Computer networking: a top-down approach
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Harlow, United Kingdom
Pearson
[2022]
|
Ausgabe: | Eighth edition, global edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 794 Seiten Illustrationen, Diagramme, Karten |
ISBN: | 9781292405469 1292405465 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047373442 | ||
003 | DE-604 | ||
005 | 20221202 | ||
007 | t | ||
008 | 210715s2022 a||| |||| 00||| eng d | ||
020 | |a 9781292405469 |c Broschur : ca. EUR 75.55 (DE) |9 978-1-292-40546-9 | ||
020 | |a 1292405465 |9 1-292-40546-5 | ||
035 | |a (OCoLC)1263268636 | ||
035 | |a (DE-599)BVBBV047373442 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-573 |a DE-19 |a DE-384 |a DE-703 |a DE-522 |a DE-29T |a DE-861 |a DE-860 |a DE-898 |a DE-83 |a DE-858 |a DE-92 |a DE-355 | ||
050 | 0 | |a TK5105.875.I57 | |
082 | 0 | |a 004.6 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
100 | 1 | |a Kurose, James F. |d 1956- |e Verfasser |0 (DE-588)123704618 |4 aut | |
245 | 1 | 0 | |a Computer networking |b a top-down approach |c James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai) |
250 | |a Eighth edition, global edition | ||
264 | 1 | |a Harlow, United Kingdom |b Pearson |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a 794 Seiten |b Illustrationen, Diagramme, Karten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks -- Internet | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ross, Keith W. |d 1956- |e Verfasser |0 (DE-588)113704666 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032775187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032775187 |
Datensatz im Suchindex
_version_ | 1813872118420471808 |
---|---|
adam_text |
Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1 Access Networks 1.2.2 Physical Media 1.3 The Network Core 1.3.1 Packet Switching 1.3.2 Circuit Switching 1.3.3 A Network of Networks 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-SwitchedNetworks 1.4.2 Queuing Delay and Packet Loss 1.4.3 End֊to-End Delay 1.4.4 Throughput in Computer Networks 1.5 Protocol Layers and Their Service Models 1.5.1 Layered Architecture 1.5.2 Encapsulation 1.6 Networks Under Attack 1.7 History of Computer Networking and the Internet 1.7.1 The Development of Packet Switching:1961-1972 1.7.2 Proprietary Networks and Internetworking: 1972-1980 1.7.3 A Proliferation of Networks: 1980-1990 1.7.4 The Internet Explosion: The 1990s 1.7.5 The New Millennium 1.8 Summary Homework Problems and Questions WiresharkLab Interview: Leonard Kleinrock 31 32 32 35 37 39 42 48 52 53 57 61 65 65 69 71 73 77 77 82 84 88 88 89 91 92 93 94 96 106 108 21
22 TABLE OF CONTENTS Chapter 2 Application Layer 2.1 Principles of Network Applications 2.1.1 Network Application Architectures 2.1.2 Processes Communicating 2.1.3 Transport Services Available to Applications 2.1.4 Transport Services Provided by the Internet 2.1.5 Application-Layer Protocols 2.1.6 Network Applications Covered in This Book 2.2 The Web and HTTP 2.2.1 Overview of HTTP 2.2.2 Non-Persistent and Persistent Connections 2.2.3 HTTP Message Format 2.2.4 User-Server Interaction: Cookies 2.2.5 Web Caching 2.2.6 HTTP/2 2.3 Electronic Mail in the Internet 2.3.1 SMTP 2.3.2 Mail Message Formats 2.3.3 Mail Access Protocols 2.4 DNS—The Internet’s Directory Service 2.4.1 Services Provided by DNS 2.4.2 Overview of How DNS Works 2.4.3 DNS Records and Messages 2.5 Peer-to-Peer File Distribution 2.6 Video Streaming and Content Distribution Networks 2.6.1 Internet Video 2.6.2 HTTP Streaming and DASH 2.6.3 Content Distribution Networks 2.6.4 Case Studies: Netflix and YouTube 2.7 Socket Programming: Creating Network Applications 2.7.1 Socket Programming with UDP 2.7.2 Socket Programming with TCP 2.8 Summary Homework Problems and Questions Socket Programming Assignments Wireshark Labs: HTTP, DNS Interview: Tim Berners-Lee 111 112 ! 14 115 118 120 124 125 125 126 128 131 135 138 143 146 148 151 151 152 153 155 161 166 173 173 174 175 179 182 184 189 195 196 205 207 208
