Image from Coce

Computer Networking with Internet Protocols and Technology William Stallings

By: Material type: TextTextPublication details: Boston ; London : Pearson, ©2009Description: 642p ill. 23cmISBN:
  • 9780132172172
Subject(s):
LOC classification:
  • TK5105 .S73 2004
List(s) this item appears in: Communication Skills
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
BOOK BOOK KIGALI CAMPUS LIBRARY General Stacks BK TK5105 .S73 2004 (Browse shelf(Opens below)) Available MKU38779
BOOK BOOK Nairobi Campus Library General Stacks BK TK5105 .S73 2004 (Browse shelf(Opens below)) Available MKU113411
BOOK BOOK Nairobi Campus Library General Stacks BK TK5105 .S73 2004 (Browse shelf(Opens below)) Available MKU86400
BOOK BOOK Nairobi Campus Library General Stacks BK TK5105 .S73 2004 (Browse shelf(Opens below)) Available MKU77445

TABLE OF CONTENTS Preface Chapter 0 Reader's and Instructor's Guide 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards PART ONE OVERVIEW Chapter 1 Data Communications, Data Networking, and the Internet 1.1 Data Communications and Networking for Today's Enterprise 1.2 A Communications Model 1.3 Data Communications 1.4 Networks 1.5 The Internet 1.6 An Example Configuration Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications 2.1 The Need for a Protocol Architecture 2.2 A Simple Protocol Architecture 2.3 The TCP/IP Protocol Architecture 2.4 Standardization within a Protocol Architecture 2.5 Traditional Internet-Based Applications 2.6 Multimedia 2.7 Recommended Reading and Web Sites 2.8 Key Terms, Review Questions, and Problems Appendix 2A The Trivial File Transfer Protocol PART TWO DATA COMMUNICATIONS Chapter 3 Data Transmission 3.1 Concepts and Terminology 3.2 Analog and Digital Data Transmission 3.3 Transmission Impairments 3.4 Channel Capacity 3.5 Recommended Reading and Web Site 3.6 Key Terms, Review Questions, and Problems Appendix 3A Decibels and Signal Strength Chapter 4 Transmission Media 4.1 Guided Transmission Media 4.2 Wireless Transmission 4.3 Wireless Propagation 4.4 Line-of-Sight Transmission 4.5 Recommended Reading and Web Sites 4.6 Key Terms, Review Questions, and Problems Chapter 5 Signal Encoding Techniques 5.1 Digital Data, Digital Signals 5.2 Digital Data, Analog Signals 5.3 Analog Data, Digital Signals 5.4 Analog Data, Analog Signals 5.5 Recommended Reading 5.6 Key Terms, Review Questions, and Problems Chapter 6 Digital Data Communication Techniques 6.1 Asynchronous and Synchronous Transmission 6.2 Types of Errors 6.3 Error Detection 6.4 Error Correction 6.5 Line Configurations 6.6 Recommended Reading 6.7 Key Terms, Review Questions, and Problems Chapter 7 Data Link Control Protocols 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems Appendix 7A Performance Issues Chapter 8 Multiplexing 8.1 Frequency-Division Multiplexing 8.2 Synchronous Time-Division Multiplexing 8.3 Statistical Time-Division Multiplexing 8.4 Asymmetric Digital Subscriber Line 8.5 xDSL 8.6 Recommended Reading and Web Sites 8.7 Key Terms, Review Questions, and Problems Chapter 9 Spread Spectrum 9.1 The Concept of Spread Spectrum 9.2 Frequency Hopping Spread Spectrum 9.3 Direct Sequence Spread Spectrum 9.4 Code-Division Multiple Access 9.5 Recommended Reading and Web Site 9.6 Key Terms, Review Questions, and Problems PART THREE WIDE AREA NETWORKS Chapter 10 Circuit Switching and Packet Switching 10.1 Switched Communications Networks 10.2 Circuit Switching Networks 10.3 Circuit Switching Concepts 10.4 Softswitch Architecture 10.5 Packet-Switching Principles 