Computer Networks [6 ed.] 9780136764052, 1292374063, 9781292374062, 9781292374017

An introduction to computer networking grounded in real-world examples In Computer Networks, Tanenbaum et al. explain h

3,387 844 34MB

English Pages 946 Year 2021

Report DMCA / Copyright

DOWNLOAD FILE

Computer Networks [6 ed.]
 9780136764052, 1292374063, 9781292374062, 9781292374017

  • Commentary
  • Vector PDF

Table of contents :
1. Introduction

Uses of Computer Networks
Types of Computer Networks
Network Technology, from Local to Global
Examples of Networks
Network Protocols
Reference Models
Standardization
Policy, Legal, and Social Issues
Metric Units
Outline of the Rest of the Book
Summary

2. The Physical Layer

Guided Transmission Media
Wireless Transmission
Using the Spectrum for Transmission
From Waveforms to Bits
The Public Switched Telephone Network
Cellular Networks
Cable Networks
Communication Satellites
Comparing Different Access Networks
Policy at the Physical Layer
Summary

3. The Data Link Layer

Data Link Layer Design Issues
Error Detection and Correction
Elementary Data Link Protocols
Improving Efficiency
Data Link Protocols in Practice
Summary

4. The Medium Access Control Sublayer

The Channel Allocation Problem
Multiple Access Protocols
Ethernet
Wireless LANs
Bluetooth
DOCSIS
Data Link Layer Switching
Summary

5. The Network Layer

Network Layer Design Issues
Routing Algorithms in a Single Network
Traffic Management at the Network Layer
Quality of Service and Application QoE
Internetworking
Software Defined Networking
The Network Layer in the Internet
Policy at the Network layer
Summary

6. The Transport Layer

The Transport Service
Elements of Transport Protocols
Congestion Control
The Internet Transport Protocols: UDP
The Internet Transport Protocols: TCP, QUIC, BBR
Performance Monitoring
Delay-Tolerant Networking
Summary

7. The Application Layer

DNS — The Domain Name System
Electronic Mail
The World Wide Web
HTTP/2
Streaming Audio and Video
Content Delivery Networks and Distributed Cloud Services
Summary

8. Security

Fundamentals of Network Security
The Core Ingredients of an Attack
Firewalls and Intrusion Detection Systems
Cryptography
Symmetric-Key Algorithms
Public-Key Algorithms
Digital Signatures
Management of Public Keys
Authentication Protocols
Communication Security
Email Security
Web Security
Social Issues
Summary

9. List and Bibliography

Suggestions for Further Reading
Alphabetical Bibliography

Polecaj historie