TABLE OF CONTENTS Chapter 3 Transport Layer 3.1 Introduction and Transport-Layer Services 3.1.1 Relationship Between Transport and Network Layers 3.1.2 Overview of the Transport Layer in the Internet 3.2 Multiplexing and Demultiplexing 3.3 Connectionless Transport: UDP 3.3.1 UDP Segment Structure 3.3.2 UDP Checksum 3.4 Principles of Reliable Data Transfer 3.4.1 Building a Reliable Data Transfer Protocol 3.4.2 Pipelined Reliable Data Transfer Protocols 3.4.3 Go-Back-N (GBN) 3.4.4 Selective Repeat (SR) 3.5 Connection-Oriented Transport: TCP 3.5.1 The TCP Connection 3.5.2 TCP Segment Structure 3.5.3 Round-Trip Time Estimation and Timeout 3.5.4 Reliable Data Transfer 3.5.5 Flow Control 3.5.6 TCP Connection Management 3.6 Principles of Congestion Control 3.6.1 The Causes and the Costs of Congestion 3.6.2 Approaches to Congestion Control 3.7 TCP Congestion Control 3.7.1 Classic TCP Congestion Control 3.7.2 Network-Assisted Explicit Congestion Notification and Delayed-based Congestion Control 3.7.3 Fairness 3.8 Evolution of Transport-Layer Functionality 3.9 Summary Homework Problems and Questions Programming Assignments Wireshark Labs: Exploring TCP, UDP Interview: Van Jacobson Chapter 4 The Network Layer: DataPlane 4.1 4.2 Overview of Network Layer 4.1.1 Forwarding and Routing: The Data and Control Planes 4.1.2 Network Service Model What’s Inside a Router? 4.2.1 Input Port Processing and Destination-Based Forwarding 4.2.2 Switching 23 211 212 212 215 217 224 228 228 230 232 241 245 250 257 257 260 265 268 276 279 285 285 292 293 293 304 306 309 312 314 330 330 331 333 334 334 339
341 344 347
24 TABLE OF CONTENTS 4.2.3 Output Port Processing 4.2.4 Where Does Queuing Occur? 4.2.5 Packet Scheduling 4.3 The Internet Protocol (IP): IPv4, Addressing, IPv6,and More 4.3.1 IPv4 Datagram Format 4.3.2 IPv4 Addressing 4.3.3 Network Address Translation (NAT) 4.3.4 IPv6 4.4 Generalized Forwarding and SDN 4.4.1 Match 4.4.2 Action 4.4.3 OpenFlow Examples of Match-plus-action in Action 4.5 Middleboxes 4.6 Summary Homework Problems and Questions Wireshark Lab: IP Interview: Vinton G. Cerf Chapter 5 The Network Layer: Control Plane 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 Introduction Routing Algorithms 5.2.1 The Link-State (LS) Routing Algorithm 5.2.2 The Distance-Vector (DV) Routing Algorithm Intra-AS Routing in the Internet: OSPF Routing Among the ISPs: BGP 5.4.1 The Role of BGP 5.4.2 Advertising BGP Route Information 5.4.3 Determining the Best Routes 5.4.4 IP-Anycast 5.4.5 Routing Policy 5.4.6 Putting the Pieces Together: Obtaining Internet Presence The SDN Control Plane 5.5.1 The SDN Control Plane: SDN Controller and SDN Network-control Applications 5.5.2 OpenFlow Protocol 5.5.3 Data and Control Plane Interaction: An Example 5.5.4 SDN: Past and Future ICMP: The Internet Control Message Protocol Network Management and SNMP, NETCONF/YANG 5.7.1 The Network Management Framework 5.7.2 The Simple Network Management Protocol (SNMP) and the Management Information Base (MIB) 5.7.3 The Network Configuration Protocol (NETCONF) and YANG Summary 349 349 355 360 361 363 374 377 383 385 386 387 390 394 394 404 405 407 408 410 413 418 425 429 429 430 432 436 437 440 441 444 446 448 449 453 455 456
