Dynamics of usage-priced communication networks: the case of a single bottleneck resource
IEEE/ACM Transactions on Networking (TON)
Tuning radio resource in an overlay cognitive radio network for TCP: greed isn't good
IEEE Communications Magazine
Teaching computer networks in a real network: the technical perspectives
Proceedings of the 41st ACM technical symposium on Computer science education
Animations for computer networking protocols
Journal of Computing Sciences in Colleges
BitTorrent: extra-locality P2P approach for grid content distribution networks
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Variable-rate linear network coding
IEEE Transactions on Information Theory
Optimized query routing trees for wireless sensor networks
Information Systems
A linear encoding approach to index assignment in lossy source-channel coding
IEEE Transactions on Information Theory
An architectural view of game theoretic control
ACM SIGMETRICS Performance Evaluation Review
Statistical model applied to netflow for network intrusion detection
Transactions on computational science XI
Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey
ACM Transactions on Sensor Networks (TOSN)
Performance evaluation of a single node with general arrivals and service
ASMTA'11 Proceedings of the 18th international conference on Analytical and stochastic modeling techniques and applications
Towards minimum delay broadcasting and multicasting in multihop wireless networks
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
A framework for Resource-Aware Data Accumulation in sparse wireless sensor networks
Computer Communications
Modified packet scheduling algorithm for real-time service
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
An adaptive strategy for energy-efficient data collection in sparse wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Unicast versus multicast for live TV delivery in networks with tree topology
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
When Ambient Intelligence meets the Internet: User Module framework and its applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modified packet scheduling algorithm using real-time service
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
Simulation of anti-relay attack schemes for RFID ETC system
Proceedings of the 15th Communications and Networking Simulation Symposium
Teaching the RSA algorithm using spreadsheets
Journal of Computing Sciences in Colleges
Attacks and countermeasures in wireless cellular networks
Proceedings of the 2012 Information Security Curriculum Development Conference
On incentive-based inter-domain caching for content delivery in future internet architectures
Proceedings of the Asian Internet Engineeering Conference
Flexible dual TCP/UDP streaming for H.264 HD video over WLANs
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Exploration module for understanding the functionality of the internet in secondary education
Koli Calling '07 Proceedings of the Seventh Baltic Sea Conference on Computing Education Research - Volume 88
Slice embedding solutions for distributed service architectures
ACM Computing Surveys (CSUR)
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.13 |
Certain data-communication protocols hog the spotlight, but all of them have a lot in common. Computer Networking: A Top-Down Approach Featuring the Internet explains the engineering problems that are inherent in communicating digital information from point to point. The top-down approach mentioned in the subtitle means that the book starts at the top of the protocol stack--at the application layer--and works its way down through the other layers, until it reaches bare wire. The authors, for the most part, shun the well-known seven-layer Open Systems Interconnection (OSI) protocol stack in favor of their own five-layer (application, transport, network, link, and physical) model. It's an effective approach that helps clear away some of the hand waving traditionally associated with the more obtuse layers in the OSI model. The approach is definitely theoretical--don't look here for instructions on configuring Windows 2000 or a Cisco router--but it's relevant to reality, and should help anyone who needs to understand networking as a programmer, system architect, or even administration guru.The treatment of the network layer, at which routing takes place, is typical of the overall style. In discussing routing, authors James Kurose and Keith Ross explain (by way of lots of clear, definition-packed text) what routing protocols need to do: find the best route to a destination. Then they present the mathematics that determine the best path, show some code that implements those algorithms, and illustrate the logic by using excellent conceptual diagrams. Real-life implementations of the algorithms--including Internet Protocol (both IPv4 and IPv6) and several popular IP routing protocols--help you to make the transition from pure theory to networking technologies. --David WallTopics covered: The theory behind data networks, with thorough discussion of the problems that are posed at each level (the application layer gets plenty of attention). For each layer, there's academic coverage of networking problems and solutions, followed by discussion of real technologies. Special sections deal with network security and transmission of digital multimedia.