Preface |
|
xv | |
Acknowledgments |
|
xix | |
1 Overview of Data Communication Networks |
|
1 | (16) |
|
|
1 | (1) |
|
1.2 Data Communication Network Model |
|
|
1 | (2) |
|
1.3 Classification of Data Communication Networks |
|
|
3 | (8) |
|
1.3.1 Transmission Method |
|
|
3 | (1) |
|
1.3.2 Data Flow Direction |
|
|
3 | (1) |
|
|
4 | (3) |
|
1.3.4 Geographical Coverage |
|
|
7 | (1) |
|
1.3.5 Transmission Medium |
|
|
8 | (1) |
|
1.3.6 Data Transfer Technique |
|
|
8 | (1) |
|
1.3.7 Network Access Technique |
|
|
9 | (1) |
|
1.3.8 Media Sharing Technique |
|
|
9 | (2) |
|
1.4 Data Network Architecture |
|
|
11 | (3) |
|
1.4.1 The OSI Protocol Reference Model |
|
|
11 | (1) |
|
1.4.2 The Internet Architecture |
|
|
12 | (2) |
|
|
14 | (3) |
2 Physical Layer |
|
17 | (56) |
|
|
17 | (1) |
|
2.2 Classification of Signals |
|
|
17 | (1) |
|
|
18 | (1) |
|
2.4 Fourier Analysis of Periodic Signals |
|
|
18 | (5) |
|
2.4.1 Reconstructing a Function from its Fourier Series |
|
|
20 | (1) |
|
2.4.2 Fourier Analysis of Even and Odd Functions |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.4.4 Complex Form of Fourier Series |
|
|
23 | (1) |
|
2.5 Fourier Transform of Nonperiodic Signals |
|
|
23 | (1) |
|
|
24 | (2) |
|
|
26 | (2) |
|
|
28 | (10) |
|
2.8.1 Trigonometric Refresher Course |
|
|
30 | (1) |
|
2.8.2 Amplitude Modulation |
|
|
31 | (5) |
|
2.8.2.1 Overmodulation and Distortion |
|
|
34 | (1) |
|
2.8.2.2 Single-Sideband Suppressed-Carrier Amplitude Modulation |
|
|
34 | (2) |
|
2.8.3 Frequency Modulation |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (6) |
|
2.9.1 Analyzing Impulse Train Sampling |
|
|
39 | (1) |
|
2.9.2 Reconstruction of the Continuous-Time Signal |
|
|
40 | (2) |
|
2.9.3 Statement of the Sampling Theorem |
|
|
42 | (1) |
|
2.9.4 Proof of the Sampling Theorem |
|
|
42 | (2) |
|
2.10 Analog-to-Digital Conversion: From PAM to PCM |
|
|
44 | (2) |
|
2.10.1 Pulse Code Modulation |
|
|
44 | (1) |
|
2.10.2 Quantization Noise |
|
|
45 | (1) |
|
2.11 Basic Digital Modulation Schemes |
|
|
46 | (4) |
|
2.11.1 Amplitude-Shift Keying |
|
|
46 | (1) |
|
2.11.2 Frequency-Shift Keying |
|
|
47 | (1) |
|
2.11.3 Phase-Shift Keying |
|
|
48 | (2) |
|
2.12 Media Sharing Schemes |
|
|
50 | (4) |
|
2.12.1 Frequency Division Multiplexing |
|
|
50 | (2) |
|
2.12.1.1 Wavelength Division Multiplexing |
|
|
52 | (1) |
|
2.12.2 Time Division Multiplexing |
|
|
52 | (2) |
|
2.12.2.1 Synchronous Versus Asynchronous TDM |
|
|
52 | (2) |
|
|
54 | (1) |
|
|
54 | (7) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (7) |
|
|
61 | (1) |
|
|
61 | (2) |
|
2.15.2.1 Concept of Decibel |
|
|
63 | (1) |
|
2.15.2.2 Signal-to-Noise Ratio |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (2) |
|
|
68 | (5) |
3 Data Link Layer Protocols |
|
73 | (18) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (2) |
|
3.4.1 The Stop-and-Wait Protocol |
|
|
75 | (1) |
|
3.4.2 The Sliding Window Flow Control |
|
|
75 | (1) |
|
|
76 | (4) |
|
|
76 | (1) |
|
3.5.2 Two-Dimensional Parity |
|
|
77 | (1) |
|
3.5.3 Cyclic Redundancy Checking |
|
|
78 | (2) |
|
3.6 Error Control Protocols |
|
|
80 | (2) |
|
|
81 | (1) |
|
|
81 | (1) |
|
3.6.3 Selective Repeat ARQ |
|
|
82 | (1) |
|
3.7 Data Link Control Protocols |
|
|
82 | (7) |
|
3.7.1 High-level Data Link Control |
|
|
83 | (3) |
|
3.7.1.1 HDLC Frame Format |
|
|
84 | (1) |
|
3.7.1.2 Control Field Format |
|
|
85 | (1) |
|
3.7.2 Point-to-Point Protocol |
|
|
86 | (6) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
4 Multiple Access Schemes |
|
91 | (14) |
|
|
91 | (1) |
|
4.2 Multiplexing Schemes Revisited |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
4.3 Orthogonal Access Schemes |
|
|
93 | (3) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
4.4 Controlled Access Schemes |
|
|
96 | (1) |
|
4.4.1 Centralized Polling |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
4.5 Random Access Schemes |
|
|
97 | (5) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (3) |
|
4.5.4.1 Why Listen While Transmitting in CSMA/CD |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
102 | (3) |
5 Local Area Networks |
|
105 | (32) |
|
|
105 | (1) |
|
|
105 | (10) |
|
5.2.1 Ethernet Frame Structure |
|
|
106 | (1) |
|
5.2.2 IEEE 802.3 LAN Types |
|
|
107 | (1) |
|
5.2.3 Ethernet Topologies |
|
|
108 | (2) |
|
|
110 | (1) |
|
5.2.5 Classification of Ethernet Switching |
|
|
111 | (1) |
|
5.2.6 Frame Forwarding Methods |
|
|
112 | (1) |
|
5.2.6.1 Store-and-Forward Switching |
|
|
112 | (1) |
|
5.2.6.2 Cut-Through Switching |
|
|
113 | (1) |
|
5.2.6.3 Fragment-Free Switching |
|
|
113 | (1) |
|
5.2.7 Highest Layer used for Forwarding |
|
|
113 | (2) |
|
5.2.7.1 Layer 2 Switching |
|
|
114 | (1) |
|
5.2.7.2 Layer 3 Switching |
|
|
114 | (1) |
|
5.2.7.3 Layer 4 Switching |
|
|
115 | (1) |
|
|
115 | (7) |
|
5.3.1 Advantages of VLANs |
|
|
115 | (2) |
|
|
117 | (3) |
|
|
117 | (1) |
|
5.3.2.2 MAC Address-Based VLAN |
|
|
118 | (1) |
|
5.3.2.3 Protocol-Based VLANs |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (6) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
5.5.4 Architecture of the IEEE 802.11 WLAN |
|
|
126 | (1) |
|
5.5.5 Ad Hoc Mode Deployment |
|
|
126 | (1) |
|
5.5.6 Infrastructure Mode Deployment |
|
|
126 | (1) |
|
5.5.7 IEEE 802.11 WLAN Timers |
|
|
127 | (1) |
|
5.5.8 IEEE 802.11 WLAN Operation |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
5.5.11 Range and Data Rate Comparison in the PCF Environment |
|
|
129 | (1) |
|
|
129 | (5) |
|
|
130 | (1) |
|
5.6.2 Token-Passing Access Method |
|
|
130 | (1) |
|
5.6.3 Data/Command Frame Fields |
|
|
131 | (1) |
|
5.6.4 Token Access Priority |
|
|
132 | (1) |
|
5.6.5 Logical and Physical Implementation |
|
|
133 | (1) |
|
|
134 | (3) |
6 Network Layer Part I-IP Addressing |
|
137 | (22) |
|
|
137 | (1) |
|
|
137 | (2) |
|
6.3 Maximum Transmission Unit |
|
|
139 | (1) |
|
6.4 IP Version 4 Addressing |
|
|
140 | (3) |
|
6.4.1 Class A IPv4 Addresses |
|
|
141 | (1) |
|
6.4.2 Class B IPv4 Addresses |
|
|
141 | (1) |
|
6.4.3 Class C IPv4 Addresses |
|
|
142 | (1) |
|
6.4.4 Class D IPv4 Addresses |
|
|
142 | (1) |
|
6.4.5 Class E IPv4 Addresses |
|
|
142 | (1) |
|
|
143 | (2) |
|
6.6 Variable Length Subnet Mask Networks |
|
|
145 | (2) |
|
6.7 IP Quality of Service |
|
|
147 | (2) |
|
6.8 Operation of the Explicit Congestion Notification |
|
|
149 | (1) |
|
6.9 Address Resolution Protocol |
|
|
149 | (3) |
|
6.9.1 Source and Sink in Same LAN |
|
|
150 | (1) |
|
6.9.2 Source and Sink in Different LANs: Proxy ARP |
|
|
150 | (1) |
|
6.9.3 Source and Sink in Different Remote LANs |
|
|
151 | (1) |
|
6.10 Dealing with Shortage of IPv4 Addresses |
|
|
152 | (2) |
|
|
152 | (1) |
|
6.10.2 Network Address Translation |
|
|
153 | (1) |
|
6.10.3 Classless Inter-Domain Routing |
|
|
153 | (1) |
|
|
154 | (3) |
|
|
156 | (1) |
|
6.11.2 Concept of Flexible Addressing in IPv6 |
|
|
157 | (1) |
|
|
157 | (2) |
7 Network Layer Part II-Routing |
|
159 | (28) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
7.4 Static Versus Dynamic Routing |
|
|
160 | (1) |
|
7.5 Link-State Versus Distance-Vector Routing |
|
|
160 | (1) |
|
7.6 Flat Versus Hierarchical Routing |
|
|
161 | (1) |
|
7.7 Host-Based Versus Router-Intelligent Routing |
|
|
161 | (1) |
|
7.8 Centralized Versus Distributed Routing |
|
|
162 | (1) |
|
|
162 | (2) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
7.11 Distance-Vector Routing Algorithms |
|
|
164 | (1) |
|
7.12 Link-State Routing Algorithms |
|
|
165 | (1) |
|
|
166 | (2) |
|
7.14 Routing Information Protocol |
|
|
168 | (1) |
|
7.15 Routing Information Protocol Version 2 |
|
|
168 | (1) |
|
7.16 Open Shortest Path First Protocol |
|
|
169 | (3) |
|
7.16.1 OSPF Routing Hierarchy |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
7.16.4 Maintaining the Topological Database |
|
|
171 | (1) |
|
7.17 Advantages of OSPF Over RIP |
|
|
172 | (1) |
|
7.18 The Dijkstra's Algorithm |
|
|
172 | (4) |
|
|
176 | (1) |
|
7.20 Types of Multicast Systems |
|
|
177 | (1) |
|
7.21 Host-Router Signaling |
|
|
177 | (1) |
|
7.22 Multicast Routing Protocols |
|
|
178 | (3) |
|
|
179 | (1) |
|
|
180 | (1) |
|
7.22.3 Source-Based Tree Protocols |
|
|
180 | (1) |
|
7.22.4 Shared Tree Protocols |
|
|
180 | (1) |
|
7.23 Multicast Forwarding |
|
|
181 | (2) |
|
|
183 | (4) |
8 Transport Layer-TCP and UDP |
|
187 | (22) |
|
|
187 | (2) |
|
|
189 | (4) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (2) |
|
|
193 | (3) |
|
8.3.1 TCP Connection Establishment |
|
|
193 | (1) |
|
8.3.2 TCP Connection Release |
|
|
194 | (1) |
|
8.3.3 TCP Connection Management |
|
|
195 | (1) |
|
|
196 | (7) |
|
|
198 | (2) |
|
8.4.2 Congestion Avoidance |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
8.5 TCP and Explicit Congestion Notification |
|
|
203 | (2) |
|
8.6 The SYN Flood DoS Attach |
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (1) |
9 Transport Layer-SCTP and DCCP |
|
209 | (20) |
|
|
209 | (1) |
|
9.2 Stream Control Transmission Protocol |
|
|
209 | (9) |
|
9.2.1 Motivation for a New Transport Protocol |
|
|
210 | (1) |
|
9.2.2 Illustration of the HOL Blocking |
|
|
211 | (1) |
|
9.2.3 Summary of Features of SCTP |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
9.2.6 Association Establishment |
|
|
213 | (1) |
|
9.2.7 Four-Way Handshake and the SYN Flood DoS Attach |
|
|
214 | (1) |
|
|
214 | (2) |
|
|
216 | (1) |
|
9.2.10 SCTP Graceful Shutdown Feature |
|
|
217 | (1) |
|
9.2.11 Selective Acknowledgments |
|
|
218 | (1) |
|
9.3 Datagram Congestion Control Protocol |
|
|
218 | (7) |
|
9.3.1 DCCP Packet Structure |
|
|
219 | (2) |
|
|
221 | (2) |
|
9.3.3 DCCP Congestion Management |
|
|
223 | (7) |
|
9.3.3.1 CCID 2-TCP-Like Congestion Control |
|
|
224 | (1) |
|
9.3.3.2 CCID 3-TCP Friendly Rate Control |
|
|
224 | (1) |
|
|
225 | (4) |
10 Application Layer Services |
|
229 | (14) |
|
|
229 | (1) |
|
10.2 Dynamic Host Configuration Protocol |
|
|
230 | (3) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
