Data Communications and Networking

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Data Communications and Networking is designed to help students understand the basics of data communications and networking, and the protocols used in the Internet in particular by using the protocol layering of the Internet and TCP/IP protocol suite. Technologies related to data communication and networking may be the fastest growing in today's culture. The appearance of some new social networking applications is a testimony to this claim. In this Internet-oriented society, specialists need to be trained to run and manage the Internet, part of the Internet, or an organization's network that is connected to the Internet. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field. Using a bottom-up approach, Data Communications and Networking presents this highly technical subject matter without relying on complex formulas by using a strong pedagogical approach supported by more than 830 figures. Now in its Fifth Edition, this textbook brings the beginning student right to the forefront of the latest advances in the field, while presenting the fundamentals in a clear, straightforward manner. Students will find better coverage, improved figures and better explanations on cutting-edge material. The "bottom-up" approach allows instructors to cover the material in one course, rather than having separate courses on data communications and networking.

Author(s): Behrouz A. Forouzan
Edition: 5
Publisher: McGraw Hill
Year: 2012

Language: English
Pages: 1264
City: New York, NY
Tags: Forouzan, Communication

Cover Page
Half Title Page
Title Page
Copyrigth Page
Dedication
Brief Contents
Contents
Preface
PART I: Overview
Chapter 1 Introduction
1.1 DATA COMMUNICATIONS
1.1.1 Components
1.1.2 Data Representation
1.1.3 Data Flow
1.2NETWORKS
1.2.1 Network Criteria
1.2.2 Physical Structures
1.3 NETWORK TYPES
1.3.1 Local Area Network
1.3.2 Wide Area Network
1.3.3 Switching
1.3.4 The Internet
1.3.5 Accessing the Internet
1.4 INTERNET HISTORY
1.4.1 Early History
1.4.2 Birth of the Internet
1.4.3 Internet Today
1.5 STANDARDS AND ADMINISTRATION
1.5.1 Internet Standards
1.5.2 Internet Administration
1.6 END-CHAPTER MATERIALS
1.6.1 Recommended Reading
1.6.2 Key Terms
1.6.3 Summary
1.7 PRACTICE SET
1.7.1 Quizzes
1.7.2 Questions
1.7.3 Problems
1.8 SIMULATION EXPERIMENTS
1.8.1 Applets
1.8.2 Lab Assignments
Chapter 2 Network Models
2.1 PROTOCOL LAYERING
2.1.1 Scenarios
2.1.2 Principles of Protocol Layering
2.1.3 Logical Connections
2.2 TCP/IP PROTOCOL SUITE
2.2.1 Layered Architecture
2.2.2 Layers in the TCP/IP Protocol Suie
2.2.3 Description of Each Layer
2.2.4 Encapsulation and Decapsulation
2.2.5 Addressing
2.2.6 Multiplexing and Demultiplexing
2.3 THE OSI MODEL
