text.skipToContent text.skipToNavigation

Computer Networks, 6th edition

  • Andrew S. Tanenbaum
  • Nicholas Feamster
  • David J. Wetherall

Published by Pearson (June 5th 2020) - Copyright © 2021

6th edition

Computer Networks [RENTAL EDITION]

ISBN-13: 9780136764052

  • Rental
  • Paperback

What's included

  • Rental

    A bound printed text you can rent, fulfilled by Chegg. At the end of the rental period, you can choose to keep the text for a flat fee.

  • Paperback

    You'll get a bound printed text.


This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed.

For courses in Business Data Communication and Networking.

An introduction to computer networking grounded in real-world examples

In Computer Networks, Tanenbaum et al. explain how networks work from the inside out. They start with the physical layer of networking, computer hardware and transmission systems, then work their way up to network applications. Each chapter follows a consistent approach: The book presents key principles, then illustrates them utilizing real-world example networks that run through the entire book – the Internet, and wireless networks, including Wireless LANs, broadband wireless, and Bluetooth. The 6th Edition is updated throughout to reflect the most current technologies, and the chapter on network security is rewritten to focus on modern security principles and actions.

Tutorial videos on key networking topics and techniques are available to students on the companion website. 

Instructors are supported with a Solutions Manual to end-of-chapter exercises featured in the book, Lecture PowerPoint slides, and extracted art and figures featured in the book. 

Table of contents

1. Introduction
    1. Uses of Computer Networks
    2. Types of Computer Networks
    3. Network Technology, from Local to Global
    4. Examples of Networks
    5. Network Protocols
    6. Reference Models
    7. Standardization
    8. Policy, Legal, and Social Issues
    9. Metric Units
    10. Outline of the Rest of the Book
    11. Summary
2. The Physical Layer
    1. Guided Transmission Media
    2. Wireless Transmission
    3. Using the Spectrum for Transmission
    4. From Waveforms to Bits
    5. The Public Switched Telephone Network
    6. Cellular Networks
    7. Cable Networks
    8. Communication Satellites
    9. Comparing Different Access Networks
    10. Policy at the Physical Layer
    11. Summary
3. The Data Link Layer
    1. Data Link Layer Design Issues
    2. Error Detection and Correction
    3. Elementary Data Link Protocols
    4. Improving Efficiency
    5. Data Link Protocols in Practice
    6. Summary
4. The Medium Access Control Sublayer
    1. The Channel Allocation Problem
    2. Multiple Access Protocols
    3. Ethernet
    4. Wireless LANs
    5. Bluetooth
    6. DOCSIS
    7. Data Link Layer Switching
    8. Summary
5. The Network Layer
    1. Network Layer Design Issues
    2. Routing Algorithms in a Single Network
    3. Traffic Management at the Network Layer
    4. Quality of Service and Application QoE
    5. Internetworking
    6. Software Defined Networking
    7. The Network Layer in the Internet
    8. Policy at the Network layer
    9. Summary
6. The Transport Layer
    1. The Transport Service
    2. Elements of Transport Protocols
    3. Congestion Control
    4. The Internet Transport Protocols: UDP
    5. The Internet Transport Protocols: TCP, QUIC, BBR
    6. Performance Monitoring
    7. Delay-Tolerant Networking
    8. Summary
7. The Application Layer
    1. DNS — The Domain Name System
    2. Electronic Mail
    3. The World Wide Web
    4. HTTP/2
    5. Streaming Audio and Video
    6. Content Delivery Networks and Distributed Cloud Services
    7. Summary
8. Security
    1. Fundamentals of Network Security
    2. The Core Ingredients of an Attack
    3. Firewalls and Intrusion Detection Systems
    4. Cryptography
    5. Symmetric-Key Algorithms
    6. Public-Key Algorithms
    7. Digital Signatures
    8. Management of Public Keys
    9. Authentication Protocols
    10. Communication Security
    11. Email Security
    12. Web Security
    13. Social Issues
    14. Summary
9. List and Bibliography
    1. Suggestions for Further Reading
    2. Alphabetical Bibliography

For teachers

All the material you need to teach your courses.

Discover teaching material