This textbook presents computer networks to electrical and computer engineering students in a manner that is clearer, more interesting, and easier to understand than other texts. All principles are presented in a lucid, logical, step-by-step manner. As much as possible, the authors avoid wordiness and giving too much detail that could hide concepts and impede overall understanding of the material. Ten review questions in the form of multiple-choice objective items are provided at the end of each chapter with answers. The review questions are intended to cover the little “tricks” which the examples and end-of-chapter problems may not cover. They serve as a self-test device and help students determine how well they have mastered the chapter.
Author(s): Matthew N. O. Sadiku, Cajetan M. Akujuobi
Publisher: Springer
Year: 2022
Language: English
Pages: 202
City: Cham
Preface
Contents
About the Authors
1: Introduction
1.1 What Are Computer Networks?
1.2 Short History
1.3 Applications
1.4 Standards
2: Digital Communications
2.1 Introduction
2.2 Transmission Media
2.2.1 Guided Media
2.2.2 Unguided Media
2.3 Encoding
2.3.1 Summary of Digital Signal Encoding Formats
2.4 Bit/Byte Stuffing
2.5 Multiplexing
2.6 Switching
3: Network Models
3.1 Introduction
3.2 OSI Model
3.2.1 The Physical Layer
3.2.2 The Data Link Layer
3.2.3 The Network Layer
3.2.4 The Transport Layer
3.2.5 Session Layer
3.2.6 Presentation Layer
3.2.7 Application Layer
3.3 TCP/IP Model
3.3.1 Physical Layer
3.3.2 Network Interface Layer
3.3.3 Internet Layer
3.3.4 Transport Layer
3.3.5 Application Layer
3.4 Application I: Internetworking Devices
3.4.1 Repeaters
3.4.2 Hubs
3.4.3 Bridges
3.4.4 Switches
3.4.5 Routers
3.4.6 Gateways
3.4.7 Brouters
3.5 Application II: Signaling Systems No. 7 (SS7)
3.5.1 SS7 Signaling Link Types
3.5.2 Comparative Relationship of SS7 to OSI
3.6 OSI Model and the IEEE Model
4: Local Area Networks
4.1 Introduction
4.2 Types of LANs
4.2.1 Star LAN Topology
4.2.2 The Bus LAN Topology
4.2.3 Token Ring Topology
4.2.4 LAN Tree Topology
4.3 Random Access
4.3.1 ALOHA
4.3.2 CSMA
4.3.3 CSMA/CD
4.3.4 CSMA/CA
4.4 Controlled Access
4.4.1 Token Ring-Based Access
4.4.2 Token Bus Access
5: The Internet
5.1 Introduction
5.2 Protocol Suite
5.2.1 TCP/IP Protocols
5.2.2 IP Address
5.2.3 Internet Services
5.3 Internet Applications
5.3.1 VOIP
5.3.2 Social Networking
5.3.3 Education
5.3.4 E-Commerce
5.3.5 Government
5.4 Privacy, Security, and Safety
5.4.1 Privacy
5.4.2 Security
5.4.3 Safety
5.5 Future Internet
5.5.1 IPv6
5.5.2 Internet2
6: Intranets and Extranets
6.1 Introduction
6.2 Intranets
6.3 Extranets
6.4 Key Technologies
7: Virtual Private Networks
7.1 Introduction
7.2 VPN Characteristics
7.3 Types of VPN
7.4 Applications
7.5 Benefits and Challenges
7.6 VPN Standards
8: Digital Subscriber Line
8.1 Introduction
8.2 ADSL
8.2.1 ADSL Operation
8.2.2 ADSL Modulation Techniques
8.2.3 Advantages of ADSL
8.2.4 Disadvantages of ADSL
8.2.5 Factors That Affect Speed
8.2.6 ADSL Standards
8.3 HDSL
8.3.1 HDSL Operation
8.3.2 Different Varieties of HDSL
8.3.3 Difference Between HDSL and ADSL
8.4 RADSL
8.4.1 Difference Between RADSL and ADSL
8.5 IDSL
8.6 VDSL
8.6.1 Differences Between VDSL and ADSL
9: Optical Networks
9.1 Introduction
9.2 Why Optical Fiber?
9.3 Major Optical Components
9.4 WDM-Based Networks
9.5 Passive Optical Networks
9.6 SONET
9.7 All-Optical Networking
9.8 Free-Space Optics
9.9 Applications
10: Wireless Networks
10.1 Introduction
10.2 Fundamentals of Wireless Networks
10.3 Wireless Local Area Network
10.4 Wireless Metropolitan Area Network
10.5 Wireless Wide Area Network
10.6 Wireless Personal Area Networks
10.7 Cellular Technologies
10.7.1 Fundamental Features
10.7.2 Cellular Network
10.8 Satellite Networks
10.8.1 Type of Satellites
10.8.2 Satellite Components
10.9 Wireless Sensor Networks
10.10 Advantages and Disadvantages
11: Network Security
11.1 Introduction
11.2 Malware
11.2.1 The Function of a Malware
11.2.2 Malware Removal Solutions
11.3 Firewall
11.3.1 The Firewall Protection
11.3.2 Benefits of Having a Firewall
11.3.3 The Limitations of a Firewall
11.4 Encryption
11.4.1 Public Key Encryption
11.4.2 Types of Encryptions
11.4.3 Encryptions and Decryptions
11.4.4 Digital Certificates and Digital Signatures
11.4.5 Encryption Standards
11.5 Intrusion Detection and Prevention Systems
11.5.1 The Need for Intrusion and Prevention Systems
11.5.2 Implementation of IDS Technique
11.6 Cybersecurity
11.6.1 Mitigation Against Cybersecurity
12: Emerging Technologies
12.1 Internet of Things
12.1.1 History of Internet of Things
12.1.2 Evolution of Internet of Things
12.1.3 Examples of Various Internet of Things
12.1.4 IoT Enabling Technologies and Services
12.2 Big Data
12.2.1 What Is Big Data?
12.2.2 The Evolution of Big Data
12.3 Smart Cities
12.3.1 Traditional and Smart Cities
12.3.2 How to Become a Smart City
12.4 Blockchain Technology
12.4.1 Applications of Blockchain
12.4.2 Customized Blockchain Applications
Software and Hardware Tools
Ethereum Platform
Accounts
Smart Contracts
Remix IDE
Application Binary Interface (ABI)
Key Management
12.5 Cloud Computing
12.5.1 Different Types of Cloud Computing
Private Cloud
Public Cloud
Hybrid Cloud
12.5.2 Services Associated with Cloud Computing
Platform as a Service (PaaS)
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Serverless Computing
12.5.3 Key Benefits of Cloud Computing
Security
Global Scale
Cost
Performance
Speed
Productivity
12.6 Fog Computing
12.7 Edge Computing
12.8 Emerging 5G Networks
12.8.1 Emerging Applications of the 5G Networks
Automotive Applications
Health Care/E-Health
Virtual Ventures
Smart Homes
12.9 Cybersecurity
12.9.1 Cybersecurity Techniques
12.9.2 Cybercrimes
12.9.3 Securing Enterprise Networks
Appendices
Appendix A: Old Technologies
X.25
Frame Relay
ISDN and BISDN
ATM
MPLS
Appendix B: Queueing Theory
Kendall’s Notation
Little’s Theorem
M/M/1 Queue
Other Queueing Systems
Bibliography
Index