1. Secure link middleware [2008]
- Luu, Brian B.
- Adelphi, MD : Army Research Laboratory, [2008]
- Description
- Book — iv, 8 pages : digital, PDF file.
- Porche, Isaac, 1968-
- Santa Monica, CA : RAND, 2012.
- Description
- Book — xxiii, 78 pages : illustrations ; 28 cm.
- Summary
-
Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
VB212 .P67 2012 | Available |
- United States. Government Accountability Office, author, issuing body.
- [Washington, D.C.] : United States Government Accountability Office, 2013.
- Description
- Book — 1 online resource (ii, 30 pages) : color illustrations
- Singapore : Springer ; Beijing : Posts & Telecom Press, [2023]
- Description
- Book — 1 online resource (xi, 373 pages) : color illustrations
- Summary
-
- Chapter 1. General Operation Safety of Network System.-
- Chapter 2. Cabling Engineering.-
- Chapter 3. Hardware Installation in Network Systems.-
- Chapter 4. Basic Knowledge of Network Systems.-
- Chapter 5. Basic Operation of Network Systems.-
- Chapter 6. Basic Operation and Maintenance of Network System.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Singapore : Springer ; Beijing : Posts & Telecom Press, [2023]
- Description
- Book — 1 online resource (xix, 558 pages) : illustrations
- Summary
-
- Chapter 1. Network Fundamentals.-
- Chapter 2. TCP/IP.-
- Chapter 3. VRP Fundamentals.-
- Chapter 4. IP Addresses and Subnetting.-
- Chapter 5. IP Routing Fundamentals.-
- Chapter 6. Dynamic Routing.-
- Chapter 7. Ethernet Switching Technologies.-
- Chapter 8. Advanced Ethernet Switching Technologies.-
- Chapter 9. ACLs and AAA.-
- Chapter 10. Network Address Translation Technologies.-
- Chapter 11. DHCP.-
- Chapter 12. WLAN technologies.-
- Chapter 13. IPv6.-
- Chapter 14. WAN Fundamentals.-
- Chapter 15. Typical Networking Architectures for Campus Networks and Case Practice.-
- Chapter 16. Network Management, Operation and Maintenance.-
- Chapter 17. SDN and NFV.-
- Chapter 18. Network Programming and Automation.-.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Yang, Song, author.
- Singapore : Springer, [2023]
- Description
- Book — 1 online resource (xii, 135 pages) : illustrations
- Summary
-
- 1.
- An Introduction to NFV1.1 NFV Framework and Working Principle
- 1.2 Benefits of NFV
- 1.3 NFV Market Drivers
- 1.4 Book Structure
- 2.
- Resource Allocation Problems Formulation and Analysis in NFV
- 2.1 Generalized Resource Allocation Problems Definition
- 2.2 Examples
- 2.3 Problem Goals
- 2.4 Problem Formulation and Analysis
- 2.5 Mainly Adopted Approaches
- 3.
- Delay-Aware and Availability-Aware VNF placement and routing
- 3.1 Related Work
- 3.2 Delay Calculation for a flow in a service function chaining
- 3.3VNF Placement Avaliability Calculation
- 3.4 Exact formulation and Heuristic algorithm
- 3.5 Simulation Results
- 3.6 Conclusion
- 4.
- VNF placement and routing in edge clouds
- 4.1 Related Work
- 4.2 Network Delay Model
- 4.3 Approximation Algorithm
- 4.4 Simulations
- 4.5 Conclusion
- 5.
- Traffic Routing in Stochastic NFV Networks
- 5.1 Related Work
- 5.2 Stochastic Link Weight
- 5.3 Multi-Constrained Traffic Routing Heuristic
- 5.4 Simulations
- 5.5 Conclusion
- 6.
- Online Virtual Network Function Control Across Geo-Distributed Datacenters
- 6.1 Related Work
- 6.2 System Model and Problem Formulation
- 6.3 Online SFC Control Framework
- 6.4 Simulations
- 6.5 Conclusion
- 7.
- Deep Reinforcement Learning for NFV
- 7.1 Model and Problem Formulation
- 7.2 Deep Reinforcement Learning-based Algorithm
- 7.3 Simulations
- 7.4 Conclusion
- 8.
- Future Work and Summarization
- 8.1 Summarization of the book
- 8.2 Future Work.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
7. Fundamentals of computer networks [2022]
- Sadiku, Matthew N. O., author.
