Home > Store

Computer and Communication Networks, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Computer and Communication Networks, 2nd Edition


  • Sorry, this book is no longer in print.
Not for Sale



  • Presents up-to-date and complete coverage of both the basics and advanced topics
  • Covers TCP/IP, wireless, Internet, VoIP, network security, and much more
  • Fully addresses key topics competitive books merely summarize, such as multicasting and optical networking
  • The first book of its kind to thoroughly explain both Software Defined Networking and Information-Centric Networking
  • Introduces both mathematical analysis techniques and advanced protocols
  • Teaches key principles with examples drawn from real-world network and protocol design


  • Copyright 2015
  • Dimensions: 7" x 9-1/8"
  • Edition: 2nd
  • Book
  • ISBN-10: 0-13-381474-2
  • ISBN-13: 978-0-13-381474-3

Computer and Communication Networks, Second Edition, explains the modern technologies of networking and communications, preparing you to analyze and simulate complex networks, and to design cost-effective networks for emerging requirements. Offering uniquely balanced coverage of basic and advanced topics, it teaches through case studies, realistic examples and exercises, and intuitive illustrations.

Nader F. Mir establishes a solid foundation in basic networking concepts; TCP/IP schemes; wireless and LTE networks; Internet applications, such as Web and e-mail; and network security. Then, he delves into both network analysis and advanced networking protocols, VoIP, cloud-based multimedia networking, SDN, and virtualized networks.

In this new edition, Mir provides updated, practical, scenario-based information that many networking books lack, offering a uniquely effective blend of theory and implementation. Drawing on extensive field experience, he presents many contemporary applications and covers key topics that other texts overlook, including P2P and voice/video networking, SDN, information-centric networking, and modern router/switch design.

Students, researchers, and networking professionals will find up-to-date, thorough coverage of

  • Packet switching
  • Internet protocols (including IPv6)
  • Networking devices
  • Links and link interfaces
  • LANs, WANs, and Internetworking
  • Multicast routing, and protocols
  • Wide area wireless networks and LTE
  • Transport and end-to-end protocols
  • Network applications and management
  • Network security
  • Network queues and delay analysis
  • Advanced router/switch architecture
  • QoS and scheduling
  • Tunneling, VPNs, and MPLS
  • All-optical networks, WDM, and GMPLS
  • Cloud computing and network virtualization
  • Software defined networking (SDN)
  • VoIP signaling
  • Media exchange and voice/video compression
  • Distributed/cloud-based multimedia networks
  • Mobile ad hoc networks
  • Wireless sensor networks

Key features include

  • More than three hundred fifty figures that simplify complex topics
  • Numerous algorithms that summarize key networking protocols and equations
  • Up-to-date case studies illuminating concepts and theory
  • Approximately four hundred exercises and examples honed over Mir’s twenty years of teaching networking

Sample Content

Online Sample Chapter

Introduction to Packet-Switched Networks

Sample Pages

Download the sample pages (includes Chapter 1 and Index)

