Computer Networks, Global Edition [6 ed.] 1292374063, 9781292374062

For courses in Business Data Communication and Networking. An introduction to computer networking grounded in real-wo

2,961 303 13MB

English Pages 944 [946] Year 2021

Report DMCA / Copyright

DOWNLOAD FILE

Computer Networks, Global Edition [6 ed.]
 1292374063, 9781292374062

  • Commentary
  • True PDF

Table of contents :
1. Introduction

Uses of Computer Networks
Types of Computer Networks
Network Technology, from Local to Global
Examples of Networks
Network Protocols
Reference Models
Standardization
Policy, Legal, and Social Issues
Metric Units
Outline of the Rest of the Book
Summary
2. The Physical Layer
Guided Transmission Media
Wireless Transmission
Using the Spectrum for Transmission
From Waveforms to Bits
The Public Switched Telephone Network
Cellular Networks
Cable Networks
Communication Satellites
Comparing Different Access Networks
Policy at the Physical Layer
Summary
3. The Data Link Layer
Data Link Layer Design Issues
Error Detection and Correction
Elementary Data Link Protocols
Improving Efficiency
Data Link Protocols in Practice
Summary
4. The Medium Access Control Sublayer
The Channel Allocation Problem
Multiple Access Protocols
Ethernet
Wireless LANs
Bluetooth
DOCSIS
Data Link Layer Switching
Summary
5. The Network Layer
Network Layer Design Issues
Routing Algorithms in a Single Network
Traffic Management at the Network Layer
Quality of Service and Application QoE
Internetworking
Software Defined Networking
The Network Layer in the Internet
Policy at the Network layer
Summary
6. The Transport Layer
The Transport Service
Elements of Transport Protocols
Congestion Control
The Internet Transport Protocols: UDP
The Internet Transport Protocols: TCP, QUIC, BBR
Performance Monitoring
Delay-Tolerant Networking
Summary
7. The Application Layer
DNS — The Domain Name System
Electronic Mail
The World Wide Web
HTTP/2
Streaming Audio and Video
Content Delivery Networks and Distributed Cloud Services
Summary
8. Security
Fundamentals of Network Security
The Core Ingredients of an Attack
Firewalls and Intrusion Detection Systems
Cryptography
Symmetric-Key Algorithms
Public-Key Algorithms
Digital Signatures
Management of Public Keys
Authentication Protocols
Communication Security
Email Security
Web Security
Social Issues
Summary
9. List and Bibliography
Suggestions for Further Reading
Alphabetical Bibliography

Polecaj historie