- Cham : Humana Press, [2022]
- Description
- Book — 1 online resource (xviii, 192 pages) : illustrations (chiefly color)
- Summary
-
- Introduction.- Digital Communications.- Network Models.- Local Area Networks.- The Internet.- Intranets and Extranets.- Virtual Private Networks.- Digital Subscriber Line.- Optical Networks.- Wireless Networks.- Network Security.- Emerging Technologies.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
8. Driving networked service productivity [2020]
- Daiberl, Christofer F.
- Wiesbaden : Springer Gabler, 2020.
- Description
- Book — 1 online resource (276 pages)
- Summary
-
- The concepts of networked service delivery and networked service productivity.- Approaches for improving productivity from a network perspective.- The networked service productivity improvement technique.- Design principles for improving networked service productivity. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
9. Networking fundamentals [2020]
- Panek, Crystal, author.
- Hoboken. NJ : Sybex, a Wiley Brand, [2020]
- Description
- Book — 1 online resource
- Summary
-
- Understanding Local Area Networking
- Defining Networks with the OSI Model
- Understanding Wired and Wireless Networks
- Understanding Internet Protocol
- Implementing TCP/IP in the Command Line
- Working with Networking Services
- Understanding Wide Area Networks
- Defining Network Infrastructures and Network Security
- Comprehensive Online Learning Environment.
10. Computer networks : a systems approach [2012]
- Peterson, Larry L.
- 5th ed. - Amsterdam ; Boston : Elsevier/Morgan Kaufmann, c2012.
- Description
- Book — xxxi, 884 p. : ill. ; 25 cm.
- Summary
-
Computer Networks: A Systems Approach, Fifth Edition, discusses the key principles of computer networking. It focuses on the underlying concepts and technologies that make the Internet work. Topics covered include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as network practitioners seeking to understand the workings of network protocols and the big picture of networking. *Completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, security, and applications. *Increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. *Free downloadable network simulation software and lab experiments manual available.
(source: Nielsen Book Data)
Engineering Library (Terman)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .P479 2012 | Unknown |
11. Computer networks [2011]
- Tanenbaum, Andrew S., 1944-
- 5th ed. - Boston : Prentice Hall, c2011.
- Description
- Book — xxii, 933 p. : ill., maps ; 24 cm.
- Summary
-
Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book--the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.
(source: Nielsen Book Data)
Engineering Library (Terman)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .T36 2011 | Unknown |
12. Computer networks [2007]
- Tanenbaum, Andrew S., 1944-
- 4th ed. - New Delhi : Prentice-Hall of India, 2007.
- Description
- Book — xx, 891 p. : ill. ; 24 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .T36 2007 | Available |
13. Computer networks : a systems approach [2007]
- Peterson, Larry L.
- 4th ed. - Amsterdam ; Boston : Morgan Kaufmann, c2007.
- Description
- Book — xxvii, 806 p. : ill. ; 25 cm.
- Summary
-
- Chapter 1. Foundation
- Chapter 2 Direct Link Networks
- Chapter 3. Packet Switching
- Chapter 4. Internetworking
- Chapter 5. End-to-End Protocols
- Chapter 6. Congestion Control & Resource Allocation
- Chapter 7. End-to-end Data
- Chapter 8. Security
- Chapter 9. Applications.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
"Computer Networks, 4E" is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems.The new edition makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. It is completely updated with new sidebars discussing successes/failures of previously deployed networks. It provides thorough companion website with downloadable OpNet network simulation software and lab experiments manual. It includes expanded coverage of topics of utmost importance to today's networking professionals, e.g., security, wireless, multimedia applications.
(source: Nielsen Book Data)
Engineering Library (Terman)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .P479 2007 | Unknown |
- Beale, Jay.
- 2nd ed. - Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2007.
- Description
- Book — 1 v.
- Summary
-
- 1. Vulnerability Assessment
- 2. Introducing Nessus
- 3. Installing Nessus
- 4. Running Your First Scan
- 5. Interpreting Results
- 6. Vulnerability Types
- 7. False Positives
- 8. Under the Hood
- 9. The Nessus Knowledge Base
- 10. Enterprise Scanning
- 11. NASL
- 12. The Nessus User Community
- 13. Compliance Monitoring with Nessus 3.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
15. Network warrior [2007]
- Donahue, Gary A.
- 1st ed. - Beijing ; Sebastopol, Calif. : O'Reilly, 2007.
- Description
- Book — xx, 576 p. : ill. ; 24 cm.
