Computer Networking A Top-Down Approach

ISBN-10: 0132856204
ISBN-13: 9780132856201
Edition: 6th 2013 (Revised)
List price: $98.99 Buy it from $70.99
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a  More...

Used Starting from $395.65
eBooks Starting from $33.99
Rent
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $98.99
Edition: 6th
Copyright year: 2013
Publisher: Pearson Education, Limited
Publication date: 2/24/2012
Binding: Hardcover
Pages: 864
Size: 7.75" wide x 9.50" long x 1.50" tall
Weight: 3.278
Language: English

Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers.This book has become the dominant book for this course because of the authors' reputations, the precision of explanation, the quality of the art program, and the value of their own supplements.

James Kurose teaches at the University of Massachusetts at Amherst. His research interests include network protocols and architecture, network measurement, sensor networks, multimedia communication, and modeling and performance evaluation. He received his PhD from Columbia University. Keith Ross is a professor of computer science at Polytechnic University. He has worked in peer-to-peer networking, Internet measurement, video streaming, Web caching, multi-service loss networks, content distribution networks, voice over IP, optimization, queuing theory, optimal control of queues, and Markov decision processes. Professor Ross received his PhD in Computer and Control Engineering from the University of Michigan.

Computer Networks and the Internet
What Is the Internet?
A Nuts-and-Bolts Description
A Services Description
What Is a Protocol?
The Network Edge
Access Networks
Physical Media
The Network Core
Packet Switching
Circuit Switching
A Network of Networks
Delay, Loss, and Throughput in Packet-Switched Networks
Overview of Delay in Packet-Switched Networks
Queuing Delay and Packet Loss
End-to-End Delay
Throughput in Computer Networks
Protocol Layers and Their Service Models
Layered Architecture
Encapsulation
Networks Under Attack
History of Computer Networking and the Internet
The Development of Packet Switching: 1961-1972
Proprietary Networks and Internetworking: 1972-1980
A Proliferation of Networks: 1980-1990
The Internet Explosion: The 1990s
The New Millennium
Summary
Homework Problems and Questions
Problems
Wireshark Lab
Interview: Leonard Kleinrock
Application Layer
Principles of Network Applications
Network Application Architectures
Processes Communicating
Transport Services Available to Applications
Transport Services Provided by the Internet
Application-Layer Protocols
Network Applications Covered in This Book
The Web and HTTP
Overview of HTTP
Non-Persistent and Persistent Connections
HTTP Message Format
User-Server Interaction: Cookies
Web Caching
The Conditional GET
File Transfer: FTP
FTP Commands and Replies
Electronic Mail in the Internet
SMTP
Comparison with HTTP
Mail Message Format
Mail Access Protocols
DNS-The Internet's Directory Service
Services Provided by DNS
Overview of How DNS Works
DNS Records and Messages
Peer-to-Peer Applications
P2P File Distribution
Distributed Hash Tables (DHTs)
Case Study: P2P Internet Telephony with Skype
Socket Programming: Creating Network Applications
Socket Programming with UDP
Socket Programming with TCP
Summary
Homework Problems and Questions
Problems
Socket Programming Assignments
Wireshark Labs
Interview: Bram Cohen
Transport Layer
Introduction and Transport-Layer Services
Relationship Between Transport and Network Layers
Overview of the Transport Layer in the Internet
Multiplexing and Demultiplexing
Connectionless Transport: UDP
UDP Segment Structure
UDP Checksum
Principles of Reliable Data Transfer
Building a Reliable Data Transfer Protocol
Pipelined Reliable Data Transfer Protocols
Go-Back-N (GBN)
Selective Repeat (SR)
Connection-Oriented Transport: TCP
The TCP Connection
TCP Segment Structure
Round-Trip Time Estimation and Timeout
Reliable Data Transfer
Flow Control
TCP Connection Management
Principles of Congestion Control
The Causes and the Costs of Congestion
Approaches to Congestion Control
Network-Assisted Congestion-Control Example:ATM ABR Congestion Control
TCP Congestion Control
Fairness
Summary
Homework Problems and Questions
Problems
Programming Assignments
