Chapter
1. Network services
Chapter
2. Protocol Layering
Chapter
3. Transfer Modes
Chapter
4. Network Topology and Extent
Chapter
5. Transmission
and Multiple Access
Chapter
6. Data Link
Control
Chapter
7. Bridging
Chapter
8. Switching
Chapter
9. Addressing
Chapter
10. Signalling
Chapter
11. Routing
Chapter
12. Traffic
Management
Chapter
13. Network
Management
Chapter
14. Security
Management
1.1 Introduction
1.2 Connection-oriented
Service
1.3 Connectionless
Service
1.4 Connection-Oriented
versus Connectionless Service
1.5 Examples
1.6 Conclusion
Review Questions
Further Reading
Chapter 2. Protocol Layering
2.1 Introduction
2.2 Layered
Architecture
2.3 Services,
Interface, Primitives and Service Access Points
2.4 Open Systems
Interconnection-Reference Model
(OSI-RM)
2.5 Definition of Open
Systems
2.6 Seven-layered OSI
Model
2.6.1 Physical
Layer
2.6.2 Data
Link Layer
2.6.3 Network
Layer
2.6.4 Transport
Layer
2.6.5 Session
Layer
2.6.6 Presentation
Layer
2.6.7 Application
Layer
2.7 Shortcomings of
OSI Reference Model
2.8 Example: TCP/IP
Protocol Suite
2.8.1 Historical
background
2.8.2 TCP/IP
reference model
2.8.3 Internet
Protocol (IP)
2.8.4 Transmission
Control Protocol (TCP)
2.8.5 User
Datagram Protocol (UDP)
2.8.6 Layering
Concepts in TCP/IP
2.9 Conclusion
Review Questions
Further Reading
Chapter 3. Transfer Modes
3.1 Introduction
3.2 Circuit Switching
3.3 Routing
3.4 Virtual Circuit
Switching
3.5 Comparison of
Transfer Modes
3.6 Example:
Asynchronous Transfer Mode (ATM)
3.6.1 Transfer
mode
3.6.2 Cell-based
transfer
3.6.3 Asynchronous
transfer
3.6.4 Fixed
and Small-Sized Cell
3.6.5 Connection-oriented
Approach
3.6.6 Virtual
Channels and Virtual Paths
3.6.7 Negligible
error and flow control
3.7 Conclusion
Review Questions
Further Reading
Chapter 4. Network Topology and Extent
4.1 Introduction
4.2 Network Topology
4.3 Network Extent
4.4 Local Area
Networks (LAN)
4.5 Wide area network
(WAN)
4.6 Other Area Networks
4.7 Examples
4.8 Conclusion
Review Questions
Further Reading
Chapter 5. Transmission and Multiple Access
5.1 Introduction
5.2 Transmission
Concepts
5.2.1 Analog
and Digital Transmission
5.2.2 Digital
to Analog Conversion
5.2.3 Analog
to Digital Conversion
5.2.4 Bandwidth
and Capacity
5.2.5 Transmission
Media
5.3 Multiple Access
Concepts
5.3.1 Frequency
Division Multiplexing
5.3.2 Time
Division Multiplexing
5.3.3 Wavelength
Division Multiplexing
5.3.4 Code
Division Multiplexing
5.4 Example: FDMA/TDMA
in GSM Networks
5.5 Example: CDMA in
UMTS Networks
5.5.1 Spreading
and Despreading
5.5.2 Autocorrelation
and Cross Correlation
5.5.3 Benefitsof
Spreading
5.5.4 Scrambling
5.6 Conclusion
Review Questions
Further Reading
Chapter 6. Data Link Control
6.1 Introduction
6.2 Data Link Line
configurations
6.2.1 Topology
6.2.2 Duplexity
6.3 Data Link Layer
Functions
6.3.1 Framing
6.3.2 Error
Control
6.3.3 Flow
Control
6.3.4 Link
Management
6.4 Services Offered
to Network Layer
6.5 DLC Protocol Layering
6.6 Logical Link
Control (LLC)
6.6.1 Types
of LLC Operations
6.6.2 Classes
of LLC
6.6.3 LLC
Sub-layer Protocol Data Units
6.7 Media Access
Control (MAC)
6.7.1 Static
Channel Allocation protocols
6.7.2 Random
Access Protocols
6.7.2.1 Aloha
Protocol
6.7.2.2 Slotted
Aloha
6.7.2.3 CSMA/CD
6.7.3 Taking-Turns
Protocols
6.8 Flow Control
Protocols
6.8.1 Window-based
Flow Control
6.8.2 Rate-based
Flow Control
6.9 Error Detection
and Correction Mechanisms
6.9.1 Use
of Parity Bits
