000 02713cam a22002894i 4500
999 _c132
_d132
001 12842360
005 20190718114953.0
008 020703s2003 njua f b 001 0beng d
020 _a0130384887
040 _aDLC
_cDLC
_dDLC
_erda
082 0 4 _a004.6
_221
_bT.A.C
100 1 _aTanenbaum, Andrew S.,
_d1944-
_9590
_eauthor.
245 1 0 _aComputer networks /
_cAndrew S. Tanenbaum.
250 _afourth edition.
264 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_c2003
264 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_c[2003]
300 _axx, 891 pages. :
_billustrations . ;
_c25 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references (p. 835-868) and index.
505 _aPreface. 1 Introduction. Uses of Computer Networks. Network Hardware. Network Software. Reference Models. Example Networks. Network Standardization. Metric Units. Outline of the Rest of the Book. Summary. 2 The Physical Layer. The Theoretical Basis For Data Communication. Guided Transmission Media. Wireless Transmission. Communication Satellites. The Public Switched Telephone Network. The Mobile Telephone System. Cable Television. Summary. 3 The Data Link Layer. Data Link Layer Design Issues. Error Detection and Correction. Elementary Data Link Protocols. Sliding Window Protocols. Protocol Verification. Example Data Link Protocols. Summary. 4. The Medium Access Control Sublayer. The Channel Allocation Problem. Multiple Access Protocols. Ethernet. Wireless Lans. Broadband Wireless. Bluetooth. Data Link Layer Switching. Summary. 5. The Network Layer. Network Layer Design Issues. Routing Algorithms. Congestion Control Algorithms. Quality of Service. Internetworking. The Network Layer in the Internet. Summary. 6. The Transport Layer. The Transport Service. Elements of Transport Protocols. A Simple Transport Protocol. The Internet Transport Protocols: UDP. The Internet Transport Protocols: TCP. Performance Issues. Summary. 7. The Application Layer. DNS--he Domain Name System. Electronic Mail. The World Wide Web. Multimedia. Summary. 8. Network Security. Cryptography. Symmetric-Key Algorithms. Public-Key Algorithms. Digital Signatures. Management of Public Keys. Communication Security. Authentication Protocols. E-Mail Security. Web Security. Social Issues. Summary. 9. Reading List and Bibliography. Suggestions For Further Reading. Alphabetical Bibliography. Index.
650 0 _aComputer networks.
906 _a7
_bcbc
_corignew
_d1
_eocip
_f20
_gy-gencatlg
942 _2ddc
_cBK