Weiter zum Inhalt
Bibliothekskatalog
  • Temporäre Merkliste: 0 temporär gemerkt (Ihre Merkliste ist voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Erklärvideos
  • Weitere Angebote
    • Anschaffungswunsch
    • Semesterapparat
    • Suchhistorie
    • Fernleihe
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren / Gebühren
    • Persönliche Angaben
    • Suchhistorie
  • Log out
  • Login
  • Medien
  • Aufsätze
Erweitert
  • Computer networking
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach Citavi
  • dauerhaft merken
  • temporär merken Aus der Merkliste entfernen
  • Permalink
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Titel:Computer networking
a top-down approach
Von: James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand
Person: Kurose, James F.
1956-
Verfasser
aut
Ross, Keith W.
Anand, Bhojan
Sonstige
Hauptverfassende: Kurose, James F. 1956- (VerfasserIn), Ross, Keith W. 1956- (VerfasserIn)
Format: Buch
Sprache:Englisch
Veröffentlicht: Boston, MA Pearson Addison-Wesley 2008
Ausgabe:4. ed., Pearson internat. ed., [paperback ed.]
Schlagworte:
Internet
Multimédias
Poste à poste (Internet)
Protocoles de réseaux d'ordinateurs
Réseaux d'ordinateurs - Mesures de sûreté
Réseaux d'ordinateurs
Systèmes de communication sans fil
Computer networks
Redes de computadores
Kommunikationsprotokoll
Transportschicht
Rechnernetz
Netzwerk
Computer
Faseroptik
Lehrbuch
Online-Zugang:http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016420967&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Beschreibung:878 S. Ill., graph. Darst.
ISBN:9780321513250
0321513258
Internformat

MARC

LEADER 00000nam a2200000zc 4500
001 BV023235338
003 DE-604
005 20081114
007 t|
008 080402s2008 xxuad|| |||| 00||| eng d
020 |a 9780321513250  |9 978-0-321-51325-0 
020 |a 0321513258  |9 0-321-51325-8 
035 |a (OCoLC)493796538 
035 |a (DE-599)BVBBV023235338 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
044 |a xxu  |c US 
049 |a DE-703  |a DE-473  |a DE-91G  |a DE-20  |a DE-739 
050 0 |a TK5105.875.I57 
082 0 |a 004.6  |2 22 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
084 |a DAT 250f  |2 stub 
100 1 |a Kurose, James F.  |d 1956-  |e Verfasser  |0 (DE-588)123704618  |4 aut 
245 1 0 |a Computer networking  |b a top-down approach  |c James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand 
250 |a 4. ed., Pearson internat. ed., [paperback ed.] 
264 1 |a Boston, MA  |b Pearson Addison-Wesley  |c 2008 
300 |a 878 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 7 |a Internet  |2 ram 
650 7 |a Multimédias  |2 ram 
650 7 |a Poste à poste (Internet)  |2 ram 
650 7 |a Protocoles de réseaux d'ordinateurs  |2 ram 
650 7 |a Réseaux d'ordinateurs - Mesures de sûreté  |2 ram 
650 7 |a Réseaux d'ordinateurs  |2 ram 
650 7 |a Systèmes de communication sans fil  |2 ram 
650 4 |a Computer networks 
650 4 |a Internet 
650 4 |a Redes de computadores 
650 0 7 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Transportschicht  |0 (DE-588)4301518-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Netzwerk  |0 (DE-588)4171529-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Internet  |0 (DE-588)4308416-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Computer  |0 (DE-588)4070083-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Faseroptik  |0 (DE-588)4016498-6  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4123623-3  |a Lehrbuch  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Internet  |0 (DE-588)4308416-3  |D s 