6.9.2 Checksum
Techniques
6.9.3 Cyclic
Redundancy Checks (CRC)
6.10 Example: HDLC
6.11 Conclusion
Review Questions
Further Reading
Chapter 7. Bridging
7.1 Introduction
7.2 Transparent
Bridging
7.2.1 Functions
of a Bridge in Transparent Bridged LANs
7.2.1.1 Management
of Destination Lookup Table
7.2.1.2 Layer
2 Packet Forwarding
7.2.2 Transparent
Bridging in Multi-Bridge LAN
7.3 Source Route
Bridging
7.4 Example: Bridging
in Ethernet LANs
7.5 Conclusion
Review Questions
Further Reading
Chapter 8. Switching
8.1 Introduction
8.2 Components of a
Typical Switch
8.3 Performance measures
in switch design
8.4 Switching issues
8.4.1 Conflicts
and Contentions
8.4.2 Blocking
and Buffering
8.4.2.1 Input
Buffering
8.4.2.2 Output
Buffering
8.4.2.3 Shared
Buffering
8.4.3 Memory
look-up
8.4.4 Multicasting
8.5 Switching
Architectures
8.6 Shared Memory
Architecture
8.6.1 Buffering
8.6.2 Multicasting
8.6.3 Scalability
8.7 Shared Medium
Architecture
8.7.1 Buffering
8.7.2 Multicasting
8.7.3 Scalability
8.8 Space Division
Architecture
8.8.1 Crossbar switching
8.8.1.1 Buffering
8.8.1.2 Multicasting
8.8.2 Banyan-based
Switching
8.8.2.1 Blocking
Solutions in Banyan networks
8.8.2.2 Multicasting
8.8.2.3 Scalability
8.9 Example: Switching
in ATM
8.9.1 User
plane functions
8.9.1.1 Input
module
8.9.1.2 Switching
fabric
8.9.1.3 Output
module
8.9.2 Control
plane functions
8.10 Example of ATM
Switch Architecture: Knockout switch
8.10.1 Components
of Knockout Switch
8.10.1.1 Cell
filters
8.10.1.2 Concentrator
8.10.1.3 Shared
buffer
8.10.2 Buffering
8.10.3 Multicasting
8.10.4 Scalability
8.11 Conclusion
Review Questions
Further Reading
Chapter 9. Addressing
9.1 Introduction
9.2 Classification of
Addressing Techniques
9.2.1 Scope-wise
classification
9.2.2 Utility-wise
classification
9.2.3 Layer-wise
classification
9.2.4 Functionality-wise
classification
9.3 Example:
Addressing Structure in Internet
9.4 Example:
Addressing structure in Telecom Networks
9.5 Conclusion
Review Questions
Further Reading
Chapter 10. Signalling
10.1 Introduction
10.2 Signalling
Complexity in Different Networks
10.3 Classification of
Signalling Techniques
10.4 Signalling Issues
10.4.1 Acknowledgements
10.4.2 Timer
Protection
10.4.3 Handshaking
10.4.4 Connection
Identification
10.4.5 Finite
state modelling of calls
10.5 Signalling models
10.6 Point-to-multipoint
signalling
10.6.1 Starting
a point-to-multipoint connection
10.6.2 Adding
parties to a Point-to-multipoint
Connection
10.6.3 Dropping
parties and releasing the Point-to-multipoint connection
10.6.4 Nature
of a Point-to-multipoint connection
10.6.5 Analysis
of Point-to-multipoint connection
10.7 Example: ISDN
Signalling
10.7.1 ISDN
Protocol Stack
10.7.2 Services
10.7.3 Signalling
in ISDN
10.8 Conclusion
Review Questions
Further Reading
Chapter 11. Routing
11.1 Introduction
11.2 Routing protocol requirements
11.3 Classification of
Routing protocols / techniques
11.3.1 Nature-wise
classification
11.3.2 Control-wise
classification
11.3.3 Scope-wise
classification
11.3.4 Classification
based on a number of destination end-systems
11.4 Core Routing Concepts
11.4.1 Route
Summarization (or Aggregation)
11.4.2 Routing
hierarchy
11.4.3 Routing
information flows and route computation
11.4.4 Path
selection
11.4.5 Route
parameterization
11.5 Example: Routing
Protocols in Internet
11.5.1 Routing
Information Protocol (RIP)
11.5.1.1 Routing
Updates in RIP
11.5.1.2 Loop
