We use cookies to enhance your experience on our website. By continuing to use our website, you are agreeing to our use of cookies. You can change your cookie settings at any time. Find out more
Cover

Networks for Computer Scientists and Engineers

Youlu Zheng and Shakil Akhtar

Publication Date - November 2001

ISBN: 9780195113983

592 pages
Hardcover
7-1/2 x 9-1/4 inches

Retail Price to Students: $214.99

Description

Networks for Computer Scientists and Engineers is a data communications and networks textbook with a unique software projects and laboratory-based approach. Due to its innovative and distinctive features, it has won unanimous recommendation and partial sponsorship by the curriculum development committee of the National Science Foundation. Designed for undergraduate students, it covers both fundamental theory and modern technologies. The Instructor's Manual and CD (available to adopters) provide step-by-step instructions for configuring client/server computers, hubs, routers, and switches to construct a cost-effective prototype network lab with implementation of web (http), email, VPN, and other servers. This prototype lab is based on Linux and other popular platforms, demonstrates how different protocols and components are integrated into a heterogeneous network, and provides an ideal environment for troubleshooting and experimental network management. The book's accompanying software projects--included on the instructor's CD--are not merely samples but complete software packages with real applications and utilities written in Java, C, C++, assembly language, and thoroughly tested by professors and students at several universities. Used together, Networks for Computer Scientists and Engineers and the accompanying laboratory projects actively engage students in the learning process and provide opportunities for critical thinking, problem solving, and creativity in a controlled real-world setting.

Features

  • Covers LAN, WAN, wireless, and high-speed networking technologies; OSI seven layers; data communications; and network performance, programming, management, and security
  • Includes networking projects with directions and sample solutions
  • Features numerous figures, examples, summaries, review questions, references, and a glossary
  • Contains problem sets and up-to-date World Wide Web sites related to each chapter
  • Provides answers to the review questions and step-by-step instructions in the accompanying Instructor's Manual

