did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780763711221

Computer Networks and Open Systems: An Application Development Perspective

by ;
  • ISBN13:

    9780763711221

  • ISBN10:

    0763711225

  • Format: Paperback
  • Copyright: 2000-03-17
  • Publisher: Jones & Bartlett Learning
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $332.94 Save up to $1.66
  • Buy New
    $331.28
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Computer Networks and Open Systems: An Application Development Perspective  covers principles, theory, and techniques of networks and open systems from a practical perspective, using real system and network applications as its basis. The selection of topics forms a core of material in computer networking, emphasizing methods And The environment for application development. The text aims to make readers immediately comfortable in today's networking environment while equipping them to keep pace in one of the fastest moving and most exciting areas of computer system development.  Students will enter the study of networking through their own experience as a network users, and they will have the opportunity to practice the kind of networking tasks they will perform in the workplace.   the authors take an application development perspective.  This point of view reverses that traditional order of networking topics; instead of proceeding from the Physical Layer upward, The authors move from the Application Layer downward.   

Table of Contents

Preface xxi
Intended Audience and Supplementary Materials xxv
I FUNDAMENTALS 1(104)
Networked Computers
3(47)
A Networking Applications Example
4(4)
Proprietary vs. Open Systems
5(1)
Communications Requirements
5(3)
What Is a Network?
8(1)
Reasons for Installing Networks
9(1)
Network System Software
9(2)
Network Protocols and Standards
11(4)
Protocol Example
11(2)
An Argument for Standards
13(1)
Communication Modes
14(1)
Layering and Network Reference Models
15(11)
The Concept of Layering
15(1)
The TCP/IP Suite of Protocols
16(1)
SNA
17(2)
The OSI Reference Model
19(3)
Presentation and Session Layer
22(2)
Transport Layer
24(1)
Network, Data Link, and Physical Layers
25(1)
The OSI Model and the World Wide Web
26(1)
Interactions Between the Layers
27(3)
Services
27(1)
Data Units
28(1)
Layer Operation
29(1)
Service Specifications
30(6)
Service Primitives
30(2)
Time Sequence Diagrams
32(2)
Protocol Machines
34(2)
The Major Types of Networks
36(14)
Local Area Networks
38(5)
Wide Area Networks
43(3)
Metropolitan Area Networks
46(1)
Summary
47(1)
Exercises
48(2)
The Internet and the World Wide Web
50(32)
What Is the Internet?
51(2)
The World Wide Web
52(1)
Hypertext and Hypermedia
53(4)
Browsers
53(1)
Cascading Style Sheets
53(2)
File Formats
55(2)
Beyond HTML: XML
57(1)
Protocols
57(3)
HTTP
57(1)
Gopher
58(1)
FTP
59(1)
File
59(1)
Mailto
59(1)
News
60(1)
Application Development in the World Wide Web
60(13)
Forms and Form Servers
60(1)
HTML Forms
61(4)
Forms Processing
65(6)
Java
71(2)
Information Discovery
73(9)
Anonymous FTP and Archie
73(1)
Gopher and Veronica
74(1)
Web Searchers and Indexing
74(3)
Metadata
77(2)
Summary
79(1)
Exercises
79(3)
ASN.1
82(23)
Purpose of ASN.1
82(1)
Example
83(1)
Abstract Syntax Notation
83(22)
Modules and Assignments
84(1)
Built-in Types
85(7)
Tagged
92(2)
Useful Types
94(1)
Additional Features
95(5)
Summary
100(1)
Exercises
101(4)
II THE APPLICATION LAYER 105(188)
The Application Layer: Common Elements
107(27)
Common Needs of Applications
108(1)
Association and Shared Context
108(6)
Association: Concepts and Processes
109(1)
ACSE: The Service
109(3)
ACSE: The Protocol
112(2)
Remote Operation of Instructions
114(7)
Concepts and Processes
117(1)
ROSE: The Service
118(1)
ROSE: The Protocol
119(1)
An Example Using ROSE
119(2)
Reliable Transfer of Information
121(3)
Reliable Transfer: Concepts and Processes
121(1)
RTSE: The Service
122(1)
RTSE: The Protocol
123(1)
Services Required by RTSE
123(1)
Commitment, Concurrency, and Recovery
124(6)
CCR: Concepts and Processes
124(2)
CCR: The Service
126(3)
CCR: The Protocol
129(1)
Some Common Tools from the TCP/IP Environment
130(4)
PING
130(1)
Traceroute
131(1)
Summary
132(1)
Exercises
133(1)
Applications: Electronic Messaging Systems
134(45)
A Model for Electronic Messaging
135(9)
User Agents
136(1)
Message Transfer Agents: X.400 MTA and Internet SMTP
136(7)
Access Units
143(1)
Message Store
143(1)
The Protocols
143(1)
The Mail Access Environment
144(5)
Message Creation and Presentation
147(2)
Dealing with Addresses
149(8)
Making Two Different Mail Systems Talk to Each Other
149(1)
Internet Domain Name Addresses
150(1)
Resolving Addresses: Domain Name Service
151(2)
X.400 O/R Addresses and the Directory
153(1)
Aliases and Distribution Lists
153(3)
Distribution Lists in X.400
156(1)
Retaining and Discarding Messages
157(7)
Folders
157(1)
Message Storage and Retrieval