- Summary
-
Written by networking veteran with 20 years of experience, "Network Warrior" provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren't on the exam, but they're exactly what you need to do your job well. "Network Warrior" takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author's own experience as well as those he worked for and with, "Network Warrior" is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks - the realm that Cisco Systems now dominates. The book covers: the type of networks now in use, from LANs, WANs and MANs to CANs; the OSI Model and the layers involved in sending data; hubs, repeaters, switches, and trunks in practice; auto negotiation and why it 's a common problem in network slowdowns; route maps, routing protocols, and switching algorithms in Cisco routers; the resilient Ethernet - how to make things truly redundant; Cisco 6500 multi-layer switches and the Catalyst 3750 switch; Telecom nomenclature - why it 's different from the data world; T1 and DS3; firewall theory, designing access lists, authentication in Cisco devices; server load balancing technology; content switch module in action; designing QOS and what QOS does not do; and, IP design and subnetting made easy. The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. "Network Warrior will help network administrators and engineers win the complex battles they face every day.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .D66 2007 | Available |
16. Ad hoc networks : technologies and protocols [2005]
- New York : Springer Science+Business Media, c2005.
- Description
- Book — xxiii, 270 p. : ill. ; 25 cm.
- Summary
-
- Ad Hoc Networks.- Collision Avoidance Protocols.- Routing in Mobile Ad Hoc Networks.- Multicasting in Ad Hoc Networks.- Transport Layer Protocols in Ad Hoc Networks.- Energy Conservation.- Use of Smart Antennas in Ad Hoc Networks.- QoS Issues in Ad Hoc Networks.- Security in Mobile Ad Hoc Networks.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .A29 2005 | Available |
- Marbukh, V.
- [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2005]
- Description
- Book — 1 online resource (13 pages) : illustrations.
18. Complex networks [2004]
- Berlin : Springer, 2004.
- Description
- Book — xvii, 520 p. : ill. ; 25 cm.
- Summary
-
- Network Structure.- Network Dynamics.- Information Networks and Social Networks.- Biological Networks.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .C657 2004 | Available |
19. Computer networks [2003]
- Tanenbaum, Andrew S., 1944-
- 4th ed. - Upper Saddle River, NJ : Prentice Hall, c2003.
- Description
- Book — xx, 891 p. : ill. ; 25 cm.
- Summary
-
- Preface. 1 Introduction. Uses of Computer Networks. Network Hardware. Network Software. Reference Models. Example Networks. Network Standardization. Metric Units. Outline of the Rest of the Book. Summary. 2 The Physical Layer. The Theoretical Basis For Data Communication. Guided Transmission Media. Wireless Transmission. Communication Satellites. The Public Switched Telephone Network. The Mobile Telephone System. Cable Television. Summary. 3 The Data Link Layer. Data Link Layer Design Issues. Error Detection and Correction. Elementary Data Link Protocols. Sliding Window Protocols. Protocol Verification. Example Data Link Protocols. Summary.
- 4. The Medium Access Control Sublayer. The Channel Allocation Problem. Multiple Access Protocols. Ethernet. Wireless Lans. Broadband Wireless. Bluetooth. Data Link Layer Switching. Summary.
- 5. The Network Layer. Network Layer Design Issues. Routing Algorithms. Congestion Control Algorithms. Quality of Service. Internetworking. The Network Layer in the Internet. Summary.
- 6. The Transport Layer. The Transport Service. Elements of Transport Protocols. A Simple Transport Protocol. The Internet Transport Protocols: UDP. The Internet Transport Protocols: TCP. Performance Issues. Summary.
- 7. The Application Layer. DNS-he Domain Name System. Electronic Mail. The World Wide Web. Multimedia. Summary.
- 8. Network Security. Cryptography. Symmetric-Key Algorithms. Public-Key Algorithms. Digital Signatures. Management of Public Keys. Communication Security. Authentication Protocols. E-Mail Security. Web Security. Social Issues. Summary.
- 9. Reading List and Bibliography. Suggestions For Further Reading. Alphabetical Bibliography. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Engineering Library (Terman), SAL3 (off-campus storage)
Engineering Library (Terman) | Status |
---|---|
Stacks | |
TK5105.5 .T36 2003 | Unknown |
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .T36 2003 | Available |
20. Computer networks : a systems approach [2003]
- Peterson, Larry L.
- 3rd ed. - Boston : Morgan Kaufmann Publishers, c2003.
