Preface |
|
xxix | |
Trade Mark |
|
xxxviii | |
|
|
1 | (50) |
|
|
3 | (28) |
|
|
4 | (3) |
|
|
4 | (1) |
|
1.1.2 Data Representation |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (6) |
|
|
7 | (1) |
|
1.2.2 Physical Structures |
|
|
8 | (5) |
|
|
13 | (6) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
1.3.5 Accessing the Internet |
|
|
18 | (1) |
|
|
19 | (3) |
|
|
19 | (1) |
|
1.4.2 Birth of the Internet |
|
|
20 | (2) |
|
|
22 | (1) |
|
1.5 Standards and Administration |
|
|
22 | (3) |
|
|
22 | (2) |
|
1.5.2 Internet Administration |
|
|
24 | (1) |
|
1.6 End-Chapter Materials |
|
|
25 | (2) |
|
1.6.1 Recommended Reading |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
1.8 Simulation Experiments |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
28 | (3) |
|
|
31 | (20) |
|
|
32 | (3) |
|
|
32 | (2) |
|
2.1.2 Principles of Protocol Layering |
|
|
34 | (1) |
|
2.1.3 Logical Connections |
|
|
35 | (1) |
|
2.2 TCP/IP Protocol Suite |
|
|
35 | (9) |
|
2.2.1 Layered Architecture |
|
|
35 | (2) |
|
2.2.2 Layers in the TCP/IP Protocol Suite |
|
|
37 | (1) |
|
2.2.3 Description of Each Layer |
|
|
38 | (3) |
|
2.2.4 Encapsulation and Decapsulation |
|
|
41 | (1) |
|
|
42 | (1) |
|
2.2.6 Multiplexing and Demultiplexing |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
45 | (1) |
|
2.3.2 Lack of OSI Model's Success |
|
|
45 | (1) |
|
2.4 End-Chapter Materials |
|
|
46 | (1) |
|
2.4.1 Recommended Reading |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (4) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (3) |
|
|
51 | (184) |
|
Chapter 3 Introduction to Physical Layer |
|
|
53 | (42) |
|
|
54 | (2) |
|
3.1.1 Analog and Digital Data |
|
|
55 | (1) |
|
3.1.2 Analog and Digital Signals |
|
|
55 | (1) |
|
3.1.3 Periodic and Nonperiodic |
|
|
56 | (1) |
|
3.2 Periodic Analog Signals |
|
|
56 | (12) |
|
|
56 | (3) |
|
|
59 | (2) |
|
|
61 | (1) |
|
3.2.4 Time and Frequency Domains |
|
|
61 | (2) |
|
|
63 | (2) |
|
|
65 | (3) |
|
|
68 | (8) |
|
|
69 | (1) |
|
|
69 | (1) |
|
3.3.3 Digital Signal as a Composite Analog Signal |
|
|
70 | (1) |
|
3.3.4 Transmission of Digital Signals |
|
|
70 | (6) |
|
3.4 Transmission Impairment |
|
|
76 | (5) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
79 | (2) |
|
|
81 | (3) |
|
3.5.1 Noiseless Channel: Nyquist Bit Rate |
|
|
81 | (1) |
|
3.5.2 Noisy Channel: Shannon Capacity |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (5) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
3.6.4 Bandwidth-Delay Product |
|
|
87 | (1) |
|
|
88 | (1) |
|
3.7 End-Chapter Materials |
|
|
89 | (1) |
|
3.7.1 Recommended Reading |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (4) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (3) |
|
3.9 Simulation Experiments |
|
|
94 | (1) |
|
|
94 | (1) |
|
Chapter 4 Digital Transmission |
|
|
95 | (40) |
|
4.1 Digital-to-Digital Conversion |
|
|
96 | (19) |
|
|
96 | (4) |
|
4.1.2 Line Coding Schemes |
|
|
100 | (9) |
|
|
109 | (4) |
|
|
113 | (2) |
|
4.2 Analog-to-Digital Conversion |
|
|
115 | (10) |
|
4.2.1 Pulse Code Modulation (PCM) |
|
|
115 | (8) |
|
4.2.2 Delta Modulation (DM) |
|
|
123 | (2) |
|
|
125 | (4) |
|
4.3.1 Parallel Transmission |
|
|
125 | (1) |
|
4.3.2 Serial Transmission |
|
|
126 | (3) |
|
4.4 End-Chapter Materials |
|
|
129 | (2) |
|
