MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Data communications and networks : an engineering approach / James Irvine and David Harle.

By: Irvine, James, 1968-.
Contributor(s): Harle, D. (David), 1963-.
Material type: materialTypeLabelBookPublisher: Chichester, West Sussex, England ; New York, NY : Wiley, 2002Description: xx, 268 p. : ill., map ; 25 cm. + hbk.ISBN: 0471808725.Subject(s): Computer networksDDC classification: 004.6
Contents:
Communication Systems -- The User Perspective -- The Security Perspective -- The Network Perspective -- The link perspective -- The channel perspective -- Putting it all together.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 004.6 (Browse shelf(Opens below)) 1 Available 00116112
General Lending MTU Bishopstown Library Lending 004.6 (Browse shelf(Opens below)) 1 Available 00092231
Total holds: 0

Enhanced descriptions from Syndetics:

Data Communications and Networks uses a top-down, Internet-focussed approach to tackle the problem of communication system design. An integrated approach is taken to networks and data communications, with an emphasis that starts from the top level requirements and works downwards, describing how such requirements are fulfilled by lower layers of the transmission chain. While the book contains sufficient detail to provide an excellent foundation, clarity is paramount and care is taken not to swamp the reader with information to the point where the underlying concepts are obscured.

The Internet is used as the principle example of a communication system, allowing the reader to follow the system from the application layers, with source coding and security, through the network, with naming and routing algorithms, down to transport and physical aspects of a communication system. Modern techniques such as mobile radio, Voice over IP, and ASDL, are covered, while more traditional aspects such as circuit switching, which still form a significant part of current systems, are not overlooked.

By providing a technical introduction and including application examples, this text will have significant appeal to final year students, postgraduates and professionals with a science or engineering background wishing to gain a basic understanding of the key concepts behind data communications engineering.

Includes index.

Communication Systems -- The User Perspective -- The Security Perspective -- The Network Perspective -- The link perspective -- The channel perspective -- Putting it all together.

