Muutke küpsiste eelistusi

Loose Leaf for Data Communications and Networking with TCP/IP Protocol Suite 6th ed. [köitmata]

  • Formaat: Loose-leaf, 864 pages, kõrgus x laius x paksus: 231x183x25 mm, kaal: 1039 g, Illustrations
  • Ilmumisaeg: 11-Jan-2021
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1260723100
  • ISBN-13: 9781260723106
Teised raamatud teemal:
  • Formaat: Loose-leaf, 864 pages, kõrgus x laius x paksus: 231x183x25 mm, kaal: 1039 g, Illustrations
  • Ilmumisaeg: 11-Jan-2021
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1260723100
  • ISBN-13: 9781260723106
Teised raamatud teemal:
Data Communications and Networking, 5th edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.
Preface xix
Trademark xxv
Chapter 1 Introduction
1(28)
1.1 Data Communications
2(3)
1.1.1 Components
2(1)
1.1.2 Message
3(1)
1.1.3 Data Flow
4(1)
1.2 Networks
5(3)
1.2.1 Network Criteria
5(1)
1.2.2 Physical Structures
5(3)
1.3 Network Types
8(5)
1.3.1 Local Area Network
8(1)
1.3.2 Wide Area Network (WAN)
8(2)
1.3.3 The Internet
10(2)
1.3.4 Accessing the Internet
12(1)
1.4 Protocol Layering
13(4)
1.4.1 Scenarios
13(3)
1.4.2 Principles of Protocol Layering
16(1)
1.4.3 Logical Connections
16(1)
1.5 TCP/IP Protocol Suite
17(4)
1.5.1 Layered Architecture
17(1)
1.5.2 Brief Description of Layers
18(2)
1.5.3 Description of Each Layer
20(1)
1.6 The OSI Model
21(2)
1.6.1 OSI versus TCP/IP
21(1)
1.6.2 Lack of OSI Model's Success
22(1)
1.7 End-Of-Chapter Materials
23(1)
1.7.1 Recommended Reading
23(1)
1.7.2 Key Terms
23(1)
1.7.3 Summary
23(1)
1.8 Practice Set
24(5)
1.8.1 Quizzes
24(1)
1.8.2 Questions
24(2)
1.8.3 Problems
26(3)
Chapter 2 Physical Layer
29(34)
2.1 Signals
31(4)
2.1.1 Analog Signals
31(2)
2.1.2 Digital Signals
33(2)
2.2 Signal Impairment
35(5)
2.2.1 Attenuation and Amplification
35(1)
2.2.2 Distortion
35(1)
2.2.3 Data Rate Limits
36(2)
2.2.4 Performance
38(2)
2.3 Digital Transmission
40(2)
2.3.1 Digital-to-Digital Conversion
40(1)
2.3.2 Analog-to-Digital Conversion
41(1)
2.4 Analog Transmission
42(5)
2.4.1 Digital-to-Analog Conversion
42(3)
2.4.2 Analog-to-Analog Conversion
45(2)
2.5 Multiplexing
47(2)
2.5.1 Frequency-Division Multiplexing
48(1)
2.5.2 Time-Division Multiplexing
48(1)
2.6 Transmission Media
49(6)
2.6.1 Guided Media
50(3)
2.6.2 Unguided Media: Wireless
53(2)
2.7 End-Of-Chapter Materials
55(1)
2.7.1 Recommended Reading
55(1)
2.7.2 Key Terms
55(1)
2.7.3 Summary
55(1)
2.8 Practice Set
56(7)
2.8.1 Quizzes
56(1)
2.8.2 Questions
56(2)
2.8.3 Problems
58(5)
Chapter 3 Data-Link Layer
63(52)
3.1 Introduction
64(2)
3.1.1 Nodes and Links
