Cart
Free US shipping over $10
Proud to be B-Corp

Computer Networks Larry L. Peterson

Computer Networks By Larry L. Peterson

Computer Networks by Larry L. Peterson


$4.49
Condition - Good
Only 1 left

Summary

Includes material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, VPNs, IP-Telephony, network security, and multimedia communications (SIP, SDP). This title also features specific protocol references, C-code examples, and end-of-chapter exercises.

Faster Shipping

Get this product faster from our US warehouse

Computer Networks Summary

Computer Networks: A Systems Approach by Larry L. Peterson

In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible conceptual foundation on which to understand current networking technologies, as well as the new ones that will quickly take their place. Incorporating instructor and user feedback, this edition has also been fully updated and includes all-new material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, and more. As in the past, all instruction is rigorously framed by problem statements and supported by specific protocol references, C-code examples, and thought-provoking end-of-chapter exercises. New to the edition is a downloadable network stimulation lab manual that allows students to visualize and experiment with core networking technologies in direct coordination with the book's discussion. Thanks to this and many other enhancements, "Computer Networks: A Systems Approach" remains an essential resource for a successful classroom experience and a rewarding career in networking. It is written by an author team with over thirty years of first-hand experience in networking research, development, and teaching - two leaders in the work of defining and implementing many of the protocols discussed in the book. It includes all-new coverage and updated material on MPLS and switching, wireless and mobile technology, peer-to-peer networks, Ipv6, overlay and content distribution networks, VPNs, IP-Telephony, network security, and multimedia communications (SIP, SDP). There is additional and earlier focus on applications in this edition makes core protocols more accessible and more meaningful to readers already familiar with networked applications. It features chapter-framing statements, over 400 end-of-chapter exercises, example exercises(with solutions), shaded sidebars covering advanced topics, web resources and other proven pedagogical features. Through a companion Web site, it provides many additional resources, including a downloadable network simulation lab manual tightly integrated with the topics in the book.

Computer Networks Reviews

"This third edition represents another major upgrade...But it has not lost track of its larger goal, to tell you not only the facts but the why behind the facts...What this book will teach you in today's networked world will give the insight needed to work in tomorrow's landscape." -From the Foreword by David Clark, Massachusetts Institute of Technology "This book is valuable for students and professionals. Thanks to its various enhancements, it is unquestionably a rich resource of knowledge on networking technologies. The interesting way the authors wrote it causes readers to be absorbed in the book." - IEEE Communications Magazine - Rafal Stankiewicz

About Larry L. Peterson

Larry L. Peterson is a Professor of Computer Science at Princeton University. He has been involved in the design and evaluation of several network protocols, as well as the x-kernel and Scout operating systems. He is Editor-in-Chief of ACM Transactions on Computer Systems, has served on program committees for SOSP, SIGCOMM, OSDI, and ASPLOS, and is a member of the Internet's End-to-End Research Group. Bruce Davie joined Cisco Systems in 1995, and was awarded recognition as a Cisco Fellow in 1998. He leads an architecture group with responsibility for the development of Multiprotocol Label Switching (MPLS) and Quality of Service (QoS) capabilities for IP networks. He has more than 15 years of networking and communications industry experience. Some of his most prominent contributions to the industry include authoring numerous books, RFCs, journal articles, and conference papers on IP networking. He is also an active participant in both the Internet Engineering Task Force and the Internet Research Task Force, and is a senior member of the IEEE. Prior to joining Cisco, Bruce worked at Bell Communications Research (Bellcore) and led a number of networking research projects as director of internetworking research and chief scientist. He holds a Ph.D. in Computer Science from Edinburgh University and a B.E. from the University of Melbourne. Computer Networks: A Systems Approach (Morgan Kaufmann), numerous journal articles, eleven RFCs, conference papers, and invited book chapters, Davie is an active participant of the IRTF and the IETF.

