rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780198066774

Computer Networks

by
  • ISBN13:

    9780198066774

  • ISBN10:

    0198066775

  • Edition: Reprint
  • Format: Paperback
  • Copyright: 2012-08-02
  • Publisher: Oxford University Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $37.28
We're Sorry.
No Options Available at This Time.

Summary

Computer Networks is designed as a textbook for undergraduate students of computer science engineering as well as students pursuing courses MCA and IT. The book covers the fundamentals of Computer Networks and provides the tools that will help in simplifying the concepts and protocols for the students. Beginning with network fundamentals such as types of networks, network components etc, and an overview of data communications, the books moves on to provide a layer approach to building a computer network. Exhaustive description of the physical layer, data link layer, medium access sub layer, transport layer, and application layer is provided. The book also provides separate coverage of security issues. Key concepts of OSI model, its layers and their applications, TCP/IP, UDP, fiber optic communication, IEEE 802 wireless standard, various network protocols, and other advanced concepts are covered in detail. Using a simple approach with plenty of interesting analogies, the book provides a rich mix of examples and exercises to help students assimilate the theory.

Author Biography



Bhushan Trivedi is currently Professor and Director, MCA Programme at GLS Institute of Computer Technology, Ahmadabad. He has over 20 years of experience in teaching postgraduate students of computer applications. During the course of his career, the author has taught papers on C++, C, Data Structures, Computer Networks, DBMS, and Artificial Intelligence.

He has also served as Director and HOD of the MCA department of Gujarat Vidyapeeth. He has authored one book - Programming in ANSI C++ - published by Oxford University Press.

