MARC details
000 -CABECERA |
Longitud fija campo de control |
11884ntdaa2200301 ab4500 |
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL |
Identificador del número de control |
UnInEc |
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN |
Fecha y hora de la última transacción |
20180803095414.0 |
006 - CÓDIGOS DE INFORMACIÓN DE LONGITUD FIJA - CARACTERÍSTICAS DEL MATERIAL ADICIONAL |
Códigos de información de longitud fija - Características del material adicional |
a||||g ||i| 00| 0 |
008 - CÓDIGOS DE INFORMACIÓN DE LONGITUD FIJA |
Códigos de información de longitud fija |
140501s9999 mx ||||f |||| 00| 0 spa d |
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS |
Número Internacional Normalizado para Libros (ISBN) |
9780132126953 |
040 ## - FUENTE DE LA CATALOGACIÓN |
Centro catalogador de origen |
CIBESPAM MFL |
041 ## - CÓDIGO DE LENGUA |
Código de lengua del texto;banda sonora o título independiente |
eng. |
082 ## - NÚMERO DE LA CLASIFICACIÓN DECIMAL DEWEY |
Número de clasificación |
004.65 |
Cutter |
T164 |
Dato adicional |
2011 |
100 ## - PUNTO DE ACCESO PRINCIPAL-NOMBRE DE PERSONA |
Nombre de persona |
Tanenbaum, Andrew S. |
245 ## - MENCIÓN DE TÍTULO |
Título |
Computer networks. |
250 ## - MENCIÓN DE EDICIÓN |
Mención de edición |
Fifth Edition |
260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC. (PIE DE IMPRENTA) |
Lugar de publicación, distribución, etc. |
USA |
Nombre del editor, distribuidor, etc. |
Pearson Education |
Fecha de publicación, distribución, etc. |
2011 |
300 ## - DESCRIPCIÓN FÍSICA |
Extensión |
xxii, 933 páginas; |
Otras características físicas |
fig, tablas; |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
CHAPTER 1 INTRODUCTION<br/>1.1 USES OF COMPUTER NETWORKS<br/>1.1.1 Business Applications<br/>1.1.2 Home Applications<br/>1.1.3 Mobile Users<br/>1.1.4 Social Issues<br/>1.2 NETWORK HARDWARE<br/>1.2.1 Personal Area Networks<br/>1.2.2 Local Area Networks<br/>1.2.3 Metropolitan Area Networks<br/>+1.2.4 Wide Area Networks<br/>1.2.5 Internetworks<br/>1.3 NETWORK SOFTWARE<br/>1.3.1 Protocol Hierarchies<br/>1.3.2 Design Issues for the Layers<br/>1.3.3 Connection-Oriented Versus Connectionless Service<br/>1.3.4 Service Primitives<br/>1.3.5 The Relationship of Services to Protocols<br/>1.4 REFERENCE MODELS<br/>1.4.1 The OSI Reference Model<br/>1.4.2 The TCP/IP Reference Model<br/>1.4.3 The Model Used in this Book<br/>**1.4.4 A Comparison of the OSI and TCP/IP Reference Models<br/>**1.4.5 A Critique of the OSI Model and Protocols<br/>**1.4.6 A Critique of the TCP/IP Reference Model<br/>1.5 EXAMPLE NETWORKS<br/>+1.5.1 The Internet<br/>+**1.5.2 Third-Generation Mobile Phone Networks<br/>+**1.5.3 Wireless LANs: 802.11<br/>++**1.5.4 RFID and Sensor Networks<br/>**1.6 NETWORK STANDARDIZATION<br/>**1.6.1 Who's Who in the Telecommunications World<br/>**1.6.2 Who's Who in the International Standards World<br/>**1.6.3 Who's Who in the Internet Standards