Computer and communication networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ [u.a.]
Prentice Hall, Pearson Education
2015
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXXVIII, 874 S. Ill. |
ISBN: | 9780133814743 0133814742 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042295819 | ||
003 | DE-604 | ||
005 | 20150306 | ||
007 | t | ||
008 | 150128s2015 xxua||| |||| 00||| eng d | ||
020 | |a 9780133814743 |c hardcover : alk. paper |9 978-0-13-381474-3 | ||
020 | |a 0133814742 |9 0-13-381474-2 | ||
035 | |a (OCoLC)901453505 | ||
035 | |a (DE-599)BVBBV042295819 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-473 |a DE-11 | ||
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 004.6 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Mir, Nader F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer and communication networks |c Nader F. Mir |
250 | |a 2. ed. | ||
264 | 1 | |a Upper Saddle River, NJ [u.a.] |b Prentice Hall, Pearson Education |c 2015 | |
300 | |a XXXVIII, 874 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Données - Transmission | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Data transmission systems | |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027732886&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027732886 |
Datensatz im Suchindex
_version_ | 1804152869636538368 |
---|---|
adam_text | Contents
Preface
xxiii
About the Author
xxxvii
PART I: Fundamental Concepts
1
1
Packet-Switched Networks
3
1.1
Basic Definitions in Networks
4
1.1.1
Packet Switching Versus Circuit Switching
5
1.1.2
Data, Packets
,
a nd Frames
6
1.1.3
The Internet and ISPs
7
1.1.4
Classification of ISPs
9
1.2
Types of Packet-Switched Networks
11
1.2.1
Connectionless Networks
11
1.2.2
Connection-Oriented Networks
13
1.3
Packet Size and Optimizations
15
1.4
Foundation of Networking Protocols
17
1.4.1
Five-Layer TCP/IP Protocol Model
18
1.4.2
Seven-Layer
OSI
Model
20
1.5
Addressing Scheme in the Internet
21
1.5.1
IP Addressing Scheme
22
1.5.2
Subnet Addressing and Masking
24
1.5.3
Classless
Interdomain
Routing (CIDR)
26
vu
Contents
VIU
1.6
Equal-Sized Packets Model
28
1.7
Summary
28
1.
8
Exercises
29
1.9
Computer Simulation Project
34
2
Overview of Networking Devices
37
2.1
Network Interface Cards (NICs)
39
2.2
Switching and Routing Devices
40
2.2.1
Layer
1
Devices
41
2.2.2
Layer
2
Devices
42
2.2.3
Layer
3
Devices
44
2.3
Wireless Switching and Routing Devices
47
2.3.1
Wireless Access Points and Base Stations
47
2.3.2
Wireless Routers and Switches
48
2.3.3
Antennas in Wireless Devices
49
2.4
Modems
50
2.4.1
Basic Modulation: ASK, FSK, and PSK
51
2.4.2
Practical Modulation: 4-QAM and QPSK
53
2.4.3
Digital Subscriber Line (DSL) Modems
55
2.4.4
Cable Modems
57
2.5
Multiplexers
58
2.5.1
Frequency-Division Multiplexing
(FDM)
59
2.5.2
Time-Division Multiplexing
61
2.6
Summary
66
2.7
Exercises
67
2.8
Computer Simulation Project
69
3
Dau
Linies
and Link Interfaces
71
3.1
Data Links
72
3.1.1
Data Link Types
73
3.2
Link Encoder
75
3.3
Error Detection and Correction on Links
77
3.3.1