4.4.1 Recommended Reading |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (3) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (3) |
|
4.6 Simulation Experiments |
|
|
134 | (1) |
|
|
134 | (1) |
|
Chapter 5 Analog Transmission |
|
|
135 | (20) |
|
5.1 Digital-to-Analog Conversion |
|
|
136 | (11) |
|
5.1.1 Aspects of Digital-to-Analog Conversion |
|
|
137 | (1) |
|
5.1.2 Amplitude Shift Keying |
|
|
138 | (2) |
|
5.1.3 Frequency Shift Keying |
|
|
140 | (2) |
|
|
142 | (4) |
|
5.1.5 Quadrature Amplitude Modulation |
|
|
146 | (1) |
|
5.2 Analog-to-Analog Conversion |
|
|
147 | (4) |
|
5.2.1 Amplitude Modulation (AM) |
|
|
147 | (1) |
|
5.2.2 Frequency Modulation (FM) |
|
|
148 | (1) |
|
5.2.3 Phase Modulation (PM) |
|
|
149 | (2) |
|
5.3 End-Chapter Materials |
|
|
151 | (1) |
|
5.3.1 Recommended Reading |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
5.5 Simulation Experiments |
|
|
154 | (1) |
|
|
154 | (1) |
|
Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum Spreading |
|
|
155 | (30) |
|
|
156 | (19) |
|
6.1.1 Frequency-Division Multiplexing |
|
|
157 | (5) |
|
6.1.2 Wavelength-Division Multiplexing |
|
|
162 | (1) |
|
6.1.3 Time-Division Multiplexing |
|
|
163 | (12) |
|
|
175 | (5) |
|
6.2.1 Frequency Hopping Spread Spectrum |
|
|
176 | (2) |
|
6.2.2 Direct Sequence Spread Spectrum |
|
|
178 | (2) |
|
6.3 End-Chapter Materials |
|
|
180 | (1) |
|
6.3.1 Recommended Reading |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (3) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (2) |
|
6.5 Simulation Experiments |
|
|
184 | (1) |
|
|
184 | (1) |
|
Chapter 7 Transmission Media |
|
|
185 | (22) |
|
|
186 | (1) |
|
|
187 | (10) |
|
|
187 | (3) |
|
|
190 | (2) |
|
|
192 | (5) |
|
7.3 Unguided Media: Wireless |
|
|
197 | (5) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
7.4 End-Chapter Materials |
|
|
202 | (1) |
|
7.4.1 Recommended Reading |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (4) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (3) |
|
|
207 | (28) |
|
|
208 | (1) |
|
8.1.1 Three Methods of Switching |
|
|
208 | (1) |
|
8.1.2 Switching and TCP/IP Layers |
|
|
209 | (1) |
|
8.2 Circuit-Switched Networks |
|
|
209 | (4) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (9) |
|
|
214 | (2) |
|
8.3.2 Virtual-Circuit Networks |
|
|
216 | (6) |
|
8.4 Structure of a Switch |
|
|
222 | (8) |
|
8.4.1 Structure of Circuit Switches |
|
|
222 | (4) |
|
8.4.2 Structure of Packet Switches |
|
|
226 | (4) |
|
8.5 End-Chapter Materials |
|
|
230 | (1) |
|
8.5.1 Recommended Reading |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (3) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
231 | (3) |
|
8.7 Simulation Experiments |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (274) |
|
Chapter 9 Introduction to Data-Link Layer |
|
|
237 | (20) |
|
|
238 | (4) |
|
|
239 | (1) |
|
|
239 | (2) |
|
9.1.3 Two Categories of Links |
|
|
241 | (1) |
|
|
242 | (1) |
|
9.2 Link-Layer Addressing |
|
|
242 | (10) |
|
9.2.1 Three Types of addresses |
|
|
244 | (1) |
|
9.2.2 Address Resolution Protocol (ARP) |
|
|
245 | (3) |
|
9.2.3 An Example of Communication |
|
|
248 | (4) |
|
9.3 End-Chapter Materials |
|
|
252 | (1) |
|
9.3.1 Recommended Reading |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (4) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (3) |
|
Chapter 10 Error Detection and Correction |
|
|
