Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Computer NetworksOctober 2010
Publisher:
  • Prentice Hall Press
  • One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-212695-3
Published:07 October 2010
Pages:
960
Skip Bibliometrics Section
Reflects downloads up to 14 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire bookthe Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.

Cited By

  1. ACM
    Arun A, Saruwatari S, Shah S and Bharadia D XRLoc: Accurate UWB Localization to Realize XR Deployments Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, (459-473)
  2. Gholipoor P, Madani M and Poursajadi S (2023). Performance analysis of multi-hop token relay strategy in HF networks, Telecommunications Systems, 83:3, (277-287), Online publication date: 1-Jul-2023.
  3. Hussak W and Trehan A (2023). Termination of amnesiac flooding, Distributed Computing, 36:2, (193-207), Online publication date: 1-Jun-2023.
  4. ACM
    Fahmida S, Modekurthy‬ V, Rahman M and Saifullah A Handling Coexistence of LoRa with Other Networks through Embedded Reinforcement Learning Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, (410-423)
  5. ACM
    Gavriluţ V, Pruski A and Berger M (2023). Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications, ACM Computing Surveys, 55:3, (1-35), Online publication date: 30-Apr-2023.
  6. Poriye M and Upadhyaya S (2023). A DNA Based Framework for Securing Information Using Asymmetric Encryption, Wireless Personal Communications: An International Journal, 129:3, (1717-1733), Online publication date: 1-Apr-2023.
  7. Fibich C, Schmitt P, Höller R, Rössler P and Kindratenko V (2023). Open-Source Ethernet MAC IP Cores for FPGAs, International Journal of Reconfigurable Computing, 2023, Online publication date: 1-Jan-2023.
  8. ACM
    Bhardwaj R, Tumanov A, Wang S, Liaw R, Moritz P, Nishihara R and Stoica I ESCHER Proceedings of the 13th Symposium on Cloud Computing, (47-62)
  9. ACM
    Wei Tan C (2022). The Value of Cooperation, ACM SIGMETRICS Performance Evaluation Review, 49:4, (8-13), Online publication date: 2-Jun-2022.
  10. Haldorai A, Sivaraj J, Nagabushanam M, Kingston Roberts M and Karras D (2022). Cognitive Wireless Networks Based Spectrum Sensing Strategies, Applied Computational Intelligence and Soft Computing, 2022, Online publication date: 1-Jan-2022.
  11. Gong P, Chen T, Xu P, Chen Q and Zhu Z (2022). DS-SWIPT, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  12. Matos R, Luján E and Mocskos E Performance of D2D/NB-IoT communications in urban and suburban environments Proceedings of the Winter Simulation Conference, (1-12)
  13. ACM
    Marques R, Epiphaniou G, Al-Khateeb H, Maple C, Hammoudeh M, De Castro P, Dehghantanha A and Choo K (2021). A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks, ACM Transactions on Internet Technology, 21:4, (1-30), Online publication date: 22-Jul-2021.
  14. Bayramzadeh Z, Kshemkalyani A, Molla A and Sharma G Weak Amnesiac Flooding of Multiple Messages Networked Systems, (88-94)
  15. Islam M, Fahmin A, Hossain M and Atiquzzaman M (2021). Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques, Wireless Personal Communications: An International Journal, 116:3, (1993-2021), Online publication date: 1-Feb-2021.
  16. Conte D, de Souza P, Martins G and Bruschi S Teaching Parallel Programming for Beginners in Computer Science 2020 IEEE Frontiers in Education Conference (FIE), (1-9)
  17. Hideg A and Lukovszki T Asynchronous Filling by Myopic Luminous Robots Algorithms for Sensor Systems, (108-123)
  18. ACM
    Rodríguez A, Fulp E, John D and Cui J Using evolutionary algorithms and pareto ranking to identify secure virtual local area networks Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1512-1519)
  19. AlGhadhban A, Celik A, Shihada B and Alouini M (2020). LightFDG: An Integrated Approach to Flow Detection and Grooming in Optical Wireless DCNs, IEEE Transactions on Network and Service Management, 17:2, (1153-1166), Online publication date: 1-Jun-2020.
  20. Yazdani Abyaneh A, Pourahmadi V and Hosein Gharari Foumani A (2019). CSI‐based authentication, Transactions on Emerging Telecommunications Technologies, 31:2, Online publication date: 16-Feb-2020.
