StartseiteGruppenForumMehrZeitgeist
Web-Site durchsuchen
Diese Seite verwendet Cookies für unsere Dienste, zur Verbesserung unserer Leistungen, für Analytik und (falls Sie nicht eingeloggt sind) für Werbung. Indem Sie LibraryThing nutzen, erklären Sie dass Sie unsere Nutzungsbedingungen und Datenschutzrichtlinie gelesen und verstanden haben. Die Nutzung unserer Webseite und Dienste unterliegt diesen Richtlinien und Geschäftsbedingungen.

Ergebnisse von Google Books

Auf ein Miniaturbild klicken, um zu Google Books zu gelangen.

Lädt ...

Computernetzwerke

von Andrew S. Tanenbaum

Weitere Autoren: Siehe Abschnitt Weitere Autoren.

Reihen: Pearson Studium-IT

MitgliederRezensionenBeliebtheitDurchschnittliche BewertungDiskussionen
1,1971016,418 (3.82)2
Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book-the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The fifth edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.… (mehr)
Kürzlich hinzugefügt vonprengel90, aallegue, luukheijnen, LICC
Lädt ...

Melde dich bei LibraryThing an um herauszufinden, ob du dieses Buch mögen würdest.

More of a primer on Networks, but does the job. again things have moved on since this book was written, so new protocols, etc are not mentioned. But Wires are still wires, and switches are still switches. Used it to network my first two computers together as well as bought for Degree. ( )
  ajw107 | Jul 26, 2019 |
An awesome book with very clearly laid out information, specially for the beginner in computer networks. It presents some subjects that, while do not seem absolutely relevant, are still rather interesting (history of origins of the internet as we know it comes to mind). Specially great for clearing concepts one has doubts about, and an infinetely useful accompanying tool to study for finals related to the subject. ( )
  something_ | May 1, 2015 |
An awesome book with very clearly laid out information, specially for the beginner in computer networks. It presents some subjects that, while do not seem absolutely relevant, are still rather interesting (history of origins of the internet as we know it comes to mind). Specially great for clearing concepts one has doubts about, and an infinetely useful accompanying tool to study for finals related to the subject. ( )
  something_ | Apr 1, 2013 |
Indeholder "Preface", "1 Introduction", "1.1 The Uses of Computer Networks", "1.1.1 Network Goals", "1.1.2 Applications of Networks", "1.2 Network Structure", "1.3 Network Architectures", "1.3.1 Protocol Hierarchies", "1.3.2 Design Issues for the Layers", "1.4 The OSI Reference Model", "1.4.1 The Physical Layer", "1.4.2 The Data Link Layer", "1.4.3 The Network Layer", "1.4.4 The Transport Layer", "1.4.5 The Transport Layer", "1.4.6 The Transport Layer", "1.4.7 The Application Layer", "1.5 ARPANET, SNA, DECNET, and Public Networks", "1.5.1 Introduction to the ARPANET", "1.5.2 Introduction to SNA", "1.5.3 Introduction to DECNET", "1.5.4 Introduction to Public Networks and X.25", "1.6 Outline of the Rest of the Book", "1.7 Summary", "2 Network Topology", "2.1 Introduction to the Topology Design Problem", "2.1.1 Formulation of the Problem", "2.1.2 Hierarchical Networks", "2.2 Connectivity Analysis", "2.2.1 Introduction to Graph Theory", "2.2.2 Cuts and Network