Table of Contents

Preface xxiii

About the Author xxxvii

Part I: Fundamental Concepts 1

Chapter 1: Packet-Switched Networks 3

1.1 Basic Definitions in Networks 4

1.2 Types of Packet-Switched Networks 11

1.3 Packet Size and Optimizations 15

1.4 Foundation of Networking Protocols 17

1.5 Addressing Scheme in the Internet 21

1.6 Equal-Sized Packets Model 28

1.7 Summary 28

1.8 Exercises 29

1.9 Computer Simulation Project 34

Chapter 2: Overview of Networking Devices 37

2.1 Network Interface Cards (NICs) 39

2.2 Switching and Routing Devices 40

2.3 Wireless Switching and Routing Devices 47

2.4 Modems 50

2.5 Multiplexers 58

2.6 Summary 66

2.7 Exercises 67

2.8 Computer Simulation Project 69

Chapter 3: Data Links and Link Interfaces 71

3.1 Data Links 72

3.2 Link Encoder 75

3.3 Error Detection and Correction on Links 77

3.4 Flow Control on Links 85

3.5 Link Access by Multiple Users 92

3.6 Wireless Channel Access by Multiple Users 97

3.7 Link Aggregation 107

3.8 Summary 109

3.9 Exercises 110

3.10 Computer Simulation Project 114

Chapter 4: Local Area Networks and Networks of LANs 115

4.1 LANs and Basic Topologies 116

4.2 LAN Protocols 117

4.3 Networks of LANs 121

4.4 MAC/IP Address Conversion Protocols 130

4.5 Spanning-Tree Protocol (STP) 133

4.6 Virtual LANs (VLANs) 136

4.7 Wireless LANs 139

4.8 IEEE 802.11 Wireless LAN Standard 142

4.9 Case Study: DOCSIS, a Cable TV Protocol 151

4.10 Summary 152

4.11 Exercises 153

4.12 Computer Simulation Project 157

Chapter 5: Wide-Area Routing and Internetworking 159

5.1 IP Packets and Basic Routing Policies 160

5.2 Path Selection Algorithms 173

5.3 Intradomain Routing Protocols 178

5.4 Interdomain Routing Protocols 188

5.5 Internet Protocol Version 6 (IPv6) 196

5.6 Congestion Control at the Network Layer 199

5.7 Summary 207

5.8 Exercises 209

5.9 Computer Simulation Project 213

Chapter 6: Multicast Routing and Protocols 215

6.1 Basic Definitions and Techniques 216

6.2 Local and Membership Multicast Protocols 221

6.3 Intradomain Multicast Protocols 223

6.4 Interdomain Multicast Protocols 231

6.5 Summary 237

6.6 Exercises 238

6.7 Computer Simulation Project 241

Chapter 7: Wireless Wide Area Networks and LTE Technology 243

7.1 Infrastructure of Wireless Networks 244

7.2 Cellular Networks 246

7.3 Mobile IP Management in Cellular Networks 259

7.4 Long-Term Evolution (LTE) Technology 268

7.5 Wireless Mesh Networks (WMNs) with LTE 277

7.6 Characterization of Wireless Channels 280

7.7 Summary 285

7.8 Exercises 286

7.9 Computer Simulation Project 288

Chapter 8: Transport and End-to-End Protocols 289

8.1 Overview of the Transport Layer 290

8.2 User Datagram Protocol (UDP) 295

8.3 Transmission Control Protocol (TCP) 298

8.4 Mobile Transport Protocols 307

8.5 TCP Congestion Control 309

8.6 Summary 315

8.7 Exercises 316

8.8 Computer Simulation Project 319

Chapter 9: Basic Network Applications and Management 321

9.1 Overview of the Application Layer 322

9.2 Domain Name System (DNS) 325

9.3 Electronic Mail (E-Mail) 330

9.4 World Wide Web (WWW) 335

9.5 Remote Login Protocols 342

9.6 File Transfer and FTP 346

9.7 Peer-to-Peer (P2P) Networking 347

9.8 Network Management 356

9.9 Summary 362

9.10 Exercises 363

9.11 Computer Simulation Projects 366

Chapter 10: Network Security 369

10.1 Overview of Network Security 370

10.2 Security Methods 375

10.3 Symmetric-Key Cryptography 377

10.4 Public-Key Cryptography 380

10.5 Authentication 383

10.6 Digital Signatures 387

10.7 Security of IP and Wireless Networks 387

10.8 Firewalls and Packet Filtering 391

10.9 Summary 396

10.10 Exercises 397

10.11 Computer Simulation Project 399

Part II: Advanced Concepts 401

Chapter 11: Network Queues and Delay Analysis 403

11.1 Little’s Theorem 404

11.2 Birth-and-Death Process 406

11.3 Queueing Disciplines 408

11.4 Markovian FIFO Queueing Systems 409

11.5 Non-Markovian and Self-Similar Models 424

11.6 Networks of Queues 428

11.7 Summary 437

11.8 Exercises 438

11.9 Computer Simulation Project 444

Chapter 12: Advanced Router and Switch Architectures 445

12.1 Overview of Router Architecture 446

12.2 Input Port Processor (IPP) 447

