Computer networking: a top-down approach
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boston ; Munich [u.a.]
Pearson
2010
|
Ausgabe: | 5. ed., internat. ed. |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017621525&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Literaturverz. S. 831 - 860 |
Umfang: | 888 S. Ill., graph. Darst. |
ISBN: | 9780131365483 0131365487 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035565866 | ||
003 | DE-604 | ||
005 | 20100628 | ||
007 | t| | ||
008 | 090616s2010 xxuad|| |||| 00||| eng d | ||
020 | |a 9780131365483 |9 978-0-13-136548-3 | ||
020 | |a 0131365487 |9 0-13-136548-7 | ||
035 | |a (OCoLC)422755088 | ||
035 | |a (DE-599)BVBBV035565866 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-29T |a DE-83 |a DE-739 |a DE-Aug4 |a DE-573 |a DE-M347 |a DE-91G |a DE-703 | ||
050 | 0 | |a TK5105.875.I57 | |
082 | 0 | |a 004.678 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 321 |0 (DE-625)143658: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Kurose, James F. |d 1956- |e Verfasser |0 (DE-588)123704618 |4 aut | |
245 | 1 | 0 | |a Computer networking |b a top-down approach |c James F. Kurose ; Keith W. Ross |
250 | |a 5. ed., internat. ed. | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Pearson |c 2010 | |
300 | |a 888 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 831 - 860 | ||
650 | 4 | |a Rechnernetz - Lehrbuch | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Internet | |
650 | 0 | 7 | |a Transportschicht |0 (DE-588)4301518-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Faseroptik |0 (DE-588)4016498-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Faseroptik |0 (DE-588)4016498-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
689 | 3 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 3 | |8 4\p |5 DE-604 | |
689 | 4 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 4 | |8 5\p |5 DE-604 | |
689 | 5 | 0 | |a Transportschicht |0 (DE-588)4301518-9 |D s |
689 | 5 | |8 6\p |5 DE-604 | |
700 | 1 | |a Ross, Keith W. |d 1956- |e Sonstige |0 (DE-588)113704666 |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017621525&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017621525 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 250f 2005 A 6713(5) |
---|---|
DE-BY-TUM_katkey | 1760646 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010207666 |
_version_ | 1824079657147826176 |
adam_text | Titel: Computer networking
Autor: Kurose, James F.
