Features
Hallmark features of this title
- The text's unique structure and organization helps students learn computer networks from the inside out. This approach enables students to understand all aspects of networking and how the different layers affect one another.
- The authors begin at the base, physical layer of networks, including cable networks and satellites.
- The text proceeds to cover the data-link layer, the network-and-transportation layer and the application layer.
- The author-maintained companion website features additional resources for students and instructors. Go to the authors' website.
- Copyright 2021
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 944
- Edition: 6th
-
Book
- ISBN-10: 0-13-676405-3
- ISBN-13: 978-0-13-676405-2
This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed.
For courses in Business Data Communication and Networking.
An introduction to computer networking grounded in real-world examples
In Computer Networks, Tanenbaum et al. explain how networks work from the inside out. They start with the physical layer of networking, computer hardware and transmission systems, then work their way up to network applications. Each chapter follows a consistent approach: The book presents key principles, then illustrates them utilizing real-world example networks that run through the entire book – the Internet, and wireless networks, including Wireless LANs, broadband wireless, and Bluetooth. The 6th Edition is updated throughout to reflect the most current technologies, and the chapter on network security is rewritten to focus on modern security principles and actions.
Tutorial videos on key networking topics and techniques are available to students on the companion website.
Instructors are supported with a Solutions Manual to end-of-chapter exercises featured in the book, Lecture PowerPoint slides, and extracted art and figures featured in the book.
Table of Contents
Table of Contents
- Introduction
- Uses of Computer Networks
- Types of Computer Networks
- Network Technology, from Local to Global
- Examples of Networks
- Network Protocols
- Reference Models
- Standardization
- Policy, Legal, and Social Issues
- Metric Units
- Outline of the Rest of the Book
- Summary
- The Physical Layer
- Guided Transmission Media
- Wireless Transmission
- Using the Spectrum for Transmission
- From Waveforms to Bits
- The Public Switched Telephone Network
- Cellular Networks
- Cable Networks
- Communication Satellites
- Comparing Different Access Networks
- Policy at the Physical Layer
- Summary
- The Data Link Layer
- Data Link Layer Design Issues
- Error Detection and Correction
- Elementary Data Link Protocols
- Improving Efficiency
- Data Link Protocols in Practice
- Summary
- The Medium Access Control Sublayer
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Bluetooth
- DOCSIS
- Data Link Layer Switching
- Summary
- The Network Layer
- Network Layer Design Issues
- Routing Algorithms in a Single Network
- Traffic Management at the Network Layer
- Quality of Service and Application QoE
- Internetworking
- Software Defined Networking
- The Network Layer in the Internet
- Policy at the Network layer
- Summary
- The Transport Layer
- The Transport Service
- Elements of Transport Protocols
- Congestion Control
- The Internet Transport Protocols: UDP
- The Internet Transport Protocols: TCP, QUIC, BBR
- Performance Monitoring
- Delay-Tolerant Networking
- Summary
- The Application Layer
- DNS — The Domain Name System
- Electronic Mail
- The World Wide Web
- HTTP/2
- Streaming Audio and Video
- Content Delivery Networks and Distributed Cloud Services
- Summary
- Security
- Fundamentals of Network Security
- The Core Ingredients of an Attack
- Firewalls and Intrusion Detection Systems
- Cryptography
- Symmetric-Key Algorithms
- Public-Key Algorithms
- Digital Signatures
- Management of Public Keys
- Authentication Protocols
- Communication Security
- Email Security
- Web Security
- Social Issues
- Summary
- List and Bibliography
- Suggestions for Further Reading
- Alphabetical Bibliography