| | Copyright |
| | Preface |
| | About the Author |
| | Part I: Fundamental Concepts |
| | | Chapter 1. Packet-Switched Networks |
| | | Section 1.1. Basic Definitions in Data Networks |
| | | Section 1.2. Types of Packet-Switched Networks |
| | | Section 1.3. Packet Size and Optimizations |
| | | Section 1.4. Summary |
| | | Section 1.5. Exercises |
| | | Chapter 2. Foundation of Networking Protocols |
| | | Section 2.1. 5-Layer TCP/IP Model |
| | | Section 2.2. 7-Layer OSI Model |
| | | Section 2.3. Internet Protocols and Addressing |
| | | Section 2.4. Equal-Sized Packets Model: ATM |
| | | Section 2.5. Summary |
| | | Section 2.6. Exercises |
| | | Chapter 3. Networking Devices |
| | | Section 3.1. Multiplexers |
| | | Section 3.2. Modems and Internet Access Devices |
| | | Section 3.3. Switching and Routing Devices |
| | | Section 3.4. Router Structure |
| | | Section 3.5. Summary |
| | | Section 3.6. Exercises |
| | | Chapter 4. Data Links and Transmission |
| | | Section 4.1. Data Links |
| | | Section 4.2. Wired Links and Transmission |
| | | Section 4.3. Wireless Links and Transmission |
| | | Section 4.4. Methods of Channel Access on Links |
| | | Section 4.5. Error Detection and Correction |
| | | Section 4.6. Link-Level Flow Control |
| | | Section 4.7. Summary |
| | | Section 4.8. Exercises |
| | | Chapter 5. Local Area Networks and Networks of LANs |
| | | Section 5.1. LANs and Basic Topologies |
| | | Section 5.2. LAN Protocols |
| | | Section 5.3. MAC and IP Addresses |
| | | Section 5.4. Classification of MAC Protocols |
| | | Section 5.5. Contention-Access MAC |
| | | Section 5.6. Round-Robin-Access MAC |
| | | Section 5.7. Network of LANs |
| | | Section 5.8. Summary |
| | | Section 5.9. Exercises |
| | | Chapter 6. Wireless Networks and Mobile IP |
| | | Section 6.1. Infrastructure of Wireless Networks |
| | | Section 6.2. Wireless LAN Technologies |
| | | Section 6.3. IEEE 802.11 Wireless Standard |
| | | Section 6.4. Cellular Networks |
| | | Section 6.5. Mobile IP |
| | | Section 6.6. Wireless Mesh Networks (WMNs) |
| | | Section 6.7. Summary |
| | | Section 6.8. Exercises |
| | | Chapter 7. Routing and Internetworking |
| | | Section 7.1. Network-Layer Routing |
| | | Section 7.2. Least-Cost- Path Algorithms |
| | | Section 7.3. Non-Least-Cost-Path Routing |
| | | Section 7.4. Intradomain Routing Protocols |
| | | Section 7.5. Interdomain Routing Protocols |
| | | Section 7.6. Congestion Control at Network Layer |
| | | Section 7.7. Summary |
| | | Section 7.8. Exercises |
| | | Chapter 8. Transport and End-to-End Protocols |
| | | Section 8.1. Transport Layer |
| | | Section 8.2. Transmission Control Protocol (TCP) |
| | | Section 8.3. User Datagram Protocol (UDP) |
| | | Section 8.4. Mobile Transport Protocols |
| | | Section 8.5. TCP Congestion Control |
| | | Section 8.6. Summary |
| | | Section 8.7. Exercises |
| | | Chapter 9. Applications and Network Management |
| | | Section 9.1. Application-Layer Overview |
| | | Section 9.2. Domain Name System (DNS) |
| | | Section 9.3. Remote Login Protocols |
| | | Section 9.4. Electronic Mail (E-mail) |
| | | Section 9.5. File Transfer and FTP |
| | | Section 9.6. World Wide Web (WWW) and HTTP |
| | | Section 9.7. Network Management |
| | | Section 9.8. Summary |
| | | Section 9.9. Exercises |
| | | Chapter 10. Network Security |
| | | Section 10.1. Overview of Network Security |
| | | Section 10.2. Overview of Security Methods |
| | | Section 10.3. Secret-Key Encryption Protocols |
| | | Section 10.4. Public-Key Encryption Protocols |
| | | Section 10.5. Authentication |
| | | Section 10.6. Authentication and Digital Signature |
| | | Section 10.7. Security of IP and Wireless Networks |
| | | Section 10.8. Firewalls |
| | | Section 10.9. Summary |
| | | Section 10.10. Exercises |
| | Part II: Advanced Concepts |
| | | Chapter 11. Packet Queues and Delay Analysis |
| | | Section 11.1. Little's Theorem |
| | | Section 11.2. Birth-and-Death Process |
| | | Section 11.3. Queueing Disciplines |
| | | Section 11.4. Markovian FIFO Queueing Systems |