2.3.1 OSI versus TCP/IP
2.3.2 Lack of OSI Model’s Success
2.4 END-CHAPTER MATERIALS
2.4.1 Recommended Reading
2.4.2 Key Terms
2.4.3 Summary
2.5 PRACTICE SET
2.5.1 Quizzes
2.5.2 Questions
2.5.3 Problems
PART II: Physical Layer
Chapter 3 Introduction to Physical Layer
3.1 DATA AND SIGNALS
3.1.1 Analog and Digital Data
3.1.2 Analog and Digital Signals
3.1.3 Periodic and Nonperiodic
3.2 PERIODIC ANALOG SIGNALS
3.2.1 Sine Wave
3.2.2 Phase
3.2.3 Wavelength
3.2.4 Time and Frequency Domains
3.2.5 Composite Signals
3.2.6 Bandwidth
3.3 DIGITAL SIGNALS
3.3.1 Bit Rate
3.3.2 Bit Length
3.3.3 Digital Signal as a Composite Analog Signal
3.3.4 Transmission of Digital Signals
3.4 TRANSMISSION IMPAIRMENT
3.4.1 Attenuation
3.4.2 Distortion
3.4.3 Noise
3.5 DATA RATE LIMITS
3.5.1 Noiseless Channel: Nyquist Bit Rate
3.5.2 Noisy Channel: Shannon Capacity
3.5.3 Using Both Limits
3.6 PERFORMANCE
3.6.1 Bandwidth
3.6.2 Throughput
3.6.3 Latency (Delay)
3.6.4 Bandwidth-Delay Product
3.6.5 Jitter
3.7 END-CHAPTER MATERIALS
3.7.1 Recommended Reading
3.7.2 Key Terms
3.7.3 Summary
3.8 PRACTICE SET
3.8.1 Quizzes
3.8.2 Questions
3.8.3 Problems
3.9 SIMULATION EXPERIMENTS
3.9.1 Applets
Chapter 4 Digital Transmission
4.1 DIGITAL-TO-DIGITAL CONVERSION
4.1.1 Line Coding
4.1.2 Line Coding Schemes
4.1.3 Block Coding
4.1.4 Scrambling
4.2 ANALOG-TO-DIGITAL CONVERSION
4.2.1 Pulse Code Modulation (PCM)
4.2.2 Delta Modulation (DM)
4.3 TRANSMISSION MODES
4.3.1 Parallel Transmission
4.3.2 Serial Transmission
4.4 END-CHAPTER MATERIALS
4.4.1 Recommended Reading
4.4.2 Key Terms
4.4.3 Summary
4.5 PRACTICE SET
4.5.1 Quizzes
4.5.2 Questions
4.5.3 Problems
4.6 SIMULATION EXPERIMENTS
4.6.1 Applets
Chapter 5 Analog Transmission
5.1 DIGITAL-TO-ANALOG CONVERSION
5.1.1 Aspects of Digital-to-Analog Conversion
5.1.2 Amplitude Shift Keying
5.1.3 Frequency Shift Keying
5.1.4 Phase Shift Keying
5.1.5 Quadrature Amplitude Modulation
5.2 ANALOG-TO-ANALOG CONVERSION
5.2.1 Amplitude Modulation (AM)
5.2.2 Frequency Modulation (FM)
5.2.3 Phase Modulation (PM)
5.3 END-CHAPTER MATERIALS
5.3.1 Recommended Reading
5.3.2 Key Terms
5.3.3 Summary
5.4 PRACTICE SET
5.4.1 Quizzes
5.4.2 Questions
5.4.3 Problems
5.5 SIMULATION EXPERIMENTS
5.5.1 Applets
Chapter 6 Bandwidth Utilization: Multiplexing and Spectrum Spreading
6.1 MULTIPLEXING
6.1.1 Frequency-Division Multiplexing
6.1.2 Wavelength-Division Multiplexing
6.1.3 Time-Division Multiplexing
6.2 SPREAD SPECTRM
6.2.1 Frequency Hopping Spread Spectrum
6.2.2 Direct Sequence Spread Spectrum
6.3 END-CHAPTER MATERIALS
6.3.1 Recommended Reading
6.3.2 Key Terms
6.3.3 Summary
6.4 PRACTICE SET
6.4.1 Quizzes
6.4.2 Questions
6.4.3 Problems
6.5 SIMULATION EXPE
6.5.1 Applets
Chapter 7 Transmission Media
7.1 INTRODUCTION
7.2 GUIDED MEDIA
7.2.1 Twisted-Pair Cable
7.2.2 Coaxial Cable