  • Table of Contents

      Most chapters end with a Chapter Summary, Problems, References, and a list of related Articles and World Wide Web Sites.
      Preface
      Chapter 1. Introduction
      1.1. Evolution of Data Communications and Networks
      1.1.1. Changes in Telecommunications in the Late Twentieth Century
      1.1.2. The Progress and Future of Telecommunications
      1.1.3. Present Solutions
      1.2. Telephone Systems and Computer Telephony
      1.2.1. Telephone Functioning
      1.2.2. Telephone Networks
      1.2.3. Telephone Numbering
      1.3. Overview of Computer Telephony
      1.3.1. Computer Telephony
      1.3.2. Internet Telephony
      1.3.3. Unified Messaging
      1.3.4. Network Structures and Network Topologies
      1.4. Distributed Systems and Client-Server Models
      1.4.1. Centralized Computing vs. Distributed and Client-Server Systems
      1.4.2. Three-Tier Client-Server Systems
      1.4.3. Web-Based Application Servers and Electronic Commerce
      1.5. Protocols and Standardization
      1.5.1. Protocol Syntax and Semantics
      1.5.2. National and International Standards
      1.5.3. Telecommunication Standards and Organizations
      1.5.4. Networks Standards and Organizations
      Chapter 2. Data Communications
      2.1. Advantages of Digital Communications
      2.2. Transmission Media
      2.2.1. Shielded and Unshielded Twisted Pair (STP and UTP) Wiring
      2.2.2. Coaxial Cable
      2.2.3. Optical Fiber
      2.2.4. Radio and Microwave
      2.2.5. Satellite Communications
      2.3. Fundamentals of Digital Transmission
      2.3.1. Frequency Spectrum, Bandwidth, and Data Rate
      2.3.2. Shannon's Law
      2.3.3. The Sampling (Nyquist) Theorem
      2.4. Digitization and Multilevel Transmission
      2.4.1. Pulse Code Modulation (PCM)
      2.4.2. Advanced Digitization Techniques: CPCM, DPCM and ADPCM
      2.5. Modulation Techniques and Modems
      2.5.1. Amplitude Modulation
      2.5.2. Frequency Modulation
      2.5.3. Phase Modulation
      2.5.4. Modem Technologies
      2.6. Terminal Devices
      2.6.1. Dumb and Intelligent Terminals
      2.6.2. Data Terminal Equipment and Data Communications Equipment
      2.7. Wireless Communication
      2.7.1. Digital Cellular Telephone and Personal Communication Services (PCS)
      2.7.2. Wireless Data Services
      2.7.3. Geographic Position Systems and Their Applications
      2.8. Videoconferencing
      2.8.1. Desktop Videoconference Systems
      2.8.2. Document Conference Systems
      2.8.3. Videoconference Standards
      Chapter 3. The OSI Seven-Layer Network Model
      3.1. Physical Layer
      3.1.1. Data Encoding
      3.1.2. Multiplexing Schemes
      3.2. Data Link Layer
      3.2.1. Asynchronous and Synchronous Communications
      3.2.2. Error Detection and Correction
      3.2.3. Framing and Flow Control
      3.2.4. High-Level Data Link Control (HDLC)
      3.3. Network Layer
      3.3.1. Subnet Concept
      3.3.2. Overview of Switching Techniques
      3.3.3. Routing Strategies
      3.3.4. Congestion Control
      3.4. Transport Layer and Session Layer
      3.5. Presentation Layer and Application Layer
      3.5.1. Data Compression
      3.5.2. Encryption and Decryption
      3.5.3. Network Applications
      3.6. Network Performance
      3.6.1. Delay
      3.6.2. Throughput
      3.6.3. Bandwidth Utilization
      3.6.4. Error Rate, Congestion, and Network Reliability
      Chapter 4. LAN Technologies
      4.1. LAN Overview
      4.2. Protocols and Standards
      4.2.1. IEEE Standards
      4.2.2. CSMA/CD, Ethernet, and IEEE 802.3
      4.2.3. Token Bus and IEEE 802.4
      4.2.4. Token Ring and IEEE 802.5
      4.2.5. Commercial LAN Systems
      4.2.6. Wireless LAN and IEEE 802.11
      4.3. LAN Hardware
      4.3.1. Connecting Components: Cabling, Connectors, Transceivers, Repeaters, and Network Interface Cards
      4.3.2. Workstations and Network Servers
      4.3.3. Network Storage Systems and Hierarchical Storage Management (HSM)
      4.4. LAN Services and LAN Operating Systems
      4.4.1. Network File System
      4.4.2. Network Directory Services
      4.4.3. Network Printing and Fax Services
      4.4.4. Backup
      4.4.5. LAN Operating Systems
      Chapter 5. TCP/IP and the Internet
      5.1. Internet Architecture
      5.1.1. Internet Addresses
      5.1.2. Gateway Addressing
      5.1.3. Network and Broadcast Addressing
      5.1.4. Dotted Decimal Notation
      5.1.5. Loopback Addressing
      5.1.6. Weaknesses in Internet Addressing
      5.1.7. Mapping of Physical and IP Addresses
      5.1.8. Reverse Address Resolution Protocol (RARP)
      5.2. Internet Protocol (IP) and Datagrams
      5.2.1. IP Datagram Format and Types of Services
      5.2.2. Datagram Encapsulation and Fragmentation
      5.2.3. Reassembly and Fragmentation Control
      5.2.4. Other Fields
      5.2.5. Error and Internet Control Message Protocol (ICMP)
      5.2.6. IPv6
      5.3. Routing Protocols
      5.3.1. Routing Table and Routing Mechanisms
      5.3.2. Subnet Routing
      5.3.3. Internet Routing
      5.4. User Datagram Protocol (UDP)
      5.5. Transmission Control Protocol (TCP)
      5.5.1. TCP Header and Services
      5.5.2. Connection Establishment and Termination
      5.5.3. Flow Control and Window Size Advertising
      5.5.4. TCP Time Out and Retransmission
      5.6. Internet Standard Services
      5.6.1. File Transfer Protocol (FTP)
      5.6.2. Simple Mail Transfer Protocol (SMTP) and Examples
      5.6.3. Post Office Protocol (POP3)
      5.6.4. Remote Login and Telnet
      5.7. Domain Name System (DNS)
      5.7.1. Mapping Domain Names to IP Addresses
      5.7.2. DNS Messages
