Muutke küpsiste eelistusi

Data Communications and Networking, Global Edition 5th edition [Pehme köide]

  • Formaat: Paperback / softback, 1264 pages, kõrgus x laius x paksus: 226x178x38 mm, kaal: 1533 g, Illustrations, charts
  • Ilmumisaeg: 16-May-2012
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0071315861
  • ISBN-13: 9780071315869
Teised raamatud teemal:
  • Pehme köide
  • Hind: 92,34 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1264 pages, kõrgus x laius x paksus: 226x178x38 mm, kaal: 1533 g, Illustrations, charts
  • Ilmumisaeg: 16-May-2012
  • Kirjastus: McGraw Hill Higher Education
  • ISBN-10: 0071315861
  • ISBN-13: 9780071315869
Teised raamatud teemal:
The fifth edition of Behrouz Forouzan's Data Communications and Networking presents a comprehensive and accessible approach to data communications and networking that has made this book a favorite with students and professionals alike. More than 830 figures and 150 tables accompany the text and provide a visual and intuitive opportunity for understanding the material. This unique approach minimizes the need for heavy math content, allowing normally complicated topics to unfold graphically and visually rather than through the presentation of complex formulas.The global edition has been developed specifically to meet the needs of international computer networks students. In addition to a chapter on the peer-to-peer paradigm, a full chapter on quality of service (QoS), generous coverage of forward error correction, coverage of WiMAX, and material on socket-interface programming in Java, we have added new international end-of-chapter questions and problems to make the content more relevant and improve learning outcomes for the international student.
Preface xxix
Trade Mark xxxviii
Part I: Overview 1(50)
Chapter 1 Introduction
3(28)
1.1 Data Communications
4(3)
1.1.1 Components
4(1)
1.1.2 Data Representation
5(1)
1.1.3 Data Flow
6(1)
1.2 Networks
7(6)
1.2.1 Network Criteria
7(1)
1.2.2 Physical Structures
8(5)
1.3 Network Types
13(6)
1.3.1 Local Area Network
13(1)
1.3.2 Wide Area Network
14(1)
1.3.3 Switching
15(2)
1.3.4 The Internet
17(1)
1.3.5 Accessing the Internet
18(1)
1.4 Internet History
19(3)
1.4.1 Early History
19(1)
1.4.2 Birth of the Internet
20(2)
1.4.3 Internet Today
22(1)
1.5 Standards And Administration
22(3)
1.5.1 Internet Standards
22(2)
1.5.2 Internet Administration
24(1)
1.6 End-Chapter Materials
25(2)
1.6.1 Recommended Reading
25(1)
1.6.2 Key Terms
25(1)
1.6.3 Summary
26(1)
1.7 Practice Set
27(1)
1.7.1 Quizzes
27(1)
1.7.2 Questions
27(1)
1.7.3 Problems
28(1)
1.8 Simulation Experiments
28(3)
1.8.1 Applets
28(1)
1.8.2 Lab Assignments
28(3)
Chapter 2 Network Models
31(20)
2.1 Protocol Layering
32(3)
2.1.1 Scenarios
32(2)
2.1.2 Principles of Protocol Layering
34(1)
2.1.3 Logical Connections
35(1)
2.2 TCP/IP Protocol Suite
35(9)
2.2.1 Layered Architecture
35(2)
2.2.2 Layers in the TCP/IP Protocol Suite
37(1)
2.2.3 Description of Each Layer
38(3)
2.2.4 Encapsulation and Decapsulation
41(1)
2.2.5 Addressing
42(1)
2.2.6 Multiplexing and Demultiplexing
43(1)
2.3 The OSI Model
44(2)
2.3.1 OSI versus TCP/IP
45(1)
2.3.2 Lack of OSI Model's Success
45(1)
2.4 End-Chapter Materials
46(1)
2.4.1 Recommended Reading
46(1)
2.4.2 Key Terms
46(1)
2.4.3 Summary
46(1)
2.5 Practice Set
47(6)
2.5.1 Quizzes
47(1)
2.5.2 Questions
47(1)
2.5.3 Problems
48(3)
Part II: Physical Layer 51(184)
Chapter 3 Introduction to Physical Layer
53(42)
3.1 Data And Signals
54(2)
3.1.1 Analog and Digital Data
55(1)
3.1.2 Analog and Digital Signals
55(1)
3.1.3 Periodic and Nonperiodic
56(1)
3.2 Periodic Analog Signals
