Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Sorry, you do not have a permission to ask a question, You must login to ask question.

Sorry, you do not have a permission to add a post.

Latest News & Updates

Hardware and Networking Books PDF Download

Table of Content of the PDF

  • Introduction
  • Layers in a computer
  • The network is the computer
  • Perspectives
  • Perspectives (contd.)
  • Connectivity
  • Switched networks
  • Interconnection devices
  • Interconnection devices (contd.)
  • Network architecture
  • OSI architecture
  • TCP/IP layers
  • TCP/IP layers (contd.)
  • Protocols and Services
  • Physical layer –
    Media dependent components
  • Physical layer –
    Media independent
  • Datalink layer functions
  • Datalink layer services
  • Datalink layer –
    Logical link control (LLC)
  • Datalink layer –
    Medium access control (MAC)
  • Network layer
  • Network layer functions
  • Addressing
  • Routing
  • Connection-Oriented service
  • Connectionless service
  • Circuit switching
  • Virtual Circuits
  • Packet switching (datagrams)
  • Transport layer
  • Application requirements
  • Bandwidth and Multiplexing
  • Bandwidth
  • Bandwidth v/s bit width
  • Latency (delay)
  • Latency
  • Delay X Bandwidth product
  • Delay X Bandwidth product
  • Effective resource sharing
  • Common multiplexing strategies
  • Statistical multiplexing
  • Error detection and correction
  • Bit-level error detection/correction
  • Parity
  • Cyclic Redundancy Check (CRC)
  • CRC algorithm
  • Frame Check Sequence (FCS)
  • Polynomial representation
  • Generator polynomials
  • Internet checksum
  • Frame level error correction
  • Stop and Wait for ARQ
  • Sliding Window Protocol
  • Sliding window sender
  • Sliding window receiver
  • Sliding window features
  • Go­back­N ARQ
  • Selective Repeat ARQ
  • Medium Access Control
  • Multiple access

This is the index of  Hardware and Networking Books PDF

  • Control methods
  • Performance metrics
  • Performance metrics (contd.)
  • ALOHA
  • Vulnerable window
  • Vulnerable window
  • Slotted ALOHA
  • ALOHA summary
  • Carrier Sense Multiple Access (CSMA)
  • 1 ­ Persistent CSMA
  • P ­ Persistent CSMA
  • Choice of p
  • Non­Persistent CSMA
  • Collision detection (CSMA/CD)
  • Binary Exponential Backoff
  • Example: Ethernet (IEEE 802.3)
  • 802.3 frame
  • Collision free protocols
  • Bridging and Switching
  • Bridges
  • Bridge functioning
  • Spanning tree algorithm
  • Spanning tree protocol
  • Generic Switch
  • Generic Router Architecture
  • Blocking in packet switches
  • Dealing with blocking
  • Input buffering (input queueing)
  • Output queued switch
  • Scheduling
  • Packet scheduling
  • Scheduling objectives
  • Scheduling disciplines
  • Scheduling requirements
  • Problems with FIFO queues
  • Fairness

To Download Hardware and Networking Books PDF keep scrolling you will get a link in the end.

  • Max-Min Fairness
  • Max-Min Fairness: example
  • Fair scheduling goals
  • Work conservation
  • Round robin scheduling
  • Weighted round-robin
  • Weighted RR – variable-length packet
  • Generalized Processor Sharing (GPS)
  • Weighted Fair Queueing (WFQ)
  • Guaranteed-service scheduling
  • Non-work-conserving scheduling
  • Congestion control
  • Congestion control strategies
  • Early random drop
  • Random early detection (RED)
  • Drop position
  • IP Addressing
  • IP addressing
  • IPv4 addresses
  • Address classes
  • IP address notation
  • IP address issues
  • Subnetting
  • Classless Inter-Domain Routing (CIDR)
  • CIDR (contd.)
  • Address Resolution Protocol (ARP) RFC 1010
  • ARP
  • RARP and Proxy ARP
  • ICMP (Internet Control Message)
  • IP header
  • IP Routing
  • IP forwarding
  • Building routing tables
  • Routing protocol issues
  • Classification of routing protocols
  • DV Example: RIP
  • DV problem: count to infinity
  • Link state routing
  • RIP
  • OSPF
  • Exterior routing protocols
  • External and summary records
  • Border Gateway Protocol (BGP)
  • Functions of BGP
  • IP routing mechanism
  • Some IP networking tools
  • End-to-End Transport
  • User Datagram Protocol (UDP)
  • UDP header
  • Transmission Control Protocol (TCP)
  • More TCP features
  • Ports, Connections, End-points, Sockets
  • Ports and Sockets
  • TCP connection and header
  • Port numbers

This is the index of Hardware and Networking Books PDF

  • The sequence number and window size
  • Piggybacking
  • Timeouts and retransmission
  • RTT estimation
  • Exponential averaging filter
  • Flow control
  • Advertised window
  • Silly-Window syndrome
  • Data Transfer using TCP
  • Interactive Input
  • Bulk data
  • Additive increase Multiplicative decrease
  • Slow start and Congestion avoidance
  • Fast retransmit and Fast recovery
  • TCP Tahoe
  • TCP Reno
  • Application Programming
  • Application layer
  • Client-Server paradigm
  • Client-Server actions
  • Example: Web access (HTTP)
  • Sockets API
  • Sockets interface
  • Client actions
  • Server actions
  • Client architecture
  • Server architecture
  • Remote Procedure Call (RPC)
  • RPC: central idea
  • RPC functionality
  • RPC design
  • RPC advantages
  • Network Security
  • Security requirements
  • Security threats and levels
  • Firewalls
  • Sample filtering rules
  • Cryptography
  • Techniques
  • Some security tools

Download Hardware and Networking Books in PDF

To Download Hardware and Networking Books PDF- Click Here.

Download

Cisco Exam Dumps, Ebooks, PDF, Notes

and Project  Report

Click here

Discy Latest Articles

What is Network Security

What is Network Security

Table of Contents TYPES OF NETWORK SECURITY SOLUTIONS

Time Division Multiplexing

Time Division Multiplexing

Let us learn some of the basic information about the time-division multiplexing and different types of multiplexing in it. The time-division multiplexing can be of two types. It can be statistical time division multiplexing and frequency division multiplexing. Before we ...

Code Division Multiple Access

Code Division Multiple Access

Introduction: Code Division Multiple Access(CDMA) is a communication channel used to send the signal through various communication technologies in CDMA serval users can share the bandwidth and also this CDMA acts as interface several users. Every channel has a specific ...

Explore Our Blog