157(4)
Knowing About Mail Delivery or Failure
161(3)
The System Components
164(7)
Parsing the Mail Envelope/Header
164(1)
Receiving Mail
165(1)
Delivery of Mail Messages
166(5)
X.400 Messaging System
171(8)
Management Domains
171(1)
X.400 in the Application Layer
171(1)
Services
172(1)
Message Format
172(1)
Security
173(1)
Summary
174(1)
Exercises
175(4)
Virtual Terminals
179(21)
Virtual Device Interface
179(2)
Terminal Emulation
181(4)
Terminal Imitation with Kermit
181(1)
Terminal Conformance with UNIX Termcap
182(2)
Terminal Characteristics Negotiation with Telnet
184(1)
The OSI Virtual Terminal
185(15)
VT Classification
186(1)
The OSI Virtual Terminal Service Model
186(10)
Using VT Services: Some Examples
196(3)
Summary
199(1)
Exercises
199(1)
File Access and Transfer
200(32)
File System Characteristics
201(3)
Structure
201(2)
Attributes
203(1)
Operations
204(1)
File Transfer Modes and Options
204(5)
Kermit
206(1)
FTP
207(1)
Network File System
208(1)
Issues in Network-Based File Systems
209(2)
File Transfer, Access, and Management
211(21)
A Virtual Filestore
212(3)
FTAM Service Elements
215(1)
FTAM Regimes
216(6)
The FTAM Services
222(2)
Using FTAM for File Access: Some Examples
224(6)
Summary
230(1)
Exercises
230(2)
The Directory X.500 and LDAP
232(17)
Characteristics
234(1)
The Distributed Directory
235(12)
The Directory Information Base
236(3)
The Directory Schema
239(1)
The Directory Service
239(5)
Operation of the Model
244(1)
Replication
245(2)
Directory Protocols
247(2)
Summary
247(1)
Exercises
248(1)
Encryption and Compression
249(44)
Secure Transmission of Messages
250(18)
Terminology
250(1)
Security Services
251(1)
Private and Public Key Systems
252(5)
Digital Signatures
257(2)
Trusted Server Systems
259(3)
Tools to Detect Network Vulnerabilities
262(1)
Secure Sockets Layer
263(1)
Electronic Mail Security
264(4)
Data Compression
268(25)
Terminology
269(1)
Categories
269(1)
Methods
270(19)
Summary
289(1)
Exercises
290(3)
III THE SUPPORTING STRUCTURE 293(132)
Presentation and Session Layers
295(15)
Presentation Layer
296(7)
Services Provided by the Presentation Layer
296(2)
Basic Encoding Rules (BER)
298(5)
Session Layer
303(7)
Tokens
304(1)
Synchronization and Activity Concepts
304(1)
Services Provided by the Session Layer
305(3)
Connectionless Session Service
308(1)
Summary
308(1)
Exercises
309(1)
Transport Layer
310(33)
The Services Provided by the Transport Layer
311(1)
The OSI Transport Service
312(3)
Network Service Relevant to Transport Services
313(1)
Connection Establishment in OSI
314(1)
Data Transfer in OSI
315(1)
Connection Release in OSI
315(1)
The Internet TCP Transport Service
315(6)
Connection Establishment in TCP
317(1)
Data Transfer in TCP
318(1)
Status and Error Reporting in TCP
318(1)
Connection Termination in TCP
318(3)
The Transport Protocol
321(13)
Connection Establishment
321(2)
Data Transfer
323(9)
Connection Release
332(2)
Connection-Oriented vs. Connectionless Services
334(1)
Application Program Interfaces (API)
335(5)
X-Open Interface to OSI Transport Services
336(1)
UNIX Interface to TCP
337(3)
Services Required by the Transport Layer
340(3)
Summary
340(2)
Exercises
342(1)
Network Layer
343(30)
Addressing
344(9)
Internet Addresses
344(2)
IPv6 Addressing
346(3)
OSI Addresses
349(4)
Routing
353(6)
Routing Techniques
353(1)
Discovery
354(1)
IS to IS Routing
354(5)
Firewalls
359(5)
Architectures
360(2)
Examples
362(1)
Tradeoffs
363(1)
Services Provided by the Network Layer
364(9)
Connection-Oriented Network Services
364(1)
Connectionless Network Service
365(4)
Segmentation and Reassembly
369(1)
Summary
370(1)
Exercises
371(2)
Medium Access Control
373(26)
Variations on Medium Access Control
374(1)
Contention-Based Access
374(13)
Alohanet
374(4)
Carrier Sense Multiple Access
378(9)
Controlled Access
387(7)
IEEE 802.5: The Token Ring
387(3)
IEEE 802.4: The Token Bus
390(4)
Joining LANs
394(5)
Bridges
394(1)
Routers
395(1)
Higher-Layer Gateways
396(1)
Application Gateways
396(1)
Summary
397(1)
Exercises
397(2)
Bridges Between LANs
399(14)
Transparent or Spanning Tree Bridges
399(7)
Sample Connections
401(2)
Spanning Tree Diagram
403(3)
Source Routing Bridges
406(3)
SRT Bridges
409(1)
SLIP and PPP
410(1)
Vulnerability and Privacy Issues
411(2)
Summary
411(1)
Exercises
412(1)
Logical Link Control and the Physical Layer
413(12)
The Data Link Layer: Logical Link Control
414(6)
Framing
414(1)
Error Control
415(4)
Flow Control
419(1)
Link Management
419(1)
Synchronous and Asynchronous Transfer
420(1)
The Physical Layer
420(5)
High-Speed Transmission
421(2)
Summary
423(1)
Exercises
423(2)
A. Internet Archive Server 425(4)
B. A Review of HTML 429(14)
B.1 Why a Markup Language
430(1)
B.2 Simple Formatting
430(4)
B.3 Links and Anchors
434(3)
B.4 Images
437(2)
B.5 Tables
439(4)
Bibliography 443(2)
Index 445

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program