56(12)
3.2.1 Sine Wave
56(3)
3.2.2 Phase
59(2)
3.2.3 Wavelength
61(1)
3.2.4 Time and Frequency Domains
61(2)
3.2.5 Composite Signals
63(2)
3.2.6 Bandwidth
65(3)
3.3 Digital Signals
68(8)
3.3.1 Bit Rate
69(1)
3.3.2 Bit Length
69(1)
3.3.3 Digital Signal as a Composite Analog Signal
70(1)
3.3.4 Transmission of Digital Signals
70(6)
3.4 Transmission Impairment
76(5)
3.4.1 Attenuation
77(2)
3.4.2 Distortion
79(1)
3.4.3 Noise
79(2)
3.5 Data Rate Limits
81(3)
3.5.1 Noiseless Channel: Nyquist Bit Rate
81(1)
3.5.2 Noisy Channel: Shannon Capacity
82(1)
3.5.3 Using Both Limits
83(1)
3.6 Performance
84(5)
3.6.1 Bandwidth
84(1)
3.6.2 Throughput
85(1)
3.6.3 Latency (Delay)
85(2)
3.6.4 Bandwidth-Delay Product
87(1)
3.6.5 Jitter
88(1)
3.7 End-Chapter Materials
89(1)
3.7.1 Recommended Reading
89(1)
3.7.2 Key Terms
89(1)
3.7.3 Summary
89(1)
3.8 Practice Set
90(4)
3.8.1 Quizzes
90(1)
3.8.2 Questions
90(1)
3.8.3 Problems
91(3)
3.9 Simulation Experiments
94(1)
3.9.1 Applets
94(1)
Chapter 4 Digital Transmission
95(40)
4.1 Digital-To-Digital Conversion
96(19)
4.1.1 Line Coding
96(4)
4.1.2 Line Coding Schemes
100(9)
4.1.3 Block Coding
109(4)
4.1.4 Scrambling
113(2)
4.2 Analog-To-Digital Conversion
115(10)
4.2.1 Pulse Code Modulation (PCM)
115(8)
4.2.2 Delta Modulation (DM)
123(2)
4.3 Transmission Modes
125(4)
4.3.1 Parallel Transmission
125(1)
4.3.2 Serial Transmission
126(3)
4.4 End-Chapter Materials
129(2)
4.4.1 Recommended Reading
129(1)
4.4.2 Key Terms
130(1)
4.4.3 Summary
130(1)
4.5 Practice Set
131(3)
4.5.1 Quizzes
131(1)
4.5.2 Questions
131(1)
4.5.3 Problems
131(3)
4.6 Simulation Experiments
134(1)
4.6.1 Applets
134(1)
Chapter 5 Analog Transmission
135(20)
5.1 Digital-To-Analog Conversion
136(11)
5.1.1 Aspects of Digital-to-Analog Conversion
137(1)
5.1.2 Amplitude Shift Keying
138(2)
5.1.3 Frequency Shift Keying
140(2)
5.1.4 Phase Shift Keying
142(4)
5.1.5 Quadrature Amplitude Modulation
146(1)
5.2 Analog-To-Analog Conversion
147(4)
5.2.1 Amplitude Modulation (AM)
147(1)
5.2.2 Frequency Modulation (FM)
148(1)
5.2.3 Phase Modulation (PM)
149(2)
5.3 End-Chapter Materials
151(1)
5.3.1 Recommended Reading
151(1)
5.3.2 Key Terms
151(1)
5.3.3 Summary
151(1)
5.4 Practice Set
152(2)
5.4.1 Quizzes
152(1)
5.4.2 Questions
152(1)
5.4.3 Problems
153(1)
5.5 Simulation Experiments
154(1)
5.5.1 Applets
154(1)
Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum Spreading
155(30)
6.1 Multiplexing
156(19)
6.1.1 Frequency-Division Multiplexing
157(5)
6.1.2 Wavelength-Division Multiplexing
162(1)
6.1.3 Tune-Division Multiplexing
163(12)
6.2 Spread Spectrum
175(5)
6.2.1 Frequency Hopping Spread Spectrum
176(2)
6.2.2 Direct Sequence Spread Spectrum
178(2)
6.3 End-Chapter Materials
180(1)
6.3.1 Recommended Reading
180(1)
6.3.2 Key Terms
180(1)
6.3.3 Summary
180(1)
6.4 Practice Set
181(3)
6.4.1 Quizzes
181(1)
6.4.2 Questions
181(1)
6.4.3 Problems
182(2)
6.5 Simulation Experiments
184(1)
6.5.1 Applets
184(1)
Chapter 7 Transmission Media
185(22)
7.1 Introduction
186(1)
7.2 Guided Media
187(10)
7.2.1 Twisted-Pair Cable
187(3)
7.2.2 Coaxial Cable
190(2)
7.2.3 Fiber-Optic Cable
192(5)
7.3 Unguided Media: Wireless
197(5)
7.3.1 Radio Waves
199(1)
7.3.2 Microwaves
200(1)
7.3.3 Infrared
201(1)
7.4 End-Chapter Materials
202(1)
7.4.1 Recommended Reading
202(1)
7:4.2 Key Terms
202(1)
7.4.3 Summary
203(1)
7.5 Practice Set
203(4)
7.5.1 Quizzes
203(1)
7.5.2 Questions
203(1)
7.5.3 Problems
204(3)
Chapter 8 Switching
207(28)
8.1 Introduction
208(1)
8.1.1 Three Methods of Switching
208(1)
8.1.2 Switching and TCP/IP Layers
209(1)
8.2 Circuit-Switched Networks
209(4)
8.2.1 Three Phases
211(1)
8.2.2 Efficiency
212(1)
