Show Less

Computer Networks, the Internet and Next Generation Networks

A Protocol-based and Architecture-based Perspective


Thi-Thanh-Mai Hoang

Most computer network books are described based on a top-down or button-up layer-based perspective – allowing readers to learn about concepts and protocols in one layer as a part of a complex system. At each layer, the books illustrated the mechanisms and protocols provided at this layer to its upper layer. Unlike other computer network books, this book additionally provides protocol-based and architecture-based perspective to study the computer networks, the Internet and Next Generation Networks. The book starts with a short introduction to the computer network and their design – covering the basic reference models, the multimedia networking, Next Generation Networking and Mobile Networking as well as network planning considerations. Fundamental techniques are described – covering mechanisms, protocols, architectures and services to control the traffic and ensure the QoS for data and multimedia applications. For each technique, the author formulates the problem statement and illustrates complete solution – including basic idea, concept, architecture, protocol behaviour, their advantages and disadvantages.


Show Summary Details
Restricted access



[AA-2006] L. Andersson, E. Rosen. Framework for Layer 2 Virtual Private Networks (L2VPNs). RFC 4664, September 2006. [AAB-2000a] E. Altman, K. Avrachenkov, C. Barakat. A Stochastic Model of TCP/IP with Stationary Random Losses. Proceedings of ACM SIGCOMM, August 2000. [AAB-2000b] E. Altman, K. Avrachenkov, C. Barakat. TCP in presence of bursty losses. Performance Evaluation Nr. 42, pages 129-147, 2000. [ACE-2002] D. Awduche, A. Chiu, A. Elwalid, I. Widjaja and X. Xiao. Overview and Principles of Internet Traffic Engineering. RFC 3272, May 2002. [AF-2003] Ayyorgun S. and W. Feng. A probalistic definition of burstiness characterization. Technical Report LA-UR 03-3668, Los Alamos National Laboratory, 2003. [AFM-1992] Armstrong, Freier and Cornell. „Multicast Transport Protocol“, RFC 1301, Feb. 1992. [AK-2005] K. Ahmad and R. Kapoor. The NGN Handbook. Cisco System, 2005. [AL-2005] F. Adrangi, H. Levkowetz. Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways. RFC 4093, August 2005. [AM-2005] L. Andersson and T. Madsen. Provider Provisioned Virtual Private Network (VPN) Terminology. RFC 4026, March 2005. [ANS-2005] A. Adams, J. Nicholas and W. Siadak. Protocol Independent Multicast – Dense Mode (PIM-DM): Protocol Specification. RFC 3973, January 2005. [Arm-2000] G. Armitage. Quality of Service in IP Networks. Macmillan Technical Publishing. 2000. [APS-1999] M. Allman, V. Paxson, and W. Stevens, “TCP Congestion Control”, RFC 2581, IETF, April 1999 [AS-2006] W. Augustyn, Y. Serbest. Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks. RFC 4665, September 2006. [APS-1999] M. Allman, V. Paxson and W. Stevens. TCP Congestion Control. RFC 2581, April 1999. 381 [AWK-1999] G. Apostolopoulos,...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.