Contents Menu Expand Light mode Dark mode Auto light/dark mode
Computer Networks: A Systems Approach Version 6.2-dev documentation
Computer Networks: A Systems Approach Version 6.2-dev documentation

Table of Contents

  • Foreword
  • Foreword to the First Edition
  • Preface
  • Chapter 1: Foundation
    • Problem: Building a Network
    • 1.1 Applications
    • 1.2 Requirements
    • 1.3 Architecture
    • 1.4 Software
    • 1.5 Performance
    • Perspective: Feature Velocity
  • Chapter 2: Direct Links
    • Problem: Connecting to a Network
    • 2.1 Technology Landscape
    • 2.2 Encoding
    • 2.3 Framing
    • 2.4 Error Detection
    • 2.5 Reliable Transmission
    • 2.6 Multi-Access Networks
    • 2.7 Wireless Networks
    • 2.8 Access Networks
    • Perspective: Race to the Edge
  • Chapter 3: Internetworking
    • Problem: Not All Networks are Directly Connected
    • 3.1 Switching Basics
    • 3.2 Switched Ethernet
    • 3.3 Internet (IP)
    • 3.4 Routing
    • 3.5 Implementation
    • Perspective: Virtual Networks All the Way Down
  • Chapter 4: Advanced Internetworking
    • Problem: Scaling to Billions
    • 4.1 Global Internet
    • 4.2 IP Version 6
    • 4.3 Multicast
    • 4.4 Multiprotocol Label Switching
    • 4.5 Routing Among Mobile Devices
    • Perspective: The Cloud is Eating the Internet
  • Chapter 5: End-to-End Protocols
    • Problem: Getting Processes to Communicate
    • 5.1 Simple Demultiplexor (UDP)
    • 5.2 Reliable Byte Stream (TCP)
    • 5.3 Remote Procedure Call
    • 5.4 Transport for Real-Time (RTP)
    • Perspective: HTTP is the New Narrow Waist
  • Chapter 6: Congestion Control
    • Problem: Allocating Resources
    • 6.1 Issues in Resource Allocation
    • 6.2 Queuing Disciplines
    • 6.3 TCP Congestion Control
    • 6.4 Advanced Congestion Control
    • 6.5 Quality of Service
    • Perspective: Software-Defined Traffic Engineering
  • Chapter 7: End-to-End Data
    • Problem: What Do We Do with the Data?
    • 7.1 Presentation Formatting
    • 7.2 Multimedia Data
    • Perspective: Big Data and Analytics
  • Chapter 8: Network Security
    • Problem: Security Attacks
    • 8.1 Trust and Threats
    • 8.2 Cryptographic Building Blocks
    • 8.3 Key Predistribution
    • 8.4 Authentication Protocols
    • 8.5 Example Systems
    • Perspective: Is Security Getting Worse or Better?
  • Chapter 9: Applications
    • Problem: Applications Need Their Own Protocols
    • 9.1 Traditional Applications
    • 9.2 Multimedia Applications
    • 9.3 Infrastructure Applications
    • 9.4 Overlay Networks
    • Perspective: The Cloud is the New Internet
  • About This Book
  • Read the Latest!
  • Print Copies
Back to top

Print Copies#

We make all books in the Systems Approach series available as both print and e-books. This book is available via Amazon: Computer Networks: A Systems Approach

Book Series: Also check out our companion books that cover emerging topics in more depth.

  • Software-Defined Networks: A Systems Approach

  • TCP Congestion Control: A Systems Approach

  • Edge Cloud Operations: A Systems Approach

  • Private 5G: A Systems Approach

As participants in the Amazon Associate program we may earn income from qualifying purchases using the links above.

Previous
Read the Latest!
Copyright © 2024
Made with Sphinx and @pradyunsg's Furo