Atjaunināt sīkdatņu piekrišanu

Internet Book: Everything You Need to Know about Computer Networking and How the Internet Works 5th edition [Hardback]

(Purdue University, Indiana, USA)
  • Formāts: Hardback, 376 pages, height x width: 229x178 mm, weight: 898 g, 102 Illustrations, color
  • Izdošanas datums: 22-Aug-2018
  • Izdevniecība: CRC Press
  • ISBN-10: 1138331333
  • ISBN-13: 9781138331334
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 113,23 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 376 pages, height x width: 229x178 mm, weight: 898 g, 102 Illustrations, color
  • Izdošanas datums: 22-Aug-2018
  • Izdevniecība: CRC Press
  • ISBN-10: 1138331333
  • ISBN-13: 9781138331334
Citas grāmatas par šo tēmu:

The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers. It is designed for readers who do not have a strong technical background — early chapters clearly explain the terminology and concepts needed to understand all the services. It helps the reader to understand the technology behind the Internet, appreciate how the Internet can be used, and discover why people find it so exciting. In addition, it explains the origins of the Internet and shows the reader how rapidly it has grown. It also provides information on how to avoid scams and exaggerated marketing claims.

The first section of the book introduces communication system concepts and terminology. The second section reviews the history of the Internet and its incredible growth. It documents the rate at which the digital revolution occurred, and provides background that will help readers appreciate the significance of the underlying design. The third section describes basic Internet technology and capabilities. It examines how Internet hardware is organized and how software provides communication. This section provides the foundation for later chapters, and will help readers ask good questions and make better decisions when salespeople offer Internet products and services. The final section describes application services currently available on the Internet. For each service, the book explains both what the service offers and how the service works.

About the Author

Dr. Douglas Comer is a Distinguished Professor at Purdue University in the departments of Computer Science and Electrical and Computer Engineering. He has created and enjoys teaching undergraduate and graduate courses on computer networks and Internets, operating systems, computer architecture, and computer software. One of the researchers who contributed to the Internet as it was being formed in the late 1970s and 1980s, he has served as a member of the Internet Architecture Board, the group responsible for guiding the Internet’s development. Prof. Comer is an internationally recognized expert on computer networking, the TCP/IP protocols, and the Internet, who presents lectures to a wide range of audiences. In addition to research articles, he has written a series of textbooks that describe the technical details of the Internet. Prof. Comer’s books have been translated into many languages, and are used in industry as well as computer science, engineering, and business departments around the world. Prof. Comer joined the Internet project in the late 1970s, and has had a high-speed Internet connection to his home since 1981. He wrote this book as a response to everyone who has asked him for an explanation of the Internet that is both technically correct and easily understood by anyone. An Internet enthusiast, Comer displays INTRNET on the license plate of his car.

Recenzijas

"This is an excellent text for a thorough but non-technical introduction to the Internet, its usage and how it works. Comer takes a complex topic and through everyday examples and analogy makes the information clear and accessible for readers who may have no background in technology."

