Example: barber

Computer and Communication Networks - pearsoncmg.com

Computer and Communication networksSecond EditionThis page intentionally left blank Computer and Communication net worksSecond EditionNader F. MirUpper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico CityCOMPUTER ANDCOMMUNICATIONNETWORKSN ader F. MirUpper Saddle River, w Yo r CityMany of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at

Library of Congress Catalog-in-Publication Data Mir, Nader F. Computer and communication networks / Nader F. Mir.—Second edition. pages Chuti Prasertsithcm ... 1.4 Foundation of Networking Protocols 17 1.4.1 Five-Layer TCP/IP Protocol Model 18 1.4.2 Seven-Layer OSI Model 20

Tags:

  Network, Computer, Communication, Data, Networking, Computer and communication networks

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Computer and Communication Networks - pearsoncmg.com

1 Computer and Communication networksSecond EditionThis page intentionally left blank Computer and Communication net worksSecond EditionNader F. MirUpper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico CityCOMPUTER ANDCOMMUNICATIONNETWORKSN ader F. MirUpper Saddle River, w Yo r CityMany of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at or (800) government sales inquiries, please contact questions about sales outside the United States, please contact us on the Web: of Congress Catalog-in-Publication DataMir, Nader F.

2 Computer and Communication Networks / Nader F. Mir. Second edition. pages cm Includes bibliographical references and index. ISBN 978-0-13-381474-3 (hardcover : alk. paper) ISBN 0-13-381474-2 (hardcover : alk. paper) 1. Computer Networks . 2. data transmission systems. I. Title. 2015 dc23 2014037209 Copyright 2015 Pearson Education, rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to (201) : 978-0-13-381474-3 ISBN-10: 0-13-381474-2 Text printed in the United States on recycled paper at Courier in Westford, printing, December 2014 Editor-in-ChiefMark L.

3 TaubSenior Acquisitions EditorTrina MacDonaldDevelopment EditorSonglin QiuManaging EditorJohn FullerFull-Service Production ManagerJulie B. NahilProject ManagerVicki RowlandIndexerTed LauxProofreaderAndrea FoxPublishing CoordinatorOlivia BasegioCover DesignerChuti PrasertsithCompositordiacriTech, Shahrzad and NavidThis page intentionally left blank ContentsPreface xxiiiAbout the Author xxxviiPART I: Fundamental Concepts 11 Packet-Switched Networks Basic Definitions in Networks Packet Switching Versus Circuit Switching data , Packets, and Frames The Internet and ISPs Classification of ISPs Types of Packet-Switched Networks Connectionless Networks Connection-Oriented Networks Packet Size and Optimizations Foundation of networking Protocols Five-Layer TCP/IP Protocol Model Seven-Layer OSI Model Addressing Scheme in the Internet IP Addressing Scheme Subnet Addressing and Masking Classless Interdomain Routing (CIDR) 26viiviii Equal-Sized Packets Model Summary Exercises Computer Simulation Project 342 Overview of networking Devices network Interface Cards (NICs)

4 Switching and Routing Devices Layer 1 Devices Layer 2 Devices Layer 3 Devices Wireless Switching and Routing Devices Wireless Access Points and Base Stations Wireless Routers and Switches Antennas in Wireless Devices Modems Basic Modulation: ASK, FSK, and PSK Practical Modulation: 4-QAM and QPSK Digital Subscriber Line (DSL) Modems Cable Modems Multiplexers Frequency-Division Multiplexing (FDM) Time-Division Multiplexing Summary Exercises Computer Simulation Project 693 data Links and Link Interfaces data Links data Link Types Link Encoder Error Detection and Correction on Links Error Detection Methods Cyclic Redundancy Check (CRC) Algorithm Flow Control on Links Stop-and-Wait Flow Control Sliding-Window Flow Control 88 Contents Link Access by Multiple Users Carrier Sense Multiple Access (CSMA) Wireless Channel Access by Multiple Users Frequency-Division Multiple Access Time-Division Multiple Access Orthogonal Frequency-Division Multiple Access Single-Carrier Frequency-Division Multiple Access Code-Division Multiple Access Other Multiple-Access Methods Link Aggregation Link Aggregation Applications Link Aggregation Control Protocol (LACP) Summary Exercises Computer Simulation Project 1144 Local Area Networks and Networks of LANs LANs and Basic Topologies LAN Protocols Logical-Link Control (LLC) Media Access Control (MAC) Networks of LANs LAN networking with Layer 1 Devices LAN networking with Layer 2 Devices networking with Layer 2 and 3 Devices MAC/IP Address Conversion Protocols Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Spanning-Tree Protocol (STP) Virtual LANs (VLANs)

