Flylib.com
Computer and Communication Networks (paperback)
Computer and Communication Networks (paperback)
ISBN: 0131389106
EAN: 2147483647
Year: 2007
Pages: 211
Authors:
Nader F. Mir
BUY ON AMAZON
Computer and Communication Networks
Table of Contents
Copyright
Preface
About the Author
Part I: Fundamental Concepts
Chapter 1. Packet-Switched Networks
Section 1.1. Basic Definitions in Data Networks
Section 1.2. Types of Packet-Switched Networks
Section 1.3. Packet Size and Optimizations
Section 1.4. Summary
Section 1.5. Exercises
Chapter 2. Foundation of Networking Protocols
Section 2.1. 5-Layer TCPIP Model
Section 2.2. 7-Layer OSI Model
Section 2.3. Internet Protocols and Addressing
Section 2.4. Equal-Sized Packets Model: ATM
Section 2.5. Summary
Section 2.6. Exercises
Chapter 3. Networking Devices
Section 3.1. Multiplexers
Section 3.2. Modems and Internet Access Devices
Section 3.3. Switching and Routing Devices
Section 3.4. Router Structure
Section 3.5. Summary
Section 3.6. Exercises
Chapter 4. Data Links and Transmission
Section 4.1. Data Links
Section 4.2. Wired Links and Transmission
Section 4.3. Wireless Links and Transmission
Section 4.4. Methods of Channel Access on Links
Section 4.5. Error Detection and Correction
Section 4.6. Link-Level Flow Control
Section 4.7. Summary
Section 4.8. Exercises
Chapter 5. Local Area Networks and Networks of LANs
Section 5.1. LANs and Basic Topologies
Section 5.2. LAN Protocols
Section 5.3. MAC and IP Addresses
Section 5.4. Classification of MAC Protocols
Section 5.5. Contention-Access MAC
Section 5.6. Round-Robin-Access MAC
Section 5.7. Network of LANs
Section 5.8. Summary
Section 5.9. Exercises
Chapter 6. Wireless Networks and Mobile IP
Section 6.1. Infrastructure of Wireless Networks
Section 6.2. Wireless LAN Technologies
Section 6.3. IEEE 802.11 Wireless Standard
Section 6.4. Cellular Networks
Section 6.5. Mobile IP
Section 6.6. Wireless Mesh Networks (WMNs)
Section 6.7. Summary
Section 6.8. Exercises
Chapter 7. Routing and Internetworking
Section 7.1. Network-Layer Routing
Section 7.2. Least-Cost-Path Algorithms
Section 7.3. Non-Least-Cost-Path Routing
Section 7.4. Intradomain Routing Protocols
Section 7.5. Interdomain Routing Protocols
Section 7.6. Congestion Control at Network Layer
Section 7.7. Summary
Section 7.8. Exercises
Chapter 8. Transport and End-to-End Protocols
Section 8.1. Transport Layer
Section 8.2. Transmission Control Protocol (TCP)
Section 8.3. User Datagram Protocol (UDP)
Section 8.4. Mobile Transport Protocols
Section 8.5. TCP Congestion Control
Section 8.6. Summary
Section 8.7. Exercises
Chapter 9. Applications and Network Management
Section 9.1. Application-Layer Overview
Section 9.2. Domain Name System (DNS)
Section 9.3. Remote Login Protocols
Section 9.4. Electronic Mail (E-mail)
Section 9.5. File Transfer and FTP
Section 9.6. World Wide Web (WWW) and HTTP
Section 9.7. Network Management
Section 9.8. Summary
Section 9.9. Exercises
Chapter 10. Network Security
Section 10.1. Overview of Network Security
Section 10.2. Overview of Security Methods
Section 10.3. Secret-Key Encryption Protocols
Section 10.4. Public-Key Encryption Protocols
Section 10.5. Authentication
Section 10.6. Authentication and Digital Signature
Section 10.7. Security of IP and Wireless Networks
Section 10.8. Firewalls
Section 10.9. Summary
Section 10.10. Exercises
Part II: Advanced Concepts
Chapter 11. Packet Queues and Delay Analysis
Section 11.1. Little s Theorem
Section 11.2. Birth-and-Death Process
Section 11.3. Queueing Disciplines
Section 11.4. Markovian FIFO Queueing Systems
Section 11.5. Non-Markovian and Self-Similar Models
Section 11.6. Networks of Queues
Section 11.7. Summary
Section 11.8. Exercises
Chapter 12. Quality of Service and Resource Allocation
Section 12.1. Overview of QoS
Section 12.2. Integrated Services QoS
Section 12.3. Differentiated Services QoS
Section 12.4. Resource Allocation
Section 12.5. Summary
Section 12.6. Exercises
Chapter 13. Networks in Switch Fabrics