- Adam R. Albina, PhD, Assistant Professor, Saint Anselm College

Preface xxiii
Chapter 1 The Internet Is Everywhere 3(8)
1.1 Basic Facts Do Not Tell The Story
5(1)
1.2 Imagine Life Without The Internet
5(1)
1.3 Why You Should Understand Internet Technology
6(1)
1.4 Learning About The Internet
6(1)
1.5 Understanding The Big Picture
7(1)
1.6 Terminology And Technology
7(1)
1.7 Growth And Adaptability
8(1)
1.8 The Impact Of The Internet
8(1)
1.9 Organization Of The Book
8(1)
1.10 A Personal Note
9(2)
Part I: Before The Internet 11(54)
Chapter 2 Telephones Everywhere
15(8)
2.1 Introduction
15(1)
2.2 A Communication Service
15(1)
2.3 Selling Communication
15(1)
2.4 Limited Access
16(1)
2.5 High Cost
17(1)
2.6 The Difficult Transition
17(1)
2.7 Ubiquitous Access
18(1)
2.8 Relevance To The Internet
19(1)
2.9 Summary
19(4)
Chapter 3 The World Was Once Analog
23(14)
3.1 Introduction
23(1)
3.2 Sound, Vibrations, And Analog Recording
23(1)
3.3 Analog Electronic Devices
24(1)
3.4 Many Electronic Devices Are Analog
25(1)
3.5 The First Analog Communication
25(1)
3.6 Sending An Analog Signal Across A Wire
26(1)
3.7 Analog Is Simple But Inaccurate
27(1)
3.8 A Definition Of Digital
27(1)
3.9 Digital Music
28(1)
3.10 Recording Sound As Numbers
28(3)
3.11 Converting Between Analog And Digital Forms
31(1)
3.12 Why Did Digital Music Take Over?
32(1)
3.13 Summary
33(4)
Chapter 4 The Past And Present Digital Network
37(8)
4.1 Introduction
37(1)
4.2 The World Was Previously Digital
37(1)
4.3 A Telegraph Was Digital
38(1)
4.4 Morse Code
38(1)
4.5 Letters And Digits In Morse Code
39(1)
4.6 Telegraph Users Did Not Encounter Morse Code
40(1)
4.7 Virtually Instant Communication
40(1)
4.8 Speed Is Relative
40(1)
4.9 The Telephone Eventually Became Digital
41(1)
4.10 Relevance To The Internet
41(1)
4.11 Binary Encoding Of Data On The Internet
42(1)
4.12 Why Use Two Symbols?
42(1)
4.13 Summary
42(3)
Chapter 5 Basic Communication
45(10)
5.1 Introduction
45(1)
5.2 Communication Using Electricity
45(1)
5.3 Sending Signals
46(1)
5.4 Using Signals To Send Information
46(1)
5.5 Modem: A Modulator And A Demodulator Combined
47(1)
5.6 How Modems Allow Two-Way Traffic
48(1)
5.7 A Character Code For Digital Information
48(2)
5.8 Bits And Bytes
50(1)
5.9 Detecting Errors
50(1)
5.10 Summary
51(4)
Chapter 6 Local Area Networks
55(10)
6.1 Introduction
55(1)
6.2 The Digital Revolution
55(1)
6.3 The Move To Multiple Computers
56(1)
6.4 Removable Media And Manual Transfer
56(1)
6.5 Early Computers Used Circuit Boards
57(1)
6.6 LANs
58(1)
6.7 The LAN Approach
58(1)
6.8 LAN Hardware
59(1)
6.9 Wireless LAN (WLAN) Connections
60(1)
6.10 Wired And Wireless LAN Technologies
60(1)
6.11 Wireless PAN Technology
61(1)
6.12 Connecting A Device To An Ethernet
61(1)
6.13 Connecting A Device To A Wi-Fi Network
62(1)
6.14 Wi-Fi Security
63(1)
6.15 The Importance Of LAN Technology
63(1)
6.16 Relationship To The Internet
64(1)
Part II: A Brief History Of The Internet 65(28)
Chapter 7 Internet: Motivation And Beginnings
69(12)
7.1 A Proliferation Of LANs
69(1)
7.2 No Technology Solves All Problems
70(1)
7.3 Wide Area Network Technologies
70(1)
7.4 Can We Build A Global WAN?
71(1)
7.5 U.S. Department Of Defense Networking Research
72(1)
7.6 Experimental Research
