Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Beschreibung

1. Introduction

• Uses of Computer Networks
• Types of Computer Networks
• Network Technology, from Local to Global
• Examples of Networks
• Network Protocols
• Reference Models
• Standardization
• Policy, Legal, and Social Issues
• Metric Units
• Outline of the Rest of the Book
• Summary

2. The Physical Layer

• Guided Transmission Media
• Wireless Transmission
• Using the Spectrum for Transmission
• From Waveforms to Bits
• The Public Switched Telephone Network
• Cellular Networks
• Cable Networks
• Communication Satellites
• Comparing Different Access Networks
• Policy at the Physical Layer
• Summary

3. The Data Link Layer

• Data Link Layer Design Issues
• Error Detection and Correction
• Elementary Data Link Protocols
• Improving Efficiency
• Data Link Protocols in Practice
• Summary

4. The Medium Access ControlSublayer

• The Channel Allocation Problem
• Multiple Access Protocols
• Ethernet
• Wireless LANs
• Bluetooth
• DOCSIS
• Data Link Layer Switching
• Summary

5. The Network Layer

• Network Layer Design Issues
• Routing Algorithms in a Single Network
• Traffic Management at the Network Layer
• Quality of Service and Application QoE
• Internetworking
• Software Defined Networking
• The Network Layer in the Internet
• Policy at the Network layer
• Summary

6. The Transport Layer

• The Transport Service
• Elements of Transport Protocols
• Congestion Control
• The Internet Transport Protocols: UDP
• The Internet Transport Protocols: TCP, QUIC, BBR
• Performance Monitoring
• Delay-Tolerant Networking
• Summary

7. The Application Layer

• DNS The Domain Name System
• Electronic Mail
• The World Wide Web
• HTTP/2
• Streaming Audio and Video
• Content Delivery Networks and Distributed Cloud Services
• Summary

8. Security

• Fundamentals of Network Security
• The Core Ingredients of an Attack
• Firewalls and Intrusion Detection Systems
• Cryptography
• Symmetric-Key Algorithms
• Public-Key Algorithms
• Digital Signatures
• Management of Public Keys
• Authentication Protocols
• Communication Security
• Email Security
• Web Security
• Social Issues
• Summary

9. List and Bibliography

• Suggestions for Further Reading
• Alphabetical Bibliography

1. Introduction

• Uses of Computer Networks
• Types of Computer Networks
• Network Technology, from Local to Global
• Examples of Networks
• Network Protocols
• Reference Models
• Standardization
• Policy, Legal, and Social Issues
• Metric Units
• Outline of the Rest of the Book
• Summary

2. The Physical Layer

• Guided Transmission Media
• Wireless Transmission
• Using the Spectrum for Transmission
• From Waveforms to Bits
• The Public Switched Telephone Network
• Cellular Networks
• Cable Networks
• Communication Satellites
• Comparing Different Access Networks
• Policy at the Physical Layer
• Summary

3. The Data Link Layer

• Data Link Layer Design Issues
• Error Detection and Correction
• Elementary Data Link Protocols
• Improving Efficiency
• Data Link Protocols in Practice
• Summary

4. The Medium Access ControlSublayer

• The Channel Allocation Problem
• Multiple Access Protocols
• Ethernet
• Wireless LANs
• Bluetooth
• DOCSIS
• Data Link Layer Switching
• Summary

5. The Network Layer

• Network Layer Design Issues
• Routing Algorithms in a Single Network
• Traffic Management at the Network Layer
• Quality of Service and Application QoE
• Internetworking
• Software Defined Networking
• The Network Layer in the Internet
• Policy at the Network layer
• Summary

6. The Transport Layer

• The Transport Service
• Elements of Transport Protocols
• Congestion Control
• The Internet Transport Protocols: UDP
• The Internet Transport Protocols: TCP, QUIC, BBR
• Performance Monitoring
• Delay-Tolerant Networking
• Summary

7. The Application Layer

• DNS The Domain Name System
• Electronic Mail
• The World Wide Web
• HTTP/2
• Streaming Audio and Video
• Content Delivery Networks and Distributed Cloud Services
• Summary

8. Security

• Fundamentals of Network Security
• The Core Ingredients of an Attack
• Firewalls and Intrusion Detection Systems
• Cryptography
• Symmetric-Key Algorithms
• Public-Key Algorithms
• Digital Signatures
• Management of Public Keys
• Authentication Protocols
• Communication Security
• Email Security
• Web Security
• Social Issues
• Summary

9. List and Bibliography

• Suggestions for Further Reading
• Alphabetical Bibliography
Details
Erscheinungsjahr: 2021
Fachbereich: EDV
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 944 S.
ISBN-13: 9781292374062
ISBN-10: 1292374063
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Tanenbaum, Andrew/Tanenbaum, Andrew S/Feamster, Nick et al
Auflage: 6/2021
Hersteller: Pearson Verlag
Benelux B.V. Zweigniederlassung Deutschl
Verantwortliche Person für die EU: Pearson Studium im Verlag Pearson Benelux B.V. Zweigniederla, Sankt-Martin-Str. 82, D-81541 München, buchhandel@pearson.com
Maße: 296 x 210 x 48 mm
Von/Mit: Andrew/Tanenbaum, Andrew S/Feamster, Nick et al Tanenbaum
Erscheinungsdatum: 03.03.2021
Gewicht: 2,426 kg
Artikel-ID: 120381113

Ähnliche Produkte