Home > Store

Gigabit Networking

Register your product to gain access to bonus material or receive a coupon.

Gigabit Networking

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 1994
  • Dimensions: 7-3/8" x 9-1/4"
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-56333-9
  • ISBN-13: 978-0-201-56333-7

We are fast entering the age of gigabit networking, where information is passed along wide area and local area networks at speeds surpassing one billion bits per second. With improvements in fiber optic signalling and the development of inexpensive high-performance computers, both the capability and the demand for gigabit networking are here.

As a networking professional who needs to prepare for the immediate future of computer networking, you will find Gigabit Networking a fascinating and practical look at the advances that are making high-speed networking a reality. Key technologies, important protocols, applications, and the practical issues involved in implementing gigabit networks are all addressed. The book covers in detail such topics as:

  • Fiber optics (written for non-engineers)

  • Cell and non-cell networking, including Asynchronous Transfer Mode (ATM)

  • Exciting applications that utilize gigabit networking

  • Integrating gigabit networking into existing systems

  • Adapting today's protocols for gigabit networking

In addition to the current status of the technology, Gigabit Networking looks ahead to the ongoing research that will shape the future of gigabit networking.

This important book will bring you up to date on the state of gigabit networking, and will give you the knowledge you need to launch yourself into the age of truly high-speed networking.

"'Gigabit Networks by Craig Partridge is an excellent resource on networks performance issues and talks in detail about microkernal designs.' As you can see the reviewer referenced this book by Prentice Hall by mistake - there will be a correction in an upcoming issue."
-Unix Review

"The discussion on ATM cell networking, for instance, is excellent. Partridge (Gigabit Networking) clearly has a good grasp of this subject (and I hope he'll write more on ATMs in the future.)"
-Dr. Dobb's Developer Update

"I would recommend this book (Gigabit Networking) to everybody who is interested in computer networks."
-Computing Reviews



0201563339B04062001

Sample Content

Table of Contents

(All chapters, except Chapters 1, 15 and 16, conclude with a Summary.)

Preface.


1. An Introduction to Gigabit Networking.

Change in the Wind.

What is Changing?

Rules of the Road.

What Follows this Chapter.



2. Fiber Optics.

Introduction.

Essentials of Fiber Optics.

Transmitters and Receivers.

An Example of Fiber Optic Signalling: SONET.

Another Example: WDM Networks.

Other Media.



3. An Introduction to Cell Networking.

Introduction.

What Is a Cell?

Fragmenting Data into Cells.

Why Cells?

Cell Routing.

Adaptation Layer Protocols.

Cell Error Recovery.



4. Asynchronous Transfer Mode.

Introduction.

ATM Inside the Telephone Networks.

ATM Conceptual Model.

ATM Cell Format.

ATM Cell Header at the NNI.

ATM at the User-Network Interface.

Adaptation Layers.

Signalling an ATM Connection.

Putting the ATM Bits on the Wire.

Issues in ATM.



5. Wide Area Cell Networking.

Introduction.

Blocking.

The Canonical Cell Switch.

Buffering Strategies.

Crossbar Switches.

Batcher-Banyan Switches.

Input Buffering Revisited.

An Optical Cell Switch.

The Cost of Port Controllers.



6. Local Area Cell Networks.

Introduction.

Shared Media Cell Networks.

Local Area Switching Technologies.



7. Gigabit Packet Networks.

Issues in Packet Network Design.

Local Area Packet Technologies.

Wide Area Packet Technologies.



8. Gigabit Applications.

Introduction.

Classic Applications.

New Applications.

New Computing Applications.

Applications with Humans in the Loop.

The Impact of New Applications.



9. Making Hosts Ready for Gigabit Networks.

Introduction.

The Model Machine.

The Costs of Moving Data.

Reducing Memory Copy Costs.

Other Processor-Memory Interactions.

Multiprocessor Architectures.

What about Cells?

A Summary of System Performance Issues.

Support for Real-Time Applications.



10. Today’s Internetworking Protocols.

Internetworking.

