
Computer Networking : A Top-Down Approach Featuring the Internet
by Kurose, James F.; Ross, Keith W.Rent Textbook
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Computer Networks and the Internet | p. 1 |
What Is the Internet? | p. 2 |
The Network Edge | p. 9 |
The Network Core | p. 14 |
Access Networks and Physical Media | p. 24 |
ISPs and Internet Backbones | p. 34 |
Delay and Loss in Packet-Switched Networks | p. 37 |
Protocol Layers and Their Service Models | p. 44 |
History of Computer Networking and the Internet | p. 52 |
Summary | p. 59 |
Interview: Leonard Kleinrock | p. 71 |
Application Layer | p. 73 |
Principles of Network Applications | p. 74 |
The Web and HTTP | p. 87 |
File Transfer: FTP | p. 106 |
Electronic Mail in the Internet | p. 109 |
DNS--The Internet's Directory Service | p. 123 |
P2P File Sharing | p. 136 |
Socket Programming with TCP | p. 146 |
Socket Programming with UDP | p. 156 |
Building a Simple Web Server | p. 164 |
Summary | p. 169 |
Interview: Tim Berners-Lee | p. 181 |
Transport Layer | p. 183 |
Introduction and Transport-Layer Services | p. 184 |
Multiplexing and Demultiplexing | p. 189 |
Connectionless Transport: UDP | p. 196 |
Principles of Reliable Data Transfer | p. 201 |
Connection-Oriented Transport: TCP | p. 228 |
Principles of Congestion Control | p. 254 |
TCP Congestion Control | p. 264 |
Summary | p. 284 |
Interview: Sally Floyd | p. 297 |
The Network Layer | p. 299 |
Introduction | p. 300 |
Virtual Circuit and Datagram Networks | p. 307 |
What's Inside a Router? | p. 314 |
The Internet Protocol (IP): Forwarding and Addressing in the Internet | p. 323 |
Routing Algorithms | p. 351 |
Routing in the Internet | p. 370 |
Broadcast and Multicast Routing | p. 384 |
Summary | p. 399 |
Interview: Vinton G. Cerf | p. 414 |
The Link Layer and Local Area Networks | p. 417 |
Link Layer: Introduction and Services | p. 419 |
Error-Detection and -Correction Techniques | p. 423 |
Multiple Access Protocols | p. 430 |
Link-Layer Addressing | p. 445 |
Ethernet | p. 455 |
Interconnections: Hubs and Switches | p. 465 |
PPP: The Point-to-Point Protocol | p. 477 |
Link Virtualization: A Network as a Link Layer | p. 482 |
Summary | p. 491 |
Interview: Simon S. Lam | p. 500 |
Wireless and Mobile Networks | p. 503 |
Introduction | p. 504 |
Wireless Links and Network Characteristics | p. 508 |
Wi-Fi: 802.11 Wireless LANs | p. 513 |
Cellular Internet Access | p. 529 |
Mobility Management: Principles | p. 536 |
Mobile IP | p. 546 |
Managing Mobility in Cellular Networks | p. 551 |
Wireless and Mobility: Impact on Higher-layer Protocols | p. 556 |
Summary | p. 559 |
Interview: Charlie Perkins | p. 563 |
Multimedia Networking | p. 565 |
Multimedia Networking Applications | p. 566 |
Streaming Stored Audio and Video | p. 574 |
Making the Best of the Best-Effort Service: An Internet Phone Example | p. 584 |
Protocols for Real-Time Interactive Applications | p. 594 |
Distributing Multimedia: Content Distribution Networks | p. 610 |
Beyond Best Effort | p. 614 |
Scheduling and Policing Mechanisms | p. 620 |
Integrated Services and Differentiated Services | p. 628 |
RSVP | p. 636 |
Summary | p. 643 |
Interview: Henning Schulzrinne | p. 651 |
Security in Computer Networks | p. 653 |
What Is Network Security? | p. 654 |
Principles of Cryptography | p. 657 |
Authentication | p. 670 |
Integrity | p. 678 |
Key Distribution and Certification | p. 684 |
Access Control: Firewalls | p. 691 |
Attacks and Countermeasures | p. 697 |
Security in Many Layers: Case Studies | p. 702 |
Summary | p. 721 |
Interview: Steven M. Bellovin | p. 726 |
Network Management | p. 729 |
What Is Network Management? | p. 730 |
The Infrastructure for Network Management | p. 734 |
The Internet-Standard Management Framework | p. 738 |
ASN.1 | p. 753 |
Conclusion | p. 757 |
Interview: Jeff Case | p. 761 |
References | p. 763 |
Index | p. 797 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.