Flow", "2.2.3 The Max-Flow Algorithm", "2.2.4 Disjoint Paths", "2.2.5 Monte Carlo Connectivity Analysis", "2.3 Delay Analysis", "2.3.1 Introduction to Queueing Theory", "2.3.2 The M/M/1 Queues", "2.3.3 Networks of M/M/1 Queues", "2.4 Backbone Design", "2.4.1 The Design Process", "2.4.2 Generating Starting Topologies", "2.4.3 Flow and Capacity Assignment", "2.4.4 Pertubation Heuristics", "2.5 Local Access Network Design", "2.5.1 Assigning Sites to Concentrators", "2.5.2 The Concentrator Location Problem", "2.5.3 The Terminal Layout Problem", "2.6 Summary", "3 The Physical Layer", "3.1 The Theoretical Basis for Data Communications", "3.1.1 Fourier Analysis", "3.1.2 Bandwidth-Limited Signals", "3.1.3 The Maximum Data Rate of a Channel", "3.2 The Telephone System", "3.2.1 Who's Who in the Telecommunication World", "3.2.2 Structure of the Telephone System", "3.2.3 The Local Loop", "3.3 Transmission and Multiplexing", "3.3.1 Frequency Division and Time Division Multiplexing", "3.3.2 Digital Transmission", "3.3.3 The X.21 Digital Interface", "3.3.4 Communication Satellites", "3.3.5 Circuit Switching and Packet Switching", "3.4 Terminal Handling", "3.4.1 Polling", "3.4.2 Multiplexing versus Concentration", "3.4.3 The Packet Assembler/Disassembler", "3.5 Errors", "3.5.1 The Nature of Transmission Errors", "3.5.2 Error-Correcting Codes", "3.5.3 Error-Detecting Codes", "3.6 Summary", "4 The Data Link Layer", "4.1 Elementary Data Link Protocols", "4.1.1 Some Declarations Needed by the Protocols", "4.1.2 An Unrestricted Simplex Protocol", "4.1.3 A Simplex Stop-and-Wait Protocol", "4.1.4 A Simplex Protocol for a Noisy Channel", "4.2 Sliding Window Protocols", "4.2.1 A One Bit Sliding Window Protocol", "4.2.2 A Protocol with Pipelining", "4.2.3 A Protocol That Accepts Frames Out of Order", "4.3 Examples of the Data Link Layer", "4.3.2 The Data Link Layer in the ARPANET", "4.3.3 The Data Link Layer in SNA and X.25", "4.3.4 The Data Link Layer in DECNET", "4.4 Analysis of Protocols", "4.4.1 Protocol Efficiency", "4.4.2 Protocol Verification", "4.5 Summary", "5 The Network Layer I: Point-to-Point Networks", "5.1 Virtual Circuits and Datagrams", "5.1.1 The Service Provided by the Network Layer", "5.1.2 Comparison of Virtual Circuit and Datagram Service", "5.1.3 The Internal Structure of the Subnet", "5.1.4 Comparison of VCs and Datagrams within the Subnet", "5.1.5 Independence of Subnet Service and Subnet Structure", "5.2 Routing Algorithms", "5.2.1 Flooding", "5.2.2 Static Routing", "5.2.3 Centralized Routing Algorithms", "5.2.4 Isolated Routing", "5.2.5 Distributed Routing Algorithms", "5.2.6 The Topology Update Problem", "5.2.7 Hierarchical Routing", "5.2.8 Broadcast Routing", "5.3 Congestion", "5.3.1 Preallocation of Buffers", "5.3.2 Packet Discarding", "5.3.3 Isarithmic Congestion Control", "5.3.4 Flow Control", "5.3.5 Choke Packets", "5.3.6 Deadlocks", "5.4 Examples of the Network Layer", "5.4.1 The Network Layer in the ARPANET", "5.4.2 The Network Layer in SNA", "5.4.3 The Network Layer in DECNET", "5.4.3 The Network Layer in X.25", "5.5 Summary", "6 The Network Layer II: Satellite and Packet Radio Networks", "6.1 Satellite Packet Broadcasting", "6.1.1 Conventional Channel Allocation Methods", "6.1.2 Pure ALOHA and Slotted ALOHA", "6.1.3 Finite Population