Normal view MARC view ISBD view

Computer networks [] / Andrew S. Tanenbaum

Auteur principal : Tanenbaum, Andrew S., 1944-Mention d'édition : 4th ed.Publication :Upper Saddle River, NJ : Prentice Hall PTR, cop. 2003Description : 1 vol. (xx-891 p.) : ill. ; 25 cmISBN : 0-13-066102-3 ; 978-0-13-066102-9 ; 0-13-038488-7 ; 978-0-13-038488-1.Dewey: 004.6Bibliographie: Bibliogr. p. 835-868. Index.Sujet - Nom d'actualité : Réseaux d'ordinateurs Sujet : Réseau ordinateur ;Architecture réseau
Current location Call number Status Date due Barcode
Sophia Antipolis
Salle de lecture
EMS 110-D/N 5019 Sur demande EMS01425D

Contents : 1 Introduction. Uses of Computer Networks. Network Hardware. Network Software. Reference Models. Example Networks. Network Standardization. Metric Units. Outline of the Rest of the Book 2 The Physical Layer. The Theoretical Basis For Data Communication. Guided Transmission Media. Wireless Transmission. Communication Satellites. The Public Switched Telephone Network. The Mobile Telephone System. Cable Television 3 The Data Link Layer. Data Link Layer Design Issues. Error Detection and Correction. Elementary Data Link Protocols. Sliding Window Protocols. Protocol Verification. Example Data Link Protocols 4 The Medium Access Control Sublayer. The Channel Allocation Problem. Multiple Access Protocols. Ethernet. Wireless Lans. Broadband Wireless. Bluetooth. Data Link Layer Switching 5 The Network Layer. Network Layer Design Issues. Routing Algorithms. Congestion Control Algorithms. Quality of Service. Internetworking. The Network Layer in the Internet 6 The Transport Layer. The Transport Service. Elements of Transport Protocols. A Simple Transport Protocol. The Internet Transport Protocols: UDP. The Internet Transport Protocols: TCP. Performance Issues 7 The Application Layer. DNS-he Domain Name System. Electronic Mail. The World Wide Web. Multimedia 8 Network Security. Cryptography. Symmetric-Key Algorithms. Public-Key Algorithms. Digital Signatures. Management of Public Keys. Communication Security. Authentication Protocols. E-Mail Security. Web Security. Social Issues 9 Reading List and Bibliography

Bibliogr. p. 835-868. Index

Powered by Koha