72(1)
7.7 The Internet Emerges
72(1)
7.8 The ARPANET Backbone
73(1)
7.9 Internet Software
73(1)
7.10 The Name Is TCP/IP
74(1)
7.11 The Surprising Choice Of Open Standards
74(1)
7.12 Open Communication Systems Win
75(1)
7.13 Placing Internet Technical Documentation Online
75(1)
7.14 The U.S. Military Adopted TCP/IP
76(1)
7.15 Summary
77(4)
Chapter 8 The Incredible Growth
81(12)
8.1 Introduction
81(1)
8.2 Stimulating Adoption
81(1)
8.3 Meanwhile, Back In Computer Science
82(1)
8.4 The Internet Meets Unix
82(1)
8.5 The U.S. Military Makes A Commitment
83(1)
8.6 The Internet Doubled In Size In One Year
83(1)
8.7 Internet For Every Computer Science Department
84(1)
8.8 Graduate Student Volunteers Contribute
85(1)
8.9 Internet Governance: The IAB And IETF
85(1)
8.10 NSF Led Internet Expansion
86(1)
8.11 NSF Target: All Of Science And Engineering
87(1)
8.12 The NSFNET Backbone
87(1)
8.13 On To The ANS Backbone
88(1)
8.14 Commercialization
89(1)
8.15 Exponential Growth
89(2)
8.16 When Will Growth End?
91(2)
Part III: Inside The Internet 93(102)
Chapter 9 Packet Switching
97(10)
9.1 Introduction
97(1)
9.2 Sharing To Reduce Cost
97(1)
9.3 Sharing By Taking Turns
98(1)
9.4 Avoiding Long Delays
98(1)
9.5 Long Messages And Short Packets
99(1)
9.6 Each Packet Contains Extra Information
99(1)
9.7 Devices Have Addresses
100(1)
9.8 Packet Size
100(1)
9.9 To Humans, Packet Transmission Seems Instantaneous
101(1)
9.10 Sharing Occurs On Demand
101(1)
9.11 Relevance To The Internet
102(1)
9.12 Summary
102(5)
Chapter 10 Internet: A Network Of Networks
107(14)
10.1 Introduction
107(1)
10.2 Building A Global Network
107(1)
10.3 Two Fundamental Concepts
108(1)
10.4 Using A Specialized Computer To Interconnect Networks
109(1)
10.5 Internet Terminology: Routers And Hosts
110(1)
10.6 Building A Large Virtual Network
111(2)
10.7 The Internet Includes Multiple Types Of Networks
113(1)
10.8 Ownership, ISPs, And Transit Traffic
113(1)
10.9 A Hierarchy Of ISPs
114(1)
10.10 Peering Arrangements At The Center Of The Internet
115(1)
10.11 An Example Trip Through The Internet
116(1)
10.12 The Internet Approach Revolutionized Networking
116(1)
10.13 Summary
117(4)
Chapter 11 Internet Access Using Broadband And Wireless
121(10)
11.1 Introduction
121(1)
11.2 Access Technologies For The Last Mile
121(1)
11.3 Dial-up Internet Access
122(1)
11.4 Narrowband And Broadband Access
122(1)
11.5 Leased Data Circuit Access
123(1)
11.6 Digital Subscriber Line (DSL) Access
123(1)
11.7 Cable Modem Access
124(1)
11.8 Wireless Access Technologies
125(1)
11.9 Cellular Wireless Access (4G and 5G)
126(2)
11.10 Summary
128(3)
Chapter 12 Internet Performance
131(14)
12.1 Introduction
131(1)
12.2 Network Speed
131(1)
12.3 What Does Speed Mean?
132(1)
12.4 Brick Delivery
132(2)
12.5 Transfers Across The Internet
134(1)
12.6 Connecting Heterogeneous Networks
135(2)
12.7 The Effect Of Sharing
137(2)
12.8 Delays In The Internet
139(1)
12.9 Should You Pay for Higher Speed Internet?
140(1)
12.10 Summary
141(4)
Chapter 13 IP: Software To Create A Virtual Network
145(10)
13.1 Introduction
145(1)
13.2 Protocol: An Agreement For Communication
145(1)
13.3 Basic Functionality: The Internet Protocol
146(1)
13.4 Packets Arrive Unchanged
146(1)