65(1)
3.1.2 Two Types of Links
65(1)
3.1.3 Two Sublayers
66(1)
3.2 Data-Link Control
66(22)
3.2.1 Framing
66(4)
3.2.2 Error Control
70(10)
3.2.3 Two DLC Protocols
80(8)
3.3 Media Access Protocols
88(16)
3.3.1 Random Access
88(13)
3.3.2 Controlled Access
101(3)
3.4 Link-Layer Addressing
104(3)
3.4.1 Three Types of Addresses
106(1)
3.4.2 Address Resolution Protocol (ARP)
107(1)
3.5 End-Of-Chapter Materials
107(1)
3.5.1 Recommended Reading
107(1)
3.5.2 Key Terms
107(1)
3.5.3 Summary
108(1)
3.6 Practice Set
108(7)
3.6.1 Quizzes
108(1)
3.6.2 Questions
109(1)
3.6.3 Problems
110(5)
Chapter 4 Local Area Networks: Lans
115(34)
4.1 Ethernet
116(10)
4.1.1 Standard Ethernet (10 Mbps)
117(4)
4.1.2 Fast Ethernet (100 Mbps)
121(2)
4.1.3 Gigabit Ethernet (1000 Mbps)
123(3)
4.1.4 10 Gigabit Ethernet
126(1)
4.2 Wifi, IEEE802.11 Project
126(12)
4.2.1 Architecture
127(1)
4.2.2 MAC Sublayer
128(5)
4.2.3 Addressing Mechanism
133(2)
4.2.4 Physical Layer
135(3)
4.3 Bluetooth
138(7)
4.3.1 Architecture
138(2)
4.3.2 Bluetooth Layers
140(5)
4.4 End-Of-Chapter Materials
145(1)
4.4.1 Recommended Reading
145(1)
4.4.2 Key Terms
145(1)
4.4.3 Summary
146(1)
4.5 Practice Set
146(3)
4.5.1 Quizzes
146(1)
4.5.2 Questions
146(1)
4.5.3 Problems
147(2)
Chapter 5 Wide Area Networks: Wans
149(38)
5.1 Telephone Networks
150(9)
5.1.1 Major Components
150(1)
5.1.2 LATAs
151(1)
5.1.3 Signaling
152(3)
5.1.4 Services Provided by Telephone Networks
155(1)
5.1.5 Dial-Up Service
156(2)
5.1.6 Digital Subscriber Line (DSL)
158(1)
5.2 Cable Networks
159(3)
5.2.1 Traditional Cable Networks
160(1)
5.2.2 Hybrid Fiber-Coaxial (HFC) Network
160(1)
5.2.3 Cable TV for Data Transfer
161(1)
5.3 Cellular Telephony
162(13)
5.3.1 Operation
163(2)
5.3.2 First Generation (1G)
165(1)
5.3.3 Second Generation (2G)
166(7)
5.3.4 Third Generation (3G)
173(1)
5.3.5 Fourth Generation (4G)
174(1)
5.4 Satellite Network
175(7)
5.4.1 Operation
175(3)
5.4.2 GEO Satellites
178(1)
5.4.3 MEO Satellites
178(3)
5.4.4 LEO Satellites
181(1)
5.5 End-Of-Chapter Materials
182(2)
5.5.1 Recommended Reading
182(1)
5.5.2 Key Terms
182(1)
5.5.3 Summary
183(1)
5.6 Practice Set
184(3)
5.6.1 Quizzes
184(1)
5.6.2 Questions
184(1)
5.6.3 Problems
185(2)
Chapter 6 Connecting Devices And Virtual Lans
187(16)
6.1 Connecting Devices
188(8)
6.1.1 Hubs
188(1)
6.1.2 Link-Layer Switches
189(6)
6.1.3 Routers
195(1)
6.2 Virtual Lans
196(4)
6.2.1 Membership
198(1)
6.2.2 Configuration
198(1)
6.2.3 Communication among Switches
199(1)
6.2.4 Advantages
199(1)
6.3 End-Of-Chapter Materials
200(1)
6.3.1 Recommended Reading
200(1)
6.3.2 Key Terms
200(1)
