C.1. Introduction p.79-- C.2. The Physical Layer p.177 -- C.3. The Data Link Layer p.242-- C.4. The medium access control sublayer p.337-- C.5. The network layer p.473-- C.6. The transport layer p.573-- C.7. The application layer p.714-- C.8. Network security p.828-- C.9. Reading list and bibliography p.848--