DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Transport protocol for real-time communication in Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Multi-constraint Qos Unicast Routing Using Genetic Algorithm (MURUGA)
Applied Soft Computing
Automated testing of industrial control devices: the delphi database
Proceedings of the 6th International Workshop on Automation of Software Test
Modeling multiple hop wireless networks with varying transmission power and data rate
Computer Communications
State coverage metrics for specification-based testing with Büchi automata
TAP'11 Proceedings of the 5th international conference on Tests and proofs
Bandwidth variability prediction with rolling interval least squares (RILS)
Proceedings of the 50th Annual Southeast Regional Conference
Data binding for standard-based web applications
Proceedings of the 27th Annual ACM Symposium on Applied Computing
SDR OFDM Waveform Design for a UGV/UAV Communication Scenario
Journal of Signal Processing Systems
Validation of SDL-based architectural design models using communication-based coverage criteria
Information and Software Technology
Congestion control in vehicular ad hoc networks using meta-heuristic techniques
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Image sensor communication for patient ID recognition using mobile devices
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Ambient Computing and Intelligence
Modeling and validation of execution of tasks on high speed network under distributed environment
ACM SIGSOFT Software Engineering Notes
Towards a content-centric approach to crowd-sensing in vehicular clouds
Journal of Systems Architecture: the EUROMICRO Journal
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |
Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire bookthe Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.