458 462 466
TABLE OF CONTENTS Homework Problems and Questions Socket Programming Assignment 5: ICMP Ping Programming Assignment: Routing Wireshark Lab: ICMP Interview: Jennifer Rexford Chapter 6 The Link Layer and LANs 6.1 Introduction to the Link Layer 6.1.1 The Services Provided by the Link Layer 6.1.2 Where Is the Link Layer Implemented? 6.2 Error-Detection and -Correction Techniques 6.2.1 Parity Checks 6.2.2 Checksumming Methods 6.2.3 Cyclic Redundancy Check (CRC) 6.3 Multiple Access Links and Protocols 6.3.1 Channel Partitioning Protocols 6.3.2 Random Access Protocols 6.3.3 Taking-Turns Protocols 6.3.4 DOCSIS: The Link-Layer Protocol for CableInternet Access 6.4 Switched Local Area Networks 6.4.1 Link-Layer Addressing and ARP 6.4.2 Ethernet 6.4.3 Link-Layer Switches 6.4.4 Virtual Local Area Networks (VLANs) 6.5 Link Virtualization: A Network as a Link Layer 6.5.1 Multiprotocol Label Switching (MPLS) 6.6 Data Center Networking 6.6.1 Data Center Architectures 6.6.2 Trends in Data Center Networking 6.7 Retrospective: A Day in the Life of a Web Page Request 6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 6.7.2 Still Getting Started: DNS and ARP 6.7.3 Still Getting Started: Intra-Domain Routing tothe DNS Server 6.7.4 Web Client-Server Interaction: TCP and HTTP 6.8 Summary Homework Problems and Questions Wireshark Labs: 802.11 Ethernet Interview: Albert Greenberg Chapter 7 Wireless and Mobile Networks 7.1 7.2 Introduction Wireless Links and Network Characteristics 7.2.1 CDMA 25 467 473 474 475 476 479 480 482 483 484 486 488 489 491 493 495 504 505 507 508 514 521 527 531 532 535 535
539 542 542 544 545 546 548 549 557 558 561 562 566 569
26 TABLE OF CONTENTS 7.3 WiFi: 802.11 Wireless LANs 7.3.1 The 802.11 Wireless LAN Architecture 7.3.2 The 802.11 MAC Protocol 7.3.3 The IEEE 802.11 Frame 7.3.4 Mobility in the Same IP Subnet 7.3.5 Advanced Features in 802.11 7.3.6 Personal Area Networks: Bluetooth 7.4 Cellular Networks: 4G and 5G 7.4.1 4G LTE Cellular Networks: Architecture and Elements 7.4.2 LTE Protocols Stacks 7.4.3 LTE Radio Access Network 7.4.4 Additional LTE Functions: Network Attachment and Power Management 7.4.5 The Global Cellular Network: A Network of Networks 7.4.6 5G Cellular Networks 7.5 Mobility Management: Principles 7.5.1 Device Mobility: a Network-layer Perspective 7.5.2 Home Networks and Roaming on Visited Networks 7.5.3 Direct and Indirect Routing to/from a Mobile Device 7.6 Mobility Management in Practice 7.6.1 Mobility Management in 4G/5G Networks 7.6.2 Mobile IP 7.7 Wireless and Mobility: Impact on Higher-Layer Protocols 7.8 Summary Homework Problems and Questions Wireshark Lab: WiFi Interview: Deborah Estrin Chapter 8 Security in Computer Networks 8.1 8.2 8.3 8.4 8.5 What Is Network Security? Principles of Cryptography 8.2.1 Symmetric Key Cryptography 8.2.2 Public Key Encryption Message Integrity and Digital Signatures 8.3.1 Cryptographic Hash Functions 8.3.2 Message Authentication Code 8.3.3 Digital Signatures End-Point Authentication Securing E-Mail 8.5.1 Secure E-Mail 8.5.2 PGP 572 574 578 583 586 589 590 593 594 600 601 602 604 605 608 608 609 610 617 617 622 624 626 627 632 633 637 638 640 642 648 654 655 656 658 664 669 670 673
TABLE OF CONTENTS 8.6 Securing TCP Connections: TLS 8.6.1 The Big Picture 8.6.2 A More Complete Picture 8.7 Network-Layer Security: IPsec and Virtual Private Networks 8.7.1 IPsec and Virtual Private Networks (VPNs) 8.7.2 The AH and ESP Protocols 8.7.3 Security Associations 8.7.4 The IPsec Datagram 8.7.5 IKE: Key Management in IPsec 8.8 Securing Wireless LANs and 4G/5G Cellular Networks 8.8.1 Authentication and Key Agreement in 802.11 Wireless LANs 8.8.2 Authentication and Key Agreement in 4G/5G Cellular Networks 8.9 Operational Security: Firewalls and Intrusion Detection Systems 8.9.1 Firewalls 8.9.2 Intrusion Detection Systems 8.10 Summary Homework Problems and Questions Wireshark Lab: SSL IPsec Lab Interview: Steven M. Bellovin References Index 27 674 676 679 681 681 683 683 685 688 689 689 694 697 697 705 709 710 718 718 719 721 761 |
adam_txt |
Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1 Access Networks 1.2.2 Physical Media 1.3 The Network Core 1.3.1 Packet Switching 1.3.2 Circuit Switching 1.3.3 A Network of Networks 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-SwitchedNetworks 1.4.2 Queuing Delay and Packet Loss 1.4.3 End֊to-End Delay 1.4.4 Throughput in Computer Networks 1.5 Protocol Layers and Their Service Models 1.5.1 Layered Architecture 1.5.2 Encapsulation 1.6 Networks Under Attack 1.7 History of Computer Networking and the Internet 1.7.1 The Development of Packet Switching:1961-1972 1.7.2 Proprietary Networks and Internetworking: 1972-1980 1.7.3 A Proliferation of Networks: 1980-1990 1.7.4 The Internet Explosion: The 1990s 1.7.5 The New Millennium 1.8 Summary Homework Problems and Questions WiresharkLab Interview: Leonard Kleinrock 31 32 32 35 37 39 42 48 52 53 57 61 65 65 69 71 73 77 77 82 84 88 88 89 91 92 93 94 96 106 108 21
22 TABLE OF CONTENTS Chapter 2 Application Layer 2.1 Principles of Network Applications 2.1.1 Network Application Architectures 2.1.2 Processes Communicating 2.1.3 Transport Services Available to Applications 2.1.4 Transport Services Provided by the Internet 2.1.5 Application-Layer Protocols 2.1.6 Network Applications Covered in This Book 2.2 The Web and HTTP 2.2.1 Overview of HTTP 2.2.2 Non-Persistent and Persistent Connections 2.2.3 HTTP Message Format 2.2.4 User-Server Interaction: Cookies 2.2.5 Web Caching 2.2.6 HTTP/2 2.3 Electronic Mail in the Internet 2.3.1 SMTP 2.3.2 Mail Message Formats 2.3.3 Mail Access Protocols 2.4 DNS—The Internet’s Directory Service 2.4.1 Services Provided by DNS 2.4.2 Overview of How DNS Works 2.4.3 DNS Records and Messages 2.5 Peer-to-Peer File Distribution 2.6 Video Streaming and Content Distribution Networks 2.6.1 Internet Video 2.6.2 HTTP Streaming and DASH 2.6.3 Content Distribution Networks 2.6.4 Case Studies: Netflix and YouTube 2.7 Socket Programming: Creating Network Applications 2.7.1 Socket Programming with UDP 2.7.2 Socket Programming with TCP 2.8 Summary Homework Problems and Questions Socket Programming Assignments Wireshark Labs: HTTP, DNS Interview: Tim Berners-Lee 111 112 ! 14 115 118 120 124 125 125 126 128 131 135 138 143 146 148 151 151 152 153 155 161 166 173 173 174 175 179 182 184 189 195 196 205 207 208
TABLE OF CONTENTS Chapter 3 Transport Layer 3.1 Introduction and Transport-Layer Services 3.1.1 Relationship Between Transport and Network Layers 3.1.2 Overview of the Transport Layer in the Internet 3.2 Multiplexing and Demultiplexing 3.3 Connectionless Transport: UDP 3.3.1 UDP Segment Structure 3.3.2 UDP Checksum 3.4 Principles of Reliable Data Transfer 3.4.1 Building a Reliable Data Transfer Protocol 3.4.2 Pipelined Reliable Data Transfer Protocols 3.4.3 Go-Back-N (GBN) 3.4.4 Selective Repeat (SR) 3.5 Connection-Oriented Transport: TCP 3.5.1 The TCP Connection 3.5.2 TCP Segment Structure 3.5.3 Round-Trip Time Estimation and Timeout 3.5.4 Reliable Data Transfer 3.5.5 Flow Control 3.5.6 TCP Connection Management 3.6 Principles of Congestion Control 3.6.1 The Causes and the Costs of Congestion 3.6.2 Approaches to Congestion Control 3.7 TCP Congestion Control 3.7.1 Classic TCP Congestion Control 3.7.2 Network-Assisted Explicit Congestion Notification and Delayed-based Congestion Control 3.7.3 Fairness 3.8 Evolution of Transport-Layer Functionality 3.9 Summary Homework Problems and Questions Programming Assignments Wireshark Labs: Exploring TCP, UDP Interview: Van Jacobson Chapter 4 The Network Layer: DataPlane 4.1 4.2 Overview of Network Layer 4.1.1 Forwarding and Routing: The Data and Control Planes 4.1.2 Network Service Model What’s Inside a Router? 4.2.1 Input Port Processing and Destination-Based Forwarding 4.2.2 Switching 23 211 212 212 215 217 224 228 228 230 232 241 245 250 257 257 260 265 268 276 279 285 285 292 293 293 304 306 309 312 314 330 330 331 333 334 334 339
341 344 347
24 TABLE OF CONTENTS 4.2.3 Output Port Processing 4.2.4 Where Does Queuing Occur? 4.2.5 Packet Scheduling 4.3 The Internet Protocol (IP): IPv4, Addressing, IPv6,and More 4.3.1 IPv4 Datagram Format 4.3.2 IPv4 Addressing 4.3.3 Network Address Translation (NAT) 4.3.4 IPv6 4.4 Generalized Forwarding and SDN 4.4.1 Match 4.4.2 Action 4.4.3 OpenFlow Examples of Match-plus-action in Action 4.5 Middleboxes 4.6 Summary Homework Problems and Questions Wireshark Lab: IP Interview: Vinton G. Cerf Chapter 5 The Network Layer: Control Plane 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 Introduction Routing Algorithms 5.2.1 The Link-State (LS) Routing Algorithm 5.2.2 The Distance-Vector (DV) Routing Algorithm Intra-AS Routing in the Internet: OSPF Routing Among the ISPs: BGP 5.4.1 The Role of BGP 5.4.2 Advertising BGP Route Information 5.4.3 Determining the Best Routes 5.4.4 IP-Anycast 5.4.5 Routing Policy 5.4.6 Putting the Pieces Together: Obtaining Internet Presence The SDN Control Plane 5.5.1 The SDN Control Plane: SDN Controller and SDN Network-control Applications 5.5.2 OpenFlow Protocol 5.5.3 Data and Control Plane Interaction: An Example 5.5.4 SDN: Past and Future ICMP: The Internet Control Message Protocol Network Management and SNMP, NETCONF/YANG 5.7.1 The Network Management Framework 5.7.2 The Simple Network Management Protocol (SNMP) and the Management Information Base (MIB) 5.7.3 The Network Configuration Protocol (NETCONF) and YANG Summary 349 349 355 360 361 363 374 377 383 385 386 387 390 394 394 404 405 407 408 410 413 418 425 429 429 430 432 436 437 440 441 444 446 448 449 453 455 456
458 462 466
TABLE OF CONTENTS Homework Problems and Questions Socket Programming Assignment 5: ICMP Ping Programming Assignment: Routing Wireshark Lab: ICMP Interview: Jennifer Rexford Chapter 6 The Link Layer and LANs 6.1 Introduction to the Link Layer 6.1.1 The Services Provided by the Link Layer 6.1.2 Where Is the Link Layer Implemented? 6.2 Error-Detection and -Correction Techniques 6.2.1 Parity Checks 6.2.2 Checksumming Methods 6.2.3 Cyclic Redundancy Check (CRC) 6.3 Multiple Access Links and Protocols 6.3.1 Channel Partitioning Protocols 6.3.2 Random Access Protocols 6.3.3 Taking-Turns Protocols 6.3.4 DOCSIS: The Link-Layer Protocol for CableInternet Access 6.4 Switched Local Area Networks 6.4.1 Link-Layer Addressing and ARP 6.4.2 Ethernet 6.4.3 Link-Layer Switches 6.4.4 Virtual Local Area Networks (VLANs) 6.5 Link Virtualization: A Network as a Link Layer 6.5.1 Multiprotocol Label Switching (MPLS) 6.6 Data Center Networking 6.6.1 Data Center Architectures 6.6.2 Trends in Data Center Networking 6.7 Retrospective: A Day in the Life of a Web Page Request 6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 6.7.2 Still Getting Started: DNS and ARP 6.7.3 Still Getting Started: Intra-Domain Routing tothe DNS Server 6.7.4 Web Client-Server Interaction: TCP and HTTP 6.8 Summary Homework Problems and Questions Wireshark Labs: 802.11 Ethernet Interview: Albert Greenberg Chapter 7 Wireless and Mobile Networks 7.1 7.2 Introduction Wireless Links and Network Characteristics 7.2.1 CDMA 25 467 473 474 475 476 479 480 482 483 484 486 488 489 491 493 495 504 505 507 508 514 521 527 531 532 535 535