689 0 |8 1\p  |5 DE-604 
689 1 0 |a Faseroptik  |0 (DE-588)4016498-6  |D s 
689 1 |8 2\p  |5 DE-604 
689 2 0 |a Netzwerk  |0 (DE-588)4171529-9  |D s 
689 2 |8 3\p  |5 DE-604 
689 3 0 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 3 |8 4\p  |5 DE-604 
689 4 0 |a Computer  |0 (DE-588)4070083-5  |D s 
689 4 |8 5\p  |5 DE-604 
689 5 0 |a Transportschicht  |0 (DE-588)4301518-9  |D s 
689 5 |8 6\p  |5 DE-604 
700 1 |a Ross, Keith W.  |d 1956-  |e Verfasser  |0 (DE-588)113704666  |4 aut 
700 1 |a Anand, Bhojan  |e Sonstige  |4 oth 
856 4 2 |m Digitalisierung UB Passau  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016420967&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 3\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 4\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 5\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 6\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-016420967 

Datensatz im Suchindex

DE-BY-TUM_call_number 0701 0014 A 467
DE-BY-TUM_katkey 1640598
DE-BY-TUM_location Mag
DE-BY-TUM_media_number 040010096183
_version_ 1821933279312347137
adam_text Table of Contents Chapter 1 Computer Networks and the Internet 27 1.1 What Is the Internet? 28 1.1.1 A Nuts-and-Bolts Description 28 1.1.2 A Services Description 31 1.1.3 What Is a Protocol? 33 1.2 The Network Edge 35 1.2.1 Client and Server Programs 38 1.2.2 Access Networks 38 1.2.3 Physical Media 45 1.3 The Network Core 48 1.3.1 Circuit Switching and Packet Switching 48 1.3.2 How Do Packets Make Their Way Through Packet-Switched Networks? 56 1.3.3 ISPs and Internet Backbones 57 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 59 1.4.1 Overview of Delay in Packet-Switched Networks 59 1.4.2 Queuing Delay and Packet Loss 63 1.4.3 End-to-End Delay 66 1.4.4 Throughput in Computer Networks 68 1.5 Protocol Layers and Their Service Models 71 1.5.1 Layered Architecture 71 1.5.2 Messages, Segments, Datagrams, and Frames 77 1.6 Networks Under Attack 79 1.7 History of Computer Networking and the Internet 84 1.7.1 The Development of Packet Switching: 1961-1972 84 1.7.2 Proprietary Networks and Internetworking: 1972-1980 86 1.7.3 A Proliferation of Networks: 1980-1990 88 1.7.4 The Internet Explosion: The 1990s 89 1.7.5 Recent Developments 90 1.8 Summary 91 Road-Mapping This Book 92 Homework Problems and Questions 93 Problems 95 Discussion Questions 101 Ethereal Lab 102 Interview: Leonard Kleinrock 103 Chapter 2 Application Layer 107 2.1 Principles of Network Applications 108 2.1.1 Network Application Architectures 108 2.1.2 Processes Communicating 111 2.1.3 Transport Services Available to Applications 114 2.1.4 Transport Services Provided by the Internet 116 2.1.5 Application-Layer Protocols 120 2.1.6 Network Applications Covered in This Book 121 2.2 The Web and HTTP 122 2.2.1 Overview of HTTP 122 2.2.2 Non-persistent and Persistent Connections 124 2.2.3 HTTP Message Format 127 2.2.4 User-Server Interaction: Cookies 