8.2.3 Delay
213(1)
8.3 Packet Switching
213(9)
8.3.1 Datagram Networks
214(2)
8.3.2 Virtual-Circuit Networks
216(6)
8.4 Structure Of A Switch
222(8)
8.4.1 Structure of Circuit Switches
222(4)
8.4.2 Structure of Packet Switches
226(4)
8.5 End-Chapter Materials
230(1)
8.5.1 Recommended Reading
230(1)
8.5.2 Key terms
230(1)
8.5.3 Summary
230(1)
8.6 Practice Set
231(3)
8.6.1 Quizzes
231(1)
8.6.2 Questions
231(1)
8.6.3 Problems
231(3)
8.7 Simulation Experiments
234(3)
8.7.1 Applets
234(1)
Part III: Data-Link Layer 235(274)
Chapter 9 Introduction to Data-Link Layer
237(20)
9.1 Introduction
238(4)
9.1.1 Nodes and Links
239(1)
9.1.2 Services
239(2)
9.1.3 Two Categories of Links
241(1)
9.1.4 Two Sublayers
242(1)
9.2 Link-Layer Addressing
242(10)
9.2.1 Three Types of addresses
244(1)
9.2.2 Address Resolution Protocol (ARP)
245(3)
9.2.3 An Example of Communication
248(4)
9.3 End-Chapter Materials
252(1)
9.3.1 Recommended Reading
252(1)
9.3.2 Key Terms
252(1)
9.3.3 Summary
252(1)
9.4 Practice Set
253(4)
9.4.1 Quizzes
253(1)
9.4.2 Questions
253(1)
9.4.3 Problems
254(3)
Chapter 10 Error Detection and Correction
257(36)
10.1 Introduction
258(1)
10.1.1 Types of Errors
258(1)
10.1.2 Redundancy
258(1)
10.1.3 Detection versus Correction
258(1)
10.1.4 Coding
259(1)
10.2 Block Coding
259(5)
10.2.1 Error Detection
259(5)
10.3 Cyclic Codes
264(13)
10.3.1 Cyclic Redundancy Check
264(3)
10.3.2 Polynomials
267(2)
10.3.3 Cyclic Code Encoder Using Polynomials
269(1)
10.3.4 Cyclic Code Analysis
270(4)
10.3.5 Advantages of Cyclic Codes
274(1)
10.3.6 Other Cyclic Codes
274(1)
10.3.7 Hardware Implementation
274(3)
10.4 Checksum
277(5)
10.4.1 Concept
278(3)
10.4.2 Other Approaches to the Checksum
281(1)
10.5 Forward Error Correction
282(3)
10.5.1 Using Hamming Distance
283(1)
10.5.2 Using XOR
283(1)
10.5.3 Chunk Interleaving
283(1)
10.5.4 Combining Hamming Distance and Interleaving
284(1)
10.5.5 Compounding High- and Low-Resolution Packets
284(1)
10.6 End-Chapter Materials
285(2)
10.6.1 Recommended Reading
285(1)
10.6.2 Key Terms
286(1)
10.6.3 Summary
286(1)
10.7 Practice Set
287(5)
10.7.1 Quizzes
287(1)
10.7.2 Questions
287(1)
10.7.3 Problems
288(4)
10.8 Simulation Experiments
292(1)
10.8.1 Applets
292(1)
10.9 Programming Assignments
292(1)
Chapter 11 Data Link Control (DLC)
293(32)
11.1 DLC Services
294(5)
11.1.1 Framing
294(3)
11.1.2 Flow and Error Control
297(1)
11.1.3 Connectionless and Connection-Oriented
298(1)
11.2 Data-Link Layer Protocols
299(5)
11.2.1 Simple Protocol
300(1)
11.2.2 Stop-and-Wait Protocol
301(3)
11.2.3 Piggybacking
304(1)
11.3 HDLC
304(5)
11.3.1 Configurations and Transfer Modes
305(1)
11.3.2 Framing
305(4)
11.4 Point-To-Point Protocol (PPP)
309(10)
11.4.1 Services
309(1)
11.4.2 Framing
310(1)
11.4.3 Transition Phases
311(1)
11.4.4 Multiplexing
312(7)
11.5 End-Chapter Materials
319(1)
11.5.1 Recommended Reading
319(1)
11.5.2 Key Terms
319(1)
11.5.3 Summary
319(1)
11.6 Practice Set
320(3)
11.6.1 Quizzes
320(1)
11.6.2 Questions
320(1)
11.6.3 Problems
321(2)
11.7 Simulation Experiments
323(1)
11.7.1 Applets
323(1)
11.8 Programming Assignments
323(2)
Chapter 12 Media Access Control (MAC)
325(36)
12.1 Random Access
326(15)
12.1.1 ALOHA
326(5)
12.1.2 CSMA
331(3)
12.1.3 CSMA/CD
334(4)
12.1.4 CSMA/CA
338(3)
12.2 Controlled Access
341(3)
12.2.1 Reservation
341(1)
12.2.2 Polling
342(1)
12.2.3 Token Passing
343(1)
12.3 Channelization
344(8)
12.3.1 FDMA
344(2)
12.3.2 TDMA
346(1)
12.3.3 CDMA
347(5)
12.4 End-Chapter Materials
352(2)
12.4.1 Recommended Reading
352(1)
12.4.2 Key Terms
353(1)
12.4.3 Summary
353(1)
12.5 Practice Set
354(6)
12.5.1 Quizzes
354(1)
12.5.2 Questions
