Computer Networking: A Top-down ApproachChapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.2 The Network Edge 1.3 The Network Core 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.5 Protocol Layers and Their Service Models 1.6 Networks Under Attack 1.7 History of Computer Networking and the Internet 1.8 Summary Chapter 2 Application Layer 2.1 Principles of Network Applications 2.2 The Web and HTTP 2.3 File Transfer: FTP 2.4 Electronic Mail in the Internet 2.5 DNS--The Internet's Directory Service 2.6 Peer-to-Peer Applications 2.7 Socket Programming with TCP 2.8 Socket Programming with UDP 2.9 Summary Chapter 3 Transport Layer 3.1 Introduction and Transport-Layer Services 3.2 Multiplexing and Demultiplexing 3.3 Connectionless Transport: UDP 3.4 Principles of Reliable Data Transfer 3.5 Connection-Oriented Transport: TCP 3.6 Principles of Congestion Control 3.7 TCP Congestion Control 3.8 Summary Chapter 4 The Network Layer 4.1 Introduction 4.2 Virtual Circuit and Datagram Networks 4.3 What's Inside a Router? 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7 Broadcast and Multicast Routing 4.8 Summary Chapter 5 The Link Layer and Local Area Networks 5.1 Link Layer: Introduction and Services 5.2 Error-Detection and -Correction Techniques 5.3 Multiple Access Protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-Layer Switches 5.7 PPP: The Point-to-Point Protocol 5.8 Link Virtualization: A Network as a Link Layer 5.9 Summary Chapter 6 Wireless and Mobile Networks 6.1 Introduction 6.2 Wireless Links and Network Characteristics 6.3 WiFi: 802.11 Wireless LANs 6.4 Cellular Internet Access 6.5 Mobility Management: Principles 6.6 Mobile IP 6.7 Managing Mobility in Cellular Networks 6.8 Wireless and Mobility: Impact on Higher-layer Protocols 6.9 Summary Chapter 7 Multimedia Networking 7.1 Multimedia Networking Applications 7.2 Streaming Stored Audio and Video 7.3 Making the Best of the Best-Effort Service 7.4 Protocols for Real-Time Interactive Applications 7.5 Providing Multiple Classes of Service 7.6 Providing Quality of Service Guarantees 7.7 Summary Chapter 8 Security in Computer Networks 8.1 What Is Network Security? 8.2 Principles of Cryptography 8.3 Message Integrity 8.4 End-Point Authentication 8.5 Securing E-mail 8.6 Securing TCP Connections: SSL 8.7 Network-Layer Security: IPsec 8.8 Securing Wireless LANs 8.9 Operational Security: Firewalls and Intrusion Detection Systems 8.10 Summary Chapter 9 Network Management 9.1 What Is Network Management? 9.2 The Infrastructure for Network Management 9.3 The Internet-Standard Management Framework 9.4 ASN.1 9.5 Conclusion References Index. |