Computer and Communication Networks VitalSource eText (2e) : 9780133814835

Computer and Communication Networks VitalSource eText (2e)

 
Edition
 
2
ISBN
 
9780133814835
ISBN 10
 
0133814831
Published
 
12/12/2014
Published by
 
Pearson Higher Ed USA
Pages
 
Format
 
 
Title type
eBook
$113.49
NZ/Pacific customers only
 
 
This eText can only be purchased by people residing in New Zealand, Fiji, Samoa, Tonga or Cook Islands with a credit card from the same country. Click here to find the Pearson website for your region.
 
Description

Digital Access Code. When you buy a VitalSource eText you will receive a unique digital redemption code and instructions on how to access this product. Please note: VitalSource eTexts are available for download immediately and cannot be returned once purchased.

Pearson VitalSource eTexts – digital books that fit your portable lifestyle

With Pearson VitalSource eTexts you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you read or study
  • share your notes with friends
  • print up to 5 pages at a time 
  • use with PCs, MACs, smartphones and tablets 

The full text downloaded to your computer

Pearson VitalSource eTexts are downloaded to your computer and are accessed through the free VitalSource Bookshelf either offline or online, and also via the iPad/Android apps.

Time Limit

Pearson's Higher Education and Professional VitalSource products do not have an expiry date. You will continue to access your VitalSource products whilst you have your VitalSource Bookshelf installed.

Find out more about VitalSource eTexts

About the book

Computer and Communication Networks, Second Edition first establishes a solid foundation in basic networking concepts, TCP/IP schemes, wireless networking, Internet applications, and network security. Next, Mir delves into the mathematical analysis of networks, as well as advanced networking protocols. This fully-updated text thoroughly explains the modern technologies of networking and communications among computers, servers, routers, and other smart communication devices, helping readers design cost-effective networks that meet emerging requirements. Offering uniquely balanced coverage of all key basic and advanced topics, it teaches through extensive, up-to-date case studies, 400 examples and exercises, and 250+ illustrative figures. Nader F. Mir provides the practical, scenario-based information many networking books lack, and offers a uniquely effective blend of theory and implementation. Drawing on extensive experience in the field, he introduces a wide spectrum of contemporary applications, and covers several key topics that competitive texts skim past or ignore completely, such as Software-Defined Networking (SDN) and Information-Centric Networking.

Table of contents
Preface xxiii
About the Author xxxvii

Part I: Fundamental Concepts 1

Chapter 1: Packet-Switched Networks 3
1.1 Basic Definitions in Networks 4
1.2 Types of Packet-Switched Networks 11
1.3 Packet Size and Optimizations 15
1.4 Foundation of Networking Protocols 17
1.5 Addressing Scheme in the Internet 21
1.6 Equal-Sized Packets Model 28
1.7 Summary 28
1.8 Exercises 29
1.9 Computer Simulation Project 34

Chapter 2: Overview of Networking Devices 37
2.1 Network Interface Cards (NICs) 39
2.2 Switching and Routing Devices 40
2.3 Wireless Switching and Routing Devices 47
2.4 Modems 50
2.5 Multiplexers 58
2.6 Summary 66
2.7 Exercises 67
2.8 Computer Simulation Project 69

Chapter 3: Data Links and Link Interfaces 71
3.1 Data Links 72
3.2 Link Encoder 75
3.3 Error Detection and Correction on Links 77
3.4 Flow Control on Links 85
3.5 Link Access by Multiple Users 92
3.6 Wireless Channel Access by Multiple Users 97
3.7 Link Aggregation 107
3.8 Summary 109
3.9 Exercises 110
3.10 Computer Simulation Project 114

Chapter 4: Local Area Networks and Networks of LANs 115
4.1 LANs and Basic Topologies 116
4.2 LAN Protocols 117
4.3 Networks of LANs 121
4.4 MAC/IP Address Conversion Protocols 130
4.5 Spanning-Tree Protocol (STP) 133
4.6 Virtual LANs (VLANs) 136
4.7 Wireless LANs 139
4.8 IEEE 802.11 Wireless LAN Standard 142
4.9 Case Study: DOCSIS, a Cable TV Protocol 151
4.10 Summary 152
4.11 Exercises 153
4.12 Computer Simulation Project 157