7.2.3 Fiber-Optic Cable
7.3 UNGUIDED MEDIA: WIRELESS
7.3.1 Radio Waves
7.3.2 Microwaves
7.3.3 Infrared
7.4 END-CHAPTER MATERIALS
7.4.1 Recommended Reading
7.4.2 Key Terms
7.4.3 Summary
7.5 PRACTICE SET
7.5.1 Quizzes
7.5.2 Questions
7.5.3 Problems
Chapter 8 Switching
8.1 INTRODUCTION
8.1.1 Three Methods of Switching
8.1.2 Switching and TCP/IP Layers
8.2 CIRCUIT-SWITCHED NETWORKS
8.2.1 Three Phases
8.2.2 Efficiency
8.2.3 Delay
8.3 PACKET SWITCHING
8.3.1 Datagram Networks
8.3.2 Virtual-Circuit Networks
8.4 STRUCTURE OF A SWITCH
8.4.1 Structure of Circuit Switches
8.4.2 Structure of Packet Switches
8.5 END-CHAPTER MATERIALS
8.5.1 Recommended Reading
8.5.2 Key terms
8.5.3 Summary
8.6 PRACTICE SET
8.6.1 Quizzes
8.6.2 Questions
8.6.3 Problems
8.7 SIMULATION EXPERIMENTS
8.7.1 Applets
PART III: Data-Link Layer
Chapter 9 Introduction to Data-Link Layer
9.1 INTRODUCTION
9.1.1 Nodes and Links
9.1.2 Services
9.1.3 Two Categories of Links
9.1.4 Two Sublayers
9.2 LINK-LAYER ADDRESSING
9.2.1 Three Types of addresses
9.2.2 Address Resolution Protocol (ARP)
9.2.3 An Example of Communication
9.3 END-CHAPTER MATERIALS
9.3.1 Recommended Reading
9.3.2 Key Terms
9.3.3 Summary
9.4 PRACTICE SET
9.4.1 Quizzes
9.4.2 Questions
9.4.3 Problems
Chapter 10 Error Detection and Correction
10.1 INTRODUCTION
10.1.1 Types of Errors
10.1.2 Redundancy
10.1.3 Detection versus Correction
10.1.4 Coding
10.2 BLOCK CODING
10.2.1 Error Detection
10.3 CYCLIC CODES
10.3.1 Cyclic Redundancy Check
10.3.2 Polynomials
10.3.3 Cyclic Code Encoder Using Polynomials
10.3.4 Cyclic Code Analysis
10.3.5 Advantages of Cyclic Codes
10.3.6 Other Cyclic Codes
10.3.7 Hardware Implementation
10.4 CHECKSUM
10.4.1 Concept
10.4.2 Other Approaches to the Checksum
10.5 FORWARD ERROR CORRECTION
10.5.1 Using Hamming Distance
10.5.2 Using XOR
10.5.3 Chunk Interleaving
10.5.4 Combining Hamming Distance and Interleaving
10.5.5 Compounding High- and Low-Resolution Packets
10.6 END-CHAPTER MATERIALS
10.6.1 Recommended Reading
10.6.2 Key Terms
10.6.3 Summary
10.7 PRACTICE SET
10.7.1 Quizzes
10.7.2 Questions
10.7.3 Problems
10.8 SIMULATION EXPERIMENTS
10.8.1 Applets
10.9 PROGRAMMING ASSIGNMENTS
Chapter 11 Data Link Control (DLC)
11.1 DLC SERVICES
11.1.1 Framing
11.1.2 Flow and Error Control
11.1.3 Connectionless and Connection-Oriented
11.2 DATA-LINK LAYER PROTOCOLS
11.2.1 Simple Protocol
11.2.2 Stop-and-Wait Protocol
11.2.3 Piggybacking
11.3 HDLC
11.3.1 Configurations and Transfer Modes
11.3.2 Framing
11.4 POINT-TO-POINT PROTOCOL (PPP)
11.4.1 Services
11.4.2 Framing
11.4.3 Transition Phases
11.4.4 Multiplexing
11.5 END-CHAPTER MATERIALS
11.5.1 Recommended Reading
11.5.2 Key Terms
11.5.3 Summary
11.6 PRACTICE SET
11.6.1 Quizzes
11.6.2 Questions
11.6.3 Problems
11.7 SIMULATION EXPERIMENTS
11.7.1 Applets
