Practical in focus, An Engineering Approach to Computer Networking features S. Keshav, Associate Professor of Computer Science at Cornell University, has. S. Keshav, Associate Professor of Computer Science at Cornell University, has employed the engineering approach with great success in networking courses he . S. Keshav, “An Engineering Approach to Computer Networking: ATM. Networks, the Internet and the Telephone Network”, Addison-Wesley. Professional.

Author: Kirn Mera
Country: Bosnia & Herzegovina
Language: English (Spanish)
Genre: Photos
Published (Last): 1 November 2011
Pages: 280
PDF File Size: 6.35 Mb
ePub File Size: 7.40 Mb
ISBN: 423-1-30113-392-2
Downloads: 42936
Price: Free* [*Free Regsitration Required]
Uploader: Vojas

In Internet System Handbook D. No me hagas pensar Steve Krug. Mastering Metasploit, Nipun Jaswal. A detailed examination of Internet behavior on the time scale of a day. The authoritative reference for IP version 6 addressing. Proposes the superposition of heavy-tailed arrival processes as the mechanism giving rise to long-range dependence and self-similarity in aggregated traffic.

Slides for An Engineering Approach to Computer Networking

Improves TCP performance by better estimating initial parameters and dealing better with multiple losses. Journal enginering Wireless Networks, Vol. Experience with TCP Vegas: A blow-by-blow account of how an early Unix system was tuned to reduce response time for interactive jobs, while allowing access to large disk-resident databases.

A critique of timer mechanisms in general, with conclusions about why timers are needed, and when they should be used.

He can be reached at keshav ensim. Standard textbook on computer networking. The Technology of Inverse Multiplexing. Reliable and Efficient Hop-by-Hop Control. Large-Scale Network Topological Optimization.


Compares several traffic-policing schemes. CDMA, as described by one of its inventors and a practitioner.

Banyan Networks for Partitioning Multiprocessor Systems. Standard introductory text on operating systems. Approacu of issues in designing policy routing protocols between autonomous systems. The standard set of protocol numbers, and port numbers assigned to services, in the Internet. Advances in Applied Probability, Vol. People who bought this also bought.

Networked Audiovisual Systems Infocomm International. I have drawn upon many people in the course of writing this book.

Studies how WFQ can be used to implement isolation policies. The book has s.keshav an engineering approach to computer networking sections. Causes of Packet Errors. Performance Evaluation and Design of Multiservice Networks.

This practical introduction to computer networking takes a unique and highly effective “engineering” approach that not only describes how networks operate but also offers insight into the principles of network design.

A survey of techniques for input-queued switches and an analysis of the SLIP approach to arbitration. Detailed description and a solid mathematical approach.

About Srinivasan Keshav S. Engineering and Operations in the Bell System.

Routing for Mobile Hosts. Book ratings networkihg Goodreads. Computer Networks 5, North-Holland, Amsterdam,pp. Bit-Error Detection and Correction. Broad survey of the field. Experiences with a High-Speed Network Adaptor: Interface Among Protocol Layers. A multithreaded, packet-level network simulator that allows users to simulate arbitrary protocols. Proposes overbooking of buffers at the downstream switch to cut down on buffer requirements.


An Engineering Approach to Computer Networking : Srinivasan Keshav :

Early description of a buffered Banyan switch design. Introduces the metric map and the network response map to study the dynamics of routing. Communications of the ACM, July Rationale and specification of the Cells in Frame proposal. Analyzes the one-step-ahead predictive control scheme used in the MK and packet-pair schemes and shows that they are stable even when taking the nonlinearity at the endpoints of the control into account.

An exhaustive measurement and modeling of Internet delay, loss, and reordering over long time periods. Also proves that flow-control schemes that s.keshav an engineering approach to computer networking the queue length are unstable. The first analysis of the worst-case end-to-end delay suffered by a leaky-bucket controlled source.

The remaining chapters could be covered at the discretion of the instructor, perhaps skipping advanced material.