Jun 17, 1991 - Original Title: Communication Networks: A First Course ... computer science as well as network profession
Recommended Books. 1. .... Irfan Habib, Medieval India: The Study of a
Civilization (National Book Trust, New. Delhi ... B. A. SECOND YEAR SEMESTER
III.
Computer Networks and Communication. COURSE OUTLINE. Spring 2014.
INSTRUCTOR: M. W. Schulte. 313 ESH. URL: www.cs.umsl.edu/~schulte/cs4730
/.
ENGLISH 1110.01H (3) - (UGRD) Honors First-Year. English Composition .... in
American Culture. MDRNGRK 2367 (3) - (UGRD) Reading and Writing About.
Jul 1, 2010 - but unprepared for the widely-taught business plan course. ... Many students are interested in entrepreneurship, and so enroll in courses in the.
Apr 12, 2018 - morphism Ï may send some of the coefficients of h â including the ..... Show that neither of these fie
Preface. This book is concerned with post-computer communication networks
and two of its important streams: data communication and telecommunication.
phasis shifts to the TCP/IP protocol suite, which provides a concrete example of an existing protocol .... daily basis, they are eager to learn about them. Having ...
Nov 30, 2017 - crisp romaine, red oak, arugula and radicchio with parmesan croutons ... in a king crab - jumbo shrimp sc
Lawrence Erlbaum Associates, Inc., Publishers. 10 Industrial ...... (after each output section is discussed), and the logo of the program as well as recurring first ...
Pressay and Avants (1972) and. Rillo et al. (1992) extracted PE from tomato and mandarin orange by using l.OM aCI adjusted to. pH 6.0 and 8.0, respectively.
Wenbing Zhao. 3. Course Objectives. Become familiar with the basics of
computer networks. What is a computer network. What are the network
architectures.
Calculus: Larson, Hostetler, Edwards. 8th ed. This text is required for the class.
You will also need a TI 83 or 84 calculator. The TI 89 or 92 cannot be used.
HAZELNUT ALMOND MERINGUE CAKE orange muscat apricot sorbet, toasted almond crumble. ROSE MADAGASCAR VANILLA CREME BRÃLÃ
2016) that requires high levels of emotional/social intelligence, language ability, ..... ersu asive m essages. A ccep ting feed b ack in w riting. W ritin. g p rop osals.
The current era of the Internet, or best know as Web 2.0, has changed our daily life ... Weblogs, or blogs for short, can be defined as âa website where entries are ...
Computer Networking and the Internet (5th edition),Fred Halsall, Addison Wesley
. 3. Data Communications and Networking (4th edition), Behrouz Forouzan, ...
Define the term first aid. • List the aims of first aid. 10:00 - 10:30. First aid in the
workplace (PPT) + (FC) + (PRAC). • List the regulations that are associated with ...
networks and new organizational media is fundamentally emergent and recursive, best .... Computer-mediated communication technologies in particular are re- ..... Rice (1982) found that user consultants and personnel monitoring the system.
This module aims to provide a broad coverage of some new advanced topics in
the ... computer networks (wireless networks, mobile networks, VPN networks, ...
acute by his obsession with the mysteries of quantum mechanics. Strictly ...... then decrees that, if an auto maker produces a make of car with fuel effi- ciency of ...
1.2.6 Volterra-Fredholm Integro-Differential Equations. 1.3 Solution of an Integral Equation. 1.4 Converting Volterra Equation to an ODE. 1.4.1 Differentiating Any ...
2.5.3 Packet Switching 40. Summary 42 ... 4.9 Complement 3: Analysis of Token Ring MAC Protocol 113. 4.9.1 Token ... 5.1.5 ATM Cell Format 131. 5.1.6 AAL ...
