Muutke küpsiste eelistusi

Computer Networks: A Top Down Approach [Kõva köide]

  • Formaat: Hardback, 960 pages, kõrgus x laius x paksus: 239x191x43 mm, kaal: 1554 g, 733 Illustrations
  • Ilmumisaeg: 16-Apr-2011
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0073523267
  • ISBN-13: 9780073523262
Teised raamatud teemal:
  • Formaat: Hardback, 960 pages, kõrgus x laius x paksus: 239x191x43 mm, kaal: 1554 g, 733 Illustrations
  • Ilmumisaeg: 16-Apr-2011
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0073523267
  • ISBN-13: 9780073523262
Teised raamatud teemal:
This new networking text follows a top-down approach. The presentation begins with an explanation of the application layer, which makes it easier for students to understand how network devices work, and then, with the students fully engaged, the authors move on to discuss the other layers, ending with the physical layer. With this top-down approach, its thorough treatment of the topic, and a host of pedagogical features, this new networking book offers the market something it hasn't had for many years- a well-crafted, modern text that places the student at the center of the learning experience.

Forouzan's Computer Networks presents a complex topic in an accessible, student-friendly way that makes learning the material not only manageable but fun as well. The appealing visual layout combines with numerous figures and examples to provide multiple routes to understanding. Students are presented with the most up-to-date material currently available and are encouraged to view what they are learning in a real-world context. This approach is both motivating and practical in that students begin to see themselves as the professionals they will soon become.

Preface xvii
Trademarks xxiii
Chapter 1 Introduction
1(32)
1.1 Overview of the Internet
2(7)
1.1.1 Networks
2(2)
1.1.2 Switching
4(2)
1.1.3 The Internet
6(1)
1.1.4 Accessing the Internet
7(1)
1.1.5 Hardware and Software
8(1)
1.2 Protocol Layering
9(13)
1.2.1 Scenarios
9(3)
1.2.2 TCP/IP Protocol Suite
12(8)
1.2.3 The OSI Model
20(2)
1.3 Internet History
22(2)
1.3.1 Early History
22(1)
1.3.2 Birth of the Internet
22(2)
1.3.3 Internet Today
24(1)
1.4 Standards and Administration
24(3)
1.4.1 Internet Standards
24(2)
1.4.2 Internet Administration
26(1)
1.5 End-Chapter Materials
27(2)
1.5.1 Further Reading
27(1)
1.5.2 Key Terms
28(1)
1.5.3 Summary
28(1)
1.6 Practice Set
29(2)
1.6.1 Quizzes
29(1)
1.6.2 Questions
29(1)
1.6.3 Problems
30(1)
1.7 Simulation Experiments
31(2)
1.7.1 Applets
31(1)
1.7.2 Lab Assignments
32(1)
Chapter 2 Application Layer
33(106)
2.1 Introduction
34(4)
2.1.1 Providing Services
35(1)
2.1.2 Application-Layer Paradigms
36(2)
2.2 Client-Server Paradigm
38(6)
2.2.1 Application Programming Interface
39(4)
2.2.2 Using Services of the Transport Layer
43(1)
2.3 Standard Client-Server Applications
44(48)
2.3.1 World Wide Web and HTTP
44(15)
2.3.2 FTP
59(4)
2.3.3 Electronic Mail
63(13)
2.3.4 Telnet
76(2)
2.3.5 Secure Shell (SSH)
78(3)
2.3.6 Domain Name System (DNS)
81(11)
2.4 Peer-to-Peer Paradigm
92(22)
2.4.1 P2P Networks
92(3)
2.4.2 Distributed Hash Table (DHT)
95(2)
2.4.3 Chord
97(7)
2.4.4 Pastry
104(4)
2.4.5 Kademlia
108(4)
2.4.6 A Popular P2P Network: BitTorrent
112(2)
2.5 Socket Interface Programming
114(14)
2.5.1 Socket Interface in C
114(14)
2.6 End-Chapter Materials
128(2)
2.6.1 Further Reading
128(1)
2.6.2 Key Terms
129(1)
2.6.3 Summary
129(1)
2.7 Practice Set
130(6)
2.7.1 Quizzes
130(1)
2.7.2 Questions
130(2)
2.7.3 Problems
132(4)
2.8 Simulation Experiments
136(1)
2.8.1 Applets
136(1)
2.8.2 Lab Assignments
136(1)
2.9 Programming Assignment
137(2)
Chapter 3 Transport Layer
139(102)
3.1 Introduction
140(14)
3.1.1 Transport-Layer Services
141(13)
3.2 Transport-Layer Protocols
154(21)
3.2.1 Simple Protocol
154(1)
3.2.2 Stop-and-Wait Protocol
155(5)
3.2.3 Go-Back-N Protocol (GBN)
160(6)
3.2.4 Selective-Repeat Protocol
166(7)
3.2.5 Bidirectional Protocols: Piggybacking
173(1)
3.2.6 Internet Transport-Layer Protocols
173(2)
3.3 User Datagram Protocol (UDP)
175(6)
3.3.1 User Datagram
175(1)
3.3.2 UDP Services
176(3)
3.3.3 UDP Applications
179(2)
3.4 Transmission Control Protocol (TCP)
181(46)
3.4.1 TCP Services
181(3)
3.4.2 TCP Features
184(1)
3.4.3 Segment
185(3)
3.4.4 A TCP Connection
188(6)
3.4.5 State Transition Diagram
194(4)
3.4.6 Windows in TCP
198(2)
3.4.7 Flow Control
200(5)
3.4.8 Error Control
205(8)
3.4.9 TCP Congestion Control
213(10)
3.4.10 TCP Timers
223(4)
3.4.11 Options
227(1)
3.5 End-Chapter Materials
227(1)
3.5.1 Further Reading
227(1)
3.5.2 Key Terms
227(1)
3.5.3 Summary
228(1)
3.6 Practice Set
228(11)
3.6.1 Quizzes
228(1)
3.6.2 Questions
229(3)
3.6.3 Problems
232(7)
3.7 Simulation Experiments
239(1)
3.7.1 Applets
239(1)
3.7.2 Lab Assignments
239(1)
3.8 Programming Assignment
240(1)
Chapter 4 Network Layer
241(134)
4.1 Introduction
242(19)
4.1.1 Network-Layer Services
243(3)
4.1.2 Packet Switching
246(5)
4.1.3 Network-Layer Performance
251(4)
4.1.4 Network-Layer Congestion
255(3)
4.1.5 Structure of A Router
258(3)
4.2 Network-Layer Protocols
261(38)
4.2.1 IPv4 Datagram Format
262(7)
4.2.2 IPv4 Addresses
269(17)
4.2.3 Forwarding of IP Packets
286(9)
4.2.4 ICMPv4
295(4)
4.3 Unicast Routing
299(34)
4.3.1 General Idea
300(2)
4.3.2 Routing Algorithms
302(11)
4.3.3 Unicast Routing Protocols
313(20)
4.4 Multicast Routing
333(17)
4.4.1 Introduction
333(3)
4.4.2 Multicasting Basics
336(7)
4.4.3 Intradomain Routing Protocols
343(6)
4.4.4 Interdomain Routing Protocols
349(1)
4.5 Next Generation IP
350(11)
4.5.1 Packet Format
351(2)
4.5.2 IPv6 Addressing
353(5)
4.5.3 Transition from IPv4 to IPv6
358(1)
4.5.4 ICMPv6
359(2)
4.6 End-Chapter Materials
361(1)
4.6.1 Further Reading
361(1)
4.6.2 Key Terms
361(1)
4.6.3 Summary
362(1)
4.7 Practice Set
362(11)
4.7.1 Quizzes
362(1)
4.7.2 Questions
363(3)
4.7.3 Problems
366(7)
4.8 Simulation Experiments
373(1)
4.8.1 Applets
373(1)
4.8.2 Lab Assignments
373(1)
4.9 Programming Assignment
374(1)
Chapter 5 Data-Link Layer: Wired Networks
375(104)
5.1 Introduction
376(2)
5.1.1 Nodes and Links
377(1)
5.1.2 Two Types of Links
377(1)
5.1.3 Two Sublayers
378(1)
5.2 Data Link Control (DLC)
378(25)
5.2.1 Framing
378(3)
5.2.2 Flow and Error Control
381(1)
5.2.3 Error Detection and Correction
382(14)
5.2.4 Two DLC Protocols
396(7)
5.3 Multiple Access Protocols
403(16)
5.3.1 Random Access
404(12)
5.3.2 Controlled Access
416(3)
5.3.3 Channelization
419(1)
5.4 Link-Layer Addressing
419(9)
5.5 Wired Lans: Ethernet Protocol
