Networks for computer scientists and engineers / Youlu Zheng, Shakil Akhtar.

By: Zheng, YouluMaterial type: TextTextPublication details: New York : Oxford University Press, 2002Description: xvi, 575 p. : 24 cmISBN: 0195113985 (alk. paper)Subject(s): Computer NetworksDDC classification: 004.6
Contents:
Chapter 1 Introduction 1 1.1 EVOLUTION OF DATA COMMUNICATIONS AND NETWORKS 2 1.1.1 Changes in Telecommunications in the Late Twentieth Century 2 1.1.2 The Progress and Future of Telecommunications 4 1.1.3 Present Solutions 5 1.2 TELEPHONE SYSTEMS AND COMPUTER TELEPHONY 6 1.2.1 Telephone Functioning 7 1.2.2 Telephone Networks 10 1.2.3 Telephone Numbering 12 1.3 COMPUTER TELEPHONY 14 1.3.1 Overview of Computer Telephony 15 1.3.2 Internet Telephony 18 1.3.3 Unified Messaging 20 1.3.4 Network Structures and Network Topologies 21 1.4 DISTRIBUTED SYSTEMS AND CLIENT-SERVER MODELS 24 1.4.1 Centralized Computing vs Distributed and Client-Server Systems 24 1.4.2 Three-Tier Client-Server Systems 26 1.4.3 Web-Based Application Servers and Electronic Commerce 28 1.5 PROTOCOLS AND STANDARDIZATION 30 1.5.1 Protocol Syntax and Semantics 30 1.5.2 National and International Standards 31 1.5.3 Telecommunication Standards and Organizations 31 1.5.4 Networks Standards and Organizations 32 ARTICLES 35 RFCS 35 WORLD WIDE WEB SITES 36 Chapter 2 Data Communications 2.1 ADVANTAGES OF DIGITAL COMMUNICATIONS 39 2.2 TRANSMISSION MEDIA 41 2.2.1 Shielded and Unshielded Twisted-Pair (STP and UTP) Wiring 41 2.2.2 Coaxial Cable 42 2.2.3 Optical Fiber 43 2.2.4 Radio and Microwave 45 2.2.5 Satellite Communications 46 2.3 FUNDAMENTALS OF DIGITAL TRANSMISSION 49 2.3.1 Frequency Spectrum, Bandwidth, and Data Rate 49 2.3.2 Shannon's Law 53 2.3.3 The Sampling (Nyquist) Theorem 55 2.4 DIGITIZATION AND MULTILEVEL TRANSMISSION 56 2.4.1 Pulse Code Modulation (PCM) 56 2.4.2 Advanced Digitization Techniques: CPCM, DPCM, and ADPCM 59 2.5 MODULATION TECHNIQUES AND MODEMS 60 2.5.1 Amplitude Modulation 60 2.5.2 Frequency Modulation 62 2.5.3 Phase Modulation 63 2.5.4 Modem Technologies 64 2.6 TERMINAL DEVICES 67 2.6.1 Dumb and Intelligent Terminals 67 2.6.2 Data Terminal Equipment and Data Communications Equipment 68 2.7 WIRELESS t2©MMUNICATION 71 2.7.1 Digitdf Cellular Telephone and Personal Communication Services (PCS) 73 2.7.2 Wireless Data Services 76 2.7.3 Geographic Position Systems and Their Applications 81 2.8 VIDEOCONFERENCING 85 2.8.1 Desktop Videoconference Systems 86 2.8.2 Document Conference Systems 87 2.8.3 Videoconference Standards 88 2.9 CHAPTER SUMMARY 92 2.10 PROBLEMS 92 2.11 REFERENCES 95 BOOKS 95 ARTICLES 96 WORLD WIDE WEB SITES 96 Chapter 3 The OSI Seven-Layer Network Model 3.1 PHYSICAL LAYER 99 3.1.1 Data Encoding 100 3.1.2 Multiplexing Schemes 102 3.2 DATA LINK LAYER 110 3.2.1 Asynchronous and Synchronous Communications 110 3.2.2 Error Detection and Correction 111 3.2.3 Framing and Flow Control 115 3.2.4 High-Level Data LinkvControl (HDLC) 121 