Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
Communication Networks: Principles and Practice
CITATION
Kasera, Sumit;
Narang, Nishit; and
Narang, Sumita
.
Communication Networks: Principles and Practice
.
US
: McGraw-Hill Education, 2007.
Add to Favorites
Email to a Friend
Download Citation
Communication Networks: Principles and Practice
Authors:
Sumit Kasera
,
Nishit Narang
and
Sumita Narang
Published:
2007
ISBN:
9780071712293 0071476563
Open eBook
Book Description
Table of Contents
Contents
Preface
Abbreviations
Part 1 Building Blocks of Communication Networks
1. Network Services
1.1 Introduction
1.2 Connection-oriented Service
1.3 Connectionless Service
1.4 Connection-oriented versus Connectionless Service
1.5 Examples
1.6 Conclusion
Review Questions
Further Reading
2. Protocol Layering
2.1 Introduction
2.2 Layered Architecture
2.3 Services, Interface, Primitives and Service Access Points
2.4 Open Systems Interconnection-Reference Model (OSI-RM)
2.5 Definition of Open System
2.6 Seven-layered OSI-RM
2.7 Shortcomings of the OSI-RM Reference Model
2.8 Example: TCP/IP Protocol Suite
2.9 Conclusion
Review Questions
Further Reading
3. Transfer Modes
3.1 Introduction
3.2 Circuit Switching
3.3 Routing
3.4 Virtual Circuit Switching
3.5 Comparison of Transfer Modes
3.6 Example: Asynchronous Transfer Mode (ATM)
3.7 Conclusion
Review Questions
Further Reading
4. Network Topology and Extent
4.1 Introduction
4.2 Network Topology
4.3 Network Extent
4.4 Local Area Networks (LAN)
4.5 Wide Area Network (WAN)
4.6 Other Area Networks
4.7 Examples
4.8 Conclusion
Review Questions
Further Reading
Part 2 Core Concepts of Communication Networks
5. Transmission and Multiple Access
5.1 Introduction
5.2 Transmission Concepts
5.3 Multiple Access Concepts
5.4 Example: FDMA/TDMA in GSM Networks
5.5 Example: CDMA in UMTS Networks
5.6 Conclusion
Review Questions
Further Reading
6. Data Link Control
6.1 Introduction
6.2 Data Link Line Configurations
6.3 Data Link Layer Functions
6.4 Services Offered to Network Layer
6.5 DLC Protocol Layering
6.6 Logical Link Control (LLC)
6.7 Media Access Control (MAC)
6.8 Flow Control Protocols
6.9 Error Detection and Correction Mechanisms
6.10 Example: HDLC
6.11 Conclusion
Review Questions
Further Reading
7. Bridging
7.1 Introduction
7.2 Transparent Bridging
7.3 Source Route Bridging
7.4 Example: Bridging in Ethernet LANs
7.5 Conclusion
Review Questions
Further Reading
8. Switching
8.1 Introduction
8.2 Components of a Typical Switch
8.3 Performance Measures in Switch Design
8.4 Switching Issues
8.5 Switching Architectures
8.6 Shared-memory Architecture
8.7 Shared-medium Architecture
8.8 Space-division Architecture
8.9 Example: Switching in ATM
8.10 Example of ATM Switch Architecture: Knockout Switch
8.11 Conclusion
Review Questions
Further Reading
9. Addressing
9.1 Introduction
9.2 Classification of Addressing Techniques
9.3 Example: Addressing Structure in Internet
9.4 Example: Addressing Structure in Telecom Networks
9.5 Conclusion
Review Questions
Further Reading
10. Signalling
10.1 Introduction
10.2 Signalling Complexity in Different Networks
10.3 Classification of Signalling Techniques
10.4 Signalling Issues
10.5 Signalling Models
10.6 Point-to-multi-point Signalling
10.7 Example: ISDN Signalling
10.8 Conclusion
Review Questions
Further Reading
11. Routing
11.1 Introduction
11.2 Design Requirements for a Routing Protocol
11.3 Classification of Routing Protocols/Techniques
11.4 Core Routing Concepts
11.5 Example: Routing Protocols in Internet
11.6 Conclusion
Review Questions
Further Reading
Part 3 Advanced Concepts of Communication Networks
12. Traffic Management
12.1 Introduction
12.2 Concept of Traffic
12.3 Concept of Service
12.4 Network Capabilities
12.5 Types of Traffic
12.6 Traffic Management
12.7 Traffic Contract Management
12.8 Traffic Shaping
12.9 Traffic Policing
12.10 Priority Control
12.11 Flow Control
12.12 Congestion
12.13 Congestion Control
12.14 Flow Control versus Congestion Control
12.15 Example: Traffic Management in ATM
12.16 Conclusion
Review Questions
Further Reading
13. Network Management
13.1 Introduction
13.2 Goals of Network Management
13.3 Functional Areas of Network Management
13.4 Example: Simple Network Management Protocol (SNMP)
13.5 Example: Telecommunications Management Network (TMN)
13.6 Conclusion
Review Questions
Further Reading
14. Security Management
14.1 Introduction
14.2 What is Security Management?
14.3 Symmetric (Secret Key) Encryption Techniques
14.4 Asymmetric (Public Key) Encryption Techniques
14.5 Key Management
14.6 Hash Functions
14.7 Digital Signatures and Certificates
14.8 Firewalls
14.9 Example: Security Management in Third Generation UMTS Network
14.10 Conclusion
Review Questions
Further Reading
References
Index