257 | (36) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
10.1.3 Detection versus Correction |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (5) |
|
|
259 | (5) |
|
|
264 | (13) |
|
10.3.1 Cyclic Redundancy Check |
|
|
264 | (3) |
|
|
267 | (2) |
|
10.3.3 Cyclic Code Encoder Using Polynomials |
|
|
269 | (1) |
|
10.3.4 Cyclic Code Analysis |
|
|
270 | (4) |
|
10.3.5 Advantages of Cyclic Codes |
|
|
274 | (1) |
|
10.3.6 Other Cyclic Codes |
|
|
274 | (1) |
|
10.3.7 Hardware Implementation |
|
|
274 | (3) |
|
|
277 | (5) |
|
|
278 | (3) |
|
10.4.2 Other Approaches to the Checksum |
|
|
281 | (1) |
|
10.5 Forward Error Correction |
|
|
282 | (3) |
|
10.5.1 Using Hamming Distance |
|
|
283 | (1) |
|
|
283 | (1) |
|
10.5.3 Chunk Interleaving |
|
|
283 | (1) |
|
10.5.4 Combining Hamming Distance and Interleaving |
|
|
284 | (1) |
|
10.5.5 Compounding High-and Low-Resolution Packets |
|
|
284 | (1) |
|
10.6 End-Chapter Materials |
|
|
285 | (2) |
|
10.6.1 Recommended Reading |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (5) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (4) |
|
10.8 Simulation Experiments |
|
|
292 | (1) |
|
|
292 | (1) |
|
10.9 Programming Assignments |
|
|
292 | (1) |
|
Chapter 11 Data Link Control (DLC) |
|
|
293 | (32) |
|
|
294 | (5) |
|
|
294 | (3) |
|
11.1.2 Flow and Error Control |
|
|
297 | (1) |
|
11.1.3 Connectionless and Connection-Oriented |
|
|
298 | (1) |
|
11.2 Data-Link Layer Protocols |
|
|
299 | (5) |
|
|
300 | (1) |
|
11.2.2 Stop-and-Wait Protocol |
|
|
301 | (3) |
|
|
304 | (1) |
|
|
304 | (5) |
|
11.3.1 Configurations and Transfer Modes |
|
|
305 | (1) |
|
|
305 | (4) |
|
11.4 Point-to-Point Protocol (PPP) |
|
|
309 | (10) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (7) |
|
11.5 End-Chapter Materials |
|
|
319 | (4) |
|
11.5.1 Recommended Reading |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (2) |
|
11.7 Simulation Experiments |
|
|
323 | (1) |
|
|
323 | (1) |
|
11.8 Programming Assignments |
|
|
323 | (2) |
|
Chapter 12 Media Access Control (MAC) |
|
|
325 | (36) |
|
|
326 | (15) |
|
|
326 | (5) |
|
|
331 | (3) |
|
|
334 | (4) |
|
|
338 | (3) |
|
|
341 | (3) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (8) |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
347 | (5) |
|
12.4 End-Chapter Materials |
|
|
352 | (2) |
|
12.4.1 Recommended Reading |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (6) |
|
|
354 | (1) |
|
|
354 | (2) |
|
|
356 | (4) |
|
12.6 Simulation Experiments |
|
|
360 | (1) |
|
|
360 | (1) |
|
12.7 Programming Assignments |
|
|
360 | (1) |
|
Chapter 13 Wired LANs: Ethernet |
|
|
361 | (26) |
|
|
362 | (2) |
|
|
362 | (1) |
|
13.1.2 Ethernet Evolution |
|
|
363 | (1) |
|
|
364 | (12) |
|
|
364 | (2) |
|
|
366 | (2) |
|
|
368 | (2) |
|
13.2.4 Efficiency of Standard Ethernet |
|
|
370 | (1) |
|
|
370 | (3) |
|
13.2.6 Changes in the Standard |
|
|
373 | (3) |
|
13.3 Fast Ethernet (100 MBPS) |
|
|
376 | (3) |
|
|
377 | (1) |
|
|
377 | (2) |
|
|
379 | (3) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
13.6 End-Chapter Materials |
|
|
383 | (1) |
|
13.6.1 Recommended Reading |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
13.8 Simulation Experiments |
|
|
385 | (2) |
|
|
385 | (1) |
|
|
386 | (1) |
|
Chapter 14 Other Wired Networks |
|
|
387 | (48) |
|
|
388 | (9) |
|
|
388 | (1) |
|
|
388 | (2) |
|
|
390 | (3) |
|
