Zheng, Youlu.

Networks for computer scientists and engineers / Youlu Zheng, Shakil Akhtar. - New York : Oxford University Press, 2002. - xvi, 575 p. : 24 cm.

Chapter 1 Introduction 1
1.1 EVOLUTION OF DATA COMMUNICATIONS AND
NETWORKS 2
1.1.1 Changes in Telecommunications in the Late Twentieth
Century 2
1.1.2 The Progress and Future of Telecommunications 4
1.1.3 Present Solutions 5
1.2 TELEPHONE SYSTEMS AND COMPUTER TELEPHONY 6
1.2.1 Telephone Functioning 7
1.2.2 Telephone Networks 10
1.2.3 Telephone Numbering 12
1.3 COMPUTER TELEPHONY 14
1.3.1 Overview of Computer Telephony 15
1.3.2 Internet Telephony 18
1.3.3 Unified Messaging 20
1.3.4 Network Structures and Network Topologies 21
1.4 DISTRIBUTED SYSTEMS AND CLIENT-SERVER
MODELS 24
1.4.1 Centralized Computing vs Distributed and Client-Server
Systems 24
1.4.2 Three-Tier Client-Server Systems 26
1.4.3 Web-Based Application Servers and Electronic
Commerce 28
1.5 PROTOCOLS AND STANDARDIZATION 30
1.5.1 Protocol Syntax and Semantics 30
1.5.2 National and International Standards 31
1.5.3 Telecommunication Standards and Organizations 31
1.5.4 Networks Standards and Organizations 32
ARTICLES 35
RFCS 35
WORLD WIDE WEB SITES 36
Chapter 2 Data Communications
2.1 ADVANTAGES OF DIGITAL COMMUNICATIONS 39
2.2 TRANSMISSION MEDIA 41
2.2.1 Shielded and Unshielded Twisted-Pair (STP and UTP)
Wiring 41
2.2.2 Coaxial Cable 42
2.2.3 Optical Fiber 43
2.2.4 Radio and Microwave 45
2.2.5 Satellite Communications 46
2.3 FUNDAMENTALS OF DIGITAL TRANSMISSION 49
2.3.1 Frequency Spectrum, Bandwidth, and Data Rate 49
2.3.2 Shannon's Law 53
2.3.3 The Sampling (Nyquist) Theorem 55
2.4 DIGITIZATION AND MULTILEVEL TRANSMISSION 56
2.4.1 Pulse Code Modulation (PCM) 56
2.4.2 Advanced Digitization Techniques: CPCM, DPCM, and
ADPCM 59
2.5 MODULATION TECHNIQUES AND MODEMS 60
2.5.1 Amplitude Modulation 60
2.5.2 Frequency Modulation 62
2.5.3 Phase Modulation 63
2.5.4 Modem Technologies 64
2.6 TERMINAL DEVICES 67
2.6.1 Dumb and Intelligent Terminals 67
2.6.2 Data Terminal Equipment and Data Communications
Equipment 68
2.7 WIRELESS t2©MMUNICATION 71
2.7.1 Digitdf Cellular Telephone and Personal Communication
Services (PCS) 73
2.7.2 Wireless Data Services 76
2.7.3 Geographic Position Systems and Their Applications 81
2.8 VIDEOCONFERENCING 85
2.8.1 Desktop Videoconference Systems 86
2.8.2 Document Conference Systems 87
2.8.3 Videoconference Standards 88
2.9 CHAPTER SUMMARY 92
2.10 PROBLEMS 92
2.11 REFERENCES 95
BOOKS 95
ARTICLES 96
WORLD WIDE WEB SITES 96
Chapter 3 The OSI Seven-Layer Network Model
3.1 PHYSICAL LAYER 99
3.1.1 Data Encoding 100
3.1.2 Multiplexing Schemes 102
3.2 DATA LINK LAYER 110
3.2.1 Asynchronous and Synchronous Communications 110
3.2.2 Error Detection and Correction 111
3.2.3 Framing and Flow Control 115
3.2.4 High-Level Data LinkvControl (HDLC) 121
3.3 NETWORK LAYER 123
3.3.1 Subnet Concept 123
3.3.2 Overview of Switching Techniques 124
3.3.3 Routing Strategies 127