World<br/>1.7 METRIC UNITS<br/>1.8 OUTLINE OF THE REST OF THE BOOK<br/>1.9 SUMMARY<br/> <br/>CHAPTER 2 THE PHYSICAL LAYER<br/>2.1 THE THEORETICAL BASIS FOR DATA COMMUNICATION<br/>2.1.1 Fourier Analysis<br/>2.1.2 Bandwidth-Limited Signals<br/>2.1.3 The Maximum Data Rate of a Channel<br/>2.2 GUIDED TRANSMISSION MEDIA<br/>2.2.1 Magnetic Media<br/>2.2.2 Twisted Pairs<br/>2.2.3 Coaxial Cable<br/>++2.2.4 Power Lines<br/>2.2.5 Fiber Optics<br/>2.3 WIRELESS TRANSMISSION<br/>+2.3.1 The Electromagnetic Spectrum<br/>2.3.2 Radio Transmission<br/>+2.3.3 Microwave Transmission<br/>+**2.3.4 Infrared Transmission<br/>+**2.3.5 Light Transmission<br/>**2.4 COMMUNICATION SATELLITES<br/>**2.4.1 Geostationary Satellites<br/>**2.4.2 Medium-Earth Orbit Satellites<br/>**2.4.3 Low-Earth Orbit Satellites<br/>**2.4.4 Satellites Versus Fiber<br/>2.5 DIGITAL MODULATION AND MULTIPLEXING<br/>++2.5.1 Baseband Transmission<br/>++2.5.2 Passband Transmission<br/>+2.5.3 Frequency Division Multiplexing<br/>2.5.4 Time Division Multiplexing<br/>+2.5.5 Code Division Multiplexing<br/>2.6 THE PUBLIC SWITCHED TELEPHONE NETWORK<br/>2.6.1 Structure of the Telephone System<br/>2.6.2 The Politics of Telephones<br/>+2.6.3 The Local Loop: Modems, ADSL, and Fiber<br/>2.6.4 Trunks and Multiplexing<br/>2.6.5 Switching<br/>**2.7 THE MOBILE TELEPHONE SYSTEM<br/>**2.7.1 First-Generation (1G) Mobile Phones: Analog Voice<br/>**2.7.2 Second-Generation (2G) Mobile Phones: Digital Voice<br/>+**2.7.3 Third-Generation (3G) Mobile Phones: Digital Voice and Data<br/>**2.8 CABLE TELEVISION<br/>**2.8.1 Community Antenna Television<br/>**2.8.2 Internet over Cable<br/>**2.8.3 Spectrum Allocation<br/>**2.8.4 Cable Modems<br/>**2.8.5 ADSL Versus Cable<br/>2.9 SUMMARY<br/> <br/>CHAPTER 3 THE DATA LINK LAYER<br/>3.1 DATA LINK LAYER DESIGN ISSUES<br/>3.1.1 Services Provided to the Network Layer<br/>3.1.2 Framing<br/>3.1.3 Error Control<br/>3.1.4 Flow Control<br/>+3.2 ERROR DETECTION AND CORRECTION<br/>+3.2.1 Error-Correcting Codes<br/>+3.2.2 Error-Detecting Codes<br/>3.3 ELEMENTARY DATA LINK PROTOCOLS<br/>3.3.1 A Utopian Simplex Protocol<br/>3.3.2 A Simplex Stop-and-Wait Protocol for an Error-Free Channel<br/>3.3.3 A Simplex Stop-and-Wait Protocol for a Noisy Channel<br/>3.4 SLIDING WINDOW PROTOCOLS<br/>3.4.1 A One-Bit Sliding Window Protocol<br/>3.4.2 A Protocol Using Go-Back-N<br/>3.4.3 A Protocol Using Selective Repeat<br/>3.5 EXAMPLE DATA LINK PROTOCOLS<br/>++3.5.1 Packet over SONET<br/>++3.5.2 ADSL (Asymmetric Digital Subscriber Loop)<br/>3.6 SUMMARY<br/> <br/>CHAPTER 4 THE MEDIUM ACCESS CONTROL SUBLAYER<br/>4.1 THE CHANNEL ALLOCATION PROBLEM<br/>4.1.1 Static Channel Allocation<br/>4.1.2 Assumptions for Dynamic Channel Allocation<br/>4.2 MULTIPLE ACCESS PROTOCOLS<br/>4.2.1 ALOHA<br/>4.2.2 Carrier Sense Multiple Access Protocols<br/>+4.2.3 Collision-Free Protocols<br/>4.2.4 Limited-Contention Protocols<br/>4.2.5 Wireless LAN Protocols<br/>4.3 ETHERNET<br/>4.3.1 