[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Computer Networks: A Systems Approach, 3rd EditionMay 2003
Publisher:
  • Morgan Kaufmann Publishers Inc.
  • 340 Pine Street, Sixth Floor
  • San Francisco
  • CA
  • United States
ISBN:978-1-55860-832-0
Published:01 May 2003
Skip Bibliometrics Section
Reflects downloads up to 13 Jan 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Beck M (2019). On the hourglass model, Communications of the ACM, 62:7, (48-57), Online publication date: 24-Jun-2019.
  2. Shaheen S, Khannum A, Akram M, Khan S, Seo S and Javed M (2016). Evaluating the significance of error checksums for wireless video streaming, Multimedia Tools and Applications, 75:22, (14759-14781), Online publication date: 1-Nov-2016.
  3. Yayah A, Coulibaly Y, Ismail A and Rouskas G (2016). Hybrid offset-time and burst assembly algorithm H-OTBA for delay sensitive applications over optical burst switching networks, International Journal of Communication Systems, 29:2, (251-261), Online publication date: 25-Jan-2016.
  4. ACM
    Babu E, Nagaraju C and Prasad M A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (339-344)
  5. Peng Y, Song Q, Yu Y and Wang F (2014). Fault-tolerant routing mechanism based on network coding in wireless mesh networks, Journal of Network and Computer Applications, 37, (259-272), Online publication date: 1-Jan-2014.
  6. Rabanal P, Rodríguez I and Rubio F (2013). An ACO-RFD hybrid method to solve NP-complete problems, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:5, (729-744), Online publication date: 1-Oct-2013.
  7. Altarawneh R and Humayoun S A Two-Perspective Visualization Approach for Utilizing Visualization Power in Computer Science Education Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research, (85-91)
  8. ACM
    Theodouli A and Gounaris A Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services Proceedings of the 28th Annual ACM Symposium on Applied Computing, (826-831)
  9. ACM
    Sreenu G and Dhanya P Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structure Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (405-408)
  10. ACM
    Jerkins J MINA Proceedings of the 50th annual ACM Southeast Conference, (7-12)
  11. Casas P, Nñerola M and Juan A Using specification and description language to represent users' profiles in OMNET++ simulations Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium, (221-228)
  12. ACM
    Wang Y and Gaspes V An embedded language for programming protocol stacks in embedded systems Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and program manipulation, (63-72)
  13. ACM
    Vosoughi A, Bilal K, Khan S, Min-Allah N, Li J, Ghani N, Bouvry P and Madani S A multidimensional robust greedy algorithm for resource path finding in large-scale distributed networks Proceedings of the 8th International Conference on Frontiers of Information Technology, (1-6)
  14. ACM
    Luh H, Wang C and Lin C Dropping behavior of a random early detection mechanism by a queueing model of batch arrivals and multiple servers Proceedings of the 5th International Conference on Queueing Theory and Network Applications, (67-74)
  15. Tang X, Li K, Liao G and Li R (2010). List scheduling with duplication for heterogeneous computing systems, Journal of Parallel and Distributed Computing, 70:4, (323-329), Online publication date: 1-Apr-2010.
  16. Sturgeon T, Allison C and Miller A Exploring 802.11 Proceedings of the 39th IEEE international conference on Frontiers in education conference, (907-912)
  17. Rabanal P and Rodríguez I Hybridizing river formation dynamics and ant colony optimization Proceedings of the 10th European conference on Advances in artificial life: Darwin meets von Neumann - Volume Part II, (424-431)
  18. Allison C, Miller A, Oliver I and Sturgeon T Global Connections for Lasting Impressions Proceedings of the 8th International Conference on Advances in Web Based Learning, (48-57)
  19. Qi Y, Hoshyar R and Tafazolli R On the performance of HARQ with hybrid relaying schemes Proceedings of the 2009 IEEE international conference on Communications, (4357-4362)
  20. Yu M and Leung K (2009). A trustworthiness-based QoS routing protocol for wireless ad hoc networks, IEEE Transactions on Wireless Communications, 8:4, (1888-1898), Online publication date: 1-Apr-2009.
