This text has been prepared in full view of the current state-of-the-art of computer networks and cybersecurity. The book has been designed as carefully as possible to be a sort of “bible” for this area by uncovering numerous salient features of the various topics and providing clear and detailed explanations of concepts that are difficult to grasp. The book is organized into six parts that essentially walk the reader through this area in a straightforward and logical manner. The book begins with a presentation of the Internet architecture in the Introduction because that is the normal way in which people first encounter computer networks, and then proceeds to Internet applications and the development of application software in Part 1, which represents the manner in which the Internet is used. This unique presentation sequence thus leverages the subjects with which readers are at least partially familiar. The application layer is used by students on an everyday basis and most of them have experience in setting up a home network using a wireless or Ethernet local area network (LAN). The book then addresses the link and physical layers in Part 2, which makes it easy for students to grasp the concepts surrounding LANs. Layer
2 switches are then extended to layer 3 switches and their attendant design issues. The network layer including IPv4, IPv6, routers and the various design issues are covered in Part 3. Part 4 then addresses the transport layer, which is the layer of the protocol stack that provides a mechanism for efficient transport. The details surrounding the modern congestion control algorithms available in the newest operating systems (OS’s), together with their pros and cons, are also illustrated in detail. The analysis of these layers is followed by an in-depth presentation of the numerous aspects of the information infrastructure and computer security in Part 5. The development of Internet applications covered in detail in Part 1 provides the student with the tools necessary to comprehend the vulnerabilities associated with each OS and the typical applications. Therefore, this book enables students to understand the defense methods as well as their weaknesses. Furthermore, this book provides a complete and seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. Finally, the emerging technologies that will alter the current state of multimedia communication and datacenter/ cloud computing are addressed in Part 6.