428(14)
5.5.1 IEEE Project 802
428(1)
5.5.2 Standard Ethernet
429(7)
5.5.3 Fast Ethernet (100 Mbps)
436(1)
5.5.4 Gigabit Ethernet
437(1)
5.5.5 10-Gigabit Ethernet
438(1)
5.5.6 Virtual LANs
438(4)
5.6 Other Wired Networks
442(18)
5.6.1 Point-to-Point Networks
443(5)
5.6.2 Sonet
448(7)
5.6.3 Switched Network: ATM
455(5)
5.7 Connecting Devices
460(4)
5.7.1 Repeaters or Hubs
460(1)
5.7.2 Link-Layer Switches
461(2)
5.7.3 Routers
463(1)
5.8 End-Chapter Materials
464(2)
5.8.1 Recommended Reading
464(1)
5.8.2 Key Terms
464(1)
5.8.3 Summary
465(1)
5.9 Practice Set
466(10)
5.9.1 Quizzes
466(1)
5.9.2 Questions
466(2)
5.9.3 Problems
468(8)
5.10 Simulation Experiments
476(1)
5.10.1 Applets
476(1)
5.10.2 Lab Assignments
477(1)
5.11 Programming Assignments
477(2)
Chapter 6 Wireless Networks and Mobile IP
479(68)
6.1 Wireless LANs
480(23)
6.1.1 Introduction
480(3)
6.1.2 IEEE 802.11 Project
483(12)
6.1.3 Bluetooth
495(6)
6.1.4 WiMAX
501(2)
6.2 Other Wireless Networks
503(24)
6.2.1 Channelization
503(7)
6.2.2 Cellular Telephony
510(11)
6.2.3 Satellite Networks
521(6)
6.3 Mobile IP
527(9)
6.3.1 Addressing
527(2)
6.3.2 Agents
529(1)
6.3.3 Three Phases
530(5)
6.3.4 Inefficiency in Mobile IP
535(1)
6.4 End-Chapter Materials
536(2)
6.4.1 Further Reading
536(1)
6.4.2 Key Terms
537(1)
6.4.3 Summary
537(1)
6.5 Practice Set
538(7)
6.5.1 Quizzes
538(1)
6.5.2 Questions
538(2)
6.5.3 Problems
540(5)
6.6 Simulation Experiments
545(1)
6.6.1 Applets
545(1)
6.6.2 Lab Assignments
545(1)
6.7 Programming Assignment
545(2)
Chapter 7 Physical Layer and Transmission Media
547(60)
7.1 Data and Signals
548(15)
7.1.1 Analog and Digital
549(7)
7.1.2 Transmission Impairment
556(2)
7.1.3 Data Rate Limits
558(2)
7.1.4 Performance
560(3)
7.2 Digital Transmission
563(11)
7.2.1 Digital-to-Digital Conversion
563(6)
7.2.2 Analog-to-Digital Conversion
569(5)
7.3 Analog Transmission
574(7)
7.3.1 Digital-to-Analog Conversion
574(5)
7.3.2 Analog-to-Analog Conversion
579(2)
7.4 Bandwidth Utilization
581(10)
7.4.1 Multiplexing
581(6)
7.4.2 Spread Spectrum
587(4)
7.5 Transmission Media
591(7)
7.5.1 Guided Media
591(5)
7.5.2 Unguided Media: Wireless
596(2)
7.6 End-Chapter Materials
598(2)
7.6.1 Recommended Reading
598(1)
7.6.2 Key Terms
598(1)
7.6.3 Summary
599(1)
7.7 Practice Set
600(7)
7.7.1 Quizzes
600(1)
7.7.2 Questions
600(1)
7.7.3 Problems
601(6)
Chapter 8 Multimedia and Quality of Service
607(94)
8.1 Compression
608(15)
8.1.1 Lossless Compression
608(9)
8.1.2 Lossy Compression
617(6)
8.2 Multimedia Data
623(7)
8.2.1 Text
623(1)
8.2.2 Image
623(4)
8.2.3 Video
627(2)
8.2.4 Audio
629(1)
8.3 Multimedia in the Internet
630(11)
8.3.1 Streaming Stored Audio/Video
631(3)
8.3.2 Streaming Live Audio/Video
634(1)
8.3.3 Real-Time Interactive Audio/Video
635(6)
8.4 Real-Time Interactive Protocols
641(33)
8.4.1 Rationale for New Protocols
642(3)
8.4.2 RTP
645(3)
8.4.3 RTCP
648(3)
8.4.4 Session Initialization Protocol (SIP)
651(7)
8.4.5 H.323
658(2)
8.4.6 SCTP
660(14)
8.5 Quality of Service
674(13)
8.5.1 Data-Flow Characteristics
674(1)
8.5.2 Flow Classes
675(1)
8.5.3 Flow Control to Improve QoS
676(6)
8.5.4 Integrated Services (IntServ)
682(4)
8.5.5 Differentiated Services (DiffServ)
686(1)
8.6 End-Chapter Materials
687(2)
8.6.1 Recommended Reading
687(1)
