Computer Networks 4th Ed Andrew S. Tanenbaum [Electronic resources]

Andrew s. tanenbaum

نسخه متنی -صفحه : 81/ 2
نمايش فراداده

Sitemap

Main Page

Table of content

Copyright

Other bestselling titles by Andrew S. Tanenbaum

Preface

About the Author

Chapter 1. Introduction

1.1 Uses of Computer Networks

1.2 Network Hardware

1.3 Network Software

1.4 Reference Models

1.5 Example Networks

1.6 Network Standardization

1.7 Metric Units

1.8 Outline of the Rest of the Book

1.9 Summary

Chapter 2. The Physical Layer

2.1 The Theoretical Basis for Data Communication

2.2 Guided Transmission Media

2.3 Wireless Transmission

2.4 Communication Satellites

2.5 The Public Switched Telephone Network

2.6 The Mobile Telephone System

2.7 Cable Television

2.8 Summary

Chapter 3. The Data Link Layer

3.1 Data Link Layer Design Issues

3.2 Error Detection and Correction

3.3 Elementary Data Link Protocols

3.4 Sliding Window Protocols

3.5 Protocol Verification

3.6 Example Data Link Protocols

3.7 Summary

Chapter 4. The Medium Access Control Sublayer

4.1 The Channel Allocation Problem

4.2 Multiple Access Protocols

4.3 Ethernet

4.4 Wireless LANs

4.5 Broadband Wireless

4.6 Bluetooth

4.7 Data Link Layer Switching

4.8 Summary

Chapter 5. The Network Layer

5.1 Network Layer Design Issues

5.2 Routing Algorithms

5.3 Congestion Control Algorithms

5.4 Quality of Service

5.5 Internetworking

5.6 The Network Layer in the Internet

5.7 Summary

Chapter 6. The Transport Layer

6.1 The Transport Service

6.2 Elements of Transport Protocols

6.3 A Simple Transport Protocol

6.4 The Internet Transport Protocols: UDP

6.5 The Internet Transport Protocols: TCP

6.6 Performance Issues

6.7 Summary

Chapter 7. The Application Layer

7.1 DNSThe Domain Name System

7.2 Electronic Mail

7.3 The World Wide Web

7.4 Multimedia

7.5 Summary

Chapter 8. Network Security

8.1 Cryptography

8.2 Symmetric-Key Algorithms

8.3 Public-Key Algorithms

8.4 Digital Signatures

8.5 Management of Public Keys

8.6 Communication Security

8.7 Authentication Protocols

8.8 E-Mail Security

8.9 Web Security

8.10 Social Issues

8.11 Summary

Chapter 9. Reading List and Bibliography

9.1 Suggestions for Further Reading

9.1.1 Introduction and General Works

9.2 Alphabetical Bibliography