14.1.4 Services Provided by Telephone Networks |
|
|
393 | (1) |
|
|
394 | (2) |
|
14.1.6 Digital Subscriber Line (DSL) |
|
|
396 | (1) |
|
|
397 | (3) |
|
14.2.1 Traditional Cable Networks |
|
|
397 | (1) |
|
14.2.2 Hybrid Fiber-Coaxial (HFC) Network |
|
|
398 | (1) |
|
14.2.3 Cable TV for Data Transfer |
|
|
399 | (1) |
|
|
400 | (21) |
|
|
401 | (2) |
|
|
403 | (1) |
|
|
404 | (8) |
|
|
412 | (3) |
|
|
415 | (5) |
|
14.3.6 Virtual Tributaries |
|
|
420 | (1) |
|
|
421 | (8) |
|
|
422 | (1) |
|
|
422 | (3) |
|
|
425 | (4) |
|
14.5 End-Chapter Materials |
|
|
429 | (3) |
|
14.5.1 Recommended Reading |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
432 | (3) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (2) |
|
|
435 | (30) |
|
|
436 | (3) |
|
15.1.1 Architectural Comparison |
|
|
436 | (2) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (12) |
|
|
440 | (1) |
|
|
441 | (5) |
|
15.2.3 Addressing Mechanism |
|
|
446 | (2) |
|
|
448 | (3) |
|
|
451 | (7) |
|
|
451 | (1) |
|
|
452 | (6) |
|
15.4 End-Chapter Materials |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (4) |
|
|
459 | (1) |
|
|
459 | (1) |
|
|
460 | (3) |
|
15.6 Simulation Experiments |
|
|
463 | (2) |
|
|
463 | (1) |
|
|
463 | (2) |
|
Chapter 16 Other Wireless Networks |
|
|
465 | (28) |
|
|
466 | (4) |
|
|
466 | (1) |
|
16.1.2 IEEE Project 802.16 |
|
|
467 | (1) |
|
16.1.3 Layers in Project 802.16 |
|
|
467 | (3) |
|
|
470 | (13) |
|
|
471 | (2) |
|
16.2.2 First Generation (1G) |
|
|
473 | (1) |
|
16.2.3 Second Generation (2G) |
|
|
474 | (6) |
|
16.2.4 Third Generation (3G) |
|
|
480 | (2) |
|
16.2.5 Fourth Generation (4G) |
|
|
482 | (1) |
|
|
483 | (6) |
|
|
483 | (2) |
|
|
485 | (1) |
|
|
485 | (3) |
|
|
488 | (1) |
|
16.4 End-Chapter Materials |
|
|
489 | (2) |
|
16.4.1 Recommended Reading |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (2) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (2) |
|
Chapter 17 Connecting Devices and Virtual LANs |
|
|
493 | (16) |
|
|
494 | (8) |
|
|
494 | (1) |
|
17.1.2 Link-Layer Switches |
|
|
495 | (6) |
|
|
501 | (1) |
|
|
502 | (4) |
|
|
504 | (1) |
|
|
504 | (1) |
|
17.2.3 Communication between Switches |
|
|
505 | (1) |
|
|
506 | (1) |
|
17.3 End-Chapter Materials |
|
|
506 | (1) |
|
17.3.1 Recommended Reading |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (2) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (2) |
|
|
509 | (180) |
|
Chapter 18 Introduction to Network Layer |
|
|
511 | (50) |
|
18.1 Network-Layer Services |
|
|
512 | (4) |
|
|
513 | (1) |
|
18.1.2 Routing and Forwarding |
|
|
513 | (1) |
|
|
514 | (2) |
|
|
516 | (6) |
|
18.2.1 Datagram Approach: Connectionless Service |
|
|
516 | (1) |
|
18.2.2 Virtual-Circuit Approach: Connection-Oriented Service |
|
|
517 | (5) |
|
18.3 Network-Layer Performance |
|
|
522 | (6) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
18.3.4 Congestion Control |
|
|
525 | (3) |
|
|
528 | (18) |
|
|
529 | (1) |
|
18.4.2 Classful Addressing |
|
|
530 | (2) |
|
18.4.3 Classless Addressing |
|
|
532 | (7) |
|
18.4.4 Dynamic Host Configuration Protocol (DHCP) |
|
|
539 | (4) |
|
18.4.5 Network Address Resolution (NAT) |
|
|
543 | (3) |
|
18.5 Forwarding of IP Packets |
|
|
546 | (10) |
|
18.5.1 Forwarding Based on Destination Address |
|
|
547 | (6) |
|
18.5.2 Forwarding Based on Label |
|
|
553 | (2) |
|
18.5.3 Routers as Packet Switches |