Error Detection Methods
78
3-3.2
Cyclic Redundancy Check
(CRC)
Algorithm
79
3.4
Flow Control on links
85
3.4.1
Srop-and-Wait Flow Control
85
3.4.2
Sliding-Window Flow Control
88
Contents
3.5 Link Access
by
Multiple Users 92
3.5.1
Carrier
Sense Multiple Access (CSMA) 93
3.6
Wireless
Channel Access
by
Multiple Users 97
3.6.1
Frequency-Division
Multiple Access 99
3.6.2 Time-Division Multiple Access 99
3.6.3 Orthogonal
Frequency-Division
Multiple Access 99
3.6.4
Single-Carrier Frequency-Division
Multiple Access 100
3.6.5 Code-Division Multiple Access 100
3.6.6
Other Multiple-Access Methods
104
3.7 Link
Aggregation
107
3.7.1 Link Aggregation Applications 107
3.7.2 Link
Aggregation Control Protocol (LACP)
108
3.8
Summary
109
3.9
Exercises
110
3.10
Computer Simulation Project
114
4
Local Area Networks and Networks of LANs
115
4.1
LANs and Basic Topologies
116
4.2
LAN Protocols
117
4.2.1
Logical-Link Control (LLC)
118
4.2.2
Media Access Control (MAC)
118
4.3
Networks of LANs
121
4.3.1
LAN Networking with Layer
1
Devices
121
4.3.2
LAN Networking with Layer
2
Devices
123
4.3.3
Networking with Layer
2
and
3
Devices
128
4.4
MAC/IP Address Conversion Protocols
130
4.4.1
Address Resolution Protocol
(ARP)
130
4.4.2
Reverse Address Resolution Protocol (RARP)
132
4.5
Spanning-Tree
Protocol (STP)
133
4.6
Virtual LANs
(
VLANs)
136
4.6.1
VLAN Switches
137
4.6.2
VLAN Trunking Protocol (VTP) and IEEE 802.1Q
138
4.7
Wireless LANs
139
4.7.1
Infrared LANs
140
4.7.2
Spread-Spectrum LANs
141
4.7.3
Narrowband RF LANs
141
4.7.4
Home RF and Bluetooth LANs
141
IX
Contents
4.8
IEEE
802.11
Wireless LAN Standard
142
4.8.1
IEEE
802.11
Physical Layer
144
4.8.2 802.11
MAC Layer
145
4.8.3
WiFi Networks
149
4.9
Case Study: DOCSIS, a Cable TV Protocol
151
4.10
Summary
152
4.11
Exercises
153
4.12
Computer Simulation Project
157
5
Wide-Area Routing and Internetworking
159
5.1
IP Packets and Basic Routing Policies
160
5.1.1
Packet Fragmentation and Reassembly
163
5.1.2
Internet Control Message Protocol (ICMP)
164
5.1.3
Obtaining and Assigning IP Addresses
165
5.1.4
Dynamic Host Configuration Protocol (DHCP)
167
5.1.5
Network Address Translation (NAT)
169
5.1.6
Universal Plug and Play (UPnP)
172
5.2
Path Selection Algorithms
173
5.2.1
Dijkstra s
Algorithm
174
5.2.2
Bellman-Ford Algorithm
176
5.2.3
Packet Flooding Algorithm
177
5.2.4
Deflection Routing Algorithm
178
5.3
Intradomain Routing Protocols
178
5.3.1
Open Shortest Path First (OSPF) Protocol
180
5.3.2
Routing Information Protocol (RIP)
183
5.4
Interdomain
Routing Protocols
188
5.4.1
Autonomous System (AS)
189
5.4.2
Border Gateway Protocol (BGP)
189
5.5
Internet Protocol Version
6 (IPv6) 196
5.5.1 IPv6
Addressing Format
197
5.5.2
Extension Header
198
5.53
Packet Fragmentation
198
5.5.4
Other Features of
IPv6 199
5.6
Congestion Control at the Network Layer
199
5.6.1
Unidirectional Congestion Control
201
5.6.2
Bidirectional Congestion Control
202
5.63
Random Early Detection (RED)
203
5.6.4
A Qukk Estimation of Link Blocking
205
5.6.5
Ue4 Serial and Parallel Connection Rules
206
Contents xi
5.7
Summary
207
5.8
Exercises
