Computer networking

a top-down approach

4th ed.
  • 3.40 ·
  • 5 Ratings
  • 60 Want to read
  • 4 Currently reading
  • 8 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 3.40 ·
  • 5 Ratings
  • 60 Want to read
  • 4 Currently reading
  • 8 Have read

Buy this book

Last edited by Drini
March 29, 2024 | History

Computer networking

a top-down approach

4th ed.
  • 3.40 ·
  • 5 Ratings
  • 60 Want to read
  • 4 Currently reading
  • 8 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Publisher
Pearson, Addison Wesley
Language
English
Pages
852

Buy this book

Previews available in: English Mandarin

Edition Availability
Cover of: Computer networking
Computer networking: A Top-Down Approach
2013, Pearson
Paperback in English - 6th ed.; international edition
Cover of: Computer networking
Computer networking: a top-down approach
2007, Pearson, Addison Wesley
in English - 4th ed.
Cover of: Computer Networking
Computer Networking: A Top-Down Approach (4th Edition)
March 23, 2007, Addison Wesley
Hardcover in English - 4 edition
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2006, Pearson Education, Dorling Kindersley
in English - 3rd ed.; low price ed.
Cover of: 计算机网络 = Computer networking
计算机网络 = Computer networking: 自顶向下方法与Internet 特色 = a top-down approach featuring the Internet
2005, 高等教育出版社 = Higher Education Press
in Mandarin and English - 第三版 = 3rd ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2003, Addison-Wesley
in English - 2nd ed.; international edition
Cover of: Computer networking
Computer networking: a top-down approach featuring the internet
2003, Pearson Education
Paperback in English - 2nd ed.; low price ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2002, Addison Wesley
in English - 2nd ed.
Cover of: Computer Networking
Computer Networking: A Top-Down Approach Featuring the Internet
2002, Addison Wesley
in English - 2nd ed.
Cover of: Computer networking
Computer networking: a top-down approach featuring the Internet
2001, Addison-Wesley
in English

Add another edition?