3.3 NETWORK LAYER 123 3.3.1 Subnet Concept 123 3.3.2 Overview of Switching Techniques 124 3.3.3 Routing Strategies 127 3.3.4 Congestion Control 128 3.4 TRANSPORT LAYER AND SESSION LAYER 129 3.5 PRESENTATION LAYER AND APPLICATION LAYER 129 3.5.1 Data Compression 130 3.5.2 Encryption and Decryption 135 3.5.3 Network Applications 135 3.6 NETWORK PERFORMANCE 136 3.6.1 Delay 137 3.6.2 Throughput 137 3.6.3 Bandwidth Utilization 137 3.6.4 Error Rate, Congestion, and Network Reliability 137 3.7 CHAPTER SUMMARY 139 3.8 PROBLEMS 140 3.9 REFERENCES 144 BOOKS 144 WORLD WIDE WEB SITES 145 Chapter 4 LAN Technologies 4.1 LAN OVERVIEW 147 4.2 PROTOCOLS AND STANDARDS 149 4.2.1 IEEE Standards 149 4.2.2 CSMA/CD, Ethernet, and IEEE 802.3 150 4.2.3 Token Bus and IEEE 802.4 153 4.2.4 Token Ring and IEEE 802.5 154 4.2.5 Commercial LAN Systems 155 4.2.6 Wireless LAN and IEEE 802.11 155 4.3 LAN HARDWARE 156 4.3.1 Connecting Components: Cabling, Connectors, Transceivers, Repeaters, and Network Interface Cards 156 4.3.2 Workstations and Network Servers 160 4.3.3 Network Storage Systems and Hierarchical Storage Management (HSM) 162 4.4 LAN SERVICES AND LAN OPERATING SYSTEMS 168 4.4.1 Network File System 168 4.4.2 Network Directory Services 169 4.4.3 Network Printing and Fax Services 170 4.4.4 Backup 171 4.4.5 LAN Operating Systems 173 4.5 CHAPTER SUMMARY 180 4.6 PROBLEMS 181 4.7 REFERENCES 182 BOOKS 182 ARTICLES 184 WORLD WIDE WEB SITES 184 Chapters TCP/IP and the Internet 185 5.1 INTERNET ARCHITECTURE 187 5.1.1 Internet Addresses 187 5.1.2 Gateway Addressing 188 5.1.3 Network and Broadcast Addressing 188 5.1.4 Dotted Decimal Notation 188 5.1.5 Loopback Addressing 189 5.1.6 Weaknesses in Internet Addressing 189 5.1.7 Mapping of Physical and IP Addresses 189 5.1.8 Reverse Address Resolution Protocol (RARP) 191 5.2 INTERNET PROTOCOL (IP) AND DATAGRAMS 192 5.2.1 IP Datagram Format and Types of Service 194 5.2.2 Datagram Encapsulation and Fragmentation 195 5.2.3 Reassembly and Fragmentation Control 196 5.2.4 Other Fields 197 5.2.5 Error and Internet Control Message Protocol (ICMP) 200 5.2.6 IPv6 206 5.3 ROUTING PROTOCOLS 208 5.3.1 Routing Tables and Routing Mechanisms 208 5.3.2 Subnet Routing 214 5.3.3 Internet Routing 216 5.4 USER DATAGRAM PROTOCOL(UDP) 218 5.5 TRANSMISSION CONTROL PROTOCOL (TCP) 219 5.5.1 TCP Headers and Services 220 5.5.2 Connection Establishment and Termination 222 5.5.3 Flow Control and Window Size Advertising 222 5.5.4 TCP Time-Out and Retransmission 223 5.6 INTERNET STANDARD SERVICES 223 5.6.1 File Transfer Protocol (FTP) 224 5.6.2 Simple Mail Transfer Protocol (SMTP) and Examples 224 5.6.3 Post Office Protocol (POP3) 229 5.6.4 Remote Login and Telnet 233 5.7 DOMAIN NAME SYSTEM (DNS) 233 5.7.1 Mapping Domain Names to IP Addresses 234 5.7.2 DNS Messages 234 5.7.3 Recent Advances in Internet Domain Name Hierarchy 235 5.8 TCP/IP FOR PCS 236 5.8.1 Serial Line Internet Protocol (SLIP) 236 5.8.2 Point-to-Point (PPP) 236 5.8.3 