  21. Zou X, Bhanu B and Roy-Chowdhury A (2009). Continuous learning of a multilayered network topology in a video camera network, Journal on Image and Video Processing, 2009, (1-1), Online publication date: 1-Jan-2009.
  22. ACM
    Agarwal P and Prabhakaran B Tamper proofing mechanisms for motion capture data Proceedings of the 10th ACM workshop on Multimedia and security, (91-100)
  23. ACM
    Singhal H and Michailidis G (2008). Optimal sampling in state space models with applications to network monitoring, ACM SIGMETRICS Performance Evaluation Review, 36:1, (145-156), Online publication date: 12-Jun-2008.
  24. ACM
    Singhal H and Michailidis G Optimal sampling in state space models with applications to network monitoring Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (145-156)
  25. Ergin M, Gruteser M, Luo L, Raychaudhuri D and Liu H (2008). Available bandwidth estimation and admission control for QoS routing in wireless mesh networks, Computer Communications, 31:7, (1301-1317), Online publication date: 1-May-2008.
  26. Phanishayee A, Krevat E, Vasudevan V, Andersen D, Ganger G, Gibson G and Seshan S Measurement and analysis of TCP throughput collapse in cluster-based storage systems Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
  27. Usha M and Banu R (2007). A proactive mechanism for quality of service control in high speed networks, International Journal of Business Information Systems, 2:3, (312-327), Online publication date: 1-Nov-2007.
  28. Patel R, Benaissa M and Boussakta S (2007). Fast Parallel-Prefix Architectures for Modulo 2n-1 Addition with a Single Representation of Zero, IEEE Transactions on Computers, 56:11, (1484-1492), Online publication date: 1-Nov-2007.
  29. Darabkh K and Aygün R (2007). TCP traffic control evaluation and reduction over wireless networks using parallel sequential decoding mechanism, EURASIP Journal on Wireless Communications and Networking, 2007:3, (1-10), Online publication date: 1-Jul-2007.
  30. Mallada E and Paganini F Optimal congestion control with multipath routing using TCP-FAST and a variant of RIP Proceedings of the 1st EuroFGI international conference on Network control and optimization, (205-214)
  31. Hamid N (2007). A lightweight framework for peer-to-peer programming, Journal of Computing Sciences in Colleges, 22:5, (98-104), Online publication date: 1-May-2007.
  32. Oh S and Fox G (2007). Optimizing Web Service messaging performance in mobile computing, Future Generation Computer Systems, 23:4, (623-632), Online publication date: 1-May-2007.
  33. ACM
    Stann F, Heidemann J, Shroff R and Murtaza M RBP Proceedings of the 4th international conference on Embedded networked sensor systems, (85-98)
  34. ACM
    Loo B, Condie T, Garofalakis M, Gay D, Hellerstein J, Maniatis P, Ramakrishnan R, Roscoe T and Stoica I Declarative networking Proceedings of the 2006 ACM SIGMOD international conference on Management of data, (97-108)
  35. Riabov V (2006). Challenging projects and virtual labs in web-enhanced networking technology classes, Journal of Computing Sciences in Colleges, 21:6, (88-99), Online publication date: 1-Jun-2006.
  36. Winters T, Ausanka-Crues R, Kegel M, Shimshock E, Turner D and Erlinger M TinkerNet Proceedings of the 8th Australasian Conference on Computing Education - Volume 52, (253-259)
  37. ACM
    Loo B, Hellerstein J, Stoica I and Ramakrishnan R (2005). Declarative routing, ACM SIGCOMM Computer Communication Review, 35:4, (289-300), Online publication date: 1-Oct-2005.