      5.7.3. Recent Advances in Internet Domain Name Hierarchy
      5.8. TCP/IP for PCs
      5.8.1. Serial Line Internet Protocol (SLIP)
      5.8.2. Point-to-Point (PPP)
      5.8.3. Winsock
      5.9. Internet Applications
      5.9.1. World Wide Web (WWW)
      5.9.2. Recent Developments
      Chapter 6. Access and High-Speed Networking Technologies
      6.1. Integrated Service Digital Network (ISDN)
      6.1.1. ISDN Signaling and Architecture
      6.1.2. ISDN Protocols
      6.1.3. ISDN Advantages
      6.1.4. Broadband ISDN
      6.2. Cable Modem Systems
      6.3. Digital Subscriber Line (DSL) Technology
      6.4. Switched Multimegabit Data Service (SMDS)
      6.4.1. SMDS Features
      6.4.2. SMDS Addressing and Protocols
      6.5. Frame Relay
      6.5.1. Protocol and Architecture
      6.5.2. Implementation
      6.5.3. Frame Relay Performance Analysis and Congestion Control
      6.5.4. Voice over Frame Relay
      6.5.5. Migration toward ATM
      6.6. Fast Ethernet, 100VG-AnyLAN and Gigabit Ethernet
      6.6.1. 100VG-AnyLAN
      6.6.2. Fast Ethernet
      6.6.3. Gigabit and 10-Gigabit Ethernet
      6.7. FDDI and CDDI
      6.8. Asynchronous Transfer Mode (ATM) Networks
      6.8.1. ATM Advantages
      6.8.2. ATM Protocol and ATM Layers
      6.8.3. ATM Switching
      6.8.4. ATM Internetworking with Frame Relay
      6.8.5. IP over ATM
      6.8.6. ATM Future
      6.9. SONET
      6.9.1. SONET Signals and Architecture
      6.9.2. SONET Layers and Frames
      6.9.3. SONET Overhead
      6.9.4. SONET Fault Tolerance
      6.10. Dense Wavelength Division Multiplexing (DWDM) Communication
      Chapter 7. Switching and Virtual LAN
      7.1. Hub Technology
      7.1.1. Early Hubs
      7.1.2. Intelligent Hubs and Their Components
      7.1.3. Interconnecting LANs and Collapsed Backbone Networks
      7.2. Switching Technology for LAN and Internetworking
      7.2.1. Switching Architectures
      7.2.2. Ethernet Switches
      7.2.3. Token Ring Switches
      7.2.4. FDDI Switches
      7.2.5. Switching Network Management
      7.3. Non-ATM Virtual LANs
      7.3.1. Segment-Based VLAN
      7.3.2. MAC-Based VLAN
      7.3.3. IP-Address-Based VLAN
      7.4. ATM Virtual LAN
      7.4.1. ATM LAN Emulation
      7.4.2. ATM Edge Routers
      7.4.3. ATM Virtual Routers
      7.4.4. ATM Relational Networks
      7.5. IEEE 802.1Q VLAN Standard
      Chapter 8. Network Performance
      8.1. Why Study Network Performance?
      8.2. Analytical Approaches
      8.2.1. Delay Throughput Analysis
      8.2.2. Probability Techniques
      8.2.3. Queuing Theory Techniques
      8.2.4. Markov Models
      8.2.5. Reliability Models
      8.3. Simulation
      8.3.1. Continuous Simulation
      8.3.2. Discrete Event Simulation (DEVS)
      8.3.3. Web-Based Simulation
      8.3.4. Simulation Models
      8.4. Network Traffic Monitoring
      8.4.1. Windows-Based Traffic Monitoring
      8.4.2. Ethernet Traffic Monitoring
      Chapter 9. Network Management
      9.1. SNMP
      9.1.1. Introduction
      9.1.2. SNMP Model
      9.1.3. Structure of Management Information
      9.1.4. SNMPv2
      9.1.5. SNMPv3
      9.2. RMON and RMONv2
      9.2.1. RMON Model
      9.2.2. RMON2
      9.3. TMN
      9.3.1. Physical Architecture
      9.3.2. Interfaces
      9.3.3. Differences between TMN and OSI
      9.4. Directory Services and Network Management
      9.5. Web-Based Network Management
      Chapter 10. Communication and Network Security
      10.1. Cryptography
      10.1.1. Secret Key Cryptography
      10.1.2. Public Key Cryptography
      10.1.3. The Data Encryption Standard (DES) and Advanced Encryption Standard (AES)
      10.1.4. Serial Encryption
      10.1.5. Link-Level, Network-Level, and Application-Level Encryption
      10.1.6. Digital Signatures, Message Digest (MD5), and Digital Certification
      10.1.7. Pretty Good Privacy (PGP) for E-mail
      10.1.8. Write Your Own Encryption Algorithms
      10.2. Digital Certificate and Public Key Infrastructure (PKI)
      10.3. Firewalls
      10.3.1. Packet-Filtering Principle
      10.3.2. Router-Based Packet-Filtering Firewalls
      10.3.3. Application Gateway Firewalls
      10.3.4. Circuit Gateway Firewalls
      10.3.5. Firewall Architectures
      10.4. Kerberos
      10.5. Secure Socket Layer (SSL) and Virtual Private Network (VPN)
      10.5.1. Secure Sockets Layer (SSL) Protocol
      10.5.2. Virtual Private Network
      10.6. New Technologies in Network Security Applications
      10.6.1. Internet Commerce and Electronic Money
      10.6.2. Secure Containers for Electronic Publishing
      10.6.3. Smart Cards and Secure Electronic Transactions (SET)
      10.6.4. Random One-Time Pad and No-Key Encryption
      Chapter 11. Network Programming
      11.1. Software Architectures that Support Network Programming
      11.1.1. Mainframe Architecture
      11.1.2. File-Sharing Architecture
      11.1.3. Peer-to-Peer Architecture
      11.1.4. Client/Server Architecture
      11.1.5. Two-Tier Architecture
      11.1.6. Three-Tier Architecture
      11.2. Serial Port and Parallel Port Programming
      11.2.1. Serial Port Programming
      11.2.2. Parallel Port Programming
      11.3. NetBIOS Programming
      11.4. TCP/IP and Socket Programming
      11.4.1. Interprocess Communication and Pipes
      11.4.2. Creation of Sockets
      11.4.3. Using Internet Library and DNS
      11.4.4. Socket Connection between Client and Server
      11.4.5. Blocking, Synchronization, and Timing
      11.4.6. Sample Client/Server Programs
      11.5. Winsock Programming
      11.5.1. Using Winsock
      11.5.2. Example Program
      11.6. RPC Programming
      11.7. JAVA Programming
      Index