CIT Module CTEC 8003 - Core reading

Table of contents provided by Syndetics

  • Abbreviations (p. xi)
  • Preface (p. xix)
  • 1 Communication Systems (p. 1)
  • 1.1 Introduction (p. 1)
  • 1.2 Partitioning Communication Systems (p. 1)
  • 1.3 Layered Communication Architectures (p. 3)
  • 1.3.1 The Need for Standards (p. 4)
  • 1.3.2 Internet Reference Model (p. 5)
  • 1.3.3 OSI Reference Model (p. 5)
  • 1.4 Structure of the Book (p. 7)
  • 2 The User Perspective (p. 13)
  • 2.1 User Data (p. 13)
  • 2.2 Introduction to Information Theory (p. 13)
  • 2.2.1 Information Content (p. 13)
  • 2.2.2 Mutual Information (p. 15)
  • 2.3 Information Sources (p. 16)
  • 2.4 Coding (p. 16)
  • 2.4.1 Properties of Codes (p. 16)
  • 2.4.2 Minimum Code Lengths (p. 17)
  • 2.4.3 Redundancy and Efficiency (p. 17)
  • 2.4.4 Types of Coding (p. 18)
  • 2.5 Source Coding (p. 18)
  • 2.5.1 Quantisation (p. 18)
  • 2.5.2 Quantisation Accuracy (p. 19)
  • 2.5.3 Sampling Rate (p. 20)
  • 2.5.4 Fourier Series (p. 20)
  • 2.5.5 Calculation of the Frequency Spectrum (p. 20)
  • 2.5.6 Frequency Spectrum (p. 23)
  • 2.5.7 Minimum Sampling Rate (p. 23)
  • 2.5.8 Pulse Code Modulation (PCM) (p. 24)
  • 2.5.9 Source Coding for Memoryless Sources (p. 24)
  • 2.5.10 Source Coding for Sources with Memory (p. 26)
  • 2.6 Questions on the User Perspective (p. 29)
  • 2.6.1 Questions on Information Theory (p. 29)
  • 2.6.2 Questions on Memoryless Source Coding (p. 29)
  • 2.6.3 Questions on Source Coding for Sources with Memory (p. 30)
  • 3 The Security Perspective (p. 31)
  • 3.1 Introduction (p. 31)
  • 3.2 Types of Cryptography (p. 31)
  • 3.2.1 Diffusion (p. 32)
  • 3.2.2 Confusion (p. 33)
  • 3.3 Cryptographic Scenarios (p. 33)
  • 3.4 Private Key Systems (p. 34)
  • 3.4.1 Introduction (p. 34)
  • 3.4.2 Transposition Ciphers (p. 35)
  • 3.4.3 Transformation Ciphers (p. 35)
  • 3.4.4 One Time Pad (p. 37)
  • 3.4.5 Shift Register Encoders (p. 38)
  • 3.4.6 Product Ciphers (p. 38)
  • 3.4.7 Stream Ciphers (p. 41)
  • 3.5 Public Key Cryptosystems (p. 42)
  • 3.5.1 The Key Distribution Problem (p. 42)
  • 3.5.2 One Way Functions (p. 44)
  • 3.5.3 Diffie-Hellman Key Exchange (p. 45)
  • 3.5.4 RSA (Rivest, Shamir, Adleman) Cryptosystem (p. 46)
  • 3.6 Authentication (p. 47)
  • 3.6.1 Introduction (p. 47)
  • 3.6.2 Integrity (p. 47)
  • 3.6.3 Authentication (p. 49)
  • 3.6.4 Digital Signatures (p. 50)
  • 3.7 Other Cryptographic Protocols (p. 50)
  • 3.7.1 Tossing a Coin Remotely (p. 50)
  • 3.7.2 Oblivious Transfer (p. 51)
  • 3.8 Practical Security (p. 52)
  • 3.8.1 How Much Security? (p. 52)
  • 3.8.2 Trusted Authorities (p. 53)
  • 3.8.3 Error Conditions (p. 53)
  • 3.8.4 The Human Factor (p. 53)
  • 3.9 Questions on the Security Perspective (p. 54)
  • 4 The Network Perspective (p. 55)
  • 4.1 Introduction (p. 55)
  • 4.2 Network Configurations (p. 56)
  • 4.2.1 Network Topology (p. 58)
  • 4.2.2 Connectivity (p. 60)
  • 4.3 Network Size (p. 64)
  • 4.3.1 Wide Area Networks (p. 64)
  • 4.3.2 Metropolitan Area Networks (p. 65)
  • 4.3.3 Local Area Networks (p. 65)
  • 4.4 Switching Techniques (p. 65)
  • 4.4.1 Circuit Switching (p. 66)
  • 4.4.2 Packet Switching (p. 66)
  • 4.5 Service Definition from a Network Viewpoint (p. 70)
  • 4.5.1 Non-performance-oriented Quality Parameters (p. 71)
  • 4.5.2 Performance-oriented Quality Parameters (p. 71)
  • 4.6 Network Dimensioning (p. 72)
  • 4.6.1 Dimensioning in Circuit Switching (p. 72)
  • 4.6.2 Dimensioning in Packet-Switched Systems (p. 75)
  • 4.7 Link Properties (p. 80)
  • 4.8 Internetworking (p. 81)
  • 4.8.1 Repeater (p. 81)
  • 4.8.2 Bridge (p. 82)
  • 4.8.3 Router (p. 82)
  • 4.8.4 Higher Level Gateway (p. 83)
  • 4.9 Routing (p. 83)
  • 4.9.1 Shortest Path (p. 84)
  • 4.9.2 Flooding (p. 86)
  • 4.9.3 Distributed Routing (p. 87)
  • 4.9.4 Broadcast Routing (p. 89)
  • 4.10 Congestion (p. 91)
  • 4.10.1 Admission Control (p. 91)
  • 4.10.2 Load Shedding (p. 91)
  • 4.10.3 Flow Control (p. 92)
  • 4.11 Error Control (p. 92)
  • 4.11.1 Error Detection (p. 93)
  • 4.11.2 ARQ (p. 94)
  • 4.12 Transport Layer Services (p. 98)
  • 4.12.1 Addressing (p. 99)
  • 4.12.2 OSI Transport Service Classes (p. 100)
  • 4.12.3 Internet Transport Service Classes (p. 101)
  • 4.13 Internet Protocol (p. 106)
  • 4.13.1 IP Packet Format (p. 106)
  • 4.13.2 Addressing (p. 108)
  • 4.13.3 Subnets (p. 108)
  • 4.13.4 Classless Addressing (p. 110)
  • 4.13.5 Domain Name Service (p. 111)
  • 4.13.6 IP Routing (p. 113)
  • 4.13.7 IPv6 (p. 114)
  • 4.14 QoS over IP (p. 116)
  • 4.14.1 Integrated Services (p. 116)
  • 4.14.2 Resource Reservation Protocol (p. 117)
  • 4.14.3 Differentiated Services (p. 118)
  • 4.14.4 Multi-Protocol Label Switching (p. 119)
  • 4.15 Questions on the Network Perspective (p. 120)
  • 4.15.1 Questions on Network Configuration (p. 120)
  • 4.15.2 Questions on Switching Techniques (p. 121)
  • 4.15.3 Questions on Network Dimensioning (p. 121)
  • 4.15.4 Questions on Routing (p. 122)
  • 4.15.5 Questions on Error Control (p. 122)
  • 5 The Link Perspective (p. 124)
  • 5.1 Data Link Layer (p. 124)
  • 5.2 Frame Delimiting (p. 124)
  • 5.3 Medium Access Control (p. 125)
  • 5.3.1 Contention-Based Schemes (p. 125)
  • 5.3.2 Reservation-Based Schemes (p. 128)
  • 5.3.3 Comparison of Access Techniques (p. 133)
  • 5.4 Channel Coding (p. 133)
  • 5.4.1 Probability of Error (p. 136)
  • 5.4.2 Constructing Error Correcting Codes (p. 136)
  • 5.4.3 Linear Codes (p. 137)
  • 5.4.4 Convolutional Codes (p. 141)
  • 5.4.5 Interleaving (p. 144)
  • 5.4.6 Combining Codes (p. 144)
  • 5.5 Comparison between Forward and Feedback Error Correction (ARQ) (p. 147)
  • 5.6 Local Area Networks (p. 148)
  • 5.6.1 LAN Configuration (p. 149)
  • 5.6.2 IEEE 802 LANs (p. 149)
  • 5.6.3 Device Addressing (p. 150)
  • 5.6.4 IEEE 802.3 (Ethernet) LAN (p. 152)
  • 5.6.5 High Speed Ethernet (p. 153)
  • 5.6.6 IEEE Token Ring LANs (p. 158)
  • 5.6.7 IEEE 802.11 Wireless LAN (p. 159)
  • 5.7 Connecting LANs (p. 160)
  • 5.7.1 Repeaters (p. 160)
  • 5.7.2 Bridges (p. 161)
  • 5.8 WAN Protocols (p. 163)
  • 5.8.1 SDH/SONET (p. 163)
  • 5.8.2 ATM (p. 164)
  • 5.9 Transporting IP over WANs (p. 172)
  • 5.9.1 Point-to-Point Protocol (p. 172)
