Skip to content

Computer Networking A Top-Down Approach

ISBN-10: 0132856204

ISBN-13: 9780132856201

Edition: 6th 2013 (Revised)

Authors: James F. Kurose, Keith W. Ross

List price: $98.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers.This book has become the dominant book for this course because of the authors' reputations, the precision of explanation, the quality of the art program, and the value of their own supplements.
Customers also bought

Book details

List price: $98.99
Edition: 6th
Copyright year: 2013
Publisher: Pearson Education, Limited
Publication date: 2/24/2012
Binding: Hardcover
Pages: 864
Size: 7.75" wide x 9.50" long x 1.50" tall
Weight: 3.190
Language: English

James Kurose teaches at the University of Massachusetts at Amherst. His research interests include network protocols and architecture, network measurement, sensor networks, multimedia communication, and modeling and performance evaluation. He received his PhD from Columbia University. Keith Ross is a professor of computer science at Polytechnic University. He has worked in peer-to-peer networking, Internet measurement, video streaming, Web caching, multi-service loss networks, content distribution networks, voice over IP, optimization, queuing theory, optimal control of queues, and Markov decision processes. Professor Ross received his PhD in Computer and Control Engineering from the University of Michigan.

Computer Networks and the Internet
What Is the Internet?
A Nuts-and-Bolts Description
A Services Description
What Is a Protocol?
The Network Edge
Access Networks
Physical Media
The Network Core
Packet Switching
Circuit Switching
A Network of Networks
Delay, Loss, and Throughput in Packet-Switched Networks
Overview of Delay in Packet-Switched Networks
Queuing Delay and Packet Loss
End-to-End Delay
Throughput in Computer Networks
Protocol Layers and Their Service Models
Layered Architecture
Networks Under Attack
History of Computer Networking and the Internet
The Development of Packet Switching: 1961-1972
Proprietary Networks and Internetworking: 1972-1980
A Proliferation of Networks: 1980-1990
The Internet Explosion: The 1990s
The New Millennium
Homework Problems and Questions
Wireshark Lab
Interview: Leonard Kleinrock
Application Layer
Principles of Network Applications
Network Application Architectures
Processes Communicating
Transport Services Available to Applications
Transport Services Provided by the Internet
Application-Layer Protocols
Network Applications Covered in This Book
The Web and HTTP
Overview of HTTP
Non-Persistent and Persistent Connections
HTTP Message Format
User-Server Interaction: Cookies
Web Caching
The Conditional GET
File Transfer: FTP
FTP Commands and Replies
Electronic Mail in the Internet
Comparison with HTTP
Mail Message Format
Mail Access Protocols
DNS-The Internet's Directory Service
Services Provided by DNS
Overview of How DNS Works
DNS Records and Messages
Peer-to-Peer Applications
P2P File Distribution
Distributed Hash Tables (DHTs)
Case Study: P2P Internet Telephony with Skype
Socket Programming: Creating Network Applications
Socket Programming with UDP
Socket Programming with TCP
Homework Problems and Questions
Socket Programming Assignments
Wireshark Labs
Interview: Bram Cohen
Transport Layer
Introduction and Transport-Layer Services
Relationship Between Transport and Network Layers
Overview of the Transport Layer in the Internet
Multiplexing and Demultiplexing
Connectionless Transport: UDP
UDP Segment Structure
UDP Checksum
Principles of Reliable Data Transfer
Building a Reliable Data Transfer Protocol
Pipelined Reliable Data Transfer Protocols
Go-Back-N (GBN)
Selective Repeat (SR)
Connection-Oriented Transport: TCP
The TCP Connection
TCP Segment Structure
Round-Trip Time Estimation and Timeout
Reliable Data Transfer
Flow Control
TCP Connection Management
Principles of Congestion Control
The Causes and the Costs of Congestion
Approaches to Congestion Control
Network-Assisted Congestion-Control Example:ATM ABR Congestion Control
TCP Congestion Control
Homework Problems and Questions
Programming Assignments
Wireshark Lab: Exploring TCP
Wireshark Lab: Exploring UDP
Interview: Sally Floyd
The Network Layer
Forwarding and Routing
Network Service Models
Virtual Circuit and Datagram Networks
Virtual-Circuit Networks
Datagram Networks
Origins of VC and Datagram Networks
What's Inside a Router?
Input Processing
Output Processing
Where Does Queuing Occur?
The Routing Control Plane
The Internet Protocol (IP): Forwarding and Addressing in the Internet
Datagram Format
IPv4 Addressing
Internet Control Message Protocol (ICMP)
A Brief Introduction into IP Security
Routing Algorithms
The Link-State (LS) Routing Algorithm
The Distance-Vector (DV) Routing Algorithm
Hierarchical Routing
Routing in the Internet
Intra-AS Routing in the Internet: RIP
Intra-AS Routing in the Internet: OSPF
Inter-AS Routing: BGP
Broadcast and Multicast Routing
Broadcast Routing Algorithms
Homework Problems and Questions
Socket Programming Assignment
Programming Assignment
Wireshark Labs
Interview: Vinton G. Cerf
The Link Layer: Links, Access Networks, and LANs
Introduction to the Link Layer
The Services Provided by the Link Layer
Where Is the Link Layer Implemented?
Error-Detection and -Correction Techniques
Parity Checks
Checksumming Methods
Cyclic Redundancy Check (CRC)
Multiple Access Links and Protocols
Channel Partitioning Protocols
Random Access Protocols
Taking-Turns Protocols
DOCSIS: The Link-Layer Protocol for Cable Internet Access
Switched Local Area Networks
Link-Layer Addressing and ARP
Link-Layer Switches
Virtual Local Area Networks (VLANs)
Link Virtualization: A Network as a Link Layer
Multiprotocol Label Switching (MPLS)
Data Center Networking
Retrospective: A Day in the Life of a Web Page Request
Getting Started: DHCP, UDP, IP, and Ethernet
Still Getting Started: DNS, ARP
Still Getting Started: Intra-Domain Routing to the DNS Server
Web Client-Server Interaction: TCP and HTTP
Homework Problems and Questions
Wireshark Labs
Interview: Simon S. Lam
Wireless and Mobile Networks
Wireless Links and Network Characteristics
WiFi: 802.11 Wireless LANs
The 802.11 Architecture
The 802.11 MAC Protocol
The IEEE 802.11 Frame
Mobility in the Same IP Subnet
Advanced Features in 802.11
Personal Area Networks: Bluetooth and Zipbee
Cellular Internet Access
An Overview of Cellular Network Architecture
3G Cellular Data Networks: Extending the Internet to Cellular Subscribers
On to 4G: LTE
Mobility Management: Principles
Routing to a Mobile Node
Mobile IP
Managing Mobility in Cellular Networks
Routing Calls to a Mobile User
Handoffs in GSM
Wireless and Mobility: Impact on Higher-Layer Protocols
Homework Problems and Questions
Wireshark Labs
Interview: Deborah Estrin
Multimedia Networking
Multimedia Networking Applications
Properties of Video
Properties of Audio
Types of Multimedia Network Applications
Streaming Stored Video
UDP Streaming
HTTP Streaming
Adaptive Streaming and DASH
Content Distribution Networks
Case Studies: Netflix, YouTube, and KanKan
Limitations of the Best-Effort IP Service
Removing Jitter at the Receiver for Audio
Recovering from Packet Loss
Case Study: Internet Telephony with Skype
Protocols for Real-Time Interactive Applications
Network Support for Multimedia
Dimensioning Best-Effort Networks
Providing Multiple Classes of Service
Per-Connection Quality-of-Service (QoS) Guarantees:Resource Reservation and Call Admission
Homework Problems and Questions
Programming Assignment
Interview: Henning Schulzrinne
Security in Computer Networks
What Is Network Security?
Principles of Cryptography
Symmetric Key Cryptography
Public Key Encryption
Message Integrity and Digital Signatures
Cryptographic Hash Functions
Message Authentication Code
Digital Signatures
End-Point Authentication
Authentication Protocol ap1.0
Authentication Protocol ap2.0
Authentication Protocol ap3.0
Authentication Protocol ap3.1
Authentication Protocol ap4.0
Securing E-mail
Secure E-mail
Securing TCP Connections: SSL
The Big Picture
A More Complete Picture
Network-Layer Security: IPsec and Virtual Private Networks