Computer networking: a top-down approach
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Pearson
2013
|
Ausgabe: | 6. ed., internat. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 888 S. Ill., graph. Darst. |
ISBN: | 9780273768968 0273768964 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040136429 | ||
003 | DE-604 | ||
005 | 20131126 | ||
007 | t| | ||
008 | 120515s2013 xx ad|| |||| 00||| eng d | ||
015 | |a GBB214690 |2 dnb | ||
020 | |a 9780273768968 |c pbk. |9 978-0-273-76896-8 | ||
020 | |a 0273768964 |9 0-273-76896-4 | ||
035 | |a (OCoLC)794494921 | ||
035 | |a (DE-599)BVBBV040136429 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-473 |a DE-739 |a DE-Aug4 |a DE-91G |a DE-29T |a DE-83 |a DE-355 |a DE-573 |a DE-522 |a DE-861 |a DE-11 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 321 |0 (DE-625)143658: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Kurose, James F. |d 1956- |e Verfasser |0 (DE-588)123704618 |4 aut | |
245 | 1 | 0 | |a Computer networking |b a top-down approach |c James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul |
250 | |a 6. ed., internat. ed. | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Pearson |c 2013 | |
300 | |a 888 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Internet | |
650 | 4 | |a Computer networks | |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Faseroptik |0 (DE-588)4016498-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Transportschicht |0 (DE-588)4301518-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Faseroptik |0 (DE-588)4016498-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
689 | 3 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 3 | |8 4\p |5 DE-604 | |
689 | 4 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 4 | |8 5\p |5 DE-604 | |
689 | 5 | 0 | |a Transportschicht |0 (DE-588)4301518-9 |D s |
689 | 5 | |8 6\p |5 DE-604 | |
700 | 1 | |a Ross, Keith W. |d 1956- |e Verfasser |0 (DE-588)113704666 |4 aut | |
700 | 1 | |a Paul, Goutam |e Sonstige |0 (DE-588)1044618817 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024993476&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024993476 |
Datensatz im Suchindex
_version_ | 1818239794812026880 |
---|---|
adam_text |
Table
of
Contents
Computer
Networks and the Internet
27
1.1
What Is
;
the Internet?
28
1.1.1
A Nuts-and-Bolts Description
28
1.1.2
A Services Description
31
1.1.3
What Is a Protocol?
33
1.2
The Network Edge
35
1.2.1
Access Networks
38
1.2.2
Physical Media
44
1.3
The Network Core
48
1.3.1
Packet Switching
48
1.3.2
Circuit Switching
53
1.3.3
A Network of Networks
58
1.4
Delay, I
^oss, and Throughput in Packet-Switched Networks
61
1.4.1
Overview of Delay in Packet-Switched Networks
61
1.4.2
Queuing Delay and Packet Loss
65
1.4.3
End-to-End Delay
68
1.4.4
Throughput in Computer Networks
70
1.5
Protocol Layers and Their Service Models
73
1.5.1
Layered Architecture
73
1.5.2
Encapsulation
79
1.6
Networks Under Attack
81
1.7
History
of Computer Networking and the Internet
86
1.7.1
The Development of Packet Switching:
1961-1972
86
1.7.2
Proprietary Networks and Internetworking:
1972-1980
88
1.7.3