Table of Contents


1. Introduction to Computer Networks
1.1 The need to share resources
1.2 Concept of Layering
1.2.1 Layering Example
1.2.2 Advantages of Layering Mechanism
1.2.2.1 Division of Work
1.2.2.2 Standard Interfacing between Components
1.2.2.3 Replacing a component is easy
1.2.2.4 Independence in Protocol design
1.2.3 Disadvantages of Layering
1.2.3.1 Speed and Performance are reduced
1.2.3.2 Memory usage increased
Ex. Sensor Networks node
1.2.4 The TCP/IP and OSI layering Models
1.2.5 The OSI Model
1.2.6 The TCP/IP model
1.2.7 Connection oriented vs. Connectionless transfer
1.2.8 The difference between TCP/IP and OSI Models
1.2.9 The Top Down and Bottom Up approaches for studying layers
1.2.10 Functions of each layer
1.2.10.1 The Physical Layer
1.2.10.2 The Data Link Layer
1.2.10.3 The Network Layer
1.2.10.4 The Transport Layer
1.2.10.5 The Application Layer
1.2.10.6 The entire communication process
1.3 Distributed systems and Networks
1.4 Peer-to-peer and client server networks
Keywords
Points to remember
Exercises
2. Network Fundamentals
2 Introduction
2.1 Prerequisite to the definition of the network
2.2 Definition: Network
2.3 Network categories
2.3.1 Division based on Periphery
2.3.1.1 Personal Area Networks
2.3.1.2 Local Area Networks
2.3.1.3 Metropolitan Area Network and Wide Area Network
2.3.1.4 Internetworks
2.3.2 Division based on connection
2.3.2.1 Wired Networks
2.3.2.2 Wireless Networks
MANets
Sensor networks
2.3.3 Division based on Communication type
2.3.3.1 Broadcast Networks
2.3.3.2 Point to point networks
2.3.4 Division based on usage
2.3.4.1 Home Networks: the usage
2.3.4.2 Sensor Networks: the usage
2.3.4.3 Other types of categorization of networks
2.4 Network Components
2.4.1 The Network Interface Card or LAN Card
2.4.2 Wire for wired connection
2.4.3 Frequency band for wireless transmission
2.4.4 The servers and the nodes
2.4.5 Interconnecting devices
2.4.5.1 Hub
2.4.5.2 Switch
2.4.5.3 Repeater
2.4.5.4 Bridge
2.4.5.5 Router
2.5 The Connection
2.5.1 The Physical Connection
2.5.1.1 Connection by the Network Interface Card
2.5.1.2 Other types of Connection
Serial connection
Parallel connection
Universal Standard Bus (USB) connection
2.5.2 The Logical Connection
2.5.2.1 Connection Oriented connection
2.5.2.2 Connectionless connection
2.5.2.3 Connection oriented connection on top of Connectionless connection
2.5.2.4 Connectionless connection on top of connectionless connection
2.5.2.5 Addressing issues
2.6 Layers and Services
2.6.1 Design of layers as service providers and users
2.6.2 Standardization of services
2.6.3 Quality of Service issues
2.7 Users and Services
2.7.1 Desired characteristics of an Application layer
2.7.1.1 API or GUI
2.7.1.2 User Friendliness
2.7.1.3 Concurrency control
2.8 The protocols
2.8.1 The standardization bodies
2.8.2 Connection and protocol
2.8.3 Connectionless and Connection Oriented Protocols
2.8.4 Layers and protocols
2.8.4.1 Differentiating between interfaces and protocols
2.8.4.2 Need for peers to communicate
2.9 Applications of computer networks
2.9.1 Types of Network Applications
2.9.2 Home Networking Applications
2.9.3 Mobile Networking Applications
2.9.4 Wireless Networking Applications
2.10 Security issues
2.10.1 Hidden Dangers
2.10.2 Policy issues
2.10.3 The dilemma of user convenience vs. safer state of a network
2.10.4 Social Engineering
Keywords
Points to remember
Exercises
3. Data Communication fundamentals
3.1 Data Communication Basics
3.2 The Bandwidth, the data rate and limiting factors
3.2.1 The frequency and the band
3.2.2 The media effect on the bandwidth of the signal
3.2.3 The composite signals and Fourier components
3.2.4 The bandwidth, harmonics, noise and maximum data rate of a channel.
3.2.5 Filters
3.3 Analog and Digital Signaling
3.3.1 Analog Signaling
3.3.2 Digital signaling
3.3.3 Difference
3.4 Analog and Digital Transmission
3.4.1 Introduction to Transmission
