Facebook Pixel
Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
Computer Networking

Computer Networking

A Top-Down Approach
by James F. Kurose 2000 880 pages
4.07
2k+ ratings
Listen
Listen to Summary

Key Takeaways

1. The Internet: A Network of Networks Providing Services

The Internet is a computer network that interconnects billions of computing devices throughout the world.

Global Interconnection. The Internet is a vast, interconnected system linking billions of devices, from traditional computers to smartphones, IoT devices, and servers. It's not just about hardware; it's an infrastructure that provides services to distributed applications.

Service-Oriented Architecture. The Internet offers a socket interface, a set of rules that programs must follow to request data delivery to other programs. This interface allows developers to create distributed applications without needing to understand the underlying network complexities.

Protocols and Standards. The Internet relies on protocols like TCP/IP to govern data transmission. Standards, developed by organizations like the IETF, ensure interoperability, allowing diverse systems to communicate effectively.

2. Network Edge: End Systems, Access Networks, and Physical Media

In Internet jargon, all of these devices are called hosts or end systems.

End Systems and Hosts. Devices connected to the Internet, known as end systems or hosts, include computers, smartphones, and IoT devices. These hosts run applications and are categorized as clients (requesting services) or servers (providing services).

Access Networks. End systems connect to the Internet through access networks, such as DSL, cable, FTTH, Ethernet, WiFi, and cellular. These networks use various physical media, including copper wire, coaxial cable, optical fiber, and radio spectrum.

Physical Media. Physical media, both guided (e.g., fiber-optic cables) and unguided (e.g., radio waves), transmit data between devices. The choice of medium affects transmission rates, costs, and suitability for different environments.

3. Network Core: Packet Switching, Circuit Switching, and Interconnections

A packet switch takes a packet arriving on one of its incoming communication links and forwards that packet on one of its outgoing communication links.

Packet Switching. Data is divided into packets, which are forwarded through the network by packet switches (routers and link-layer switches). This approach allows for efficient use of network resources and flexible routing.

Circuit Switching. In contrast, circuit switching establishes a dedicated connection between end systems for the duration of a communication session. While providing guaranteed bandwidth, it can be less efficient for bursty traffic.

Network of Networks. The Internet is a network of interconnected ISPs, ranging from local access providers to national and international tier-1 providers. These ISPs peer with each other at Internet Exchange Points (IXPs) to exchange traffic.

4. Delay, Loss, and Throughput: Understanding Network Performance

A packet starts in a host (the source), passes through a series of routers, and ends its journey in another host (the destination).

Sources of Delay. Packets experience various delays as they traverse the network, including processing delay, queuing delay, transmission delay, and propagation delay. Understanding these delays is crucial for optimizing network performance.

Queuing and Loss. Queuing delay occurs when packets wait in output buffers at routers. If buffers overflow, packet loss occurs, impacting application performance. Traffic intensity (La/R) is a key factor in determining queuing delay and packet loss.

End-to-End Throughput. Throughput, the rate at which data is transferred between end systems, is limited by the bottleneck link along the path. Factors such as link capacity and intervening traffic affect end-to-end throughput.

5. Protocol Layers: Structuring Network Communication

A protocol defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event.

Layered Architecture. Network protocols are organized into layers, each providing specific services to the layer above. The Internet protocol stack consists of five layers: physical, link, network, transport, and application.

Internet Protocol Stack. Each layer has specific responsibilities:

  • Application: Network applications and their protocols (e.g., HTTP, SMTP)
  • Transport: Transports application-layer messages (TCP, UDP)
  • Network: Moves network-layer packets (datagrams) from one host to another (IP)
  • Link: Moves frames from one network element to an adjacent network element (Ethernet, WiFi)
  • Physical: Moves individual bits within the frame from one node to the next

Encapsulation. As data moves down the protocol stack, each layer adds header information, encapsulating the data from the layer above. This process ensures that each layer has the necessary information to perform its functions.

6. Security Threats: Defending Against Network Attacks

All activity in the Internet that involves two or more communicating remote entities is governed by a protocol.

Malware. Malicious software, including viruses and worms, can infect devices via the Internet, causing damage, stealing data, or enrolling devices in botnets.

Denial-of-Service (DoS) Attacks. DoS attacks aim to render networks or hosts unusable by legitimate users. These attacks include vulnerability attacks, bandwidth flooding, and connection flooding. Distributed DoS (DDoS) attacks, leveraging botnets, are particularly challenging to defend against.

Packet Sniffing. Attackers can use packet sniffers to capture sensitive information transmitted over networks, especially wireless networks. Encryption is a key defense against packet sniffing.

7. A Brief History: From ARPANET to Today's Internet

Today’s Internet is arguably the largest engineered system ever created by mankind.

Packet Switching Origins. The Internet's roots trace back to the early 1960s and the development of packet switching as an alternative to circuit switching. Key figures include Leonard Kleinrock, Paul Baran, and Donald Davies.

ARPANET and TCP/IP. The ARPANET, the first packet-switched network, was a precursor to the Internet. The development of TCP/IP in the 1970s provided a foundation for interconnecting networks.

The Internet Explosion. The 1980s and 1990s saw the proliferation of networks and the commercialization of the Internet. The emergence of the World Wide Web in the 1990s brought the Internet to the masses.

Last updated:

Review Summary

4.07 out of 5
Average of 2k+ ratings from Goodreads and Amazon.

Computer Networking receives mostly positive reviews for its clear explanations, real-world examples, and comprehensive coverage of networking concepts. Readers appreciate the top-down approach and accessible writing style, making complex topics understandable. Many find it an excellent resource for both students and professionals. Some criticisms include its verbosity, occasional dryness, and superficial coverage of certain topics. The accompanying online resources and exercises are highly valued. Overall, the book is considered a thorough and effective introduction to computer networking, despite some minor shortcomings.

Your rating:

About the Author

James F. Kurose is a renowned computer scientist and educator specializing in computer networking. He is a Distinguished University Professor at the University of Massachusetts Amherst and has co-authored the widely-used textbook "Computer Networking: A Top-Down Approach." Kurose's research focuses on network protocols, multimedia communication, and network performance evaluation. He has received numerous awards for his contributions to computer science education and research, including the IEEE Taylor L. Booth Education Award and the ACM SIGCOMM Lifetime Achievement Award. Kurose is known for his ability to explain complex networking concepts in an accessible manner, which is reflected in the popularity of his textbook and online course materials.

Download EPUB

To read this Computer Networking summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 2.96 MB     Pages: 7
0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Create a free account to unlock:
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Recommendations: Get personalized suggestions
Ratings: Rate books & see your ratings
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
All summaries are free to read in 40 languages
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 10
📜 Unlimited History
Free users are limited to 10
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Mar 22,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
100,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Settings
Appearance
Black Friday Sale 🎉
$20 off Lifetime Access
$79.99 $59.99
Upgrade Now →