Chapter 5: Wide-Area Routing and Internetworking 159
5.1 IP Packets and Basic Routing Policies 160
5.2 Path Selection Algorithms 173
5.3 Intradomain Routing Protocols 178
5.4 Interdomain Routing Protocols 188
5.5 Internet Protocol Version 6 (IPv6) 196
5.6 Congestion Control at the Network Layer 199
5.7 Summary 207
5.8 Exercises 209
5.9 Computer Simulation Project 213

Chapter 6: Multicast Routing and Protocols 215
6.1 Basic Definitions and Techniques 216
6.2 Local and Membership Multicast Protocols 221
6.3 Intradomain Multicast Protocols 223
6.4 Interdomain Multicast Protocols 231
6.5 Summary 237
6.6 Exercises 238
6.7 Computer Simulation Project 241

Chapter 7: Wireless Wide Area Networks and LTE Technology 243
7.1 Infrastructure of Wireless Networks 244
7.2 Cellular Networks 246
7.3 Mobile IP Management in Cellular Networks 259
7.4 Long-Term Evolution (LTE) Technology 268
7.5 Wireless Mesh Networks (WMNs) with LTE 277
7.6 Characterization of Wireless Channels 280
7.7 Summary 285
7.8 Exercises 286
7.9 Computer Simulation Project 288

Chapter 8: Transport and End-to-End Protocols 289
8.1 Overview of the Transport Layer 290
8.2 User Datagram Protocol (UDP) 295
8.3 Transmission Control Protocol (TCP) 298
8.4 Mobile Transport Protocols 307
8.5 TCP Congestion Control 309
8.6 Summary 315
8.7 Exercises 316
8.8 Computer Simulation Project 319

Chapter 9: Basic Network Applications and Management 321
9.1 Overview of the Application Layer 322
9.2 Domain Name System (DNS) 325
9.3 Electronic Mail (E-Mail) 330
9.4 World Wide Web (WWW) 335
9.5 Remote Login Protocols 342
9.6 File Transfer and FTP 346
9.7 Peer-to-Peer (P2P) Networking 347
9.8 Network Management 356
9.9 Summary 362
9.10 Exercises 363
9.11 Computer Simulation Projects 366

Chapter 10: Network Security 369
10.1 Overview of Network Security 370
10.2 Security Methods 375
10.3 Symmetric-Key Cryptography 377
10.4 Public-Key Cryptography 380
10.5 Authentication 383
10.6 Digital Signatures 387
10.7 Security of IP and Wireless Networks 387
10.8 Firewalls and Packet Filtering 391
10.9 Summary 396
10.10 Exercises 397
10.11 Computer Simulation Project 399

Part II: Advanced Concepts 401

Chapter 11: Network Queues and Delay Analysis 403
11.1 Little’s Theorem 404
11.2 Birth-and-Death Process 406
11.3 Queueing Disciplines 408
11.4 Markovian FIFO Queueing Systems 409
11.5 Non-Markovian and Self-Similar Models 424
11.6 Networks of Queues 428
11.7 Summary 437
11.8 Exercises 438
11.9 Computer Simulation Project 444

Chapter 12: Advanced Router and Switch Architectures 445
12.1 Overview of Router Architecture 446
12.2 Input Port Processor (IPP) 447
12.3 Output Port Processor (OPP) 453
12.4 Central Controller 454
12.5 Switch Fabric 457
12.6 Multicasting Packets in Routers 475
12.7 Summary 480
12.8 Exercises 481
12.9 Computer Simulation Project 484

Chapter 13: Quality of Service and Scheduling in Routers 485
13.1 Overview of Quality of Service (QoS) 486
13.2 Integrated Services QoS 486
13.3 Differentiated Services QoS 495
13.4 Resource Allocation 497
13.5 Packet Scheduling 501
13.6 Summary 512
13.7 Exercises 513
13.8 Computer Simulation Project 517

Chapter 14: Tunneling, VPNs, and MPLS Networks 519
14.1 Tunneling 520
14.2 Virtual Private Networks (VPNs) 524
14.3 Multiprotocol Label Switching (MPLS) 528
14.4 Summary 540
14.5 Exercises 540
14.6 Computer Simulation Project 543