354(2)
12.5.3 Problems
356(4)
12.6 Simulation Experiments
360(1)
12.6.1 Applets
360(1)
12.7 Programming Assignments
360(1)
Chapter 13 Wired LANs: Ethernet
361(26)
13.1 Ethernet Protocol
362(2)
13.1.1 IEEE Project 802
362(1)
13.1.2 Ethernet Evolution
363(1)
13.2 Standard Ethernet
364(12)
13.2.1 Characteristics
364(2)
13.2.2 Addressing
366(2)
13.2.3 Access Method
368(2)
13.2.4 Efficiency of Standard Ethernet
370(1)
13.2.5 Implementation
370(3)
13.2.6 Changes in the Standard
373(3)
13.3 Fast Ethernet (100 MBPS)
376(3)
13.3.1 Access Method
377(1)
13.3.2 Physical Layer
377(2)
13.4 Gigabit Ethernet
379(3)
13.4.1 MAC Sublayer
380(1)
13.4.2 Physical Layer
381(1)
13.5 10 Gigabit Ethernet
382(1)
13.5.1 Implementation
382(1)
13.6 End-Chapter Materials
383(1)
13.6.1 Recommended Reading
383(1)
13.6.2 Key Terms
383(1)
13.6.3 Summary
383(1)
13.7 Practice Set
384(1)
13.7.1 Quizzes
384(1)
13.7.2 Questions
384(1)
13.7.3 Problems
385(1)
13.8 Simulation Experiments
385(2)
13.8.1 Applets
385(1)
13.8.2 Lab Assignments
386(1)
Chapter 14 Other Wired Networks
387(48)
14.1 Telephone Networks
388(9)
14.1.1 Major Components
388(1)
14.1.2 LATAs
388(2)
14.1.3 Signaling
390(3)
14.1.4 Services Provided by Telephone Networks
393(1)
14.1.5 Dial-Up Service
394(2)
14.1.6 Digital Subscriber Line (DSL)
396(1)
14.2 Cable Networks
397(3)
14.2.1 Traditional Cable Networks
397(1)
14.2.2 Hybrid Fiber-Coaxial (HFC) Network
398(1)
14.2.3 Cable TV for Data Transfer
399(1)
14.3 SONET
400(21)
14.3.1 Architecture
401(2)
14.3.2 SONET Layers
403(1)
14.3.3 SONET Frames
404(8)
14.3.4 STS Multiplexing
412(3)
14.3.5 SONET Networks
415(5)
14.3.6 Virtual Tributaries
420(1)
14.4 ATM
421(8)
14.4.1 Design Goals
422(1)
14.4.2 Problems
422(3)
14.4.3 Architecture
425(4)
14.5 End-Chapter Materials
429(3)
14.5.1 Recommended Reading
429(1)
14.5.2 Key Terms
430(1)
14.5.3 Summary
431(1)
14.6 Practice Set
432(3)
14.6.1 Quizzes
432(1)
14.6.2 Questions
432(1)
14.6.3 Problems
433(2)
Chapter 15 Wireless LANs
435(30)
15.1 Introduction
436(3)
15.1.1 Architectural Comparison
436(2)
15.1.2 Characteristics
438(1)
15.1.3 Access Control
438(1)
15.2 IEEE 802.11 Project
439(12)
15.2.1 Architecture
440(1)
15.2.2 MAC Sublayer
441(5)
15.2.3 Addressing Mechanism
446(2)
15.2.4 Physical Layer
448(3)
15.3 Bluetooth
451(7)
15.3.1 Architecture
451(1)
15.3.2 Bluetooth Layers
452(6)
15.4 End-Chapter Materials
458(1)
15.4.1 Further Reading
458(1)
15.4.2 Key Terms
458(1)
15.4.3 Summary
458(1)
15.5 Practice Set
459(4)
15.5.1 Quizzes
459(1)
15.5.2 Questions
459(1)
15.5.3 Problems
460(3)
15.6 Simulation Experiments
463(2)
15.6.1 Applets
463(1)
15.6.2 Lab Assignments
463(2)
Chapter 16 Other Wireless Networks
465(28)
16.1 WiMAX
466(4)
16.1.1 Services
466(1)
16.1.2 IEEE Project 802.16
467(1)
16.1.3 Layers in Project 802.16
467(3)
16.2 Cellular Telephony
470(13)
16.2.1 Operation
471(2)
16.2.2 First Generation (1G)
473(1)
16.2.3 Second Generation (2G)
474(6)
16.2.4 Third Generation (3G)
480(2)
16.2.5 Fourth Generation (4G)
482(1)
16.3 Satellite Networks
483(6)
16.3.1 Operation
483(2)
16.3.2 GEO Satellites
485(1)
16.3.3 MEO Satellites
485(3)
16.3.4 LEO Satellites
488(1)
16.4 End-Chapter Materials
489(2)
16.4.1 Recommended Reading
489(1)
16.4.2 Key Terms
490(1)
16.4.3 Summary
490(1)
16.5 Practice Set
491(2)
16.5.1 Quizzes
491(1)
16.5.2 Questions
491(1)
16.5.3 Problems
491(2)
Chapter 17 Connecting Devices and Virtual LANs
493(16)
17.1 Connecting Devices
494(8)
17.1.1 Hubs
494(1)
17.1.2 Link-Layer Switches
495(6)
17.1.3 Routers
501(1)
17.2 Virtual LANs
502(4)
17.2.1 Membership
504(1)
17.2.2 Configuration
504(1)
17.2.3 Communication between Switches
505(1)
17.2.4 Advantages