  21. Farshin A and Sharifian S (2019). A modified knowledge-based ant colony algorithm for virtual machine placement and simultaneous routing of NFV in distributed cloud architecture, The Journal of Supercomputing, 75:8, (5520-5550), Online publication date: 1-Aug-2019.
  22. ACM
    Peros S, Delbruel S, Michiels S, Joosen W and Hughes D Khronos Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, (127-138)
  23. ACM
    Cresci S, Lillo F, Regoli D, Tardelli S and Tesconi M (2019). Cashtag Piggybacking, ACM Transactions on the Web, 13:2, (1-27), Online publication date: 31-May-2019.
  24. ACM
    Frinhani R, Serafim W and Batista B Optimization of traffic in real manufacturing environment through WAN accelerators Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
  25. ACM
    Silva J and Fonte V Data Security and Trustworthiness in Online Public Services Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance, (348-353)
  26. ACM
    Liu P, Chen L, Lyu G, Lu Y, Kang X and Du J A Data Exchange Protocol of Physical Gap Device for Power System Proceedings of the International Conference on Industrial Control Network and System Engineering Research, (87-91)
  27. ACM
    Hamza-Lup F, Su H and Wissing C Web-enabled Software for Real-time Autonomous Wireless Sensors Data Visualization Proceedings of the International Conference on Industrial Control Network and System Engineering Research, (70-74)
  28. (2019). Study of e-governance in India, International Journal of Electronic Security and Digital Forensics, 11:2, (119-144), Online publication date: 1-Jan-2019.
  29. Tsai P, Gan Y and Sanchez D Rethinking the memory hierarchy for modern languages Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (203-216)
  30. ACM
    Pullen J Teaching network protocol concepts in an open-source simulation environment Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, (165-169)
  31. Bayat-Yeganeh H, Shah-Mansouri V and Kebriaei H (2018). A multi-state Q-learning based CSMA MAC protocol for wireless networks, Wireless Networks, 24:4, (1251-1264), Online publication date: 1-May-2018.
  32. Wu C, Wang Y, Lu Z, Pardalos P, Xu D, Zhang Z and Du D (2018). Solving the degree-concentrated fault-tolerant spanning subgraph problem by DC programming, Mathematical Programming: Series A and B, 169:1, (255-275), Online publication date: 1-May-2018.
  33. Maehara T, Marumo N and Murota K (2018). Continuous relaxation for discrete DC programming, Mathematical Programming: Series A and B, 169:1, (199-219), Online publication date: 1-May-2018.
  34. ACM
    Elvezio C, Sukan M and Feiner S Mercury Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-12)
  35. Roy A and Pham H (2018). Toward the development of a conventional time series based web error forecasting framework, Empirical Software Engineering, 23:2, (570-644), Online publication date: 1-Apr-2018.
  36. Bauer J and Knieps G (2018). Complementary innovation and network neutrality, Telecommunications Policy, 42:2, (172-183), Online publication date: 1-Mar-2018.
  37. Jung D, Lee S, Rhee W and Ahn J (2018). Partitioning Compute Units in CNN Acceleration for Statistical Memory Traffic Shaping, IEEE Computer Architecture Letters, 17:1, (72-75), Online publication date: 1-Jan-2018.
  38. ACM
    Li Y, Chang K, Bel O, Miller E and Long D CAPES Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-14)
  39. Soewito B, Gunawan F and Mansuan M (2017). WAN Optimization to Speed up Data Transfer, Procedia Computer Science, 116:C, (45-53), Online publication date: 1-Nov-2017.
  40. ACM
    Subramanian S, Jeffrey M, Abeydeera M, Lee H, Ying V, Emer J and Sanchez D (2017). Fractal, ACM SIGARCH Computer Architecture News, 45:2, (587-599), Online publication date: 14-Sep-2017.
  41. Anand D and Khemchandani V (2017). An Analytical Method to Audit Indian e-Governance System, International Journal of Electronic Government Research, 13:3, (18-37), Online publication date: 1-Jul-2017.