539 542 542 544 545 546 548 549 557 558 561 562 566 569
26 TABLE OF CONTENTS 7.3 WiFi: 802.11 Wireless LANs 7.3.1 The 802.11 Wireless LAN Architecture 7.3.2 The 802.11 MAC Protocol 7.3.3 The IEEE 802.11 Frame 7.3.4 Mobility in the Same IP Subnet 7.3.5 Advanced Features in 802.11 7.3.6 Personal Area Networks: Bluetooth 7.4 Cellular Networks: 4G and 5G 7.4.1 4G LTE Cellular Networks: Architecture and Elements 7.4.2 LTE Protocols Stacks 7.4.3 LTE Radio Access Network 7.4.4 Additional LTE Functions: Network Attachment and Power Management 7.4.5 The Global Cellular Network: A Network of Networks 7.4.6 5G Cellular Networks 7.5 Mobility Management: Principles 7.5.1 Device Mobility: a Network-layer Perspective 7.5.2 Home Networks and Roaming on Visited Networks 7.5.3 Direct and Indirect Routing to/from a Mobile Device 7.6 Mobility Management in Practice 7.6.1 Mobility Management in 4G/5G Networks 7.6.2 Mobile IP 7.7 Wireless and Mobility: Impact on Higher-Layer Protocols 7.8 Summary Homework Problems and Questions Wireshark Lab: WiFi Interview: Deborah Estrin Chapter 8 Security in Computer Networks 8.1 8.2 8.3 8.4 8.5 What Is Network Security? Principles of Cryptography 8.2.1 Symmetric Key Cryptography 8.2.2 Public Key Encryption Message Integrity and Digital Signatures 8.3.1 Cryptographic Hash Functions 8.3.2 Message Authentication Code 8.3.3 Digital Signatures End-Point Authentication Securing E-Mail 8.5.1 Secure E-Mail 8.5.2 PGP 572 574 578 583 586 589 590 593 594 600 601 602 604 605 608 608 609 610 617 617 622 624 626 627 632 633 637 638 640 642 648 654 655 656 658 664 669 670 673
TABLE OF CONTENTS 8.6 Securing TCP Connections: TLS 8.6.1 The Big Picture 8.6.2 A More Complete Picture 8.7 Network-Layer Security: IPsec and Virtual Private Networks 8.7.1 IPsec and Virtual Private Networks (VPNs) 8.7.2 The AH and ESP Protocols 8.7.3 Security Associations 8.7.4 The IPsec Datagram 8.7.5 IKE: Key Management in IPsec 8.8 Securing Wireless LANs and 4G/5G Cellular Networks 8.8.1 Authentication and Key Agreement in 802.11 Wireless LANs 8.8.2 Authentication and Key Agreement in 4G/5G Cellular Networks 8.9 Operational Security: Firewalls and Intrusion Detection Systems 8.9.1 Firewalls 8.9.2 Intrusion Detection Systems 8.10 Summary Homework Problems and Questions Wireshark Lab: SSL IPsec Lab Interview: Steven M. Bellovin References Index 27 674 676 679 681 681 683 683 685 688 689 689 694 697 697 705 709 710 718 718 719 721 761 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_GND | (DE-588)123704618 (DE-588)113704666 |
author_facet | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_role | aut aut |
author_sort | Kurose, James F. 1956- |
author_variant | j f k jf jfk k w r kw kwr |
building | Verbundindex |
bvnumber | BV047373442 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 |
callnumber-search | TK5105.875.I57 |
callnumber-sort | TK 45105.875 I57 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 205 |
