Computer networks

Tanenbaum, Andrew S.

Computer networks by Andrew S.Tanenbaum and Nick Feamster, David Wetherall. - 6th ed. - London : Pearson, ©2021 - xxii, 920 p. : ill. ; 24 cm.

Includes bibliographical references and index.

1. Introduction 1.1. Uses of Computer Networks 1.2. Types of Computer Networks 1.3. Network Technology, from Local to Global 1.4. Examples of Networks 1.5. Network Protocols 1.6. Reference Models 1.7. Standardization 1.8. Policy, Legal, and Social Issues 1.9. Metric Units 1.10. Outline of the Rest of the Book 2. The Physical Layer 2.1. Guided Transmission Media 2.2. Wireless Transmission 2.3. Using the Spectrum for Transmission 2.4. From Waveforms to Bits 2.5. The Public Switched Telephone Network 2.6. Cellular Networks 2.7. Cable Networks 2.8. Communication Satellites 2.9. Comparing Different Access Networks 2.10. Policy at the Physical Layer 3. The Data Link Layer 3.1. Data Link Layer Design Issues 3.2. Error Detection and Correction 3.3. Elementary Data Link Protocols 3.4. Improving Efficiency 3.5. Data Link Protocols in Practice 4. The Medium Access Control Sublayer 4.1. The Channel Allocation Problem 4.2. Multiple Access Protocols 4.3. Ethernet 4.4. Wireless Lans 4.5. Bluetooth 4.6. DOCSIS 4.7. Data Link Layer Switching 5. The Network Layer 5.1. Network Layer Design Issues 5.2. Routing Algorithms in a Single Network 5.3. Traffic Management at the Network Layer 5.4. Quality of Service and Application QoE 5.5. Internetworking 5.6. Software-Defined Networking 5.7. The Network Layer in the Internet 5.8. Policy at the Network Layer 6. The Transport Layer 6.1. The Transport Service 6.2. Elements of Transport Protocols 6.3. Congestion Control 6.4. The Internet Transport Protocols: UDP 6.5. The Internet Transport Protocols: TCP 6.6. Transport Protocols and Congestion Control 6.7. Performance Issues 7. The Application Layer 7.1. The Domain Name System (DNS) 7.2. Electronic Mail 7.3. The World Wide Web 7.4. Streaming Audio and Video 7.5. Content Delivery 8. Network Security 8.1. Fundamentals of Network Security 8.2. The Core Ingredients of an Attack 8.3. Firewalls and Intrusion Detection Systems 8.4. Cryptography 8.5. Symmetric-Key Algorithms 8.6. Public-Key Algorithms 8.7. Digital Signatures 8.8. Management of Public Keys 8.9. Authentication Protocols 8.10. Communication Security 8.11. Email Security 8.12. Web Security 8.13. Social Issues.

9789356063600


Communication security
Web security
Neural networks

004.6 / TAN-C
© 2024 IIIT-Delhi, library@iiitd.ac.in