13.5 Internet Software On Your Device
147(1)
13.6 Internet Packets Are Called Datagrams
147(1)
13.7 Providing The Illusion Of A Giant Network
147(1)
13.8 The Internet's Internal Structure
148(1)
13.9 Datagrams Travel Inside Network Packets
149(1)
13.10 Internet Addresses
150(1)
13.11 IPv4 And IPv6
150(1)
13.12 Permanent And Temporary IP Addresses
151(1)
13.13 Summary
152(3)
Chapter 14 TCP: Software For Reliable Communication
155(8)
14.1 Introduction
155(1)
14.2 A Packet Switching System Can Be Overrun
155(1)
14.3 Software To Handle Congestion And Datagram Loss
156(1)
14.4 The Magic Of Recovering Lost Datagrams
156(1)
14.5 TCP's Sophisticated Retransmission Algorithm
157(1)
14.6 Handling Congestion
158(1)
14.7 TCP And IP Work Together
159(1)
14.8 Summary
159(4)
Chapter 15 Clients, Servers, And Internet Services
163(8)
15.1 Introduction
163(1)
15.2 All Services Are Outside The Internet
163(1)
15.3 Software Provides All Services
164(1)
15.4 Services Use Client And Server Apps
165(1)
15.5 A Server Must Always Run
165(1)
15.6 Multiple Clients Can Access A Server Simultaneously
166(1)
15.7 Ambiguous Terminology
167(1)
15.8 Summary
167(4)
Chapter 16 Names For Computers
171(10)
16.1 Introduction
171(1)
16.2 Computer Names
171(1)
16.3 Computer Names Past And Present
172(1)
16.4 A Computer's Name Must Be Unique
173(1)
16.5 Using Suffixes To Make Each Name Unique
173(1)
16.6 Domain Names With More Than Three Labels
174(1)
16.7 Top-Level Domains Before And After ICANN
174(1)
16.8 Domain Names Outside The US
175(1)
16.9 Translating A Name To An IP Address
176(1)
16.10 Many Domain Name Servers
176(1)
16.11 Looking Up A Domain Name
177(1)
16.12 A Personal Story About A DNS Problem
178(1)
16.13 Summary
178(3)
Chapter 17 Sharing An Internet Connection (NAT)
181(8)
17.1 Introduction
181(1)
17.2 Multiple Devices Sharing A Single IP Address
181(1)
17.3 Wireless Routers And NAT
182(1)
17.4 How A Wireless Router Works
182(1)
17.5 Datagram Modification
183(1)
17.6 Your Device Can Act Like A Wireless Router
184(1)
17.7 You Probably Use NAT Every Day
184(1)
17.8 Why Internet Size Is Difficult To Estimate
185(1)
17.9 Summary
185(4)
Chapter 18 Why The Internet Works Well
189(6)
18.1 Introduction
189(1)
18.2 The Internet Works Extremely Well
189(1)
18.3 Flexibility To Accommodate Arbitrary Networks
190(1)
18.4 Flexibility To Accommodate New Apps Quickly
190(1)
18.5 The Advantage Of Being Open And Vendor Independent
191(1)
18.6 An Extremely Efficient Design
191(1)
18.7 Packet Switching Is A Fundamentally Better Idea
192(1)
18.8 Can The Success Be Replicated?
192(2)
18.9 Summary
194(1)
Part IV: Internet Services 195(118)
Chapter 19 Electronic Mail
199(8)
19.1 Introduction
199(1)
19.2 Functionality And Significance
199(1)
19.3 Mailboxes And Email Addresses
200(1)
19.4 Sending An Email Message Directly
200(1)
19.5 Personal Computers And Email Providers
200(1)
19.6 An Example Email Exchange
201(1)
19.7 Email Delays And Retry Attempts
202(1)
19.8 Providers, Fees, And Access
202(1)
19.9 Mailing Lists
203(1)
19.10 Undisclosed Recipients
203(1)
19.11 Summary
204(3)
Chapter 20 The World Wide Web: Browsers And Basics
207(10)
20.1 Introduction
207(1)
20.2 Browsers And Web Servers
207(1)
20.3 URLs And Their Meaning
208(1)
20.4 Web Pages With Links To Other Pages