A Proliferation of Networks:
1980-1990
89
1.7.4
The Internet Explosion: The
1990s
90
1.7.5
The New Millennium
91
1.8
Summary
92
Homework Problems and Questions
94
Wireshark Lab
104
Interview: Leonard
Kleinrock
106
Chapter
2
Application Layer
109
2.1
Principles of Network Applications
110
2.1.1
Network Application Architectures
112
2.1.2
Processes Communicating
114
2.1.3
Transport Services Available to Applications
117
2.1.4
Transport Services Provided by the Internet
119
2.1.5
Application-Layer Protocols
122
2.1.6
Network Applications Covered in This Book
123
2.2
The Web and HTTP
124
2.2.1
Overview of HTTP
124
2.2.2
Non-Persistent and Persistent Connections
126
2.2.3
HTTP Message Format
129
2.2.4
User-Server Interaction: Cookies
134
2.2.5
Web Caching
136
2.2.6
The Conditional GET
140
2.3
File Transfer: FTP
142
2.3.1
FTP Commands and Replies
144
2.4
Electronic Mail in the Internet
144
2.4.1
SMTP
147
2.4.2
Comparison with HTTP
150
2.4.3
Mail Message Format
151
2.4.4
Mail Access Protocols
151
2.5
DNS—The Internet's Directory Service
156
2.5.1
Services Provided by DNS
157
2.5.2
Overview of How DNS Works
159
2.5.3
DNS Records and Messages
165
2.6
Peer-to-Peer Applications
170
2.6.1
P2P File Distribution
171
2.6.2
Distributed Hash Tables (DHTs)
177
2.7
Socket Programming: Creating Network Applications
182
2.7.1
Socket Programming with
UDP
183
2.7.2
Socket Programming with TCP
189
2.8
Summary
194
Homework Problems and Questions
195
Socket Programming Assignments
205
Wireshark Labs: HTTP, DNS
207
Interview: Marc Andreessen
208
Chapter
3
Transport Layer
211
3.1
Introduction and Transport-Layer Services
212
3.1.1
Relationship Between Transport and Network Layers
212
3.1.2
Overview of the Transport Layer in the Internet
215
3.2
Multiplexing and Demultiplexing
217
3.3
Connectionless Transport:
UDP
224
3.3.1
UDP
Segment Structure
228
3.3.2
UDP
Checksum
228
3.4
Principles of Reliable Data Transfer
230
3.4.1
Building a Reliable Data Transfer Protocol
232
3.4.2
Pipelined Reliable Data Transfer Protocols
241
3.4.3
Go-Back-N (GBN)
244
3.4.4
Selective Repeat (SR)
249
3.5
Connection-Oriented Transport: TCP
256
3.5.1
The TCP Connection
257
3.5.2
TCP Segment Structure
259
3.5.3
Round-Trip Time Estimation and Timeout
264
3.5.4
Reliable Data Transfer
268
3.5.5
Flow Control
276
3.5.6
TCP Connection Management
278
3.6
Principles of Congestion Control
285
3.6.1
The Causes and the Costs of Congestion
285
3.6.2
Approaches to Congestion Control
291
3.6.3
Network-Assisted Congestion-Control Example:
ATM ABR Congestion Control
292
3.7
TCP Congestion Control
295
3.7.1
Fairness
305
3.8
Summary
309
Homework Problems and Questions
311
Programming Assignments
326
Wireshark Labs: TCP,
UDP
327
Interview: Van
Jacobson
328
Chapter
4
The Network Layer
331
4.1
Introduction
332
4.1.1
Forwarding and Routing
334
4.1.2
Network Service Models
336
4.2
Virtual Circuit and Datagram Networks
339
4.2.1
Virtual-Circuit Networks
340
4.2.2
Datagram Networks
343
4.2.3
Origins of VC and Datagram Networks
345
4.3
What's Inside a Router?
346
4.3.1
Input Processing
348
4.3.2
Switching
350
4.3.3
Output Processing
352
4.3.4
Where Does Queuing Occur?
353
4.3.5
The Routing Control Plane
357
4.4
The Internet Protocol (IP): Forwarding and Addressing in the Internet
357
4.4.1
Datagram Format
358
4.4.2 IPv4
Addressing
364
4.4.3
Internet Control Message Protocol (ICMP)
379
4.4.4 IPv6 382
4.4.5
A Brief Foray into IP Security
388
4.5
Routing Algorithms
389
4.5.1
The Link-State (LS) Routing Algorithm
392
4.5.2
The Distance-Vector
(DV)
Routing Algorithm
397
4.5.3
Hierarchical Routing
405
4.6
Routing in the Internet
409
4.6.1
Intra-
AS Routing in the Internet: RIP
410
4.6.2
Intra-AS Routing in the Internet: OSPF
414
4.6.3
Inter-AS Routing: BGP
416
4.7
Broadcast and Multicast Routing
425
4.7.1
Broadcast Routing Algorithms
426
4.7.2
Multicast
431
4.8
Summary
438
Homework Problems and Questions
439
Programming Assignments
455
Wireshark Labs: IP, ICMP
456
Interview:
Vinton
G. Cerf
457
Chapter
5
The Link Layer: Links, Access Networks, and LANs
459
5.1
Introduction to the Link Layer
460
5.1.1
The Services Provided by the Link Layer
462
5.1.2
Where Is the Link Layer Implemented?
463
5.2
Error-Detection and-Correction Techniques
464
5.2.1
Parity Checks
466
5.2.2
Checksumming Methods
468
5.2.3
Cyclic Redundancy Check
(CRC) 469
5.3
Multiple Access Links and Protocols
471
5.3.1
Channel Partitioning Protocols
474
5.3.2
Random Access Protocols
475
5.3.3
Taking-Turns Protocols
485
5.3.4
DOCSIS: The Link-Layer Protocol for Cable Internet Access
486
5.4
Switched
Local
Area
Networks
487
5.4.1
Link-Layer Addressing and
ARP
488
5.4.2
Ethernet
495
5.4.3
Link-Layer Switches
502
5.4.4
Virtual Local Area Networks (VLANs)
508
5.5
Link Virtualization: A Network as a Link Layer
512
5.5.1
Multiprotocol Label Switching (MPLS)
513
5.6
Data Center Networking
516
5.7
Retrospective: A Day in the Life of a Web Page Request
521
5.7.1
Getting Started: DHCP,
UDP,
IP, and Ethernet
521
5.7.2
Still Getting Started: DNS and
ARP
523
5.7.3
Still Getting Started: Intra-Domain Routing to the DNS Server
524
5.7.4
Web Client-Server Interaction: TCP and HTTP
525
5.8
Summary
526
Homework Problems and Questions
528
Wireshark Labs
:
Ethernet and
ARP,
DHCP
536
Interview: Simon S. Lam
537
Chapter
6
Wireless and Mobile Networks
539
6.1
Introduction
540
6.2
Wireless Links and Network Characteristics
545
6.2.1
CDMA
548
6.3
WiFi:
802.11
Wireless LANs
552
6.3.1
The
802.11
Architecture
553
6.3.2
The
802.11
MAC Protocol
557
6.3.3
The IEEE
802.11
Frame
563
6.3.4
Mobility in the Same IP Subnet
567
6.3.5
Advanced Features in
802.11 568
6.3.6
Personal Area Networks: Bluetooth and Zigbee
570
6.4
Cellular Internet Access
572
6.4.1
An Overview of Cellular Network Architecture
573
6.4.2
3G Cellular Data Networks: Extending the Internet to Cellular
Subscribers
576
6.4.3
On to 4G: LTE
579
6.5
Mobility Management: Principles
581
6.5.1
Addressing
583
6.5.2