506(1)
17.3 End-Chapter Materials
506(1)
17.3.1 Recommended Reading
506(1)
17.3.2 Key Terms
506(1)
17.3.3 Summary
506(1)
17.4 Practice Set
507(4)
17.4.1 Quizzes
507(1)
17.4.2 Questions
507(1)
17.4.3 Problems
507(2)
Part IV: Network Layer 509(180)
Chapter 18 Introduction to Network Layer
511(50)
18.1 Network-Layer Services
512(4)
18.1.1 Packetizing
513(1)
18.1.2 Routing and Forwarding
513(1)
18.1.3 Other Services
514(2)
18.2 Packet Switching
516(6)
18.2.1 Datagram Approach: Connectionless Service
516(1)
18.2.2 Virtual-Circuit Approach: Connection-Oriented Service
517(5)
18.3 Network-Layer Performance
522(6)
18.3.1 Delay
522(1)
18.3.2 Throughput
523(2)
18.3.3 Packet Loss
525(1)
18.3.4 Congestion Control
525(3)
18.4 IPV4 Addresses
528(18)
18.4.1 Address Space
529(1)
18.4.2 Classful Addressing
530(2)
18.4.3 Classless Addressing
532(7)
18.4.4 Dynamic Host Configuration Protocol (DHCP)
539(4)
18.4.5 Network Address Resolution (NAT)
543(3)
18.5 Forwarding Of IP Packets
546(10)
18.5.1 Forwarding Based on Destination Address
547(6)
18.5.2 Forwarding Based on Label
553(2)
18.5.3 Routers as Packet Switches
555(1)
18.6 End-Chapter Materials
556(1)
18.6.1 Recommended Reading
556(1)
18.6.2 Key Terms
556(1)
18.6.3 Summary
556(1)
18.7 Practice Set
557(3)
18.7.1 Quizzes
557(1)
18.7.2 Questions
557(1)
18.7.3 Problems
558(2)
18.8 Simulation Experiments
560(1)
18.8.1 Applets
560(1)
18.9 Programming Assignment
560(1)
Chapter 19 Network-Layer Protocols
561(34)
19.1 Internet Protocol (IP)
562(12)
19.1.1 Datagram Format
563(4)
19.1.2 Fragmentation
567(5)
19.1.3 Options
572(1)
19.1.4 Security of IPv4 Datagrams
573(1)
19.2 ICMPv4
574(7)
19.2.1 MESSAGES
575(3)
19.2.2 Debugging Tools
578(2)
19.2.3 ICMP Checksum
580(1)
19.3 Mobile IP
581(10)
19.3.1 Addressing
581(2)
19.3.2 Agents
583(1)
19.3.3 Three Phases
584(5)
19.3.4 Inefficiency in Mobile IP
589(2)
19.4 End-Chapter Materials
591(1)
19.4.1 Recommended Reading
591(1)
19.4.2 Key Terms
591(1)
19.4.3 Summary
591(1)
19.5 Practice Set
592(2)
19.5.1 Quizzes
592(1)
19.5.2 Questions
592(1)
19.5.3 Problems
593(1)
19.6 Simulation Experiments
594(1)
19.6.1 Applets
594(1)
19.6.2 Lab Assignments
594(1)
Chapter 20 Unicast Routing
595(44)
20.1 Introduction
596(2)
20.1.1 General Idea
596(1)
20.1.2 Least-Cost Routing
596(2)
20.2 Routing Algorithms
598(13)
20.2.1 Distance-Vector Routing
598(6)
20.2.2 Link-State Routing
604(2)
20.2.3 Path-Vector Routing
606(5)
20.3 Unicast Routing Protocols
611(20)
20.3.1 Internet Structure
611(2)
20.3.2 Routing Information Protocol (RIP)
613(5)
20.3.3 Open Shortest Path First (OSPF)
618(5)
20.3.4 Border Gateway Protocol Version 4 (BGP4)
623(8)
20.4 End-Chapter Materials
631(1)
20.4.1 Recommended Reading
631(1)
20.4.2 Key Terms
631(1)
20.4.3 Summary
632(1)
20.5 Practice Set
632(5)
20.5.1 Quizzes
632(1)
20.5.2 Questions
632(2)
20.5.3 Problems
634(3)
20.6 Simulation Experiments
637(1)
20.6.1 Applets
637(1)
20.7 Programming Assignment
637(2)
Chapter 21 Multicast Routing
639(26)
21.1 Introduction
640(3)
21.1.1 Unicasting
640(1)
21.1.2 Multicasting
640(3)
21.1.3 Broadcasting
643(1)
21.2 Multicasting Basics
643(7)
21.2.1 Multicast Addresses
643(2)
21.2.2 Delivery at Data-Link Layer
645(2)
21.2.3 Collecting Information about Groups
647(1)
21.2.4 Multicast Forwarding
648(1)
21.2.5 Two Approaches to Multicasting
649(1)
21.3 Intradomain Multicast Protocols
650(7)
21.3.1 Multicast Distance Vector (DVMRP)
651(2)
21.3.2 Multicast Link State (MOSPF)
653(1)
21.3.3 Protocol Independent Multicast (PIM)
654(3)
21.4 Interdomain Multicast Protocols
657(1)
21.5 IGMP
658(2)
21.5.1 Messages
658(1)
21.5.2 Propagation of Membership Information