Book Details


Table of Contents

Chapter 1. Computer Networks and the Internet Page 1 1.1. What Is the Internet? Page 2 1.1.1. A Nuts-and-Bolts Description Page 2 1.1.2. A Services Description Page 5 1.1.3. What Is a Protocol? Page 7 1.2. The Network Edge Page 9 1.2.1. Client and Server Programs Page 12 1.2.2. Access Networks Page 19 1.2.3. Physical Media Page 22 1.3. The Network Core Page 22 1.3.1. Circuit Switching and Packet Switching Page 22 1.3.2. How Do Packets Make Their Way Through Packet-Switched Networks? Page 30 1.3.3. ISPs and Internet Backbones Page 31 1.4. Delay, Loss, and Throughput in Packet-Switched Networks Page 33 1.4.1. Overview of Delay in Packet-Switched Networks Page 33 1.4.2. Queuing Delay and Packet Loss Page 37 1.4.3. End-to-End Delay Page 40 1.4.4. Throughput in Computer Networks Page 42 1.5. Protocol Layers and Their Service Models Page 45 1.5.1. Layered Architecture Page 45 1.5.2. Messages, Segments, Datagrams, and Frames Page 51 1.6. Networks Under Attack Page 53 1.7. History of Computer Networking and the Internet Page 58 1.7.1. The Development of Packet Switching: 1961-1972 Page 58 1.7.2. Proprietary Networks and Internetworking: 1972-1980 Page 60 1.7.3. A Proliferation of Networks: 1980-1990 Page 62 1.7.4. The Internet Explosion: The 1990s Page 63 1.7.5. Recent Developments Page 64 1.8. Summary Page 65 Road-Mapping This Book Page 66 Homework Problems and Questions Page 67 Problems Page 69 Discussion Questions Page 75 Ethereal Lab Page 76 Interview: Leonard Kleinrock Page 78 Chapter 2. Application Layer Page 81 2.1. Principles of Network Applications Page 82 2.1.1. Network Application Architectures Page 82 2.1.2. Processes Communicating Page 85 2.1.3. Transport Services Available to Applications Page 88 2.1.4. Transport Services Provided by the Internet Page 90 2.1.5. Application-Layer Protocols Page 94 2.1.6. Network Applications Covered in This Book Page 95 2.2. The Web and HTTP Page 96 2.2.1. Overview of HTTP Page 96 2.2.2. Non-persistent and Persistent Connections Page 98 2.2.3. HTTP Message Format Page 101 2.2.4. User-Server Interaction: Cookies Page 106 2.2.5. Web Caching Page 108 2.2.6. The Conditional GET Page 112 2.3. File Transfer: FTP Page 114 2.3.1. FTP Commands and Replies Page 116 2.4. Electronic Mail in the Internet Page 16 2.4.1. SMTP Page 119 2.4.2. Comparison with HTTP Page 122 2.4.3. Mail Message Formats and MIME Page 123 2.4.4. Mail Access Protocols Page 126 2.5. DNS - The Internet's Directory Service Page 130 2.5.1. Services Provided by DNS Page 131 2.5.2. Overview of How DNS Works Page 133 2.5.3. DNS Records and Messages Page 139 2.6. Peer-to-Peer Applications Page 144 2.6.1. P2P File Distribution Page 145 2.6.2. Searching for Information in a P2P Community Page 151 2.6.3. Case Study: P2P Internet Telephony with Skype Page 157 2.7. Socket Programming with TCP Page 159 2.7.1. Socket Programming with TCP Page 160 2.7.2. An Example Client-Server Application in Java Page 162 2.8. Socket Programming with UDP Page 169 2.9. Summary Page 177 Homework Problems and Questions Page 178 Problems Page 180 Discussion Questions Page 187 Socket Programming Assignments Page 188 Ethereal Labs Page 190 Interview: Bram Cohen Page 192 Chapter 3. Transport Layer Page 195 3.1. Introduction and Transport-Layer Services Page 196 3.1.1. Relationship Between Transport and Network Layers Page 196 3.1.2. Overview of the Transport Layer in the Internet Page 199 3.2. Multiplexing and Demultiplexing Page 201 3.3. Connectionless Transport: UDP Page 208 3.3.1. UDP Segment Structure Page 212 3.3.2. UDP Checksum Page 212 3.4. Principles of Reliable Data Transfer Page 214 3.4.1. Building a Reliable Data Transfer Protocol Page 216 3.4.2. Pipelined Reliable Data Transfer Protocols Page 225 3.4.3. Go-Back-N (GBN) Page 228 3.4.4. Selective Repeat (SR) Page 233 3.5. Connection-Oriented Transport: TCP Page 240 3.5.1. The TCP Connection Page 241 3.5.2. TCP Segment Structure Page 243 3.5.3. Round-Trip Time Estimation and Timeout Page 248 3.5.4. Reliable Data Transfer Page 252 3.5.5. Flow Control Page 260 3.5.6. TCP Connection Management Page 262 3.6. Principles of Congestion Control Page 269 3.6.1. The Causes and the Costs of Congestion Page 270 3.6.2. Approaches to Congestion Control Page 276 3.6.3. Network-Assisted Congestion-Control Example: ATM ABR Congestion Control Page 277 3.7. TCP Congestion Control Page 279 3.7.1. Fairness Page 287 