209
5.9
Computer Simulation Project
213
6
Multicast Routing and Protocols
215
6.1
Basic Definitions and Techniques
216
6.1.1
IP Multicast Addresses
217
6.1.2
Basic Multicast Tree Algorithms
218
6.1.3
Classification of Multicast Protocols
220
6.2
Local and Membership Multicast Protocols
221
6.2.1
Internet Group Management Protocol (IGMP)
221
6.3
Intradomain Multicast Protocols
223
6.3.1
Multicast Backbone (MBone)
224
6.3.2
Distance Vector Multicast Routing Protocol (DVMRP)
224
6.3.3
Multicast OSPF (MOSPF) Protocol
225
6.3.4
Protocol-Independent Multicast (PIM)
227
6.3.5
Core-Based Trees (CBT) Protocol
230
6.4
Interdomain
Multicast Protocols
231
6.4.1
Multiprotocol BGP (MBGP)
231
6.4.2
Multicast Source Discovery Protocol (MSDP)
234
6.4.3
Border Gateway Multicast Protocol (BGMP)
236
6.5
Summary
237
6.6
Exercises
238
6.7
Computer Simulation Project
241
7
Wireless Wide Area Networks and LTE Technology
243
7.1
Infrastructure of Wireless Networks
244
7.2
Cellular Networks
246
7.2.1
Cellular Network Devices and Operation
247
7.2.2
Handoff
253
7.3
Mobile IP Management in Cellular Networks
259
7.3.1
Home Agents and Foreign Agents
260
7.3.2
Agent Discovery Phase
261
7.3.3
Registration
262
7.3.4
Mobile IP Routing
263
7.3.5
Generations of Cellular Networks
267
7.4
Long-Term
Evolution (LTE) Technology
268
7.4.1
LTE Networking Devices
269
7.4.2
Call Establishment in LTE Cells
271
Contents
xii
7.4.3 Handoff in LTE 271
7.4.4
Downlink and Uplink Schemes
in LTE 273
7.4.5
Frequency
Reuse 273
7.5
Wireless
Mesh
Networks
(WMNs) with LTE
277
7.5.1 Applications
of
Mesh
Networks 277
7.5.2
Physical and MAC Layers of WMNs
279
7.6
Characterization of Wireless Channels
280
7.6.1
Capacity Limits of Wireless Channels
283
7.6.2
Channel Coding
283
7.6.3
Flat-Fading Countermeasures
284
7.6.4
Intersymbol Interference Countermeasures
284
7.7
Summary
285
7.8
Exercises
286
7.9
Computer Simulation Project
288
8
Transport and End-to-End Protocols
289
8.1
Overview of the Transport Layer
290
8.1.1
Interaction of Transport Layer and Adjacent Layers
291
8.1.2
Transport Layer Protocols
294
8.2
User Datagram Protocol
(UDP)
295
8.2.1
UDP
Segments
295
8.2.2
Applications of
UDP
297
8.3
Transmission Control Protocol (TCP)
298
8.3.1
TCP Segment
299
8.3.2
A TCP Connection
301
8.3.3
Window-Based Transmission and Sliding Window in TCP
305
8.3.4
Applications of TCP
306
8.4
Mobile Transport Protocols
307
8.4.1
UDP
for Mobility
307
8.4.2
TCP for Mobility
307
8.5
TCP Congestion Control
309
8.5.1
Additive Increase, Multiplicative Decrease Control
309
8.5.2
Slow-Start Method
311
8.53
Fast Retransmit and Fast Recovery Methods
312
8.6
Summary
315
8.7
Exercises
316
8.8
Computer
Simulación
Project
319
Contents
9 Basic Network Applications and Management 321
9.1
Overview of the
Application
Layer
322
9.1.1
Client/Server Model
323
9.1.2
Graphical User Interface (GUI)
324
9.2
Domain Name System (DNS)
325
9.2.1
Domain Name Space
325
9.2.2
Name/Address Mapping
327
9.2.3
DNS Message Format
329
9.3
Electronic Mail (E-Mail)
330
9.3.1
Basic E-Mail Structure and Definitions
330
9.3.2
Simple Mail Transfer Protocol (SMTP)
333
9.3.3
Post Office Protocol, Version
3
(POP3)
334
9.3.4
Internet Mail Access Protocol (IMAP)
335
9.4
World Wide Web (WWW)
335
9.4.1
Hypertext Transfer Protocol (HTTP)
336
9.4.2
Web Caching (Proxy Server)
341
9.4.3
Webmail
342
9.5
Remote Login Protocols
342
9.5.1
TELNET Protocol
343
9.5.2
Secure Shell (SSH) Protocol
344
9.6
File Transfer and FTP
346
9.6.1
File Transfer Protocol (FTP)
346
9.6.2
Secure Copy Protocol
(SCP)
346
9.7 Peer-to-Peer (P2P)
Networking
347
9.7.1
P2P File Sharing Protocols
348
9.7.2
P2P Database Sharing Protocols
353
9.7.3
Estimation of Peer Connection Efficiency
355
9.8
Network Management
356
9.8.1
Elements of Network Management
358
9.8.2
Structure of Management Information (SMI)
359
9.8.3
Management Information Base
(МІВ)
359
9.8.4
Simple Network Management Protocol
(SNMP)
360
9.9
Summary
362
9.10
Exercises
363
9.11
Computer Simulation Projects
366
xiii
Contents
xiv
10 Network
Security
369
10.1
Overview of Network Security
370
10.1.1
Elements of Network Security
370
10.1.2
Classification of Network Attacks
371
10.2
Security Methods
375
10.3
Symmetric-Key Cryptography
377
10.3.1
Data Encryption Standard
(DES) 377
10.3.2
Advanced Encryption Standard (AES)
379
10.4
Public-Key Cryptography
380
10.4.1
RSA Algorithm
381
10.4.2
Diffie-Hellman Key-Exchange Protocol
382
10.5
Authentication
383
10.5.1
Hash Function
383
10.5.2
Secure Hash Algorithm
(SHA)
385
10.6
Digital Signatures
387
1
0.7
Security of IP and Wireless Networks
387
10.7.1
IP Security and
IPsec
387
10.7.2
Security of Wireless Networks and IEEE
802.11 389
10.8
Firewalls and Packet Filtering
391
10.8.1
Packet Filtering
393
10.8.2
Proxy Server
395
10.9
Summary
396
10.10
Exercises
397
10.11
Computer Simulation Project
399
PART II: Advanced Concepts
401
11
Network Queues and Delay Analysis
403
11.1
Little
s
Theorem
404
11.2
Birth-and-Death Process
406
11.3
Queueing Disciplines
408
11.4
Markovian FIFO Queueing Systems
409
И
.4.
1 М/МП
Queueing Systems
409
H.4.2 Systems with Limited Queueing Space: M/M/l/b
414
11.4.3
M/M/a Queueing Systems
415
U.4.4 Models for Delay-Sensitive Traffic: M/M/a/a
420
11.4.5
M/M/oo Queueing Systems
422
Contents
11.5 Non-Markovian
and Self-Similar
Models 424
11.5.1 PoUaczek-Khinchin
Formula and
MIGI I
424
11.5.2
MIDII
Models
427
11.5.3
Self-Similarity and Batch-Arrival Models
427
11.6
Networks of Queues
428
11.6.1
Burke s Theorem
428
11.6.2
Jackson s Theorem
433
11.7
Summary
437
11.8
Exercises
438
11.9
Computer Simulation Project
444
12
Advanced Router and Switch Architectures
445
12.1
Overview of Router Architecture
446
12.2
Input Port Processor (IPP)
447
12.2.1
Packet Parser
448
12.2.2
Packet Partitioner
449
12.2.3
Input Buffer
450
12.2.4
Routing Table
(IPv4
and
IPv6) 450
12.2.5
Multicast Scheduler
452
12.2.6
Forwarding Table and Packet Encapsulator
452
12.3
Output Port Processor
(OPP)
453
12.3.1
Output Buffer
453
12.3.2
Reassembler
and Resequencer
454
12.3.3
Error Control
454
12.4
Central Controller
454
12.4.1
Contention Resolution Unit
455
12.4.2
Congestion Controller
457
12.5
Switch Fabric
457
12.5.1
Complexity of Switch Fabrics
458
12.5.2
Crossbar Switch Fabrics
459
12.5.3
Clos
Switch Fabrics
460
12.5.4
Concentration and Expansion Switch Fabrics
465
12.5.5
Shared-Memory Switch Fabrics
468
12.5.6
Performance Improvement in Switch Fabrics
469
12.6
Multicasting Packets in Routers
475
12.6.1
Tree-Based Multicast Algorithm
476
12.6.2
Packet
Recirculation
Multicast Algorithm
479
XV
Contents
xvi
12.7
Summary
480
12.8
Exercises
481
12.9
Computer Simulation Project
484
13
Quality of
Service
and Scheduling in Routers
485
13.1
Overview of Quality of Service (QoS)
486
13.2
Integrated Services QoS
486
13.2.1
Traffic Shaping
488
13.2.2
Admission Control
494
13.2.3
Resource Reservation Protocol (RS
VP)
495
13.3
Differentiated Services QoS
495
13.3.1
Pcr-Hop Behavior (PHB)
497
13.4
Resource Allocation
497
13.4.1
Management of Resources
498
13.4.2
Classification of Resource-Allocation Schemes
499
13.4.3
Fairness in Resource Allocation
500
13.5
Packet Scheduling
501
13.5.1
First-In, First-Out Scheduler
502
13.5.2
Priority Queueing Scheduler
503
13.5.3
Fair Queueing Scheduler
507
13.5.4
Weighted Fair Queueing Scheduler
508
13.5.5
Deficit Round-Robin Scheduler
511
13.5.6
Earliest Deadline First Scheduler
512
13.6
Summary
512
13.7
Exercises
513
13.8
Computer Simulation Project
517
14
Tunneling, VPNs, and MPLS Networks
519
14.1
Tunneling
520
14.1.1
Point-to-point Protocol (PPP)
521
14.1.2 IPv6
Tunneling and Dual-Suck Lite
522
14.2
Virtual Private Networks (VPNs)
524
14.2.1
Remote-Access VPN
526
M.2.2 Site-to-SiteVPN
526
N.2.3 Security in VPNs
528
143
Multiprotocol Labd Switching (MPLS)
528
14
J.I Labels and Labd Switch Routers (LSRs)
529
143.2
Labd Binding and Switching
531
Contents
14.3.3 Routing in
MPLS
Domains 534
14.3.4
MPLS
Packet Format 536
14.3.5 Multi-Tunnel Routing 537
14.3.6
Traffic
Engineering 538
14.3.7
MPLS-Based VPNs
539
14.4
Summary
540
14.5
Exercises
540
14.6 Computer Simulation
Project
543
15
All-Optical
Networks,
WDM, and GMPLS
545
15.1
Overview of Optical
Networks 546
15.1.1
Fiber Optic Links
547
15.1.2
SONET/SDH Standards
547
15.1.3
Generalized MPLS (GMPLS) Protocol
548
15.1.4
Passive Optical Networks (PONs)
551
15.2
Basic Optical Networking Devices
553
15.2.1
Tunable Lasers
553
15.2.2
Optical Buffers or Delay Elements
553
15.2.3
Optical Amplifiers
553
15.2.4
Optical Filters
554
15.2.5
Wavelength-Division Multiplexer (WDM)
555
15.2.6
Optical Switches
556
15.3
Large-Scale Optical Switches
558
15.3.1
Crossbar Optical Switches
559
15.3.2
Spanke-Benes Optical Switch
560
15.4
Structure of Optical Cross Connects (OXCs)
560
15.4.1
Structure of Wavelength Routing Nodes
561
15.5
Routing in All-Optical Networks
563
15.5.1
Wavelength Routing Versus Broadcasting
564
15.5.2
Blocking Estimation over Lightpaths
565
15-6
Wavelength Allocation in Networks
567
15.6.1
Wavelength Allocation without Dependency
568
15.6.2
Wavelength Allocation with Dependency
569
15.7
Case Study: An All-Optical Switch
569
15.7.1
Self-Routing in SSN
571
15.7.2
Wavelength Assignment in SSN
571
15.8
Summary
572
15.9
Exercises
573
15.10