ALOHA", "6.1.4 Delay and Throughput of Slotted ALOHA", "6.1.5 Stability of Slotted ALOHA", "6.1.6 Controlled ALOHA", "6.1.7 Reservation ALOHA", "6.2 Packet Radio", "6.2.1 The University of Hawaii ALOHA System", "6.2.3 Design Issues for Packet Radio Networks", "6.3 Summary", "7 The Network Layer III: Local Networks", "7.1 Carrier Sense Networks", "7.1.1 Persistent and Nonpersistent CSMA", "7.1.2 Ethernet", "7.1.3 Collision-Free Protocols", "7.1.4 Limited-Contention Protocols", "7.2 Ring Networks", "7.2.1 Token Rings", "7.2.2 Contention Rings", "7.2.3 Slotted Rings", "7.2.4 Register Insertion Rings", "7.3 Shared Memory Systems", "7.3.1 Processor-Memory Interconnection", "7.3.2 Examples of Shared Memory Systems", "7.4 Summary", "8 The Transport and Session Layers", "8.1 Transport Protocol Design Issues", "8.1.1 Transport Services", "8.1.2 Addressing and Connection Establishment", "8.1.3 Flow Control and Buffering", "8.1.4 Multiplexing", "8.1.5 Synchronization in the Presence of Delayed Packets", "8.1.6 Crash Recovery", "8.2 Interconnection of Packet Switching Networks", "8.2.1 Gateways", "8.2.2 The Level og Interconnecion", "8.2.3 The X.75 Model versus the Datagram Model", "8.2.4 Internetwork Packet Fragmentation", "8.3 The Session Layer", "8.4 Examples of the Transport and Session Layers", "8.4.1 The Transport Layer in the ARPANET", "8.4.2 The Transport Layer in SNA", "8.4.3 The Transport Layer in DECNET", "8.5 Summary", "9 The Presentation Layer", "9.1 Network Security and Privacy", "9.1.1 Traditional Cryptography", "9.1.2 The Data Encryption Standard", "9.1.3 The Key Distribution Problem", "9.1.4 Public Key Cryptography", "9.1.5 Authentication and Digital Signatures", "9.2 Text Compression", "9.2.1 Encoding a Finite Set of Equally Likely Symbols", "9.2.2 Huffman Coding", "9.2.3 Context Dependent Coding", "9.3 Virtual Terminal Protocols", "9.3.1 Classes of Terminals", "9.3.2 The Data Structure Model", "9.3.3 Design Principles", "9.3.4 An Example Virtual Terminal Protocol", "9.4 File Transfer Protocols", "9.5 Examples of the Presentation Layer", "9.5.1 The Presentation Layer in the ARPANET", "9.5.2 The Presentation Layer in SNA ", "9.5.3 The Presentation Layer in DECNET", "9.6 Summary", "10 The Application Layer", "10.1 Distributed Data Base Systems", "10.1.1 The Relational Data Base Model", "10.1.2 The Relation Distribution Problem", "10.1.3 Query Processing", "10.1.4 Concurrency Control", "10.1.5 Crash Recovery", "10.2 Distributed Computation", "10.2.1 The Hierarchical Model", "10.2.2 The CPU Cache Model", "10.2.3 The User-Server Model", "10.2.4 The Pool Processor Model", "10.2.5 The Data Flow Model", "10.3 Network and Distributed Operating Systems", "10.3.1 Network Operating Systems", "10.3.2 Distributed Operating Systems", "10.4 Summary", "11 Reading List and Bibliography", "11.1 Suggestions for Further Reading", "11.1.1 Introduction", "11.1.2 Network Topology", "11.1.3 The Physical Layer", "11.1.4 The Data Link Layer", "11.1.5 The Network Layer I: Point-to-Point Networks", "11.1.6 The Network Layer II: Satellite and Packet Radio Networks", "11.1.7 The Network Layer III: Local Networks", "11.1.8 The Transport and Session Layers", "11.1.9 The Presentation Layer", "11.1.10 The Application Layer", "11.2 Alphabetical Bibliography", "Index".

