CHAPTER 1 INIRODUCTION IO COMMUNICATIONS, STANDARDS, AND PROTOCOLS
1 .1 WHY STUDY COMMUNICATIONS?
A Brief History
Applications
Issues
1.2 COMPUTER NETWORKS
Common Bus Topology
Star Topology
Ring Topology
Fully Connected Topology
Combined Topologies
1.3 STANDARDS AND STANDARDS ORGANIZATIONS
The Need for Standards
Agencies
1.4 OPEN SYSTEMS AND THE OSI MODEL
Overview of the Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Summary
1.5 THE FUTURE OF DATA COMMUNICATIONS
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 2 TRANSMISSION FUNDAMERTALS
2.1 COMMUNICATIONS MEDIA
Conductive Metal
Optical Fiber
Wireless Communications
Summary
2.2 COMMUNIICATION SERVICES AND DEVICES
Telephone System
Integrated Services Digital Network
Cellular Phones
Fax Machines
2.3 CODES
ASCII Code
EBCDIC Code
Baudot, Morse, and BCD Codes
2.4 ANALOG AND DIGITAL SIGNALS
Digital Encoding Schemes
Analog Signals
Bit Rate
2.5 MODULATION AND DEMODULATION
Digital-to-Analog Conversion
Analog-to-Digital Conversion
2.6 MODEMS AND WODEM STANDARDS
Signal Constellation
Intelligent (Hayes Compatible) Modems
Cable Modems
Null Modems
2.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 3 DATA COMMUNICATION
3. 1 TRANSMISSION MODES
Serial and Parallel Transmission
Asynchronous and Synchronous Transmission
Simplex, Half-Duplex, and Full-Duplex Communications
3. 2 INTERFACE STANDARDS
RS-232 Interface
RS-232 Subsets
Null Modems
RS-449 Interface
X.2l Interface
3.3 MULTIPLEXING
Frequency-Division Multiplexing
Time-Division Multiplexing
Statistical Multiplexers
T-l Carrier
3. 4 CONTENTION PROTOCOLS
Aloha Protocols
Carrier Sense Multiple Access
Collision Detection
Token Passing
Summary of Protocols
3.5 DATA COMPRESSION
Huffman Code
Run-Length Encoding
Relative Encoding
Lempel-Ziv Encoding
Image Compression
JPEG
MPEG
Summary of Compression Techniques
3.6 SUMMARY
REVIEW QUESTIONS
EXERCISE5
REFERENCES
CHAPTER 4 DATA SECURITV AND INIEGRITV
4.1 INTRODUCTION
4.2 PARITY CHECKING
Parity Checking Analysis
Double-Bit Error Detection
Burst Error Detection
4.3 CYCLIC REDUNDANCY CHECKS
Polynomial Division
How CRC Works
Analysis of CRC
CRC Implementation Using Circular Shifts
4.4 HAMMING CODES
Single-Bit Error Correction
Multiple-Bit Error Correction
Comparison of Error Detection and Error Correction
4.5 ENCRVPTION AND DECRVPTION
Caesar Cipher
Polyalphabetic Cipher
Transposition Cipher
Bit-Level Ciphering
Data Encryption Standard
Clipper Chip
Key Distribution and Protection
Merkle's Puzzles
Shamir's Method
4.6 PUBLIC KEY ENCRVPTION
RSA Algorithm
Digital Signatures
Authentication Using Hash-Based Schemes
Summary of Encryption Methods
Encryption Potpourri
4.7 VIRUSES, WORMS AND HACKERS
Infecting Files
Memory-Resident Viruses
Virus Evolution
Virus Sources
The Internet Worm
Computer Hackers
4.8 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 5 PROTOCOL CONCEPTS
5.1 INTRODUCTION
5.2 BASIC FLOW CONTROL
Signaling
Frame-Oriented Control
Protocol Efficiency
5.3 SLIDING WINDOW PROTOCOLS
Frame Format
Go-back-n Protocol
Selective Repeat Protocol
Sliding Window Protocol Efficiency
Summary of Protocols
5.4 PROTOCOL CORRECTNESS
Finite State Machines
Petri Nets
3.3 DATA LINK CONTROL PROTOCOLS
High-Level Data Link Control (HDLC)
Other Bit-Oriented Protocols
Binary Synchronous Communications Protocol
Summary: Data Link Protocols
5.6 CASE STUDY: KERMIT
Frame Format
Protocol
Commands
5.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 6 LOCAL AREA NETWORKING
6.1 NETWORK TOPOLOGIES
6.2 ETHERNET: IEEE STANDARD 802.3
Relation to OSI
Ethernet Components
Cable Specifications
Connecting Segments
Frame Format
Efficiency
6.3 TOKEN RING: IEEE STANDARD 802.5
Token and Frame Formats
Reserving and Claiming Tokens
Ring Maintenance
Efficiency
Other Ring Networks
6.4 TOKEN Bus: IEEE STANDARD 802.4
Token Bus Operations
Lost Tokens
Ring Initialization
Prioritizing Frames
6.5 INTERCONNECTING LANS
Layer l Connections
Layer 2 Connections
Bridging Different Types of LANs
Bridge Routing
Summary
6.6 CASE STUDY: NOVELL NETWARE
NetWare Configuration
Running Novell NetWare
Security and Integrity
Selected Novell Commands
Login Scripts
6.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 7 WIDE AREA NETWORKING
7.1 INTRODUCTION
7.2 NETWORK ROUTING
Routing Tables
Types of Routing
Dijkstra's Algorithm
Bellman-Ford Algorithm
Link State Routing
Hierarchical Routing
Routing Information Protocol
Open Shortest Path First
Border Gateway Protocol
Summary of Routing Techniques
Congestion and Deadlock
7.3 PUBLIC DATA NETWORKS: THE X SERIES PROTOCOLS
Packet-Switched Network Modes
X.25 Public Data Network Interface Standard
Triple-X Standard for Non-X.25 Devices
7. 4 INTERNET PROTOCOLS
Overview of TCP/IP
Internet Addressing
Domain Name System
IP Packets
Fragmentation
IP Routing
Internet Control Message Protocol
IPv6
7.5 TRANSPRT PROTOCOLS
Transmission Control Protocol
User Datagram Protocol
OSI Transport Protocols
7.6 SOCKET PROERAMMING
Sockets
Client/Server Model
Socket Data Structures
Socket Commands
Client/Server Example
7.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 8 ADDITIONAL NEIWORK PROTOCOLS
8.1 INTERNET APPLICATIONS
Virtual Terminal
Telnet
File Transfers
Simple Mail Transfer Protocol
Simple Network Management Protocol
8.2 WORLD WIDE WEB
Web Page Access
Hypertext Markup Language
HTML Forms
JavaScript and Client-side Programming
Common Gateway Interface and Server-side Programming
8.3 ELECTRONIC MAIL: X.400 AND X.500 STANDARDS
X.400 Mail Standards
X.500 Directory Service
Summary
8.4 INTEGRATED SERVICES DIGITAL NETWORK
ISDN Services
ISDN Architecture
Protocols
Broadband ISDN
8.5 ASYNCHRONOUS TRANSFER MODE
Benefits of Small Fixed-Size Cells
Overview of ATM Network
Switching
Reference Model
Cell Definition
Virtual Circuits and Paths
Connection Management
Adaptation Layers
8.6 SYSTEMS NETWORK ARCHITECTURE
Lower Layers Physical Link Control
Path Control
Transmission Control
Data Flow Control
Higher Layers
REVIEW QUESTIONS
EXERCISES
REFERENCES
GLOSSARY
ACRONYMS
INDEX