3.4.2 Analog Transmission
3.4.3 Digital Transmission
3.5 Coding mechanisms
3.6 Modulation
3.6.1 Amplitude modulation
3.6.1.1 Digital signaling and errors
3.6.2 Frequency modulation
3.6.3 The Phase Modulation
3.7 Modulation in Practice
3.7.1 Modulation in cable TV
3.7.2 Modulation in ADSL
3.8 Multiplexing and de-multiplexing
3.9 Time Division Multiplexing
3.10 Frequency division multiplexing
3.11 Switching and Routing
3.12 Transmission and Errors
3.12.1 Attenuation
3.12.2 Distortion
3.12.3 Noise
Keywords
Points to remember
Exercises
4. The Physical Layer
4.1 Introduction
4.2 The duties of physical layer
4.2.1 Machine port level addressing
4.2.2 Transferring bits
4.2.3 Synchronizing sender and receiver
4.2.4 Multiplexing multiple data streams
4.2.5 Inappropriateness of FDM and TDM for bursty data
4.2.6 The Electromagnetic Spectrum
4.2.7 Radio Waves
4.2.8 Microwaves
4.3 Infrared and Millimeter Waves
4.4 The ISM Bands
4.5 The optical light and Free Space Optics
4.6 Wired Physical Layer
4.6.1 The UTP cable
4.6.2 The total internal reflection principle
4.6.3 The Fiber Optic Cable
4.6.4 Design of fiber cables
4.6.5 Sending and receiving devices
4.6.6 Comparison with UTP
4.6.7 Other cables
4.7 Wireless Physical Layer
4.7.1 Two special cases, hidden and exposed station
4.7.2 Solution to the Hidden and Exposed station problem
4.7.3 Components of the Wireless system
4.7.4 Antennas
4.7.5 Access Points
4.7.6 Wireless LAN
4.7.7 The 802.11 standard
4.7.8 Ad hoc and Infrastructure modes
4.7.9 802.11 physical layer
4.7.9.1 The 802.11b
4.7.9.2 The OFDM and the 802.11a
4.7.9.3 The 802.11g
4.7.9.4 The 802.16 physical layer
4.7.9.5 802.16d, the standard for Fixed Wireless Broadband
4.7.9.6 Orthogonal Frequency Division Multiple Access (OFDMA) and 802.16e
4.7.10 Wireless communication using Satellite
4.7.10.1 Three different orbits
LEO for data communication
4.8 The Teledesic and GlobalStar
4.9 Physical Layer based on telephone line
4.9.1 The telephone
4.9.2 The xDSL
4.9.3 Discrete Multitone: standard for ADSL and VDSL
4.10 Cable Internet
4.11 Whitespaces
Keywords
Points to remember
Exercises
Chapter 5: The Data Link Layer
5.1 Duties of Data Link Layer
5.1.1 The No Monopoly idea and the framing
5.1.2 Framing Techniques
5.1.2.1 Framing using Flag Byte and stuff using Byte Stuffing
Framing by flag byte and Bit Stuffing
Framing by using illegal combinations
Character count with other methods
5.2 The Error
5.2.1 Type of Errors
5.2.2 The error handling
5.2.3 Redundancy: the fundamental need for error handling
5.2.4 Error is not always handled at DLL
5.2.5 Error Detection
5.2.5.1 Checksum
5.2.5.2 Cyclic Redundancy Check
Modulo 2 Arithmetic
The division process
Other important properties
5.2.6 Error Correction
5.2.7 What is more important, Correction or Detection?
5.2.8 The flow control
5.2.9 The services from physical and to Network layers
5.2.10 Local machine level addressing
5.2.11 Multiplexing and demultiplexing
5.3 The Protocols
5.3.1 The Sender and Receiver concept
5.3.2 The acknowledgement
5.3.3 The timers and time out event
5.3.4 The sending and Receiving windows and acks
5.3.5 The Sequence and acknowledgement numbers
5.3.6 Retransmission
5.3.7 Duplicate frames
5.3.8 Go Back N
5.3.9 Selective Repeat
5.3.10 Prerequisites for coding protocols
5.3.10.1 Protocol 1
5.3.10.2 Protocol 2
5.3.10.3 Protocol 3
5.3.10.4 Protocol 4
5.3.10.5 Protocol 5 - Go back N
5.3.10.6 Protocol 6
5.3.10.7 The need for process to process communication
5.3.10.8 Introduction to Named pipes
5.3.10.9 Implementation for timers
Keywords
Points to remember
Exercises
6. The Medium Access Sub layer
6.1 Introduction
6.1.1 Shared Channel Concept
6.1.2 Collision detection and avoidance
6.1.3 Channel acquisition issues
6.1.4 Adhoc and Infrastructure modes
6.2 Wired MAC Layer
6.2.1 The prerequisite to Ethernet, ALOHA and Slotted ALOHA
6.2.2 The Ethernet
6.2.2.1 Classic Ethernet
Types of connections
Ethernet Topology
Frame Structure
CSMA/CD principle and implementation
Limitations of CSMA/CD
The binary exponential back off algorithm
Using switch instead of hubs
6.2.3 Fast Ethernet
6.2.3.1 Types of connection
6.2.3.2 The paradigm shift, point to point from shared
6.2.4 The Gigabit Ethernet
6.2.4.1 Modes of operation
6.2.4.2 Types of connections
6.2.4.3 Handling longer range
Career or Hardware extension
Frame bursting
6.2.4.4 The 8B/10B coding
6.2.4.5 4B/5B Encoding
6.2.4.6 Flow control
6.2.5 The 10Gb Ethernet
6.2.5.1 Types of connections
6.2.6 Future versions
6.2.7 Dual speed cards, auto negotiation and upgrades
6.3 802.2, the logical link control (LLC) layer
6.4 Wireless MAC Layer
6.4.1 The Wireless LAN protocol (802.11)
6.4.2 Adhoc or DCF Mode
6.4.3 Fragmentation in DCF mode
6.4.4 PCF or infrastructure mode
6.4.4.1 Access points (APs) and service primitives
6.4.5 Managing PCF and DCF modes together
6.4.6 The 802.11 frame
6.4.7 Frame Control
6.4.8 Duration
6.4.9 DSS and Four address fields
6.4.10 Intra-cell and inter-cell transmission
6.4.11 Sequence, Payload and CRC fields
6.4.12 Wireless Broadband
6.4.13 The Wireless Broadband Protocol (802.16) sub Layers
6.5 The MAC Layer
6.5.1 Service Classes (or flows)
6.6 The Generic frame structure
6.7 Connecting devices at data link layer
6.8 Bridges
6.8.1 The auto configuration and manageability
6.8.2 Parallel bridges and spanning tree solution
6.8.3 Remote bridges
6.9 Connecting heterogeneous networks
6.10 The Virtual LAN
6.11 The IEEE 802.1Q standard
6.12 The VLAN Operation
Keywords
Points to remember
Exercises
7. The Network Layer
7.1 Introduction
7.2 Network Layer Duties
7.2.1 Routing
7.2.2 Accounting
7.2.3 Receive service from Data Link Layer
7.2.4 Provide service to Transport Layer
7.2.5 Global machine level Addressing
7.2.6 Multiplexing and demultiplexing multiple transport layer connections
7.2.7 Multiplexing and De-multiplexing data link layer connections
7.3 Connection oriented forwarding using virtual Circuits
7.4 Connectionless forwarding using datagrams
7.5 Connection Oriented vs. Connectionless forwarding
7.6 Example
7.6.1 Comparison
7.7 Routing Algorithms
7.7.1 Requirements of a good Routing Algorithm
7.7.1.1 Dynamism and flexibility
7.7.1.2 Performance
7.7.1.3 Robustness
7.7.2 Internal and External routing algorithms
7.7.3 Distance Vector Routing
7.7.3.1 How the routing table is constructed
7.7.3.2 Example
7.7.3.3 The count to infinity problem
7.7.4 Link State Routing
7.7.4.1 Collecting Information from other routers and estimating the AS topology
7.7.4.2 Finding neighbors and delay
7.7.4.3 Sequence number and Age fields
7.7.4.4 Routing table construction
7.7.5 Routing in MANET
7.7.5.1 Route discovery operation
7.7.5.2 Route maintenance
7.7.6 Border Gateway Protocol
7.7.6.1 The BGP operation
7.8 Hierarchical routing
7.9 Broadcast routing
7.10 Multicast routing
7.11 Congestion
7.11.1 Congestion Control
7.11.2 Congestion Control Algorithms
7.11.2.1 Admission Control
7.11.2.2 Prevention of congested routes
7.11.2.3 Dropping packets and RED (Random Early Discard)
7.11.2.4 Jitter Control
7.12 Network Layer switching
7.12.1 Multi protocol Label Switching (MPLS)
7.13 Internetworking issues
7.13.1 Heterogeneity in networks
7.13.2 Fragmentation
7.13.3 Tunneling
7.14 Security issues at Network layer and IPSec
7.14.1 Overview of IPSec
Keywords
Points to remember
Exercises
8. The Transport Layer
8.1 Introduction
8.2 Transport Layer Duties
8.2.1 Multiplexing, demultiplexing and port numbers
8.2.2 Service to Application layer
8.2.3 Desirable services not provided by Internet Transport layers
8.2.4 Process level addressing
8.2.5 Providing end-to-end solutions
8.2.5.1 Flow control
8.2.5.2 Managing multiple connections dynamically
8.2.5.3 Timer management
8.2.5.4 Session control
Retransmission, RTT and timeout calculations
Other timers
8.3 Connection management in transport layer
8.3.1 The Delayed Duplicate Problem
8.3.2 The Connection Establishment
8.3.3 The three way handshake
8.3.4 Connection Establishment in TCP
8.3.5 The connection Release
8.4 Congestion Control
8.4.1 Detection
8.4.2 Reacting to Congestion using RED
8.4.5 Fast recovery, MDCA and AIMD
8.4.4 Flow Control
8.5 Comparison with data link layer
8.6 Client server communication
8.6.1 Problems and Solutions
8.6.2 Sockets and communication using sockets
8.6.2.1 TCP State Transition Diagram
8.7 A sample client server program
8.8 Other issues
8.8.1 Buffer Management
8.8.2 Crash recovery
8.8.3 Performance
8.9 Nonstandard performance improvement procedures
Keywords
Points to remember
Exercises
9. The Application Layer
9.1 Introduction
9.2 Domain Name System
9.2.1 The Domain Namespace
9.2.1.1 Advantages of Hierarchy
9.2.1.2 The distributed database
9.2.1.3 Search mechanism and name resolution
9.2.1.4 The Zone
9.2.2 The registration process
9.2.3 The name servers
9.2.4 The Resource Records
9.2.5 Different types of resource records
9.2.6 DDNS (Dynamic DNS)
9.2.6.1 The DNSSec
9.3 The World Wide Web and HTTP
9.3.1 The HTTP query and Response
9.3.2 The structure of the Query and Response
9.3.3 Other methods
9.3.4 Persistent connection with HTTP 1.1
9.3.5 Cookies to make browser more user friendly
9.3.6 Session variables
9.3.7 The conditional download
9.3.8 Proxies as intermediaries
9.3.9 The dynamic web
9.3.10 The Email System
9.3.11 Introduction to SMTP and components of Email system
9.3.12 Mail boxes, mail aliases and alias expansion
9.3.13 The user agent
9.3.14 Internet mail standard for mail content: - RFC 2822
9.3.15 MTA and the SMTP, the message transfer standard of Internet.
9.3.16 IMT (Internet Media Types)
9.3.17 SMTP and HTTP, a comparison
9.3.18 Base64 and Quoted Printable encoding
9.3.19 The intermediaries used in mailing
9.3.20 The POP3 and IMAP
9.3.21 The web-mail
9.3.22 Filters and SPAM
9.4 The file transfer protocol (FTP)
9.5 The Control and Data connections
9.6 FTP port numbers
9.7 7 bit NVT ASCII- the format for data transfer
9.8 Accessing FTP using menu driven programs and browsers
9.9 Anonymous FTP
9.10 Secure FTP, SSL-FTP
Keywords
Points to remember
Exercises
10. Cryptography and Network and Information Security
10.1 Introduction
10.2 Cryptography
10.2.1 The Conventional Security Model
10.2.2 Substitution and transposition
10.2.3 Symmetric Key algorithms
10.2.3.1 Substitution cipher and SBOX
10.2.3.2 Transposition cipher and PBOX
10.2.4 Block ciphers
10.2.4.1 Digital Encryption Standard (DES)
10.2.4.2 Triple DES
10.2.4.3 Advanced Encryption Standard (AES)
10.2.5 Onetime pads
10.2.6 Quantum Cryptography
10.2.6.1 Terms related to quantum cryptography
10.2.6.2 The working of BB84
10.2.7 Avoiding random and replay attacks
10.2.8 Cipher modes
10.2.8.1 Electronic Codebook Mode
10.2.8.2 Cipher Chaining Mode
10.2.8.3 Cipher feedback mode
10.2.8.4 Stream cipher
10.2.8.5 Counter mode
10.3 Cryptanalysis
10.3.1 Attacking block ciphers
10.4 Public Key algorithms
10.4.1.1 RSA
10.4.1.2 Why RSA works?
10.4.1.3 Strength of RSA
10.4.1.4 Other Methods
10.4.1.5 The key distribution issues
10.5 Digital Signatures
10.5.1.1 Symmetric Key signature
10.5.1.2 Public Key Signature
10.5.1.3 Message Digests
The prerequisite for the design of hash function
MD5
SHA-1
10.5.1.4 The Birthday Attack
10.6 Public Key Management
10.6.1.1 Certificates and X.509 standard
10.6.1.2 Public Key Infrastructure (PKI)
Directories
Revocation
10.7 Authentication Protocols
10.7.1 Authentication based on shard secret key
10.7.2 The Shared Secret key using HMAC
10.7.3 The Diffie-Hellman key Exchange
10.7.4 Authentication using a Key distribution Center
10.7.4.1 Needham-Schroeder protocol
10.7.4.2 Authentication using Kerberos
10.7.5 Authentication using a public key cryptography
10.8 Information security
10.8.1 Vulnerabilities
10.8.2 Attacks
Keywords
Points to remember
Exercises

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program