659(1)
21.5.3 Encapsulation
660(1)
21.6 End-Chapter Materials
660(1)
21.6.1 Recommended Reading
660(1)
21.6.2 Key Terms
660(1)
21.6.3 Summary
660(1)
21.7 Practice Set
661(2)
21.7.1 Quizzes
661(1)
21.7.2 Questions
661(1)
21.7.3 Problems
662(1)
21.8 Simulation Experiments
663(2)
21.8.1 Applets
663(2)
Chapter 22 Next Generation IP
665(24)
22.1 IPv6 Addressing
666(8)
22.1.1 Representation
666(1)
22.1.2 Address Space
667(1)
22.1.3 Address Space Allocation
668(4)
22.1.4 Autoconfiguration
672(1)
22.1.5 Renumbering
673(1)
22.2 The IPv6 Protocol
674(5)
22.2.1 Packet Format
674(3)
22.2.2 Extension Header
677(2)
22.3 The ICMPv6 Protocol
679(3)
22.3.1 Error-Reporting Messages
679(1)
22.3.2 Informational Messages
680(1)
22.3.3 Neighbor-Discovery Messages
681(1)
22.3.4 Group Membership Messages
682(1)
22.4 Transition From IPv4 to IPv6
682(2)
22.4.1 Strategies
683(1)
22.4.2 Use of IP Addresses
684(1)
22.5 End-Chapter Materials
684(1)
22.5.1 Recommended Reading
684(1)
22.5.2 Key Terms
685(1)
22.5.3 Summary
685(1)
22.6 Practice Set
685(3)
22.6.1 Quizzes
685(1)
22.6.2 Questions
685(1)
22.6.3 Problems
686(2)
22.7 Simulation Experiments
688(3)
22.7.1 Applets
688(1)
Part V: Transport Layer 689(126)
Chapter 23 Introduction to Transport Layer
691(44)
23.1 Introduction
692(15)
23.1.1 Transport-Layer Services
693(10)
23.1.2 Connectionless and Connection-Oriented Protocols
703(4)
23.2 Transport-Layer Protocols
707(20)
23.2.1 Simple Protocol
707(1)
23.2.2 Stop-and-Wait Protocol
708(5)
23.2.3 Go-Back-N Protocol (GBN)
713(7)
23.2.4 Selective-Repeat Protocol
720(6)
23.2.5 Bidirectional Protocols: Piggybacking
726(1)
23.3 End-Chapter Materials
727(1)
23.3.1 Recommended Reading
727(1)
23.3.2 Key Terms
727(1)
23.3.3 Summary
728(1)
23.4 Practice Set
728(5)
23.4.1 Quizzes
728(1)
23.4.2 Questions
728(1)
23.4.3 Problems
729(4)
23.5 Simulation Experiments
733(1)
23.5.1 Applets
733(1)
23.6 Programming Assignment
733(2)
Chapter 24 Transport-Layer Protocols
735(80)
24.1 Introduction
736(1)
24.1.1 Services
736(1)
24.1.2 Port Numbers
736(1)
24.2 User Datagram Protocol
737(6)
24.2.1 User Datagram
737(1)
24.2.2 UDP Services
738(3)
24.2.3 UDP Applications
741(2)
24.3 Transmission Control Protocol
743(48)
24.3.1 TCP Services
743(3)
24.3.2 TCP Features
746(2)
24.3.3 Segment
748(2)
24.3.4 A TCP Connection
750(6)
24.3.5 State Transition Diagram
756(4)
24.3.6 Windows in TCP
760(2)
24.3.7 Flow Control
762(6)
24.3.8 Error Control
768(9)
24.3.9 TCP Congestion Control
777(9)
24.3.10 TCP Timers
786(4)
24.3.11 Options
790(1)
24.4 SCTP
791(14)
24.4.1 SCTP Services
791(1)
24.4.2 SCTP Features
792(2)
24.4.3 Packet Format
794(2)
24.4.4 An SCTP Association
796(3)
24.4.5 Flow Control
799(2)
24.4.6 Error Control
801(4)
24.5 End-Chapter Materials
805(1)
24.5.1 Recommended Reading
805(1)
24.5.2 Key Terms
805(1)
24.5.3 Summary
805(1)
24.6 Practice Set
806(11)
24.6.1 Quizzes
806(1)
24.6.2 Questions
806(3)
24.6.3 Problems
809(6)
Part VI: Application Layer 815(236)
Chapter 25 Introduction to Application Layer
817(54)
25.1 Introduction
818(5)
25.1.1 Providing Services
819(1)
25.1.2 Application-Layer Paradigms
820(3)
25.2 Client-Server Programming
823(10)
25.2.1 Application Programming Interface
823(4)
25.2.2 Using Services of the Transport Layer
827(1)
25.2.3 Iterative Communication Using UDP
828(2)
25.2.4 Iterative Communication Using TCP
830(2)
25.2.5 Concurrent Communication
832(1)
25.3 Iterative Programming In C
833(9)
25.3.1 General Issues
833(1)
25.3.2 Iterative Programming Using UDP
834(3)
25.3.3 Iterative Programming Using TCP
837(5)
25.4 Iterative Programming In Java
842(23)
25.4.1 Addresses and Ports
843(3)