Jahr: 2010
Table of Contents
Chapter 1 Computer Networks and the Internet 27
1.1 What Is the Internet? 28
1.1.1 A Nuts-and-Bolts Description 28
1.1.2 A Services Description 31
1.1.3 What Is a Protocol? 33
1.2 The Network Edge 35
1.2.1 Client and Server Programs 38
1.2.2 Access Networks 38
1.2.3 Physical Media 47
1.3 The Network Core 51
1.3.1 Circuit Switching and Packet Switching 51
1.3.2 How Do Packets Make Their Way Through
Packet-Switched Networks? 59
1.3.3 ISPs and Internet Backbones 60
1.4 Delay, Loss, and Throughput in Packet-Switched Networks 62
1.4.1 Overview of Delay in Packet-Switched Networks 62
1.4.2 Queuing Delay and Packet Loss 66
1.4.3 End-to-End Delay 69
1.4.4 Throughput in Computer Networks 71
1.5 Protocol Layers and Their Service Models 74
1.5.1 Layered Architecture 74
1.5.2 Messages, Segments, Datagrams, and Frames 80
1.6 Networks Under Attack 82
1.7 History of Computer Networking and the Internet 87
1.7.1 The Development of Packet Switching: 1961-1972 87
1.7.2 Proprietary Networks and Internetworking: 1972-1980 89
1.7.3 A Proliferation of Networks: 1980-1990 91
1.7.4 The Internet Explosion: The 1990s 92
1.7.5 Recent Developments 93
1.8 Summary 94
Road-Mapping This Book 95
17
18 Table of Contents
Homework Problems and Questions 96
Problems 98
Discussion Questions 104
Wireshark Lab 105
Interview: Leonard Kleinrock 107
Chapter 2 Application Layer 111
112
112
116
118
120
124
125
126
126
128
131
136
138
142
144
146
146
149
152
153
153
158
159
161
167
172
173
179
184
186
187
189
196
204
2.1 Principles of Network Applications
2.1.1 Network Application Architectures
2.1.2 Processes Communicating
2.1.3 Transport Services Available to Applications
2.1.4 Transport Services Provided by the Internet
2.1.5 Application-Layer Protocols
2.1.6 Network Applications Covered in This Book
2.2 The Web and HTTP
2.2.1 Overview of HTTP
2.2.2 Non-persistent and Persistent Connections
2.2.3 HTTP Message Format
2.2.4 User-Server Interaction: Cookies
2.2.5 Web Caching
2.2.6 The Conditional GET
2.3 File Transfer: FTP
2.3.1 FTP Commands and Replies
2.4 Electronic Mail in the Internet
2.4.1 SMTP
2.4.2 Comparison with HTTP
2.4.3 Mail Message Formats and MIME
2.4.4 Mail Access Protocols
2.5 DNS—The Internet s Directory Service
2.5.1 Services Provided by DNS
2.5.2 Overview of How DNS Works
2.5.3 DNS Records and Messages
2.6 Peer-to-Peer Applications
2.6.1 P2P File Distribution
2.6.2 Distributed Hash Tables (DHTs)
2.6.3 Case Study: P2P Internet Telephony with Skype
2.7 Socket Programming with TCP
2.7.1 Socket Programming with TCP
2.7.2 An Example Client-Server Application in Java
2.8 Socket Programming with UDP
2.9 Summary
Table of Contents 19
Homework Problems and Questions 205
Problems 207
Discussion Questions 214
Socket Programming Assignments 215
WiresharkLabs 217
Interview: Bram Cohen 219
Chapter 3 Transport Layer 223
3.1 Introduction and Transport-Layer Services 224
3.1.1 Relationship Between Transport and Network Layers 224
3.1.2 Overview of the Transport Layer in the Internet 227
3.2 Multiplexing and Demultiplexing 229
3.3 Connectionless Transport: UDP 236
3.3.1 UDP Segment Structure 240
3.3.2 UDP Checksum 240
3.4 Principles of Reliable Data Transfer 242
3.4.1 Building a Reliable Data Transfer Protocol 244
3.4.2 Pipelined Reliable Data Transfer Protocols 253
3.4.3 Go-Back-N (GBN) 256
3.4.4 Selective Repeat (SR) 261
3.5 Connection-Oriented Transport: TCP 268
3.5.1 The TCP Connection 269
3.5.2 TCP Segment Structure 271
3.5.3 Round-Trip Time Estimation and Timeout 276
3.5.4 Reliable Data Transfer 280
3.5.5 Flow Control 288
3.5.6 TCP Connection Management 290
3.6 Principles of Congestion Control 297
3.6.1 The Causes and the Costs of Congestion 298
3.6.2 Approaches to Congestion Control 304
3.6.3 Network-Assisted Congestion-Control Example:
ATM ABR Congestion Control 305
3.7 TCP Congestion Control 307
3.7.1 Fairness 316
3.8 Summary 320
Homework Problems and Questions 322
Problems 325
Discussion Questions 335
Programming Assignments 336
Wireshark Lab: Exploring TCP 336
Interview: Sally Floyd 338
20
Table of Contents
Chapter 4 The Network Layer
4.1
4.2
4.3
4.4
341
Introduction 342
4.1.1 Forwarding and Routing 344
4.1.2 Network Service Models 346
Virtual Circuit and Datagram Networks 349
4.2.1 Virtual-Circuit Networks 350
4.2.2 Datagram Networks 353
4.2.3 Origins of VC and Datagram Networks 355
What s Inside a Router? 356
4.3.1 Input Ports 358
4.3.2 Switching Fabric 360
4.3.3 Output Ports 363
4.3.4 Where Does Queuing Occur? 363
The Internet Protocol (IP): Forwarding and Addressing in the Internet 367
4.4.1 Datagram Format 368
4.4.2 IPv4 Addressing 374
4.4.3 Internet Control Message Protocol (ICMP) 389
4.4.4 IPv6 392
4.4.5 A Brief Introduction into IP Security VPNs 398
Routing Algorithms 400
4.5.1 The Link-State (LS) Routing Algorithm 403
4.5.2 The Distance-Vector (DV) Routing Algorithm 407
4.5.3 Hierarchical Routing 415
Routing in the Internet 419
4.6.1 Intra-AS Routing in the Internet: RIP 420
4.6.2 Intra-AS Routing in the Internet: OSPF 424
4.6.3 Inter-AS Routing: BGP 426
Broadcast and Multicast Routing 433
4.7.1 Broadcast Routing Algorithms 434
4.7.2 Multicast 439
Summary 446
Homework Problems and Questions 447
Problems 450
Discussion Questions 460
Programming Assignment 461
Wireshark Labs 463
Interview: Vinton G. Cerf 464
4.5
4.6
4.7
4.8
Chapter 5 The Link Layer and Local Area Networks
5.1 Link Layer. Introduction and Services
5.1.1 The Services Provided by the Link Layer
5.1.2 Where Is the Link Layer Implemented?
467
469
469
472
Chapter 6
Table of Contents 21
5.2 Error-Detection and -Correction Techniques 474
5.2.1 Parity Checks 476
5.2.2 Checksumming Methods 478
5.2.3 Cyclic Redundancy Check (CRC) 478
5.3 Multiple Access Protocols 481
5.3.1 Channel Partitioning Protocols 483
5.3.2 Random Access Protocols 485
5.3.3 Taking-Turns Protocols 492
5.3.4 Local Area Networks (LANs) 493
5.4 Link-Layer Addressing 495
5.4.1 MAC Addresses 495
5.4.2 Address Resolution Protocol (ARP) 497
5.5 Ethernet 501
5.5.1 Ethernet Frame Structure 503
5.5.2 CSMA/CD: Ethernet s Multiple Access Protocol 507
5.5.3 Ethernet Technologies 509
5.6 Link-Layer Switches 512
5.6.1 Forwarding and Filtering 513
5.6.2 Self-Learning 515
5.6.3 Properties of Link-Layer Switching 516
5.6.4 Switches Versus Routers 517
5.6.5 Virtual Local Area Networks (VLANs) 519
5.7 PPP: The Point-to-Point Protocol 523
5.7.1 PPP Data Framing 525
5.8 Link Virtualization: A Network as a Link Layer 527
5.9 A Day in the Life of a Web Page Request 531
5.10 Summary 536
Homework Problems and Questions 537
Problems 539
Discussion Questions 545
Wireshark Labs 546
Interview: Simon S. Lam 547
Wireless and Mobile Networks 549
6.1 Introduction 550
6.2 Wireless Links and Network Characteristics 555
6.2.1 CDMA 558
6.3 WiFi: 802.11 Wireless LANs 562
6.3.1 The 802.11 Architecture 563
6.3.2 The 802.11 MAC Protocol 567
6.3.3 The IEEE 802.11 Frame 573
22 Table of Contents
6.3.4 Mobility m the Same IP Subnet 577
6.3.5 Advanced Features in 802.11 578
6.3.6 Beyond 802.11 : Bluetooth and WiMAX 580
6.4 Cellular Internet Access 584
6.4.1 An Overview of Cellular Architecture 584
6.5 Mobility Management: Principles 590
6.5.1 Addressing 592
6.5.2 Routing to a Mobile Node 594
6.6 Mobile IP 599
6.7 Managing Mobility in Cellular Networks 605
6.7.1 Routing Calls to a Mobile User 606
6.7.2 Handoffs in GSM 607
6.8 Wireless and Mobility: Impact on Higher-layer Protocols 610
6.9 Summary 613
Homework Problems and Questions 614
Problems 615
Discussion Questions 619
Wireshark Labs 619
Interview: Charlie Perkins 620
Multimedia Networking 623
7.1 Multimedia Networking Applications 624
7.1.1 Examples of Multimedia Applications 624
7.1.2 Hurdles for Multimedia in Today s Internet 627
7.1.3 How Should the Internet Evolve to Support Multimedia Better? 628
7.1.4 Audio and Video Compression 630
7.2 Streaming Stored Audio and Video 634
7.2.1 Accessing Audio and Video Through a Web Server 634
7.2.2 Sending Multimedia from a Streaming Server to a
Helper Application 636
7.2.3 Real-Time Streaming Protocol (RTSP) 638
7.3 Making the Best of the Best-Effort Service 642
7.3.1 The Limitations of a Best-Effort Service 642
7.3.2 Removing Jitter at the Receiver for Audio 645
7.3.3 Recovering from Packet Loss 648
7.3.4 Distributing Multimedia in Today s Internet:
Content Distribution Networks 652
7.3.5 Dimensioning Best-Effort Networks to Provide Quality of Service 655
7.4 Protocols for Real-Time Interactive Applications 657
7.4.1 RTP 657
7.4.2 RTP Control Protocol (RTCP) 662
Chapter 8
Table of Contents 23
7.4.3 SIP 665
7.4.4 H.323 671
7.5 Providing Multiple Classes of Service 673
7.5.1 Motivating Scenarios 674
7.5.2 Scheduling and Policing Mechanisms 679
7.5.3 Diffserv 686
7.6 Providing Quality of Service Guarantees 691
7.6.1 A Motivating Example 691
7.6.2 Resource Reservation, Call Admission, Call Setup 693
7.6.3 Guaranteed QoS in the Internet: Intserv and RSVP 695
7.7 Summary 698
Homework Problems and Questions 699
Problems 700
Discussion Questions 707
Programming Assignment 708
Interview: Henning Schulzrinne 710
Security in Computer Networks 713
8.1 What Is Network Security? 714
8.2 Principles of Cryptography 717
8.2.1 Symmetric Key Cryptography 718
8.2.2 Public Key Encryption 725
8.3 Message Integrity 730
8.3.1 Cryptographic Hash Functions 731
8.3.2 Message Authentication Code 733
8.3.3 Digital Signatures 735
8.3.4 End-Point Authentication 742
8.4 Securing E-mail 747
8.4.1 Secure E-mail 748
8.4.2 PGP 752
8.5 Securing TCP Connections: SSL 753
8.5.1 The Big Picture 755
8.5.2 A More Complete Picture 758
8.6 Network-Layer Security: IPsec and Virtual Private Networks 760
8.6.1 IPsec and Virtual Private Networks (VPNs) 760
8.6.2 The AH and ESP Protocols 762
8.6.3 Security Associations 762
8.6.4 The IPset Datagram 763
8.6.5 IKE: Key Management in IPsec 767
8.7 Securing Wireless LANs 768
8.7.1 Wired Equivalent Privacy (WEP) 768
8.7.2 IEEE802.11i 770
24 Table of Contents
8.8 Operational Security: Firewalls and Intrusion Detection Systems 773
8.8.1 Firewalls 773
8.8.2 Intrusion Detection Systems 781
8.9 Summary 784
Homework Problems and Questions 786
Problems 787
Discussion Questions 792
WiresharkLab 792
IPsec Lab 793
Interview: Steven M. Bellovin 794
Chapter 9 Network Management 797
9.1 What Is Network Management? 798
9.2 The Infrastructure for Network Management 802
9.3 The Internet-Standard Management Framework 806
9.3.1 Structure of Management Information: SMI 808
9.3.2 Management Information Base: MIB 812
9.3.3 SNMP Protocol Operations and Transport Mappings 814
9.3.4 Security and Administration 817
9.4 ASN.l 820
9.5 Conclusion 825
Homework Problems and Questions 826
Problems 827
Discussion Questions 828
Interview: Jeff Case 829
References 831
Index 861
|
any_adam_object | 1 |
author | Kurose, James F. 1956- |
author_GND | (DE-588)123704618 (DE-588)113704666 |
author_facet | Kurose, James F. 1956- |
author_role | aut |
author_sort | Kurose, James F. 1956- |
author_variant | j f k jf jfk |
building | Verbundindex |
bvnumber | BV035565866 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 |
callnumber-search | TK5105.875.I57 |
callnumber-sort | TK 45105.875 I57 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 321 |
classification_tum | DAT 250f |
ctrlnum | (OCoLC)422755088 (DE-599)BVBBV035565866 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 5. ed., internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03110nam a2200745zc 4500</leader><controlfield tag="001">BV035565866</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100628 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090616s2010 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780131365483</subfield><subfield code="9">978-0-13-136548-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131365487</subfield><subfield code="9">0-13-136548-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)422755088</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035565866</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 321</subfield><subfield code="0">(DE-625)143658:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose ; Keith W. Ross</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">5. ed., internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">888 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 831 - 860</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017621525&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017621525</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV035565866 |
illustrated | Illustrated |
indexdate | 2024-12-20T13:37:58Z |
institution | BVB |
isbn | 9780131365483 0131365487 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017621525 |
oclc_num | 422755088 |
open_access_boolean | |
owner | DE-29T DE-83 DE-739 DE-Aug4 DE-573 DE-M347 DE-91G DE-BY-TUM DE-703 |
owner_facet | DE-29T DE-83 DE-739 DE-Aug4 DE-573 DE-M347 DE-91G DE-BY-TUM DE-703 |
physical | 888 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Pearson |
record_format | marc |
spellingShingle | Kurose, James F. 1956- Computer networking a top-down approach Rechnernetz - Lehrbuch Computer networks Internet Transportschicht (DE-588)4301518-9 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerk (DE-588)4171529-9 gnd Faseroptik (DE-588)4016498-6 gnd Computer (DE-588)4070083-5 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4301518-9 (DE-588)4070085-9 (DE-588)4171529-9 (DE-588)4016498-6 (DE-588)4070083-5 (DE-588)4128252-8 (DE-588)4308416-3 (DE-588)4123623-3 |
title | Computer networking a top-down approach |
title_auth | Computer networking a top-down approach |
title_exact_search | Computer networking a top-down approach |
title_full | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_fullStr | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_full_unstemmed | Computer networking a top-down approach James F. Kurose ; Keith W. Ross |
title_short | Computer networking |
title_sort | computer networking a top down approach |
title_sub | a top-down approach |
topic | Rechnernetz - Lehrbuch Computer networks Internet Transportschicht (DE-588)4301518-9 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerk (DE-588)4171529-9 gnd Faseroptik (DE-588)4016498-6 gnd Computer (DE-588)4070083-5 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Rechnernetz - Lehrbuch Computer networks Internet Transportschicht Rechnernetz Netzwerk Faseroptik Computer Kommunikationsprotokoll Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017621525&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kurosejamesf computernetworkingatopdownapproach AT rosskeithw computernetworkingatopdownapproach |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 250f 2005 A 6713(5)
Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |