Example: barber

Computer Networking: A Top-Down Approach, 8th edition ...

Computer Networking: A Top-Down Approach, 8th edition Table of Contents Chapter 1 Computer Networks and the internet What Is the internet ? A Nuts-and-Bolts Description A Services Description What Is a protocol ? The network Edge Access Networks Physical Media The network Core Packet Switching Circuit Switching A network of Networks Delay, Loss, and Throughput in Packet-Switched Networks Overview of Delay in Packet-Switched Networks Queuing Delay and Packet Loss End-to-End Delay Throughput in Computer Networks protocol Layers and Their Service Models Layered Architecture Encapsulation Networks Under Attack History of Computer Networking and the internet The Development of Packet Switching: 1961 1972 Proprietary Networks and Internetworking: 1972 1980 A Proliferation of Networks: 1980 1990 The internet Explosion: The 1990s The New Millennium Summary Homework Problems and Questions Wireshark Lab Chapter 2 Application Layer Principles of network Applications network Application Architectures Processes Communicating Transport Services Available to Applications Transport Services Provided by the internet Application-Layer Protocols network Applications Covered in This Book The Web and HTTP Overview of HTTP Non-Persistent and Persistent Connections HTTP Message Format User-Server Interaction: Cookies Web Caching HTTP/2 Electronic Mail i

2.7 Socket Programming: Creating Network Applications 2.7.1 Socket Programming with UDP 2.7.2 Socket Programming with TCP 2.8 Summary Homework Problems and Questions ... 4.3 The Internet Protocol (IP): IPv4, Addressing, IPv6, and More 4.3.1 IPv4 Datagram Format 4.3.2 IPv4 Addressing 4.3.3 Network Address Translation (NAT) ...

Tags:

  Programming, Network, Protocol, Internet, Internet protocol

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Computer Networking: A Top-Down Approach, 8th edition ...

1 Computer Networking: A Top-Down Approach, 8th edition Table of Contents Chapter 1 Computer Networks and the internet What Is the internet ? A Nuts-and-Bolts Description A Services Description What Is a protocol ? The network Edge Access Networks Physical Media The network Core Packet Switching Circuit Switching A network of Networks Delay, Loss, and Throughput in Packet-Switched Networks Overview of Delay in Packet-Switched Networks Queuing Delay and Packet Loss End-to-End Delay Throughput in Computer Networks protocol Layers and Their Service Models Layered Architecture Encapsulation Networks Under Attack History of Computer Networking and the internet The Development of Packet Switching: 1961 1972 Proprietary Networks and Internetworking: 1972 1980 A Proliferation of Networks: 1980 1990 The internet Explosion: The 1990s The New Millennium Summary Homework Problems and Questions Wireshark Lab Chapter 2 Application Layer Principles of network Applications network Application Architectures Processes Communicating Transport Services Available to Applications Transport Services Provided by the internet Application-Layer Protocols network Applications Covered in This Book The Web and HTTP Overview of HTTP Non-Persistent and Persistent Connections HTTP Message Format User-Server Interaction: Cookies Web Caching HTTP/2 Electronic Mail in the internet SMTP Mail Message Formats Mail Access Protocols DNS The internet s Directory Service Services Provided by DNS Overview of How DNS Works DNS Records and Messages Peer-to-Peer Applications P2P File Distribution Video Streaming and Content Distribution Networks internet Video HTTP Streaming and DASH Content Distribution Networks Case Studies.

2 Netflix, YouTube, and Kankan Socket programming : Creating network Applications Socket programming with UDP Socket programming with TCP Summary Homework Problems and Questions Socket programming Assignments Wireshark Labs: HTTP, DNS Chapter 3 Transport Layer Introduction and Transport-Layer Services Relationship Between Transport and network Layers Overview of the Transport Layer in the internet Multiplexing and Demultiplexing Connectionless Transport: UDP UDP Segment Structure UDP Checksum Principles of Reliable Data Transfer Building a Reliable Data Transfer protocol Pipelined Reliable Data Transfer Protocols Go-Back-N (GBN) Selective Repeat (SR) Connection-Oriented Transport: TCP The TCP Connection TCP Segment Structure Round-Trip Time Estimation and Timeout Reliable Data Transfer Flow Control TCP Connection Management Principles of Congestion Control The Causes and the Costs of Congestion Approaches to Congestion Control TCP Congestion Control Classic TCP congestion Control network -Assisted Explicit Congestion Notification and Delay-based Congestion Control Fairness Evolution of transport-layer functionality Summary Homework Problems and Questions programming Assignments Wireshark Labs: Exploring TCP, UDP Chapter 4 The network Layer: Data Plane Overview of network Layer Forwarding and Routing: The network Data and Control Planes network Service Models What s Inside a Router?