132 2.2.5 Web Caching 134 2.2.6 The Conditional GET 138 2.3 File Transfer: FTP 140 2.3.1 FTP Commands and Replies 142 2.4 Electronic Mail in the Internet 142 2.4.1 SMTP 145 2.4.2 Comparison with HTTP 148 2.4.3 Mail Message Formats and MIME 149 2.4.4 Mail Access Protocols 152 2.5 DNS—The Internet s Directory Service 156 2.5.1 Services Provided by DNS 157 2.5.2 Overview of How DNS Works 159 2.5.3 DNS Records and Messages 165 2.6 Peer-to-Peer Applications 170 2.6.1 P2P File Distribution 171 2.6.2 Searching for Information in a P2P Community 177 2.6.3 Case Study: P2P Internet Telephony with Skype 183 2.7 Socket Programming with TCP . 185 2.7.1 Socket Programming with TCP 186 2.7.2 An Example Client-Server Application in Java 188 2.8 Socket Programming with UDP 195 2.9 Summary 203 Homework Problems and Questions 204 Problems 206 Discussion Questions 213 Socket Programming Assignments 214 Ethereal Labs 216 Interview: Bram Cohen 218 Chapter 3 Transport Layer 221 3.1 Introduction and Transport-Layer Services 222 3.1.1 Relationship Between Transport and Network Layers 222 3.1.2 Overview of the Transport Layer in the Internet 225 3.2 Multiplexing and Demultiplexing 227 3.3 Connectionless Transport: UDP 234 3.3.1 UDP Segment Structure 238 3.3.2 UDP Checksum 238 3.4 Principles of Reliable Data Transfer 240 3.4.1 Building a Reliable Data Transfer Protocol 242 3.4.2 Pipelined Reliable Data Transfer Protocols 251 3.4.3 Go-Back-N (GBN) 254 3.4.4 Selective Repeat (SR) 259 3.5 Connection-Oriented Transport: TCP 266 3.5.1 The TCP Connection 267 3.5.2 TCP Segment Structure 269 3.5.3 Round-Trip Time Estimation and Timeout 274 3.5.4 Reliable Data Transfer 278 3.5.5 Flow Control 286 3.5.6 TCP Connection Management 288 3.6 Principles of Congestion Control 295 3.6.1 The Causes and the Costs of Congestion 296 3.6.2 Approaches to Congestion Control 302 3.6.3 Network-Assisted Congestion-Control Example: ATM ABR Congestion Control 303 3.7 TCP Congestion Control 305 3.7.1 Fairness 313 3.8 Summary 316 Homework Problems and Questions 319 Problems 321 Discussion Questions 330 Programming Assignments 331 Ethereal Labs 331 Interview: Sally Floyd 333 Chapter 4 The Network Layer 335 4.1 Introduction 336 4.1.1 Forwarding and Routing 338 4.1.2 Network Service Models 340 4.2 Virtual Circuit and Datagram Networks 343 4.2.1 Virtual-Circuit Networks 344 4.2.2 Datagram Networks 347 4.2.3 Origins of VC and Datagram Networks 349 4.3 What s Inside a Router? 350 4.3.1 Input Ports 352 4.3.2 Switching Fabric 354 4.3.3 Output Ports 357 4.3.4 Where Does Queuing Occur? 357 4.4 The Internet Protocol (IP): Forwarding and Addressing in the Internet 360 4.4.1 Datagram Format 362 4.4.2 IPv4 Addressing 368 4.4.3 Internet Control Message Protocol (ICMP) 383 4.4.4 IPv6 386 4.4.5 A Brief Introduction into IP Security VPNs 392 4.5 Routing Algorithms 394 4.5.1 The Link-State (LS) Routing Algorithm 397 4.5.2 The Distance-Vector (DV) Routing Algorithm 401 4.5.3 Hierarchical Routing 409 4.6 Routing in the Internet 413 4.6.1 Intra-AS Routing in the Internet: RIP 414 4.6.2 Intra-AS Routing in the Internet: OSPF 418 4.6.3 Inter-AS Routing: BGP 421 4.7 Broadcast and Multicast Routing 428 4.7.1 Broadcast Routing Algorithms 429 4.7.2 Multicast 434 4.8 Summary 441 Homework Problems and Questions 442 Problems 445 Discussion Questions 455 Programming Assignment 456 Ethereal Labs . 457 Interview: Vinton G. Cerf 458 Chapter 5 The Link Layer and Local Area Networks 461 5.1 Link Layer: Introduction and Services 463 5.1.1 The Services Provided by the Link Layer 463 5.1.2 Where Is the Link Layer Implemented? 466 5.2 Error-Detection and -Correction Techniques 468 5.2.1 Parity Checks 470 5.2.2 Checksumming Methods 472 5.2.3 Cyclic Redundancy Check (CRC) 472 5.3 Multiple Access Protocols 475 5.3.1 Channel Partitioning Protocols 477 5.3.2 Random Access Protocols 479 5.3.3 Taking-Turns Protocols 486 5.3.4 Local Area Networks (LANs) 487 5.4 Link-Layer Addressing 489 5.4.1 MAC Addresses 489 5.4.2 Address Resolution Protocol (ARP) 491 5.5 Ethernet 491 5.5.1 Ethernet Frame Structure 497 5.5.2 CSMA/CD: Ethernet s Multiple Access Protocol 501 5.5.3 Ethernet Technologies 503 5.6 Link-Layer Switches 506 5.6.1 Forwarding and Filtering 507 5.6.2 Self-Learning 509 5.6.3 Properties of Link-Layer Switching 510 5.6.4 Switches Versus Routers 511 5.7 PPP: The Point-to-Point Protocol 513 5.7.1 PPP Data Framing 515 5.8 Link Virtualization: A Network as a Link Layer 517 5.8.1 Asynchronous Transfer Mode (ATM) Networks 518 5.8.2 Multiprotocol Label Switching (MPLS) 523 5.9 Summary 526 Homework Problems and Questions 527 Problems 529 Discussion Questions 534 Ethereal Labs 535 Interview: Simon S. Lam 536 Chapter 6 Wireless and Mobile Networks 539 6.1 Introduction 540 6.2 Wireless Links and Network Characteristics 545 6.2.1 CDMA 548 6.3 WiFi: 802.11 Wireless LANs 552 6.3.1 The 802.11 Architecture 553 6.3.2 The 802.11 MAC Protocol 557 6.3.3 The IEEE 802.11 Frame 563 6.3.4 Mobility in the Same IP Subnet 567 6.3.5 Advanced Features in 802.11 568 6.3.6 Beyond 802.11 : Bluetooth and WiMAX 570 6.4 Cellular Internet Access 574 6.4.1 An Overview of Cellular Architecture 574 6.4.2 Cellular Standards and Technologies: A Brief Survey 577 6.5 Mobility Management: Principles 581 6.5.1 Addressing 583 6.5.2 Routing to a Mobile Node 585 6.6 Mobile IP 590 6.7 Managing Mobility in Cellular Networks 596 6.7.1 Routing Calls to a Mobile User 597 6.7.2 Handoffs in GSM 598 6.8 Wireless and Mobility: Impact on Higher-layer Protocols 601 6.9 Summary 604 Homework Problems and Questions 605 Problems 606 Discussion Questions 610 Ethereal Labs 610 Interview: Charlie Perkins 611 Chapter 7 Multimedia Networking 615 7.1 Multimedia Networking Applications 616 7.1.1 Examples of Multimedia Applications 616 7.1.2 Hurdles for Multimedia in Today s Internet 619 7.1.3 How Should the Internet Evolve to Support Multimedia Better? 620 7.1.4 Audio and Video Compression 622 7.2 Streaming Stored Audio and Video 626 7.2.1 Accessing Audio and Video Through a Web Server 626 7.2.2 Sending Multimedia from a Streaming Server to a Helper Application 628 7.2.3 Real-Time Streaming Protocol (RTSP) 630 7.3 Making the Best of the Best-Effort Service 634 7.3.1 The Limitations of a Best-Effort Service 634 7.3.2 Removing Jitter at the Receiver for Audio 637 7.3.3 Recovering from Packet Loss 640 7.3.4 Distributing Multimedia in Today s Internet: Content Distribution Networks 644 7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service 