Table of Contents

Foreword, David Clark, MIT Preface SIMULATION LAB 0: INTRODUCTION AND SAMPLE EXPERIMENT 1 Foundation 1.1 Applications 1.2 Requirements 1.2.1 Connectivity 1.2.2 Cost-Effective Resource Sharing 1.2.3 Support for Common Services 1.3 Network Architecture 1.3.1 Layering and Protocols 1.3.2 OSI Architecture 1.3.3 Internet Architecture 1.4 Implementing Network Software 1.4.1 Application Programming Interface (Sockets) 1.4.2 Example Application 1.4.3 Protocol Implementation Issues 1.5 Performance 1.5.1 Bandwidth and Latency 1.5.2 Delay _ Bandwidth Product 1.5.3 High-Speed Networks 1.5.4 Application Performance Needs 1.6 Summary Further Reading Exercises 2 Direct Link Networks SIMULATION LAB 1: ETHERNETA Direct Link Network with Media Access Control SIMULATION LAB 2: TOKEN RINGSA Direct Link Network with Media Access Control 2.1 Hardware Building Blocks 2.1.1 Nodes 2.1.2 Links 2.2 Encoding (NRZ, NRZI, Manchester, 4B/5B) 2.3 Framing 2.3.1 Byte-Oriented Protocols (BISYNC, PPP, DDCMP) 2.3.2 Bit-Oriented Protocols (HDLC) 2.3.3 Clock-Based Framing (SONET) 2.4 Error Detection 2.4.1 Two-Dimensional Parity 2.4.2 Internet Checksum Algorithm 2.4.3 Cyclic Redundancy Check 2.5 Reliable Transmission 2.5.1 Stop-and-Wait 2.5.2 Sliding Window 2.5.3 Concurrent Logical Channels 2.6 Ethernet (802.3) 2.6.1 Physical Properties 2.6.2 Access Protocol 2.6.3 Experience with Ethernet 2.7 Token Rings (802.5, FDDI) 2.7.1 Physical Properties 2.7.2 Token Ring Media Access Control 2.7.3 Token Ring Maintenance 2.7.4 Frame Format 2.7.5 FDDI 2.8 Wireless (802.11) 2.8.1 Physical Properties 2.8.2 Collision Avoidance 2.8.3 Distribution System 2.8.4 Frame Format 2.9 Network Adaptors 2.9.1 Components 2.9.2 View from the Host 2.9.3 Memory Bottleneck 2.10 Summary Further Reading Exercises 3 Packet Switching SIMULATION LAB 3: SWITCHED LANSA Set of Local Area Networks Interconnected by Switches SIMULATION LAB 4: NETWORK DESIGNPlanning a Network with Different Users, Hosts, and Services SIMULATION LAB 5: ATMA Connection-Oriented, Cell-Switching Technology 3.1 Switching and Forwarding 3.1.1 Datagrams 3.1.2 Virtual Circuit Switching 3.1.3 Source Routing 3.2 Bridges and LAN Switches 3.2.1 Learning Bridges 3.2.2 Spanning Tree Algorithm 3.2.3 Broadcast and Multicast 3.2.4 Limitations of Bridges 3.3 Cell Switching (ATM) 3.3.1 Cells 3.3.2 Segmentation and Reassembly 3.3.3 Virtual Paths 3.3.4 Physical Layers for ATM 3.3.5 ATM in the LAN 3.4 Implementation and Performance 3.4.1 Ports 3.4.2 Fabrics 3.5 Summary Further Reading Exercises 4 Internetworking SIMULATION LAB 6: Routing Information Protocol Based on Distance-Vector Algorithm SIMULATION LAB 7: OSPFA Routing Protocol Based on Link-State Algorithm 4.1 Simple Internetworking (IP) 4.1.1 What Is an Internetwork? 4.1.2 Service Model 4.1.3 Global Addresses 4.1.4 Datagram Forwarding in IP 4.1.5 Address Translation (ARP) 4.1.6 Host Configuration (DHCP) 4.1.7 Error Reporting (ICMP) 4.1.8 Virtual Networks and Tunnels 4.2 Routing 4.2.1 Network as a Graph 4.2.2 Distance Vector (RIP) 4.2.3 Link State (OSPF) 4.2.4 Metrics 4.2.5 Routing for Mobile Hosts 4.3 Global Internet 4.3.1 Subnetting 4.3.2 Classless Routing (CIDR) 4.3.3 Interdomain Routing (BGP) 4.3.4 Routing Areas 4.3.5 IP version 6 (IPv6) 4.4 Multicast 4.4.1 Link-State Multicast 4.4.2 Distance-Vector Multicast 4.4.3 Protocol Independent Multicast (PIM) 4.5 Multiprotocol Label Switching (MPLS) 4.5.1 Destination-Based Forwarding 4.5.2 Explicit Routing 