Wireshark Lab: Exploring TCP
Wireshark Lab: Exploring UDP
Interview: Sally Floyd
The Network Layer
Introduction
Forwarding and Routing
Network Service Models
Virtual Circuit and Datagram Networks
Virtual-Circuit Networks
Datagram Networks
Origins of VC and Datagram Networks
What's Inside a Router?
Input Processing
Switching
Output Processing
Where Does Queuing Occur?
The Routing Control Plane
The Internet Protocol (IP): Forwarding and Addressing in the Internet
Datagram Format
IPv4 Addressing
Internet Control Message Protocol (ICMP)
IPv6
A Brief Introduction into IP Security
Routing Algorithms
The Link-State (LS) Routing Algorithm
The Distance-Vector (DV) Routing Algorithm
Hierarchical Routing
Routing in the Internet
Intra-AS Routing in the Internet: RIP
Intra-AS Routing in the Internet: OSPF
Inter-AS Routing: BGP
Broadcast and Multicast Routing
Broadcast Routing Algorithms
Multicast
Summary
Homework Problems and Questions
Problems
Socket Programming Assignment
Programming Assignment
Wireshark Labs
Interview: Vinton G. Cerf
The Link Layer: Links, Access Networks, and LANs
Introduction to the Link Layer
The Services Provided by the Link Layer
Where Is the Link Layer Implemented?
Error-Detection and -Correction Techniques
Parity Checks
Checksumming Methods
Cyclic Redundancy Check (CRC)
Multiple Access Links and Protocols
Channel Partitioning Protocols
Random Access Protocols
Taking-Turns Protocols
DOCSIS: The Link-Layer Protocol for Cable Internet Access
Switched Local Area Networks
Link-Layer Addressing and ARP
Ethernet
Link-Layer Switches
Virtual Local Area Networks (VLANs)
Link Virtualization: A Network as a Link Layer
Multiprotocol Label Switching (MPLS)
Data Center Networking
Retrospective: A Day in the Life of a Web Page Request
Getting Started: DHCP, UDP, IP, and Ethernet
Still Getting Started: DNS, ARP
Still Getting Started: Intra-Domain Routing to the DNS Server
Web Client-Server Interaction: TCP and HTTP
Summary
Homework Problems and Questions
Problems
Wireshark Labs
Interview: Simon S. Lam
Wireless and Mobile Networks
Introduction
Wireless Links and Network Characteristics
CDMA
WiFi: 802.11 Wireless LANs
The 802.11 Architecture
The 802.11 MAC Protocol
The IEEE 802.11 Frame
Mobility in the Same IP Subnet
Advanced Features in 802.11
Personal Area Networks: Bluetooth and Zipbee
Cellular Internet Access
An Overview of Cellular Network Architecture
3G Cellular Data Networks: Extending the Internet to Cellular Subscribers
On to 4G: LTE
Mobility Management: Principles
Addressing
Routing to a Mobile Node
Mobile IP
Managing Mobility in Cellular Networks
Routing Calls to a Mobile User
Handoffs in GSM
Wireless and Mobility: Impact on Higher-Layer Protocols
Summary
Homework Problems and Questions
Problems
Wireshark Labs
Interview: Deborah Estrin
Multimedia Networking
Multimedia Networking Applications
Properties of Video
Properties of Audio
Types of Multimedia Network Applications
Streaming Stored Video
UDP Streaming
HTTP Streaming
Adaptive Streaming and DASH
Content Distribution Networks
Case Studies: Netflix, YouTube, and KanKan
Voice-over-IP
Limitations of the Best-Effort IP Service
Removing Jitter at the Receiver for Audio
Recovering from Packet Loss
Case Study: Internet Telephony with Skype
Protocols for Real-Time Interactive Applications
RTP
SIP
Network Support for Multimedia
Dimensioning Best-Effort Networks
Providing Multiple Classes of Service
Diffserv
Per-Connection Quality-of-Service (QoS) Guarantees:Resource Reservation and Call Admission
Summary
Homework Problems and Questions
Problems
Programming Assignment
Interview: Henning Schulzrinne
Security in Computer Networks
What Is Network Security?
Principles of Cryptography
Symmetric Key Cryptography
Public Key Encryption
Message Integrity and Digital Signatures
Cryptographic Hash Functions
Message Authentication Code
Digital Signatures
End-Point Authentication
Authentication Protocol ap1.0
Authentication Protocol ap2.0
Authentication Protocol ap3.0
Authentication Protocol ap3.1
Authentication Protocol ap4.0
Securing E-mail
Secure E-mail
PGP
Securing TCP Connections: SSL
The Big Picture
A More Complete Picture
Network-Layer Security: IPsec and Virtual Private Networks

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×