Table of Contents


Part 1: Building Blocks of Communication Networks

Chapter 1.                        Network services

Chapter 2.                        Protocol Layering

Chapter 3.                        Transfer Modes

Chapter 4.                        Network Topology and Extent

 

Part 2: Core Concepts of Communication Networks

Chapter 5.                        Transmission and Multiple Access

Chapter 6.                        Data Link Control

Chapter 7.                        Bridging

Chapter 8.                        Switching

Chapter 9.                        Addressing

Chapter 10.                        Signalling

Chapter 11.                        Routing

 

Part 3: Advance Concepts of Communication Networks

Chapter 12.                        Traffic Management

Chapter 13.                        Network Management

Chapter 14.                        Security Management




Back to Main Page

 

 

 

 

 

 

Chapter 1.                        Network services

1.1            Introduction

1.2            Connection-oriented Service

1.3            Connectionless Service

1.4            Connection-Oriented versus Connectionless Service

1.5            Examples

1.6            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 2.                        Protocol Layering

2.1            Introduction

2.2            Layered Architecture

2.3            Services, Interface, Primitives and Service Access Points

2.4            Open Systems Interconnection-Reference Model  (OSI-RM)

2.5            Definition of Open Systems

2.6            Seven-layered OSI Model

2.6.1                Physical Layer

2.6.2                Data Link Layer

2.6.3                Network Layer

2.6.4                Transport Layer

2.6.5                Session Layer

2.6.6                Presentation Layer

2.6.7                Application Layer

2.7            Shortcomings of OSI Reference Model

2.8            Example: TCP/IP Protocol Suite

2.8.1                Historical background

2.8.2                TCP/IP reference model

2.8.3                Internet Protocol (IP)

2.8.4                Transmission Control Protocol (TCP)

2.8.5                User Datagram Protocol (UDP)

2.8.6                Layering Concepts in TCP/IP

2.9            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 3.                        Transfer Modes

3.1            Introduction

3.2            Circuit Switching

3.3            Routing

3.4            Virtual Circuit Switching

3.5            Comparison of Transfer Modes

3.6            Example: Asynchronous Transfer Mode (ATM)

3.6.1                Transfer mode

3.6.2                Cell-based transfer

3.6.3                Asynchronous transfer

3.6.4                Fixed and Small-Sized Cell

3.6.5                Connection-oriented Approach

3.6.6                Virtual Channels and Virtual Paths

3.6.7                Negligible error and flow control

3.7            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 4.                        Network Topology and Extent

4.1            Introduction

4.2            Network Topology

4.3            Network Extent

4.4            Local Area Networks (LAN)

4.5            Wide area network (WAN)

4.6            Other Area Networks

4.7            Examples

4.8            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 5.                        Transmission and Multiple Access

5.1            Introduction

5.2            Transmission Concepts

5.2.1                Analog and Digital Transmission

5.2.2                Digital to Analog Conversion

5.2.3                Analog to Digital Conversion

5.2.4                Bandwidth and Capacity

5.2.5                Transmission Media

5.3            Multiple Access Concepts

5.3.1                Frequency Division Multiplexing

5.3.2                Time Division Multiplexing

5.3.3                Wavelength Division Multiplexing

5.3.4                Code Division Multiplexing

5.4            Example: FDMA/TDMA in GSM Networks

5.5            Example: CDMA in UMTS Networks

5.5.1                Spreading and Despreading

5.5.2                Autocorrelation and Cross Correlation

5.5.3                Benefitsof Spreading

5.5.4                Scrambling

5.6            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 6.                        Data Link Control

6.1            Introduction

6.2            Data Link Line configurations

6.2.1                Topology

6.2.2                Duplexity

6.3            Data Link Layer Functions

6.3.1                Framing

6.3.2                Error Control

6.3.3                Flow Control

6.3.4                Link Management

6.4            Services Offered to Network Layer

6.5       DLC Protocol Layering

6.6            Logical Link Control (LLC)

6.6.1                Types of LLC Operations

6.6.2                Classes of LLC

6.6.3                LLC Sub-layer Protocol Data Units

6.7            Media Access Control (MAC)

6.7.1                Static Channel Allocation protocols

6.7.2                Random Access Protocols

6.7.2.1            Aloha Protocol

6.7.2.2            Slotted Aloha

6.7.2.3            CSMA/CD

6.7.3                Taking-Turns Protocols

6.8            Flow Control Protocols

6.8.1                Window-based Flow Control

6.8.2                Rate-based Flow Control

6.9            Error Detection and Correction Mechanisms

6.9.1                Use of Parity Bits

6.9.2                Checksum Techniques

6.9.3                Cyclic Redundancy Checks (CRC)

6.10            Example: HDLC

6.11            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 7.                        Bridging

