American English

Computer Networks, Global Edition ,6th edition::9781292374017R180

Published by Pearson (January 22, 2021) © 2021

Andrew Tanenbaum | Nick Feamster | David Wetherall
    VitalSource eTextbook (6 months access)
    €32,99
    Adding to cart… The item has been added
    ISBN-13: 9781292374017R180

    Computer Networks, Global Edition ,6th edition

    Language: American English

    For coursesin Business Data Communication and Networking.

    Anintroduction to computer networking grounded in real-world examples

    In Computer Networks,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book – theInternet, and wireless networks, including Wireless LANs, broadband wireless,and Bluetooth. The 6th Edition is updated throughout to reflect the mostcurrent technologies, and the chapter on network security is rewritten to focuson modern security principles and actions.

    Tutorial videos on key networkingtopics and techniques are available to students on the companion website at www.pearsonglobaleditions.com

    Instructors are supported with a SolutionsManual to end-of-chapter exercises featured in the book, LecturePowerPoint slides, and extracted art and figures featured in thebook.

    1. Introduction

      1. Uses of Computer Networks
      2. Types of Computer Networks
      3. Network Technology, from Local to Global
      4. Examples of Networks
      5. Network Protocols
      6. Reference Models
      7. Standardization
      8. Policy, Legal, and Social Issues
      9. Metric Units
      10. Outline of the Rest of the Book
      11. Summary

    2. The Physical Layer

      1. Guided Transmission Media
      2. Wireless Transmission
      3. Using the Spectrum for Transmission
      4. From Waveforms to Bits
      5. The Public Switched Telephone Network
      6. Cellular Networks
      7. Cable Networks
      8. Communication Satellites
      9. Comparing Different Access Networks
      10. Policy at the Physical Layer
      11. Summary

    3. The Data Link Layer

      1. Data Link Layer Design Issues
      2. Error Detection and Correction
      3. Elementary Data Link Protocols
      4. Improving Efficiency
      5. Data Link Protocols in Practice
      6. Summary

    4. The Medium Access ControlSublayer

      1. The Channel Allocation Problem
      2. Multiple Access Protocols
      3. Ethernet
      4. Wireless LANs
      5. Bluetooth
      6. DOCSIS
      7. Data Link Layer Switching
      8. Summary

    5. The Network Layer

      1. Network Layer Design Issues
      2. Routing Algorithms in a Single Network
      3. Traffic Management at the Network Layer
      4. Quality of Service and Application QoE
      5. Internetworking
      6. Software Defined Networking
      7. The Network Layer in the Internet
      8. Policy at the Network layer
      9. Summary

    6. The Transport Layer

      1. The Transport Service
      2. Elements of Transport Protocols
      3. Congestion Control
      4. The Internet Transport Protocols: UDP
      5. The Internet Transport Protocols: TCP, QUIC, BBR
      6. Performance Monitoring
      7. Delay-Tolerant Networking
      8. Summary

    7. The Application Layer

      1. DNS — The Domain Name System
      2. Electronic Mail
      3. The World Wide Web
      4. HTTP/2
      5. Streaming Audio and Video
      6. Content Delivery Networks and Distributed Cloud Services
      7. Summary

    8. Security

      1. Fundamentals of Network Security
      2. The Core Ingredients of an Attack
      3. Firewalls and Intrusion Detection Systems
      4. Cryptography
      5. Symmetric-Key Algorithms
      6. Public-Key Algorithms
      7. Digital Signatures
      8. Management of Public Keys
      9. Authentication Protocols
      10. Communication Security
      11. Email Security
      12. Web Security
      13. Social Issues
      14. Summary

    9. List and Bibliography

      1. Suggestions for Further Reading
      2. Alphabetical Bibliography