25.4.2 Iterative Programming Using UDP
846(11)
25.4.3 Iterative Programming Using TCP
857(8)
25.5 End-Chapter Materials
865(1)
25.5.1 Recommended Reading
865(1)
25.5.2 Key Terms
866(1)
25.5.3 Summary
866(1)
25.6 Practice Set
866(3)
25.6.1 Quizzes
866(1)
25.6.2 Questions
866(3)
25.6.3 Problems
869(1)
25.7 Simulation Experiments
869(1)
25.7.1 Applets
869(1)
25.8 Programming Assignment
870(1)
Chapter 26 Standard Client-Server Protocols
871(58)
26.1 World Wide Web And HTTP
872(15)
26.1.1 World Wide Web
872(4)
26.1.2 HyperText Transfer Protocol (HTTP)
876(11)
26.2 FTP
887(4)
26.2.1 Two Connections
888(1)
26.2.2 Control Connection
888(1)
26.2.3 Data Connection
889(2)
26.2.4 Security for FTP
891(1)
26.3 Electronic Mail
891(13)
26.3.1 Architecture
892(11)
26.3.2 Web-Based Mail
903(1)
26.3.3 E-Mail Security
904(1)
26.4 TELNET
904(3)
26.4.1 Local versus Remote Logging
905(2)
26.5 Secure Shell (SSH)
907(3)
26.5.1 Components
907(1)
26.5.2 Applications
908(2)
26.6 Domain Name System (DNS)
910(11)
26.6.1 Name Space
911(4)
26.6.2 DNS in the Internet
915(1)
26.6.3 Resolution
916(2)
26.6.4 Caching
918(1)
26.6.5 Resource Records
918(1)
26.6.6 DNS Messages
919(1)
26.6.7 Registrars
920(1)
26.6.8 DDNS
920(1)
26.6.9 Security of DNS
921(1)
26.7 End-Chapter Materials
921(2)
26.7.1 Recommended Reading
921(1)
26.7.2 Key Terms
922(1)
26.7.3 Summary
922(1)
26.8 Practice Set
923(4)
26.8.1 Quizzes
923(1)
26.8.2 Questions
923(1)
26.8.3 Problems
924(3)
26.9 Simulation Experiments
927(2)
26.9.1 Applets
927(1)
26.9.2 Lab Assignments
927(2)
Chapter 27 Network Management
929(32)
27.1 Introduction
930(4)
27.1.1 Configuration Management
930(2)
27.1.2 Fault Management
932(1)
27.1.3 Performance Management
933(1)
27.1.4 Security Management
933(1)
27.1.5 Accounting Management
934(1)
27.2 SNMP
934(17)
27.2.1 Managers and Agents
935(1)
27.2.2 Management Components
935(2)
27.2.3 An Overview
937(1)
27.2.4 SMI
938(4)
27.2.5 MIB
942(2)
27.2.6 SNMP
944(7)
27.3 ASN.1
951(4)
27.3.1 Language Basics
951(1)
27.3.2 Data Types
952(3)
27.3.3 Encoding
955(1)
27.4 End-Chapter Materials
955(1)
27.4.1 Recommended Reading
955(1)
27.4.2 Key Terms
956(1)
27.4.3 Summary
956(1)
27.5 Practice Set
956(5)
27.5.1 Quizzes
956(1)
27.5.2 Questions
956(2)
27.5.3 Problems
958(3)
Chapter 28 Multimedia,
961(62)
28.1 Compression
962(16)
28.1.1 Lossless Compression
962(10)
28.1.2 Lossy Compression
972(6)
28.2 Multimedia Data
978(8)
28.2.1 Text
978(1)
28.2.2 Image
978(4)
28.2.3 Video
982(2)
28.2.4 Audio
984(2)
28.3 Multimedia In The Internet
986(9)
28.3.1 Streaming Stored Audio/Video
986(3)
28.3.2 Streaming Live Audio/Video
989(1)
28.3.3 Real-Time Interactive Audio/Video
990(5)
28.4 Real-Time Interactive Protocols
995(19)
28.4.1 Rationale for New Protocols
996(3)
28.4.2 RTP
999(2)
28.4.3 RTCP
1001(4)
28.4.4 Session Initialization Protocol (SIP)
1005(7)
28.4.5 H.323
1012(2)
28.5 End-Chapter Materials
1014(2)
28.5.1 Recommended Reading
1014(1)
28.5.2 Key Terms
1015(1)
28.5.3 Summary
1015(1)
28.6 Practice Set
1016(5)
28.6.1 Quizzes
1016(1)
28.6.2 Questions
1016(2)
28.6.3 Problems
1018(3)
28.7 Simulation Experiments
1021(1)
28.7.1 Applets
1021(1)
28.7.2 Lab Assignments
1021(1)
28.8 Programming Assignments
1022(1)
Chapter 29 Peer-to-Peer Paradigm
1023(28)
29.1 Introduction
1024(5)
29.1.1 P2P Networks
1024(2)
29.1.2 Distributed Hash Table (DHT)
1026(3)
29.2 Chord
1029(7)
29.2.1 Identifier Space
1029(1)
29.2.2 Finger Table
1029(1)
29.2.3 Interface
1030(6)
29.2.4 Applications
1036(1)
29.3 Pastry
1036(5)
29.3.1 Identifier Space
1036(1)
29.3.2 Routing
1037(4)
29.3.3 Application
1041(1)
29.4 Kademlia
1041(4)
29.4.1 Identifier Space
1041(1)
29.4.2 Routing Table