Winsock 238 5.9 INTERNET APPLICATIONS 238 5.9.1 World Wide Web (WWW) 238 5.9.2 Recent Developments 240 5.10 CHAPTER SUMMARY 242 5.11 PROBLEMS 243 5.12 REFERENCES 249 BOOKS 249 ARTICLES 250 WORLD WIDE WEB SITES 250 RFCS 251 Chapter 6 Access and High-Speed Networking Technologies 252 6.1 INTEGRATED SERVICE DIGITAL NETWORK (ISDN) 255 6.1.1 ISDN Signaling and Architecture 255 6.1.2 ISDN Protocols 257 6.1.3 ISDN Advantages 258 6.1.4 Broadband ISDN 259 6.2 CABLE MODEM SYSTEMS 261 6.3 DIGITAL SUBSCRIBER LINE (DSL) TECHNOLOGY 263 6.4 SWITCHED MULTIMEGABIT DATA SERVICE (SMDS) 266 6.4.1 SMDS Features 266 6.4.2 SMDS Addressing and Protocols 269 6.5 FRAME RELAY 272 6.5.1 Protocol and Architecture 273 6.5.2 Implementation 276 6.5.3 Frame Relay Performance Analysis and Congestion Control 281 6.5.4 Voice over Frame Relay 285 6.5.5 Migration Toward ATM 286 6.6 FAST ETHERNET, 1OOVG-ANYLAN, AND GIGABIT ETHERNET 288 6.6.1 lOOVG-AnyLAN 288 6.6.2 Fast Ethernet 290 6.6.3 Gigabit and 10-Gigabit Ethernet 292 6.7 FDDI AND CDDI 294 6.8 ASYNCHRONOUS TRANSFER MODE (ATM) NETWORKS 298 6.8.1 ATM Advantages 299 6.8.2 ATM Protocol and ATM Layers 300 6.8.3 ATM Switching 303 6.8.4 ATM Internetworking with Frame Relay 303 6.8.5 IP over ATM 304 6.8.6 ATM Future 305 6.9 SONET 306 6.9.1 SONET Signals and Architecture 307 6.9.2 SONET Layers and Frames 309 6.9.3 SONET Overhead 310 6.9.4 SONET Fault Tolerance 313 6.10 DENSE WAVELENGTH DIVISION MULTIPLEXING (DWDM) COMMUNICATION 314 6.11 CHAPTER SUMMARY 316 6.12 PROBLEMS 317 6.13 REFERENCES 318 BOOKS 318 WORLD WIDE WEB SITES 319 Chapter 7 Switching and Virtual LAN 321 7.1- HUB TECHNOLOGY 322 7.1.1 Early Hubs 322 7.1.2 Intelligent Hubs and Their Components 322 7.1.3 Interconnecting LANs and Collapsed Backbone Networks 325 7.2 SWITCHING TECHNOLOGY FOR LAN AND INTERNETWORKING 327 7.2.1 Switching Architectures 329 7.2.2 Ethernet Switches 331 7.2.3 Token Ring Switches 333 7.2.4 FDDI Switches 336 7.2.5 Switching Network Management 337 7.3 NON-ATM VIRTUAL LANS 338 7.3.1 Segment-Based VLAN 339 7.3.2 MAC-Based VLAN 339 7.3.3 IP-Address-Based VLAN 340 7.4 ATM VIRTUAL LAN 343 7.4.1 ATM LAN Emulation 343 7.4.2 ATM Edge Routers 344 7.4.3 ATM Virtual Routers 346 7.4.4 ATM Relational Networks 347 7.5 IEEE 802.1 Q VLAN STANDARD 349 7.6 CHAPTER SUMMARY 350 7.7 PROBLEMS 350 7.8 REFERENCES 352 BOOKS 352 WORLD WIDE WEB SITES 352 Chapter 8 Network Performance 353 8.1 WHY STUDY NETWORK PERFORMANCE? 353 8.2 ANALYTICAL APPROACHES 355 8.2.1 Delay Throughput Analysis 355 8.2.2 Probability Techniques 358 8.2.3 Queuing Theory Techniques 364 8.2.4 Markov Models 372 8.2.5 Reliability Models 376 8.3 SIMULATION 379 8.3.1 Continuous Simulation 381 8.3.2 Discrete Event Simulation (DEVS) 381 8.3.3 Web-Based Simulation 382 8.3.4 Simulation Models 387 8.4 NETWORK TRAFFIC MONITORING 398 8.4.1 Windows-Based Traffic Monitoring 398 8.4.2 Ethernet Traffic Monitoring 402 8.5 CHAPTER SUMMARY 406 8.6 PROBLEMS 407 8.7 REFERENCES 413 BOOKS 413 WORLD WIDE