Computer Simulation Project
575
XVII
Contents
xviii
16
Cloud
Computing and Network
Virtualisation
577
16.1
Cloud Computing and Data Centers
578
16.1.1
Platforms and APIs
581
16.1.2
Cloud Computing Service Models
581
16.1.3
Data Centers
583
16.1.4
Virtualization in Data Centers
584
16.2
Data Center Networks (DCNs)
588
16.2.1
Load Balancer
589
16.2.2
Traffic Engineering
591
16.2.3
DCN Architectures
591
16.2.4
Multicast Methods
594
16.3
Network Virtualization
595
16.3.1
Network Virtualization Components
596
16.4
Overlay Networks
600
16.5
Summary
601
16.6
Exercises
602
16.7
Computer Simulation Projects
605
17
Software-Defined Networking (SDN) and Beyond
607
17.1
Software-Defined Networking (SDN)
608
17.1.
1 Separation of Control and Data Planes
609
17.1.2
Programmability of the Control Plane
612
17.1.3
Standardization of Application Programming Interfaces
(APIs)
613
17.2
SDN-Bascd Network Model
613
17.2.1
Control Plane
614
17.2.2
Data Plane Interface (OpenFlow Protocol)
615
17.3
Small-Size SDN Architectures
620
17.3.1
Scalability of SDN
620
17.3.2
Multicasting in SDN-Based Networks
621
17.4
SDN Architectures for Clouds
621
17.4.1
Software-Defined Compute and Storage
621
17.4.2
Application Delivery in Data Centers by SDN
622
17.5
Network Functions Virtualization (NFV)
623
17.5.1
Abstract Model of NFV
624
17.5.2
Distributed NFV-Based Networks
626
17.5.3
Virtualized Services
627
Contents
17.6 Information-Centric Networking (ICN) 627
17.6.1
Named Objects
628
17.6.2 ICN Routing and Network Management 628
17.6.3 ICN
Security
631
17.7 Network Emulators
for
Advanced Networks 632
17.7.1 Mininet 632
17.8
Summary
635
17.9
Exercises
636
17.10 Computer Simulation
Projects
638
18
Voice over IP (VoIP) Signaling
641
18.1
Public Switched Telephone Networks (PSTN)
642
18.1.1
SS7 Network
644
18.1.2
Circuit-Switched Networks
647
18.2
Overview of Voice over IP (VoIP)
649
18.3
H.323 Protocol
652
18.3.1
Main Components of H.323 Protocol
652
18.3.2
H.323 Protocol Organization
653
18.3.3
RAS
Signaling
655
18.3.4
Call Signaling
659
18.3.5
Control Signaling
662
18.3.6
Conference Calling with H.323 Protocol
665
18.4
Session Initiation Protocol (SIP)
666
18.4.1
Main Components of SIP
667
18.4.2
SIP Messages
669
18.4.3
SIP Protocol Organization
671
18.4.4
Registration Process
672
18.4.5
Call Establishment
673
18.4.6
Features and Extensions
674
18.5
Softswitch Methods and MGCP
678
18.6
VoIP and Multimedia Internetworking
679
18.6.1
SIP to H.323 Internetworking
679
18.6.2
SIP to PSTN Internetworking
681
18.6.3
Wireless Cellular Multimedia Internetworking
682
18.7
Summary
684
18.8
Exercises
685
18.9
Computer Simulation Projects
689
xix
Contents
XX
19 Media Exchange
and Voice/Video Compression
693
19.1
Overview of Data Compression
694
19.2
Digital Voice and Compression
695
19.2.1
Sampling
695
19.2.2
Quantization and Encoding
696
19.3
Still Images and JPEG Compression
701
19.3.1
Raw-Image Sampling and DCT
702
19.3.2
Quantization
705
19.3.3
Encoding
706
19.4
Moving Images and MPEG Compression
707
19.4.1
MP3 and Streaming Audio
708
19.5
Compression Methods with Loss