6.3.3 Summary
200(1)
6.4 Practice Set
201(2)
6.4.1 Quizzes
201(1)
6.4.2 Questions
201(1)
6.4.3 Problems
201(2)
Chapter 7 Network Layer: Data Transfer
203(82)
7.1 Services
205(1)
7.1.1 Packetizing
205(1)
7.1.2 Routing
205(1)
7.1.3 Error Control
205(1)
7.1.4 Flow Control
205(1)
7.1.5 Congestion Control
206(1)
7.1.6 Quality of Service
206(1)
7.1.7 Security
206(1)
7.2 Packet Switching
206(1)
7.2.1 Datagram Approach: Connectionless Service
207(1)
7.2.2 Virtual-Circuit Approach: Connection-Oriented Service
207(1)
7.3 Performance
207(3)
7.3.1 Delay
208(1)
7.3.2 Throughput
209(1)
7.3.3 Packet Loss
210(1)
7.4 Internet Protocol Version 4
210(46)
7.4.1 IPv4 Addressing
210(9)
7.4.2 Main and Auxiliary Protocols
219(10)
7.4.3 Options
229(2)
7.4.4 ICMPv4
231(6)
7.4.5 Mobile IP
237(10)
7.4.6 Forwarding of IP Packets
247(9)
7.5 Next Generation IP (IPV6)
256(17)
7.5.1 IPv6 Addressing
257(7)
7.5.2 The IPv6 Protocol
264(5)
7.5.3 The ICMPv6 Protocol
269(4)
7.6 Transition From IPV4 TO IPV6
273(2)
7.7 End-Of-Chapter Materials
275(1)
7.7.1 Recommended Reading
275(1)
7.7.2 Key Terms
275(1)
7.7.3 Summary
276(1)
7.8 Practice Set
276(9)
7.8.1 Quizzes
276(1)
7.8.2 Questions
277(2)
7.8.3 Problems
279(6)
Chapter 8 Network Layer: Routing Of Packets
285(56)
8.1 Introduction
286(2)
8.1.1 General Idea
286(1)
8.1.2 Least-Cost Routing
286(2)
8.2 Routing Algorithms
288(13)
8.2.1 Distance-Vector Routing
288(6)
8.2.2 Link-State Routing
294(3)
8.2.3 Path-Vector Routing
297(4)
8.3 Unicast Routing Protocols
301(21)
8.3.1 Internet Structure
301(2)
8.3.2 Routing Information Protocol (RIP)
303(5)
8.3.3 Open Shortest Path First (OSPF)
308(5)
8.3.4 Border Gateway Protocol Version 4(BGP4)
313(9)
8.4 Multicast Routing
322(9)
8.4.1 Unicasting
322(1)
8.4.2 Multicasting
323(1)
8.4.3 Distance Vector Multicast Routing Protocol
324(3)
8.4.4 Multicast Open Shortest Path First
327(1)
8.4.5 Protocol Independent Multicast (PIM)
327(4)
8.5 IGMP
331(2)
8.5.1 Messages
331(1)
8.5.2 Propagation of Membership Information
332(1)
8.5.3 Encapsulation
333(1)
8.6 End-Of-Chapter Materials
333(2)
8.6.1 Recommended Reading
333(1)
8.6.2 Key Terms
333(1)
8.6.3 Summary
334(1)
8.7 Practice Set
335(6)
8.7.1 Quizzes
335(1)
8.7.2 Questions
335(2)
8.7.3 Problems
337(4)
Chapter 9 Transport Layer
341(96)
9.1 Transport-Layer Services
342(14)
9.1.1 Process-to-Process Communication
342(1)
9.1.2 Addressing: Port Numbers
343(2)
9.1.3 Encapsulation and Decapsulation
345(1)
9.1.4 Multiplexing and Demultiplexing
346(1)
9.1.5 Flow Control
346(3)
9.1.6 Error Control
349(1)
9.1.7 Combination of Flow and Error Control
350(2)
9.1.8 Congestion Control
352(1)
9.1.9 Connectionless and Connection-Oriented Protocols
352(4)
9.2 Transport-Layer Protocols
356(2)
9.2.1 Services
356(1)
9.2.2 Port Numbers
357(1)
9.3 User Datagram Protocol (UDP)
358(5)
9.3.1 UDP Services
359(3)
9.3.2 UDP Applications
362(1)
9.4 Transmission Control Protocol
363(49)
9.4.1 TCP Services
364(3)
9.4.2 TCP Features
367(1)
9.4.3 Segment
368(3)
9.4.4 A TCP Connection
371(7)
9.4.5 State Transition Diagram
378(2)
9.4.6 Windows in TCP
380(3)
9.4.7 Flow Control
383(6)
9.4.8 Error Control
389(9)
9.4.9 TCP Congestion Control
398(10)
9.4.10 TCP Timers
408(4)
9.4.11 Options
412(1)
9.5 SCTP
412(15)
9.5.1 SCTP Services
412(2)
9.5.2 SCTP Features
414(2)
9.5.3 Packet Format
416(2)
9.5.4 An SCTP Association
418(3)
9.5.5 Flow Control
421(2)
9.5.6 Error Control
423(4)
9.6 End-Of-Chapter Materials
427(2)
9.6.1 Recommended Reading
427(1)
9.6.2 Key Terms
427(1)
9.6.3 Summary
428(1)
9.7 Practice Set
429(8)
9.7.1 Quizzes
429(1)
9.7.2 Questions
429(3)
9.7.3 Problems
432(5)
Chapter 10 Application Layer
437(106)
10.1 Introduction
438(5)
10.1.1 Providing Services
439(1)
10.1.2 Application-Layer Paradigms
440(3)
10.2 Client/Server Paradigm
443(5)
10.2.1 Application Programming Interface
443(4)
10.2.2 Using Services of the Transport Layer
447(1)
10.3 Standard Applications
448(50)
10.3.1 World Wide Web and HTTP
449(15)
10.3.2 FTP
464(4)
10.3.3 Electronic Mail
468(13)
10.3.4 TELNET
481(3)
10.3.5 Secure Shell (SSH)
484(2)
10.3.6 Domain Name System (DNS)
486(12)
10.4 Peer-To-Peer Paradigm
498(23)
10.4.1 P2P Networks
498(2)
10.4.2 Distributed Hash Table (DHT)
500(3)
10.4.3 Chord
503(7)
10.4.4 Pastry
510(5)
10.4.5 Kademlia
515(3)
10.4.6 A Popular P2P Network: BitTorrent
518(3)
10.5 Socket Interface Programming
521(14)
10.5.1 Data Structure for Socket
521(1)
10.5.2 Header Files
522(1)
10.5.3 Iterative Communication Using UDP
522(6)
10.5.4 Communication Using TCP
528(7)
10.6 End-Of-Chapter Materials
535(2)
10.6.1 Recommended Reading
535(1)
10.6.2 Key Terms
536(1)
10.6.3 Summary
536(1)
10.7 Practice Set
537(6)
10.7.1 Quizzes
537(1)
10.7.2 Questions
537(2)
10.7.3 Problems
539(4)
Chapter 11 Multimedia
543(62)
11.1 Compression
544(16)
11.1.1 Lossless Compression
544(10)
11.1.2 Lossy Compression
554(6)
11.2 Multimedia Data
560(8)
11.2.1 Text
560(1)
11.2.2 Image
560(4)
11.2.3 Video
564(2)
11.2.4 Audio
566(2)
11.3 Multimedia In The Internet
568(9)
11.3.1 Streaming Stored Audio/video
568(3)
11.3.2 Streaming Live Audio/video
571(1)
11.3.3 Real-Time Interactive Audio/video
572(5)
11.4 Real-Time Interactive Protocols
577(20)
11.4.1 Rationale for New Protocols
