Data communications and networking / Behrouz A. Forouzan with Sophia Chung Fegan
By: Forouzan, Behrouz A
Contributor(s): Fegan, Sophia Chung
Material type:
Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Centeral Library Second Floor - Computer Sciences | 004.6 F.B.D 2004 (Browse shelf) | Available | 9698-2 | |
![]() |
Centeral Library Second Floor - Computer Sciences | 004.6 F.B.D 2004 (Browse shelf) | Available | 9698-3 | |
![]() |
Centeral Library Second Floor - Computer Sciences | 004.6 F.B.D 2004 (Browse shelf) | Available | 9698-4 | |
![]() |
Centeral Library Second Floor - Computer Sciences | 004.6 F.B.D 2004 (Browse shelf) | Available | 3410 | |
![]() |
Centeral Library Second Floor - Computer Sciences | 004.6 F.B.D 2004 (Browse shelf) | Available | 4444 |
Includes bibliographical references and index
Overview of Data Communications and Networking -- Introduction -- Protocol Stack and Network Models -- Physical Layer -- Signals -- Digital Transmission -- Analog Transmission -- Multiplexing -- Transmission Media -- Circuit Switching and Telephone Network -- High-Speed Digital Access: DSL, Cable Modems, and SONET -- Data Link Layer -- Error Detection and Correction -- Data Link Control and Protocols -- Point-to-Point Access: PPP -- Multiple Access -- Local Area Networks: Ethernet -- Wireless LANs -- Connecting LANs, Backbone Networks, and Virtual LANs -- Cellular Telephone and Satellite Networks -- Virtual Circuit Switching: Frame Relay and ATM -- Network Layer -- Host-to-Host Delivery: Internetworking, Addressing, and Routing -- Network Layer Protocols: ARP, IPv4, ICMP, IPv6, and ICMPv6 -- Unicast and Multicast Routing: Routing Protocols -- Transport Layer -- Process-to-Process Delivery: UDP and TCP -- Congestion Control and Quality of Service -- Application Layer -- Client-Server Model: Socket Interface -- Domain Name System (DNS) -- Electronic Mail (SMTP) and File Transfer (FTP) -- HTTP and WWW -- Multimedia -- Security -- Cryptography -- Message Security, User Authentication, and Key Management -- Security Protocols in the Internet
There are no comments on this title.