208(1)
20.5 Linking Across Web Servers
209(1)
20.6 Hypermedia
210(1)
20.7 A Page With Multimedia Items
211(1)
20.8 Fetching A Page That Contains Multiple Items
212(1)
20.9 Inside A Browser
212(1)
20.10 Plugins And Other Add-on Software Modules
213(1)
20.11 Historical Notes
214(1)
20.12 Summary
214(3)
Chapter 21 The World Wide Web: HTML And Web Pages
217(10)
21.1 Introduction
217(1)
21.2 Accommodating Display Hardware
217(1)
21.3 HTML, A Language Used For Web Documents
218(1)
21.4 Specifying Formatting Guidelines
219(1)
21.5 A Link Embedded In A Web Page
220(1)
21.6 An Image On A Web Page
221(2)
21.7 Point-And-Click Web Page Design
223(1)
21.8 Summary
224(3)
Chapter 22 The World Wide Web: Web Pages That Change
227(14)
22.1 Introduction
227(1)
22.2 Conventional Web Pages And Static Content
227(1)
22.3 How A Browser Accesses A Static Web Page
228(1)
22.4 Accessing A Page That Has Changeable Content
229(1)
22.5 Frames Within A Browser Window
230(1)
22.6 Advertising And Frames
231(1)
22.7 Personalized Web Pages And Dynamic Content
231(1)
22.8 Pop-Ups And Pop-Up Blockers
232(1)
22.9 User Interaction With Forms
232(1)
22.10 Shopping Carts And Cookies
233(1)
22.11 Should You Accept Cookies?
234(1)
22.12 Animated Web Pages
234(1)
22.13 Animation With A Browser Script
235(1)
22.14 Java, JavaScript, And HTML5
236(1)
22.15 Summary
237(4)
Chapter 23 Social Networking And Personal Publishing
241(6)
23.1 Introduction
241(1)
23.2 The Publish-Subscribe Paradigm Changes
241(1)
23.3 The Rise Of Internet Publishing Services
242(1)
23.4 Discussion Forums And Bulletin Boards
242(1)
23.5 Moderated Discussions And Editorial Control
242(1)
23.6 Essays And Personal Opinions (Blogs)
243(1)
23.7 Cooperative Publishing (Wikis)
243(1)
23.8 Personal Web Pages And Social Networking Sites
244(1)
23.9 Summary
244(3)
Chapter 24 The Internet Of Things (IoT)
247(10)
24.1 Introduction
247(1)
24.2 Connected Devices Without Human Operators
247(1)
24.3 Sensors
248(1)
24.4 Actuators
248(1)
24.5 Embedded Computer Systems
249(1)
24.6 The Internet Of Things
249(1)
24.7 Gadgets And Wireless Network Connections
250(1)
24.8 Centralized And Mesh IoT Networks In A Home
250(1)
24.9 A Wireless IoT Mesh In A Home
251(1)
24.10 Smart Homes, Buildings, And Factories
252(1)
24.11 Civil And Power Infrastructure: Bridges And Grids
253(1)
24.12 Summary
253(4)
Chapter 25 Internet Search (Search Engines)
257(10)
25.1 Introduction
257(1)
25.2 Databases And Structured Information
257(1)
25.3 Classification Of Information
258(1)
25.4 Searching Unstructured Web Pages
259(1)
25.5 A Demonstration Of Keyword Search
260(1)
25.6 Indexing: How An Internet Search Engine" Operates
260(2)
25.7 Personalized Search Results
262(1)
25.8 Indexing The Entire Web
263(1)
25.9 Advertising Pays For Searching
263(1)
25.10 Summary
264(3)
Chapter 26 Voice And Video Communication (VoIP)
267(12)
26.1 Introduction
267(1)
26.2 Real-Time Information
267(1)
26.3 The Two Types Of Real-Time Transfer
268(1)
26.4 Streaming Real-Time Data Over The Internet
268(1)
26.5 Real-Time Streams, Packets, And Jitter
269(1)
26.6 A Playback Buffer
270(1)
26.7 Accommodating Low Throughput
271(1)
26.8 The User's View Of A Playback Buffer
271(2)
26.9 The Effect Of Pausing Playback
273(1)