Indeholder et væld af oplysninger om både teori og praksis. Glimrende bog. Dog uden helt skarp korrekturlæsning, fx er der på side xii en 10.3 Summary, som nok skulle være 10.4. Men den slags fejl viser jo bare at der er redigeret i bogen helt frem til deadline. ( )
  bnielsen | Jan 20, 2013 |
Indeholder "Preface", "1 Introduction", "1.1 The Uses of Computer Networks", "1.1.1 Network Goals", "1.1.2 Applications of Networks", "1.2 Network Structure", "1.3 Network Architectures", "1.3.1 Protocol Hierarchies", "1.3.2 Design Issues for the Layers", "1.4 The OSI Reference Model", "1.4.1 The Physical Layer", "1.4.2 The Data Link Layer", "1.4.3 The Network Layer", "1.4.4 The Transport Layer", "1.4.5 The Transport Layer", "1.4.6 The Transport Layer", "1.4.7 The Application Layer", "1.4.8 Data Transmission in the OSI Model", "1.5 Services", "1.5.1 OSI Terminology", "1.5.2 Connection-Oriented and Connectionless Services", "1.5.3 Service Primitives", "1.5.4 The Relationship of Services to Protocols", "1.6 Network Standardization", "1.6.1 Who's Who in the Telecommunications World", "1.6.2 Who's Who in the Standards World", "1.6.3 Discussion of the Standardization of the OSI model", "1.7 Example Networks", "1.7.1 Public Networks", "1.7.2 The ARPANET", "1.7.3 MAP and TOP", "1.7.4 USENET", "1.7.5 CSNET", "1.7.6 BITNET", "1.7.7 SNA", "1.8 Outline of the Rest of the Book", "1.9 Summary", "2 The Physical Layer", "2.1 The Theoretical Basis for Data Communications", "2.1.1 Fourier Analysis", "2.1.2 Bandwidth-Limited Signals", "2.1.3 The Maximum Data Rate of a Channel", "2.2 Transmission Media", "2.2.1 Magnetic Media", "2.2.2 Twisted Pair", "2.2.3 Baseband Coaxial Cable", "2.2.4 Broadband Coaxial Cable", "2.2.5 Fiber Optics", "2.2.6 Line-of-Sight Transmission", "2.2.7 Communication Satellites", "2.3 Analog Transmission", "2.3.1 The Telephone System", "2.3.2 Modems", "2.3.3 RS-232-C and RS-449", "2.4 Digital Transmission", "2.4.1 Pulse Code Modulation", "2.4.2 Encoding Systems", "2.4.3 X.21 Digital Interface", "2.5 Transmission and Switching", "2.5.1 Frequency Division and Time Division Multiplexing", "2.5.2 Circuit Switching", "2.5.3 Packet Switching", "2.5.4 Hybrid Switching", "2.6 ISDN - Integrated Services Digital Network", "2.6.1 ISDN Services", "2.6.2 Evolution of ISDN", "2.6.3 ISDN System Architecture", "2.6.4 The Digital PBX", "2.6.5 The ISDN Interface", "2.6.6 ISDN Signaling - SS#7", "2.6.7 Perspective on ISDN", "2.7 Terminal Handling", "2.7.1 Polling", "2.7.2 Multiplexing versus Concentration", "2.8 Summary", "3 The Medium Access Sublayer", "3.1 Local and Metropolitan Area Networks", "3.1.1 Static Channel Allocation in LANs and WANs", "3.1.2 Dynamic Channel Allocation in LANs and WANs", "3.2 The ALOHA Protocols", "3.2.1 Pure ALOHA and Slotted ALOHA", "3.2.2 Finite Population ALOHA", "3.3 Local Area Network Protocols", "3.3.1 Persistent and Nonpersistent CSMA", "3.3.2 CSMA with Collision Detection", "3.3.3 Collision-Free Protocols", "3.3.4 BRAP - Broadcast Recognition with Alternating Priorities", "3.3.5 MLMA - The Multi-Level Multi-Access Protocol", "3.3.6 Binary Countdown", "3.3.7 Limited-Contention Protocols", "3.3.8 The Adaptive Tree Walk Protocol", "3.3.9 The Urn Protocol", "3.4 IEEE Standard 802 for Local Area Networks", "3.4.1 IEEE Standard 802.2 and Ethernet", "3.4.2 IEEE Standard 802.4: Token Bus", "3.4.3 IEEE Standard 802.5: Token Ring", "3.4.4 Comparison of Local Area