Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
117,95 €
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
1. Introduction
• Uses of Computer Networks• Types of Computer Networks
• Network Technology, from Local to Global
• Examples of Networks
• Network Protocols
• Reference Models
• Standardization
• Policy, Legal, and Social Issues
• Metric Units
• Outline of the Rest of the Book
• Summary
2. The Physical Layer
• Guided Transmission Media• Wireless Transmission
• Using the Spectrum for Transmission
• From Waveforms to Bits
• The Public Switched Telephone Network
• Cellular Networks
• Cable Networks
• Communication Satellites
• Comparing Different Access Networks
• Policy at the Physical Layer
• Summary
3. The Data Link Layer
• Data Link Layer Design Issues• Error Detection and Correction
• Elementary Data Link Protocols
• Improving Efficiency
• Data Link Protocols in Practice
• Summary
4. The Medium Access ControlSublayer
• The Channel Allocation Problem• Multiple Access Protocols
• Ethernet
• Wireless LANs
• Bluetooth
• DOCSIS
• Data Link Layer Switching
• Summary
5. The Network Layer
• Network Layer Design Issues• Routing Algorithms in a Single Network
• Traffic Management at the Network Layer
• Quality of Service and Application QoE
• Internetworking
• Software Defined Networking
• The Network Layer in the Internet
• Policy at the Network layer
• Summary
6. The Transport Layer
• The Transport Service• Elements of Transport Protocols
• Congestion Control
• The Internet Transport Protocols: UDP
• The Internet Transport Protocols: TCP, QUIC, BBR
• Performance Monitoring
• Delay-Tolerant Networking
• Summary
7. The Application Layer
• DNS The Domain Name System• Electronic Mail
• The World Wide Web
• HTTP/2
• Streaming Audio and Video
• Content Delivery Networks and Distributed Cloud Services
• Summary
8. Security
• Fundamentals of Network Security• The Core Ingredients of an Attack
• Firewalls and Intrusion Detection Systems
• Cryptography
• Symmetric-Key Algorithms
• Public-Key Algorithms
• Digital Signatures
• Management of Public Keys
• Authentication Protocols
• Communication Security
• Email Security
• Web Security
• Social Issues
• Summary
9. List and Bibliography
• Suggestions for Further Reading• Alphabetical Bibliography
1. Introduction
• Uses of Computer Networks• Types of Computer Networks
• Network Technology, from Local to Global
• Examples of Networks
• Network Protocols
• Reference Models
• Standardization
• Policy, Legal, and Social Issues
• Metric Units
• Outline of the Rest of the Book
• Summary
2. The Physical Layer
• Guided Transmission Media• Wireless Transmission
• Using the Spectrum for Transmission
• From Waveforms to Bits
• The Public Switched Telephone Network
• Cellular Networks
• Cable Networks
• Communication Satellites
• Comparing Different Access Networks
• Policy at the Physical Layer
• Summary
3. The Data Link Layer
• Data Link Layer Design Issues• Error Detection and Correction
• Elementary Data Link Protocols
• Improving Efficiency
• Data Link Protocols in Practice
• Summary
4. The Medium Access ControlSublayer
• The Channel Allocation Problem• Multiple Access Protocols
• Ethernet
• Wireless LANs
• Bluetooth
• DOCSIS
• Data Link Layer Switching
• Summary
5. The Network Layer
• Network Layer Design Issues• Routing Algorithms in a Single Network
• Traffic Management at the Network Layer
• Quality of Service and Application QoE
• Internetworking
• Software Defined Networking
• The Network Layer in the Internet
• Policy at the Network layer
• Summary
6. The Transport Layer
• The Transport Service• Elements of Transport Protocols
• Congestion Control
• The Internet Transport Protocols: UDP
• The Internet Transport Protocols: TCP, QUIC, BBR
• Performance Monitoring
• Delay-Tolerant Networking
• Summary
7. The Application Layer
• DNS The Domain Name System• Electronic Mail
• The World Wide Web
• HTTP/2
• Streaming Audio and Video
• Content Delivery Networks and Distributed Cloud Services
• Summary
8. Security
• Fundamentals of Network Security• The Core Ingredients of an Attack
• Firewalls and Intrusion Detection Systems
• Cryptography
• Symmetric-Key Algorithms
• Public-Key Algorithms
• Digital Signatures
• Management of Public Keys
• Authentication Protocols
• Communication Security
• Email Security
• Web Security
• Social Issues
• Summary
9. List and Bibliography
• Suggestions for Further Reading• Alphabetical Bibliography
Details
| Erscheinungsjahr: | 2021 |
|---|---|
| Fachbereich: | EDV |
| Genre: | Informatik |
| Rubrik: | Naturwissenschaften & Technik |
| Medium: | Taschenbuch |
| Inhalt: | 944 S. |
| ISBN-13: | 9781292374062 |
| ISBN-10: | 1292374063 |
| Sprache: | Englisch |
| Einband: | Kartoniert / Broschiert |
| Autor: | Tanenbaum, Andrew/Tanenbaum, Andrew S/Feamster, Nick et al |
| Auflage: | 6/2021 |
| Hersteller: |
Pearson Verlag
Benelux B.V. Zweigniederlassung Deutschl |
| Verantwortliche Person für die EU: | Pearson Studium im Verlag Pearson Benelux B.V. Zweigniederla, Sankt-Martin-Str. 82, D-81541 München, buchhandel@pearson.com |
| Maße: | 296 x 210 x 48 mm |
| Von/Mit: | Andrew/Tanenbaum, Andrew S/Feamster, Nick et al Tanenbaum |
| Erscheinungsdatum: | 03.03.2021 |
| Gewicht: | 2,426 kg |