12.3 Output Port Processor (OPP) 453

12.4 Central Controller 454

12.5 Switch Fabric 457

12.6 Multicasting Packets in Routers 475

12.7 Summary 480

12.8 Exercises 481

12.9 Computer Simulation Project 484

Chapter 13: Quality of Service and Scheduling in Routers 485

13.1 Overview of Quality of Service (QoS) 486

13.2 Integrated Services QoS 486

13.3 Differentiated Services QoS 495

13.4 Resource Allocation 497

13.5 Packet Scheduling 501

13.6 Summary 512

13.7 Exercises 513

13.8 Computer Simulation Project 517

Chapter 14: Tunneling, VPNs, and MPLS Networks 519

14.1 Tunneling 520

14.2 Virtual Private Networks (VPNs) 524

14.3 Multiprotocol Label Switching (MPLS) 528

14.4 Summary 540

14.5 Exercises 540

14.6 Computer Simulation Project 543

Chapter 15: All-Optical Networks, WDM, and GMPLS 545

15.1 Overview of Optical Networks 546

15.2 Basic Optical Networking Devices 553

15.3 Large-Scale Optical Switches 558

15.4 Structure of Optical Cross Connects (OXCs) 560

15.5 Routing in All-Optical Networks 563

15.6 Wavelength Allocation in Networks 567

15.7 Case Study: An All-Optical Switch 569

15.8 Summary 572

15.9 Exercises 573

15.10 Computer Simulation Project 575

Chapter 16: Cloud Computing and Network Virtualization 577

16.1 Cloud Computing and Data Centers 578

16.2 Data Center Networks (DCNs) 588

16.3 Network Virtualization 595

16.3.1 Network Virtualization Components 596

16.4 Overlay Networks 600

16.5 Summary 601

16.6 Exercises 602

16.7 Computer Simulation Projects 605

Chapter 17: Software-Defined Networking (SDN) and Beyond 607

17.1 Software-Defined Networking (SDN) 608

17.2 SDN-Based Network Model 613

17.3 Small-Size SDN Architectures 620

17.4 SDN Architectures for Clouds 621

17.5 Network Functions Virtualization (NFV) 623

17.6 Information-Centric Networking (ICN) 627

17.7 Network Emulators for Advanced Networks 632

17.8 Summary 635

17.9 Exercises 636

17.10 Computer Simulation Projects 638

Chapter 18: Voice over IP (VoIP) Signaling 641

18.1 Public Switched Telephone Networks (PSTN) 642

18.2 Overview of Voice over IP (VoIP) 649

18.3 H.323 Protocol 652

18.4 Session Initiation Protocol (SIP) 666

18.5 Softswitch Methods and MGCP 678

18.6 VoIP and Multimedia Internetworking 679

18.7 Summary 684

18.8 Exercises 685

18.9 Computer Simulation Projects 689

Chapter 19: Media Exchange and Voice/Video Compression 693

19.1 Overview of Data Compression 694

19.2 Digital Voice and Compression 695

19.3 Still Images and JPEG Compression 701

19.4 Moving Images and MPEG Compression 707

19.5 Compression Methods with Loss 709

19.6 Compression Methods without Loss 713

19.7 Scanned Document Compression 717

19.8 Summary 718

19.9 Exercises 719

19.10 Computer Simulation Project 724

Chapter 20: Distributed and Cloud-Based Multimedia Networking 725

20.1 Real-Time Media Exchange Protocols 726

20.2 Distributed Multimedia Networking 741

20.3 Cloud-Based Multimedia Networking 751

20.4 Self-Similarity and Non-Markovian Streaming 756

20.5 Summary 759

20.6 Exercises 761

20.7 Computer Simulation Project 764

Chapter 21: Mobile Ad-Hoc Networks 765

21.1 Overview of Wireless Ad-Hoc Networks 766

21.2 Routing in Ad-Hoc Networks 767

21.3 Routing Protocols for Ad-Hoc Networks 769

21.4 Security of Ad-Hoc Networks 783

21.5 Summary 785

21.6 Exercises 786

21.7 Computer Simulation Projects 787

Chapter 22: Wireless Sensor Networks 789

22.1 Sensor Networks and Protocol Structures 790

22.2 Communication Energy Model 794

22.3 Clustering Protocols 799

22.4 Routing Protocols 805

22.5 Other Related Technologies 811

22.6 Case Study: Simulation of a Sensor Network 812

22.7 Summary 814

22.8 Exercises 815

22.9 Computer Simulation Projects 815

Appendix A: Glossary of Acronyms 817

Appendix B: RFCs 823

Appendix C: Probabilities and Stochastic Processes 827

C.1 Probability Theory 827

C.2 Random Variables 828

C.3 Multiple Random Variables 832

C.4 Stochastic (Random) Processes 834

C.5 Theory of Markov Chains 835

C.5.1 Continuous-Time Markov Chains 835

Appendix D: Erlang-B Blocking Probability Table 837


Index 841


Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020