Praise for Communication Networks: A Concise Introduction |
|
ii | |
Preface |
|
xix | |
|
|
1 | (8) |
|
|
1 | (5) |
|
1.1.1 Hosts, Routers, Links |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.1.6 Retransmission of Erroneous Packets |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (20) |
|
|
9 | (1) |
|
|
10 | (8) |
|
|
10 | (1) |
|
2.2.2 Link Bandwidth and Capacity |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (3) |
|
2.3.1 Location-based Addressing |
|
|
18 | (1) |
|
|
19 | (1) |
|
2.3.3 Best Effort Service |
|
|
20 | (1) |
|
2.3.4 End-to-end Principle and Stateless Routers |
|
|
20 | (1) |
|
2.3.5 Hierarchical Naming |
|
|
20 | (1) |
|
2.4 Application and Technology Independence |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
2.5.4 Content Distribution |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (3) |
|
|
28 | (1) |
|
|
29 | (18) |
|
|
29 | (1) |
|
|
29 | (4) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
35 | (1) |
|
|
35 | (1) |
|
3.6.3 Spanning Tree Protocol |
|
|
36 | (1) |
|
|
37 | (1) |
|
3.7.1 Time-slotted Version |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
3.9.1 Maximum Collision Detection Time |
|
|
38 | (1) |
|
3.10 Appendix: Probability |
|
|
39 | (4) |
|
|
40 | (1) |
|
3.10.2 Additivity for Exclusive Events |
|
|
40 | (1) |
|
3.10.3 Independent Events |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
3.10.6 Waiting for Success |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (20) |
|
|
47 | (1) |
|
4.2 Medium Access Control (MAC) |
|
|
48 | (4) |
|
|
48 | (2) |
|
4.2.2 Enhancements for Medium Access |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
4.4 Efficiency Analysis of MAC Protocol |
|
|
53 | (4) |
|
|
53 | (1) |
|
|
53 | (4) |
|
|
57 | (3) |
|
4.5.1 IEEE802.11n--Introduction of MIMO in WiFi |
|
|
57 | (1) |
|
4.5.2 IEEE 802.11ad--WiFi in Millimeter Wave Spectrum |
|
|
58 | (1) |
|
4.5.3 IEEE802.11ac--Introduction of MU-MIMO in WiFi |
|
|
59 | (1) |
|
4.5.4 IEEE 802.11ah--WiFi for IoT and M2M |
|
|
59 | (1) |
|
|
60 | (1) |
|
4.6 Appendix: Markov Chains |
|
|
60 | (3) |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (2) |
|
|
67 | (20) |
|
5.1 Domains and Two-level Routing |
|
|
67 | (1) |
|
|
67 | (1) |
|
5.1.2 Transit and Peering |
|
|
68 | (1) |
|
|
68 | (4) |
|
5.2.1 Path Vector Algorithm |
|
|
69 | (1) |
|
5.2.2 Possible Oscillations |
|
|
70 | (1) |
|
5.2.3 Multi-exit Discriminators |
|
|
71 | (1) |
|
5.3 Intra-domain Shortest Path Routing |
|
|
72 | (3) |
|
5.3.1 Dijkstra's Algorithm and Link State |
|
|
72 | (1) |
|
5.3.2 Bellman-ford and Distance Vector |
|
|
73 | (2) |
|
|
75 | (5) |
|
|
75 | (1) |
|
|
76 | (1) |
|
5.4.3 Forward Error Correction |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
5.5.5 Backpressure Routing |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
85 | (2) |
|
|
87 | (10) |
|
|
87 | (1) |
|
6.2 Basic Components: Subnet, Gateway, ARP |
|
|
88 | (2) |
|
6.2.1 Addresses and Subnets |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (2) |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.3.3 Finding IP Addresses |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (18) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (3) |
|
|
100 | (1) |
|
|
100 | (1) |
|
7.4.3 Selective Acknowledgments |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (4) |
|
|
103 | (1) |
|
7.5.2 Refinements: Fast Retransmit and Fast Recovery |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
7.7 Alternative Congestion Control Schemes |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (5) |
|
|
114 | (1) |
|
|
115 | (26) |
|
|
115 | (3) |
|
|
115 | (1) |
|
8.1.2 Coloring and MAC Protocols |
|
|
116 | (2) |
|
|
118 | (4) |
|
|
119 | (1) |
|
|
120 | (1) |
|
8.2.3 Queuing vs. Communication Networks |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (6) |
|
8.4.1 Fairness vs. Throughput |
|
|
123 | (3) |
|
8.4.2 Distributed Congestion Control |
|
|
126 | (2) |
|
|
128 | (1) |
|
8.5 Dynamic Routing and Congestion Control |
|
|
129 | (3) |
|
|
132 | (3) |
|
8.7 Appendix: Justification for Primal-dual Theorem |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (3) |
|
|
140 | (1) |
|
|
141 | (16) |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (7) |
|
9.3.1 LTE System Architecture |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
|
9.4.1 Carrier Aggregation |
|
|
152 | (1) |
|
9.4.2 Enhanced MIMO Support |
|
|
152 | (1) |
|
|
152 | (1) |
|
9.4.4 Coordinated Multi Point Operation (CoMP) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (10) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (3) |
|
|
160 | (1) |
|
|
161 | (1) |
|
10.4 Regulated Flows and WFQ |
|
|
162 | (1) |
|
|
163 | (1) |
|
10.6 End-to-End Admission Control |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (12) |
|
11.1 How to Transport Bits? |
|
|
167 | (1) |
|
11.2 Link Characteristics |
|
|
168 | (1) |
|
11.3 Wired and Wireless Links |
|
|
168 | (4) |
|
11.3.1 Modulation Schemes: BPSK, QPSK, QAM |
|
|
169 | (2) |
|
11.3.2 Inter-cell Interference and OFDM |
|
|
171 | (1) |
|
|
172 | (4) |
|
11.4.1 Operation of Fiber |
|
|
173 | (1) |
|
|
173 | (1) |
|
11.4.3 Wavelength Division Multiplexing |
|
|
174 | (1) |
|
|
175 | (1) |
|
11.4.5 Passive Optical Network |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (28) |
|
|
179 | (4) |
|
|
179 | (3) |
|
12.1.2 Switched Crossbars |
|
|
182 | (1) |
|
|
183 | (2) |
|
12.2.1 Applications: CDN and P2P |
|
|
184 | (1) |
|
12.2.2 Routing in Overlay Networks |
|
|
185 | (1) |
|
12.3 How Popular P2P Protocols Work |
|
|
185 | (2) |
|
12.3.1 1st Generation: Server-client Based |
|
|
186 | (1) |
|
12.3.2 2nd Generation: Centralized Directory Based |
|
|
186 | (1) |
|
12.3.3 3rd Generation: Purely Distributed |
|
|
186 | (1) |
|
12.3.4 Advent of Hierarchical Overlay--Super Nodes |
|
|
187 | (1) |
|
12.3.5 Advanced Distributed File Sharing: BitTorrent |
|
|
187 | (1) |
|
|
187 | (3) |
|
|
188 | (2) |
|
12.5 Distributed Applications |
|
|
190 | (2) |
|
12.5.1 Bellman-Ford Routing Algorithm |
|
|
190 | (1) |
|
|
190 | (2) |
|
|
192 | (3) |
|
12.6.1 Agreeing over an Unreliable Channel |
|
|
193 | (1) |
|
12.6.2 Consensus in the Presence of Adversaries |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
195 | (7) |
|
|
196 | (1) |
|
12.8.2 New Services Enabled by SDN |
|
|
197 | (2) |
|
12.8.3 Knowledge-defined Networking |
|
|
199 | (1) |
|
12.8.4 Management Framework for NFV |
|
|
200 | (2) |
|
12.9 Internet of Things (IoT) |
|
|
202 | (1) |
|
12.9.1 Remote Computing and Storage Paradigms |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (2) |
Bibliography |
|
207 | (8) |
Authors' Biographies |
|
215 | (2) |
Index |
|
217 | |