  • 5.9.2 IP over SDH/SONET (p. 173)
  • 5.9.3 IP over ATM (p. 174)
  • 5.10 Metropolitan Area Networks (p. 174)
  • 5.10.1 Fibre Distributed Data Interface (p. 176)
  • 5.10.2 Distributed Queue Dual Bus (p. 179)
  • 5.11 Questions on the Link Perspective (p. 182)
  • 5.11.1 Questions on Linear Codes (p. 182)
  • 5.11.2 Questions on Convolutional Codes (p. 184)
  • 5.11.3 Questions on LANs and MANs (p. 185)
  • 6 The Channel Perspective (p. 186)
  • 6.1 Introduction (p. 186)
  • 6.2 Channel Capacity (p. 186)
  • 6.2.1 Discrete Memoryless Channel (p. 186)
  • 6.2.2 Capacity of a Discrete Memoryless Channel (p. 187)
  • 6.2.3 Channel Coding Theorem (p. 188)
  • 6.2.4 Analogue Channels--The Channel Capacity Theorem (p. 188)
  • 6.3 Transmission Media (p. 189)
  • 6.3.1 Wire (p. 189)
  • 6.3.2 Optical Fibre (p. 191)
  • 6.3.3 Radio (p. 193)
  • 6.3.4 Other Media (p. 198)
  • 6.4 Line Coding (p. 199)
  • 6.4.1 Binary Line Codes (p. 199)
  • 6.4.2 Multi-level Codes (p. 202)
  • 6.4.3 Scrambling (p. 203)
  • 6.4.4 Example Line Code Applications (p. 206)
  • 6.5 Modulation (p. 206)
  • 6.5.1 Introduction (p. 206)
  • 6.5.2 Multiple Access (p. 207)
  • 6.5.3 Digital Modulation (p. 210)
  • 6.6 Application Example: ADSL (p. 220)
  • 6.7 Questions on the Channel Perspective (p. 221)
  • 6.7.1 Questions on Channel Capacity (p. 221)
  • 7 Putting it all together (p. 223)
  • 7.1 Introduction (p. 223)
  • 7.2 GSM Mobile Phone System (p. 223)
  • 7.2.1 Transmission Media (p. 223)
  • 7.2.2 Line Coding and Modulation (p. 223)
  • 7.2.3 Medium Access Control (p. 224)
  • 7.2.4 Coding (p. 226)
  • 7.3 Voice over IP (VoIP) (p. 226)
  • 7.3.1 Requirements (p. 227)
  • 7.3.2 Error Control (p. 228)
  • 7.3.3 Transmission Protocol (p. 228)
  • 7.3.4 Architecture (p. 230)
  • 8 Answers to Exercises (p. 233)
  • 8.1 Answers to Questions on the User Perspective (p. 233)
  • 8.1.1 Answers to Questions on Information Theory (p. 233)
  • 8.1.2 Answers to Questions on Memoryless Source Coding (p. 237)
  • 8.1.3 Answers to Questions on Source Coding for Sources with Memory (p. 241)
  • 8.2 Answers to Questions on the Security Perspective (p. 242)
  • 8.3 Answers to Questions on the Network Perspective (p. 244)
  • 8.3.1 Answers to Questions on Network Configuration (p. 244)
  • 8.3.2 Answers to Questions on Switching Techniques (p. 245)
  • 8.3.3 Answers to Questions on Network Dimensioning (p. 246)
  • 8.3.4 Answers to Questions on Routing (p. 247)
  • 8.3.5 Answers to Questions on Error Control (p. 248)
  • 8.4 Answers to Questions on the Link Perspective (p. 251)
  • 8.4.1 Answers to Questions on Linear Codes (p. 251)
  • 8.4.2 Answers to Questions on Convolutional Codes (p. 256)
  • 8.5 Answers to Questions on the Channel Perspective (p. 261)
  • 8.5.1 Answers to Questions on Channel Capacity (p. 261)
  • Index (p. 263)

Author notes provided by Syndetics

James Irvine is the author of Data Communications and Networks: An Engineering Approach, published by Wiley. David Harle is the author of Data Communications and Networks: An Engineering Approach, published by Wiley.

Powered by Koha