3.8. Summary Page 290 Homework Problems and Questions Page 293 Problems Page 295 Discussion Questions Page 304 Programming Assignments Page 305 Ethereal Labs Page 305 Interview: Sally Floyd Page 307 Chapter 4. The Network Layer Page 309 4.1. Introduction Page 310 4.1.1. Forwarding and Routing Page 312 4.1.2. Network Service Models Page 314 4.2. Virtual Circuit and Datagram Networks Page 31 4.2.1. Virtual-Circuit Networks Page 318 4.2.2. Datagram Networks Page 321 4.2.3. Origins of VC and Datagram Networks Page 323 4.3. What's Inside a Router? Page 324 4.3.1. Input Ports Page 326 4.3.2. Switching Fabric Page 328 4.3.3. Output Ports Page 331 4.3.4. Where Does Queuing Occur? Page 331 4.4. The Internet Protocol (IP): Forwarding and Addressing in the Internet Page 334 4.4.1. Datagram Format Page 336 4.4.2. IPv4 Addressing Page 342 4.4.3. Internet Control Message Protocol (ICMP) Page 357 4.4.4. IPv6 Page 360 4.4.5. A Brief Introduction into IP Security VPNs Page 366 4.5. Routing Algorithms Page 368 4.5.1. The Link-State (LS) Routing Algorithm Page 371 4.5.2. The Distance-Vector (DV) Routing Algorithm Page 375 4.5.3. Hierarchical Routing Page 383 4.6. Routing in the Internet Page 387 4.6.1. Intra-AS Routing in the Internet: RIP Page 388 4.6.2. Intra-AS Routing in the Internet: OSPF Page 392 4.6.3. Inter-AS Routing: BGP Page 395 4.7. Broadcast and Multicast Routing Page 402 4.7.1. Broadcast Routing Algorithms Page 403 4.7.2. Multicast Page 408 4.8. Summary Page 415 Homework Problems and Questions Page 416 Problems Page 419 Discussion Questions Page 429 Programming Assignment Page 430 Ethereal Labs Page 431 Interview: Vinton G. Cerf Page 432 Chapter 5. The Link Layer and Local Area Networks Page 435 5.1. Link Layer: Introduction and Services Page 437 5.1.1. The Services Provided by the Link Layer Page 437 5.1.2. Where Is the Link Layer Implemented? Page 440 5.2. Error-Detection and -Correction Techniques Page 442 5.2.1. Parity Checks Page 444 5.2.2. Checksumming Methods Page 446 5.2.3. Cyclic Redundancy Check (CRC) Page 446 5.3. Multiple Access Protocols Page 449 5.3.1. Channel Partitioning Protocols Page 451 5.3.2. Random Access Protocols Page 453 5.3.3. Taking-Turns Protocols Page 460 5.3.4. Local Area Networks (LANs) Page 461 5.4. Link-Layer Addressing Page 463 5.4.1. MAC Addresses Page 463 5.4.2. Address Resolution Protocol (ARP) Page 465 5.5. Ethernet Page 469 5.5.1. Ethernet Frame Structure Page 471 5.5.2. CSMA/CD: Ethernet's Multiple Access Protocol Page 475 5.5.3. Ethernet Technologies Page 477 5.6. Link-Layer Switches Page 480 5.6.1. Forwarding and Filtering Page 481 5.6.2. Self-Learning Page 483 5.6.3. Properties of Link-Layer Switching Page 484 5.6.4. Switches Versus Routers Page 485 5.7. PPP: The Point-to-Point Protocol Page 487 5.7.1. PPP Data Framing Page 489 5.8. Link Virtualization: A Network as a Link Layer Page 491 5.8.1. Asynchronous Transfer Mode (ATM) Networks Page 492 5.8.2. Multiprotocol Label Switching (MPLS) Page 497 5.9. Summary Page 500 Homework Problems and Questions Page 501 Problems Page 503 Discussion Questions Page 508 Ethereal Labs Page 509 Interview: Simon S. Lam Page 510 Chapter 6. Wireless and Mobile Networks Page 513 6.1. Introduction Page 514 6.2. Wireless Links and Network Characteristics Page 519 6.2.1. CDMA Page 522 6.3. WiFi: 802.11 Wireless LANs Page 526 6.3.1. The 802.11 Architecture Page 527 6.3.2. The 802.11 MAC Protocol Page 531 6.3.3. The IEEE 802.11 Frame Page 537 6.3.4. Mobility in the Same IP Subnet Page 541 6.3.5. Advanced Features in 802.11 Page 542 Beyond 802.11: Bluetooth and WiMAX Page 544 6.4. Cellular Internet Access Page 548 6.4.1. An Overview of Cellular Architecture Page 548 6.4.2. Cellular Standards and Technologies: A Brief Survey Page 551 6.5. Mobility Management: Principles Page 555 6.5.1. Addressing Page 557 6.5.2. Routing to a Mobile Node Page 559 6.6. Mobile IP Page 564 6.7. Managing Mobility in Cellular Networks Page 570 6.7.1. Routing Calls to a Mobile User Page 571 6.7.2. Handoffs in GSM Page 572 6.8. Wireless and Mobility: Impact on Higher-layer Protocols Page 575 6.9. Summary Page 578 Homework Problems and Questions Page 579 Problems Page 580 Discussion Questions Page 584 Ethereal Labs Page 584 Interview: Charlie Perkins Page 585 Chapter 7. Multimedia Networking Page 589 7.1. Multimedia Networking Applications Page 590 7.1.1. Examples of Multimedia Applications Page 590 7.1.2. Hurdles for Multimedia in Today's Internet Page 593 7.1.3. How Should the Internet Evolve to Support Multimedia Better? Page 594 7.1.4. Audio and Video Compression Page 596 7.2. Streaming Stored Audio and Video Page 600 7.2.1. Accessing Audio and Video Through a Web Server Page 600 7.2.2. Sending Multimedia from a Streaming Server to a Helper Application Page 602 7.2.3. Real-Time Streaming Protocol (RTSP) Page 604 7.3. Making the Best of the Best-Effort Service Page 608 7.3.1. The Limitations of a Best-Effort Service Page 608 7.3.2. Removing Jitter at the Receiver for Audio Page 611 7.3.3. Recovering from Packet Loss Page 614 7.3.4. Distributing Multimedia in Today's Internet: Content Distribution Networks Page 618 7.3.5. Dimensioning Best-Effort Networks to Provide Quality of Service Page 621 7.4. Protocols for Real-Time Interactive Applications Page 623 7.4.1. RTP Page 623 7.4.2. RTP Control Protocol (RTCP) Page 628 7.4.3. SIP Page 631 7.4.4. H.323 Page 633 7.5. Providing Multiple Classes of Service Page 639 7.5.1. Motivating Scenarios Page 640 7.5.2. Scheduling and Policing Mechanisms Page 645 7.5.3. Diffserv Page 652 7.6. Providing Quality of Service Guarantees Page 657 7.6.1. A Motivating Example Page 657 7.6.2. Resource Reservation, Call Admission, Call Setup Page 659 7.6.3. Guaranteed QoS in the Internet: Intserv and RSVP Page 661 7.7. Summary Page 664 Homework Problems and Questions Page 665 Problems Page 666 Discussion Questions Page 673 Programming Assignment Page 674 Interview: Henning Schulzrinne Page 676 Chapter 8. Security in Computer Networks Page 679 8.1. What Is Network Security? Page 680 8.2. Principles of Cryptography Page 683 8.2.1. Symmetric Key Cryptography Page 685 8.2.2. Public Key Encryption Page 691 8.3. Message Integrity Page 696 8.3.1. Cryptographic Hash Functions Page 697 8.3.2. Message Authentication Code Page 699 8.3.3. Digital Signatures Page 701 8.4. End-Point Authentication Page 707 8.4.1. Authentication Protocol ap1.0 Page 708 8.4.2. Authentication Protocol ap2.0 Page 709 8.4.3. Authentication Protocol ap3.0 Page 710 8.4.4. Authentication Protocol ap3.1 Page 711 8.4.5. Authentication Protocol ap4.0 Page 711 8.4.6. Authentication Protocol ap5.0 Page 713 8.5. Securing E-mail Page 716 8.5.1. Secure E-mail Page 717 8.5.2. PGP Page 720 8.6. Securing TCP Connections: SSL Page 722 8.6.1. The Big Picture Page 724 8.6.2. A More Complete Picture Page 727 8.7. Network-Layer Security: IPsec Page 728 8.7.1. Authentication Header (AH) Protocol Page 729 8.7.2. The ESP Protocol Page 731 8.7.3. SA and Key Management Page 732 8.8. Securing Wireless LANs Page 732 8.8.1. Wired Equivalent Privacy (WEP) Page 735 8.8.2. IEEE 802.11i Page 737 8.9. Operational Security: Firewalls and Intrusion Detection Systems Page 737 8.9.1. Firewalls Page 744 8.9.2. Intrusion Detection Systems Page 747 8.10. Summary Page 748 Homework Problems and Questions Page 749 Problems Page 750 Discussion Questions Page 753 Ethereal Lab Page 754 Interview: Steven M. Bellovin Page 755 Chapter 9. Network Management Page 757 9.1. What Is Network Management? Page 758 9.2. The Infrastructure for Network Management Page 762 9.3. The Internet-Standard Management Framework Page 766 9.3.1. Structure of Management Information: SMI Page 768 9.3.2. Management Information Base: MIB Page 772 9.3.3. SNMP Protocol Operations and Transport Mappings Page 775 9.3.4. Security and Administration Page 777 9.4. ASN.1 Page 781 9.5. Conclusion Page 786 Homework Problems and Questions Page 787 Problems Page 787 Discussion Questions Page 788 Interview: Jeff Case Page 789 References Page 791 Index Page 821

Edition Notes

Includes bibliographical references (p. 791-820) and index.

Published in
Boston
Copyright Date
2008

Classifications

Dewey Decimal Class
004.6
Library of Congress
TK5105.875.I57 K88 2008, TK5105.875.I57R689

The Physical Object

Pagination
xxiv, 852 p. :
Number of pages
852

ID Numbers

Open Library
OL17955154M
ISBN 10
0321497708
ISBN 13
9780321497703
LCCN
2007002094
OCLC/WorldCat
79004271
Library Thing
203980
Goodreads
83847

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

History

Download catalog record: RDF / JSON
March 29, 2024 Edited by Drini Merge works
January 1, 2024 Edited by Pablo Busatto Edited without comment.
January 1, 2024 Edited by Pablo Busatto Edited without comment.
December 19, 2023 Edited by ImportBot import existing book
October 15, 2009 Created by WorkBot add works page