7.1            Introduction

7.2            Transparent Bridging

7.2.1                Functions of a Bridge in Transparent Bridged LANs

7.2.1.1            Management of Destination Lookup Table

7.2.1.2            Layer 2 Packet Forwarding

7.2.2                Transparent Bridging in Multi-Bridge LAN

7.3            Source Route Bridging

7.4            Example: Bridging in Ethernet LANs

7.5            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 8.                        Switching

8.1            Introduction

8.2            Components of a Typical Switch

8.3            Performance measures in switch design

8.4            Switching issues

8.4.1                Conflicts and Contentions

8.4.2                Blocking and Buffering

8.4.2.1            Input Buffering

8.4.2.2            Output Buffering

8.4.2.3            Shared Buffering

8.4.3                Memory look-up

8.4.4                Multicasting

8.5            Switching Architectures

8.6            Shared Memory Architecture

8.6.1                Buffering

8.6.2                Multicasting

8.6.3                Scalability

8.7            Shared Medium Architecture

8.7.1                Buffering

8.7.2                Multicasting

8.7.3                Scalability

8.8            Space Division Architecture

8.8.1                Crossbar switching

8.8.1.1            Buffering

8.8.1.2            Multicasting

8.8.2                Banyan-based Switching

8.8.2.1            Blocking Solutions in Banyan networks

8.8.2.2            Multicasting

8.8.2.3            Scalability

8.9            Example: Switching in ATM

8.9.1                User plane functions

8.9.1.1            Input module

8.9.1.2            Switching fabric

8.9.1.3            Output module

8.9.2                Control plane functions

8.10            Example of ATM Switch Architecture: Knockout switch

8.10.1                Components of Knockout Switch

8.10.1.1            Cell filters

8.10.1.2            Concentrator

8.10.1.3            Shared buffer

8.10.2                Buffering

8.10.3                Multicasting

8.10.4                Scalability

8.11            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 9.                        Addressing

9.1            Introduction

9.2            Classification of Addressing Techniques

9.2.1                Scope-wise classification

9.2.2                Utility-wise classification

9.2.3                Layer-wise classification

9.2.4                Functionality-wise classification

9.3            Example: Addressing Structure in Internet

9.4            Example: Addressing structure in Telecom Networks

9.5            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 10.                        Signalling

10.1            Introduction

10.2            Signalling Complexity in Different Networks

10.3            Classification of Signalling Techniques

10.4            Signalling Issues

10.4.1                Acknowledgements

10.4.2                Timer Protection

10.4.3                Handshaking

10.4.4                Connection Identification

10.4.5                Finite state modelling of calls

10.5            Signalling models

10.6            Point-to-multipoint signalling

10.6.1                Starting a point-to-multipoint connection

10.6.2                Adding parties to a Point-to-multipoint Connection

10.6.3                Dropping parties and releasing the Point-to-multipoint connection

10.6.4                Nature of a Point-to-multipoint connection

10.6.5                Analysis of Point-to-multipoint connection

10.7            Example: ISDN Signalling

10.7.1                ISDN Protocol Stack

10.7.2                Services

10.7.3                Signalling in ISDN

10.8            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 11.                        Routing

11.1            Introduction

11.2            Routing protocol requirements

11.3            Classification of Routing protocols / techniques

11.3.1                Nature-wise classification

11.3.2                Control-wise classification

11.3.3                Scope-wise classification

11.3.4                Classification based on a number of destination end-systems

11.4            Core Routing Concepts

11.4.1                Route Summarization (or Aggregation)

11.4.2                Routing hierarchy

11.4.3                Routing information flows and route computation

11.4.4                Path selection

11.4.5                Route parameterization

11.5            Example: Routing Protocols in Internet

11.5.1                Routing Information Protocol (RIP)

11.5.1.1            Routing Updates in RIP

11.5.1.2            Loop Prevention with RIP

11.5.1.3            RIP Packet Format

11.5.1.4            RIP Version 2

11.5.2                Open Shortest Path First (OSPF) Protocol

11.5.2.1            OSPF Link State Protocol

11.5.2.2            OSPF Network Hierarchy

11.5.2.3            OSPF Packet Format

11.5.3                Border Gateway Protocol (BGP)

11.5.3.1            Route Aggregation in BGP

11.5.3.2            BGP Path Selection

11.6            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 12.                        Traffic Management

