Czy mogę śmiało z tego czerpać wiedzę?

0

Siema, Znalazłem w domu książkę pt. "Sieci komputerowe. Kompendium wiedzy na temat współczesnych sieci komputerowych" autora Andrew S. Tanenbaum, wydanie 4 rok 2004. Można z niej śmiało się uczyć?

0

No jak 2004 rok, to tak średnio współczesne sieci :D

0

Może się przydać do zaliczenia jakiegoś przedmiotu na studiach (może być w podstawie programowej gdzieś ;-) )

0

Oidp to miałem to na studiach, ale wtedy to było state-of-the-art...

47

Zaraz po tym doczytałbym coś nowego i miał porównanie "co się zmieniło" ;)

0

A z tego mogę śmiało się uczyć?

1
ledi12 napisał(a):

Zaraz po tym doczytałbym coś nowego i miał porównanie "co się zmieniło" ;)

Jak kol jest zupełny szczypiorek, ksiazka nie zrobi mu krzywdy. Sieci nie są tak zmienne jak frameworki javascriptowe (ani nawet javowskie)

A odświeżenie / uzupełnienie to nie wiem czy po polsku, za długo trwa proces wydawniczy

0

A jak myslicie, jak sie zestarzalo: Unix programowanie usług sieciowych Tom 1 i 2 W. Richard Stevens (ucZylem sie z tego wieki temu i bardzo dobrze ja wspominam, ale ni epotrafie powiedziec na ile bedzie dzisiaj aktualna)

0

Czy C też mogę śmiało się uczyć ze starych książek? Przez stare mam na myśli podobnej daty jak wspomniany przeze mnie Tanenbaum

2
lester29 napisał(a):

Czy C też mogę śmiało się uczyć ze starych książek? Przez stare mam na myśli podobnej daty jak wspomniany przeze mnie Tanenbaum

Żależy od dziedziny, twojego poziomu, i tego jak bardzo szczegółowo chcesz się dowiedzieć. Jak czytasz taką ksiązkę to możliwe że w każdym temacie istnieje już nowsze rozwiązanie nieporuszone w książce, a możliwe że jeszcze nie istnieje. Wszystko zalezy od konkretnego przypadku

0

Dziękuję za pomocne rady. W takim razie biorę się za przerabianie tej lektury o sieciach komputerowych.

1

Zależy jak bardzo Ci się nudzi i jak bardzo Ci się temat podoba

0

Zmiany w wydaniu V (2011):

Among the many changes in this book, the most important one is the additionof Prof. David J. Wetherall as a co-author. David brings a rich background in net-working, having cut his teeth designing metropolitan-area networks more than 20 years ago. He has worked with the Internet and wireless networks ever since and is a professor at the University of Washington, where he has been teaching and
doing research on computer networks and related topics for the past decade.

Of course, the book also has many changes to keep up with the: ever-changing world of computer networks. Among these are revised and new material on

  • Wireless networks (802.12 and 802.16)
  • The 3G networks used by smart phones
  • RFID and sensor networks
  • Content distribution using CDNs
  • Peer-to-peer networks
  • Real-time media (from stored, streaming, and live sources)
  • Internet telephony (voice over IP)
  • Delay-tolerant networks

A more detailed chapter-by-chapter list follows.

Chapter 1 has the same introductory function as in the fourth edition, but the contents have been revised and brought up to date. The Internet, mobile phone networks, 802.11, and RFID and sensor networks are discussed as examples of computer networks. Material on the original Ethernet—with its vampire taps— has been removed, along with the material on ATM.

Chapter 2, which covers the physical layer, has expanded coverage of digital modulation (including OFDM as widely used in wireless networks) and 3G networks (based on CDMA). New technologies are discussed, including Fiber to the Home and power-line networking.

Chapter 3, on point-to-point links, has been improved in two ways. The material on codes for error detection and correction has been updated, and also includes a brief description of the modern codes that are important in practice (e.g., convolutional and LDPC codes). The examples of protocols now use Packet over SONET and ADSL. Sadly, the material on protocol verification has been removed
as it is little used.

In Chapter 4, on the MAC sublayer, the principles are timeless but the technologies have changed. Sections on the example networks have been redone accordingly, including gigabit Ethernet, 802.11, 802.16, Bluetooth, and RFID. Also updated is the coverage of LAN switching, including VLANs.

Chapter 5, on the network layer, covers the same ground as in the fourth edition. The revisions have been to update material and add depth, particularly for quality of service (relevant for real-time media) and internetworking. The sections on BGP, OSPF and CIDR have been expanded, as has the treatment of multicast routing. Anycast routing is now included.

Chapter 6, on the transport layer, has had material added, revised, and removed. New material describes delay-tolerant networking and congestion control in general. The revised material updates and expands the coverage of TCP congestion control. The material removed described connection-oriented network layers, something rarely seen any more.

Chapter 7, on applications, has also been updated and enlarged. While material on DNS and email is similar to that in the fourth edition, in the past few years there have been many developments in the use of the Web, streaming media and content delivery. Accordingly, sections on the Web and streaming media have been brought up to date. A new section covers content distribution, including CDNs and peer-to-peer networks.

Chapter 8, on security, still covers both symmetric and public-key cryptography for confidentiality and authenticity. Material on the techniques used in practice, including firewalls and VPNs, has been updated, with new material on 802.11 security and Kerberos V5 added.

Chapter 9 contains a renewed list of suggested readings and a comprehensive bibliography of over 300 citations to the current literature. More than half of these are to papers and books written in 2000 or later, and the rest are citations to classic papers.