26.10 The Effect Of Network Congestion
273(1)
26.11 How To Overcome A Start-Stop Cycle
274(1)
26.12 Teleconferencing Services
275(1)
26.13 Using Internet Technology For Telephone Service
276(1)
26.14 VoIP Telephones
276(1)
26.15 Summary
276(3)
Chapter 27 File Transfer And Data Sharing
279(10)
27.1 Introduction
279(1)
27.2 File Transfer
279(1)
27.3 An Example File Transfer
280(1)
27.4 An Example URL For Folder Contents
281(1)
27.5 How FTP Works
282(1)
27.6 File Transfer For An Average User
282(1)
27.7 Exchanging Information Without Running A Server
283(1)
27.8 Transfer Vs. Collaborative Work
284(1)
27.9 Peer-To-Peer File Sharing
284(1)
27.10 Summary
285(4)
Chapter 28 Remote Desktop
289(8)
28.1 Introduction
289(1)
28.2 Remote Login
289(1)
28.3 Remote Access With Modern Graphical Devices
290(1)
28.4 How Remote Desktop Works
291(1)
28.5 Remote Desktop Software
292(1)
28.6 Assessment Of Remote Login And Remote Desktop
292(1)
28.7 Unexpected Results From Remote Access
293(1)
28.8 Summary
294(3)
Chapter 29 Cloud Services And Cloud Computing
297(16)
29.1 Introduction
297(1)
29.2 A Brief History Of Computing
297(2)
29.3 Maintaining Computers
299(1)
29.4 Data Inconsistencies
299(1)
29.5 Data Synchronization With A Direct Connection
299(1)
29.6 Selecting Data Items For Synchronization
300(1)
29.7 Synchronization Problems And Internet Synchronization
300(3)
29.8 Cloud Terminology
303(1)
29.9 Types Of Cloud Services
303(1)
29.10 Cloud Applications And The Internet of Things
304(1)
29.11 Generalized Cloud Computing
305(1)
29.12 Cloud Computing From A Company's Perspective
306(1)
29.13 Public, Private, And Hybrid Cloud
307(1)
29.14 Cloud Data Centers And Racks Of Computers
307(1)
29.15 Generalized Cloud Computing For An Individual
308(1)
29.16 The Disadvantage Of Using The Cloud
309(1)
29.17 Virtualization Technology Used For Cloud Computing
310(1)
29.18 Summary
310(3)
Part V: Other Aspects Of Internet Technology 313(58)
Chapter 30 Network Security (Encryption And Firewalls)
317(16)
30.1 Introduction
317(1)
30.2 Cybercrime And Cyber Security
317(1)
30.3 The Unsecure Internet
318(1)
30.4 Keeping Conversations Confidential
319(1)
30.5 Computer Encryption And Mathematics
319(1)
30.6 Confidential Web Browsing
320(1)
30.7 No Network Is Absolutely Secure
321(1)
30.8 Encryption Keys
321(1)
30.9 Two Keys Means Never Having To Trust Anyone
322(2)
30.10 Authentication: User IDs And Passwords
324(1)
30.11 Two-Factor Authentication
324(1)
30.12 Using Encryption For Authentication
325(1)
30.13 Wireless Network Security
325(1)
30.14 Network Firewall: Protection From Unwanted Packets
326(1)
30.15 Packet Filtering In A Firewall
327(1)
30.16 Trojan Horses And Firewall Protection
327(1)
30.17 Residential And Individual Firewalls
328(1)
30.18 Other Recommended Precautions
329(1)
30.19 Summary
330(3)
Chapter 31 Security Scams: Fooling Users
333(8)
31.1 Introduction
333(1)
31.2 Traditional Scams And Cybercrime
333(1)
31.3 The Foreign Bank Scam
334(1)
31.4 Phishing
334(1)
31.5 The Software Update Scam
335(1)
31.6 Password Change Scam
335(1)
31.7 Misleading SSID Scam
336(1)
31.8 Man-In-The-Middle Attacks
336(1)
31.9 Misleading Email Addresses And Web Site URLs
337(1)
31.10 Malware In Email Attachments
338(1)
31.11 Summary
338(3)