Classic Ethernet Physical Layer<br/>4.3.2 Classic Ethernet MAC Sublayer Protocol<br/>4.3.3 Ethernet Performance<br/>4.3.4 Switched Ethernet<br/>4.3.5 Fast Ethernet<br/>+4.3.6 Gigabit Ethernet<br/>+4.3.7 10 Gigabit Ethernet<br/>4.3.8 Retrospective on Ethernet<br/>4.4 WIRELESS LANS<br/>4.4.1 The 802.11 Architecture and Protocol Stack<br/>+4.4.2 The 802.11 Physical Layer<br/>+4.4.3 The 802.11 MAC Sublayer Protocol<br/>4.4.4 The 802.11 Frame Structure<br/>4.4.5 Services<br/>+**4.5 BROADBAND WIRELESS<br/>+**4.5.1 Comparison of 802.16 with 802.11 and 3G<br/>+**4.5.2 The 802.16 Architecture and Protocol Stack<br/>+**4.5.3 The 802.16 Physical Layer<br/>+**4.5.4 The 802.16 MAC Sublayer Protocol<br/>+**4.5.5 The 802.16 Frame Structure<br/>**4.6 BLUETOOTH<br/>**4.6.1 Bluetooth Architecture<br/>**4.6.2 Bluetooth Applications<br/>**4.6.3 The Bluetooth Protocol Stack<br/>**4.6.4 The Bluetooth Radio Layer<br/>**4.6.5 The Bluetooth Link Layers<br/>**4.6.6 The Bluetooth Frame Structure<br/>++**4.7 RFID<br/>++**4.7.1 EPC Gen 2 Architecture<br/>++**4.7.2 EPC Gen 2 Physical Layer<br/>++**4.7.3 EPC Gen 2 Tag Identification Layer<br/>++**4.7.4 Tag Identification Message Formats<br/>4.8 DATA LINK LAYER SWITCHING<br/>4.8.1 Uses of Bridges<br/>+4.8.2 Learning Bridges<br/>+4.8.3 Spanning Tree Bridges<br/>4.8.4 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways<br/>+4.8.5 Virtual LANs<br/>4.9 SUMMARY<br/> <br/>CHAPTER 5 THE NETWORK LAYER<br/>5.1 NETWORK LAYER DESIGN ISSUES<br/>5.1.1 Store-and-Forward Packet Switching<br/>5.1.2 Services Provided to the Transport Layer<br/>5.1.3 Implementation of Connectionless Service<br/>5.1.4 Implementation of Connection-Oriented Service<br/>5.1.5 Comparison of Virtual-Circuit and Datagram Networks<br/>5.2 ROUTING ALGORITHMS<br/>5.2.1 The Optimality Principle<br/>5.2.2 Shortest Path Algorithm<br/>5.2.3 Flooding<br/>5.2.4 Distance Vector Routing<br/>5.2.5 Link State Routing<br/>5.2.6 Hierarchical Routing<br/>5.2.7 Broadcast Routing<br/>+5.2.8 Multicast Routing<br/>++**5.2.9 Anycast Routing<br/>5.2.10 Routing for Mobile Hosts<br/>**5.2.11 Routing in Ad Hoc Networks<br/>5.3 CONGESTION CONTROL ALGORITHMS<br/>5.3.1 Approaches to Congestion Control<br/>5.3.2 Traffic-Aware Routing<br/>5.3.3 Admission Control<br/>5.3.4 Traffic Throttling<br/>+5.3.5 Load Shedding<br/>5.4 QUALITY OF SERVICE<br/>5.4.1 Application Requirements<br/>+5.4.2 Traffic Shaping<br/>+5.4.3 Packet Scheduling<br/>+5.4.4 Admission Control<br/>5.4.5 Integrated Services<br/>5.4.6 Differentiated Services<br/>5.5 INTERNETWORKING<br/>5.5.1 How Networks Differ<br/>5.5.2 How Networks Can Be Connected<br/>+5.5.3 Tunneling<br/>+5.5.4 Internetwork Routing<br/>+5.5.5 Packet Fragmentation<br/>5.6 THE NETWORK LAYER IN THE INTERNET<br/>5.6.1 The IP Version 4 Protocol<br/>+5.6.2 IP Addresses<br/>**5.6.3 IP Version 6<br/>+5.6.4 Internet Control Protocols<br/>5.6.5 Label Switching and MPLS<br/>+5.6.6 OSPF--An Interior Gateway Routing Protocol<br/>+5.6.7 BGP--The Exterior Gateway Routing Protocol<br/>**5.6.8 Internet Multicasting<br/>**5.6.9 Mobile IP<br/>5.7 SUMMARY<br/> <br/>CHAPTER 6 THE TRANSPORT LAYER<br/>6.1 THE TRANSPORT SERVICE<br/>6.1.1 Services Provided to the Upper Layers<br/>6.1.2 Transport Service Primitives<br/>6.1.3 Berkeley Sockets<br/>6.1.4 An Example of Socket Programming: An Internet File Server<br/>6.2 ELEMENTS OF TRANSPORT PROTOCOLS<br/>6.2.1 Addressing<br/>6.2.2. Connection Establishment<br/>6.2.3 Connection Release<br/>6.2.4 Flow Control and Buffering<br/>6.2.5 Multiplexing<br/>6.2.6 Crash Recovery<br/>++6.3 CONGESTION CONTROL ALGORITHMS<br/>++6.3.1 Desirable Bandwidth Allocation<br/>++6.3.2 Regulating the Sending Rate<br/>++6.3.3 Wireless Issues<br/>6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP<br/>6.4.1 Introduction to UDP<br/>**6.4.2 Remote Procedure Call<br/>+6.4.3 The Real-Time Transport Protocol<br/>6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP<br/>6.5.1 Introduction to TCP<br/>6.5.2 The TCP Service Model<br/>6.5.3 The TCP Protocol<br/>6.5.4 The TCP Segment Header<br/>6.5.5 TCP Connection Establishment<br/>6.5.6 TCP Connection Release<br/>6.5.7 TCP Connection Management Modeling<br/>6.5.8 TCP Transmission Policy<br/>6.5.9 TCP Timer Management<br/>++6.5.10 TCP Congestion Control<br/>++6.5.11 The Future of TCP<br/>**6.6 PERFORMANCE ISSUES<br/>**6.6.1 Performance Problems in Computer Networks<br/>**6.6.2 Network Performance Measurement<br/>**6.6.3 Host Design for Fast Networks<br/>**6.6.4 Fast Segment Processing<br/>++**6.6.5 Header Compression<br/>**6.6.6 Protocols for Long Fat Networks<br/>++**6.7 DELAY TOLERANT NETWORKS<br/>++**6.7.1 DTN Architecture<br/>++**6.7.2 The Bundle Protocol<br/>6.8 SUMMARY<br/> <br/>CHAPTER 7 THE APPLICATION LAYER<br/>7.1 DNS--THE DOMAIN NAME SYSTEM<br/>7.1.2 The DNS Name Space<br/>7.1.3 Resource Records<br/>7.1.4 Name Servers<br/>+**7.2 ELECTRONIC MAIL<br/>+**7.2.1 Architecture and Services<br/>+**7.2.2 The User Agent<br/>**7.2.3 Message Formats<br/>+**7.2.4 Message Transfer<br/>+**7.2.5 Final Delivery<br/>+7.3 THE WORLD WIDE WEB<br/>+7.3.1 Architectural Overview<br/>+7.3.2 Static Web Pages<br/>+7.3.3 Dynamic Web Pages and Web Applications<br/>+7.3.4 HTTP--The HyperText Transfer Protocol<br/>+**7.3.5 Mobile Web<br/>++**7.3.6 Web Search<br/>7.4 REALTIME AUDIO AND VIDEO<br/>7.4.1 Introduction to Digital Audio<br/>7.4.2 Audio Compression<br/>7.4.3 Streaming Audio<br/>7.4.4 Internet Radio<br/>7.4.5 Voice over IP<br/>7.4.6 Introduction to Video<br/>7.4.7 Video Compression<br/>7.4.8 Video on Demand<br/>++7.5 CONTENT DELIVERY AND PEER-TO-PEER<br/>++7.5.1 Server Replication<br/>++7.5.2 Content Delivery Networks<br/>++7.5.3 Peer-to-Peer Networks<br/>++7.5.4 Overlay Networks<br/>7.5 SUMMARY<br/> <br/>CHAPTER 8 NETWORK SECURITY<br/>8.1 CRYPTOGRAPHY<br/>8.1.1 Introduction to Cryptography<br/>8.1.2 Substitution Ciphers<br/>8.1.3 Transposition