4.5.3 Virtual Private Networks and Tunnels 4.6 Summary Further Reading Exercises 5 End-to-End Protocols SIMULATION LAB 8: TCPA Reliable, Connection-Oriented, Byte-Stream Service 5.1 Simple Demultiplexer (UDP) 5.2 Reliable Byte Stream (TCP) 5.2.1 End-to-End Issues 5.2.2 Segment Format 5.2.3 Connection Establishment and Termination 5.2.4 SlidingWindow Revisited 5.2.5 Triggering Transmission 5.2.6 Adaptive Retransmission 5.2.7 Record Boundaries 5.2.8 TCP Extensions 5.2.9 Alternative Design Choices 5.3 Remote Procedure Call 5.3.1 Bulk Transfer (BLAST) 5.3.2 Request/Reply (CHAN) 5.3.3 Dispatcher (SELECT) 5.3.4 Putting It All Together (SunRPC, DCE) 5.4 Performance 5.5 Summary Further Reading Exercises 6 Congestion Control and Resource Allocation SIMULATION LAB 9: QUEUING DISCIPLINESOrder of Packets Transmission and Dropping SIMULATION LAB 10: QUALITY OF SERVICEPacket Delivery Guarantees 6.1 Issues in Resource Allocation 6.1.1 Network Model 6.1.2 Taxonomy 6.1.3 Evaluation Criteria 6.2 Queuing Disciplines 6.2.1 FIFO 6.2.2 Fair Queuing 6.3 TCP Congestion Control 6.3.1 Additive Increase/Multiplicative Decrease 6.3.2 Slow Start 6.3.3 Fast Retransmit and Fast Recovery 6.4 Congestion-Avoidance Mechanisms 6.4.1 DECbit 6.4.2 Random Early Detection (RED) 6.4.3 Source-Based Congestion Avoidance 6.5 Quality of Service 6.5.1 Application Requirements 6.5.2 Integrated Services (RSVP) 6.5.3 Differentiated Services (EF) 6.5.4 ATM Quality of Service 6.5.5 Equation-Based Congestion Control 6.6 Summary Further Reading Exercises 7 End-to-End Data 7.1 Presentation Formatting 7.1.1 Taxonomy 7.1.2 Examples (XDR, ASN.1, NDR) 7.1.3 Markup Languages (XML) 7.2 Data Compression 7.2.1 Lossless Compression Algorithms 7.2.2 Image Compression (JPEG) 7.2.3 Video Compression (MPEG) 7.2.4 Transmitting MPEG over a Network 7.2.5 Audio Compression (MP3) 7.3 Summary Further Reading Exercises 8 Network Security SIMULATION LAB 11: FIREWALLS AND VPNSNetwork Security and Virtual Private Networks 8.1 Cryptographic Algorithms 8.1.1 Requirements 8.1.2 Secret Key Encryption (DES) 8.1.3 Public Key Encryption (RSA) 8.1.4 Message Digest Algorithms (MD5) 8.1.5 Implementation and Performance 8.2 Security Mechanisms 8.2.1 Authentication Protocols 8.2.2 Message Integrity Protocols 8.2.3 Public Key Distribution (X.509) 8.3 Example Systems 8.3.1 Pretty Good Privacy (PGP) 8.3.2 Secure Shell (SSH) 8.3.3 Transport Layer Security (TLS, SSL, HTTPS) 8.3.4 IP Security (IPSEC) 8.4 Firewalls 8.4.1 Filter-Based Firewalls 8.4.2 Proxy-Based Firewalls 8.4.3 Limitations 8.5 Summary Further Reading Exercises 9 Applications SIMULATION LAB 12: APPLICATIONSNetwork Applications Performance Analysis 9.1 Name Service (DNS) 9.1.1 Domain Hierarchy 9.1.2 Name Servers 9.1.3 Name Resolution 9.2 Traditional Applications 9.2.1 Electronic Mail (SMTP, MIME, IMAP) 9.2.2 World Wide Web (HTTP) 9.2.3 Network Management (SNMP) 9.3 Multimedia Applications 9.3.1 Real-time Transport Protocol (RTP) 9.3.2 Session Control and Call Control (SDP, SIP, H.323) 9.4 Overlay Networks 9.4.1 Routing Overlays 9.4.2 Peer-to-Peer Networks 9.4.3 Content Distribution Networks 9.5 Summary Further Reading Exercises Glossary Bibliography Solutions to Select Exercises

Additional information

CIN155860832XG
9781558608320
155860832X
Computer Networks: A Systems Approach by Larry L. Peterson
Used - Good
Hardback
Elsevier Science & Technology
2003-05-27
813
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Computer Networks