Preface |
|
xiii | |
Authors |
|
xv | |
|
Chapter 1 Communication Network at a Glance |
|
|
1 | (18) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (3) |
|
1.2.1 Based on Spread of the Network |
|
|
3 | (1) |
|
1.2.2 Based on the Type of Connection |
|
|
4 | (1) |
|
1.2.3 Based on the Type of Signals |
|
|
5 | (1) |
|
|
5 | (4) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (5) |
|
1.4.1 Use Cases of Data Communication |
|
|
10 | (1) |
|
1.4.2 Different Data Communication Mode |
|
|
11 | (1) |
|
1.4.3 Components of Data Communication |
|
|
11 | (2) |
|
1.4.4 Cellular or Mobile Communication |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.5 International Forums and Organizations |
|
|
14 | (2) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (3) |
|
|
16 | (3) |
|
Chapter 2 Reference Model and Protocol Suite |
|
|
19 | (22) |
|
|
19 | (1) |
|
|
19 | (1) |
|
2.2 Why Standard Protocol Architecture? |
|
|
20 | (1) |
|
2.3 Logistics of Communication |
|
|
20 | (7) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.3.4 Client/Server Method |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
2.3.7 Flow Control Mechanism |
|
|
24 | (3) |
|
2.3.8 Connection Oriented - Connectionless |
|
|
27 | (1) |
|
|
27 | (5) |
|
2.4.1 Layered Architecture |
|
|
28 | (2) |
|
|
30 | (2) |
|
|
32 | (6) |
|
2.5.1 Layered Architecture |
|
|
32 | (3) |
|
|
35 | (2) |
|
2.5.3 Comparing TCP/IP and OSI Model |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (3) |
|
|
39 | (2) |
|
Chapter 3 The First Internet: ARPANET |
|
|
41 | (20) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (12) |
|
3.2.1 A Brief History of ARPANET |
|
|
42 | (3) |
|
|
45 | (1) |
|
|
46 | (1) |
|
3.2.3.1 Time-Shared Computers |
|
|
46 | (1) |
|
3.2.3.2 Network Working Group |
|
|
46 | (1) |
|
3.2.3.3 Request For Comments (RFC) |
|
|
47 | (1) |
|
3.2.3.4 Network Control Protocol |
|
|
47 | (1) |
|
3.2.3.5 Decentralization of Network or Distributed Control |
|
|
48 | (1) |
|
3.2.3.6 Store-and-Forward Switching |
|
|
49 | (1) |
|
3.2.3.7 Responsiveness of Network |
|
|
50 | (1) |
|
|
50 | (1) |
|
3.2.5 ARPANET Network Operation |
|
|
51 | (3) |
|
3.3 Reception, Success, and Achievement |
|
|
54 | (2) |
|
|
55 | (1) |
|
3.3.2 Impact on Computer Resource and Communication Technology |
|
|
56 | (1) |
|
|
56 | (5) |
|
|
58 | (3) |
|
|
61 | (18) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (3) |
|
4.2.1 The ALOHA SYSTEM - Architecture |
|
|
62 | (1) |
|
|
63 | (2) |
|
4.2.3 Pure and Slotted: ALOHA Protocols |
|
|
65 | (1) |
|
|
65 | (7) |
|
4.3.1 Experimental Ethernet |
|
|
66 | (1) |
|
4.3.1.1 Error Detection Mechanism |
|
|
67 | (1) |
|
4.3.2 Ethernet Developments in History |
|
|
68 | (4) |
|
|
72 | (5) |
|
4.4.1 Physical Layers of Ethernet |
|
|
73 | (1) |
|
4.4.1.1 10 Mbit/s Ethernet |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
4.4.1.4 Ten Gigabit Ethernet |
|
|
74 | (1) |
|
4.4.2 Medium Access Control |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
78 | (1) |
|
Chapter 5 Journey of Cables - From Coppers to Optical Fiber |
|
|
79 | (20) |
|
|
79 | (1) |
|
|
79 | (1) |
|
5.2 History of Telecommunication Cables |
|
|
80 | (7) |
|
|
82 | (1) |
|
5.2.2 Development of Ethernet |
|
|
83 | (1) |
|
5.2.3 From Analog to Digital |
|
|
84 | (1) |
|
5.2.4 Transatlantic Cables |
|
|
85 | (2) |
|
|
87 | (7) |
|
|
88 | (5) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (3) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (2) |