Section 13.1. Characteristics and Features of Switch Fabrics
Section 13.2. Crossbar Switch Fabrics
Section 13.3. Blocking Switch Fabrics
Section 13.4. Nonblocking Switch Fabrics: Clos Networks
Section 13.5. Concentration and Expansion Switches
Section 13.6. Shared-Memory Switch Fabrics
Section 13.7. Techniques for Improving Performance
Section 13.8. Case Study: Multipath Buffered Crossbar
Section 13.9. Summary
Section 13.10. Exercises
Chapter 14. Optical Networks and WDM Systems
Section 14.1. Overview of Optical Networks
Section 14.2. Basic Optical Networking Devices
Section 14.3. Large-Scale Optical Switches
Section 14.4. Optical Routers
Section 14.5. Wavelength Allocation in Networks
Section 14.6. Case Study: An All-Optical Switch
Section 14.7. Summary
Section 14.8. Exercises
Chapter 15. Multicasting Techniques and Protocols
Section 15.1. Basic Definitions and Techniques
Section 15.2. Intradomain Multicast Protocols
Section 15.3. Interdomain Multicast Protocols
Section 15.4. Node-Level Multicast Algorithms
Section 15.5. Summary
Section 15.6. Exercises
Chapter 16. VPNs, Tunneling, and Overlay Networks
Section 16.1. Virtual Private Networks (VPNs)
Section 16.2. Multiprotocol Label Switching (MPLS)
Section 16.3. Overlay Networks
Section 16.4. Summary
Section 16.5. Exercises
Chapter 17. Compression of Digital Voice and Video
Section 17.1. Overview of Data Compression
Section 17.2. Digital Voice and Compression
Section 17.3. Still Images and JPEG Compression
Section 17.4. Moving Images and MPEG Compression
Section 17.5. Limits of Compression with Loss
Section 17.6. Compression Methods Without Loss
Section 17.7. Case Study: FAX Compression for Transmission
Section 17.8. Summary
Section 17.9. Exercises
Chapter 18. VoIP and Multimedia Networking
Section 18.1. Overview of IP Telephony
Section 18.2. VoIP Signaling Protocols
Section 18.3. Real-Time Media Transport Protocols
Section 18.4. Distributed Multimedia Networking
Section 18.5. Stream Control Transmission Protocol (SCTP)
Section 18.6. Self-Similarity and Non-Markovian Streaming Analysis
Section 18.7. Summary
Section 18.8. Exercises
Chapter 19. Mobile Ad-Hoc Networks
Section 19.1. Overview of Wireless Ad-Hoc Networks
Section 19.2. Routing in Ad-Hoc Networks
Section 19.3. Routing Protocols for Ad-Hoc Networks
Section 19.4. Security of Ad-Hoc Networks
Section 19.5. Summary
Section 19.6. Exercises
Chapter 20. Wireless Sensor Networks
Section 20.1. Sensor Networks and Protocol Structures
Section 20.2. Communication Energy Model
Section 20.3. Clustering Protocols
Section 20.4. Routing Protocols
Section 20.5. Case Study: Simulation of a Sensor Network
Section 20.6. Other Related Technologies
Section 20.7. Summary
Section 20.8. Exercises
Appendix A. Glossary of Acronyms
Appendix B. RFCs
Appendix C. Probabilities and Stochastic Processes
Section C.1. Probability Theory
Section C.2. Random Variables
Section C.3. Multiple Random Variables
Section C.4. Stochastic (Random) Processes
Section C.5. Theory of Markov Chains
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
Computer and Communication Networks (paperback)
ISBN: 0131389106
EAN: 2147483647
Year: 2007
Pages: 211
Authors:
Nader F. Mir
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Extra for Experts: Maximal Linear System Response to a Digital Input
Discrete Time Mapping
Pcb Configurations
Pcb Applications
Intentional Delay Adjustments
Programming Microsoft ASP.NET 3.5
Web Forms Internals
The ADO.NET Object Model
Configuration and Deployment
Working with the File System
Creating New ASP.NET Controls
Information Dashboard Design: The Effective Visual Communication of Data
Choosing a Deficient Measure
Designing an Unattractive Visual Display
Visually Encoding Data for Rapid Perception
Select the Best Display Medium
Make the Viewing Experience Aesthetically Pleasing
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Managing Business Logic with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Triggers
Accessing the File System
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies