TY - BOOK AU - Tanenbaum,Andrew S. TI - Computer networks SN - 0130661023 AV - TK5105.5 .T36 2003 U1 - 004.6 21 PY - 2003/// CY - Upper Saddle River, NJ PB - Prentice Hall PTR KW - Computer networks KW - Bilgisayar a��lar�� N1 - Includes bibliographical references (pages 835-868) and index; 1; Introduction --; 1.1; Uses of Computer Networks --; 1.2; Network Hardware --; 1.3; Network Software --; 1.4; Reference Models --; 1.5; Example Networks --; 1.6; Network Standardization --; 1.7; Metric Units --; 1.8; Outline of the Rest of the Book --; 2; Physical Layer --; 2.1; Theoretical Basis for Data Communication --; 2.2; Guided Transmission Media --; 2.3; Wireless Transmission --; 2.4; Communication Satellites --; 2.5; Public Switched Telephone Network --; 2.6; Mobile Telephone System --; 2.7; Cable Television --; 3; Data Link Layer --; 3.1; Data Link Layer Design Issues --; 3.2; Error Detection and Correction --; 3.3; Elementary Data Link Protocols --; 3.4; Sliding Window Protocols --; 3.5; Protocol Verification --; 3.6; Example Data Link Protocols --; 4; Medium Access Control Sublayer --; 4.1; Channel Allocation Problem --; 4.2; Multiple Access Protocols --; 4.3; Ethernet --; 4.4; Wireless Lans --; 4.5; Broadband Wireless --; 4.6; Bluetooth --; 4.7; Data Link Layer Switching --; 5; Network Layer --; 5.1; Network Layer Design Issues --; 5.2; Routing Algorithms --; 5.3; Congestion Control Algorithms --; 5.4; Quality of Service --; 5.5; Internetworking --; 5.6; Network Layer in the Internet --; 6; Transport Layer --; 6.1; Transport Service --; 6.2; Elements of Transport Protocols --; 6.3; Simple Transport Protocol --; 6.4; Internet Transport Protocols: UDP --; 6.5; Internet Transport Protocols: TCP --; 6.6; Performance Issues --; 7; Application Layer --; 7.1; DNS -- The Domain Name System --; 7.2; Electronic Mail --; 7.3; World Wide Web --; 7.4; Multimedia --; 8; Network Security --; 8.1; Cryptography --; 8.2; Symmetric-Key Algorithms --; 8.3; Public-Key Algorithms --; 8.4; Digital Signatures --; 8.5; Management of Public Keys; 8.7; Authentication Protocols --; 8.8; E-mail Security --; 8.9; Web Security --; 8.10; Social Issues --; 9; Reading List and Bibliography --; 9.1; Suggestions for Further Reading --; 9.2; Alphabetical Bibliography N2 - Details descriptions of the principles associated with each layer and presents many examples drawn the Internet and wireless networks ER -