Computer Networks: A Systems Approach
Version 6.1-dev
Table of Contents
Preface
Chapter 1: Foundation
Chapter 2: Direct Links
Chapter 3: Internetworking
Chapter 4: Advanced Internetworking
Chapter 5: End-to-End Protocols
Chapter 6: Congestion Control
Chapter 7: End-to-End Data
Chapter 8: Network Security
Chapter 9: Applications
About This Book
Computer Networks: A Systems Approach
Docs
»
Computer Networks: A Systems Approach
View page source
Computer Networks: A Systems Approach
ΒΆ
Table of Contents
Preface
Chapter 1: Foundation
Problem: Building a Network
1.1 Applications
1.2 Requirements
1.3 Architecture
1.4 Software
1.5 Performance
Perspective: Feature Velocity
Chapter 2: Direct Links
Problem: Connecting to a Network
2.1 Technology Landscape
2.2 Encoding
2.3 Framing
2.4 Error Detection
2.5 Reliable Transmission
2.6 Multi-Access Networks
2.7 Wireless Networks
2.8 Access Networks
Perspective: Race to the Edge
Chapter 3: Internetworking
Problem: Not All Networks are Directly Connected
3.1 Switching and Bridging
3.2 Basic Interworking
3.3 Routing
3.4 Implementation
Perspective: Virtual Networks All the Way Down
Chapter 4: Advanced Internetworking
Problem: Scaling to Billions
4.1 Global Internet
4.2 IP Version 6
4.3 Multicast
4.4 Multiprotocol Label Switching
4.5 Routing Among Mobile Devices
Perspective: The Cloud is Eating the Internet
Chapter 5: End-to-End Protocols
Problem: Getting Processes to Communicate
5.1 Simple Demultiplexor (UDP)
5.2 Reliable Byte Stream (TCP)
5.3 Remote Procedure Call
5.4 Transport for Real-Time (RTP)
Perspective: HTTP is the New Narrow Waist
Chapter 6: Congestion Control
Problem: Allocating Resources
6.1 Issues in Resource Allocation
6.2 Queuing Disciplines
6.3 TCP Congestion Control
6.4 Advanced Congestion Control
6.5 Quality of Service
Perspective: Software-Defined Traffic Engineering
Chapter 7: End-to-End Data
Problem: What Do We Do with the Data?
7.1 Presentation Formatting
7.2 Multimedia Data
Perspective: Big Data and Analytics
Chapter 8: Network Security
Problem: Security Attacks
8.1 Trust and Threats
8.2 Cryptographic Building Blocks
8.3 Key Predistribution
8.4 Authentication Protocols
8.5 Example Systems
Perspective: Blockchain and a Decentralized Internet
Chapter 9: Applications
Problem: Applications Need Their Own Protocols
9.1 Traditional Applications
9.2 Multimedia Applications
9.3 Infrastructure Applications
9.4 Overlay Networks
Perspective: The Cloud is the New Internet
About This Book
Read the Book
Releases and Editions
Build the Book
How to Contribute
Join Us