Computer networking: a top-down approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Pearson Addison-Wesley
2008
|
Ausgabe: | 4. ed. [hardcover ed.] |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIV, 852 S. Ill., graph. Darst. |
ISBN: | 9780321497703 0321497708 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022374905 | ||
003 | DE-604 | ||
005 | 20081114 | ||
007 | t | ||
008 | 070402s2008 xxuad|| |||| 00||| eng d | ||
020 | |a 9780321497703 |9 978-0-321-49770-3 | ||
020 | |a 0321497708 |9 0-321-49770-8 | ||
035 | |a (OCoLC)79004271 | ||
035 | |a (DE-599)BVBBV022374905 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-29T |a DE-19 |a DE-739 |a DE-20 |a DE-1046 |a DE-83 |a DE-11 |a DE-2070s | ||
050 | 0 | |a TK5105.875.I57 | |
082 | 0 | |a 004.6 |2 22 | |
082 | 0 | |a 004.6 |b K8C6 2008 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 321 |0 (DE-625)143658: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Kurose, James F. |d 1956- |e Verfasser |0 (DE-588)123704618 |4 aut | |
245 | 1 | 0 | |a Computer networking |b a top-down approach |c James F. Kurose ; Keith W. Ross |
250 | |a 4. ed. [hardcover ed.] | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Pearson Addison-Wesley |c 2008 | |
300 | |a XXIV, 852 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Internet | |
650 | 4 | |a Redes de computadores | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Internet | |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Faseroptik |0 (DE-588)4016498-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Transportschicht |0 (DE-588)4301518-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Faseroptik |0 (DE-588)4016498-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
689 | 3 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 3 | |8 4\p |5 DE-604 | |
689 | 4 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 4 | |8 5\p |5 DE-604 | |
689 | 5 | 0 | |a Transportschicht |0 (DE-588)4301518-9 |D s |
689 | 5 | |8 6\p |5 DE-604 | |
700 | 1 | |a Ross, Keith W. |d 1956- |e Sonstige |0 (DE-588)113704666 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015583995 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136428966248448 |
---|---|
adam_text | Table
of
Contents
Chapter
1
Computer Networks
and the
Internet
1
2
2
5
7
9
12
12
19
22
22
30
31
33
33
37
40
42
45
45
51
53
58
58
60
62
63
64
65
66
1.1
What Is
the Internet?
1.1.1
A Nuts-and-Bolts Description
1.1.2
A Services Description
1.1.3
What Is a Protocol?
1.2
The Network
Edge
1.2.1
Client and Server Programs
1.2.2
Access Networks
1.2.3
Physical Media
1.3
The Network Core
1.3.1
Circuit Switching and Packet Switching
1.3.2
How Do Packets Make Their Way Through
Packet-Switched Networks?
1.3.3
ISPs and Internet Backbones
1.4
Delay, Loss, and Throughput in Packet-Switched Networks
1.4.1
Overview of Delay in Packet-Switched Networks
1.4.2
Queuing Delay and Packet Loss
1.4.3
End-to-End Delay
1.4.4
Throughput in Computer Networks
1.5
Protoco
1
Layers and Their Service Models
1.5.1
Layered Architecture
1.5.2
Messages, Segments, Datagrams, and Frames
1.6
Networks Under Attack
1.7
History
of Computer Networking and the Internet
1.7.1
The Development of Packet Switching:
1961-1972
1.7.2
Proprietary Networks and Internetworking:
1972-1980
1.7.3
A Proliferation of Networks:
1980-1990
1.7.4
The Internet Explosion: The
1990s
1.7.5
Recent Developments
1.8
Summary
Road-Mapping This Book
Homework Problems and Questions
67
Problems
69
Discussion Questions
75
Ethereal Lab
76
Interview: Leonard
Kleinrock 78
Chapter
2
Application Layer
81
2.1
Principles of Network Applications
82
2.1.1
Network Application Architectures
82
2.1.2
Processes Communicating
85
2.1.3
Transport Services Available to Applications
88
2.1.4
Transport Services Provided by the Internet
90
2.1.5