| | | Section 11.5. Non-Markovian and Self-Similar Models |
| | | Section 11.6. Networks of Queues |
| | | Section 11.7. Summary |
| | | Section 11.8. Exercises |
| | | Chapter 12. Quality of Service and Resource Allocation |
| | | Section 12.1. Overview of QoS |
| | | Section 12.2. Integrated Services QoS |
| | | Section 12.3. Differentiated Services QoS |
| | | Section 12.4. Resource Allocation |
| | | Section 12.5. Summary |
| | | Section 12.6. Exercises |
| | | Chapter 13. Networks in Switch Fabrics |
| | | Section 13.1. Characteristics and Features of Switch Fabrics |
| | | Section 13.2. Crossbar Switch Fabrics |
| | | Section 13.3. Blocking Switch Fabrics |
| | | Section 13.4. Nonblocking Switch Fabrics: Clos Networks |
| | | Section 13.5. Concentration and Expansion Switches |
| | | Section 13.6. Shared-Memory Switch Fabrics |
| | | Section 13.7. Techniques for Improving Performance |
| | | Section 13.8. Case Study: Multipath Buffered Crossbar |
| | | Section 13.9. Summary |
| | | Section 13.10. Exercises |
| | | Chapter 14. Optical Networks and WDM Systems |
| | | Section 14.1. Overview of Optical Networks |
| | | Section 14.2. Basic Optical Networking Devices |
| | | Section 14.3. Large-Scale Optical Switches |
| | | Section 14.4. Optical Routers |
| | | Section 14.5. Wavelength Allocation in Networks |
| | | Section 14.6. Case Study: An All-Optical Switch |
| | | Section 14.7. Summary |
| | | Section 14.8. Exercises |
| | | Chapter 15. Multicasting Techniques and Protocols |
| | | Section 15.1. Basic Definitions and Techniques |
| | | Section 15.2. Intradomain Multicast Protocols |
| | | Section 15.3. Interdomain Multicast Protocols |
| | | Section 15.4. Node-Level Multicast Algorithms |
| | | Section 15.5. Summary |
| | | Section 15.6. Exercises |
| | | Chapter 16. VPNs, Tunneling, and Overlay Networks |
| | | Section 16.1. Virtual Private Networks (VPNs) |
| | | Section 16.2. Multiprotocol Label Switching (MPLS) |
| | | Section 16.3. Overlay Networks |
| | | Section 16.4. Summary |
| | | Section 16.5. Exercises |
| | | Chapter 17. Compression of Digital Voice and Video |
| | | Section 17.1. Overview of Data Compression |
| | | Section 17.2. Digital Voice and Compression |
| | | Section 17.3. Still Images and JPEG Compression |
| | | Section 17.4. Moving Images and MPEG Compression |
| | | Section 17.5. Limits of Compression with Loss |
| | | Section 17.6. Compression Methods Without Loss |
| | | Section 17.7. Case Study: FAX Compression for Transmission |
| | | Section 17.8. Summary |
| | | Section 17.9. Exercises |
| | | Chapter 18. VoIP and Multimedia Networking |
| | | Section 18.1. Overview of IP Telephony |
| | | Section 18.2. VoIP Signaling Protocols |
| | | Section 18.3. Real-Time Media Transport Protocols |
| | | Section 18.4. Distributed Multimedia Networking |
| | | Section 18.5. Stream Control Transmission Protocol (SCTP) |
| | | Section 18.6. Self-Similarity and Non-Markovian Streaming Analysis |
| | | Section 18.7. Summary |
| | | Section 18.8. Exercises |
| | | Chapter 19. Mobile Ad-Hoc Networks |
| | | Section 19.1. Overview of Wireless Ad-Hoc Networks |
| | | Section 19.2. Routing in Ad-Hoc Networks |
| | | Section 19.3. Routing Protocols for Ad-Hoc Networks |
| | | Section 19.4. Security of Ad-Hoc Networks |
| | | Section 19.5. Summary |
| | | Section 19.6. Exercises |
| | | Chapter 20. Wireless Sensor Networks |
| | | Section 20.1. Sensor Networks and Protocol Structures |
| | | Section 20.2. Communication Energy Model |
| | | Section 20.3. Clustering Protocols |
| | | Section 20.4. Routing Protocols |
| | | Section 20.5. Case Study: Simulation of a Sensor Network |
| | | Section 20.6. Other Related Technologies |
| | | Section 20.7. Summary |
| | | Section 20.8. Exercises |
| | Appendix A. Glossary of Acronyms |
| | Appendix B. RFCs |
| | Appendix C. Probabilities and Stochastic Processes |
| | | Section C.1. Probability Theory |
| | | Section C.2. Random Variables |
| | | Section C.3. Multiple Random Variables |
| | | Section C.4. Stochastic (Random) Processes |
| | | Section C.5. Theory of Markov Chains |
| | Index |