ctrlnum | (OCoLC)1263268636 (DE-599)BVBBV047373442 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Eighth edition, global edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV047373442</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221202</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210715s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781292405469</subfield><subfield code="c">Broschur : ca. EUR 75.55 (DE)</subfield><subfield code="9">978-1-292-40546-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1292405465</subfield><subfield code="9">1-292-40546-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1263268636</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047373442</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Eighth edition, global edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Harlow, United Kingdom</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">794 Seiten</subfield><subfield code="b">Illustrationen, Diagramme, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Internet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032775187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032775187</subfield></datafield></record></collection> |
id | DE-604.BV047373442 |
illustrated | Illustrated |
index_date | 2024-07-03T17:45:34Z |
indexdate | 2024-10-25T08:00:52Z |
institution | BVB |
isbn | 9781292405469 1292405465 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032775187 |
oclc_num | 1263268636 |
open_access_boolean | |
owner | DE-739 DE-573 DE-19 DE-BY-UBM DE-384 DE-703 DE-522 DE-29T DE-861 DE-860 DE-898 DE-BY-UBR DE-83 DE-858 DE-92 DE-355 DE-BY-UBR |
owner_facet | DE-739 DE-573 DE-19 DE-BY-UBM DE-384 DE-703 DE-522 DE-29T DE-861 DE-860 DE-898 DE-BY-UBR DE-83 DE-858 DE-92 DE-355 DE-BY-UBR |
physical | 794 Seiten Illustrationen, Diagramme, Karten |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Pearson |
record_format | marc |
spelling | Kurose, James F. 1956- Verfasser (DE-588)123704618 aut Computer networking a top-down approach James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai) Eighth edition, global edition Harlow, United Kingdom Pearson [2022] © 2022 794 Seiten Illustrationen, Diagramme, Karten txt rdacontent n rdamedia nc rdacarrier Computer networks -- Internet Rechnernetz (DE-588)4070085-9 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Rechnernetz (DE-588)4070085-9 s DE-604 Ross, Keith W. 1956- Verfasser (DE-588)113704666 aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032775187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kurose, James F. 1956- Ross, Keith W. 1956- Computer networking a top-down approach Computer networks -- Internet Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4308416-3 |
title | Computer networking a top-down approach |
title_auth | Computer networking a top-down approach |
title_exact_search | Computer networking a top-down approach |
title_exact_search_txtP | Computer networking a top-down approach |
title_full | Computer networking a top-down approach James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai) |
title_fullStr | Computer networking a top-down approach James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai) |
title_full_unstemmed | Computer networking a top-down approach James F. Kurose (University of Massachusetts, Amherst), Keith W. Ross (NYU and NYU Shanghai) |
title_short | Computer networking |
title_sort | computer networking a top down approach |
title_sub | a top-down approach |
topic | Computer networks -- Internet Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Computer networks -- Internet Rechnernetz Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032775187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kurosejamesf computernetworkingatopdownapproach AT rosskeithw computernetworkingatopdownapproach |