Routing to a Mobile Node
585
6.6
Mobile IP
590
6.7
Managing Mobility in Cellular Networks
596
6.7.1
Routing Calls to a Mobile User
597
6.7.2 Handoffs in
GSM
598
6.8
Wireless and Mobility: Impact on Higher-Layer Protocols
601
6.9
Summary
604
Homework Problems and Questions
604
Wireshark Lab: IEEE
802.11
(WiFi)
609
Interview: Deborah Estrin
610
Chapter
7
Multimedia Networking
613
7.1
Multimedia Networking Applications
614
7.1.1
Properties of Video
614
7.1.2
Properties of Audio
616
7.1.3
Types of Multimedia Network Applications
617
7.2
Streaming Stored Video
619
7.2.1
UDP
Streaming
621
7.2.2
HTTP Streaming
622
7.2.3
Adaptive Streaming and DASH
626
7.2.4
Content Distribution Networks
628
7.2.5
Case Studies: Netflix, YouTube, and
Kankan
634
7.3
Voice-over-IP
638
7.3.1
Limitations of the Best-Effort IP Service
638
7.3.2
Removing Jitter at the Receiver for Audio
640
7.3.3
Recovering from Packet Loss
643
7.3.4
Case Study: VoIP with Skype
646
7.4
Protocols for Real-Time Conversational Applications
649
7.4.1
RTP
650
7.4.2
SIP
653
7.5
Network Support for Multimedia
658
7.5.1
Dimensioning Best-Effort Networks
660
7.5.2
Providing Multiple Classes of Service
662
7.5.3
Diffserv
674
7.5.4
Per-Connection Quality-of-Service (QoS) Guarantees:
Resource Reservation and Call Admission
678
7.6
Summary
681
Homework Problems and Questions
682
Programming Assignment
692
Interview:
Henning Schulzrinne 694
Chapter
8
Security in Computer Networks
697
8.1
What Is Network Security?
698
8.2
Principles of Cryptography
701
8.2.1
Symmetric Key Cryptography
702
8.2.2
Public Key Encryption
709
8.3 Message
Integrity and Digital Signatures
714
8.3.1
Cryptographic Hash Functions
715
8.3.2
Message Authentication Code
717
8.3.3
Digital Signatures
719
8.4
End-Point Authentication
726
8.4.1
Authentication Protocol
api.O
726
8.4.2
Authentication Protocol ap2.0
727
8.4.3
Authentication Protocol
арЗ.О
728
8.4.4
Authentication Protocol
арі.і
729
8.4.5
Authentication Protocol ap4.0
729
8.5
Securing E-Mail
731
8.5.1
Secure E-Mail
732
8.5.2
PGP
736
8.6
Securing TCP Connections: SSL
737
8.6.1
The Big Picture
739
8.6.2
A More Complete Picture
742
8.7
Network-Layer Security:
IPsec
and Virtual Private Networks
744
8.7.1
IPsec
and Virtual Private Networks (VPNs)
744
8.7.2
The AH and ESP Protocols
746
8.7.3
Security Associations
746
8.7.4
The
IPsec
Datagram
747
8.7.5
IKE: Key Management in
IPsec
751
8.8
Securing Wireless LANs
752
8.8.1
Wired Equivalent Privacy (WEP)
752
8.8.2
IEEE
802.
Hi
754
8.9
Operational Security: Firewalls and Intrusion Detection Systems
757
8.9.1
Firewalls
757
8.9.2
Intrusion Detection Systems
765
8.10
Summary
768
Homework Problems and Questions
770
Wireshark Lab: SSL
778
IPsec
Lab
778
Interview: Steven M. Bellovin
779
Chapter
9
Network Management
781
9.1
What Is Network Management?