5 VLAN Switches VLAN Trunking Protocol (VTP) and IEEE Wireless LANs Infrared LANs Spread-Spectrum LANs Narrowband RF LANs Home RF and Bluetooth LANs 141x IEEE Wireless LAN Standard IEEE Physical Layer MAC Layer WiFi Networks Case Study: DOCSIS, a Cable TV Protocol Summary Exercises Computer Simulation Project 1575 Wide-Area Routing and Internetworking IP Packets and Basic Routing Policies Packet Fragmentation and Reassembly Internet Control Message Protocol (ICMP) Obtaining and Assigning IP Addresses Dynamic Host Configuration Protocol (DHCP) network Address Translation (NAT) Universal Plug and Play (UPnP) Path Selection Algorithms Dijkstra s Algorithm Bellman-Ford Algorithm Packet Flooding Algorithm Deflection Routing Algorithm Intradomain Routing Protocols Open Shortest Path First (OSPF) Protocol Routing Information Protocol (RIP) Interdomain Routing Protocols Autonomous System (AS) Border Gateway Protocol (BGP) Internet Protocol Version 6 (IPv6)

6 IPv6 Addressing Format Extension Header Packet Fragmentation Other Features of IPv6 Congestion Control at the network Layer Unidirectional Congestion Control Bidirectional Congestion Control Random Early Detection (RED) A Quick Estimation of Link Blocking Lee s Serial and Parallel Connection Rules 206 Contents Summary Exercises Computer Simulation Project 2136 Multicast Routing and Protocols Basic Definitions and Techniques IP Multicast Addresses Basic Multicast Tree Algorithms Classification of Multicast Protocols Local and Membership Multicast Protocols Internet Group Management Protocol (IGMP) Intradomain Multicast Protocols Multicast Backbone (MBone) Distance Vector Multicast Routing Protocol (DVMRP) Multicast OSPF (MOSPF) Protocol Protocol-Independent Multicast (PIM) Core-Based Trees (CBT) Protocol Interdomain Multicast Protocols Multiprotocol BGP (MBGP) Multicast Source Discovery Protocol (MSDP) Border Gateway Multicast Protocol (BGMP) Summary Exercises Computer Simulation Project 2417 Wireless Wide Area Networks and LTE Technology Infrastructure of Wireless Networks Cellular Networks Cellular network Devices and Operation Handoff Mobile IP Management in Cellular Networks Home Agents and Foreign Agents Agent Discovery Phase Registration Mobile IP Routing Generations of Cellular Networks Long-Term Evolution (LTE) Technology LTE networking Devices Call Establishment in LTE Cells 271xii Handoff in LTE Downlink and Uplink Schemes in LTE Frequency Reuse Wireless Mesh Networks (WMNs)

7 With LTE Applications of Mesh Networks Physical and MAC Layers of WMNs Characterization of Wireless Channels Capacity Limits of Wireless Channels Channel Coding Flat-Fading Countermeasures Intersymbol Interference Countermeasures Summary Exercises Computer Simulation Project 2888 Transport and End-to-End Protocols Overview of the Transport Layer Interaction of Transport Layer and Adjacent Layers Transport Layer Protocols User Datagram Protocol (UDP) UDP Segments Applications of UDP Transmission Control Protocol (TCP) TCP Segment A TCP Connection Window-Based Transmission and Sliding Window in TCP Applications of TCP Mobile Transport Protocols UDP for Mobility TCP for Mobility TCP Congestion Control Additive Increase, Multiplicative Decrease Control Slow-Start Method Fast Retransmit and Fast Recovery Methods Summary Exercises Computer Simulation Project 319 Contents xiii9 Basic network Applications and Management Overview of the Application Layer Client/Server Model Graphical User Interface (GUI) Domain Name System (DNS) Domain Name Space Name/Address Mapping DNS Message Format Electronic Mail (E-Mail) Basic E-Mail Structure and Definitions Simple Mail Transfer Protocol (SMTP) Post Office Protocol, Version 3 (POP3) Internet Mail Access Protocol (IMAP) World Wide Web (WWW) Hypertext Transfer Protocol (HTTP) Web Caching (Proxy Server)

8 Webmail Remote Login Protocols TELNET Protocol Secure Shell (SSH) Protocol File Transfer and FTP File Transfer Protocol (FTP) Secure Copy Protocol (SCP) Peer-to-Peer (P2P) networking P2P File Sharing Protocols P2P Database Sharing Protocols Estimation of Peer Connection Efficiency network Management Elements of network Management Structure of Management Information (SMI) Management Information Base (MIB) Simple network Management Protocol (SNMP) Summary Exercises Computer Simulation Projects 366xiv Contents10 network Security Overview of network Security Elements of network Security Classification of network Attacks Security Methods Symmetric-Key Cryptography data Encryption Standard (DES) Advanced Encryption Standard (AES) Public-Key Cryptography RSA Algorithm Diffie-Hellman Key-Exchange Protocol Authentication Hash Function Secure Hash Algorithm (SHA) Digital Signatures Security of IP and Wireless Networks IP Security and IPsec Security of Wireless Networks and IEEE Firewalls and Packet Filtering Packet Filtering Proxy Server Summary Exercises Computer Simulation Project 399 PART II: Advanced Concepts 40111 network Queues and Delay Analysis Little s Theorem Birth-and-Death Process Queueing Disciplines Markovian FIFO Queueing Systems M/M/1 Queueing Systems Systems with Limited Queueing Space: M/M/ 1/b M/M/a Queueing Systems Models for Delay-Sensitive Traffic.

9 M/M/a/a M/M/ Queueing Systems 422 Contents Non-Markovian and Self-Similar Models Pollaczek-Khinchin Formula and M/G/ 1 M/D/ 1 Models Self-Similarity and Batch-Arrival Models Networks of Queues Burke s Theorem Jackson s Theorem Summary Exercises Computer Simulation Project 44412 Advanced Router and Switch Architectures Overview of Router Architecture Input Port Processor (IPP) Packet Parser Packet Partitioner Input Buffer Routing Table (IPv4 and IPv6) Multicast Scheduler Forwarding Table and Packet Encapsulator Output Port Processor (OPP) Output Buffer Reassembler and Resequencer Error Control Central Controller Contention Resolution Unit Congestion Controller Switch Fabric Complexity of Switch Fabrics Crossbar Switch Fabrics Clos Switch Fabrics Concentration and Expansion Switch Fabrics Shared-Memory Switch Fabrics Performance Improvement in Switch Fabrics Multicasting Packets in Routers Tree-Based Multicast Algorithm Packet Recirculation Multicast Algorithm 479xvi Summary Exercises Computer Simulation Project 48413 Quality of Service and Scheduling in Routers Overview of Quality of Service (QoS) Integrated Services QoS Traffic Shaping Admission Control Resource Reservation Protocol (RSVP) Differentiated Services QoS Per-Hop Behavior (PHB)

10 Resource Allocation Management of Resources Classification of Resource-Allocation Schemes Fairness in Resource Allocation Packet Scheduling First-In, First-Out Scheduler Priority Queueing Scheduler Fair Queueing Scheduler Weighted Fair Queueing Scheduler Deficit Round-Robin Scheduler Earliest Deadline First Scheduler Summary Exercises Computer Simulation Project 51714 Tunneling, VPNs, and MPLS Networks Tunneling Point-to-Point Protocol (PPP) IPv6 Tunneling and Dual-Stack Lite Virtual Private Networks (VPNs) Remote-Access VPN Site-to-Site VPN Security in VPNs Multiprotocol Label Switching (MPLS) Labels and Label Switch Routers (LSRs) Label Binding and Switching 531 Contents Routing in MPLS Domains MPLS Packet Format Multi-Tunnel Routing Traffic Engineering MPLS-Based VPNs Summary Exercises Computer Simulation Project 54315 All-Optical Networks , WDM, and GMPLS Overvi


Related search queries