8.6.2 Key Terms
688(1)
8.6.3 Summary
688(1)
8.7 Practice Set
689(11)
8.7.1 Quizzes
689(1)
8.7.2 Questions
689(3)
8.7.3 Problems
692(8)
8.8 Simulation Experiments
700(1)
8.8.1 Applets
700(1)
8.8.2 Lab Assignments
700(1)
8.9 Programming Assignments
700(1)
Chapter 9 Network Management
701(30)
9.1 Introduction
702(4)
9.1.1 Configuration Management
702(2)
9.1.2 Fault Management
704(1)
9.1.3 Performance Management
705(1)
9.1.4 Security Management
705(1)
9.1.5 Accounting Management
705(1)
9.2 SNMP
706(16)
9.2.1 Managers and Agents
706(1)
9.2.2 Management Components
707(2)
9.2.3 An Overview
709(1)
9.2.4 SMI
710(3)
9.2.5 MIB
713(3)
9.2.6 SNMP
716(6)
9.3 ASN.I
722(4)
9.3.1 Language Basics
722(1)
9.3.2 Data Types
723(3)
9.3.3 Encoding
726(1)
9.4 End-Chapter Materials
726(1)
9.4.1 Further Reading
726(1)
9.4.2 Key Terms
726(1)
9.4.3 Summary
726(1)
9.5 Practice Set
727(4)
9.5.1 Quizzes
727(1)
9.5.2 Questions
727(1)
9.5.3 Problems
728(3)
Chapter 10 Network Security
731(74)
10.1 Introduction
732(3)
10.1.1 Security Goals
732(1)
10.1.2 Attacks
732(2)
10.1.3 Services and Techniques
734(1)
10.2 Confidentiality
735(16)
10.2.1 Symmetric-Key Ciphers
735(11)
10.2.2 Asymmetric-Key Ciphers
746(5)
10.3 Other Aspects of Security
751(15)
10.3.1 Message Integrity
751(1)
10.3.2 Message Authentication
752(1)
10.3.3 Digital Signature
753(5)
10.3.4 Entity Authentication
758(3)
10.3.5 Key Management
761(5)
10.4 Internet Security
766(26)
10.4.1 Application-Layer Security
767(9)
10.4.2 Transport-Layer Security
776(6)
10.4.3 Network-Layer Security
782(10)
10.5 Firewalls
792(2)
10.5.1 Packet-Filter Firewall
793(1)
10.5.2 Proxy Firewall
793(1)
10.6 End-Chapter Materials
794(2)
10.6.1 Further Reading
794(1)
10.6.2 Key Terms
794(1)
10.6.3 Summary
795(1)
10.7 Practice Set
796(7)
10.7.1 Quizzes
796(1)
10.7.2 Questions
796(2)
10.7.3 Problems
798(5)
10.8 Simulation Experiments
803(1)
10.8.1 Applets
803(1)
10.8.2 Lab Assignments
803(1)
10.9 Programming Assignments
803(2)
Chapter 11 Socket Programming In Java
805(36)
11.1 Introduction
806(4)
11.1.1 Addresses and Ports
806(3)
11.1.2 Client-Server Paradigm
809(1)
11.2 Programming with UDP
810(13)
11.2.1 Iterative Approach
810(10)
11.2.2 Concurrent Approach
820(3)
11.3 Programming with TCP
823(12)
11.3.1 Iterative Approach
823(9)
11.3.2 Concurrent Approach
832(3)
11.4 End-Chapter Materials
835(1)
11.4.1 Further Reading
835(1)
11.4.2 Key Terms
835(1)
11.4.3 Summary
835(1)
11.5 Practice Set
836(2)
11.5.1 Quizzes
836(1)
11.5.2 Questions
836(2)
11.5.3 Problems
838(1)
11.6 Programming Assignments
838(3)
Appendix A Unicode 841(4)
Appendix B Positional Numbering System 845(8)
Appendix C HTML, CSS, XML, and XSL 853(8)
Appendix D Miscellaneous Information 861(4)
Appendix E 8B/6T Code 865(2)
Glossary 867(34)
References 901(4)
Index 905
Behrouz A. Forouzan is a Professor at DeAnza College where he is involved in the development of Computer Information System courses. In addition he provides system development consulting with several companies. In addition to C and C++ books, Forouzan is the author of several other successful books, including Computer Networks: A Top-Down Approach, TCP/IP Protocol Suite, and Local Area Networks.





Firouz Mosharraf an Engineering Professor and Advisor at Rio Hondo College.