782
9.2
The Infrastructure for Network Management
786
9.3
The Internet-Standard Management Framework
790
9.3.1
Structure of Management Information: SMI
792
9.3.2
Management Information Base:
МІВ
796
9.3.3
SNMP
Protocol
Operations and
Transport
Mappings
798
9.3.4
Security and Administration
801
9.4
ASN.l
804
9.5
Conclusion
809
Homework Problems and Questions
809
Interview: Jennifer Rexf
ord
812
References
815
Index
849 |
any_adam_object | 1 |
author | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_GND | (DE-588)123704618 (DE-588)113704666 (DE-588)1044618817 |
author_facet | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_role | aut aut |
author_sort | Kurose, James F. 1956- |
author_variant | j f k jf jfk k w r kw kwr |
building | Verbundindex |
bvnumber | BV040136429 |
classification_rvk | ST 200 ST 321 |
classification_tum | DAT 250f |
ctrlnum | (OCoLC)794494921 (DE-599)BVBBV040136429 |
discipline | Informatik |
edition | 6. ed., internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV040136429</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131126</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120515s2013 xx ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB214690</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780273768968</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-273-76896-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0273768964</subfield><subfield code="9">0-273-76896-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794494921</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040136429</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 321</subfield><subfield code="0">(DE-625)143658:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">6. ed., internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">888 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paul, Goutam</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1044618817</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024993476&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024993476</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV040136429 |
illustrated | Illustrated |
indexdate | 2024-12-12T13:03:13Z |
institution | BVB |
isbn | 9780273768968 0273768964 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024993476 |
oclc_num | 794494921 |
open_access_boolean | |
owner | DE-703 DE-473 DE-BY-UBG DE-739 DE-Aug4 DE-91G DE-BY-TUM DE-29T DE-83 DE-355 DE-BY-UBR DE-573 DE-522 DE-861 DE-11 |
owner_facet | DE-703 DE-473 DE-BY-UBG DE-739 DE-Aug4 DE-91G DE-BY-TUM DE-29T DE-83 DE-355 DE-BY-UBR DE-573 DE-522 DE-861 DE-11 |
physical | 888 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Pearson |
record_format | marc |
spelling | Kurose, James F. 1956- Verfasser (DE-588)123704618 aut Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul 6. ed., internat. ed. Boston ; Munich [u.a.] Pearson 2013 888 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Internet Computer networks Computer (DE-588)4070083-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Faseroptik (DE-588)4016498-6 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Transportschicht (DE-588)4301518-9 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Rechnernetz (DE-588)4070085-9 s Internet (DE-588)4308416-3 s 1\p DE-604 Faseroptik (DE-588)4016498-6 s 2\p DE-604 Netzwerk (DE-588)4171529-9 s 3\p DE-604 Kommunikationsprotokoll (DE-588)4128252-8 s 4\p DE-604 Computer (DE-588)4070083-5 s 5\p DE-604 Transportschicht (DE-588)4301518-9 s 6\p DE-604 Ross, Keith W. 1956- Verfasser (DE-588)113704666 aut Paul, Goutam Sonstige (DE-588)1044618817 oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024993476&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kurose, James F. 1956- Ross, Keith W. 1956- Computer networking a top-down approach Internet Computer networks Computer (DE-588)4070083-5 gnd Rechnernetz (DE-588)4070085-9 gnd Faseroptik (DE-588)4016498-6 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Netzwerk (DE-588)4171529-9 gnd |
subject_GND | (DE-588)4070083-5 (DE-588)4070085-9 (DE-588)4016498-6 (DE-588)4308416-3 (DE-588)4301518-9 (DE-588)4128252-8 (DE-588)4171529-9 (DE-588)4123623-3 |
title | Computer networking a top-down approach |
title_auth | Computer networking a top-down approach |
title_exact_search | Computer networking a top-down approach |
title_full | Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul |
title_fullStr | Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul |
title_full_unstemmed | Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. contrib. by Goutam Paul |
title_short | Computer networking |
title_sort | computer networking a top down approach |
title_sub | a top-down approach |
topic | Internet Computer networks Computer (DE-588)4070083-5 gnd Rechnernetz (DE-588)4070085-9 gnd Faseroptik (DE-588)4016498-6 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Netzwerk (DE-588)4171529-9 gnd |
topic_facet | Internet Computer networks Computer Rechnernetz Faseroptik Transportschicht Kommunikationsprotokoll Netzwerk Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024993476&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kurosejamesf computernetworkingatopdownapproach AT rosskeithw computernetworkingatopdownapproach AT paulgoutam computernetworkingatopdownapproach |