WEB SITES 414 Chapter 9 Network Management 415 9.1 SNMP 418 9.1.1 Introduction 418 9.1.2 SNMP Model 418 9.1.3 Structure of Management Information 420 9.1.4 SNMPv2 421 9.1.5 SNMPv3 424 9.2 RMON AND RMONV2 425 9.2.1 RMON Model 426 9.2.2 RM0N2 428 9.3 TMN 429 9.3.1 Physical Architecture 431 9.3.2 Interfaces 432 9.3.3 Differences Between TMN and OSI 433 9.4 DIRECTORY SERVICES AND NETWORK MANAGEMENT 433 9.5 WEB-BASED NETWORK MANAGEMENT 437 9.6 CHAPTER SUMMARY 438 9.7 PROBLEMS 439 9.8 REFERENCES 440 BOOKS 440 WORLD WIDE WEB SITES 440 chapter 10 Communication and Network Security 441 10.1 CRYPTOGRAPHY 444 10.1.1 Secret Key Cryptography 444 10.1.2 Public Key Cryptography 447 10.1.3 The Data Encryption Standard ODES) and Advanced Encryption Standard (AES) 451 10.1.4 Seri^ Encryption 454 10.1.5 Link-Level, Network-Level, and Application-Level Encryption 455 10.1.6 Digital Signatures, Message Digest (MD5), and Digital Certification 457 10.1.7 Pretty Good Privacy (PGP) for E-mail 460 10.1.8 Write Your Onw Encryption Algorithms 461 10.2 DIGITAL CERTIFICATE AND PUBLIC KEY INFRASTRUCTURE (PKI) 461 10.3 FIREWALLS 464 10.3.1 Packet-Filtering Principle 466 10.3.2 Router-Based Packet-Filtering Firewalls 469 10.3.3 Application Gateway Firewalls 471 10.3.4 Circuit Gateway Firewalls 472 10.3.5 Firewall Architectures 472 10.4 KERBEROS 475 10.5 SECURE SOCKET LAYER (SSL) AND VIRTUAL PRIVATE NETWORK (VPN) 478 10.5.1 Secure Sockets Layer (SSL) Protocol 478 10.5.2 Virtual Private Network 479 10.6 NEW TECHNOLOGIES IN NETWORK SECURITY APPLICATIONS 487 10.6.1 Internet Commerce and Electronic Money 488 10.6.2 Secure Containers for Electronic Publishing 488 10.6.3 Smart Cards and Secure Electronic Transactions (SET) 490 10.6.4 Random One-Time-Pad and No-Key Encryption 492 10.7 CHAPTER SUMMARY 493 10.8 PROBLEMS 494 •10.9 REFERENCES 495 BOOKS 495 ARTICLES, PAPERS, AND PUBLIC DOCUMENTS 496 WORLD WIDE WEB SITES 497 INFORMATION ON FIREWALLS 49/ Chapter 11 Network Programming 498 11.1 SOFTWARE ARCHITECTURES THAT SUPPORT NETWORK PROGRAMMING 499 11.1.1 Mainframe Architecture 499 11.1.2 File-Sharing Architecture 499 11.1.3 Peer-to-Peer Architecture 499 11.1.4 Client/Server Architecture 500 11.1.5 Two-Tier Architecture 501 11.1.6 Three-Tier Architecture 501 11.2 SERIAL PORT AND PARALLEL PORT PROGRAMMING 504 11.2.1 Serial Port Programming 504 11.2.2 Parallel Port Programming 512 11.3 NETBIOS PROGRAMMING 514 11.4 TCP/IP AND SOCKET PROGRAMMING 517 11.4.1 Interprocess Communication and Pipes 518 11.4.2 Creation of Sockets 519 11.4.3 Using Internet Library and DNS 521 11.4.4 Socket Connection between Client and Server 524 11.4.5 Blocking, Synchronization, and Timing 530 11.4.6 Sample Client/Server Programs 532 11.5 WINSOCK PROGRAMMING 540 11.5.1 Using Winsock 541 11.5.2 Example Program 543 11.6 RPC PROGRAMMING 544 11.7 JAVA PROGRAMMING 548 11.8 CHAPTER SUMMARY 553 11.9 PROBLEMS 554 11.10 REFERENCES 556 BOOKS 556 ARTICLES 557 WORLD WIDE WEB SITES 557
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
004.6 ZHE/N (Browse shelf(Opens below)) Available P19510
General Books General Books Central Library, Sikkim University
General Book Section
004.6 ZHE/N (Browse shelf(Opens below)) Available P19508
Total holds: 0

Chapter 1 Introduction 1
1.1 EVOLUTION OF DATA COMMUNICATIONS AND
NETWORKS 2
1.1.1 Changes in Telecommunications in the Late Twentieth
Century 2
1.1.2 The Progress and Future of Telecommunications 4
1.1.3 Present Solutions 5
1.2 TELEPHONE SYSTEMS AND COMPUTER TELEPHONY 6
1.2.1 Telephone Functioning 7
1.2.2 Telephone Networks 10
1.2.3 Telephone Numbering 12
1.3 COMPUTER TELEPHONY 14
1.3.1 Overview of Computer Telephony 15
1.3.2 Internet Telephony 18
1.3.3 Unified Messaging 20
1.3.4 Network Structures and Network Topologies 21
1.4 DISTRIBUTED SYSTEMS AND CLIENT-SERVER
MODELS 24
1.4.1 Centralized Computing vs Distributed and Client-Server
Systems 24
1.4.2 Three-Tier Client-Server Systems 26
1.4.3 Web-Based Application Servers and Electronic
Commerce 28
1.5 PROTOCOLS AND STANDARDIZATION 30
1.5.1 Protocol Syntax and Semantics 30
1.5.2 National and International Standards 31
1.5.3 Telecommunication Standards and Organizations 31
1.5.4 Networks Standards and Organizations 32
ARTICLES 35
RFCS 35
WORLD WIDE WEB SITES 36
Chapter 2 Data Communications
2.1 ADVANTAGES OF DIGITAL COMMUNICATIONS 39
2.2 TRANSMISSION MEDIA 41
2.2.1 Shielded and Unshielded Twisted-Pair (STP and UTP)
Wiring 41
2.2.2 Coaxial Cable 42
2.2.3 Optical Fiber 43
2.2.4 Radio and Microwave 45
2.2.5 Satellite Communications 46
2.3 FUNDAMENTALS OF DIGITAL TRANSMISSION 49
2.3.1 Frequency Spectrum, Bandwidth, and Data Rate 49
2.3.2 Shannon's Law 53
2.3.3 The Sampling (Nyquist) Theorem 55
2.4 DIGITIZATION AND MULTILEVEL TRANSMISSION 56
2.4.1 Pulse Code Modulation (PCM) 56
2.4.2 Advanced Digitization Techniques: CPCM, DPCM, and
ADPCM 59
2.5 MODULATION TECHNIQUES AND MODEMS 60
2.5.1 Amplitude Modulation 60
2.5.2 Frequency Modulation 62
2.5.3 Phase Modulation 63
2.5.4 Modem Technologies 64
2.6 TERMINAL DEVICES 67
2.6.1 Dumb and Intelligent Terminals 67
2.6.2 Data Terminal Equipment and Data Communications
Equipment 68
2.7 WIRELESS t2©MMUNICATION 71
2.7.1 Digitdf Cellular Telephone and Personal Communication
Services (PCS) 73
2.7.2 Wireless Data Services 76
2.7.3 Geographic Position Systems and Their Applications 81
2.8 VIDEOCONFERENCING 85
2.8.1 Desktop Videoconference Systems 86
2.8.2 Document Conference Systems 87
2.8.3 Videoconference Standards 88
2.9 CHAPTER SUMMARY 92
2.10 PROBLEMS 92
2.11 REFERENCES 95
BOOKS 95
ARTICLES 96
WORLD WIDE WEB SITES 96
Chapter 3 The OSI Seven-Layer Network Model
3.1 PHYSICAL LAYER 99
3.1.1 Data Encoding 100
3.1.2 Multiplexing Schemes 102
3.2 DATA LINK LAYER 110
3.2.1 Asynchronous and Synchronous Communications 110
3.2.2 Error Detection and Correction 111
3.2.3 Framing and Flow Control 115
3.2.4 High-Level Data LinkvControl (HDLC) 121
3.3 NETWORK LAYER 123
3.3.1 Subnet Concept 123