Application-Layer Protocols
94
2.1.6
Network Applications Covered in This Book
95
2.2
The Web and HTTP
96
2.2.1
Overview of HTTP
96
2.2.2
Non-persistent and Persistent Connections
98
2.2.3
HTTP Message Format
101
2.2.4
User-Server Interaction: Cookies
106
2.2.5
Web Caching
108
2.2.6
The Conditional GET
112
2.3
File Transfer: FTP
114
2.3.1
FTP Commands and Replies
116
2.4
Electronic Mail in the Internet
116
2.4.1
SMTP
119
2.4.2
Comparison with HTTP
122
2.4.3
Mail Message Formats and MIME
123
2.4.4
Mail Access Protocols
126
2.5
DNS—The Internet s Directory Service
130
2.5.1
Services Provided by DNS
131
2.5.2
Overview of How DNS Works
133
2.5.3
DNS Records and Messages
139
2.6
Peer-to-Peer Applications
144
2.6.1
P2P File Distribution
145
2.6.2
Searching for Information in a P2P Community
151
2.6.3
Case Study: P2P Internet Telephony with Skype
157
2.7
Socket Programming with TCP
159
2.7.1
Socket Programming with TCP
160
2.7.2
An Example Client-Server Application in Java
162
2.8
Socket Programming with
UDP
169
2.9
Summary
177
Homework Problems and Questions
Problems
Discussion Questions
Socket Programming Assignments
Ethereal Labs
Interview:
Bram
Cohen
Chapter
3
Transport Layer
195
3.1
Introduction and Transport-Layer Services
196
3.1.1
Relationship Between Transport and Network Layers
196
3.1.2
Overview of the Transport Layer in the Internet
199
3.2
Multiplexing and Demultiplexing
201
3.3
Connectionless Transport:
UDP
208
3.3.1
UDP
Segment Structure
212
3.3.2
UDP
Checksum
212
3.4
Principles of Reliable Data Transfer
214
3.4.1
Building a Reliable Data Transfer Protocol
216
3.4.2
Pipelined Reliable Data Transfer Protocols
225
3.4.3
Go-Back-N (GBN)
228
3.4.4
Selective Repeat (SR)
233
3.5
Connection-Oriented Transport: TCP
240
3.5.1
The TCP Connection
241
3.5.2
TCP Segment Structure
243
3.5.3
Round-Trip Time Estimation and Timeout
248
3.5.4
Reliable Data Transfer
252
3.5.5
Flow Control
260
3.5.6
TCP Connection Management
262
3.6
Principles of Congestion Control
269
3.6.1
The Causes and the Costs of Congestion
270
3.6.2
Approaches to Congestion Control
276
3.6.3
Network-Assisted Congestion-Control Example:
ATM ABR Congestion Control
277
3.7
TCP Congestion Control
279
3.7.1
Fairness
287
3.8
Summary
290
Homework Problems and Questions
293
Problems
295
Discussion Questions
304
Programming Assignments
305
Ethereal Labs
305
Interview: Sally Floyd
307
Chapter
4
The Network Layer
309
4.1
Introduction
310
4.1.1
Forwarding and Routing
312
4.1.2
Network Service Models
314
4.2
Virtual Circuit and Datagram Networks
317
4.2.1
Virtual-Circuit Networks
318
4.2.2
Datagram Networks
321
4.2.3
Origins of VC and Datagram Networks
323
4.3
What s Inside a Router?
324
4.3.1
Input Ports
326
4.3.2
Switching Fabric
328
4.3.3
Output Ports
331
4.3.4
Where Does Queuing Occur?
331
4.4
The Internet Protocol (IP): Forwarding and Addressing in the Internet
334
4.4.1
Datagram Format
336
4.4.2 IPv4
Addressing
342
4.4.3
Internet Control Message Protocol (ICMP)
357
4.4.4 IPv6 360
4.4.5
A Brief Introduction into IP Security VPNs
366
4.5
Routing Algorithms
368
4.5.1
The Link-State (LS) Routing Algorithm
371
4.5.2
The Distance-Vector
(DV)
Routing Algorithm
375
4.5.3
Hierarchical Routing
383
4.6
Routing in the Internet
387
4.6.1
Intra-
AS Routing in the Internet: RIP
388
4.6.2
Intra-AS Routing in the Internet: OSPF
392
4.6.3
Inter-AS Routing: BGP
395
4.7
Broadcast and Multicast Routing
402
4.7.1
Broadcast Routing Algorithms
403
4.7.2
Multicast
408
4.8
Summary
415
Homework Problems and Questions
416
Problems
419
Discussion Questions
429
Programming Assignment
430
Ethereal Labs
431
Interview:
Vinton
G. Cerf
432
Chapter
5
The Link Layer and Local Area Networks
435
5.1
Link Layer: Introduction and Services
437
5.1.1
The Services Provided by the Link Layer
437
5.1.2
Where Is the Link Layer Implemented?
440
5.2
Error-Detection and
-Correction Techniques
442
5.2.1
Parity Checks
444
5.2.2
Checksumming Methods
446
5.2.3
Cyclic Redundancy Check
(CRC) 446
5.3
Multiple Access Protocols
449
5.3.1
Channel Partitioning Protocols
451
5.3.2
Random Access Protocols
453
5.3.3
Taking-Turns Protocols
460
5.3.4
Local Area Networks (LANs)
461
5.4
Link-Layer Addressing
463
5.4.1
MAC Addresses
463
5.4.2
Address Resolution Protocol
(ARP)
465
5.5
Ethernet
469
5.5.1
Ethernet Frame Structure
471
5.5.2
CSMA/CD: Ethernet s Multiple Access Protocol
475
5.5.3
Ethernet Technologies
477
5.6
Link-Layer Switches
480
5.6.1
Forwarding and Filtering
481
5.6.2
Self-Learning
483
5.6.3
Properties of Link-Layer Switching
484
5.6.4
Switches Versus Routers
485
5.7
PPP: The Point-to-Point Protocol
487
5.7.1
PPP Data Framing
489
5.8
Link Virtualization: A Network as a Link Layer
491
5.8.1
Asynchronous Transfer Mode (ATM) Networks
492
5.8.2
Multiprotocol Label Switching (MPLS)
497
5.9
Summary
500
Homework Problems and Questions
501
Problems
503
Discussion Questions
508
Ethereal Labs
509
Interview: Simon S. Lam
510
Chapter
6
Wireless and Mobile Networks
513
6.1
Introduction
514
6.2
Wireless Links and Network Characteristics
519
6.2.1
CDMA
522
6.3
WiFi:
802.11
Wireless LANs
526
6.3.1
The
802.11
Architecture
527
6.3.2
The
802.11
MAC Protocol
531
6.3.3
The IEEE
802.11
Frame
537
6.3.4
Mobility in the Same IP Subnet
541
6.3.5
Advanced Features in
802.11 542
6.3.6
Beyond
802.11 :
Bluetooth and WiMAX
544
6.4
Cellular
Internet Access
548
6.4.1
An Overview of Cellular Architecture
548
6.4.2
Cellular Standards and Technologies: A Brief Survey
551
6.5
Mobility Management: Principles
555
6.5.1
Addressing
557
6.5.2
Routing to a Mobile Node
559
6.6
Mobile IP
564
6.7
Managing Mobility in Cellular Networks
570
6.7.1
Routing Calls to a Mobile User
571
6.7.2 Handoffs in
GSM
572
6.8
Wireless and Mobility: Impact on Higher-layer Protocols
575
6.9
Summary
578
Homework Problems and Questions
579
Problems
580
Discussion Questions
584
Ethereal Labs
584
Interview: Charlie Perkins
585
Chapter
7
Multimedia Networking
589
7.1
Multimedia Networking Applications
590
7.1.1
Examples of Multimedia Applications
590
7.1.2
Hurdles for Multimedia in Today s Internet
593
7.1.3
How Should the Internet Evolve to Support Multimedia Better?
594
7.1.4
Audio and Video Compression
596
7.2
Streaming Stored Audio and Video
600
7.2.1
Accessing Audio and Video Through a Web Server
600
7.2.2
Sending Multimedia from a Streaming Server to a
Helper Application
602
7.2.3
Real-Time
Streaming Protocol (RTSP)
604
7.3
Making the Best of the Best-Effort Service
608
7.3.1
The Limitations of a Best-Effort Service
608
7.3.2
Removing Jitter at the Receiver for Audio
611
7.3.3
Recovering from Packet Loss
614
7.3.4
Distributing Multimedia in Today s Internet:
Content Distribution Networks
618
7.3.5
Dimensioning Best-Effort Networks to Provide Quality of Service
621
7.4
Protocols for Real-Time Interactive Applications
623
7.4.1
RTP
623
7.4.2
RTP Control Protocol (RTCP)
628
7.4.3
SIP
631
7.4.4
H.323
637
7.5
Providing
Multiple Classes of Service
639
7.5.1
Motivating Scenarios
640
7.5.2
Scheduling and
Policing
Mechanisms
645
7.5.3
Diffserv
652
7.6
Providing Quality of Service Guarantees
657
7.6.1
A Motivating Example
657
7.6.2
Resource Reservation, Call Admission, Call Setup
659
7.6.3
Guaranteed QoS in the Internet: Intserv and RSVP
661
7.7
Summary
664
Homework Problems and Questions
665
Problems
666
Discussion Questions
673
Programming Assignment
674
Interview:
Henning
Schulzrinne 676
Chapter
8
Security in Computer Networks
679
8.1
What Is Network Security?
680
8.2
Principles of Cryptography
683
8.2.1
Symmetric Key Cryptography
685
8.2.2
Public Key Encryption
691
8.3
Message Integrity
696
8.3.1
Cryptographic Hash Functions
697
8.3.2
Message Authentication Code
699
8.3.3
Digital Signatures
701
8.4
End-Point Authentication
707
8.4.1
Authentication Protocol
api.
0 708
8.4.2
Authentication Protocol ap2.0
709
8.4.3
Authentication Protocol ap3.
0 710
8.4.4
Authentication Protocol ap3.
1 711
8.4.5
Authentication Protocol ap4.0
711
8.4.6
Authentication Protocol ap5.0
713
8.5
Securing E-mail
716
8.5.1
Secure E-mail
717
8.5.2
PGP
720
8.6
Securing TCP Connections: SSL
722
8.6.1
The Big Picture
724
8.6.2
A More Complete Picture
727
8.7
Network-Layer Security:
IPsec
728
8.7.1
Authentication Header (AH) Protocol
729
8.7.2
The ESP Protocol
731
Chapter
9
8.7.3
SA
and Key Management
731
8.8
Securing Wireless LANs
732
8.8.1
Wired Equivalent Privacy
(
WEP)
732
8.8.2
IEEE802.1H
735
8.9
Operational Security: Firewalls and Intrusion Detection Systems
737
8.9.1
Firewalls
737
8.9.2
Intrusion Detection Systems
744
8.10
Summary
748
Homework Problems and Questions
749
Problems
750
Discussion Questions
753
Ethereal Lab
754
Interview: Steven M. Bellovin
755
Network Management
757
9.1
What Is Network Management?
758
9.2
The Infrastructure for Network Management
762
9.3
The Internet-Standard Management Framework
766
9.3.1
Structure of Management Information: SMI
768
9.3.2
Management Information Base:
МІВ
772
9.3.3
SNMP
Protocol Operations and Transport Mappings
775
9.3.4
Security and Administration
777
9.4
ASN.l
781
9.5
Conclusion
786
Homework Problems and Questions
787
Problems
787
Discussion Questions
788
Interview: Jeff Case
789
References
791
Index
821
|
adam_txt |
Table
of
Contents
Chapter
1
Computer Networks
and the
Internet
1
2
2
5
7
9
12
12
19
22
22
30
31
33
33
37
40
42
45
45
51
53
58
58
60
62
63
64
65
66
1.1
What Is
the Internet?
1.1.1
A Nuts-and-Bolts Description
1.1.2
A Services Description
1.1.3
What Is a Protocol?
1.2
The Network
Edge
1.2.1
Client and Server Programs
1.2.2
Access Networks
1.2.3
Physical Media
1.3
The Network Core
1.3.1
Circuit Switching and Packet Switching
1.3.2
How Do Packets Make Their Way Through
Packet-Switched Networks?
1.3.3
ISPs and Internet Backbones
1.4
Delay, Loss, and Throughput in Packet-Switched Networks
1.4.1
Overview of Delay in Packet-Switched Networks
1.4.2
Queuing Delay and Packet Loss
1.4.3
End-to-End Delay
1.4.4
Throughput in Computer Networks
1.5
Protoco
1
Layers and Their Service Models
1.5.1
Layered Architecture
1.5.2
Messages, Segments, Datagrams, and Frames
1.6
Networks Under Attack
1.7
History
of Computer Networking and the Internet
1.7.1
The Development of Packet Switching:
1961-1972
1.7.2
Proprietary Networks and Internetworking:
1972-1980
1.7.3
A Proliferation of Networks:
1980-1990
1.7.4
The Internet Explosion: The
1990s
1.7.5
Recent Developments
1.8
Summary
Road-Mapping This Book
Homework Problems and Questions
67
Problems
69
Discussion Questions
75
Ethereal Lab
76
Interview: Leonard
Kleinrock 78
Chapter
2
Application Layer
81
2.1
Principles of Network Applications
82
2.1.1
Network Application Architectures
82
2.1.2
Processes Communicating
85
2.1.3
Transport Services Available to Applications
88
2.1.4
Transport Services Provided by the Internet
90
2.1.5
Application-Layer Protocols
94
2.1.6
Network Applications Covered in This Book
95
2.2
The Web and HTTP
96
2.2.1
Overview of HTTP
96
2.2.2
Non-persistent and Persistent Connections
98
2.2.3
HTTP Message Format
101
2.2.4
User-Server Interaction: Cookies
106
2.2.5
Web Caching
108
2.2.6
The Conditional GET
112
2.3
File Transfer: FTP
114
2.3.1
FTP Commands and Replies
116
2.4
Electronic Mail in the Internet
116
2.4.1
SMTP
119
2.4.2
Comparison with HTTP
122
2.4.3
Mail Message Formats and MIME
123
2.4.4
Mail Access Protocols
126
2.5
DNS—The Internet's Directory Service
130
2.5.1
Services Provided by DNS
131
2.5.2
Overview of How DNS Works
133
2.5.3
DNS Records and Messages
139
2.6
Peer-to-Peer Applications
144
2.6.1
P2P File Distribution
145
2.6.2
Searching for Information in a P2P Community
151
2.6.3
Case Study: P2P Internet Telephony with Skype
157
2.7
Socket Programming with TCP
159
2.7.1
Socket Programming with TCP
160
2.7.2
An Example Client-Server Application in Java
162
2.8
Socket Programming with
UDP
169
2.9
Summary
177
Homework Problems and Questions
Problems
Discussion Questions
Socket Programming Assignments
Ethereal Labs
Interview:
Bram
Cohen
Chapter
3
Transport Layer
195
3.1
Introduction and Transport-Layer Services
196
3.1.1
Relationship Between Transport and Network Layers
196
3.1.2
Overview of the Transport Layer in the Internet
199
3.2
Multiplexing and Demultiplexing
201
3.3
Connectionless Transport:
UDP
208
3.3.1
UDP
Segment Structure
212
3.3.2
UDP
Checksum
212
3.4
Principles of Reliable Data Transfer
214
3.4.1
Building a Reliable Data Transfer Protocol
216
3.4.2
Pipelined Reliable Data Transfer Protocols
225
3.4.3
Go-Back-N (GBN)
228
3.4.4
Selective Repeat (SR)
233
3.5
Connection-Oriented Transport: TCP
240
3.5.1
The TCP Connection
241
3.5.2
TCP Segment Structure
243
3.5.3
Round-Trip Time Estimation and Timeout
248
3.5.4
Reliable Data Transfer
252
3.5.5
Flow Control
260
3.5.6
TCP Connection Management
262
3.6
Principles of Congestion Control
269
3.6.1
The Causes and the Costs of Congestion
270
3.6.2
Approaches to Congestion Control
276
3.6.3
Network-Assisted Congestion-Control Example:
ATM ABR Congestion Control
277
3.7
TCP Congestion Control
279
3.7.1
Fairness
287
3.8
Summary
290
Homework Problems and Questions
293
Problems
295
Discussion Questions
304
Programming Assignments
305
Ethereal Labs
305
Interview: Sally Floyd
307
Chapter
4
The Network Layer
309
4.1
Introduction
310
4.1.1
Forwarding and Routing
312
4.1.2
Network Service Models
314
4.2
Virtual Circuit and Datagram Networks
317
4.2.1
Virtual-Circuit Networks
318
4.2.2
Datagram Networks
321
4.2.3
Origins of VC and Datagram Networks
323
4.3
What's Inside a Router?