Chapter 15: All-Optical Networks, WDM, and GMPLS 545
15.1 Overview of Optical Networks 546
15.2 Basic Optical Networking Devices 553
15.3 Large-Scale Optical Switches 558
15.4 Structure of Optical Cross Connects (OXCs) 560
15.5 Routing in All-Optical Networks 563
15.6 Wavelength Allocation in Networks 567
15.7 Case Study: An All-Optical Switch 569
15.8 Summary 572
15.9 Exercises 573
15.10 Computer Simulation Project 575

Chapter 16: Cloud Computing and Network Virtualization 577
16.1 Cloud Computing and Data Centers 578
16.2 Data Center Networks (DCNs) 588
16.3 Network Virtualization 595
16.3.1 Network Virtualization Components 596
16.4 Overlay Networks 600
16.5 Summary 601
16.6 Exercises 602
16.7 Computer Simulation Projects 605

Chapter 17: Software-Defined Networking (SDN) and Beyond 607
17.1 Software-Defined Networking (SDN) 608
17.2 SDN-Based Network Model 613
17.3 Small-Size SDN Architectures 620
17.4 SDN Architectures for Clouds 621
17.5 Network Functions Virtualization (NFV) 623
17.6 Information-Centric Networking (ICN) 627
17.7 Network Emulators for Advanced Networks 632
17.8 Summary 635
17.9 Exercises 636
17.10 Computer Simulation Projects 638

Chapter 18: Voice over IP (VoIP) Signaling 641
18.1 Public Switched Telephone Networks (PSTN) 642
18.2 Overview of Voice over IP (VoIP) 649
18.3 H.323 Protocol 652
18.4 Session Initiation Protocol (SIP) 666
18.5 Softswitch Methods and MGCP 678
18.6 VoIP and Multimedia Internetworking 679
18.7 Summary 684
18.8 Exercises 685
18.9 Computer Simulation Projects 689

Chapter 19: Media Exchange and Voice/Video Compression 693
19.1 Overview of Data Compression 694
19.2 Digital Voice and Compression 695
19.3 Still Images and JPEG Compression 701
19.4 Moving Images and MPEG Compression 707
19.5 Compression Methods with Loss 709
19.6 Compression Methods without Loss 713
19.7 Scanned Document Compression 717
19.8 Summary 718
19.9 Exercises 719
19.10 Computer Simulation Project 724

Chapter 20: Distributed and Cloud-Based Multimedia Networking 725
20.1 Real-Time Media Exchange Protocols 726
20.2 Distributed Multimedia Networking 741
20.3 Cloud-Based Multimedia Networking 751
20.4 Self-Similarity and Non-Markovian Streaming 756
20.5 Summary 759
20.6 Exercises 761
20.7 Computer Simulation Project 764

Chapter 21: Mobile Ad-Hoc Networks 765
21.1 Overview of Wireless Ad-Hoc Networks 766
21.2 Routing in Ad-Hoc Networks 767
21.3 Routing Protocols for Ad-Hoc Networks 769
21.4 Security of Ad-Hoc Networks 783
21.5 Summary 785
21.6 Exercises 786
21.7 Computer Simulation Projects 787

Chapter 22: Wireless Sensor Networks 789
22.1 Sensor Networks and Protocol Structures 790
22.2 Communication Energy Model 794
22.3 Clustering Protocols 799
22.4 Routing Protocols 805
22.5 Other Related Technologies 811
22.6 Case Study: Simulation of a Sensor Network 812
22.7 Summary 814
22.8 Exercises 815
22.9 Computer Simulation Projects 815

Appendix A: Glossary of Acronyms 817

Appendix B: RFCs 823

Appendix C: Probabilities and Stochastic Processes 827
C.1 Probability Theory 827
C.1 Probability Theory 827
C.2 Random Variables 828
C.3 Multiple Random Variables 832
C.4 Stochastic (Random) Processes 834
C.5 Theory of Markov Chains 835
C.5.1 Continuous-Time Markov Chains 835

Appendix D: Erlang-B Blocking Probability Table 837


Index 841
Access Code info.

To get the most out of your Pearson VitalSource eText you need to download the VitalSource Bookshelf software. This software is free to download and use. Click here to view the VitalSource Bookshelf system requirements.

Download Information: Once purchased, you can view and/or download your VitalSource eText instantly, either via the download link which you will receive as soon as you complete your online order or by viewing the download link against the order in the My Account area of this website.

Please note: VitalSource eTexts are available for download immediately and cannot be returned once purchased.

Sample Pages