Networks", "3.5 Fiber Optic Networks", "3.5.1 FDDI", "3.5.2 Fibernet II", "3.5.3 S/NET", "3.5.4 FASNET and EXPRESSNET", "3.5.5 DATAKIT", "3.6 Satellite Networks", "3.6.1 SPADE", "3.6.2 ALOHA Revisited", "3.6.3 Reservation ALOHA", "3.7 Packet Radio Networks", "3.7.1 The University of Hawaii ALOHA System", "3.7.2 Design Issues for Packet Radio Networks", "3.8 Examples of the MAC Sublayer", "3.8.1 The MAC Sublayer in Public Networks", "3.8.2 The MAC Sublayer in the ARPANET", "3.8.3 The MAC Sublayer in MAP and TOP", "3.8.4 The MAC Sublayer in USENET", "3.9 Summary", "4 The Data Link Layer", "4.1 Data Link Layer Design Issues", "4.1.1 Services Provided in the Network Layer", "4.1.2 Framing", "4.1.3 Error Control", "4.1.4 Flow Control", "4.1.5 Link management", "4.2 Error Detection and Correction", "4.2.1 Error-Correcting Codes", "4.2.2 Error-Detecting Codes", "4.3 Elementary Data Link Protocol", "4.3.1 An Unrestricted Simplex Protocol", "4.3.2 A Simplex Stop-and-Wait Protocol", "4.3.3 A Simplex Protocol for a Noisy Channel", "4.4 Sliding Window Protocols", "4.4.1 A One Bit Sliding Window Protocol", "4.4.2 A Protocol Using Go Back n", "4.4.3 A Protocol Using Selective Repeat", "4.5 Protocol Performance", "4.5.1 Performance of the Stop-and-Wait Protocol", "4.5.2 Performance of the Sliding Window Protocol", "4.6 Protocol Specification and Verification", "4.6.1 Finite State Machine Models", "4.6.2 The Estelle Protocol Specification Language", "4.6.3 Petri Net Models", "4.7 Examples of the Data Link Layer", "4.7.1 The Data Link Layer in Public Networks", "4.7.2 The Data Link Layer in the ARPANET", "4.7.3 The Data Link Layer in MAP and TOP", "4.7.4 The Data Link Layer in USENET", "4.8 Summary", "5 The Network Layer", "5.1 Network Layer Design Issues", "5.1.1 Services Provided in the Transport Layer", "5.1.2 Internal Organization of the Network Layer", "5.1.3 Routing", "5.1.4 Congestion", "5.1.5 Internetworking", "5.2 Routing Algorithms", "5.2.1 Shortest Path Routing", "5.2.2 Multipath Routing", "5.2.3 Centralized Routing", "5.2.4 Isolated Routing", "5.2.5 Flooding", "5.2.6 Distributed Routing", "5.2.7 Optimal Routing", "5.2.8 Flow-Based Routing", "5.2.9 Hierachical Routing", "5.2.10 Broadcast Routing", "5.3 Congestion Control Algorithms", "5.3.1 Preallocation of Buffers", "5.3.2 Packet Discarding", "5.3.3 Isarithmic Congestion Control", "5.3.4 Flow Control", "5.3.5 Choke Packets", "5.3.6 Deadlocks", "5.4 Internetworking", "5.4.1 OSI and Internetworking", "5.4.2 Bridges", "5.4.3 Gateways", "5.4.4 Comparison of Connection-Oriented and Connectionless Gateways", "5.4.5 Bridge and Gateway Software", "5.5 Examples of the Network Layer", "5.5.1 The Network Layer in Public Networks", "5.5.2 The Network Layer in the ARPANET", "5.5.3 The Network Layer in MAP and TOP", "5.5.4 The Network Layer in USENET", "5.6 Summary", "6 The Transport Layer", "6.1 Transport Layer Design Issues", "6.1.1 Services Provided to the Session Layer", "6.1.2 Quality of Service", "6.1.3 The OSI Transport Service Primitives", "6.1.4 Transport Protocols", "6.1.5 Elements of Transport Protocols", "6.2 Connection Management", "6.2.1 Addressing", "6.2.2 Establishing a Connection", "6.2.3 Releasing a Connection", "6.2.4 Timer-Based Connection Management", "6.2.5 Flow Control and Buffering", "6.2.6 Multiplexing", "6.2.7 Crash Recovery", "6.3 A Simple Transport Protocol on Top of X.25", "6.3.1 The Example Service Primitives", "6.3.2 The Example Transport Entity", "6.3.3 The Example as a Finite State Machine", "6.4 Examples of the Transport Layer", "6.4.1 The Transport Layer in Public Networks", "6.4.2 The Transport Layer in the ARPANET", "6.4.3 The Transport Layer in MAP and TOP", "6.4.4 The Transport Layer in USENET", "6.5 Summary", "7 The Session Layer", "7.1 Session Layer Design Issues", "7.1.1 Services Provided to the Presentation Layer", "7.1.2 Data Exchange", "7.1.3 Dialog Management", "7.1.4 Synchronization", "7.1.5 Activity Management", "7.1.6 Exception Reporting", "7.1.7 The OSI Session Service Primitives", "7.2 Remote Procedure Call", "7.2.1 The Client-Server Model", "7.2.2 Implementation of Remote Procedure Call", "7.2.3 Semantics of Remote Procedure Call", "7.2.4 Orphans", "7.2.5 Disussion of RPC", "7.3 Examples of the Session Layer", "7.3.1 The Session Layer in Public Networks", "7.3.2 The Session Layer in the ARPANET", "7.3.3 The Session Layer in MAP and TOP", "7.3.4 The Session Layer in USENET", "7.4 Summary", "8 The Presentation Layer", "8.1 Presentation Layer Design Issues", "8.1.1 Data Representation", "8.1.2 Data Compression", "8.1.3 Network Security and Privacy", "8.1.4 The OSI Presentation Service Primitives", "8.2 Abstract Syntax Notation (ASN.1)", "8.2.1 Data Structures", "8.2.2 Abstract Syntax", "8.2.3 Transfer Syntax", "8.3 Data Compression Techniques", "8.3.1 Encoding a Finite Set of Equally Likely Symbols", "8.3.2 Frequency Dependent Coding", "8.3.3 Context Dependent Coding", "8.4 Cryptography", "8.4.1 Traditional Cryptography", "8.4.2 The Data Encryption Standard", "8.4.3 The Key Distribution Problem", "8.4.4 Public Key Cryptography", "8.4.5 Authentication and Digital Signatures", "8.5 Examples of the Presentation Layer", "8.5.1 The Presentation Layer in Public Networks", "8.5.2 The Presentation Layer in the ARPANET", "8.5.3 The Presentation Layer in MAP and TOP", "8.5.4 The Presentation Layer in USENET", "8.6 Summary", "9 The Application Layer", "9.1 Application Layer Design Issues", "9.1.1 File Transfer, Access and Management", "9.1.2 Electronic Mail", "9.1.3 Virtual Terminals", "9.1.4 Other Applications", "9.1.5 OSI Service Elements - ACSE and CCR", "9.2 File Transfer, Access and Management", "9.2.1 File Servers", "9.2.2 Concurrency Control", "9.2.3 Replicated Files", "9.2.4 Implementation Issues", "9.3 Electronic Mail", "9.3.1 Architecture and Services of MOTIS and X.400", "9.3.2 The User Agent", "9.3.3 The Message Transfer Agent", "9.4 Virtual Terminals", "9.4.1 Scroll Mode Terminals", "9.4.2 Page Mode Terminals", "9.4.3 Form Mode Terminals", "9.5 Other Applications", "9.5.1 Directory Service", "9.5.2 Job Transfer and Management", "9.5.3 Picture Storage and Transfer", "9.5.4 Teletext and Videotex", "9.6 Examples of The Application Layer", "9.6.1 The Application Layer in Public Networks", "9.6.2 The Application Layer in the ARPANET", "9.6.3 The Application Layer in MAP and TOP", "9.6.4 The Application Layer in USENET", "9.7 Summary", "10 Reading List and Bibliography", "10.1 Suggestions for Further Reading", "10.1.1 Introduction and General Works", "10.1.2 The Physical Layer", "10.1.3 The Medium Access Control Sublayer", "10.1.4 The Data Link Layer", "10.1.5 The Network Layer", "10.1.6 The Transport Layer", "10.1.7 The Session Layer", "10.1.8 The Presentation Layer", "10.1.9 The Application Layer", "10.2 Alphabetical Bibliography", "A Appendix: Queueing Theory", "Index".

Indeholder et væld af oplysninger om både teori og praksis. Glimrende bog. ( )
  bnielsen | Jan 11, 2013 |
keine Rezensionen | Rezension hinzufügen

» Andere Autoren hinzufügen (9 möglich)

AutorennameRolleArt des AutorsWerk?Status
Andrew S. TanenbaumHauptautoralle Ausgabenberechnet
Γεωργιάδης… ΠαναγιώτηςÜbersetzerCo-Autoreinige Ausgabenbestätigt

Gehört zur Reihe

Du musst dich einloggen, um "Wissenswertes" zu bearbeiten.
Weitere Hilfe gibt es auf der "Wissenswertes"-Hilfe-Seite.
Gebräuchlichster Titel
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Originaltitel
Alternative Titel
Ursprüngliches Erscheinungsdatum
Figuren/Charaktere
Wichtige Schauplätze
Wichtige Ereignisse
Zugehörige Filme
Epigraph (Motto/Zitat)
Widmung
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
To Suzanne, Barbara, Marvin, and the memory of Bram and Sweetie π
Erste Worte
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
Each of the past three centuries has been dominated by a single technology.
Zitate
Letzte Worte
Die Informationen stammen von der englischen "Wissenswertes"-Seite. Ändern, um den Eintrag der eigenen Sprache anzupassen.
(Zum Anzeigen anklicken. Warnung: Enthält möglicherweise Spoiler.)
Hinweis zur Identitätsklärung
Verlagslektoren
Werbezitate von
Originalsprache
Anerkannter DDC/MDS
Anerkannter LCC
Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book-the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The fifth edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.

Keine Bibliotheksbeschreibungen gefunden.

Buchbeschreibung
Zusammenfassung in Haiku-Form

Aktuelle Diskussionen

Keine

Beliebte Umschlagbilder

Gespeicherte Links

Bewertung

Durchschnitt: (3.82)
0.5
1 2
1.5
2 9
2.5 2
3 26
3.5 4
4 42
4.5 5
5 31

Bist das du?

Werde ein LibraryThing-Autor.

 

Über uns | Kontakt/Impressum | LibraryThing.com | Datenschutz/Nutzungsbedingungen | Hilfe/FAQs | Blog | LT-Shop | APIs | TinyCat | Nachlassbibliotheken | Vorab-Rezensenten | Wissenswertes | 204,773,587 Bücher! | Menüleiste: Immer sichtbar