|
|
555 | (1) |
|
18.6 End-Chapter Materials |
|
|
556 | (1) |
|
18.6.1 Recommended Reading |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
557 | (3) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (2) |
|
18.8 Simulation Experiments |
|
|
560 | (1) |
|
|
560 | (1) |
|
18.9 Programming Assignment |
|
|
560 | (1) |
|
Chapter 19 Network-Layer Protocols |
|
|
561 | (34) |
|
19.1 Internet Protocol (IP) |
|
|
562 | (12) |
|
|
563 | (4) |
|
|
567 | (5) |
|
|
572 | (1) |
|
19.1.4 Security of IPv4 Datagrams |
|
|
573 | (1) |
|
|
574 | (7) |
|
|
575 | (3) |
|
|
578 | (2) |
|
|
580 | (1) |
|
|
581 | (10) |
|
|
581 | (2) |
|
|
583 | (1) |
|
|
584 | (5) |
|
19.3.4 Inefficiency in Mobile IP |
|
|
589 | (2) |
|
19.4 End-Chapter Materials |
|
|
591 | (1) |
|
19.4.1 Recommended Reading |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (2) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
593 | (1) |
|
19.6 Simulation Experiments |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
Chapter 20 Unicast Routing |
|
|
595 | (44) |
|
|
596 | (2) |
|
|
596 | (1) |
|
20.1.2 Least-Cost Routing |
|
|
596 | (2) |
|
|
598 | (13) |
|
20.2.1 Distance-Vector Routing |
|
|
598 | (6) |
|
20.2.2 Link-State Routing |
|
|
604 | (2) |
|
20.2.3 Path-Vector Routing |
|
|
606 | (5) |
|
20.3 Unicast Routing Protocols |
|
|
611 | (20) |
|
20.3.1 Internet Structure |
|
|
611 | (2) |
|
20.3.2 Routing Information Protocol (RIP) |
|
|
613 | (5) |
|
20.3.3 Open Shortest Path First (OSPF) |
|
|
618 | (5) |
|
20.3.4 Border Gateway Protocol Version 4 (BGP4) |
|
|
623 | (8) |
|
20.4 End-Chapter Materials |
|
|
631 | (1) |
|
20.4.1 Recommended Reading |
|
|
631 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
632 | (5) |
|
|
632 | (1) |
|
|
632 | (2) |
|
|
634 | (3) |
|
20.6 Simulation Experiments |
|
|
637 | (1) |
|
|
637 | (1) |
|
20.7 Programming Assignment |
|
|
637 | (2) |
|
Chapter 21 Multicast Routing |
|
|
639 | (26) |
|
|
640 | (3) |
|
|
640 | (1) |
|
|
640 | (3) |
|
|
643 | (1) |
|
|
643 | (7) |
|
21.2.1 Multicast Addresses |
|
|
643 | (2) |
|
21.2.2 Delivery at Data-Link Layer |
|
|
645 | (2) |
|
21.2.3 Collecting Information about Groups |
|
|
647 | (1) |
|
21.2.4 Multicast Forwarding |
|
|
648 | (1) |
|
21.2.5 Two Approaches to Multicasting |
|
|
649 | (1) |
|
21.3 Intradomain Multicast Protocols |
|
|
650 | (7) |
|
21.3.1 Multicast Distance Vector (DVMRP) |
|
|
651 | (2) |
|
21.3.2 Multicast Link State (MOSPF) |
|
|
653 | (1) |
|
21.3.3 Protocol Independent Multicast (PIM) |
|
|
654 | (3) |
|
21.4 Interdomain Multicast Protocols |
|
|
657 | (1) |
|
|
658 | (2) |
|
|
658 | (1) |
|
21.5.2 Propagation of Membership Information |
|
|
659 | (1) |
|
|
660 | (1) |
|
21.6 End-Chapter Materials |
|
|
660 | (1) |
|
21.6.1 Recommended Reading |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
661 | (2) |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
662 | (1) |
|
21.8 Simulation Experiments |
|
|
663 | (2) |
|
|
663 | (2) |
|
Chapter 22 Next Generation IP |
|
|
665 | (24) |
|
|
666 | (8) |
|
|
666 | (1) |
|
|
667 | (1) |
|
22.1.3 Address Space Allocation |
|
|
668 | (4) |
|
|
672 | (1) |
|
|
673 | (1) |
|
|
674 | (5) |
|
|
674 | (3) |
|
|
677 | (2) |
|
|
679 | (3) |
|
22.3.1 Error-Reporting Messages |
|
|
679 | (1) |
|
22.3.2 Informational Messages |
|
|
680 | (1) |
|
22.3.3 Neighbor-Discovery Messages |
|
|