10.2.5 Acknowledgment Phase |
|
|
232 | (1) |
|
10.2.6 Example of Configuration Process Timeline |
|
|
232 | (1) |
|
10.2.7 Address Lease Time |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (8) |
|
10.3.1 Structure of the DNS |
|
|
234 | (2) |
|
|
236 | (1) |
|
10.3.3 Name-to-Address Resolution Process |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
10.3.5.1 Full Zone Transfer |
|
|
239 | (1) |
|
10.3.5.2 Incremental Zone Transfer |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
11 Introduction to Mobile Communication Networks |
|
243 | (34) |
|
|
243 | (1) |
|
11.2 Radio Communication Basics |
|
|
243 | (1) |
|
11.3 Model of Radio Communication System |
|
|
244 | (2) |
|
11.4 Radio Wave Propagation |
|
|
246 | (4) |
|
11.4.1 Free-Space Propagation |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (2) |
|
11.6 Introduction to Cellular Communication |
|
|
252 | (4) |
|
|
252 | (1) |
|
11.6.2 Cellular System Architecture |
|
|
253 | (3) |
|
11.7 Clusters and Frequency Reuse |
|
|
256 | (2) |
|
11.8 Co-Channel Interference |
|
|
258 | (1) |
|
|
258 | (1) |
|
11.10 Introduction to Mobile Cellular Networks |
|
|
258 | (1) |
|
11.11 Mobile Cellular Network Architecture |
|
|
259 | (1) |
|
11.12 Mobility Management: Handoff |
|
|
260 | (1) |
|
|
261 | (1) |
|
11.12.2 Hard Handoff versus Soft Handoff |
|
|
261 | (1) |
|
11.13 Generations of Mobile Communication Networks |
|
|
261 | (13) |
|
11.13.1 First-Generation Networks |
|
|
262 | (1) |
|
11.13.2 Second-Generation Networks |
|
|
262 | (1) |
|
11.13.3 Introduction to the GSM Network |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
266 | (1) |
|
11.13.6 Overview of IS-136 TDMA Networks |
|
|
266 | (1) |
|
11.13.7 Overview of IS-95 CDMA Networks |
|
|
266 | (3) |
|
11.13.8 Third-Generation Networks |
|
|
269 | (1) |
|
11.13.9 Fourth-Generation Networks |
|
|
270 | (1) |
|
11.13.10 Fifth-Generation Networks |
|
|
271 | (3) |
|
11.14 A Note on Internet-of-Things |
|
|
274 | (1) |
|
|
274 | (3) |
12 Introduction to Network Security |
|
277 | (18) |
|
|
277 | (1) |
|
12.2 Types of Network Attacks |
|
|
277 | (3) |
|
|
280 | (1) |
|
12.4 Data Encryption Terminology |
|
|
281 | (1) |
|
12.5 Cryptographic Systems |
|
|
281 | (2) |
|
12.5.1 Symmetric Cryptosystems |
|
|
281 | (1) |
|
12.5.2 Public-Key Cryptosystems |
|
|
281 | (1) |
|
12.5.3 Comparing Symmetric and Public-Key Cryptosystems |
|
|
282 | (1) |
|
12.5.4 A Hybrid Encryption Scheme |
|
|
283 | (1) |
|
12.6 Technical Summary of Public-Key Cryptography |
|
|
283 | (6) |
|
12.6.1 Introduction to Number Theory |
|
|
283 | (1) |
|
|
284 | (1) |
|
12.6.3 The Square and Multiply Algorithm |
|
|
284 | (1) |
|
12.6.4 Euclid's Algorithm |
|
|
285 | (1) |
|
12.6.5 Extended Euclid's Algorithm |
|
|
286 | (1) |
|
12.6.6 Euler's Phi Function (Euler's Totient Function) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (2) |
|
12.7.1 Generating a Digital Signature |
|
|
289 | (1) |
|
12.7.2 Verifying a Digital Signature |
|
|
290 | (1) |
|
12.8 IP Security Protocols |
|
|
291 | (3) |
|
|
291 | (1) |
|
12.8.2 Security Association |
|
|
292 | (1) |
|
12.8.3 Authentication Header |
|
|
292 | (1) |
|
12.8.4 Encapsulating Security Payload |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
Bibliography |
|
295 | (2) |
Index |
|
297 | |