647 7.4 Protocols for Real-Time Interactive Applications 649 7.4.1 RTP 649 7.4.2 RTP Control Protocol (RTCP) 654 7.4.3 SIP 657 7.4.4 H.323 663 7.5 Providing Multiple Classes of Service 665 7.5.1 Motivating Scenarios 666 7.5.2 Scheduling and Policing Mechanisms 671 7.5.3 Diffserv 678 7.6 Providing Quality of Service Guarantees 683 7.6.1 A Motivating Example 683 7.6.2 Resource Reservation, Call Admission, Call Setup 685 7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP 687 7.7 Summary 690 Homework Problems and Questions 691 Problems 692 Discussion Questions 699 Programming Assignment 700 Interview: Henning Schulzrinne 702 Chapter 8 Security in Computer Networks 705 8.1 What Is Network Security? 706 8.2 Principles of Cryptography 709 8.2.1 Symmetric Key Cryptography 711 8.2.2 Public Key Encryption 717 8.3 Message Integrity 722 8.3.1 Cryptographic Hash Functions 723 8.3.2 Message Authentication Code 725 8.3.3 Digital Signatures 727 8.4 End-Point Authentication 733 8.4.1 Authentication Protocol apl.O 734 8.4.2 Authentication Protocol ap2.0 735 8.4.3 Authentication Protocol арЗ.О 736 8.4.4 Authentication Protocol ap3. 1 737 8.4.5 Authentication Protocol ap4.0 737 8.4.6 Authentication Protocoladlo 739 8.5 Securing E-mail 742 8.5.1 Secure E-mail 743 8.5.2 PGP 746 8.6 Securing TCP Connections: SSL 748 8.6.1 The Big Picture 750 8.6.2 A More Complete Picture 753 8.7 Network-Layer Security: IPsec 754 8.7.1 Authentication Header (AH) Protocol 755 8.7.2 The ESP Protocol 757 8.7.3 SA and Key Management 757 8.8 Securing Wireless LANs 758 8.8.1 Wired Equivalent Privacy (WEP) 758 8.8.2 ІЕЕЕ802.Ш 761 8.9 Operational Security: Firewalls and Intrusion Detection Systems 763 8.9.1 Firewalls 763 8.9.2 Intrusion Detection Systems 770 8.10 Summary 774 Homework Problems and Questions 775 Problems 776 Discussion Questions 779 Ethereal Lab 780 Interview: Steven M. Bellovin 781 Chapter 9 Network Management 783 9.1 What Is Network Management? 784 9.2 The Infrastructure for Network Management 788 9.3 The Internet-Standard Management Framework 792 9.3.1 Structure of Management Information: SMI 794 9.3.2 Management Information Base: МІВ 798 9.3.3 SNMP Protocol Operations and Transport Mappings 801 9.3.4 Security and Administration 803 9.4 ASN.l 807 9.5 Conclusion 812 Homework Problems and Questions 813 Problems 813 Discussion Questions 814 Interview: Jeff Case 815 References 817 Index 847
any_adam_object 1
author Kurose, James F. 1956-
Ross, Keith W. 1956-
author_GND (DE-588)123704618
(DE-588)113704666
author_facet Kurose, James F. 1956-
Ross, Keith W. 1956-
author_role aut
aut
author_sort Kurose, James F. 1956-
author_variant j f k jf jfk
k w r kw kwr
building Verbundindex
bvnumber BV023235338
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.875.I57
callnumber-search TK5105.875.I57
callnumber-sort TK 45105.875 I57
callnumber-subject TK - Electrical and Nuclear Engineering
classification_rvk ST 200
classification_tum DAT 250f
ctrlnum (OCoLC)493796538
(DE-599)BVBBV023235338
dewey-full 004.6
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.6
dewey-search 004.6
dewey-sort 14.6
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 4. ed., Pearson internat. ed., [paperback ed.]
