For coursesin Business Data Communication and Networking. Anintroduction to computer networking grounded in real-world examples In Computer Networks ,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book - theInternet, and wireless networks, including Wireless LANs, broadband…mehr
For coursesin Business Data Communication and Networking. Anintroduction to computer networking grounded in real-world examples In Computer Networks ,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book - theInternet, and wireless networks, including Wireless LANs, broadband wireless,and Bluetooth. The 6th Edition is updated throughout to reflect the mostcurrent technologies, and the chapter on network security is rewritten to focuson modern security principles and actions. Tutorial videos on key networkingtopics and techniques are available to students on the companion website at www.pearsonglobaleditions.com Instructors are supported with a SolutionsManual to end-of-chapter exercises featured in the book , LecturePowerPoint slides, and extracted art and figures featured in thebook.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
1. Introduction 1. Uses of Computer Networks 2. Types of Computer Networks 3. Network Technology, from Local to Global 4. Examples of Networks 5. Network Protocols 6. Reference Models 7. Standardization 8. Policy, Legal, and Social Issues 9. Metric Units 10. Outline of the Rest of the Book 11. Summary 2. The Physical Layer 12. Guided Transmission Media 13. Wireless Transmission 14. Using the Spectrum for Transmission 15. From Waveforms to Bits 16. The Public Switched Telephone Network 17. Cellular Networks 18. Cable Networks 19. Communication Satellites 20. Comparing Different Access Networks 21. Policy at the Physical Layer 22. Summary 3. The Data Link Layer 23. Data Link Layer Design Issues 24. Error Detection and Correction 25. Elementary Data Link Protocols 26. Improving Efficiency 27. Data Link Protocols in Practice 28. Summary 4. The Medium Access ControlSublayer 29. The Channel Allocation Problem 30. Multiple Access Protocols 31. Ethernet 32. Wireless LANs 33. Bluetooth 34. DOCSIS 35. Data Link Layer Switching 36. Summary 5. The Network Layer 37. Network Layer Design Issues 38. Routing Algorithms in a Single Network 39. Traffic Management at the Network Layer 40. Quality of Service and Application QoE 41. Internetworking 42. Software Defined Networking 43. The Network Layer in the Internet 44. Policy at the Network layer 45. Summary 6. The Transport Layer 46. The Transport Service 47. Elements of Transport Protocols 48. Congestion Control 49. The Internet Transport Protocols: UDP 50. The Internet Transport Protocols: TCP, QUIC, BBR 51. Performance Monitoring 52. Delay-Tolerant Networking 53. Summary 7. The Application Layer 54. DNS The Domain Name System 55. Electronic Mail 56. The World Wide Web 57. HTTP/2 58. Streaming Audio and Video 59. Content Delivery Networks and Distributed Cloud Services 60. Summary 8. Security 61. Fundamentals of Network Security 62. The Core Ingredients of an Attack 63. Firewalls and Intrusion Detection Systems 64. Cryptography 65. Symmetric-Key Algorithms 66. Public-Key Algorithms 67. Digital Signatures 68. Management of Public Keys 69. Authentication Protocols 70. Communication Security 71. Email Security 72. Web Security 73. Social Issues 74. Summary 9. List and Bibliography 75. Suggestions for Further Reading 76. Alphabetical Bibliography
1. Introduction 1. Uses of Computer Networks 2. Types of Computer Networks 3. Network Technology, from Local to Global 4. Examples of Networks 5. Network Protocols 6. Reference Models 7. Standardization 8. Policy, Legal, and Social Issues 9. Metric Units 10. Outline of the Rest of the Book 11. Summary 2. The Physical Layer 12. Guided Transmission Media 13. Wireless Transmission 14. Using the Spectrum for Transmission 15. From Waveforms to Bits 16. The Public Switched Telephone Network 17. Cellular Networks 18. Cable Networks 19. Communication Satellites 20. Comparing Different Access Networks 21. Policy at the Physical Layer 22. Summary 3. The Data Link Layer 23. Data Link Layer Design Issues 24. Error Detection and Correction 25. Elementary Data Link Protocols 26. Improving Efficiency 27. Data Link Protocols in Practice 28. Summary 4. The Medium Access ControlSublayer 29. The Channel Allocation Problem 30. Multiple Access Protocols 31. Ethernet 32. Wireless LANs 33. Bluetooth 34. DOCSIS 35. Data Link Layer Switching 36. Summary 5. The Network Layer 37. Network Layer Design Issues 38. Routing Algorithms in a Single Network 39. Traffic Management at the Network Layer 40. Quality of Service and Application QoE 41. Internetworking 42. Software Defined Networking 43. The Network Layer in the Internet 44. Policy at the Network layer 45. Summary 6. The Transport Layer 46. The Transport Service 47. Elements of Transport Protocols 48. Congestion Control 49. The Internet Transport Protocols: UDP 50. The Internet Transport Protocols: TCP, QUIC, BBR 51. Performance Monitoring 52. Delay-Tolerant Networking 53. Summary 7. The Application Layer 54. DNS The Domain Name System 55. Electronic Mail 56. The World Wide Web 57. HTTP/2 58. Streaming Audio and Video 59. Content Delivery Networks and Distributed Cloud Services 60. Summary 8. Security 61. Fundamentals of Network Security 62. The Core Ingredients of an Attack 63. Firewalls and Intrusion Detection Systems 64. Cryptography 65. Symmetric-Key Algorithms 66. Public-Key Algorithms 67. Digital Signatures 68. Management of Public Keys 69. Authentication Protocols 70. Communication Security 71. Email Security 72. Web Security 73. Social Issues 74. Summary 9. List and Bibliography 75. Suggestions for Further Reading 76. Alphabetical Bibliography
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826