E-Book, Englisch, 920 Seiten
Peterson / Davie Computer Networks
5. Auflage 2011
ISBN: 978-0-12-385060-7
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
A Systems Approach
E-Book, Englisch, 920 Seiten
Reihe: The Morgan Kaufmann Series in Networking
ISBN: 978-0-12-385060-7
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking. - Completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, security, and applications - Increased focus on application layer issues where innovative and exciting research and design is currently the center of attention - Free downloadable network simulation software and lab experiments manual available
Larry Peterson is the Robert E. Kahn Professor of Computer Science, Emeritus at Princeton University, where he served as Chair from2003-2009. His research focuses on the design, implementation, and operation of Internet-scale distributed systems, including the widely used PlanetLab and MeasurementLab platforms. He currently serves as the CTO of the Open Networking Foundation (ONF), where he works on open source software at the intersection of access networks and the edge cloud. Professor Peterson is a member of the National Academy of Engineering, a Fellow of the ACM and the IEEE, the 2010 recipient of the IEEE Kobayashi Computer and Communication Award, and the 2013 recipient of the ACM SIGCOMM Award. He received his Ph.D. degree from Purdue University in 1985.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Computer Networks;6
3;Copyright;7
4;Dedication;8
5;Foreword;10
6;Foreword to the First Edition;12
7;Preface;14
8;Table of Contents;26
9;Chapter 1. Foundation;34
9.1;Problem: Building a Network;34
9.2;1.1 Applications;35
9.3;1.2 Requirements;39
9.4;1.3 Network Architecture;57
9.5;1.4 Implementing Network Software;69
9.6;1.5 Performance;77
9.7;1.6 Summary;88
9.8;What’s Next: Cloud Computing;90
9.9;Further Reading;91
9.10;Exercises;93
10;Chapter 2. Getting Connected;104
10.1;Problem: Connecting to a Network;104
10.2;2.1 Perspectives on Connecting;105
10.3;2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B);111
10.4;2.3 Framing;114
10.5;2.4 Error Detection;124
10.6;2.5 Reliable Transmission;135
10.7;2.6 Ethernet and Multiple Access Networks (802.3);152
10.8;2.7 Wireless;161
10.9;2.8 Summary;181
10.10;What’s Next: “The Internet of Things”;183
10.11;Further Reading;184
10.12;Exercises;186
11;Chapter 3. Internetworking;202
11.1;Problem: Not All Networks are Directly Connected;202
11.2;3.1 Switching and Bridging;203
11.3;3.2 Basic Internetworking (IP);236
11.4;3.3 Routing;273
11.5;3.4 Implementation and Performance;299
11.6;3.5 Summary;313
11.7;What’s Next: The Future Internet;314
11.8;Further Reading;315
11.9;Exercises;317
12;Chapter 4. Advanced Internetworking;340
12.1;Problem: Scaling to Billions;340
12.2;4.1 The Global Internet;341
12.3;4.2 Multicast;371
12.4;4.3 Multiprotocol Label Switching (MPLS);387
12.5;4.4 Routing among Mobile Devices;402
12.6;4.5 Summary;412
12.7;What’s Next: Deployment of IPv6;413
12.8;Further Reading;414
12.9;Exercises;415
13;Chapter 5. End-to-End Protocols;424
13.1;Problem: Getting Process to Communicate;424
13.2;5.1 Simple Demultiplexer (UDP);426
13.3;5.2 Reliable Byte Stream (TCP);429
13.4;5.3 Remote Procedure Call;464
13.5;5.4 Transport for Real-Time Applications (RTP);480
13.6;5.5 Summary;493
13.7;What’s Next: Transport Protocol Diversity;494
13.8;Further Reading;495
13.9;Exercises;496
14;Chapter 6. Congestion Control and Resource Allocation;512
14.1;Problem: Allocating Resources;512
14.2;6.1 Issues in Resource Allocation;513
14.3;6.2 Queuing Disciplines;525
14.4;6.3 TCP Congestion Control;532
14.5;6.4 Congestion-Avoidance Mechanisms;547
14.6;6.5 Quality of Service;563
14.7;6.6 Summary;592
14.8;What’s Next: Refactoring the Network;593
14.9;Further Reading;594
14.10;Exercises;596
15;Chapter 7. End-to-End Data;612
15.1;Problem: What Do We Do with the Data?;612
15.2;7.1 Presentation Formatting;614
15.3;7.2 Multimedia Data;629
15.4;7.3 Summary;654
15.5;What’s Next: Video Everywhere;655
15.6;Further Reading;656
15.7;Exercises;657
16;Chapter 8. Network Security;666
16.1;Problem: Security Attacks;666
16.2;8.1 Cryptographic Building Blocks;668
16.3;8.2 Key Predistribution;680
16.4;8.3 Authentication Protocols;687
16.5;8.4 Example Systems;697
16.6;8.5 Firewalls;714
16.7;8.6 Summary;719
16.8;What’s Next: Coming to Grips with Security;721
16.9;Further Reading;722
16.10;Exercises;723
17;Chapter 9. Applications;730
17.1;Problem: Applications Need their Own Protocols;730
17.2;9.1 Traditional Applications;731
17.3;9.2 Multimedia Applications;760
17.4;9.3 Infrastructure Services;777
17.5;9.4 Overlay Networks;792
17.6;9.5 Summary;822
17.7;What’s Next: New Network Architecture;823
17.8;Further Reading;824
17.9;Exercises;826
18;Solutions to Select Exercises;834
19;Glossary;848
20;Bibliography;870
21;Index;884