3.3.4 Congestion Control 128
3.4 TRANSPORT LAYER AND SESSION LAYER 129
3.5 PRESENTATION LAYER AND APPLICATION LAYER 129
3.5.1 Data Compression 130
3.5.2 Encryption and Decryption 135
3.5.3 Network Applications 135
3.6 NETWORK PERFORMANCE 136
3.6.1 Delay 137
3.6.2 Throughput 137
3.6.3 Bandwidth Utilization 137
3.6.4 Error Rate, Congestion, and Network Reliability 137
3.7 CHAPTER SUMMARY 139
3.8 PROBLEMS 140
3.9 REFERENCES 144
BOOKS 144
WORLD WIDE WEB SITES 145
Chapter 4 LAN Technologies
4.1 LAN OVERVIEW 147
4.2 PROTOCOLS AND STANDARDS 149
4.2.1 IEEE Standards 149
4.2.2 CSMA/CD, Ethernet, and IEEE 802.3 150
4.2.3 Token Bus and IEEE 802.4 153
4.2.4 Token Ring and IEEE 802.5 154
4.2.5 Commercial LAN Systems 155
4.2.6 Wireless LAN and IEEE 802.11 155
4.3 LAN HARDWARE 156
4.3.1 Connecting Components: Cabling, Connectors,
Transceivers, Repeaters, and Network Interface
Cards 156
4.3.2 Workstations and Network Servers 160
4.3.3 Network Storage Systems and Hierarchical Storage
Management (HSM) 162
4.4 LAN SERVICES AND LAN OPERATING SYSTEMS 168
4.4.1 Network File System 168
4.4.2 Network Directory Services 169
4.4.3 Network Printing and Fax Services 170
4.4.4 Backup 171
4.4.5 LAN Operating Systems 173
4.5 CHAPTER SUMMARY 180
4.6 PROBLEMS 181
4.7 REFERENCES 182
BOOKS 182
ARTICLES 184
WORLD WIDE WEB SITES 184
Chapters TCP/IP and the Internet 185
5.1 INTERNET ARCHITECTURE 187
5.1.1 Internet Addresses 187
5.1.2 Gateway Addressing 188
5.1.3 Network and Broadcast Addressing 188
5.1.4 Dotted Decimal Notation 188
5.1.5 Loopback Addressing 189
5.1.6 Weaknesses in Internet Addressing 189
5.1.7 Mapping of Physical and IP Addresses 189
5.1.8 Reverse Address Resolution Protocol (RARP) 191
5.2 INTERNET PROTOCOL (IP) AND DATAGRAMS 192
5.2.1 IP Datagram Format and Types of Service 194
5.2.2 Datagram Encapsulation and Fragmentation 195
5.2.3 Reassembly and Fragmentation Control 196
5.2.4 Other Fields 197
5.2.5 Error and Internet Control Message Protocol (ICMP) 200
5.2.6 IPv6 206
5.3 ROUTING PROTOCOLS 208
5.3.1 Routing Tables and Routing Mechanisms 208
5.3.2 Subnet Routing 214
5.3.3 Internet Routing 216
5.4 USER DATAGRAM PROTOCOL(UDP) 218
5.5 TRANSMISSION CONTROL PROTOCOL (TCP) 219
5.5.1 TCP Headers and Services 220
5.5.2 Connection Establishment and Termination 222
5.5.3 Flow Control and Window Size Advertising 222
5.5.4 TCP Time-Out and Retransmission 223
5.6 INTERNET STANDARD SERVICES 223
5.6.1 File Transfer Protocol (FTP) 224
5.6.2 Simple Mail Transfer Protocol (SMTP) and
Examples 224
5.6.3 Post Office Protocol (POP3) 229
5.6.4 Remote Login and Telnet 233
5.7 DOMAIN NAME SYSTEM (DNS) 233
5.7.1 Mapping Domain Names to IP Addresses 234
5.7.2 DNS Messages 234
5.7.3 Recent Advances in Internet Domain Name
Hierarchy 235
5.8 TCP/IP FOR PCS 236
5.8.1 Serial Line Internet Protocol (SLIP) 236
5.8.2 Point-to-Point (PPP) 236
5.8.3 Winsock 238
5.9 INTERNET APPLICATIONS 238
5.9.1 World Wide Web (WWW) 238
5.9.2 Recent Developments 240
5.10 CHAPTER SUMMARY 242
5.11 PROBLEMS 243
5.12 REFERENCES 249
BOOKS 249
ARTICLES 250
WORLD WIDE WEB SITES 250
RFCS 251
Chapter 6 Access and High-Speed Networking
Technologies 252
6.1 INTEGRATED SERVICE DIGITAL NETWORK (ISDN) 255
6.1.1 ISDN Signaling and Architecture 255
6.1.2 ISDN Protocols 257
6.1.3 ISDN Advantages 258
6.1.4 Broadband ISDN 259
6.2 CABLE MODEM SYSTEMS 261
6.3 DIGITAL SUBSCRIBER LINE (DSL) TECHNOLOGY 263
6.4 SWITCHED MULTIMEGABIT DATA SERVICE (SMDS) 266
6.4.1 SMDS Features 266
6.4.2 SMDS Addressing and Protocols 269
6.5 FRAME RELAY 272
6.5.1 Protocol and Architecture 273
6.5.2 Implementation 276
6.5.3 Frame Relay Performance Analysis and Congestion
Control 281
6.5.4 Voice over Frame Relay 285
6.5.5 Migration Toward ATM 286
6.6 FAST ETHERNET, 1OOVG-ANYLAN, AND GIGABIT
ETHERNET 288
6.6.1 lOOVG-AnyLAN 288
6.6.2 Fast Ethernet 290
6.6.3 Gigabit and 10-Gigabit Ethernet 292
6.7 FDDI AND CDDI 294
6.8 ASYNCHRONOUS TRANSFER MODE (ATM)
NETWORKS 298
6.8.1 ATM Advantages 299
6.8.2 ATM Protocol and ATM Layers 300
6.8.3 ATM Switching 303
6.8.4 ATM Internetworking with Frame Relay 303
6.8.5 IP over ATM 304
6.8.6 ATM Future 305
6.9 SONET 306
6.9.1 SONET Signals and Architecture 307
6.9.2 SONET Layers and Frames 309
6.9.3 SONET Overhead 310
6.9.4 SONET Fault Tolerance 313
6.10 DENSE WAVELENGTH DIVISION MULTIPLEXING
(DWDM) COMMUNICATION 314
6.11 CHAPTER SUMMARY 316
6.12 PROBLEMS 317
6.13 REFERENCES 318
BOOKS 318
WORLD WIDE WEB SITES 319
Chapter 7 Switching and Virtual LAN 321
7.1- HUB TECHNOLOGY 322
7.1.1 Early Hubs 322
7.1.2 Intelligent Hubs and Their Components 322
7.1.3 Interconnecting LANs and Collapsed Backbone
Networks 325
7.2 SWITCHING TECHNOLOGY FOR LAN AND
INTERNETWORKING 327
7.2.1 Switching Architectures 329
7.2.2 Ethernet Switches 331
7.2.3 Token Ring Switches 333
7.2.4 FDDI Switches 336
7.2.5 Switching Network Management 337
7.3 NON-ATM VIRTUAL LANS 338
7.3.1 Segment-Based VLAN 339
7.3.2 MAC-Based VLAN 339
7.3.3 IP-Address-Based VLAN 340
7.4 ATM VIRTUAL LAN 343
7.4.1 ATM LAN Emulation 343
7.4.2 ATM Edge Routers 344
7.4.3 ATM Virtual Routers 346
7.4.4 ATM Relational Networks 347
7.5 IEEE 802.1 Q VLAN STANDARD 349
7.6 CHAPTER SUMMARY 350
7.7 PROBLEMS 350
7.8 REFERENCES 352
BOOKS 352
WORLD WIDE WEB SITES 352
Chapter 8 Network Performance 353
8.1 WHY STUDY NETWORK PERFORMANCE? 353
8.2 ANALYTICAL APPROACHES 355
8.2.1 Delay Throughput Analysis 355
8.2.2 Probability Techniques 358
8.2.3 Queuing Theory Techniques 364
8.2.4 Markov Models 372
8.2.5 Reliability Models 376
8.3 SIMULATION 379
8.3.1 Continuous Simulation 381
8.3.2 Discrete Event Simulation (DEVS) 381
8.3.3 Web-Based Simulation 382
8.3.4 Simulation Models 387
8.4 NETWORK TRAFFIC MONITORING 398
8.4.1 Windows-Based Traffic Monitoring 398
8.4.2 Ethernet Traffic Monitoring 402
8.5 CHAPTER SUMMARY 406
8.6 PROBLEMS 407
8.7 REFERENCES 413
BOOKS 413
WORLD WIDE WEB SITES 414
Chapter 9 Network Management 415
9.1 SNMP 418
9.1.1 Introduction 418