n
•
=Q
I™ Communication Networks A First Course
Jean Walrand University of California at Berkeley
ULB Darmstadt
Me Grain/ Hill
WCB McGraw-Hill
iflllillll
16643424
Boston Burr Ridge, IL Dubuque, IA Madison, WI New York San Francisco St. Louis Bangkok Bogota Caracas Kuala Lumpur Lisbon London Madrid Mexico City Milan Montreal New Delhi Santiago Seoul Singapore Sydney Taipei Toronto
a
• •
= a
Contents
Preface
xi
Chapter 1 Introduction to Communication Networks
1
1.1 1.2 1.3 1.4
What Are Communication Networks? 1 Why Should You Learn about Communication Networks? 3 What Should You Learn about Communication Networks? 4 Evolution of Communication Networks 5 1.4.1 Telephone Network 5 1.4.2 Computer Networks 6 1.5 Organization of the Book 13 Summary 13 Chapter 2
The Way Networks Work
15
2.1 Ethernet 16 2.1.1 Shared Ethernet: Hubs and Collisions 16 2.1.2 Discovering Addresses: ARP and RARP 17 2.1.3 Interconnecting Ethernets: Switches and Routers 2.2 Internet 22 2.2.1 An Example 23 2.2.2 Routing: OSPF and BGP 24 2.2.3 Transmission Control Protocol 25 2.2.4 Client/Server Applications 26 2.3 Asynchronous Transfer Mode 27 2.3.1 Main Features 27 2.3.2 Routing 27 2.3.3 Control of QoS: Leaky Buckets 28 2.4 Network Architecture 30
18
iii
Contents
2.4.1 Layered Architecture 30 2.4.2 End-to-End Services 34 2.4.3 Physical View 35 2.5 Complement 1: Insights behind the Information Revolution 2.5.1 The Digital Revolution 37 2.5.2 Source and Channel Coding 39 2.5.3 Packet Switching 40 Summary 42 Problems 43 References 46
Chapter 3
Internet 3.1 3.2
47
A Brief History 47 Architecture 51 3.2.1 LAN-Link Layer 51 3.2.2 Network Layer 52 3.2.3 Transport 52 3.2.4 Applications 53 3.3 Names and Addresses 56 3.3.1 Names 56 3.3.2 Addresses 58 3.4 Internet Protocol 60 3.4.1 IP Datagrams and ICMP 61 3.4.2 OSPF 62 3.4.3 BGP 66 3.4.4 Plug and Play: DHCP 67 3.4.5 Mobile IP 68 3.5 End-to-End Transmission 68 3.5.1 Overview 68 3.5.2 Retransmission Protocol 69 3.5.3 TCP 70 3.5.4 UDP 72 3.6 Complement 1: Link Protocols 72 3.6.1 SLIP 72 3.6.2 PPP 73 3.7 Complement 2: Analysis of Dijkstra's Shortest Path Algorithm 73 3.7.1 Definition 73 3.7.2 Shortest Paths 74 3.8 Complement 3: Other Routing Algorithms 75 3.8.1 Bellman-Ford 75 3.8.2 Spanning Tree 79 3.9 Complement 4: IPv6 80 3.10 Complement 5: Multicast Routing 81 3.10.1 Hooding 81 3.10.2 Spanning Tree Routing 81
4.1 Architecture and Characteristics 89 4.1.1 Architecture 89 4.1.2 Characteristics of LANs 90 4.2 Ethernet and IEEE 802.3 92 4.2.1 Layout 92 4.2.2 Physical Layer 93 4.2.3 MAC 94 4.2.4 Switched 10BASE-T 95 4.2.5 100BASE-T 96 4.2.6 Gigabit Ethernet 97 4.3 Token Ring Networks 97 4.3.1 Layout 97 4.3.2 Physical Layer 97 4.3.3 MAC 98 4.3.4 Interconnecting Token Rings 99 4.4 FDDI 99 4.4.1 Layout 100 4.4.2 Physical Layer 100 4.4.3 MAC 101 4.4.4 Station Management 102 4.5 Wireless LANs 103 4.5.1 Architecture 103 4.5.2 Physical Layer 104 4.5.3 Hiperlan 104 4.5.4 IEEE802.il 105 4.6 Logical Link Control 106 4.7 Complement 1: Latency of LANs 107 4.8 Complement 2: Analysis of CSMA/CD Protocol 108 4.8.1 CSMA/CD Protocol 108 4.8.2 Efficiency of CSMA/CD 109 4.8.3 Analysis 109 4.8.4 Examples 111 4.8.5 Average Medium Access Time 112 4.8.6 Efficiency of IEEE 802.3 112 4.9 Complement 3: Analysis of Token Ring MAC Protocol 4.9.1 Token Ring MAC Protocol 113 4.9.2 Efficiency of Token Ring MAC Protocol 113
113
• i Contents
4.9.3 Analysis 114 4.9.4 Maximum Medium Access Time 115 4.10 Complement 4: Analysis of FDDI MAC Protocol 4.10.1 FDDI Protocol 115 4.10.2 MMAT of FDDI Protocol 116 4.10.3 Analysis 116 4.10.4 Efficiency of FDDI Protocol 118 4.11 Complement5: ALOHA 119 4.11.1 Description 119 4.11.2 ALOHA Protocols 119 4.11.3 Efficiency of ALOHA Protocols 120 4.11.4 Analysis 120 4.11.5 Reservations 122 Summary 123 Problems 124 References 125