3.3.2 Overview of Switching Techniques 124
3.3.3 Routing Strategies 127
3.3.4 Congestion Control 128
3.4 TRANSPORT LAYER AND SESSION LAYER 129
3.5 PRESENTATION LAYER AND APPLICATION LAYER 129
3.5.1 Data Compression 130
3.5.2 Encryption and Decryption 135
3.5.3 Network Applications 135
3.6 NETWORK PERFORMANCE 136
3.6.1 Delay 137
3.6.2 Throughput 137
3.6.3 Bandwidth Utilization 137
3.6.4 Error Rate, Congestion, and Network Reliability 137
3.7 CHAPTER SUMMARY 139
3.8 PROBLEMS 140
3.9 REFERENCES 144
BOOKS 144
WORLD WIDE WEB SITES 145
Chapter 4 LAN Technologies
4.1 LAN OVERVIEW 147
4.2 PROTOCOLS AND STANDARDS 149
4.2.1 IEEE Standards 149
4.2.2 CSMA/CD, Ethernet, and IEEE 802.3 150
4.2.3 Token Bus and IEEE 802.4 153
4.2.4 Token Ring and IEEE 802.5 154
4.2.5 Commercial LAN Systems 155
4.2.6 Wireless LAN and IEEE 802.11 155
4.3 LAN HARDWARE 156
4.3.1 Connecting Components: Cabling, Connectors,
Transceivers, Repeaters, and Network Interface
Cards 156
4.3.2 Workstations and Network Servers 160
4.3.3 Network Storage Systems and Hierarchical Storage
Management (HSM) 162
4.4 LAN SERVICES AND LAN OPERATING SYSTEMS 168
4.4.1 Network File System 168
4.4.2 Network Directory Services 169
4.4.3 Network Printing and Fax Services 170
4.4.4 Backup 171
4.4.5 LAN Operating Systems 173
4.5 CHAPTER SUMMARY 180
4.6 PROBLEMS 181
4.7 REFERENCES 182
BOOKS 182
ARTICLES 184
WORLD WIDE WEB SITES 184
Chapters TCP/IP and the Internet 185
5.1 INTERNET ARCHITECTURE 187
5.1.1 Internet Addresses 187
5.1.2 Gateway Addressing 188
5.1.3 Network and Broadcast Addressing 188
5.1.4 Dotted Decimal Notation 188
5.1.5 Loopback Addressing 189
5.1.6 Weaknesses in Internet Addressing 189
5.1.7 Mapping of Physical and IP Addresses 189
5.1.8 Reverse Address Resolution Protocol (RARP) 191
5.2 INTERNET PROTOCOL (IP) AND DATAGRAMS 192
5.2.1 IP Datagram Format and Types of Service 194
5.2.2 Datagram Encapsulation and Fragmentation 195
5.2.3 Reassembly and Fragmentation Control 196
5.2.4 Other Fields 197
5.2.5 Error and Internet Control Message Protocol (ICMP) 200
5.2.6 IPv6 206
5.3 ROUTING PROTOCOLS 208
5.3.1 Routing Tables and Routing Mechanisms 208
5.3.2 Subnet Routing 214
5.3.3 Internet Routing 216
5.4 USER DATAGRAM PROTOCOL(UDP) 218
5.5 TRANSMISSION CONTROL PROTOCOL (TCP) 219
5.5.1 TCP Headers and Services 220
5.5.2 Connection Establishment and Termination 222
5.5.3 Flow Control and Window Size Advertising 222
5.5.4 TCP Time-Out and Retransmission 223
5.6 INTERNET STANDARD SERVICES 223
5.6.1 File Transfer Protocol (FTP) 224
5.6.2 Simple Mail Transfer Protocol (SMTP) and
Examples 224
5.6.3 Post Office Protocol (POP3) 229
5.6.4 Remote Login and Telnet 233
5.7 DOMAIN NAME SYSTEM (DNS) 233
5.7.1 Mapping Domain Names to IP Addresses 234
5.7.2 DNS Messages 234
5.7.3 Recent Advances in Internet Domain Name
Hierarchy 235
5.8 TCP/IP FOR PCS 236
5.8.1 Serial Line Internet Protocol (SLIP) 236
5.8.2 Point-to-Point (PPP) 236
5.8.3 Winsock 238
5.9 INTERNET APPLICATIONS 238