11.8 PROGRAMMING ASSIGNMENTS
Chapter 12 Media Access Control (MAC)
12.1 RANDOM ACCESS
12.1.1 ALOHA
12.1.2 CSMA
12.1.3 CSMA/CD
12.1.4 CSMA/CA
12.2 CONTROLLED ACCESS
12.2.1 Reservation
12.2.2 Polling
12.2.3 Token Passing
12.3 CHANNELIZATION
12.3.1 FDMA
12.3.2 TDMA
12.3.3 CDMA
12.4 END-CHAPTER MATERIALS
12.4.1 Recommended Reading
12.4.2 Key Terms
12.4.3 Summary
12.5 PRACTICE SET
12.5.1 Quizzes
12.5.2 Questions
12.5.3 Problems
12.6 SIMULATION EXPERIMENTS
12.6.1 Applets
12.7 PROGRAMMING ASSIGNMENTS
Chapter 13 Wired LANs: Ethernet
13.1 ETHERNET PROTOCOL
13.1.1 IEEE Project 802
13.1.2 Ethernet Evolution
13.2 STANDARD ETHERNET
13.2.1 Characteristics
13.2.2 Addressing
13.2.3 Access Method
13.2.4 Efficiency of Standard Ethernet
13.2.5 Implementation
13.2.6 Changes in the Standard
13.3 FAST ETHERNET (100 MBPS)
13.3.1 Access Method
13.3.2 Physical Layer
13.4 GIGABIT ETHERNET
13.4.1 MAC Sublayer
13.4.2 Physical Layer
13.5 10 GIGABIT ETHERNET
13.5.1 Implementation
13.6 END-CHAPTER MATERIALS
13.6.1 Recommended Reading
13.6.2 Key Terms
13.6.3 Summary
13.7 PRACTICE SET
13.7.1 Quizzes
13.7.2 Questions
13.7.3 Problems
13.8 SIMULATION EXPERIMENTS
13.8.1 Applets
13.8.2 Lab Assignments
Chapter 14 Other Wired Networks
14.1 TELEPHONE NETWORKS
14.1.1 Major Components
14.1.2 LATAs
14.1.3 Signaling
14.1.4 Services Provided by Telephone Networks
14.1.5 Dial-Up Service
14.1.6 Digital Subscriber Line (DSL)
14.2 CABLE NETWORKS
14.2.1 Traditional Cable Networks
14.2.2 Hybrid Fiber-Coaxial (HFC) Network
14.2.3 Cable TV for Data Transfer
14.3 SONET
14.3.1 Architecture
14.3.2 SONET Layers
14.3.3 SONET Frames
14.3.4 STS Multiplexing
14.3.5 SONET Networks
14.3.6 Virtual Tributaries
14.4 ATM
14.4.1 Design Goals
14.4.2 Problems
14.4.3 Architecture
14.5 END-CHAPTER MATERIALS
14.5.1 Recommended Reading
14.5.2 Key Terms
14.5.3 Summary
14.6 PRACTICE SET
14.6.1 Quizzes
14.6.2 Questions
14.6.3 Problems
Chapter 15 Wireless LANs
15.1 INTRODUCTION
15.1.1 Architectural Comparison
15.1.2 Characteristics
15.1.3 Access Control
15.2 IEEE 802.11 PROJECT
15.2.1 Architecture
15.2.2 MAC Sublayer
15.2.3 Addressing Mechanism
15.2.4 Physical Layer
15.3 BLUETOOTH
15.3.1 Architecture
15.3.2 Bluetooth Layers
15.4 END-CHAPTER MATERIALS
15.4.1 Further Reading
15.4.2 Key Terms
15.4.3 Summary
15.5 PRACTICE S
15.5.1 Quizzes
15.5.2 Quest
15.5.3 Problems
15.6 SIMULATION EXPERIMENTS
15.6.1 Applets
15.6.2 Lab Assignments
Chapter 16 Other Wireless Networks
16.1 WiMAX
16.1.1 Services
16.1.2 IEEE Project 802.16
16.1.3 Layers in Project 802.16
16.2 CELLULAR TELEPHONY
16.2.1 Operation
16.2.2 First Generation (1G)
16.2.3 Second Generation (2G)
16.2.4 Third Generation (3G)
16.2.5 Fourth Generation (4G)
16.3 SATELLITE NETWORKS
16.3.1 Operation
16.3.2 GEO Satellites
16.3.3 MEO Satellites
16.3.4 LEO Satellites