- Description
- Book — xxviii, 813 p. : ill. ; 25 cm.
- Summary
-
- 1 Foundation 1.1 Applications 1.2 Requirements 1.3 Network Architecture 1.4 Implementing Network Software 1.5 Performance 1.6 Summary
- 2 Direct Link Networks 2.1 Hardware Building Blocks 2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B) 2.3 Framing 2.4 Error Detection 2.5 Reliable Transmission 2.6 Ethernet (802.3) 2.7 Token Rings (802.5, FDDI) 2.8 Wireless (802.11) 2.9 Network Adaptors 2.10 Summary
- 3 Packet Switching 3.1 Switching and Forwarding 3.2 Bridges and LAN Switches 3.3 Cell Switching (ATM) 3.4 Implementation and Performance 3.5 Summary
- 4 Internetworking 4.1 Simple Internetworking (IP) 4.2 Routing 4.3 Global Internet 4.4 Multicast 4.5 Multiprotocol Label Switching (MPLS) 4.6 Summary
- 5 End-to-End Protocols 5.1 5.2 Reliable Byte Stream (TCP) 5.3 Remote Procedure Call 5.4 Performance 5.5 Summary
- 6 Congestion Control and Resource Allocation 6.1 Issues in Resource Allocation 6.2 Queuing Disciplines 6.3 TCP Congestion Control 6.4 Congestion-Avoidance Mechanisms 6.5 Quality of Service 6.6 Summary
- 7 End-to-End Data 7.1 Presentation Formatting 7.2 Data 7.3 Summary
- 8 Network Security 8.1 Cryptographic Algorithms 8.2 Security Mechanisms 8.3 Example Systems 8.4 Firewalls 8.5 Summary
- 9 Applications 9.1 Name Service (DNS) 9.2 Traditional Applications 9.3 Multimedia Applications 9.4 Overlay Networks 9.5 Summary.
- (source: Nielsen Book Data)
- Foreword, David Clark, MIT Preface SIMULATION LAB 0: INTRODUCTION AND SAMPLE EXPERIMENT 1 Foundation 1.1 Applications 1.2 Requirements 1.2.1 Connectivity 1.2.2 Cost-Effective Resource Sharing 1.2.3 Support for Common Services 1.3 Network Architecture 1.3.1 Layering and Protocols 1.3.2 OSI Architecture
- 1.3.3 Internet Architecture
- 1.4 Implementing Network Software
- 1.4.1 Application Programming Interface (Sockets)
- 1.4.2 Example Application
- 1.4.3 Protocol Implementation Issues
- 1.5 Performance
- 1.5.1 Bandwidth and Latency
- 1.5.2 Delay _ Bandwidth Product
- 1.5.3 High-Speed Networks
- 1.5.4 Application Performance Needs
- 1.6 Summary
- Further Reading Exercises 2 Direct Link Networks SIMULATION LAB 1: ETHERNETA Direct Link Network with Media Access Control SIMULATION LAB 2: TOKEN RINGSA Direct Link Network with Media Access Control 2.1 Hardware Building Blocks
- 2.1.1 Nodes
- 2.1.2 Links
- 2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B)
- 2.3 Framing
- 2.3.1 Byte-Oriented Protocols (BISYNC, PPP, DDCMP) 2.3.2 Bit-Oriented Protocols (HDLC)
- 2.3.3 Clock-Based Framing (SONET)
- 2.4 Error Detection
- 2.4.1 Two-Dimensional Parity
- 2.4.2 Internet Checksum Algorithm
- 2.4.3 Cyclic Redundancy Check
- 2.5 Reliable Transmission
- 2.5.1 Stop-and-Wait
- 2.5.2 Sliding Window
- 2.5.3 Concurrent Logical Channels
- 2.6 Ethernet (802.3)
- 2.6.1 Physical Properties
- 2.6.2 Access Protocol
- 2.6.3 Experience with Ethernet
- 2.7 Token Rings (802.5, FDDI)
- 2.7.1 Physical Properties
- 2.7.2 Token Ring Media Access Control
- 2.7.3 Token Ring Maintenance
- 2.7.4 Frame Format
- 2.7.5 FDDI
- 2.8 Wireless (802.11) 2.8.1 Physical Properties
- 2.8.2 Collision Avoidance
- 2.8.3 Distribution System
- 2.8.4 Frame Format
- 2.9 Network Adaptors
- 2.9.1 Components
- 2.9.2 View from the Host
- 2.9.3 Memory Bottleneck
- 2.10 Summary Further Reading Exercises 3 Packet Switching SIMULATION LAB 3: SWITCHED LANSA Set of Local Area Networks Interconnected by Switches SIMULATION LAB 4: NETWORK DESIGNPlanning a Network with Different Users, Hosts, and Services SIMULATION LAB 5: ATMA Connection-Oriented, Cell-Switching Technology 3.1 Switching and Forwarding