Zmiany w wydaniu VI (2021):

Among the many changes in this book, the most important one is the addition of Prof. Nick Feamster as a co-author. Prof. Feamster has a Ph.D. from M.I.T. and is now a full professor at the University of Chicago.

Another important change is that Chapter 8 (on security) has been very heavily modified by Prof. Herbert Bos of the Vrije Universiteit in Amsterdam. The focus has moved from cryptography to network security. The issues of hacking, DoS
attacks and so much more is front-and-center in the news almost every day, so we are very grateful that Prof. Bos has redone the chapter to deal with these important issues in detail. The chapter discusses vulnerabilities, how to fix them, how hackers respond to the fixes, how the defenders react, and so on ad infinitum. The material on cryptography has been reduced somewhat to make room for the large amount of new material on network security.

Of course, the book also has many other changes to keep up with the ever changing world of computer networks. A chapter-by-chapter list of the major changes follows.

Chapter 1 serves the same introductory function as in previous editions, but the contents have been revised and brought up to date. Specific updates including adding additional discussions on the Internet of Things and modern cellular architectures, including 4G and 5G networks. Much of the discussion on Internet policy has also been updated, particularly the discussion on net neutrality.

Chapter 2 has been updated to include discussion of more prevalent physical media in access networks, such as DOCSIS and fiber arhictectures. Treatment of modern cellular network architectures and technologies was added, and the section
on satellite networks was also substantially updated. Emerging technologies such as virtualization were added, including discussions on mobile virtual network operators and cellular network slicing. The policy discussion was reorganized and updated to include discussion on policy questions in the wireless arena, such as spectrum.

Chapter 3 has been updated to include DOCSIS as a protocol example, as it is a widely used access technology. Much of the error correction codes are, of course, timeless.

Chapter 4 has been brought up to date, with new material on 40- and 100-gigabit Ethernet, 802.11.ac, 802.11ad, and 802.11ax. New material has been added on DOCSIS, explaining the MAC sublayer in cable networks. The material on 802.16 has been removed as it now appears that this technology is going to lose out to the cellular 4G and 5G technologies. The section on RFID has also been removed to make space for new material, but also because it was not directly network related.

Chapter 5 has been updated to clarify and modernize the discussions on congestion management. The sections on traffic management have been updated and clarified, and the discussions on traffic shaping and traffic engineering have been updated. The chapter includes an entirely new section on software-defined networking (SDN), including OpenFlow and programmable hardware (e.g., Tofino). The chapter also includes discussion on emerging applications of SDN, such as inband network telemetry. Some of the discussion on IPv6 has also been updated.

Chapter 6 has been extensively edited to include new material on modern transport protocols, including TCP CUBIC, QUIC, and BBR. The material on performance measurement has been completely rewritten to focus on the measurement of throughput in computer networks, including an extensive discussion on the challenges of measuring access network throughout as speeds in access ISPs increase. The chapter also includes new material on measuring user quality of experience, an emerging area in performance measurement.

Chapter 7 has been heavily edited. Over 60 pages of material that is no longer relevant to a book on computer networks has been removed. The material on DNS has been almost completely rewritten to reflect modern developments in DNS, including the ongoing trends to encrypt DNS and generally improve its privacy characteristics. Emerging protocols such as DNS-over-HTTPS and other privacy-preserving techniques for DNS are discussed. The discussion of the Web has been extensively updated, to reflect the increasing deployment of encryption on the Web, as well as extensive privacy issues (e.g., tracking) that are now pervasive on the Web. The chapter includes a completely new section on Web privacy, more extensive discussions of modern content delivery technology (e.g., content delivery networks), and an expanded discussion on peer-to-peer networks. The section on the evolution of the Internet has also been edited to reflect trends towards distributed cloud services.

Chapter 8 has been completely overhauled. In previous editions, the focus of the security chapter was almost exclusively on information security by means of cryptography. However, cryptography is only one aspect of network security and if we look at security incidents in practice, it is generally not the aspect where the problems are. To remedy this, we added new content on security principles, fundamental attack techniques, defenses, and a wide range of systems-related security issues. Moreover, we updated the existing sections by dropping some encryption techniques that are now obsolete and introducing more modern versions of protocols and standards.

Chapter 9 contains a renewed list of suggested readings and a comprehensive bibliography.

In addition, dozens of new exercises and dozens of new references have beenadded.

0

Czy zadania z tanenbauma też mam przerabiać?

0

Jednak wybrałem RIcharda Stevensa bo nowszy i bardziej przystępnym językiem dla mnie tłumaczy
Czy lepiej przerobić Stevensa od początku do końca czy robić to co mnie interesuje? Zależy mi na tym żeby znać podstawy typu model OSI, TCP/IP, maski sieci, ipv6

1

Nie ma tak łatwo, że wszystko na tacy dostaniesz. Musisz przecierpieć przy zdobywaniu wiedzy i przerabiając bezużyteczne rzeczy, które nie wiesz czy Ci się w życiu przydadzą. Ma Cię to ciekawić.

0

Teoria teorią, interesuje mnie też praktyka
Czy pisanie własnych klientów/serwerów w C, konfigurowanie zapory sieciowej pod Linuxem i OpenBSD, zabawa wiresharkiem pozwolą mi utrwalić wiedzę ze Stevensa w praktyce?

Dajcie znać jak znacie jeszcze jakieś inne sposoby na przećwiczenie sieci w praktyce.

1 użytkowników online, w tym zalogowanych: 0, gości: 1