5.9.1 World Wide Web (WWW) 238
5.9.2 Recent Developments 240
5.10 CHAPTER SUMMARY 242
5.11 PROBLEMS 243
5.12 REFERENCES 249
BOOKS 249
ARTICLES 250
WORLD WIDE WEB SITES 250
RFCS 251
Chapter 6 Access and High-Speed Networking
Technologies 252
6.1 INTEGRATED SERVICE DIGITAL NETWORK (ISDN) 255
6.1.1 ISDN Signaling and Architecture 255
6.1.2 ISDN Protocols 257
6.1.3 ISDN Advantages 258
6.1.4 Broadband ISDN 259
6.2 CABLE MODEM SYSTEMS 261
6.3 DIGITAL SUBSCRIBER LINE (DSL) TECHNOLOGY 263
6.4 SWITCHED MULTIMEGABIT DATA SERVICE (SMDS) 266
6.4.1 SMDS Features 266
6.4.2 SMDS Addressing and Protocols 269
6.5 FRAME RELAY 272
6.5.1 Protocol and Architecture 273
6.5.2 Implementation 276
6.5.3 Frame Relay Performance Analysis and Congestion
Control 281
6.5.4 Voice over Frame Relay 285
6.5.5 Migration Toward ATM 286
6.6 FAST ETHERNET, 1OOVG-ANYLAN, AND GIGABIT
ETHERNET 288
6.6.1 lOOVG-AnyLAN 288
6.6.2 Fast Ethernet 290
6.6.3 Gigabit and 10-Gigabit Ethernet 292
6.7 FDDI AND CDDI 294
6.8 ASYNCHRONOUS TRANSFER MODE (ATM)
NETWORKS 298
6.8.1 ATM Advantages 299
6.8.2 ATM Protocol and ATM Layers 300
6.8.3 ATM Switching 303
6.8.4 ATM Internetworking with Frame Relay 303
6.8.5 IP over ATM 304
6.8.6 ATM Future 305
6.9 SONET 306
6.9.1 SONET Signals and Architecture 307
6.9.2 SONET Layers and Frames 309
6.9.3 SONET Overhead 310
6.9.4 SONET Fault Tolerance 313
6.10 DENSE WAVELENGTH DIVISION MULTIPLEXING
(DWDM) COMMUNICATION 314
6.11 CHAPTER SUMMARY 316
6.12 PROBLEMS 317
6.13 REFERENCES 318
BOOKS 318
WORLD WIDE WEB SITES 319
Chapter 7 Switching and Virtual LAN 321
7.1- HUB TECHNOLOGY 322
7.1.1 Early Hubs 322
7.1.2 Intelligent Hubs and Their Components 322
7.1.3 Interconnecting LANs and Collapsed Backbone
Networks 325
7.2 SWITCHING TECHNOLOGY FOR LAN AND
INTERNETWORKING 327
7.2.1 Switching Architectures 329
7.2.2 Ethernet Switches 331
7.2.3 Token Ring Switches 333
7.2.4 FDDI Switches 336
7.2.5 Switching Network Management 337
7.3 NON-ATM VIRTUAL LANS 338
7.3.1 Segment-Based VLAN 339
7.3.2 MAC-Based VLAN 339
7.3.3 IP-Address-Based VLAN 340
7.4 ATM VIRTUAL LAN 343
7.4.1 ATM LAN Emulation 343
7.4.2 ATM Edge Routers 344
7.4.3 ATM Virtual Routers 346
7.4.4 ATM Relational Networks 347
7.5 IEEE 802.1 Q VLAN STANDARD 349
7.6 CHAPTER SUMMARY 350
7.7 PROBLEMS 350
7.8 REFERENCES 352
BOOKS 352
WORLD WIDE WEB SITES 352
Chapter 8 Network Performance 353
8.1 WHY STUDY NETWORK PERFORMANCE? 353
8.2 ANALYTICAL APPROACHES 355
8.2.1 Delay Throughput Analysis 355
8.2.2 Probability Techniques 358
8.2.3 Queuing Theory Techniques 364
8.2.4 Markov Models 372
8.2.5 Reliability Models 376
8.3 SIMULATION 379
8.3.1 Continuous Simulation 381
8.3.2 Discrete Event Simulation (DEVS) 381
8.3.3 Web-Based Simulation 382
8.3.4 Simulation Models 387
8.4 NETWORK TRAFFIC MONITORING 398
8.4.1 Windows-Based Traffic Monitoring 398
8.4.2 Ethernet Traffic Monitoring 402
8.5 CHAPTER SUMMARY 406
8.6 PROBLEMS 407
8.7 REFERENCES 413
BOOKS 413
WORLD WIDE WEB SITES 414
Chapter 9 Network Management 415
9.1 SNMP 418
9.1.1 Introduction 418
9.1.2 SNMP Model 418
9.1.3 Structure of Management Information 420
9.1.4 SNMPv2 421
9.1.5 SNMPv3 424
9.2 RMON AND RMONV2 425
9.2.1 RMON Model 426
9.2.2 RM0N2 428
9.3 TMN 429
9.3.1 Physical Architecture 431
9.3.2 Interfaces 432
9.3.3 Differences Between TMN and OSI 433
9.4 DIRECTORY SERVICES AND NETWORK
MANAGEMENT 433
9.5 WEB-BASED NETWORK MANAGEMENT 437
9.6 CHAPTER SUMMARY 438
9.7 PROBLEMS 439
9.8 REFERENCES 440
BOOKS 440
WORLD WIDE WEB SITES 440
chapter 10 Communication and Network Security 441
10.1 CRYPTOGRAPHY 444
10.1.1 Secret Key Cryptography 444
10.1.2 Public Key Cryptography 447
10.1.3 The Data Encryption Standard ODES) and Advanced
Encryption Standard (AES) 451
10.1.4 Seri^ Encryption 454
10.1.5 Link-Level, Network-Level, and Application-Level
Encryption 455
10.1.6 Digital Signatures, Message Digest (MD5), and Digital
Certification 457
10.1.7 Pretty Good Privacy (PGP) for E-mail 460
10.1.8 Write Your Onw Encryption Algorithms 461
10.2 DIGITAL CERTIFICATE AND PUBLIC KEY
INFRASTRUCTURE (PKI) 461
10.3 FIREWALLS 464
10.3.1 Packet-Filtering Principle 466
10.3.2 Router-Based Packet-Filtering Firewalls 469
10.3.3 Application Gateway Firewalls 471
10.3.4 Circuit Gateway Firewalls 472
10.3.5 Firewall Architectures 472
10.4 KERBEROS 475
10.5 SECURE SOCKET LAYER (SSL) AND VIRTUAL PRIVATE
NETWORK (VPN) 478
10.5.1 Secure Sockets Layer (SSL) Protocol 478
10.5.2 Virtual Private Network 479
10.6 NEW TECHNOLOGIES IN NETWORK SECURITY
APPLICATIONS 487
10.6.1 Internet Commerce and Electronic Money 488
10.6.2 Secure Containers for Electronic Publishing 488
10.6.3 Smart Cards and Secure Electronic Transactions
(SET) 490
10.6.4 Random One-Time-Pad and No-Key Encryption 492
10.7 CHAPTER SUMMARY 493
10.8 PROBLEMS 494
•10.9 REFERENCES 495
BOOKS 495
ARTICLES, PAPERS, AND PUBLIC DOCUMENTS 496
WORLD WIDE WEB SITES 497
INFORMATION ON FIREWALLS 49/
Chapter 11 Network Programming 498
11.1 SOFTWARE ARCHITECTURES THAT SUPPORT NETWORK
PROGRAMMING 499
11.1.1 Mainframe Architecture 499
11.1.2 File-Sharing Architecture 499
11.1.3 Peer-to-Peer Architecture 499
11.1.4 Client/Server Architecture 500
11.1.5 Two-Tier Architecture 501
11.1.6 Three-Tier Architecture 501
11.2 SERIAL PORT AND PARALLEL PORT
PROGRAMMING 504
11.2.1 Serial Port Programming 504
11.2.2 Parallel Port Programming 512
11.3 NETBIOS PROGRAMMING 514
11.4 TCP/IP AND SOCKET PROGRAMMING 517
11.4.1 Interprocess Communication and Pipes 518
11.4.2 Creation of Sockets 519
11.4.3 Using Internet Library and DNS 521
11.4.4 Socket Connection between Client and Server 524
11.4.5 Blocking, Synchronization, and Timing 530
11.4.6 Sample Client/Server Programs 532
11.5 WINSOCK PROGRAMMING 540
11.5.1 Using Winsock 541
11.5.2 Example Program 543
11.6 RPC PROGRAMMING 544
11.7 JAVA PROGRAMMING 548
11.8 CHAPTER SUMMARY 553
11.9 PROBLEMS 554
11.10 REFERENCES 556
BOOKS 556
ARTICLES 557
WORLD WIDE WEB SITES 557

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha