9. Summary
Page 500
Homework Problems and Questions
Page 501
Problems
Page 503
Discussion Questions
Page 508
Ethereal Labs
Page 509
Interview: Simon S. Lam
Page 510
Chapter 6. Wireless and Mobile Networks
Page 513
6.1. Introduction
Page 514
6.2. Wireless Links and Network Characteristics
Page 519
6.2.1. CDMA
Page 522
6.3. WiFi: 802.11 Wireless LANs
Page 526
6.3.1. The 802.11 Architecture
Page 527
6.3.2. The 802.11 MAC Protocol
Page 531
6.3.3. The IEEE 802.11 Frame
Page 537
6.3.4. Mobility in the Same IP Subnet
Page 541
6.3.5. Advanced Features in 802.11
Page 542
Beyond 802.11: Bluetooth and WiMAX
Page 544
6.4. Cellular Internet Access
Page 548
6.4.1. An Overview of Cellular Architecture
Page 548
6.4.2. Cellular Standards and Technologies: A Brief Survey
Page 551
6.5. Mobility Management: Principles
Page 555
6.5.1. Addressing
Page 557
6.5.2. Routing to a Mobile Node
Page 559
6.6. Mobile IP
Page 564
6.7. Managing Mobility in Cellular Networks
Page 570
6.7.1. Routing Calls to a Mobile User
Page 571
6.7.2. Handoffs in GSM
Page 572
6.8. Wireless and Mobility: Impact on Higher-layer Protocols
Page 575
6.9. Summary
Page 578
Homework Problems and Questions
Page 579
Problems
Page 580
Discussion Questions
Page 584
Ethereal Labs
Page 584
Interview: Charlie Perkins
Page 585
Chapter 7. Multimedia Networking
Page 589
7.1. Multimedia Networking Applications
Page 590
7.1.1. Examples of Multimedia Applications
Page 590
7.1.2. Hurdles for Multimedia in Today's Internet
Page 593
7.1.3. How Should the Internet Evolve to Support Multimedia Better?
Page 594
7.1.4. Audio and Video Compression
Page 596
7.2. Streaming Stored Audio and Video
Page 600
7.2.1. Accessing Audio and Video Through a Web Server
Page 600
7.2.2. Sending Multimedia from a Streaming Server to a Helper Application
Page 602
7.2.3. Real-Time Streaming Protocol (RTSP)
Page 604
7.3. Making the Best of the Best-Effort Service
Page 608
7.3.1. The Limitations of a Best-Effort Service
Page 608
7.3.2. Removing Jitter at the Receiver for Audio
Page 611
7.3.3. Recovering from Packet Loss
Page 614
7.3.4. Distributing Multimedia in Today's Internet: Content Distribution Networks
Page 618
7.3.5. Dimensioning Best-Effort Networks to Provide Quality of Service
Page 621
7.4. Protocols for Real-Time Interactive Applications
Page 623
7.4.1. RTP
Page 623
7.4.2. RTP Control Protocol (RTCP)
Page 628
7.4.3. SIP
Page 631
7.4.4. H.323
Page 633
7.5. Providing Multiple Classes of Service
Page 639
7.5.1. Motivating Scenarios
Page 640
7.5.2. Scheduling and Policing Mechanisms
Page 645
7.5.3. Diffserv
Page 652
7.6. Providing Quality of Service Guarantees
Page 657
7.6.1. A Motivating Example
Page 657
7.6.2. Resource Reservation, Call Admission, Call Setup
Page 659
7.6.3. Guaranteed QoS in the Internet: Intserv and RSVP
Page 661
7.7. Summary
Page 664
Homework Problems and Questions
Page 665
Problems
Page 666
Discussion Questions
Page 673
Programming Assignment
Page 674
Interview: Henning Schulzrinne
Page 676
Chapter 8. Security in Computer Networks
Page 679
8.1. What Is Network Security?
Page 680
8.2. Principles of Cryptography
Page 683
8.2.1. Symmetric Key Cryptography
Page 685
8.2.2. Public Key Encryption
Page 691
8.3. Message Integrity
Page 696
8.3.1. Cryptographic Hash Functions
Page 697
8.3.2. Message Authentication Code
Page 699
8.3.3. Digital Signatures
Page 701
8.4. End-Point Authentication
Page 707
8.4.1. Authentication Protocol ap1.0
Page 708
8.4.2. Authentication Protocol ap2.0
Page 709
8.4.3. Authentication Protocol ap3.0
Page 710
8.4.4. Authentication Protocol ap3.1
Page 711
8.4.5. Authentication Protocol ap4.0
Page 711
8.4.6. Authentication Protocol ap5.0
Page 713
8.5. Securing E-mail
Page 716
8.5.1. Secure E-mail
Page 717
8.5.2. PGP
Page 720
8.6. Securing TCP Connections: SSL
Page 722
8.6.1. The Big Picture
Page 724
8.6.2. A More Complete Picture
Page 727
8.7. Network-Layer Security: IPsec
Page 728
8.7.1. Authentication Header (AH) Protocol
Page 729
8.7.2. The ESP Protocol
Page 731
8.7.3. SA and Key Management
Page 732
8.8. Securing Wireless LANs
Page 732
8.8.1. Wired Equivalent Privacy (WEP)
Page 735
8.8.2. IEEE 802.11i
Page 737
8.9. Operational Security: Firewalls and Intrusion Detection Systems
Page 737
8.9.1. Firewalls
Page 744
8.9.2. Intrusion Detection Systems
Page 747
8.10. Summary
Page 748
Homework Problems and Questions
Page 749
Problems
Page 750
Discussion Questions
Page 753
Ethereal Lab
Page 754
Interview: Steven M. Bellovin
Page 755
Chapter 9. Network Management
Page 757
9.1. What Is Network Management?
Page 758
9.2. The Infrastructure for Network Management
Page 762
9.3. The Internet-Standard Management Framework
Page 766
9.3.1. Structure of Management Information: SMI
Page 768
9.3.2. Management Information Base: MIB
Page 772
9.3.3. SNMP Protocol Operations and Transport Mappings
Page 775
9.3.4. Security and Administration
Page 777
9.4. ASN.1
Page 781
9.5. Conclusion
Page 786
Homework Problems and Questions
Page 787
Problems
Page 787
Discussion Questions
Page 788
Interview: Jeff Case
Page 789
References
Page 791
Index
Page 821

Edition Notes

Includes bibliographical references (p. 791-820) and index.

Published in
Boston
Copyright Date
2008

Classifications

Dewey Decimal Class
004.6
Library of Congress
TK5105.875.I57 K88 2008, TK5105.875.I57R689

The Physical Object

Pagination
xxiv, 852 p. :
Number of pages
852

ID Numbers

Open Library
OL17955154M
ISBN 10
0321497708
ISBN 13
9780321497703
LCCN
2007002094
OCLC/WorldCat
79004271
Library Thing
203980
Goodreads
83847

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
August 26, 2024 Edited by Drini Add TOC from Tocky
August 26, 2024 Edited by Drini Add TOC from Tocky
August 26, 2024 Edited by Drini Add TOC from Tocky
August 26, 2024 Edited by Drini Add TOC from Tocky
October 8, 2008 Created by ImportBot Imported from Library of Congress MARC record