16.4 END-CHAPTER MATERIALS
16.4.1 Recommended Reading
16.4.2 Key Terms
16.4.3 Summary
16.5 PRACTICE SET
16.5.1 Quizzes
16.5.2 Questions
16.5.3 Problems
Chapter 17 Connecting Devices and Virtual LANs
17.1 CONNECTING DEVICES
17.1.1 Hubs
17.1.2 Link-Layer Switches
17.1.3 Routers
17.2 VIRTUAL LANS
17.2.1 Membership
17.2.2 Configuration
17.2.3 Communication between Switches
17.2.4 Advantages
17.3 END-CHAPTER MATERIALS
17.3.1 Recommended Reading
17.3.2 Key Terms
17.3.3 Summary
17.4 PRACTICE SET
17.4.1 Quizzes
17.4.2 Questions
17.4.3 Problems
PART IV: Network Layer
Chapter 18 Introduction to Network Layer
18.1 NETWORK-LAYER SERVICES
18.1.1 Packetizing
18.1.2 Routing and Forwarding
18.1.3 Other Services
18.2 PACKET SWITCHING
18.2.1 Datagram Approach: Connectionless Service
18.2.2 Virtual-Circuit Approach: Connection-Oriented Service
18.3 NETWORK-LAYER PERFORMANCE
18.3.1 Delay
18.3.2 Throughput
18.3.3 Packet Loss
18.3.4 Congestion Control
18.4 IPV4 ADDRESSES
18.4.1 Address Space
18.4.2 Classful Addressing
18.4.3 Classless Addressing
18.4.4 Dynamic Host Configuration Protocol (DHCP)
18.4.5 Network Address Resolution (NAT)
18.5 FORWARDING OF IP PACKETS
18.5.1 Forwarding Based on Destination Address
18.5.2 Forwarding Based on Label
18.5.3 Routers as Packet Switches
18.6 END-CHAPTER MATERIALS
18.6.1 Recommended Reading
18.6.2 Key Terms
18.6.3 Summary
18.7 PRACTICE SET
18.7.1 Quizzes
18.7.2 Questions
18.7.3 Problems
18.8 SIMULATION EXPERIMENTS
18.8.1 Applets
18.9 PROGRAMMING ASSIGNMENT
Chapter 19 Network-Layer Protocols
19.1 INTERNET PROTOCOL (IP)
19.1.1 Datagram Format
19.1.2 Fragmentation
19.1.3 Options
19.1.4 Security of IPv4 Datagrams
19.2 ICMPv4
19.2.1 MESSAGES
19.2.2 Debugging Tools
19.2.3 ICMP Checksum
19.3 MOBILE IP
19.3.1 Addressing
19.3.2 Agents
19.3.3 Three Phases
19.3.4 Inefficiency in Mobile IP
19.4 END-CHAPTER MATERIALS
19.4.1 Recommended Reading
19.4.2 Key Terms
19.4.3 Summary
19.5 PRACTICE SET
19.5.1 Quizzes
19.5.2 Questions
19.5.3 Problems
19.6 SIMULATION EXPERIMENTS
19.6.1 Applets
19.6.2 Lab Assignments
Chapter 20 Unicast Routing
20.1 INTRODUCTION
20.1.1 General Idea
20.1.2 Least-Cost Routing
20.2 ROUTING ALGORITHMS
20.2.1 Distance-Vector Routing
20.2.2 Link-State Routing
20.2.3 Path-Vector Routing
20.3 UNICAST ROUTING PROTOCOLS
20.3.1 Internet Structure
20.3.2 Routing Information Protocol (RIP)
20.3.3 Open Shortest Path First (OSPF)
20.3.4 Border Gateway Protocol Version 4 (BGP4)
20.4 END-CHAPTER MATERIALS
20.4.1 Recommended Reading
20.4.2 Key Terms
20.4.3 Summary
20.5 PRACTICE SET
20.5.1 Quizzes
20.5.2 Questions
20.5.3 Problems
20.6 SIMULATION EXPERIMENTS
20.6.1 Applets
20.7 PROGRAMMING ASSIGNMENT
Chapter 21 Multicast Routing
21.1 INTRODUCTION
21.1.1 Unicasting
21.1.2 Multicasting
21.1.3 Broadcasting
21.2 MULTICASTING BASICS