  42. ACM
    Subramanian S, Jeffrey M, Abeydeera M, Lee H, Ying V, Emer J and Sanchez D Fractal Proceedings of the 44th Annual International Symposium on Computer Architecture, (587-599)
  43. Khorov E, Krasilov A, Krotov A and Lyakhov A (2017). Will MCCA revive wireless multihop networks?, Computer Communications, 104:C, (159-174), Online publication date: 15-May-2017.
  44. Zikratov I, Korzhuk V, Shilov I and Gvozdev A Formalization of the Feature Space for Detection of Attacks on Wireless Sensor Networks Proceedings of the 20th Conference of Open Innovations Association FRUCT, (526-533)
  45. Korzhuk V, Shilov I and Torshenko J Reduction of the Feature Space for the Detection of Attacks of Wireles Sensor Networks Proceedings of the 20th Conference of Open Innovations Association FRUCT, (195-201)
  46. Korzhuk V, Krivtsova I and Shilov I The Model of the Attack Implementation on Wireless Sensor Networks Proceedings of the 20th Conference of Open Innovations Association FRUCT, (187-194)
  47. Pradhan P (2017). Proposed Heuristics Model Optimizing the Risk on RTS, International Journal of System Dynamics Applications, 6:2, (31-51), Online publication date: 1-Apr-2017.
  48. Sinyov N, Olenev V, Lavrovskaya I and Korobkov I Research and analysis of flow control mechanism for transport protocols of the space wire onboard networks Proceedings of the 19th Conference of Open Innovations Association FRUCT, (219-225)
  49. Taherkhani N and Pierre S (2016). Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm, IEEE Transactions on Intelligent Transportation Systems, 17:11, (3275-3285), Online publication date: 1-Nov-2016.
  50. Taherkhani N and Pierre S (2016). Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 108:C, (15-28), Online publication date: 24-Oct-2016.
  51. Sheltami T, Al-Roubaiey A and Mahmoud A (2016). A survey on developing publish/subscribe middleware over wireless sensor/actuator networks, Wireless Networks, 22:6, (2049-2070), Online publication date: 1-Aug-2016.
  52. Xie B, Fang D, Xing T, Zhang L, Chen X, Tang Z and Wang A (2016). FISCP, Wireless Networks, 22:5, (1751-1766), Online publication date: 1-Jul-2016.
  53. ACM
    Das S, Li F, Narasayya V and König A Automated Demand-driven Resource Scaling in Relational Database-as-a-Service Proceedings of the 2016 International Conference on Management of Data, (1923-1934)
  54. Gajjar S, Sarkar M and Dasgupta K (2016). FAMACROW, Applied Soft Computing, 43:C, (235-247), Online publication date: 1-Jun-2016.
  55. Olenev V, Podgornova E and Lavrovskaya I Protocol for deterministic data delivery in SpaceWire networks Proceedings of the 18th Conference of Open Innovations Association FRUCT, (233-240)
  56. Rambo E, Saidi S and Ernst R Providing formal latency guarantees for ARQ-based protocols in networks-on-chip Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (103-108)
  57. ACM
    Brandt S, Foerster K and Wattenhofer R Augmenting anycast network flows Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
  58. ACM
    Murillo S, Sánchez J and Sánchez-Lara E Enhancing Interfaces for Network Security Administrators with Legacy Attributes Proceedings of the Latin American Conference on Human Computer Interaction, (1-8)
  59. ACM
    Das M, Govardhan A and lakshmi D QoS web service Security Access Control case study using HTTP Secured Socket Layer Approach Proceedings of the The International Conference on Engineering & MIS 2015, (1-9)
  60. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services, Future Generation Computer Systems, 48:C, (19-27), Online publication date: 1-Jul-2015.
  61. Regis G, Degiovanni R, D'Ippolito N and Aguirre N Specifying event-based systems with a counting fluent temporal logic Proceedings of the 37th International Conference on Software Engineering - Volume 1, (733-743)
  62. Korobkov I, Podgornova E, Raszhivin D, Olenev V and Lavrovskaya I Scheduling mechanisms for spacewire networks Proceedings of the 17th Conference of Open Innovations Association FRUCT, (82-88)
  63. Ling J, Kanugovi S, Vasudevan S and Pramod A (2015). Enhanced capacity and coverage by Wi-Fi LTE integration, IEEE Communications Magazine, 53:3, (165-171), Online publication date: 1-Mar-2015.