3 Input Port Processing and Destination-Based Forwarding Switching Output Port Processing Where Does Queuing Occur? Packet Scheduling The internet protocol (IP): IPv4, Addressing, IPv6, and More IPv4 Datagram Format IPv4 Addressing network Address Translation (NAT) IPv6 Generalized Forwarding and SDN Match Action OpenFlow Examples of Match-plus-action in Action Middleboxes Summary Homework Problems and Questions Wireshark Lab: IP Chapter 5 The network Layer: Control Plane Introduction Routing Algorithms The Link-State (LS) Routing Algorithm The Distance-Vector (DV) Routing Algorithm Intra-AS Routing in the internet : OSPF Routing Among the ISPs: BGP The Role of BGP Advertising BGP Route Information Determining the Best Rou tes IP-Anycast Routing Policy Putting the Pieces Together: Obtaining internet Presence The SDN Control Plane The SDN Control Plane: SDN Controller and SDN Control Applications OpenFlow protocol Data and Control Plane Interaction: An Example SDN: Past and Future ICMP.

4 The internet Control Message protocol network Management, SNMP, and NETCONF/YANG The network Management Framework The Simple network Management protocol (SNMP) and the Management Information Base (MIB) NETCONF and YANG Summary Homework Problems and Questions Socket programming Assignment programming Assignment Wireshark Lab: ICMP Chapter 6 The Link Layer and LANs Introduction to the Link Layer The Services Provided by the Link Layer Where Is the Link Layer Implemented? Error-Detection and -Correction Techniques Parity Checks Checksumming Methods Cyclic Redundancy Check (CRC) Multiple Access Links and Protocols Channel Partitioning Protocols Random Access Protocols Taking-Turns Protocols DOCSIS: The Link-Layer protocol for Cable internet Access Switched Local Area Networks Link-Layer Addressing and ARP Ethernet Link-Layer Switches Virtual Local Area Networks (VLANs) Link Virtualization: A network as a Link Layer Multiprotocol Label Switching (MPLS) Data Center Networking Data Center Architectures Trends in Data Center Networking Retrospective: A Day in the Life of a Web Page Request Getting Started: DHCP, UDP, IP, and Ethernet Still Getting Started: DNS and ARP Still Getting Started: Intra-Domain Routing to the DNS Server Web Client-Server Interaction: TCP and HTTP Summary Homework Problems and Questions Wireshark Labs.

5 Ethernet and Home Networking Chapter 7 Wireless and Mobile Networks Introduction Wireless Links and network Characteristics CDMA Wireless LANs The Architecture The MAC protocol The IEEE Frame Mobility in the Same IP Subnet Advanced Features in Bluetooth Cellular Networks: 4G and 5G An Overview of Cellular network Architecture 4G: LTE 5G Mobility Management: Principles Device mobility: a network -layer perspective Home Networks and Roaming on Visited Networks Direct and Indirect Routing to/from a Mobile Device Mobility Management in Practice Mobility Management in 4G/5G Networks Mobile IP Wireless and Mobility: Impact on Higher-Layer Protocols Summary Homework Problems and Questions Wireshark Lab: Chapter 8 Security in Computer Networks What Is network Security? Principles of Cryptography Symmetric Key Cryptography Public Key Encryption Message Integrity and Digital Signatures Cryptographic Hash Functions Message Authentication Code Digital Signatures End-Point Authentication Building an Authentication protocol Securing E-Mail Secure E-Mail PGP Securing TCP Connections: SSL The Big Picture A More Complete Picture network -Layer Security: IPsec and Virtual Private Networks IPsec and Virtual Private Networks (VPNs) The AH and ESP Protocols Security Associations The IPsec Datagram IKE: Key Management in IPsec Securing Wireless LANs and 4G/5G Cellular Networks Authentication and Key Agreement in Wireless LANs Authentication and Key Agreement in 4G/5G Cellular Networks Operational Security: Firewalls and Intrusion Detection Systems Firewalls Intrusion Detection Systems Summary Homework Problems and Questions Wireshark Lab: SSL IPsec Lab


Related search queries