Ciphers<br/>8.1.4 One-Time Pads<br/>8.1.5 Two Fundamental Cryptographic Principles<br/>8.2 SYMMETRIC-KEY ALGORITHMS<br/>8.2.1 DES--The Data Encryption Standard<br/>8.2.2 AES--The Advanced Encryption Standard<br/>8.2.3 Cipher Modes<br/>8.2.4 Other Ciphers<br/>8.2.5 Cryptanalysis<br/>8.3 PUBLIC-KEY ALGORITHMS<br/>8.3.1 RSA<br/>8.3.2 Other Public-Key Algorithms<br/>8.4 DIGITAL SIGNATURES<br/>8.4.1 Symmetric-Key Signatures<br/>8.4.2 Public-Key Signatures<br/>8.4.3 Message Digests<br/>8.4.4 The Birthday Attack<br/>8.5 MANAGEMENT OF PUBLIC KEYS<br/>8.5.1 Certificates<br/>8.5.2 X.509<br/>8.5.3 Public Key Infrastructures<br/>8.6 COMMUNICATION SECURITY<br/>8.6.1 IPsec<br/>+8.6.2 Firewalls<br/>+8.6.3 Virtual Private Networks<br/>+8.6.4 Wireless Security<br/>8.7 AUTHENTICATION PROTOCOLS<br/>8.7.1 Authentication Based on a Shared Secret Key<br/>**8.7.2 Establishing a Shared Key: The Diffie-Hellman Key Exchange<br/>**8.7.3 Authentication Using a Key Distribution Center<br/>+**8.7.4 Authentication Using Kerberos<br/>8.7.5 Authentication Using Public-Key Cryptography<br/>**8.8 EMAIL SECURITY<br/>**8.8.1 PGP--Pretty Good Privacy<br/>**8.8.2 S/MIME<br/>8.9 WEB SECURITY<br/>8.9.1 Threats<br/>8.9.2 Secure Naming<br/>8.9.3 SSL--The Secure Sockets Layer<br/>+8.9.4 Mobile Code Security<br/>8.10 SOCIAL ISSUES<br/>8.10.1 Privacy<br/>8.10.2 Freedom of Speech<br/>8.10.3 Copyright<br/>8.11 SUMMARY<br/> <br/>CHAPTER 9 READING LIST AND BIBLIOGRAPHY<br/>**9.1 SUGGESTIONS FOR FURTHER READING<br/>**9.1.1 Introduction and General Works<br/>**9.1.2 The Physical Layer<br/>**9.1.3 The Data Link Layer<br/>**9.1.4 The Medium Access Control Sublayer<br/>**9.1.5 The Network Layer<br/>**9.1.6 The Transport Layer<br/>**9.1.7 The Application Layer<br/>**9.1.8 Network Security<br/>++9.2 ALPHABETICAL BIBLIOGRAPHY |
650 ## - PUNTO DE ACCESO ADICIONAL DE MATERIA - TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento inicial |
Computer Networks |
650 ## - PUNTO DE ACCESO ADICIONAL DE MATERIA - TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento inicial |
Networks Software |
650 ## - PUNTO DE ACCESO ADICIONAL DE MATERIA - TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento inicial |
Wireless |
650 ## - PUNTO DE ACCESO ADICIONAL DE MATERIA - TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento inicial |
Ethernet |
650 ## - PUNTO DE ACCESO ADICIONAL DE MATERIA - TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento inicial |
Bluetooth |
700 ## - PUNTO DE ACCESO ADICIONAL - NOMBRE DE PERSONA |
Nombre de persona |
Wetherall, David J. |
913 ## - ÁREA Y CARRERA |
Área de Conocimiento |
Información y Comunicación (TIC) |
Carrera |
Carrera de Computación |
Líneas de Investigación Institucionales |
Soluciones computacionales para el sector agroproductivo y de servicios |
942 ## - ENTRADA DE ELEMENTOS AGREGADOS (KOHA) |
Fuente de clasificaión o esquema |
Dewey Decimal Classification |
Koha [por defecto] tipo de item |
Libros |