21.2.1 Multicast Addresses
21.2.2 Delivery at Data-Link Layer
21.2.3 Collecting Information about Groups
21.2.4 Multicast Forwarding
21.2.5 Two Approaches to Multicasting
21.3 INTRADOMAIN MULTICAST PROTOCOLS
21.3.1 Multicast Distance Vector (DVMRP)
21.3.2 Multicast Link State (MOSPF)
21.3.3 Protocol Independent Multicast (PIM)
21.4 INTERDOMAIN MULTICAST PROTOCOLS
21.5 IGMP
21.5.1 Messages
21.5.2 Propagation of Membership Information
21.5.3 Encapsulation
21.6 END-CHAPTER MATERIALS
21.6.1 Recommended Reading
21.6.2 Key Terms
21.6.3 Summary
21.7 PRACTICE SET
21.7.1 Quizzes
21.7.2 Questions
21.7.3 Problems
21.8 SIMULATION EXPERIMENTS
21.8.1 Applets
Chapter 22 Next Generation IP
22.1 IPv6 ADDRESSING
22.1.1 Representation
22.1.2 Address Space
22.1.3 Address Space Allocation
22.1.4 Autoconfiguration
22.1.5 Renumbering
22.2 THE IPv6 PROTOCOL
22.2.1 Packet Format
22.2.2 Extension Header
22.3 THE ICMPv6 PROTOCOL
22.3.1 Error-Reporting Messages
22.3.2 Informational Messages
22.3.3 Neighbor-Discovery Messages
22.3.4 Group Membership Messages
22.4 TRANSITION FROM IPv4 TO IPv6
22.4.1 Strategies
22.4.2 Use of IP Addresses
22.5 END-CHAPTER MATERIALS
22.5.1 Recommended Reading
22.5.2 Key Terms
22.5.3 Summary
22.6 PRACTICE SET
22.6.1 Quizzes
22.6.2 Questions
22.6.3 Problems
22.7 SIMULATION EXPERIMENTS
22.7.1 Applets
PART V: Transport Layer
Chapter 23 Introduction to Transport Layer
23.1 INTRODUCTION
23.1.1 Transport-Layer Services
23.1.2 Connectionless and Connection-Oriented Protocols
23.2 TRANSPORT-LAYER PROTOCOLS
23.2.1 Simple Protocol
23.2.2 Stop-and-Wait Protocol
23.2.3 Go-Back-N Protocol (GBN)
23.2.4 Selective-Repeat Protocol
23.2.5 Bidirectional Protocols: Piggybacking
23.3 END-CHAPTER MATERIALS
23.3.1 Recommended Reading
23.3.2 Key Terms
23.3.3 Summary
23.4 PRACTICE SET
23.4.1 Quizzes
23.4.2 Questions
23.4.3 Problems
23.5 SIMULATION EXPERIMENTS
23.5.1 Applets
23.6 PROGRAMMING ASSIGNMENT
Chapter 24 Transport-Layer Protocols
24.1 INTRODUCTION
24.1.1 Services
24.1.2 Port Numbers
24.2 USER DATAGRAM PROTOCOL
24.2.1 User Datagram
24.2.2 UDP Services
24.2.3 UDP Applications
24.3 TRANSMISSION CONTROL PROTOCOL
24.3.1 TCP Services
24.3.2 TCP Features
24.3.3 Segment
24.3.4 A TCP Connection
24.3.5 State Transition Diagram
24.3.6 Windows in TCP
24.3.7 Flow Control
24.3.8 Error Control
24.3.9 TCP Congestion Control
24.3.10 TCP Timers
24.3.11 Options
24.4 SCTP
24.4.1 SCTP Services
24.4.2 SCTP Features
24.4.3 Packet Format
24.4.4 An SCTP Association
24.4.5 Flow Control
24.4.6 Error Control
24.5 END-CHAPTER MATERIALS
24.5.1 Recommended Reading
24.5.2 Key Terms
24.5.3 Summary
24.6 PRACTICE SET
24.6.1 Quizzes
24.6.2 Questions
24.6.3 Problems
PART VI: Application Layer
Chapter 25 Introduction to Application Layer
25.1 INTRODUCTION
25.1.1 Providing Services
25.1.2 Application-Layer Paradigms
25.2 CLIENT-SERVER PROGRAMMING
25.2.1 Application Programming Interface
25.2.2 Using Services of the Transport Layer
25.2.3 Iterative Communication Using UDP
25.2.4 Iterative Communication Using TCP
25.2.5 Concurrent Communication
25.3 ITERATIVE PROGRAMMING IN C
25.3.1 General Issues
25.3.2 Iterative Programming Using UDP
25.3.3 Iterative Programming Using TCP
25.4 ITERATIVE PROGRAMMING IN JAVA
25.4.1 Addresses and Ports
25.4.2 Iterative Programming Using UDP
25.4.3 Iterative Programming Using TCP
25.5 END-CHAPTER MATERIALS
25.5.1 Recommended Reading
25.5.2 Key Terms
25.5.3 Summary
25.6 PRACTICE SET
25.6.1 Quizzes
25.6.2 Questions
25.6.3 Problems
25.7 SIMULATION EXPERIMENTS
25.7.1 Applets
25.8 PROGRAMMING ASSIGNMENT
Chapter 26 Standard Client-Server Protocols
26.1 WORLD WIDE WEB AND HTTP
26.1.1 World Wide Web
26.1.2 HyperText Transfer Protocol (HTTP)
26.2 FTP
26.2.1 Two Connections
26.2.2 Control Connection
26.2.3 Data Connection
26.2.4 Security for FTP
26.3 ELECTRONIC MAIL
26.3.1 Architecture
26.3.2 Web-Based Mail
26.3.3 E-Mail Security
26.4 TELNET
26.4.1 Local versus Remote Logging
26.5 SECURE SHELL (SSH)
26.5.1 Components
26.5.2 Applications
26.6 DOMAIN NAME SYSTEM (DNS)
26.6.1 Name Space
26.6.2 DNS in the Internet
26.6.3 Resolution
26.6.4 Caching
26.6.5 Resource Records
26.6.6 DNS Messages
26.6.7 Registrars
26.6.8 DDNS
26.6.9 Security of DNS
26.7 END-CHAPTER MATERIALS
26.7.1 Recommended Reading
26.7.2 Key Terms
26.7.3 Summary
26.8 PRACTICE SET
26.8.1 Quizzes
26.8.2 Questions
26.8.3 Problems
26.9 SIMULATION EXPERIMENTS
26.9.1 Applets
26.9.2 Lab Assignments
Chapter 27 Network Management
27.1 INTRODUCTION
27.1.1 Configuration Management
27.1.2 Fault Management
27.1.3 Performance Management
27.1.4 Security Management
27.1.5 Accounting Management
27.2 SNMP
27.2.1 Managers and Agents
27.2.2 Management Components
27.2.3 An Overview
27.2.4 SMI
27.2.5 MIB
27.2.6 SNMP
27.3 ASN.1
27.3.1 Language Basics
27.3.2 Data Types
27.3.3 Encoding
27.4 END-CHAPTER MATERIALS
27.4.1 Recommended Reading
27.4.2 Key Terms
27.4.3 Summary
27.5 PRACTICE SET
27.5.1 Quizzes
27.5.2 Questions
27.5.3 Problems
Chapter 28 Multimedia
28.1 COMPRESSION
28.1.1 Lossless Compression
28.1.2 Lossy Compression
28.2 MULTIMEDIA DATA
28.2.1 Text
28.2.2 Image
28.2.3 Video
28.2.4 Audio
28.3 MULTIMEDIA IN THE INTERNET
28.3.1 Streaming Stored Audio/Video
28.3.2 Streaming Live Audio/Video
28.3.3 Real-Time Interactive Audio/Video
28.4 REAL-TIME INTERACTIVE PROTOCOLS
28.4.1 Rationale for New Protocols
28.4.2 RTP
28.4.3 RTCP
28.4.4 Session Initialization Protocol (SIP)
28.4.5 H.323
28.5 END-CHAPTER MATERIALS
28.5.1 Recommended Reading
28.5.2 Key Terms
28.5.3 Summary
28.6 PRACTICE SET
28.6.1 Quizzes
28.6.2 Questions
28.6.3 Problems
28.7 SIMULATION EXPERIMENTS