681 | (1) |
|
22.3.4 Group Membership Messages |
|
|
682 | (1) |
|
22.4 Transition from IPv4 to IPv6 |
|
|
682 | (2) |
|
|
683 | (1) |
|
22.4.2 Use of IP Addresses |
|
|
684 | (1) |
|
22.5 End-Chapter Materials |
|
|
684 | (1) |
|
22.5.1 Recommended Reading |
|
|
684 | (1) |
|
|
685 | (1) |
|
|
685 | (1) |
|
|
685 | (3) |
|
|
685 | (1) |
|
|
685 | (1) |
|
|
686 | (2) |
|
22.7 Simulation Experiments |
|
|
688 | (1) |
|
|
688 | (1) |
|
|
689 | (126) |
|
Chapter 23 Introduction to Transport Layer |
|
|
691 | (44) |
|
|
692 | (15) |
|
23.1.1 Transport-Layer Services |
|
|
693 | (10) |
|
23.1.2 Connectionless and Connection-Oriented Protocols |
|
|
703 | (4) |
|
23.2 Transport-Layer Protocols |
|
|
707 | (20) |
|
|
707 | (1) |
|
23.2.2 Stop-and-Wait Protocol |
|
|
708 | (5) |
|
23.2.3 Go-Back-N Protocol (GBN) |
|
|
713 | (7) |
|
23.2.4 Selective-Repeat Protocol |
|
|
720 | (6) |
|
23.2.5 Bidirectional Protocols: Piggybacking |
|
|
726 | (1) |
|
23.3 End-Chapter Materials |
|
|
727 | (1) |
|
23.3.1 Recommended Reading |
|
|
727 | (1) |
|
|
727 | (1) |
|
|
728 | (1) |
|
|
728 | (5) |
|
|
728 | (1) |
|
|
728 | (1) |
|
|
729 | (4) |
|
23.5 Simulation Experiments |
|
|
733 | (1) |
|
|
733 | (1) |
|
23.6 Programming Assignment |
|
|
733 | (2) |
|
Chapter 24 Transport-Layer Protocols |
|
|
735 | (80) |
|
|
736 | (1) |
|
|
736 | (1) |
|
|
736 | (1) |
|
24.2 User Datagram Protocol |
|
|
737 | (6) |
|
|
737 | (1) |
|
|
738 | (3) |
|
|
741 | (2) |
|
24.3 Transmission Control Protocol |
|
|
743 | (48) |
|
|
743 | (3) |
|
|
746 | (2) |
|
|
748 | (2) |
|
|
750 | (6) |
|
24.3.5 State Transition Diagram |
|
|
756 | (4) |
|
|
760 | (2) |
|
|
762 | (6) |
|
|
768 | (9) |
|
24.3.9 TCP Congestion Control |
|
|
777 | (9) |
|
|
786 | (4) |
|
|
790 | (1) |
|
|
791 | (14) |
|
|
791 | (1) |
|
|
792 | (2) |
|
|
794 | (2) |
|
24.4.4 An SCTP Association |
|
|
796 | (3) |
|
|
799 | (2) |
|
|
801 | (4) |
|
24.5 End-Chapter Materials |
|
|
805 | (1) |
|
24.5.1 Recommended Reading |
|
|
805 | (1) |
|
|
805 | (1) |
|
|
805 | (1) |
|
|
806 | (9) |
|
|
806 | (1) |
|
|
806 | (3) |
|
|
809 | (6) |
|
PART VI Application Layer |
|
|
815 | (236) |
|
Chapter 25 Introduction to Application Layer |
|
|
817 | (54) |
|
|
818 | (5) |
|
25.1.1 Providing Services |
|
|
819 | (1) |
|
25.1.2 Application-Layer Paradigms |
|
|
820 | (3) |
|
25.2 Client-Server Programming |
|
|
823 | (10) |
|
25.2.1 Application Programming Interface |
|
|
823 | (4) |
|
25.2.2 Using Services of the Transport Layer |
|
|
827 | (1) |
|
25.2.3 Iterative Communication Using UDP |
|
|
828 | (2) |
|
25.2.4 Iterative Communication Using TCP |
|
|
830 | (2) |
|
25.2.5 Concurrent Communication |
|
|
832 | (1) |
|
25.3 Iterative Programming in C |
|
|
833 | (9) |
|
|
833 | (1) |
|
25.3.2 Iterative Programming Using UDP |
|
|
834 | (3) |
|
25.3.3 Iterative Programming Using TCP |
|
|
837 | (5) |
|
25.4 Iterative Programming in Java |
|
|
842 | (23) |
|
25.4.1 Addresses and Ports |
|
|
843 | (3) |
|
25.4.2 Iterative Programming Using UDP |
|
|
846 | (11) |
|
25.4.3 Iterative Programming Using TCP |
|
|
857 | (8) |
|
25.5 End-Chapter Materials |
|
|
865 | (1) |
|
25.5.1 Recommended Reading |
|
|
865 | (1) |
|
|
866 | (1) |
|
|
866 | (1) |
|
|
866 | (3) |
|
|
866 | (1) |
|
|
866 | (3) |
|
|
869 | (1) |
|
25.7 Simulation Experiments |
|
|
869 | (1) |
|
|
869 | (1) |
|
25.8 Programming Assignment |
|
|