1041(3)
29.4.3 K-Buckets
1044(1)
29.5 BitTorrent
1045(2)
29.5.1 BitTorrent with a Tracker
1045(1)
29.5.2 Trackerless BitTorrent
1046(1)
29.6 End-Chapter Materials
1047(1)
29.6.1 Recommended Reading
1047(1)
29.6.2 Key Terms
1047(1)
29.6.3 Summary
1047(1)
29.7 Practice Set
1048(5)
29.7.1 Quizzes
1048(1)
29.7.2 Questions
1048(1)
29.7.3 Problems
1048(3)
Part VII: Topics Related to All Layers 1051(106)
Chapter 30 Quality of Service
1053(24)
30.1 Data-Flow Characteristics
1054(1)
30.1.1 Definitions
1054(1)
30.1.2 Sensitivity of Applications
1054(1)
30.1.3 Flow Classes
1055(1)
30.2 Flow Control To Improve QOS
1055(7)
30.2.1 Scheduling
1056(2)
30.2.2 Traffic Shaping or Policing
1058(3)
30.2.3 Resource Reservation
1061(1)
30.2.4 Admission Control
1062(1)
30.3 Integrated Services (INTSERV)
1062(4)
30.3.1 Flow Specification
1062(1)
30.3.2 Admission
1063(1)
30.3.3 Service Classes
1063(1)
30.3.4 Resource Reservation Protocol (RSVP)
1063(2)
30.3.5 Problems with Integrated Services
1065(1)
30.4 Differentiated Services (DFFSERV)
1066(2)
30.4.1 DS Field
1066(1)
30.4.2 Per-Hop Behavior
1067(1)
30.4.3 Traffic Conditioners
1067(1)
30.5 End-Chapter Materials
1068(1)
30.5.1 Recommended Reading
1068(1)
30.5.2 Key Terms
1068(1)
30.5.3 Summary
1068(1)
30.6 Practice Set
1069(6)
30.6.1 Quizzes
1069(1)
30.6.2 Questions
1069(1)
30.6.3 Problems
1070(5)
30.7 Simulation Experiments
1075(1)
30.7.1 Applets
1075(1)
30.8 Programming Assignments
1075(2)
Chapter 31 Cryptography And Network Security
1077(46)
31.1 Introduction
1078(3)
31.1.1 Security Goals
1078(1)
31.1.2 Attacks
1079(2)
31.1.3 Services and Techniques
1081(1)
31.2 Confidentiality
1081(16)
31.2.1 Symmetric-Key Ciphers
1081(11)
31.2.2 Asymmetric-Key Ciphers
1092(5)
31.3 Other Aspects Of Security
1097(17)
31.3.1 Message Integrity
1097(2)
31.3.2 Message Authentication
1099(1)
31.3.3 Digital Signature
1100(5)
31.3.4 Entity Authentication
1105(3)
31.3.5 Key Management
1108(6)
31.4 End-Chapter Materials
1114(1)
31.4.1 Recommended Reading
1114(1)
31.4.2 Key Terms
1114(1)
31.4.3 Summary
1114(1)
31.5 Practice Set
1115(6)
31.5.1 Quizzes
1115(1)
31.5.2 Questions
1115(2)
31.5.3 Problems
1117(4)
31.6 Simulation Experiments
1121(1)
31.6.1 Applets
1121(1)
31.7 Programming Assignments
1122(1)
Chapter 32 Internet Security
1123(34)
32.1 Network-Layer Security
1124(10)
32.1.1 Two Modes
1124(2)
32.1.2 Two Security Protocols
1126(3)
32.1.3 Services Provided by IPSec
1129(1)
32.1.4 Security Association
1130(2)
32.1.5 Internet Key Exchange (IKE)
1132(1)
32.1.6 Virtual Private Network (VPN)
1133(1)
32.2 Transport-Layer Security
1134(6)
32.2.1 SSL Architecture
1135(3)
32.2.2 Four Protocols
1138(2)
32.3 Application-Layer Security
1140(11)
32.3.1 E-mail Security
1141(1)
32.3.2 Pretty Good Privacy (PGP)
1142(5)
32.3.3 S/MIME
1147(4)
32.4 Firewalls
1151(2)
32.4.1 Packet-Filter Firewall
1152(1)
32.4.2 Proxy Firewall
1152(1)
32.5 End-Chapter Materials
1153(1)
32.5.1 Recommended Reading
1153(1)
32.5.2 Key Terms
1154(1)
32.5.3 Summary
1154(1)
32.6 Practice Set
1154(2)
32.6.1 Quizzes
1154(1)
32.6.2 Questions
1155(1)
32.6.3 Problems
1155(1)
32.7 Simulation Experiments
1156(1)
32.7.1 Applets
1156(1)
32.7.2 Lab Assignments
1156(1)
Glossary 1157(36)
References 1193(6)
Index 1199
Behrouz A. Forouzan is a Professor at DeAnza College where he is involved in the development of Computer Information System courses. In addition he provides system development consulting with several companies. In addition to C and C++ books, Forouzan is the author of several other successful books, including Computer Networks: A Top-Down Approach, TCP/IP Protocol Suite, and Local Area Networks.