28.7.1 Applets
28.7.2 Lab Assignments
28.8 PROGRAMMING ASSIGNMENTS
Chapter 29 Peer-to-Peer Paradigm
29.1 INTRODUCTION
29.1.1 P2P Networks
29.1.2 Distributed Hash Table (DHT)
29.2 CHORD
29.2.1 Identifier Space
29.2.2 Finger Table
29.2.3 Interface
29.2.4 Applications
29.3 PASTRY
29.3.1 Identifier Space
29.3.2 Routing
29.3.3 Application
29.4 KADEMLIA
29.4.1 Identifier Space
29.4.2 Routing Table
29.4.3 K-Buckets
29.5 BITTORRENT
29.5.1 BitTorrent with a Tracker
29.5.2 Trackerless BitTorrent
29.6 END-CHAPTER MATERIALS
29.6.1 Recommended Reading
29.6.2 Key Terms
29.6.3 Summary
29.7 PRACTICE SET
29.7.1 Quizzes
29.7.2 Questions
29.7.3 Problems
PART VII: Topics Related to All Layers
Chapter 30 Quality of Service
30.1 DATA-FLOW CHARACTERISTICS
30.1.1 Definitions
30.1.2 Sensitivity of Applications
30.1.3 Flow Classes
30.2 FLOW CONTROL TO IMPROVE QOS
30.2.1 Scheduling
30.2.2 Traffic Shaping or Policing
30.2.3 Resource Reservation
30.2.4 Admission Control
30.3 INTEGRATED SERVICES (INTSERV)
30.3.1 Flow Specification
30.3.2 Admission
30.3.3 Service Classes
30.3.4 Resource Reservation Protocol (RSVP)
30.3.5 Problems with Integrated Services
30.4 DIFFERENTIATED SERVICES (DFFSERV)
30.4.1 DS Field
30.4.2 Per-Hop Behavior
30.4.3 Traffic Conditioners
30.5 END-CHAPTER MATERIALS
30.5.1 Recommended Reading
30.5.2 Key Terms
30.5.3 Summary
30.6 PRACTICE SET
30.6.1 Quizzes
30.6.2 Questions
30.6.3 Problems
30.7 SIMULATION EXPERIMENTS
30.7.1 Applets
30.8 PROGRAMMING ASSIGNMENTS
Chapter 31 Cryptography and Network Security
31.1 INTRODUCTION
31.1.2 Attacks
31.1.3 Services and Techniques
31.2 CONFIDENTIALITY
31.2.1 Symmetric-Key Ciphers
31.2.2 Asymmetric-Key Ciphers
31.3 OTHER ASPECTS OF SECURITY
31.3.1 Message Integrity
31.3.2 Message Authentication
31.3.3 Digital Signature
31.3.4 Entity Authentication
31.3.5 Key Management
31.4 END-CHAPTER MATERIALS
31.4.1 Recommended Reading
31.4.2 Key Terms
31.4.3 Summary
31.5 PRACTICE SET
31.5.1 Quizzes
31.5.2 Questions
31.5.3 Problems
31.6 SIMULATION EXPERIMENTS
31.6.1 Applets
31.7 PROGRAMMING ASSIGNMENTS
Chapter 32 Internet Security
32.1 NETWORK-LAYER SECURITY
32.1.1 Two Modes
32.1.2 Two Security Protocols
32.1.3 Services Provided by IPSec
32.1.4 Security Association
32.1.5 Internet Key Exchange (IKE)
32.1.6 Virtual Private Network (VPN)
32.2 TRANSPORT-LAYER SECURITY
32.2.1 SSL Architecture
32.2.2 Four Protocols
32.3 APPLICATION-LAYER SECURITY
32.3.1 E-mail Security
32.3.2 Pretty Good Privacy (PGP)
32.3.3 S/MIME
32.4 FIREWALLS
32.4.1 Packet-Filter Firewall
32.4.2 Proxy Firewall
32.5 END-CHAPTER MATERIALS
32.5.1 Recommended Reading
32.5.2 Key Terms
32.5.3 Summary
32.6 PRACTICE SET
32.6.1 Quizzes
32.6.2 Questions
32.6.3 Problems
32.7 SIMULATION EXPERIMENTS
32.7.1 Applets
32.7.2 Lab Assignments
Glossary
References
Index
Acronyms