图书介绍

通信网基本概念与主体结构pdf电子书版本下载

通信网基本概念与主体结构
  • Alberto Leon-Garcia,Indra Widjaja主编 著
  • 出版社: 北京:清华大学出版社
  • ISBN:7302078739
  • 出版时间:2008
  • 标注页数:900页
  • 文件大小:222MB
  • 文件页数:928页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

通信网基本概念与主体结构PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 Communication Networks and Services 1

1.1 Evolution of Network Architecture and Services 2

1.1.1 Telegraph Networks and Message Switching 2

1.1.2 Telephone Networks and Circuit Switching 5

1.1.3 The Internet,Computer Networks,and Packet Switching 9

1.2 Future Network Architectures and Their Services 22

1.3 Key Factors in Communication Network Evolution 24

1.3.1 Role of Technology 25

1.3.2 Role of Regulation 27

1.3.3 Role of the Market 28

1.3.4 Role of Standards 28

Checklist of Important Terms 29

Further Reading 30

Problems 31

2 Applications and Layered Architectures 34

2.1 Examples of Protocols,Services,and Layering 36

2.1.1 HTTP,DNS,and SMTP 36

2.1.2 TCP and UDP Transport Layer Services 42

2.2 The OSI Reference Model 43

2.2.1 The Seven-Layer OSI Reference Model 44

2.2.2 Unified View of Layers,Protocols,and Services 48

2.3 Overview of TCP/IP Architecture 52

2.3.1 TCP/IP Architecture 52

2.3.2 TCP/IP Protocol:How the Layers Work Together 55

2.3.3 Protocol Overview 61

2.4 The Berkeley API 62

2.4.1 Socket System Calls 64

2.4.2 Network Utility Functions 68

2.5 Application Layer Protocols and TCP/IP Utilities 77

2.5.1 Telnet 78

2.5.2 File Transfer Protocol 78

2.5.3 Hypertext Transfer Protocol and the World Wide Wed 82

2.5.4 IP Utilities 86

2.5.5 Tcpdump and Network Protocol Analyzers 89

Summary 90

Checklist of Important Terms 91

Further Reading 91

Problems 92

3 Digital Transmission Fundamentals 99

3.1 Digital Representation of Information 100

3.1.1 Block-Oriented Information 101

3.1.2 Stream Information 103

3.2 Why Digital Communications? 107

3.2.1 Comparison of Analog and Digital Transmission 107

3.2.2 Basic Properties of Digital Transmission Systems 110

3.3 Digital Representation of Analog Signals 114

3.3.1 Bandwidth of Analog Signals 115

3.3.2 Sampling of an Analog Signal 118

3.3.3 Digital Transmission of Analog Signals 119

3.3.4 SNR Performance of Quantizers 123

3.4 Characterization of Communication Channels 124

3.4.1 Frequency Domain Characterization 124

3.4.2 Time Domain Characterization 128

3.5 Fundamental Limits in Digital Transmission 130

3.5.1 The Nyquist Signaling Rate 130

3.5.2 The Shannon Channel Capacity 132

3.6 Line Coding 135

3.7 Modems and Digital Modulation 138

3.7.1 Binary Phase Modulation 140

3.7.2 QAM and Signal Constellations 141

3.7.3 Telephone Modem Standards 144

3.8 Properties of Media and Digital Transmission Systems 146

3.8.1 Twisted Pair 148

3.8.2 Coaxial Cable 152

3.8.3 Optical Fiber 156

3.8.4 Radio Transmission 162

3.8.5 Infrared Light 166

3.9 Error Detection and Correction 166

3.9.1 Error Detection 167

3.9.2 Two-Dimensional Parity Checks 171

3.9.3 Internet Checksum 172

3.9.4 Polynomial Codes 173

3.9.5 Standardized Polynomial Codes 177

3.9.6 Error-Detecting Capability of a Polynomial Code 178

3.9.7 Linear Codes 180

3.9.8 Error Correction 186

Summary 190

Checklist of Important Terms 191

Further Reading 192

Problems 192

Appendix 3A:Asynchronous Data Transmission 201

Appendix 3B:Fourier Series 203

Appendix 3C:Sampling Theorem 204

4 Circuit-Switching Networks 206

4.1 Multiplexing 207

4.1.1 Frequency-Division Multiplexing 208

4.1.2 Time-Division Multiplexing 209

4.1.3 Wavelength-Division Multiplexing 212

4.2 SONET 213

4.2.1 SONET Multiplexing 214

4.2.2 SONET Frame Structure 216

4.3 Transport Networks 221

4.3.1 SONET Networks 222

4.3.2 Optical Transport Networks 231

4.4 Circuit Switches 234

4.4.1 Space-Division Switches 235

4.4.2 Time-Division Switches 238

4.5 The Telephone Network 242

4.5.1 Transmission Facilities 245

4.5.2 End-to-End Digital Services 248

4.6 Signaling 250

4.6.1 Signaling in the Telephone Network 250

4.6.2 Signaling System #7 Architecture 253

4.7 Traffic and Overload Control in Telephone Networks 255

4.7.1 Concentration 256

4.7.2 Routing Control 259

4.7.3 Overload Controls 261

4.8 Cellular Telephone Networks 263

Summary 270

Checklist of Important Terms 270

Further Reading 271

Problems 272

5 Peer-to-Peer Protocols and Data Link Layer 282

Part Ⅰ:Peer-to-Peer Protocols 283

5.1 Peer-to-Peer Protocols and Service Models 284

5.1.1 Service Models 284

5.1.2 Examples of Services 286

5.1.3 End to End versus Hop by Hop 288

5.2 ARQ Protocols and Reliable Data Transfer Service 291

5.2.1 Stop-and-Wait ARQ 293

5.2.2 Go-Back-N ARQ 300

5.2.3 Selective Repeat ARQ 309

5.3 Other Peer-to-Peer Protocols 315

5.3.1 Sliding-Window Flow Control 315

5.3.2 Timing Recovery for Synchronous Services 317

5.3.3 TCP Reliable Stream Service and Flow Control 320

Part Ⅱ:Data Link Controls 324

5.4 Framing 325

5.5 Point-to-Point Protocol 329

5.6 HDLC Data Link Control 333

5.6.1 Data Link Services 333

5.6.2 HDLC Configurations and Transfer Modes 335

5.6.3 HDLC Frame Format 335

5.6.4 Typical Frame Exchanges 337

5.7 Link Sharing Using Packet Multiplexers 340

5.7.1 Statistical Multiplexing 340

5.7.2 Speech Interpolation and the Multiplexing of Packetized Speech 348

Summary 352

Checklist of Important Terms 353

Further Reading 354

Problems 354

Appendix 5A:Derivation of Efficiency of ARQ Protocols 365

6 Medium Access Control Protocols and Local Area Networks 368

Part Ⅰ:Medium Access Control Protocols 370

6.1 Multiple Access Communications 370

6.2 Random Access 377

6.2.1 ALOHA 378

6.2.2 Slotted ALOHA 380

6.2.3 Carrier Sense Multiple Access 381

6.2.4 Carrier Sense Multiple Access with Collision Detection 384

6.3 Scheduling Approaches to Medium Access Control 387

6.3.1 Reservation Systems 388

6.3.2 Polling 390

6.3.3 Token-Passing Rings 393

6.3.4 Comparison of Scheduling Approaches in Medium Access Control 396

6.3.5 Comparison of Random Access and Scheduling Medium Access Controls 397

6.4 Channelization 398

6.4.1 FDMA 399

6.4.2 TDMA 400

6.4.3 CDMA 401

6.4.4 Channelization in Telephone Cellular Networks 408

6.5 Delay Performance of MAC and Channelization Schemes 415

6.5.1 Performance of Channelization Techniques with Bursty Traffic 416

6.5.2 Performance of Polling and Token Ring Systems 418

6.5.3 Random Access and CSMA-CD 421

Part Ⅱ:Local Area Networks 421

6.6 LAN Protocols 421

6.6.1 LAN Structure 422

6.6.2 The Medium Access Control Sublayer 423

6.6.3 The Logical Link Control Sublayer 425

6.7 Ethernet and IEEE 802.3 LAN Standard 427

6.7.1 Ethernet Protocol 427

6.7.2 Frame Structure 429

6.7.3 Physical Layers 431

6.7.4 Fast Ethernet 434

6.7.5 Gigabit Ethernet 435

6.7.6 10 Gigabit Ethernet 436

6.8 Token-Ring and IEEE 802.5 LAN Standard 438

6.8.1 Token-Ring Protocol 439

6.8.2 Frame Structure 442

6.9 FDDI 444

6.10 Wireless LANs and IEEE 802.11 Standard 446

6.10.1 Ad hoc and Infrastructure Networks 449

6.10.2 Frame Structure and Addressing 451

6.10.3 Medium Access Control 453

6.10.4 Physical Layers 459

6.11 LAN Bridges and Ethernet Switches 465

6.11.1 Transparent Bridges 468

6.11.2 Source Routing Bridges 474

6.11.3 Mixed-Media Bridges 477

6.11.4 Virtual LANs 477

Summary 479

Checklist of Important Terms 480

Further Reading 481

Problems 482

7 Packet-Switching Networks 490

7.1 Network Services and Internal Network Operation 492

7.2 Packet Network Topology 496

7.3 Datagrams and Virtual Circuits 501

7.3.1 Connectionless Packet Switching 502

7.3.2 Virtual-Circuit Packet Switching 507

7.3.3 Structure of a Packet Switch 511

7.4 Routing in Packet Networks 515

7.4.1 Routing Algorithm Classification 516

7.4.2 Routing Tables 517

7.4.3 Hierarchical Routing 518

7.4.4 Specialized Routing 520

7.5 Shortest-Path Routing 522

7.5.1 The Bellman-Ford Algorithm 523

7.5.2 Dijkstra's Algorithm 530

7.5.3 Source Routing versus Hop-by-Hop Routing 532

7.5.4 Link-State Routing versus Distance-Vector Routing 533

7.6 ATM Networks 534

7.7 Traffic Management at the Packet Level 539

7.7.1 FIFO and Priority Queues 540

7.7.2 Fair Queueing 542

7.7.3 Weighted Fair Queueing 545

7.7.4 Random Early Detection 548

7.8 Traffic Management at the Flow Level 549

7.8.1 Open-Loop Control 550

7.8.2 Closed-Loop Control 558

7.9 Traffic Management at the Flow-Aggregate Level 560

Summary 561

Checklist of Important Terms 562

Further Reading 562

Problems 563

8 TCP/IP 572

8.1 The TCP/IP Architecture 573

8.2 The Internet Protocol 576

8.2.1 IP Packet 576

8.2.2 IP Addressing 579

8.2.3 Subnet Addressing 581

8.2.4 IP Routing 583

8.2.5 Classless Interdomain Routing(CIDR) 584

8.2.6 Address Resolution 585

8.2.7 Reverse Address Resolution 587

8.2.8 Fragmentation and Reassembly 587

8.2.9 ICMP:Error and Control Messages 589

8.3 IPv6 592

8.3.1 Header Format 593

8.3.2 Network Addressing 594

8.3.3 Extension Headers 597

8.3.4 Migration lssues from IPv4 to IPv6 599

8.4 User Datagram Protocol 601

8.5 Transmission Control Protocol 602

8.5.1 TCP Operation and Reliable Stream Service 602

8.5.2 TCP Protocol 605

8.5.3 TCP Congestion Control 617

8.6 Internet Routing Protocols 620

8.6.1 Routing Information Protocol 621

8.6.2 Open Shortest Path First 622

8.6.3 Border Gateway Protocol 631

8.7 Multicast Routing 640

8.7.1 Reverse-Path Broadcasting 641

8.7.2 Internet Group Management Protocol 643

8.7.3 Reverse-Path Multicasting 644

8.7.4 Distance-Vector Multicast Routing Protocol 646

8.8 DHCP,NAT,and Mobile IP 646

8.8.1 Dynamic Host Configuration Protocol 646

8.8.2 Network Address Translation 647

8.8.3 Mobile IP 647

Summary 650

Checklist of Important Terms 650

Further Reading 651

Problems 652

9 ATM Networks 660

9.1 Why ATM? 661

9.2 BISDN Reference Model 662

9.3 ATM Layer 665

9.3.1 ATM Cell Header 666

9.3.2 Virtual Connections 668

9.3.3 QoS Parameters 668

9.3.4 Traffic Descriptors 670

9.3.5 ATM Service Categories 671

9.3.6 Traffic Contracts,Connection Admission Control,and Traffic Management 673

9.4 ATM Adaptation Layer 674

9.4.1 AAL1 675

9.4.2 AAL2 678

9.4.3 AAL3/4 680

9.4.4 AAL5 683

9.4.5 Signaling AAL 684

9.4.6 Applications,AALs,and ATM Service Categories 686

9.5 ATM Signaling 688

9.5.1 ATM Addressing 688

9.5.2 UNI Signaling 690

9.5.3 PNNI Signaling 693

9.6 PNNI Routing 694

9.7 Classical IP Over ATM 697

Summary 699

Checklist of Important Terms 699

Further Reading 699

Problems 700

10 Advanced Network Architectures 705

10.1 Integrated Services in the Internet 706

10.1.1 Guaranteed Service 707

10.1.2 Controlled-Load Service 708

10.2 RSVP 708

10.2.1 Receiver-Initiated Reservation 710

10.2.2 Reservation Merging 711

10.2.3 Reservation Styles 712

10.2.4 Soft State 714

10.2.5 RSVP Message Format 715

10.3 Differentiated Services 717

10.3.1 DS Field 718

10.3.2 Per-Hop Behaviors 719

10.3.3 Traffic Conditioner 720

10.3.4 Bandwidth Broker 721

10.4 Network Interconnection Models 722

10.4.1 Overlay Model 723

10.4.2 Peer-to-Peer Model 725

10.5 MPLS 727

10.5.1 Fundamentals of Labels 729

10.5.2 Label Stack and LSP Hierarchy 730

10.5.3 VC Merging 732

10.5.4 Label Distribution Protocols 732

10.5.5 MPLS Support for Virtual Networks 735

10.5.6 Survivability 736

10.5.7 GMPLS 738

10.6 Real-Time Transport Protocol 740

10.6.1 RTP Scenarios and Terminology 741

10.6.2 RTP Packet Format 743

10.6.3 RTP Control Protocol(RTCP) 745

10.7 Session Control Protocols 747

10.7.1 Session Initiation Protocol 747

10.7.2 H.323 Multimedia Communication Systems 751

10.7.3 Media Gateway Control Protocols 753

Summary 755

Checklist of Important Terms 756

Further Reading 756

Problems 757

11 Security Protocols 763

11.1 Security and Cryptographic Algorithms 763

11.1.1 Applications of Cryptography to Security 765

11.1.2 Key Distribution 770

11.2 Security Protocols 773

11.2.1 Application Scenarios 773

11.2.2 Types of Security Service 775

11.2.3 Setting Up a Security Association 778

11.2.4 IPSec 780

11.2.5 Secure Sockets Layer and Transport Layer Security 782

11.2.6 802.11 and Wired Equivalent Privacy 788

11.3 Cryptographic Algorithms 790

11.3.1 DES 790

11.3.2 RSA 793

Summary 794

Checklist of Important Terms 795

Further Reading 796

Problems 797

12 Multimedia Information 800

12.1 Lossless Data Compression 801

12.1.1 Huffman Codes 801

12.1.2 Run-Length Codes 805

12.1.3 Adaptive Data Compression Codes 810

12.2 Compression of Analog Signals 812

12.2.1 Adaptive Quantizers 812

12.2.2 Predictive Coding 813

12.2.3 Transform and Subband Coding 818

12.3 Image and Video Coding 819

12.3.1 Discrete Cosine Transform Coding 819

12.3.2 The JPEG Image-Coding Standard 820

12.3.3 Compression of Video Signals 823

12.3.4 The MPEG Video-Coding Standards 826

12.3.5 MPEG Multiplexing 828

Summary 830

Checklist of Important Terms 830

Further Reading 830

Problems 831

Epilogue 837

Appendices 840

A Delay and Loss Performance 840

A.1 Delay Analysis and Little's Formula 840

A.1.1 Arrival Rates and Traffic Load Definitions 841

A.1.2 Little's Formula 842

A.2 Basic Queueing Models 845

A.2.1 Arrival Processes 846

A.2.2 Service Times 846

A.2.3 Queueing System Classification 847

A.3 M/M/1:A Basic Multiplexer Model 849

A.3.1 M/M/1 Steady State Probabilities and the Notion of Stability 850

A.3.2 Effect of Scale on Performance 853

A.3.3 Average Packet Delay in a Network 854

A.4 The M/G/1 Model 854

A.4.1 Service Time Variability and Delay 855

A.4.2 Priority Queueing Systems 856

A.4.3 Vacation Models and Multiplexer Performance 857

A.5 Erlang B Formula:M/M/c/c System 857

Further Reading 859

B Network Management 860

B.1 Network Management Overview 861

B.2 Simple Network Management Protocol(SNMP) 863

B.3 Structure of Management Information 865

B.4 Management Information Base 867

B.5 Remote Network Monitoring 868

Further Reading 869

Index 871

精品推荐