12.1            Introduction

12.2            Concept of Traffic

12.3            Concept of Service

12.4            Network Capabilities

12.5            Types of Traffic

12.5.1                Voice

12.5.2                Data

12.5.3                Video

12.6            Traffic Management

12.7            Traffic Contract Management

12.8            Traffic Shaping

12.9            Traffic Policing

12.10                Priority Control

12.11                Flow Control

12.12                Congestion

12.12.1                Causes of Congestion

12.12.2                Congestion problem in high-speed networks

12.12.3                Effects of Congestion

12.13                Congestion Control

12.13.1                Preventive Congestion Control

12.13.2                Reactive Congestion Control

12.13.2.1            Packet Discard

12.13.2.2            Congestion Notification

12.14                Flow control versus Congestion Control

12.15                Example: Traffic Management in ATM

12.15.1                ATM Traffic Descriptors

12.15.2                ATM Service Descriptors

12.15.3                ATM Service Categories

12.15.4                ATM Traffic Contract Management

12.15.5                ATM Traffic Shaping

12.15.6                ATM Traffic Policing

12.15.7                ATM Priority Control

12.15.8                ATM Flow control

12.15.9                ATM Congestion Control

12.16                Conclusion

Review Questions

Further Reading

 

 

 

Chapter 13.                        Network Management

13.1            Introduction

13.2            Goals of Network Management

13.3            Functional Areas of Network Management

13.3.1                Fault management

13.3.2                Configuration management

13.3.3                Accounting management

13.3.4                Performance management

13.3.5                Security management

13.4            Example: Simple Network Management Protocol (SNMP)

13.4.1                SNMP Management model

13.4.2                Structure of Management Information

13.4.2.1            Name of Managed Object

13.4.2.2            Syntax of Managed Object

13.4.2.3            Encoding of Managed Object

13.4.3                Management Information Base (MIB)

13.4.4                Protocol details and message formats

13.5            Example: Telecommunications Management Network (TMN)

13.5.1                TMN functional architecture

13.5.1.1            TMN functional block

13.5.1.2            TMN reference point

13.5.2                TMN physical architecture

13.5.2.1            TMN building blocks

13.5.2.2            TMN interfaces

13.5.3                TMN information architecture

13.5.4                TMN Logical-Layered Architecture

13.6            Conclusion

Review Questions

Further Reading

 

 

 

Chapter 14.                        Security Management

14.1            Introduction

14.2            What is Security Management?

14.3            Symmetric (Secret Key) Encryption Techniques

14.3.1                Data Encryption Standard (DES)

14.3.2                Advanced Encryption Standard (AES)

14.4            Asymmetric (Public Key) Encryption Techniques

14.4.1                Confidentiality using Public Key Encryption

14.4.2                Authentication using Public Key Encryption

14.4.3                Confidentiality and Authentication using Public Key Encryption

14.4.4                Data Integrity using Public Key Encryption

14.4.5                RSA Algorithm

14.4.6                Elliptic Curve Cryptography

14.5     Key Management

14.5.1                Key Management for Symmetric Encryption Techniques

14.5.1.1            Kerberos

14.5.2                Key Management for Asymmetric Encryption Techniques

14.5.2.1            Diffie-Hellman Key Exchange

14.6            Hash Functions

14.6.1                Message Digest 5

14.6.2                Secure Hash Algorithm 1

14.7            Digital Signatures and Certificates

14.8            Firewalls

14.9            Example: Security Management in Third Generation UMTS Network

14.9.1                User Domain Security

14.9.2                Network Access Security

14.9.3                Network Domain Security using MAPSec

14.9.4                Network Domain Security using IPSec

14.10                Conclusion

Review Questions

Further Reading