|
|
98 | (1) |
|
Chapter 6 Wireless Networks |
|
|
99 | (22) |
|
|
99 | (1) |
|
|
100 | (1) |
|
6.2 Wireless Networks and Communication |
|
|
101 | (9) |
|
6.2.1 Wireless Telegraphy |
|
|
102 | (1) |
|
6.2.2 Mobile Telephone Service - Precellular |
|
|
103 | (1) |
|
6.2.3 Mobile Communication - Cellular |
|
|
104 | (1) |
|
|
104 | (1) |
|
6.2.3.2 Second Generation |
|
|
105 | (1) |
|
|
105 | (1) |
|
6.2.3.4 Fourth Generation |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
6.3 Architecture of Wireless Networks |
|
|
110 | (8) |
|
6.3.1 The OSI Reference Model |
|
|
110 | (2) |
|
6.3.2 Different Types of Wireless Network |
|
|
112 | (1) |
|
6.3.2.1 Wireless Wide Area Network |
|
|
112 | (1) |
|
6.3.2.2 Wireless Metropolitan Area Network |
|
|
113 | (1) |
|
6.3.2.3 Wireless Local Area Network |
|
|
113 | (1) |
|
6.3.2.4 Wireless Personal Area Network |
|
|
114 | (1) |
|
6.3.3 Wireless Network Topologies |
|
|
114 | (1) |
|
6.3.3.1 Point-to-Point Wireless Network |
|
|
114 | (1) |
|
6.3.3.2 Star Wireless Network |
|
|
115 | (1) |
|
6.3.3.3 Tree Wireless Network |
|
|
115 | (1) |
|
6.3.3.4 Mesh Wireless Network |
|
|
116 | (1) |
|
6.3.4 Wireless Service Modes |
|
|
116 | (2) |
|
|
118 | (3) |
|
|
119 | (2) |
|
Chapter 7 Circuit Switching and Packet Switching |
|
|
121 | (12) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (2) |
|
|
124 | (3) |
|
|
126 | (1) |
|
7.3.2 Automatic Switching |
|
|
126 | (1) |
|
|
127 | (3) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (3) |
|
|
131 | (2) |
|
Chapter 8 Multiprotocol Label Switching |
|
|
133 | (16) |
|
|
133 | (1) |
|
|
134 | (1) |
|
8.2 MPLS Background: A Historical View |
|
|
134 | (6) |
|
8.2.1 IP Switching Technology |
|
|
136 | (2) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (7) |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
8.3.3.1 Assignment of Label |
|
|
144 | (1) |
|
8.3.3.2 LDP or TDP Session Establishment |
|
|
145 | (1) |
|
8.3.3.3 Distribution of Label |
|
|
145 | (1) |
|
8.3.3.4 Retention of Label |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
148 | (1) |
|
|
149 | (10) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (7) |
|
9.2.1 Metro Ethernet Forum |
|
|
151 | (1) |
|
9.2.2 MEF: Carrier Ethernet Terminologies |
|
|
152 | (1) |
|
9.2.3 MEF: Carrier Ethernet Services |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
157 | (2) |
|
Chapter 10 Modern Internet |
|
|
159 | (10) |
|
|
159 | (1) |
|
|
159 | (1) |
|
10.2 Principles of Modern Internet Architecture |
|
|
160 | (5) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
10.2.4 Robustness and Adaptability |
|
|
163 | (1) |
|
|
163 | (1) |
|
10.2.6 Naming and Addressing |
|
|
164 | (1) |
|
10.2.7 Distributed Architecture |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
168 | (1) |
|
Chapter 11 Software-Defined Networking |
|
|
169 | (10) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (5) |
|
|
170 | (1) |
|
11.2.1.1 Application Layer |
|
|
171 | (1) |
|
11.2.1.2 Northbound Interface |
|
|
171 | (1) |
|
|
171 | (1) |
|
11.2.1.4 Southbound Interface |
|
|
172 | (1) |
|
11.2.1.5 Network Operating Systems |
|
|
172 | (1) |
|
11.2.1.6 Infrastructure Layer |
|
|
173 | (1) |
|
11.2.2 Traffic Flow in SDN |
|
|
173 | (1) |
|
11.2.2.1 North-South Flow |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (2) |
|
11.3.1 OpenFlow Table and Flow Entries |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
178 | (1) |
|
Chapter 12 Cloud Computing |
|
|
179 | (14) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
12.3 Benefits and Limitations of the Cloud |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (5) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
12.9 Data Centers as Support for Cloud Computi ng |
|
|
190 | (1) |
|
|
190 | (3) |
|
|
192 | (1) |
|
Chapter 13 Internet of Things |
|
|
193 | (22) |
|
|
193 | (1) |
|
|
193 | (2) |
|
13.2 IoT World Background |
|
|
195 | (3) |
|
13.2.1 Communication Models of IoT |
|
|
197 | (1) |
|
13.2.2 Communications Device to Device |
|
|
197 | (1) |
|
13.3 Intercommunication between Things |
|
|
198 | (4) |
|
13.3.1 Protocols Used to Transmit Data |
|
|
199 | (1) |
|
13.3.2 Embedded Vision Systems |
|
|
199 | (1) |
|
13.3.3 Webinars on Embedded/Integrated Vision Systems |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (3) |
|
13.3.6 The Internet of Things as an Ally of Digital Transformation |
|
|
202 | (1) |
|
13.4 Internet of Things 2.0: The Next Step toward Industry 4.0 |
|
|
202 | (1) |
|
|
203 | (5) |
|
13.5.1 What is IoT, and what are its Main Applications |
|
|
203 | (1) |
|
13.5.2 This is What a Home IoT Network Looks Like |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
13.5.3.2 Business IoT Network |
|
|
204 | (1) |
|
13.5.4 Vehicle Fleets for Logistics |
|
|
204 | (1) |
|
13.5.5 IoT Applications for Home Use |
|
|
204 | (1) |
|
13.5.6 Growth of the Number of Connected Devices |
|
|
205 | (1) |
|
13.5.7 IoT in Agriculture: Smart Farming |
|
|
205 | (1) |
|
13.5.8 Agriculture and Livestock |
|
|
206 | (1) |
|
|
206 | (1) |
|
13.5.9 IoT in Medicine IoMT: Smart Health |
|
|
207 | (1) |
|
|
207 | (1) |
|
13.5.10 IoT in Energy Management: Smart Energy |
|
|
208 | (1) |
|
13.5.11 IIoT, the Industrial Internet of Things |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (3) |
|
13.7.1 Considerations to Integrate IoT Technologies |
|
|
209 | (2) |
|
13.7.2 Challenges and Challenges in Organizations |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (2) |
|
|
213 | (2) |
|
Chapter 14 Next-Generation IoT and the World of Sensors |
|
|
215 | (10) |
|
|
215 | (1) |
|
|
215 | (1) |
|
14.2 The World of Sensors |
|
|
216 | (1) |
|
14.2.1 Great Growth Potential |
|
|
216 | (1) |
|
14.3 Functions of the Sensors That Incorporate the Objects with IoT Technology |
|
|
217 | (4) |
|
14.3.1 Sensors for Temperature |
|
|
217 | (1) |
|
14.3.2 Sensors for Proximity |
|
|
218 | (1) |
|
14.3.3 Sensors for Measurement Gases |
|
|
219 | (1) |
|
14.3.4 Sensors for Pressure |
|
|
219 | (1) |
|
14.3.5 Sensor for Moisture |
|
|
219 | (1) |
|
|
219 | (1) |
|
14.3.7 Intelligent and Autonomous Sensors |
|
|
219 | (2) |
|
14.4 The Next-Generation Internet of Things |
|
|
221 | (1) |
|
14.5 Opportunities, Challenges, and Solutions |
|
|
221 | (2) |
|
|
223 | (2) |
|
|
223 | (2) |
|
Chapter 15 Artificial Intelligence and Networking |
|
|
225 | (14) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (3) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
15.3 How AI Can Transform Computer Networks? |
|
|
229 | (7) |
|
15.3.1 AI in Software-Defined Networking |
|
|
232 | (1) |
|
15.3.1.1 Some Parameters for Selecting ML Algorithm to Power an SDN Controller |
|
|
233 | (1) |
|
15.3.2 AI in the Telcom Networks |
|
|
234 | (1) |
|
15.3.3 AI in Cyber Security |
|
|
235 | (1) |
|
|
236 | (3) |
|
|
237 | (2) |
Index |
|
239 | |