709
19.5.1
Basics of Information Theory
710
19.5.2
Entropy
ofinformation
710
19.5.3
Shannon
s
Coding Theorem
711
19.5.4
Compression Ratio and Code Efficiency
713
19.6
Compression Methods without Loss
713
19.6.1
Run-Length Encoding
714
19.6.2
Huffman Encoding
715
19.6.3
Lempel-Ziv Encoding
716
19.7
Scanned Document Compression
717
19.8
Summary
718
19.9
Exercises
719
19.10
Computer Simulation Project
724
20
Distributed and Cloud-Based Multimedia Networking
725
20.1
Real-Time Media Exchange Protocols
726
20.1.1
Real-Time
Transport Protocol (RTP)
727
20.1.2
Analysis of Jitter in RTP Traffic
731
20.1.3
Real-Time Transport Control Protocol (RTCP)
732
20.1.4
Real Time Streaming Protocol (RTSP)
735
20.1.5
Stream Control Transmission Protocol (SCTP)
735
20.1.6
HTTP-Based Streaming
740
20.2
Distributed
Multimedia
Networking
741
20.2.1
Content Distribution (Delivery) Networks (CDNs)
741
20.2.2
IP Television (IPTV) and VoD
745
20.2.3
Online Gaming
751
Contents
XXI
20.3
Cloud-Based Multimedia Networking
751
20.3.1
Distributed Media Mini-Clouds
752
20.3.2
Cloud-Based Interactive Voice Response (IVR)
754
20.4
Self-Similarity and Non-Markovian Streaming
756
20.4.1
Self-Similarity with Batch Arrival Models
757
20.5
Summary
759
20.6
Exercises
761
20.7
Computer Simulation Project
764
21
Mobile
Ad
-Нос
Networks
765
21.1
Overview of Wireless
Ad
-Нос
Networks
766
21.2
Routing in
Ad
-Нос
Networks
767
21.2.1
Classification of Routing Protocols
768
21.3
Routing Protocols for
Ad
-Нос
Networks
769
21.3.1
Destination-Sequenced Distance-Vector (DSDV) Protocol
769
21.3.2
Cluster-Head Gateway Switch Routing (CGSR) Protocol
771
21.3.3
Wireless Routing Protocol (WRP)
772
21.3.4
Dynamic Source Routing (DSR) Protocol
773
21.3.5
Temporally Ordered Routing Algorithm
(TORA) 774
21.3.6
Associativity-Based Routing (ABR) Protocol
775
21.3.7
Ad
-Нос
On-Demand Distance Vector (AODV) Protocol
776
21.4
Security of
Ad
-Нос
Networks
783
21.4.1
Types of Attacks
783
21.4.2
Criteria for a Secure Routing Protocol
784
21.5
Summary
785
21.6
Exercises
786
21.7
Computer Simulation Projects
787
22
Wireless Sensor Networks
789
22.1
Sensor Networks and Protocol Structures
790
22.1.1
Clustering in Sensor Networks
790
22.1.2
Protocol Stack
791
22.1.3
Sensor Node Structure
793
22.2
Communication Energy Model
794
22.3
Clustering Protocols
799
22.3.1
Classification of Clustering Protocols
800
22.3.2
LEACH Clustering Protocol
800
Contents
xxii
22.3.3
DEEP Clustering
Protocol
801
22.3.4
Reclustering
805
22.4
Routing Protocols
805
22.4.1
Intracluster Routing Protocols
806
22.4.2
Intcrclustcr Routing Protocols
808
22.5
Other Related Technologies
811
22.5.1
ZigBee Technology and IEEE
802Л5.4
811
22.6
Case Study: Simulation of a Sensor Network
812
22.6.1
Cluster-Head Constellation and Distribution of Load
812
22.6.2
Optimum Percentage of Cluster Heads
814
22.7
Summary
814
22.8
Exercises
815
22.9
Computer Simulation Projects
815
A Glossary of Acronyms
817
В
RFCs 823
С
Probabilities and Stochastic Processes
827
C.I Probability Theory
827
C.I.I Bernoulli and Binomial Sequential Laws
828
C.I.
2
Counting and Sampling Methods
828
C.2 Random Variables
828
C.2.I Basic Functions
829
С
2.2
Conditional Functions
829
C.2.3 Popular Random Variables
830
С
2.4
Expected Value and Variance
831
C.2.5 A Function of a Random Variable
832
C.3 Multiple Random Variables
832
C.3.1 Basic Functions of Two Random Variables
833
C.3.2 Two Independent Random Variables
833
C.4 Stochastic (Random) Processes
834
C.4.1
И
D
Random Process
834
C.4.2 Brownian Motion Random Process
834
C.5 Theory of Markov Chains
835
C.5.I Continuous-Time Markov Chains
835
D
ErUng-B Blocking Probability Table
837
index
841
|
any_adam_object | 1 |
author | Mir, Nader F. |
author_facet | Mir, Nader F. |
author_role | aut |
author_sort | Mir, Nader F. |
author_variant | n f m nf nfm |
building | Verbundindex |
bvnumber | BV042295819 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)901453505 (DE-599)BVBBV042295819 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01671nam a2200445 c 4500</leader><controlfield tag="001">BV042295819</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150306 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150128s2015 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133814743</subfield><subfield code="c">hardcover : alk. paper</subfield><subfield code="9">978-0-13-381474-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133814742</subfield><subfield code="9">0-13-381474-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)901453505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042295819</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mir, Nader F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer and communication networks</subfield><subfield code="c">Nader F. Mir</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ [u.a.]</subfield><subfield code="b">Prentice Hall, Pearson Education</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXVIII, 874 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données - Transmission</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027732886&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027732886</subfield></datafield></record></collection> |
id | DE-604.BV042295819 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:17:34Z |
institution | BVB |
isbn | 9780133814743 0133814742 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027732886 |
oclc_num | 901453505 |
open_access_boolean | |
owner | DE-1050 DE-473 DE-BY-UBG DE-11 |
owner_facet | DE-1050 DE-473 DE-BY-UBG DE-11 |
physical | XXXVIII, 874 S. Ill. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Prentice Hall, Pearson Education |
record_format | marc |
spelling | Mir, Nader F. Verfasser aut Computer and communication networks Nader F. Mir 2. ed. Upper Saddle River, NJ [u.a.] Prentice Hall, Pearson Education 2015 XXXVIII, 874 S. Ill. txt rdacontent n rdamedia nc rdacarrier Données - Transmission Réseaux d'ordinateurs Computer networks Data transmission systems Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Kommunikationsprotokoll (DE-588)4128252-8 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027732886&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Mir, Nader F. Computer and communication networks Données - Transmission Réseaux d'ordinateurs Computer networks Data transmission systems Kommunikationsprotokoll (DE-588)4128252-8 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4128252-8 (DE-588)4070085-9 |
title | Computer and communication networks |
title_auth | Computer and communication networks |
title_exact_search | Computer and communication networks |
title_full | Computer and communication networks Nader F. Mir |
title_fullStr | Computer and communication networks Nader F. Mir |
title_full_unstemmed | Computer and communication networks Nader F. Mir |
title_short | Computer and communication networks |
title_sort | computer and communication networks |
topic | Données - Transmission Réseaux d'ordinateurs Computer networks Data transmission systems Kommunikationsprotokoll (DE-588)4128252-8 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Données - Transmission Réseaux d'ordinateurs Computer networks Data transmission systems Kommunikationsprotokoll Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027732886&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT mirnaderf computerandcommunicationnetworks |