9.1.2 SNMP Model 418
9.1.3 Structure of Management Information 420
9.1.4 SNMPv2 421
9.1.5 SNMPv3 424
9.2 RMON AND RMONV2 425
9.2.1 RMON Model 426
9.2.2 RM0N2 428
9.3 TMN 429
9.3.1 Physical Architecture 431
9.3.2 Interfaces 432
9.3.3 Differences Between TMN and OSI 433
9.4 DIRECTORY SERVICES AND NETWORK
MANAGEMENT 433
9.5 WEB-BASED NETWORK MANAGEMENT 437
9.6 CHAPTER SUMMARY 438
9.7 PROBLEMS 439
9.8 REFERENCES 440
BOOKS 440
WORLD WIDE WEB SITES 440
chapter 10 Communication and Network Security 441
10.1 CRYPTOGRAPHY 444
10.1.1 Secret Key Cryptography 444
10.1.2 Public Key Cryptography 447
10.1.3 The Data Encryption Standard ODES) and Advanced
Encryption Standard (AES) 451
10.1.4 Seri^ Encryption 454
10.1.5 Link-Level, Network-Level, and Application-Level
Encryption 455
10.1.6 Digital Signatures, Message Digest (MD5), and Digital
Certification 457
10.1.7 Pretty Good Privacy (PGP) for E-mail 460
10.1.8 Write Your Onw Encryption Algorithms 461
10.2 DIGITAL CERTIFICATE AND PUBLIC KEY
INFRASTRUCTURE (PKI) 461
10.3 FIREWALLS 464
10.3.1 Packet-Filtering Principle 466
10.3.2 Router-Based Packet-Filtering Firewalls 469
10.3.3 Application Gateway Firewalls 471
10.3.4 Circuit Gateway Firewalls 472
10.3.5 Firewall Architectures 472
10.4 KERBEROS 475
10.5 SECURE SOCKET LAYER (SSL) AND VIRTUAL PRIVATE
NETWORK (VPN) 478
10.5.1 Secure Sockets Layer (SSL) Protocol 478
10.5.2 Virtual Private Network 479
10.6 NEW TECHNOLOGIES IN NETWORK SECURITY
APPLICATIONS 487
10.6.1 Internet Commerce and Electronic Money 488
10.6.2 Secure Containers for Electronic Publishing 488
10.6.3 Smart Cards and Secure Electronic Transactions
(SET) 490
10.6.4 Random One-Time-Pad and No-Key Encryption 492
10.7 CHAPTER SUMMARY 493
10.8 PROBLEMS 494
•10.9 REFERENCES 495
BOOKS 495
ARTICLES, PAPERS, AND PUBLIC DOCUMENTS 496
WORLD WIDE WEB SITES 497
INFORMATION ON FIREWALLS 49/
Chapter 11 Network Programming 498
11.1 SOFTWARE ARCHITECTURES THAT SUPPORT NETWORK
PROGRAMMING 499
11.1.1 Mainframe Architecture 499
11.1.2 File-Sharing Architecture 499
11.1.3 Peer-to-Peer Architecture 499
11.1.4 Client/Server Architecture 500
11.1.5 Two-Tier Architecture 501
11.1.6 Three-Tier Architecture 501
11.2 SERIAL PORT AND PARALLEL PORT
PROGRAMMING 504
11.2.1 Serial Port Programming 504
11.2.2 Parallel Port Programming 512
11.3 NETBIOS PROGRAMMING 514
11.4 TCP/IP AND SOCKET PROGRAMMING 517
11.4.1 Interprocess Communication and Pipes 518
11.4.2 Creation of Sockets 519
11.4.3 Using Internet Library and DNS 521
11.4.4 Socket Connection between Client and Server 524
11.4.5 Blocking, Synchronization, and Timing 530
11.4.6 Sample Client/Server Programs 532
11.5 WINSOCK PROGRAMMING 540
11.5.1 Using Winsock 541
11.5.2 Example Program 543
11.6 RPC PROGRAMMING 544
11.7 JAVA PROGRAMMING 548
11.8 CHAPTER SUMMARY 553
11.9 PROBLEMS 554
11.10 REFERENCES 556
BOOKS 556
ARTICLES 557
WORLD WIDE WEB SITES 557

0195113985 (alk. paper)


Computer Networks.

004.6 / ZHE/N