324
4.3.1
Input Ports
326
4.3.2
Switching Fabric
328
4.3.3
Output Ports
331
4.3.4
Where Does Queuing Occur?
331
4.4
The Internet Protocol (IP): Forwarding and Addressing in the Internet
334
4.4.1
Datagram Format
336
4.4.2 IPv4
Addressing
342
4.4.3
Internet Control Message Protocol (ICMP)
357
4.4.4 IPv6 360
4.4.5
A Brief Introduction into IP Security VPNs
366
4.5
Routing Algorithms
368
4.5.1
The Link-State (LS) Routing Algorithm
371
4.5.2
The Distance-Vector
(DV)
Routing Algorithm
375
4.5.3
Hierarchical Routing
383
4.6
Routing in the Internet
387
4.6.1
Intra-
AS Routing in the Internet: RIP
388
4.6.2
Intra-AS Routing in the Internet: OSPF
392
4.6.3
Inter-AS Routing: BGP
395
4.7
Broadcast and Multicast Routing
402
4.7.1
Broadcast Routing Algorithms
403
4.7.2
Multicast
408
4.8
Summary
415
Homework Problems and Questions
416
Problems
419
Discussion Questions
429
Programming Assignment
430
Ethereal Labs
431
Interview:
Vinton
G. Cerf
432
Chapter
5
The Link Layer and Local Area Networks
435
5.1
Link Layer: Introduction and Services
437
5.1.1
The Services Provided by the Link Layer
437
5.1.2
Where Is the Link Layer Implemented?
440
5.2
Error-Detection and
-Correction Techniques
442
5.2.1
Parity Checks
444
5.2.2
Checksumming Methods
446
5.2.3
Cyclic Redundancy Check
(CRC) 446
5.3
Multiple Access Protocols
449
5.3.1
Channel Partitioning Protocols
451
5.3.2
Random Access Protocols
453
5.3.3
Taking-Turns Protocols
460
5.3.4
Local Area Networks (LANs)
461
5.4
Link-Layer Addressing
463
5.4.1
MAC Addresses
463
5.4.2
Address Resolution Protocol
(ARP)
465
5.5
Ethernet
469
5.5.1
Ethernet Frame Structure
471
5.5.2
CSMA/CD: Ethernet's Multiple Access Protocol
475
5.5.3
Ethernet Technologies
477
5.6
Link-Layer Switches
480
5.6.1
Forwarding and Filtering
481
5.6.2
Self-Learning
483
5.6.3
Properties of Link-Layer Switching
484
5.6.4
Switches Versus Routers
485
5.7
PPP: The Point-to-Point Protocol
487
5.7.1
PPP Data Framing
489
5.8
Link Virtualization: A Network as a Link Layer
491
5.8.1
Asynchronous Transfer Mode (ATM) Networks
492
5.8.2
Multiprotocol Label Switching (MPLS)
497
5.9
Summary
500
Homework Problems and Questions
501
Problems
503
Discussion Questions
508
Ethereal Labs
509
Interview: Simon S. Lam
510
Chapter
6
Wireless and Mobile Networks
513
6.1
Introduction
514
6.2
Wireless Links and Network Characteristics
519
6.2.1
CDMA
522
6.3
WiFi:
802.11
Wireless LANs
526
6.3.1
The
802.11
Architecture
527
6.3.2
The
802.11
MAC Protocol
531
6.3.3
The IEEE
802.11
Frame
537
6.3.4
Mobility in the Same IP Subnet
541
6.3.5
Advanced Features in
802.11 542
6.3.6
Beyond
802.11 :
Bluetooth and WiMAX
544
6.4
Cellular
Internet Access
548
6.4.1
An Overview of Cellular Architecture
548
6.4.2
Cellular Standards and Technologies: A Brief Survey
551
6.5
Mobility Management: Principles
555
6.5.1
Addressing
557
6.5.2
Routing to a Mobile Node
559
6.6
Mobile IP
564
6.7
Managing Mobility in Cellular Networks
570
6.7.1
Routing Calls to a Mobile User
571
6.7.2 Handoffs in
GSM
572
6.8
Wireless and Mobility: Impact on Higher-layer Protocols
575
6.9
Summary
578
Homework Problems and Questions
579
Problems
580
Discussion Questions
584
Ethereal Labs
584
Interview: Charlie Perkins
585
Chapter
7
Multimedia Networking
589
7.1
Multimedia Networking Applications
590
7.1.1
Examples of Multimedia Applications
590
7.1.2
Hurdles for Multimedia in Today's Internet
593
7.1.3
How Should the Internet Evolve to Support Multimedia Better?
594
7.1.4
Audio and Video Compression
596
7.2
Streaming Stored Audio and Video
600
7.2.1
Accessing Audio and Video Through a Web Server
600
7.2.2
Sending Multimedia from a Streaming Server to a
Helper Application
602
7.2.3
Real-Time
Streaming Protocol (RTSP)
604
7.3
Making the Best of the Best-Effort Service
608
7.3.1
The Limitations of a Best-Effort Service
608
7.3.2
Removing Jitter at the Receiver for Audio
611
7.3.3
Recovering from Packet Loss
614
7.3.4
Distributing Multimedia in Today's Internet:
Content Distribution Networks
618
7.3.5
Dimensioning Best-Effort Networks to Provide Quality of Service
621
7.4
Protocols for Real-Time Interactive Applications
623
7.4.1
RTP
623
7.4.2
RTP Control Protocol (RTCP)
628
7.4.3
SIP
631
7.4.4
H.323
637
7.5
Providing
Multiple Classes of Service
639
7.5.1
Motivating Scenarios
640
7.5.2
Scheduling and
Policing
Mechanisms
645
7.5.3
Diffserv
652
7.6
Providing Quality of Service Guarantees
657
7.6.1
A Motivating Example
657
7.6.2
Resource Reservation, Call Admission, Call Setup
659
7.6.3
Guaranteed QoS in the Internet: Intserv and RSVP
661
7.7
Summary
664
Homework Problems and Questions
665
Problems
666
Discussion Questions
673
Programming Assignment
674
Interview:
Henning
Schulzrinne 676
Chapter
8
Security in Computer Networks
679
8.1
What Is Network Security?
680
8.2
Principles of Cryptography
683
8.2.1
Symmetric Key Cryptography
685
8.2.2
Public Key Encryption
691
8.3
Message Integrity
696
8.3.1
Cryptographic Hash Functions
697
8.3.2
Message Authentication Code
699
8.3.3
Digital Signatures
701
8.4
End-Point Authentication
707
8.4.1
Authentication Protocol
api.
0 708
8.4.2
Authentication Protocol ap2.0
709
8.4.3
Authentication Protocol ap3.
0 710
8.4.4
Authentication Protocol ap3.
1 711
8.4.5
Authentication Protocol ap4.0
711
8.4.6
Authentication Protocol ap5.0
713
8.5
Securing E-mail
716
8.5.1
Secure E-mail
717
8.5.2
PGP
720
8.6
Securing TCP Connections: SSL
722
8.6.1
The Big Picture
724
8.6.2
A More Complete Picture
727
8.7
Network-Layer Security:
IPsec
728
8.7.1
Authentication Header (AH) Protocol
729
8.7.2
The ESP Protocol
731
Chapter
9
8.7.3
SA
and Key Management
731
8.8
Securing Wireless LANs
732
8.8.1
Wired Equivalent Privacy
(
WEP)
732
8.8.2
IEEE802.1H
735
8.9
Operational Security: Firewalls and Intrusion Detection Systems
737
8.9.1
Firewalls
737
8.9.2
Intrusion Detection Systems
744
8.10
Summary
748
Homework Problems and Questions
749
Problems
750
Discussion Questions
753
Ethereal Lab
754
Interview: Steven M. Bellovin
755
Network Management
757
9.1
What Is Network Management?