Chapter 5 Asynchronous Transfer Mode
115
127
5.1
Architecture 127 5.1.1 Protocol Layers 127 5.1.2 Three Application Examples 128 5.1.3 Design Philosophy of ATM 129 5.1.4 Operating Principles 130 5.1.5 ATM Cell Format 131 5.1.6 AAL 131 5.1.7 Network Operations and Maintenance 133 5.2 Routing in ATM 135 5.2.1 Routing Tables 135 5.2.2 Network Node Interface 136 5.2.3 Switch Designs 138 5.3 End-to-End Services 140 5.3.1 Quality of Service Attributes 140 5.3.2 Traffic Descriptors 140 5.3.3 Service Classes 141 5.4 Internetworking with ATM 142 5.4.1 IP over ATM 142 5.4.2 LAN Emulation over ATM 143 5.5 Complement: Delay in Simple Switch 145 Summary 145 Problems 146 References 147
Chapter 6
Data Link Layer and Retransmission Protocols 6.1
Framing 149 6.1.1 Encapsulation
149
148
Contents Vll
6.1.2 Error Control 153 Retransmission Protocols 157 6.2.1 Link or End-to-End Control 157 6.2.2 Retransmission Protocols: Preview and Summary 158 6.3 Stop-and-Wait Protocol (SWP) 159 6.3.1 Summary of Operations 159 6.3.2 Correctness 160 6.3.3 Efficiency 163 6.4 Alternating Bit Protocol (ABP) 164 6.4.1 Summary of Operations 164 6.4.2 Correctness 164 6.4.3 Efficiency 165 6.5 GOBACKN(GBN) 166 6.5.1 Summary of Operations 166 6.5.2 Efficiency 167 6.5.3 Concrete Examples: Choosing W 167 6.5.4 Adapting to Network Delays 168 6.5.5 GO BACK N Summary 168 6.6 Selective Repeat Protocol (SRP) 169 6.6.1 Summary of Operations 169 6.6.2 Efficiency 170 6.6.3 Correctness 170 6.6.4 Selective Repeat Protocol Summary 171 6.7 Examples 171 6.7.1 Data Link of SNA 171 6.7.2 Data Link Layer of Public Data Networks (X.25) 172 6.7.3 Retransmission Protocol in Internet 172 6.7.4 Data Link Layer in Frame Relay 172 6.7.5 XMODEM 173 6.7.6 Kermit 173 6.8 Complement 1: Error Control Codes 175 6.8.1 Calculating the CRC 175 6.8.2 Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes 177 6.8.3 Convolutional Codes 181 6.8.4 Turbo Codes 184 6.9 Complement 2: Correctness of ABP 186 6.10 Complement 3: Correctness In a Non-FIFO Network 187 6.10.1 ABP 187 6.10.2 GBN 189 6.11 Complement 4: Congestion and Flow Control in Internet 189 6.11.1 Objectives and Mechanisms 190 6.11.2 Delay/Window Mechanism (Vegas) 190 6.11.3 Algorithm (Vegas) 191 6.11.4 Loss/Window Mechanisms (Tahoe, Reno) 191 6.11.5 Additive Increase—Multiplicative Decrease 193 6.11.6 Incompatibility of Reno and Vegas 194 6.2
Contents
6.11.7 Rate-Based Control: ABR in ATM 195 6.11.8 Detecting Late Acknowledgments 196 6.12 Complement 5: Efficiency of Protocols in the Presence of Errors 197 Summary 198 Problems 199 References 200
Chapter 7 Physical Layer
202
7.1 Communication Links and Their Characteristics 202 7.1.1 Digital Link 202 7.1.2 Frequency and Propagation 204 7.1.3 Limitations 205 7.1.4 Converting between Bits and Signals 209 7.2 Optical Links 213 7.2.1 Overview 213 7.2.2 Propagation in Fibers 216 7.2.3 Light Sources 218 7.2.4 Light Detectors 219 7.2.5 Free-Space Infrared 219 7.3 Copper Lines 220 7.3.1 Overview 220 7.3.2 Modulation 221 7.3.3 CATV and Video-on-Demand Systems 223 7.4 Radio Links 224 7.4.1 Overview 224 7.4.2 Propagation 225 7.4.3 Cellular Networks 225 7.5 Complement 1: Shannon Capacity 225 7.6 Complement 2: Sampling and Quantization 226 7.7 Complement 3: SONET 228 7.7.1 SONET Architecture 229 7.7.2 Frames 230 7.8 Complement 4: Power Budget in Optical Link 231 7.9 Complement5: RS-232-C 233 7.10 Complement 6: ADSL 234 Summary 235 Problems 236 References 237
Chapter 8 Security and Compression 8.1
238
Threats and Protections 238 8.1.1 Threats against Users 239 8.1.2 Threats against Documents 240 8.2 Cryptography 241