Computer Networks: A Systems Approach, Sixth Edition explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This sixth edition contains completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, as provided by numerous contributors via a unique open source model developed jointly by the authors and publisher. Hallmark features of the book are retained, including chapter problem statements, which introduce issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is intended primarily for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...