- 3.1.1 Datagrams
- 3.1.2 Virtual Circuit Switching
- 3.1.3 Source Routing
- 3.2 Bridges and LAN Switches
- 3.2.1 Learning Bridges
- 3.2.2 Spanning Tree Algorithm
- 3.2.3 Broadcast and Multicast
- 3.2.4 Limitations of Bridges
- 3.3 Cell Switching (ATM)
- 3.3.1 Cells
- 3.3.2 Segmentation and Reassembly
- 3.3.3 Virtual Paths
- 3.3.4 Physical Layers for ATM
- 3.3.5 ATM in the LAN
- 3.4 Implementation and Performance 3.4.1 Ports
- 3.4.2 Fabrics
- 3.5 Summary
- Further Reading Exercises 4 Internetworking SIMULATION LAB 6: Routing Information Protocol Based on Distance-Vector Algorithm SIMULATION LAB 7: OSPFA Routing Protocol Based on Link-State Algorithm 4.1 Simple Internetworking (IP)
- 4.1.1 What Is an Internetwork?
- 4.1.2 Service Model
- 4.1.3 Global Addresses
- 4.1.4 Datagram Forwarding in IP
- 4.1.5 Address Translation (ARP)
- 4.1.6 Host Configuration (DHCP)
- 4.1.7 Error Reporting (ICMP)
- 4.1.8 Virtual Networks and Tunnels
- 4.2 Routing
- 4.2.1 Network as a Graph
- 4.2.2 Distance Vector (RIP)
- 4.2.3 Link State (OSPF)
- 4.2.4 Metrics
- 4.2.5 Routing for Mobile Hosts
- 4.3 Global Internet
- 4.3.1 Subnetting
- 4.3.2 Classless Routing (CIDR)
- 4.3.3 Interdomain Routing (BGP)
- 4.3.4 Routing Areas
- 4.3.5 IP version 6 (IPv6)
- 4.4 Multicast
- 4.4.1 Link-State Multicast
- 4.4.2 Distance-Vector Multicast
- 4.4.3 Protocol Independent Multicast (PIM)
- 4.5 Multiprotocol Label Switching (MPLS)
- 4.5.1 Destination-Based Forwarding
- 4.5.2 Explicit Routing
- 4.5.3 Virtual Private Networks and Tunnels
- 4.6 Summary Further Reading Exercises 5 End-to-End Protocols SIMULATION LAB 8: TCPA Reliable, Connection-Oriented, Byte-Stream Service 5.1 Simple Demultiplexer (UDP)
- 5.2 Reliable Byte Stream (TCP)
- 5.2.1 End-to-End Issues
- 5.2.2 Segment Format
- 5.2.3 Connection Establishment and Termination
- 5.2.4 SlidingWindow Revisited
- 5.2.5 Triggering Transmission
- 5.2.6 Adaptive Retransmission
- 5.2.7 Record Boundaries
- 5.2.8 TCP Extensions
- 5.2.9 Alternative Design Choices
- 5.3 Remote Procedure Call
- 5.3.1 Bulk Transfer (BLAST)
- 5.3.2 Request/Reply (CHAN)
- 5.3.3 Dispatcher (SELECT)
- 5.3.4 Putting It All Together (SunRPC, DCE)
- 5.4 Performance
- 5.5 Summary Further Reading Exercises 6 Congestion Control and Resource Allocation SIMULATION LAB 9: QUEUING DISCIPLINESOrder of Packets Transmission and Dropping SIMULATION LAB 10: QUALITY OF SERVICEPacket Delivery Guarantees 6.1 Issues in Resource Allocation
- 6.1.1 Network Model
- 6.1.2 Taxonomy
- 6.1.3 Evaluation Criteria
- 6.2 Queuing Disciplines
- 6.2.1 FIFO
- 6.2.2 Fair Queuing
- 6.3 TCP Congestion Control
- 6.3.1 Additive Increase/Multiplicative Decrease
- 6.3.2 Slow Start
- 6.3.3 Fast Retransmit and Fast Recovery
- 6.4 Congestion-Avoidance Mechanisms
- 6.4.1 DECbit
- 6.4.2 Random Early Detection (RED)
- 6.4.3 Source-Based Congestion Avoidance
- 6.5 Quality of Service
- 6.5.1 Application Requirements
- 6.5.2 Integrated Services (RSVP)
- 6.5.3 Differentiated Services (EF)
- 6.5.4 ATM Quality of Service
- 6.5.5 Equation-Based Congestion Control
- 6.6 Summary Further Reading Exercises 7 End-to-End Data 7.1 Presentation Formatting
- 7.1.1 Taxonomy
- 7.1.2 Examples (XDR, ASN.1, NDR)
- 7.1.3 Markup Languages (XML) 7.2 Data Compression
- 7.2.1 Lossless Compression Algorithms
- 7.2.2 Image Compression (JPEG)
- 7.2.3 Video Compression (MPEG)
- 7.2.4 Transmitting MPEG over a Network
- 7.2.5 Audio Compression (MP3)