578(3)
11.4.2 RTP
581(2)
11.4.3 RTCP
583(4)
11.4.4 Session Initialization Protocol (SIP)
587(7)
11.4.5 H.323
594(3)
11.5 End-Of-Chapter Materials
597(1)
11.5.1 Recommended Reading
597(1)
11.5.2 Key Terms
597(1)
11.5.3 Summary
597(1)
11.6 Practice Set
598(7)
11.6.1 Quizzes
598(1)
11.6.2 Questions
598(2)
11.6.3 Problems
600(5)
Chapter 12 Network Management
605(32)
12.1 Introduction
606(4)
12.1.1 Configuration Management
606(2)
12.1.2 Fault Management
608(1)
12.1.3 Performance Management
609(1)
12.1.4 Security Management
609(1)
12.1.5 Accounting Management
610(1)
12.2 SNMP
610(17)
12.2.1 Managers and Agents
611(1)
12.2.2 Management Components
611(2)
12.2.3 An Overview
613(1)
12.2.4 SMI
614(4)
12.2.5 MIB
618(4)
12.2.6 SNMP Operation
622(5)
12.3 ASN.1
627(5)
12.3.1 Language Basics
628(1)
12.3.2 Data Types
629(3)
12.3.3 Encoding
632(1)
12.4 End-Of-Chapter Materials
632(1)
12.4.1 Recommended Reading
632(1)
12.4.2 Key Terms
632(1)
12.4.3 Summary
632(1)
12.5 Practice Set
633(4)
12.5.1 Quizzes
633(1)
12.5.2 Questions
633(1)
12.5.3 Problems
634(3)
Chapter 13 Cryptography And Network Security
637(76)
13.1 Introduction
638(3)
13.1.1 Security Goals
638(1)
13.1.2 Attacks
639(2)
13.1.3 Services and Techniques
641(1)
13.2 confidentiality
641(17)
13.2.1 Symmetric-Key Ciphers
641(12)
13.2.2 Asymmetric-Key Ciphers
653(5)
13.3 Other Aspects Of Security
658(16)
13.3.1 Message Integrity
658(1)
13.3.2 Message Authentication
659(1)
13.3.3 Digital Signature
660(6)
13.3.4 Entity Authentication
666(2)
13.3.5 Key Management
668(6)
13.4 Network-Layer Security
674(11)
13.4.1 Two Modes
675(1)
13.4.2 Two Security Protocols
676(4)
13.4.3 Services Provided by IPSec
680(1)
13.4.4 Security Association
680(4)
13.4.5 Internet Key Exchange (IKE)
684(1)
13.4.6 Virtual Private Network (VPN)
684(1)
13.5 Transport-Layer Security
685(6)
13.5.1 SSL Architecture
686(3)
13.5.2 Four Protocols
689(2)
13.6 Application-Layer Security
691(11)
13.6.1 E-mail Security
691(2)
13.6.2 Pretty Good Privacy (PGP)
693(5)
13.6.3 S/MIME
698(4)
13.7 Firewalls
702(3)
13.7.1 Packet-Filter Firewall
703(1)
13.7.2 Proxy Firewall
704(1)
13.8 End-Of-Chapter Materials
705(2)
13.8.1 Recommended Reading
705(1)
13.8.2 Key Terms
705(1)
13.8.3 Summary
706(1)
13.9 Practice Set
707(6)
13.9.1 Quizzes
707(1)
13.9.2 Questions
707(2)
13.9.3 Problems
709(4)
Appendices
Appendix A Unicode
713(6)
Appendix B Positional Numbering System
719(8)
Appendix C HTML, CSS, XML, andXSL
727(10)
Appendix D A Touch of Probability
737(6)
Appendix E Checksum
743(8)
Appendix F Acronyms
751(10)
Glossary 761(44)
References 805(6)
Index 811