758
9.2
The Infrastructure for Network Management
762
9.3
The Internet-Standard Management Framework
766
9.3.1
Structure of Management Information: SMI
768
9.3.2
Management Information Base:
МІВ
772
9.3.3
SNMP
Protocol Operations and Transport Mappings
775
9.3.4
Security and Administration
777
9.4
ASN.l
781
9.5
Conclusion
786
Homework Problems and Questions
787
Problems
787
Discussion Questions
788
Interview: Jeff Case
789
References
791
Index
821 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kurose, James F. 1956- |
author_GND | (DE-588)123704618 (DE-588)113704666 |
author_facet | Kurose, James F. 1956- |
author_role | aut |
author_sort | Kurose, James F. 1956- |
author_variant | j f k jf jfk |
building | Verbundindex |
bvnumber | BV022374905 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 |
callnumber-search | TK5105.875.I57 |
callnumber-sort | TK 45105.875 I57 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 321 |
classification_tum | DAT 250f |
ctrlnum | (OCoLC)79004271 (DE-599)BVBBV022374905 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 4. ed. [hardcover ed.] |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03197nam a2200769zc 4500</leader><controlfield tag="001">BV022374905</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081114 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070402s2008 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321497703</subfield><subfield code="9">978-0-321-49770-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321497708</subfield><subfield code="9">0-321-49770-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)79004271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022374905</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-2070s</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="b">K8C6 2008</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 321</subfield><subfield code="0">(DE-625)143658:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose ; Keith W. Ross</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed. [hardcover ed.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Pearson Addison-Wesley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 852 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Redes de computadores</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015583995</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV022374905 |
illustrated | Illustrated |
index_date | 2024-07-02T17:08:49Z |
indexdate | 2024-07-09T20:56:15Z |
institution | BVB |
isbn | 9780321497703 0321497708 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015583995 |
oclc_num | 79004271 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-29T DE-19 DE-BY-UBM DE-739 DE-20 DE-1046 DE-83 DE-11 DE-2070s |
owner_facet | DE-473 DE-BY-UBG DE-29T DE-19 DE-BY-UBM DE-739 DE-20 DE-1046 DE-83 DE-11 DE-2070s |
physical | XXIV, 852 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Pearson Addison-Wesley |
record_format | marc |
spelling | Kurose, James F. 1956- Verfasser (DE-588)123704618 aut Computer networking a top-down approach James F. Kurose ; Keith W. Ross 4. ed. [hardcover ed.] Boston ; Munich [u.a.] Pearson Addison-Wesley 2008 XXIV, 852 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Internet Redes de computadores Réseaux d'ordinateurs Computer networks Computer (DE-588)4070083-5 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Faseroptik (DE-588)4016498-6 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Transportschicht (DE-588)4301518-9 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Rechnernetz (DE-588)4070085-9 s Internet (DE-588)4308416-3 s 1\p DE-604 Faseroptik (DE-588)4016498-6 s 2\p DE-604 Netzwerk (DE-588)4171529-9 s 3\p DE-604 Kommunikationsprotokoll (DE-588)4128252-8 s 4\p DE-604 Computer (DE-588)4070083-5 s 5\p DE-604 Transportschicht (DE-588)4301518-9 s 6\p DE-604 Ross, Keith W. 1956- Sonstige (DE-588)113704666 oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kurose, James F. 1956- Computer networking a top-down approach Internet Redes de computadores Réseaux d'ordinateurs Computer networks Computer (DE-588)4070083-5 gnd Netzwerk (DE-588)4171529-9 gnd Rechnernetz (DE-588)4070085-9 gnd Faseroptik (DE-588)4016498-6 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
subject_GND | (DE-588)4070083-5 (DE-588)4171529-9 (DE-588)4070085-9 (DE-588)4016498-6 (DE-588)4308416-3 (DE-588)4301518-9 (DE-588)4128252-8 (DE-588)4123623-3 |
title | Computer networking a top-down approach |
title_auth | Computer networking a top-down approach |
title_exact_search | Computer networking a top-down approach |
title_exact_search_txtP | Computer networking a top-down approach |
title_full | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_fullStr | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_full_unstemmed | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_short | Computer networking |
title_sort | computer networking a top down approach |
title_sub | a top-down approach |
topic | Internet Redes de computadores Réseaux d'ordinateurs Computer networks Computer (DE-588)4070083-5 gnd Netzwerk (DE-588)4171529-9 gnd Rechnernetz (DE-588)4070085-9 gnd Faseroptik (DE-588)4016498-6 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
topic_facet | Internet Redes de computadores Réseaux d'ordinateurs Computer networks Computer Netzwerk Rechnernetz Faseroptik Transportschicht Kommunikationsprotokoll Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kurosejamesf computernetworkingatopdownapproach AT rosskeithw computernetworkingatopdownapproach |