Marktplatzangebote
Ein Angebot für € 87,88 €
  • Gebundenes Buch

Matthews helps readers make the connection between the concepts of network analysis and real-world applications. Focusing on protocols, the paperback manual offers a flexible presentation that allows it to be used with bottom-up and top-down approaches. Readers will find the inclusion of cross-layer topics, such as security, multimedia, and management. And they'll gain a better understanding of the material through numerous examples, illustrations, and background information that are tied to the relevant concepts being discussed.
Hands-on networking experience, without the lab! The best way
…mehr

Produktbeschreibung
Matthews helps readers make the connection between the concepts of network analysis and real-world applications. Focusing on protocols, the paperback manual offers a flexible presentation that allows it to be used with bottom-up and top-down approaches. Readers will find the inclusion of cross-layer topics, such as security, multimedia, and management. And they'll gain a better understanding of the material through numerous examples, illustrations, and background information that are tied to the relevant concepts being discussed.
Hands-on networking experience, without the lab!
The best way to learn about network protocols is to see them in action. But that doesn t mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network.
Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and follow the text to perform the exercises, gaining a thorough understanding of the material by seeing it in action.
Features
Practicality: Readers are able to learn by doing, without having to use actual networks. Instructors can add an active learning component to their course without the overhead of collecting the materials.
Flexibility: This approach has been used successfully with students at the graduate and undergraduate levels. Appropriate for courses regardless of whether the instructor uses a bottom-up or a top-down approach.
Completeness: The exercises take the reader from the basics of examining quiet and busy networks through application, transport, network, and link layers to the crucial issues of network security.