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03449nam a2200817zc 4500</leader><controlfield tag="001">BV023235338</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081114 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080402s2008 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321513250</subfield><subfield code="9">978-0-321-51325-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321513258</subfield><subfield code="9">0-321-51325-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)493796538</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023235338</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed., Pearson internat. ed., [paperback ed.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Pearson Addison-Wesley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">878 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Multimédias</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Poste à poste (Internet)</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Protocoles de réseaux d'ordinateurs</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux d'ordinateurs - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes de communication sans fil</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Redes de computadores</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anand, Bhojan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=016420967&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016420967</subfield></datafield></record></collection>
genre (DE-588)4123623-3 Lehrbuch gnd-content
genre_facet Lehrbuch
id DE-604.BV023235338
illustrated Illustrated
indexdate 2024-12-20T13:11:18Z
institution BVB
isbn 9780321513250
0321513258
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-016420967
oclc_num 493796538
open_access_boolean
owner DE-703
DE-473
DE-BY-UBG
DE-91G
DE-BY-TUM
DE-20
DE-739
owner_facet DE-703
DE-473
DE-BY-UBG
DE-91G
DE-BY-TUM
DE-20
DE-739
physical 878 S. Ill., graph. Darst.
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Pearson Addison-Wesley
record_format marc
spellingShingle Kurose, James F. 1956-
Ross, Keith W. 1956-
Computer networking a top-down approach
Internet ram
Multimédias ram
Poste à poste (Internet) ram
Protocoles de réseaux d'ordinateurs ram
Réseaux d'ordinateurs - Mesures de sûreté ram
Réseaux d'ordinateurs ram
Systèmes de communication sans fil ram
Computer networks
Internet
Redes de computadores
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Transportschicht (DE-588)4301518-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Netzwerk (DE-588)4171529-9 gnd
Internet (DE-588)4308416-3 gnd
Computer (DE-588)4070083-5 gnd
Faseroptik (DE-588)4016498-6 gnd
subject_GND (DE-588)4128252-8
(DE-588)4301518-9
(DE-588)4070085-9
(DE-588)4171529-9
(DE-588)4308416-3
(DE-588)4070083-5
(DE-588)4016498-6
(DE-588)4123623-3
title Computer networking a top-down approach
title_auth Computer networking a top-down approach
title_exact_search Computer networking a top-down approach
title_full Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand
title_fullStr Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand
title_full_unstemmed Computer networking a top-down approach James F. Kurose ; Keith W. Ross. Internat. ed. adapted by: Bhojan Anand
title_short Computer networking
title_sort computer networking a top down approach
title_sub a top-down approach
topic Internet ram
Multimédias ram
Poste à poste (Internet) ram
Protocoles de réseaux d'ordinateurs ram
Réseaux d'ordinateurs - Mesures de sûreté ram
Réseaux d'ordinateurs ram
Systèmes de communication sans fil ram
Computer networks
Internet
Redes de computadores
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Transportschicht (DE-588)4301518-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Netzwerk (DE-588)4171529-9 gnd
Internet (DE-588)4308416-3 gnd
Computer (DE-588)4070083-5 gnd
Faseroptik (DE-588)4016498-6 gnd
topic_facet Internet
Multimédias
Poste à poste (Internet)
Protocoles de réseaux d'ordinateurs
Réseaux d'ordinateurs - Mesures de sûreté
Réseaux d'ordinateurs
Systèmes de communication sans fil
Computer networks
Redes de computadores
Kommunikationsprotokoll
Transportschicht
Rechnernetz
Netzwerk
Computer
Faseroptik
Lehrbuch
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016420967&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT kurosejamesf computernetworkingatopdownapproach
AT rosskeithw computernetworkingatopdownapproach
AT anandbhojan computernetworkingatopdownapproach
  • Verfügbarkeit

‌

Per Fernleihe bestellen Per Fernleihe bestellen Inhaltsverzeichnis
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt