Computer Networking: A Top-Down Approach

https://eclass.teicrete.gr/modules/document/file.php/TP326/%CE%98%CE%B5%CF%89%CF%81%CE%AF%CE%B1%20(Lectures)/Computer_Networking_A_Top-Down_Approach.pdf

Chapter 1. Computer Network and the Internet

  • 1.1 What Is the Internet?

  • 1.2 The Network Edge

  • 1.3 The Network Core

  • 1.4 Delay, Loss, and Throughput in Packet-Switched Networks

  • 1.5 Protocol Layers and Their Service Models

  • 1.6 Networks Under Attack

  • 1.7 History of Computer Networking and the Internet

  • 1.8 Summary

Chapter 2. Application Layer

  • 2.1 Principles of Network Applications

  • 2.2 The Web and HTTP

  • 2.3 File Transfer: FTP

  • 2.4 Electronic Mail in the Internet

  • 2.5 DNS - The Internet's Directory Service

  • 2.6 Peer-to-Peer Applications

  • 2.7 Socket Programming: Creating Network Applications

  • 2.8 Summary

Chapter 3. Transport Layer

  • 3.1 Introduction and Transport-Layer Services

  • 3.2 Multiplexing and Demultiplexing

  • 3.3 Connectionless Transport: UDP

  • 3.4 Principles of Reliable Data Transfer

  • 3.5 Connection-Oriented Transport: TCP

  • 3.6 Principles of Congestion Control

  • 3.7 TCP Congestion Control

  • 3.8 Summary

Chapter 4. The Network Layer

  • 4.1 Introduction

  • 4.2 Virtual Circuit and Datagram Networks

  • 4.3 What's Inside a Router?

  • 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet

  • 4.5 Routing Algorithms

  • 4.6 Routing in the Internet

  • 4.7 Broadcast and Multicast Routing

  • 4.8 Summary

  • 5.1 Introduction to the Link Layer

  • 5.2 Error-Detection and -Correction Techniques

  • 5.3 Multiple Access Links and Protocols

  • 5.4 Switches Local Area Networks

  • 5.5 Link Virtualization: A Network as a Link Layer

  • 5.6 Data Center Networking

  • 5.7 Retrospective: A Day in the Life of a Web Page Request

  • 5.8 Summary

Chapter 6. Wireless and Mobile Networks

  • 6.1 Introduction

  • 6.2 Wireless Links and Network Characteristics

  • 6.3 WiFi: 802.11 Wireless LANs

  • 6.4 Cellular Internet Access

  • 6.5 Mobility Management: Principles

  • 6.6 Mobile IP

  • 6.7 Managing Mobility in Cellular Networks

  • 6.8 Wireless and Mobility: Impact on Higher-Layer Protocols

  • 6.9 Summary

Chapter 7. Multimedia Networking

  • 7.1 Multimedia Networking Applications

  • 7.2 Streaming Stored Video

  • 7.3 Voice-over-IP

  • 7.4 Protocols for Real-Time Conversational Applications

  • 7.5 Network Support for Multimedia

  • 7.6 Summary

Chapter 8. Security in Computer Networks

  • 8.1 What is network security?

  • 8.2 Principles of Cryptography

  • 8.3 Message Integrity and Digital Signatures

  • 8.4 End-Point Authentication

  • 8.5 Securing E-Mail

  • 8.6 Securing TCP Connections: SSL

  • 8.7 Network-Layer Security: IPsec and Virtual Private Networks

  • 8.8 Securing Wireless LANs

  • 8.9 Operational Security: Firewalls and Intrusion Detection Systems

  • 8.10 Summary

Chapter 9. Network Management

  • 9.1 What is Network Management?

  • 9.2 The Infrastructure for Network Management

  • 9.3 The Internet-Standard Management Framework

  • 9.4 ASN.1

  • 9.5 Conclusion

Last updated