870 | (1) |
|
Chapter 26 Standard Client-Server Protocols |
|
|
871 | (58) |
|
26.1 World Wide Web and HTTP |
|
|
872 | (15) |
|
|
872 | (4) |
|
26.1.2 HyperText Transfer Protocol (HTTP) |
|
|
876 | (11) |
|
|
887 | (4) |
|
|
888 | (1) |
|
26.2.2 Control Connection |
|
|
888 | (1) |
|
|
889 | (2) |
|
|
891 | (1) |
|
|
891 | (13) |
|
|
892 | (11) |
|
|
903 | (1) |
|
|
904 | (1) |
|
|
904 | (3) |
|
26.4.1 Local versus Remote Logging |
|
|
905 | (2) |
|
|
907 | (3) |
|
|
907 | (1) |
|
|
908 | (2) |
|
26.6 Domain Name System (DNS) |
|
|
910 | (11) |
|
|
911 | (4) |
|
26.6.2 DNS in the Internet |
|
|
915 | (1) |
|
|
916 | (2) |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
919 | (1) |
|
|
920 | (1) |
|
|
920 | (1) |
|
|
921 | (1) |
|
26.7 End-Chapter Materials |
|
|
921 | (2) |
|
26.7.1 Recommended Reading |
|
|
921 | (1) |
|
|
922 | (1) |
|
|
922 | (1) |
|
|
923 | (4) |
|
|
923 | (1) |
|
|
923 | (1) |
|
|
924 | (3) |
|
26.9 Simulation Experiments |
|
|
927 | (2) |
|
|
927 | (1) |
|
|
927 | (2) |
|
Chapter 27 Network Management |
|
|
929 | (32) |
|
|
930 | (4) |
|
27.1.1 Configuration Management |
|
|
930 | (2) |
|
|
932 | (1) |
|
27.1.3 Performance Management |
|
|
933 | (1) |
|
27.1.4 Security Management |
|
|
933 | (1) |
|
27.1.5 Accounting Management |
|
|
934 | (1) |
|
|
934 | (17) |
|
27.2.1 Managers and Agents |
|
|
935 | (1) |
|
27.2.2 Management Components |
|
|
935 | (2) |
|
|
937 | (1) |
|
|
938 | (4) |
|
|
942 | (2) |
|
|
944 | (7) |
|
|
951 | (4) |
|
|
951 | (1) |
|
|
952 | (3) |
|
|
955 | (1) |
|
27.4 End-Chapter Materials |
|
|
955 | (1) |
|
27.4.1 Recommended Reading |
|
|
955 | (1) |
|
|
956 | (1) |
|
|
956 | (1) |
|
|
956 | (5) |
|
|
956 | (1) |
|
|
956 | (2) |
|
|
958 | (3) |
|
|
961 | (62) |
|
|
962 | (16) |
|
28.1.1 Lossless Compression |
|
|
962 | (10) |
|
|
972 | (6) |
|
|
978 | (8) |
|
|
978 | (1) |
|
|
978 | (4) |
|
|
982 | (2) |
|
|
984 | (2) |
|
28.3 Multimedia in the Internet |
|
|
986 | (9) |
|
28.3.1 Streaming Stored Audio/Video |
|
|
986 | (3) |
|
28.3.2 Streaming Live Audio/Video |
|
|
989 | (1) |
|
28.3.3 Real-Time Interactive Audio/Video |
|
|
990 | (5) |
|
28.4 Real-Time Interactive Protocols |
|
|
995 | (19) |
|
28.4.1 Rationale for New Protocols |
|
|
996 | (3) |
|
|
999 | (2) |
|
|
1001 | (4) |
|
28.4.4 Session Initialization Protocol (SIP) |
|
|
1005 | (7) |
|
|
1012 | (2) |
|
28.5 End-Chapter Materials |
|
|
1014 | (2) |
|
28.5.1 Recommended Reading |
|
|
1014 | (1) |
|
|
1015 | (1) |
|
|
1015 | (1) |
|
|
1016 | (5) |
|
|
1016 | (1) |
|
|
1016 | (2) |
|
|
1018 | (3) |
|
28.7 Simulation Experiments |
|
|
1021 | (1) |
|
|
1021 | (1) |
|
|
1021 | (1) |
|
28.8 Programming Assignments |
|
|
1022 | (1) |
|
Chapter 29 Peer-to-Peer Paradigm |
|
|
1023 | (28) |
|
|
1024 | (5) |
|
|
1024 | (2) |
|
29.1.2 Distributed Hash Table (DHT) |
|
|
1026 | (3) |
|
|
1029 | (7) |
|
|
1029 | (1) |
|
|
1029 | (1) |
|
|
1030 | (6) |
|
|
1036 | (1) |
|
|
1036 | (5) |
|
|
1036 | (1) |
|
|
1037 | (4) |
|
|
1041 | (1) |
|
|
1041 | (4) |
|
|
1041 | (1) |
|
|
1041 | (3) |
|
|
1044 | (1) |
|
|
1045 | (2) |
|
29.5.1 BitTorrent with a Tracker |
|
|
1045 | (1) |
|
29.5.2 Trackerless BitTorrent |
|
|
1046 | (1) |
|
29.6 End-Chapter Materials |
|
|
1047 | (1) |
|
29.6.1 Recommended Reading |
|
|
1047 | (1) |
|
|
1047 | (1) |
|
|
1047 | (1) |
|
|
1048 | (3) |
|
|
1048 | (1) |
|
|
1048 | (1) |
|
|
1048 | (3) |
|
PART VII Topics Related to All Layers |
|
|
1051 | (106) |
|
Chapter 30 Quality of Service |
|
|
1053 | (24) |
|
30.1 Data-Flow Characteristics |
|
|
1054 | (1) |
|
|
1054 | (1) |
|
30.1.2 Sensitivity of Applications |
|
|
1054 | (1) |
|
|
1055 | (1) |
|
30.2 Flow Control to Improve QOS |
|
|
1055 | (7) |
|
|
1056 | (2) |
|
30.2.2 Traffic Shaping or Policing |
|
|
1058 | (3) |
|
30.2.3 Resource Reservation |
|
|
1061 | (1) |
|
|
1062 | (1) |
|
30.3 Integrated Services (INTSERV) |
|
|
1062 | (4) |
|
30.3.1 Flow Specification |
|
|
1062 | (1) |
|
|
1063 | (1) |
|
|
1063 | (1) |
|
30.3.4 Resource Reservation Protocol (RSVP) |
|
|
1063 | (2) |
|
30.3.5 Problems with Integrated Services |
|
|
1065 | (1) |
|
30.4 Differentiated Services (DFFSERV) |
|
|
1066 | (2) |
|
|
1066 | (1) |
|
|
1067 | (1) |
|
30.4.3 Traffic Conditioners |
|
|
1067 | (1) |
|
30.5 End-Chapter Materials |
|
|
1068 | (1) |
|
30.5.1 Recommended Reading |
|
|
1068 | (1) |
|
|
1068 | (1) |
|
|
1068 | (1) |
|
|
1069 | (6) |
|
|
1069 | (1) |
|
|
1069 | (1) |
|
|
1070 | (5) |
|
30.7 Simulation Experiments |
|
|
1075 | (1) |
|
|
1075 | (1) |
|
30.8 Programming Assignments |
|
|
1075 | (2) |
|
Chapter 31 Cryptography and Network Security |
|
|
1077 | (46) |
|
|
1078 | (3) |
|
|
1078 | (1) |
|
|
1079 | (2) |
|
31.1.3 Services and Techniques |
|
|
1081 | (1) |
|
|
1081 | (16) |
|
31.2.1 Symmetric-Key Ciphers |
|
|
1081 | (11) |
|
31.2.2 Asymmetric-Key Ciphers |
|
|
1092 | (5) |
|
31.3 Other Aspects of Security |
|
|
1097 | (17) |
|
|
1097 | (2) |
|
31.3.2 Message Authentication |
|
|
1099 | (1) |
|
|
1100 | (5) |
|
31.3.4 Entity Authentication |
|
|
1105 | (3) |
|
|
1108 | (6) |
|
31.4 End-Chapter Materials |
|
|
1114 | (1) |
|
31.4.1 Recommended Reading |
|
|
1114 | (1) |
|
|
1114 | (1) |
|
|
1114 | (1) |
|
|
1115 | (6) |
|
|
1115 | (1) |
|
|
1115 | (2) |
|
|
1117 | (4) |
|
31.6 Simulation Experiments |
|
|
1121 | (1) |
|
|
1121 | (1) |
|
31.7 Programming Assignments |
|
|
1122 | (1) |
|
Chapter 32 Internet Security |
|
|
1123 | (34) |
|
32.1 Network-Layer Security |
|
|
1124 | (10) |
|
|
1124 | (2) |
|
32.1.2 Two Security Protocols |
|
|
1126 | (3) |
|
32.1.3 Services Provided by IPSec |
|
|
1129 | (1) |
|
32.1.4 Security Association |
|
|
1130 | (2) |
|
32.1.5 Internet Key Exchange (IKE) |
|
|
1132 | (1) |
|
32.1.6 Virtual Private Network (VPN) |
|
|
1133 | (1) |
|
32.2 Transport-Layer Security |
|
|
1134 | (6) |
|
|
1135 | (3) |
|
|
1138 | (2) |
|
32.3 Application-Layer Security |
|
|
1140 | (11) |
|
|
1141 | (1) |
|
32.3.2 Pretty Good Privacy (PGP) |
|
|
1142 | (5) |
|
|
1147 | (4) |
|
|
1151 | (2) |
|
32.4.1 Packet-Filter Firewall |
|
|
1152 | (1) |
|
|
1152 | (1) |
|
32.5 End-Chapter Materials |
|
|
1153 | (1) |
|
32.5.1 Recommended Reading |
|
|
1153 | (1) |
|
|
1154 | (1) |
|
|
1154 | (1) |
|
|
1154 | (2) |
|
|
1154 | (1) |
|
|
1155 | (1) |
|
|
1155 | (1) |
|
32.7 Simulation Experiments |
|
|
1156 | (1) |
|
|
1156 | (1) |
|
|
1156 | (1) |
|
Appendices A-H available online at http://www.mhhe.com/forouzan |
|
|
|
|
|
|
|
Appendix B Positional Numbering System |
|
|
|
Appendix C HTML, CSS, XML, and XSL |
|
|
|
Appendix D A Touch of Probability |
|
|
|
Appendix E Mathematical Review |
|
|
|
|
|
Appendix G Miscellaneous Information |
|
|
|
Appendix H Telephone History |
|
|
Glossary |
|
1157 | (36) |
References |
|
1193 | (6) |
Index |
|
1199 | |