  64. Ferrer M, de Diego M, Piñero G and Gonzalez A (2015). Active noise control over adaptive distributed networks, Signal Processing, 107:C, (82-95), Online publication date: 1-Feb-2015.
  65. Lin M and Ting C (2015). A polynomial-time algorithm for computing K-terminal residual reliability of d-trapezoid graphs, Information Processing Letters, 115:2, (371-376), Online publication date: 1-Feb-2015.
  66. Myoenzono R, Takyu O, Shirai K, Fujii T, Ohta M, Sasamori F and Handa S (2015). Data tracking and effect of frequency offset to simultaneous collecting method for wireless sensor networks, International Journal of Distributed Sensor Networks, 2015, (18-18), Online publication date: 1-Jan-2015.
  67. de Lima Rangel C, de Assis Rangel J and do Nascimento J Discrete event simulation for didactic support resource Proceedings of the 2014 Winter Simulation Conference, (3596-3607)
  68. ACM
    Bisen R, Verma H and Parakh A Hardware Implementation of Serial High Speed point to point Communication protocol Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  69. Angel S, Ballani H, Karagiannis T, O'Shea G and Thereska E End-to-end performance isolation through virtual datacenters Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (233-248)
  70. ACM
    Moratelli C, Zampiva S and Hessel F Full-Virtualization on MIPS-based MPSOCs embedded platforms with real-time support Proceedings of the 27th Symposium on Integrated Circuits and Systems Design, (1-7)
  71. ACM
    Mokhov S, Assels M, Paquet J and Debbabi M Toward Automated MAC Spoofer Investigations Proceedings of the 2014 International C* Conference on Computer Science & Software Engineering, (1-6)
  72. Xu Y, Sheng M, Liu J and Shi Y (2014). On the packet loss overhead in buffer-limited ad hoc networks, Wireless Networks, 20:6, (1653-1667), Online publication date: 1-Aug-2014.
  73. ACM
    Beschastnikh I, Brun Y, Ernst M and Krishnamurthy A Inferring models of concurrent systems from logs of their behavior with CSight Proceedings of the 36th International Conference on Software Engineering, (468-479)
  74. Sheng J, Chung S, Hansel L, McLane D, Morrah J, Baeg S and Park S (2014). JAUS to EtherCat bridge, Journal of Control Science and Engineering, 2014, (1-1), Online publication date: 1-Jan-2014.
  75. ACM
    Zaidi T and Saxena V (2013). Modeling and validation of execution of tasks on high speed network under distributed environment, ACM SIGSOFT Software Engineering Notes, 38:3, (1-6), Online publication date: 23-May-2013.
  76. ACM
    Uchiyama A, Hirao T, Yamaguchi H and Higashino T Image sensor communication for patient ID recognition using mobile devices Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones, (1-5)
  77. ACM
    Taherkhani N and Pierre S Congestion control in vehicular ad hoc networks using meta-heuristic techniques Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, (47-54)
  78. ACM
    Marupally P, Paruchuri V and Hu C Bandwidth variability prediction with rolling interval least squares (RILS) Proceedings of the 50th annual ACM Southeast Conference, (209-213)
  79. ACM
    Heinrich M and Gaedke M Data binding for standard-based web applications Proceedings of the 27th Annual ACM Symposium on Applied Computing, (652-657)
  80. Tan L State coverage metrics for specification-based testing with Büchi automata Proceedings of the 5th international conference on Tests and proofs, (171-186)
  81. ACM
    Kube N, Yoo K and Hoffman D Automated testing of industrial control devices Proceedings of the 6th International Workshop on Automation of Software Test, (71-76)
  82. Stoina P, Quintero A and Cobo L (2010). Transport protocol for real-time communication in Wireless Sensor Networks, International Journal of Ad Hoc and Ubiquitous Computing, 5:2, (86-102), Online publication date: 1-Jan-2010.
  83. Rijpkema E, Goossens K, Radulescu A, Dielissen J, van Meerbergen J, Wielage P and Waterlander E Trade Offs in the Design of a Router with Both Guaranteed and Best-Effort Services for Networks on Chip Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
  84. Krishnamoorthy S and Suen C Universal multilingual information interchange system User-Oriented Content-Based Text and Image Handling, (780-809)
Contributors
  • University of Washington

Recommendations