  38. Al-Kabir Z, Le K and Sharma D MEDADVIS Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II, (789-795)
  39. Nickerson J (2005). A Concept of Communication Distance and Its Application to Six Situations in Mobile Environments, IEEE Transactions on Mobile Computing, 4:5, (409-419), Online publication date: 1-Sep-2005.
  40. ACM
    Loo B, Hellerstein J, Stoica I and Ramakrishnan R Declarative routing Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (289-300)
  41. Lam R, Chan H, Dillon T, Li V and Leung V (2005). Integrating connectionless and connection-oriented traffic using quantum packets, Computer Communications, 28:8, (898-907), Online publication date: 1-May-2005.
  42. Conti M, Gregori E and Lapenna W (2005). Client-side content delivery policies in replicated web services, Performance Evaluation, 59:2-3, (137-157), Online publication date: 1-Feb-2005.
  43. Pagli L, Prencipe G and Zuva T Distributed computation for swapping a failing edge Proceedings of the 6th international conference on Distributed Computing, (28-39)
  44. Flocchini P, Pagli L, Prencipe G, Santoro N, Widmayer P and Zuva T Computing all the best swap edges distributively Proceedings of the 8th international conference on Principles of Distributed Systems, (154-168)
  45. Kar D (2004). Network measurement and path characterization using user datagram protocol, Journal of Computing Sciences in Colleges, 19:4, (321-328), Online publication date: 1-Apr-2004.
Contributors
  • Princeton University
  • Cisco Systems

Reviews

Cecilia G. Manrique

This hefty, more than 800-page text has shown its staying power by going into its third edition. It combines the major standard knowledge one needs to learn about computer networks and their operations with the newest, latest developments in the field, such as the ability of the Internet to transmit video and audio information. Like the authors, I favor the use of the systems approach, because it treats the network as being made up of interrelated parts that work together to perform a specific function. By focusing on this interconnectedness, students and professionals in the networking field are provided with the best possible conceptual basis for understanding the current state of networking technologies, as well as the foundation for the new ones that will evolve in the near future. The book starts out with the basics of computer networks, including how and why they operate, and then moves into the complexities of the relationships among the various components and aspects of intranets and the Internet. Each chapter starts out with a quote, and a problem area. The book delves into each of the topics (the foundation; building blocks of networks; direct link networks; packet switching; Internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and various applications, such as multimedia) in an in-depth manner, so that the student feels comfortable with the build-up of knowledge. Each chapter features diagrams; C code samples; pictures; and shaded sidebars, discussing advanced topics, such as "How Big is a Mega__?__" and "Adaptive Video Coding," to elaborate on the various aspects being discussed in the chapter. Hundreds of end-of-chapter exercises are also provided, so that students can determine whether they have absorbed the information in the chapter. Some of the questions are simple, and others are difficult and more complicated, and are meant to challenge those who wish to be challenged. Answers to some of the questions are also provided at the back of the book. Each chapter ends with a summary of what was covered; a thought-provoking open issue, such as ubiquitous networking or the future of ATM; and a list of further reading materials and "live" Web page references (those proven to be more stable resources, which will not disappear from the Internet overnight). At the end of the book, the user will find a glossary of the terms used in the text, as well as a more extensive bibliography. What I would have appreciated, and what would have been helpful, is a listing of the various acronyms used in the book, for quick reference. Every field of study has its own set of jargon, and computing and networking are no different. It would have been valuable to know that there was a list of acronyms and their meanings at the beginning of the text, so that one would not have to wade through the glossary to find them. An added feature of this edition is a downloadable network simulation lab manual, to allow students to visualize and experiment with the core networking technologies that are being discussed in the book. This is a valuable pedagogical tool, since it is in direct coordination with the book's discussion of various topics. This textbook tries to be up to date, and succeeds at incorporating the features that its readers and users must have asked for in their feedback on the previous edition. As such, the book satisfies the needs of students and professors alike, in gaining a better understanding of networks, and of what the future might hold for them. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations