CITATION

Kasera, Sumit; Narang, Nishit; and Narang, Sumita. Communication Networks: Principles and Practice. US: McGraw-Hill Education, 2007.

Communication Networks: Principles and Practice

Published:  2007

ISBN: 9780071712293 0071476563
  • Contents
  • Preface
  • Abbreviations
  • Part 1 Building Blocks of Communication Networks
  • 1. Network Services
  • 1.1 Introduction
  • 1.2 Connection-oriented Service
  • 1.3 Connectionless Service
  • 1.4 Connection-oriented versus Connectionless Service
  • 1.5 Examples
  • 1.6 Conclusion
  • Review Questions
  • Further Reading
  • 2. Protocol Layering
  • 2.1 Introduction
  • 2.2 Layered Architecture
  • 2.3 Services, Interface, Primitives and Service Access Points
  • 2.4 Open Systems Interconnection-Reference Model (OSI-RM)
  • 2.5 Definition of Open System
  • 2.6 Seven-layered OSI-RM
  • 2.7 Shortcomings of the OSI-RM Reference Model
  • 2.8 Example: TCP/IP Protocol Suite
  • 2.9 Conclusion
  • Review Questions
  • Further Reading
  • 3. Transfer Modes
  • 3.1 Introduction
  • 3.2 Circuit Switching
  • 3.3 Routing
  • 3.4 Virtual Circuit Switching
  • 3.5 Comparison of Transfer Modes
  • 3.6 Example: Asynchronous Transfer Mode (ATM)
  • 3.7 Conclusion
  • Review Questions
  • Further Reading
  • 4. Network Topology and Extent
  • 4.1 Introduction
  • 4.2 Network Topology
  • 4.3 Network Extent
  • 4.4 Local Area Networks (LAN)
  • 4.5 Wide Area Network (WAN)
  • 4.6 Other Area Networks
  • 4.7 Examples
  • 4.8 Conclusion
  • Review Questions
  • Further Reading
  • Part 2 Core Concepts of Communication Networks
  • 5. Transmission and Multiple Access
  • 5.1 Introduction
  • 5.2 Transmission Concepts
  • 5.3 Multiple Access Concepts
  • 5.4 Example: FDMA/TDMA in GSM Networks
  • 5.5 Example: CDMA in UMTS Networks
  • 5.6 Conclusion
  • Review Questions
  • Further Reading
  • 6. Data Link Control
  • 6.1 Introduction
  • 6.2 Data Link Line Configurations
  • 6.3 Data Link Layer Functions
  • 6.4 Services Offered to Network Layer
  • 6.5 DLC Protocol Layering
  • 6.6 Logical Link Control (LLC)
  • 6.7 Media Access Control (MAC)
  • 6.8 Flow Control Protocols
  • 6.9 Error Detection and Correction Mechanisms
  • 6.10 Example: HDLC
  • 6.11 Conclusion
  • Review Questions
  • Further Reading
  • 7. Bridging
  • 7.1 Introduction
  • 7.2 Transparent Bridging
  • 7.3 Source Route Bridging
  • 7.4 Example: Bridging in Ethernet LANs
  • 7.5 Conclusion
  • Review Questions
  • Further Reading
  • 8. Switching
  • 8.1 Introduction
  • 8.2 Components of a Typical Switch
  • 8.3 Performance Measures in Switch Design
  • 8.4 Switching Issues
  • 8.5 Switching Architectures
  • 8.6 Shared-memory Architecture
  • 8.7 Shared-medium Architecture
  • 8.8 Space-division Architecture
  • 8.9 Example: Switching in ATM
  • 8.10 Example of ATM Switch Architecture: Knockout Switch
  • 8.11 Conclusion
  • Review Questions
  • Further Reading
  • 9. Addressing
  • 9.1 Introduction
  • 9.2 Classification of Addressing Techniques
  • 9.3 Example: Addressing Structure in Internet
  • 9.4 Example: Addressing Structure in Telecom Networks
  • 9.5 Conclusion
  • Review Questions
  • Further Reading
  • 10. Signalling
  • 10.1 Introduction
  • 10.2 Signalling Complexity in Different Networks
  • 10.3 Classification of Signalling Techniques
  • 10.4 Signalling Issues
  • 10.5 Signalling Models
  • 10.6 Point-to-multi-point Signalling
  • 10.7 Example: ISDN Signalling
  • 10.8 Conclusion
  • Review Questions
  • Further Reading
  • 11. Routing
  • 11.1 Introduction
  • 11.2 Design Requirements for a Routing Protocol
  • 11.3 Classification of Routing Protocols/Techniques
  • 11.4 Core Routing Concepts
  • 11.5 Example: Routing Protocols in Internet
  • 11.6 Conclusion
  • Review Questions
  • Further Reading
  • Part 3 Advanced Concepts of Communication Networks
  • 12. Traffic Management
  • 12.1 Introduction
  • 12.2 Concept of Traffic
  • 12.3 Concept of Service
  • 12.4 Network Capabilities
  • 12.5 Types of Traffic
  • 12.6 Traffic Management
  • 12.7 Traffic Contract Management
  • 12.8 Traffic Shaping
  • 12.9 Traffic Policing
  • 12.10 Priority Control
  • 12.11 Flow Control
  • 12.12 Congestion
  • 12.13 Congestion Control
  • 12.14 Flow Control versus Congestion Control
  • 12.15 Example: Traffic Management in ATM
  • 12.16 Conclusion
  • Review Questions
  • Further Reading
  • 13. Network Management
  • 13.1 Introduction
  • 13.2 Goals of Network Management
  • 13.3 Functional Areas of Network Management
  • 13.4 Example: Simple Network Management Protocol (SNMP)
  • 13.5 Example: Telecommunications Management Network (TMN)
  • 13.6 Conclusion
  • Review Questions
  • Further Reading
  • 14. Security Management
  • 14.1 Introduction
  • 14.2 What is Security Management?
  • 14.3 Symmetric (Secret Key) Encryption Techniques
  • 14.4 Asymmetric (Public Key) Encryption Techniques
  • 14.5 Key Management
  • 14.6 Hash Functions
  • 14.7 Digital Signatures and Certificates
  • 14.8 Firewalls
  • 14.9 Example: Security Management in Third Generation UMTS Network
  • 14.10 Conclusion
  • Review Questions
  • Further Reading
  • References
  • Index