- 7.3 Summary
- Further Reading Exercises 8 Network Security SIMULATION LAB 11: FIREWALLS AND VPNSNetwork Security and Virtual Private Networks 8.1 Cryptographic Algorithms
- 8.1.1 Requirements
- 8.1.2 Secret Key Encryption (DES)
- 8.1.3 Public Key Encryption (RSA)
- 8.1.4 Message Digest Algorithms (MD5)
- 8.1.5 Implementation and Performance
- 8.2 Security Mechanisms
- 8.2.1 Authentication Protocols
- 8.2.2 Message Integrity Protocols
- 8.2.3 Public Key Distribution (X.509)
- 8.3 Example Systems
- 8.3.1 Pretty Good Privacy (PGP)
- 8.3.2 Secure Shell (SSH)
- 8.3.3 Transport Layer Security (TLS, SSL, HTTPS)
- 8.3.4 IP Security (IPSEC)
- 8.4 Firewalls
- 8.4.1 Filter-Based Firewalls
- 8.4.2 Proxy-Based Firewalls
- 8.4.3 Limitations
- 8.5 Summary
- Further Reading Exercises 9 Applications SIMULATION LAB 12: APPLICATIONSNetwork Applications Performance Analysis 9.1 Name Service (DNS)
- 9.1.1 Domain Hierarchy
- 9.1.2 Name Servers
- 9.1.3 Name Resolution
- 9.2 Traditional Applications
- 9.2.1 Electronic Mail (SMTP, MIME, IMAP)
- 9.2.2 World Wide Web (HTTP)
- 9.2.3 Network Management (SNMP)
- 9.3 Multimedia Applications
- 9.3.1 Real-time Transport Protocol (RTP)
- 9.3.2 Session Control and Call Control (SDP, SIP, H.323) 9.4 Overlay Networks
- 9.4.1 Routing Overlays
- 9.4.2 Peer-to-Peer Networks
- 9.4.3 Content Distribution Networks
- 9.5 Summary Further Reading Exercises
- Glossary Bibliography Solutions to Select Exercises.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible conceptual foundation on which to understand current networking technologies, as well as the new ones that will quickly take their place. Incorporating instructor and user feedback, this edition has also been fully updated and includes all-new material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, and more. As in the past, all instruction is rigorously framed by problem statements and supported by specific protocol references, C-code examples, and thought-provoking end-of-chapter exercises. New to the edition is a downloadable network stimulation lab manual that allows students to visualize and experiment with core networking technologies in direct coordination with the book's discussion. Thanks to this and many other enhancements, "Computer Networks: A Systems Approach" remains an essential resource for a successful classroom experience and a rewarding career in networking. It is written by an author team with over thirty years of first-hand experience in networking research, development, and teaching - two leaders in the work of defining and implementing many of the protocols discussed in the book. It includes all-new coverage and updated material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, VPNs, IP-Telephony, network security, and multimedia communications (SIP, SDP). There is additional and earlier focus on applications in this edition makes core protocols more accessible and more meaningful to readers already familiar with networked applications. It features chapter-framing statements, over 400 end-of-chapter exercises, example exercises(with solutions), shaded sidebars covering advanced topics, web resources and other proven pedagogical features. Through a companion Web site, it provides many additional resources, including a downloadable network simulation lab manual tightly integrated with the topics in the book.
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .P479 2003 | Available |
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.