Chapter 32 Secure Access From A Distance (VPNs)
341(12)
32.1 Introduction
341(1)
32.2 An Employee At A Remote Location
341(1)
32.3 Secure Remote Desktop
342(1)
32.4 Using A Leased Circuit For Secure Telecommuting
343(1)
32.5 VPN Technology: Secure, Low-Cost Remote Access
343(1)
32.6 VPN From An Employee's Perspective
344(1)
32.7 How A VPN Works
344(1)
32.8 The Illusion Of A Direct Connection
345(1)
32.9 Obtaining A Corporate IP Address
346(1)
32.10 Exchanging Packets With The VPN Server
347(1)
32.11 The Significance Of VPNs
348(1)
32.12 Summary
349(4)
Chapter 33 Internet Economics And Electronic Commerce
353(12)
33.1 Introduction
353(1)
33.2 The ISP Hierarchy
353(2)
33.3 Network Capacity And Router Hardware
355(1)
33.4 Service Provider Fee Structures
355(1)
33.5 Receiver Pays
356(1)
33.6 ISP Revenue
357(1)
33.7 Peering Arrangements Among Tier 1 ISPs
358(1)
33.8 Security Technology And E-commerce
358(1)
33.9 Digital Signatures
359(1)
33.10 Certificates Contain Public Keys
359(1)
33.11 Digital Money
360(1)
33.12 How Digital Cash Works
360(1)
33.13 Business And E-commerce
361(1)
33.14 The Controversy Over Net Neutrality
361(1)
33.15 Summary
362(3)
Chapter 34 A Global Digital Library
365(6)
34.1 Introduction
365(1)
34.2 What Is A Library?
365(1)
34.3 Is The Internet A Digital Library?
366(1)
34.4 New Services Replace Old Services
366(1)
34.5 Digital Formats, Standards, And Archival Storage
367(1)
34.6 Organizing A Library
368(1)
34.7 The Disadvantage Of Imposing Structure
369(1)
34.8 Searching An Unstructured Collection
369(1)
34.9 What Is The Internet?
370(1)
34.10 A Personal Note
370(1)
Index 371
Douglas Comer is a Distinguished Professor at Purdue University in

the departments of Computer Science and Electrical and Computer Engineering.

He has created and enjoys teaching undergraduate and graduate

courses on computer networks and Internets, operating systems, computer

architecture, and computer software. One of the researchers who

contributed to the Internet as it was being formed in the late 1970s and

1980s, he has served as a member of the Internet Architecture Board, the

group responsible for guiding the Internets development. Comer is an

internationally recognized expert on computer networking, the TCP/IP

protocols, and the Internet, who presents lectures to a wide range of audiences.

In addition to research articles, he has written a series of textbooks

that describe the technical details of the Internet. Comers books

have been translated into many languages, and are used in industry as

well as computer science, engineering, and business departments around

the world. He is a Fellow of The Association for Computing Machinery

(the major professional society in computer science) and editor of the

scientific journal, Software Practice and Experience.

Professor Comer had dial-up Internet access from his home in the

late 1970s, has enjoyed a direct connection with twenty-four hour per

day service since 1981, and uses the Internet daily. He wrote this book

as a response to everyone who has asked him for an explanation of the

Internet that is both technically correct and easily understood by anyone.

An Internet enthusiast, Comer displays INTRNET on the license plate of

his car.