Computer networks / Andrew S. Tanenbaum, David J. Wetherall.
Publisher: Boston : Pearson Prentice Hall, 2011Copyright date: © 2011Edition: 5th edDescription: xxii, 933 p. : ill. ; 24 cmContent type:- text
- unmediated
- volume
- 9780132126953 (alk. paper)
- 0132126958 (alk. paper)
| Item type | Current library | Home library | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA KOLEKSI AM-P. LINGKUNGAN KEDUA | TK5105.5.T36 2011 3 (Browse shelf(Opens below)) | 1 | Available | 00002125237 |
Includes bibliographical references and index.
Uses of computer networks -- network hardware -- Network software -- Reference models -- Example networks -- Network standardization -- Metric units -- The theoretical basis for data communication -- Guided transmission media -- wireless transmission -- Communication satellites -- Digital modulation and multiplexing -- The public switched telephone network - The mobile telephone system -- Cable television -- Data link layer design issues -- Error detection and correction -- Elementary data link protocols -- Sliding window protocols -- Example data link protocols -- The channel allocation problem -- Multiple access protocols -- Ethernet -- Wireless lans -- Broadband wireless -- Bluetooth -- RFID -- Data link layer switching -- Network layer design issues -- Routing algorithms -- Congestion control algorithms -- Quality of service -- Internetworking -- The network layer in the internet -- The transport service -- Elements of transport protocols -- Congestion control -- The internet transport protocols: UDP -- The internet transport protocols: TCP -- Performance issues -- Delay-tolerant networking -- DNS-The domain name system -- Electronic mail -- The world wide web -- Streaming audio and video -- Content delivery -- Cryptography -- Symmetric-key algorithms -- Public-key algorithms -- Digital signatures -- Management of public keys -- Communication security -- Authentication protocols -- Email security -- Web security -- Social issues.
There are no comments on this title.