Prevention with RIP
11.5.1.3 RIP
Packet Format
11.5.1.4 RIP
Version 2
11.5.2 Open
Shortest Path First (OSPF) Protocol
11.5.2.1 OSPF
Link State Protocol
11.5.2.2 OSPF
Network Hierarchy
11.5.2.3 OSPF
Packet Format
11.5.3 Border
Gateway Protocol (BGP)
11.5.3.1 Route
Aggregation in BGP
11.5.3.2 BGP
Path Selection
11.6 Conclusion
Review Questions
Further Reading
Chapter 12. Traffic Management
12.1 Introduction
12.2 Concept of Traffic
12.3 Concept of Service
12.4 Network
Capabilities
12.5 Types of Traffic
12.5.1 Voice
12.5.2 Data
12.5.3 Video
12.6 Traffic Management
12.7 Traffic Contract
Management
12.8 Traffic Shaping
12.9 Traffic Policing
12.10 Priority
Control
12.11 Flow Control
12.12 Congestion
12.12.1 Causes
of Congestion
12.12.2 Congestion
problem in high-speed networks
12.12.3 Effects
of Congestion
12.13 Congestion
Control
12.13.1 Preventive
Congestion Control
12.13.2 Reactive
Congestion Control
12.13.2.1 Packet
Discard
12.13.2.2 Congestion
Notification
12.14 Flow control
versus Congestion Control
12.15 Example:
Traffic Management in ATM
12.15.1 ATM
Traffic Descriptors
12.15.2 ATM
Service Descriptors
12.15.3 ATM
Service Categories
12.15.4 ATM
Traffic Contract Management
12.15.5 ATM
Traffic Shaping
12.15.6 ATM
Traffic Policing
12.15.7 ATM
Priority Control
12.15.8 ATM
Flow control
12.15.9 ATM
Congestion Control
12.16 Conclusion
Review Questions
Further Reading
Chapter 13. Network Management
13.1 Introduction
13.2 Goals of Network
Management
13.3 Functional Areas
of Network Management
13.3.1 Fault
management
13.3.2 Configuration
management
13.3.3 Accounting
management
13.3.4 Performance
management
13.3.5 Security
management
13.4 Example: Simple
Network Management Protocol (SNMP)
13.4.1 SNMP
Management model
13.4.2 Structure
of Management Information
13.4.2.1 Name
of Managed Object
13.4.2.2 Syntax
of Managed Object
13.4.2.3 Encoding
of Managed Object
13.4.3 Management
Information Base (MIB)
13.4.4 Protocol
details and message formats
13.5 Example: Telecommunications
Management Network (TMN)
13.5.1 TMN
functional architecture
13.5.1.1 TMN
functional block
13.5.1.2 TMN
reference point
13.5.2 TMN
physical architecture
13.5.2.1 TMN
building blocks
13.5.2.2 TMN
interfaces
13.5.3 TMN
information architecture
13.5.4 TMN
Logical-Layered Architecture
13.6 Conclusion
Review Questions
Further Reading
Chapter 14. Security Management
14.1 Introduction
14.2 What is Security
Management?
14.3 Symmetric (Secret
Key) Encryption Techniques
14.3.1 Data
Encryption Standard (DES)
14.3.2 Advanced
Encryption Standard (AES)
14.4 Asymmetric (Public
Key) Encryption Techniques
14.4.1 Confidentiality
using Public Key Encryption
14.4.2 Authentication
using Public Key Encryption
14.4.3 Confidentiality
and Authentication using Public Key Encryption
14.4.4 Data
Integrity using Public Key Encryption
14.4.5 RSA
Algorithm
14.4.6 Elliptic
Curve Cryptography
14.5 Key Management
14.5.1 Key
Management for Symmetric Encryption Techniques
14.5.1.1 Kerberos
14.5.2 Key
Management for Asymmetric Encryption Techniques
14.5.2.1 Diffie-Hellman
Key Exchange
14.6 Hash Functions
14.6.1 Message
Digest 5
14.6.2 Secure
Hash Algorithm 1
14.7 Digital Signatures
and Certificates
14.8 Firewalls
14.9 Example: Security
Management in Third Generation UMTS Network
14.9.1 User
Domain Security
14.9.2 Network
Access Security
14.9.3 Network
Domain Security using MAPSec
14.9.4 Network
Domain Security using IPSec
14.10 Conclusion