10.6 Recommended Reading and Web Sites 10.7 Key Terms, Review Questions, and Problems Chapter 11 Asynchronous Transfer Mode 11.1 The Role of ATM 11.2 Protocol Architecture 11.3 ATM Logical Connections 11.4 ATM Cells 11.5 Transmission of ATM Cells 11.6 ATM Service Categories 11.7 Recommended Reading and Web Sites 11.8 Key Terms, Review Questions, and Problems Chapter 12 Routing in Switched Networks 12.1 Routing in Packet-Switching Networks 12.2 Examples: Routing in ARPANET 12.3 Least-Cost Algorithms 12.4 Recommended Reading 12.5 Key Terms, Review Questions, and Problems Chapter 13 Congestion Control in Data Networks 13.1 Effects of Congestion 13.2 Congestion Control 13.3 Traffic Management 13.4 Congestion Control in Packet-Switching Networks 13.5 ATM Traffic Management 13.6 ATM-GFR Traffic Management 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems Chapter 14 Cellular Wireless Networks 14.1 Principles of Cellular Networks 14.2 First-Generation Analog 14.3 Second-Generation CDMA 14.4 Third-Generation Systems 14.4 Fourth-Generation Systems 14.5 Recommended Reading and Web Sites 14.6 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 15 Local Area Network Overview 15.1 Background 15.2 Topologies and Transmission Media 15.3 LAN Protocol Architecture 15.4 Bridges 15.5 Hubs and Switches 15.6 Virtual LANs 15.7 Recommended Reading and Web Sites 15.8 Key Terms, Review Questions, and Problems Chapter 16 Ethernet 16.1 Traditional Ethernet 16.2 High-Speed Ethernet 16.3 IEEE 802.1Q VLAN Standard 16.4 Recommended Reading and Web Sites 16.5 Key Terms, Review Questions, and Problems Appendix 16A Digital Signal Encoding for LANs Appendix 16B Scrambling Chapter 17 Wireless LANs 17.1 Overview 17.2 Wireless LAN Technology 17.3 IEEE 802.11 Architecture and Services 17.4 IEEE 802.11 Medium Access Control 17.5 IEEE 802.11Physical Layer 17.6 IEEE 802.11 Security Considerations 17.7 Recommended Reading and Web Sites 17.8 Key Terms, Review Questions, and Problems PART FIVE INTERNET AND TRANSPORT PROTOCOLS Chapter 18 Internetwork Protocols 18.1 Principles of Internetworking 18.2 Internet Protocol Operation 18.3 Internet Protocol 18.4 IPv6 18.5 Virtual Private Networks and IP Security 18.6 Recommended Reading and Web Sites 18.7 Key Terms, Review Questions, and Problems Chapter 19 Internetwork Operation 19.1 Multicasting 19.2 Routing Protocols 19.3 Mobile IP 19.4 Recommended Reading and Web Sites 19.5 Key Terms, Review Questions, and Problems Chapter 20 Internet Quality of Service 20.1 Integrated Services Architecture 20.2 Resource Reservation Protocol 20.3 Differentiated Services 20.4 Service Level Agreements 20.5 IP Performance Metrics 20.6 Recommended Reading and Web Sites 20.7 Key Terms, Review Questions, and Problems Chapter 21 Multiprotocol Label Switching 21.1 The Role of MPLS 21.2 Background 21.3 MPLS Operation 21.4 Labels 21.5 FECs and LSPs 21. Recommended Reading and Web Sites 21. Key Terms, Review Questions, and Problems Chapter 22 Transport Protocols 21.1 Connection-Oriented Transport Protocol Mechanisms 21.2 TCP 21.3 TCP Congestion Control 21.4 UDP 21.5 Recommended Reading and Web Sites 21.6 Key Terms, Review Questions, and Problems PART SIX NETWORK SECURITY Chapter 23 Computer and Network Security Threats 23.1 Computer Security Concepts 23.2 Threats, Attacks, and Assets 23.3 Intruders 23.4 Malicious Software Overview 23.5 Viruses, Worms, and Bots 23.6 Recommended Reading and Web Sites 23.7 Key Terms, Review Questions, and Problems Chapter 24 Computer and Network Security Techniques 24.1 Virtual Private Networks and IPSec 24.2 SSL and TLS 24.3 Wi-Fi Protected Access 24.4 Intrusion Detection 24.5 Firewalls 24.6 Malware Defense 24.7 Recommended Reading 24.8 Key Terms, Review Questions, and Problems APPENDICES Appendix A - Fourier Analysis A.1 Fourier Series Representation of Periodic Signals A.2 Fourier Transform Representation of Aperiodic Signals A.3 Recommended Reading Appendix B - Projects for Teaching Data and Computer Communications B.1 Practical Exercises B.2 Sockets Projects B.3 Ethereal Projects B.4 Simulation and Modeling Projects B.5 Performance Modeling B.6 Research Projects B.7 Reading/Report Assignments B.8 Writing Assignments B.9 Discussion Topics *ONLINE CHAPTERS* PART SEVEN INTERNET APPLICATIONS Chapter 25 Electronic Mail and Network Management 25.1 Electronic Mail: SMTP and MIME 25.2 Network Management: SNMP 25.3 Recommended Reading and Web Sites 25.4 Key Terms, Review Questions, and Problems Chapter 26 Internet Directory Service and World Wide Web 26.1 Internet Directory Service: DNS 26.2 Web Access: HTTP 26.3 Recommended Reading and Web Sites 26.4 Key Terms, Review Questions, and Problems PART EIGHT INTERNET APPLICATIONS Chapter 27 Sockets: A Programmer's Introduction 27.1 Versions of Sockets 27.2 Sockets, Socket Descriptors, Ports, and 27onnections 27.3 The 27lient/Server Model of 27ommunication 27.4 Sockets Elements 27.5 Stream and Datagram Sockets 27.6 Run-Time Program 27ontrol 27.7 Remote Execution of a Windows 27onsole Application Chapter 28 Frame Relay 28.1 X.25 28.2 Frame Relay 28.3 Frame Relay Congestion Control 28.4 Recommended Reading and Web Sites 28.5 Key Terms, Review Questions, and Problems *ONLINE APPENDICES* Appendix C - Standards Organizations C.1 The Importance of Standards C.2 Standards-Setting Organizations Appendix D - The OSI Model D.1 The Model D.2 The OSI Layers Appendix E - The International Reference Alphabet Appendix F - Proof of the Sampling Theorem Appendix G - Physical-Layer Interfacing G.1 V.24/EIA-232-F G.2 ISDN Physical Interface Appendix H - Queuing Effects H.1 Queuing Models H.2 Queuing Results Appendix I - ATM Adaptation Layer I.1 AAL Service I.2 AAL Protocols Appendix J - Leaky Bucket Algorithms Appendix K - The Spanning Tree Algorithm Appendix L - LAN Performance Issues Appendix M - Fibre Channel M.1 Fibre Channel Elements M.2 Fibre Channel Protocol Architecture Appendix N - LAN Performance Issues N.1 The Effect of Propagation Delay and Transmission Rate N.2 Simple Performance Model for CSMA/CD Appendix O - Orthogonality, Correlation, and Autocorrelation O.1 Correlation and Autocorrelation O.2 Orthogonal Codes Appendix P - TCP/IP Example Appendix Q - TCP/IP Checksum Q.1 Ones-Complement Addition Q.2 Use in TCP and IP Appendix R - Cryptographic Algorithms R.1 Symmetric Encryption R.2 Public-Key Cryptography R.3 Message Authentication and Hash Functions R.4 Secure Hash Functions Appendix M - Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) M.1 Uniform Resource Locator M.2 Uniform Resource Identifier M.3 To Learn More Appendix N - Augmented Backus-Naur Form Appendix O - Derivations of Equations and Examples Appendix N - Glossary

The ninth edition of 'Data and Computer Communications' features improved illustrations, integrated coverage of TCP/IP and Ethernet, a survey of ADSL, new coverage of IP multicasting and reports on the very latest technologies in hardware and software.

There are no comments on this title.

to post a comment.
© 2019 Mount Kenya University Library
P. O. Box 342-01000,
Thika, Kenya

Powered by Koha