Gigabit Speeds and Today’s Protocols.

Architecture of TCP/IP.

Techniques for Going Fast.

Limitations of Today’s Protocols.

Converging on the Shape of Gigabit Protocols.



11. Traffic Shaping.

Introduction.

Why Shape Traffic?

Isochronous Shaping.

Isochronous Shaping with Priority Schemes.

Shaping Bursty Traffic Patterns.



12. Performance Guarantees.

Introduction.

Terminology and Issues.

Statistical Multiplexing.

Weighted Fair Queueing.

Jitter Control Schemes.

Statistical Multiplexing Revisited.



13. Flow Setup and Routing.

Remaining Problems.

The Host’s Role in Flow Setup.

Protocols to Establish a Flow.

Routing.



14. Distributed Systems.

Introduction.

Distributed Systems Today.

Alternative Approaches to Distributed Systems.

Enhancing Distributed Services.

Authentication.



15. The State of Gigabit Networking.

Introduction.

Putting the Pieces Together.

Lingering Problems.

Unaddressed Problems.

After Gigabits, Terabits?

Final Thoughts.



16. Where to Learn More.

Introduction.

Testbeds and Research Programs.

Conferences and Journals.

Getting Items in the Bibliography.



Bibliography.


Index. 0201563339T04062001

Preface

Computing environments keep improving. Most improvements are incremental, changes such as a 50% increase in CPU speed or a doubling of memory capacity in a chip. Every so often the accumulated changes become large enough to transform some part of computer science. More powerful processors made it possible to share the CPU among several users, leading to multiprocessing operating systems like UNIX and MVS. The advent of timesharing transformed the study of operating systems. The advent of high-quality graphics has led to WYSIWYG interfaces.

Computer networking is undergoing such a transformation. The widespread use of optical fiber to transmit data has made tremendous increases in network bandwidth possible. Furthermore, greater CPU power, increasing disk capacity, and support for digital audio and video are creating demand for a new class of network services, which are not supported by today's networking protocols. The result of these trends is a world I occasionally describe as the gigabit environment, a computing milieu in which most or all of the components of a computer system are processing, storing, displaying, or moving data at speeds exceeding 1 gigabit per second. Although the gigabit environment does not yet quite exist (except, perhaps, at some supercomputer centers), it is fast approaching.

This book examines a critical part of the gigabit environment: the gigabit per second computer networks that make it possible to share vast quantities of data among many computer systems.

Since the mid-1980s considerable work has been done on designing, developing, and studying networks capable of transmitting data at gigabit per second rates, and by now much of this work has produced tangible results: prototype networks, proposed protocol architectures, influential studies identifying key research issues, and most important, increased industry and government funding for the construction and study of major research testbeds.

This book is based on that research and presents gigabit networking as we now know it. Key technologies, important protocols and applications, and where research is still incomplete, important unsolved issues are all presented. The goal is to give the reader a sturdy understanding of an important emerging field.

Who This Book Is For

The author expects the reader to have at least a nodding acquaintance with networking and computing, although the early chapters review essential topics. Beyond this prerequisite, the text is written to strike a balance between the needs of technical and academic readers and less-technical readers interested in getting a grasp of the field. When feasible, technical issues are introduced using nontechnical terms and analogies, before delving into more detailed technical discussions. As a result, my hope is that this book will be useful to almost anyone interested in the topic of gigabit networks.

The author of any survey has to be selective about what material is presented. Inevitably, the result is a book that becomes one person's perspective on the field rather than a complete survey. But I have worked hard to try to make sure that this survey presents as broad a range of work as possible, given constraints on reasonable book length and time and resources to search out new work.

At the same time, I believe that anyone who takes the time to write a survey of a field should also give the reader some opinions about the strengths and limitations of the topics discussed in the survey. A survey without such a perspective is little better than a list of facts. So, scattered through the book are thoughts about important issues. I do not expect the reader to always agree with me.

Using This Book as a Textbook

This book was designed as a professional reference, but because much of its structure is based on a course I have taught for the INTEROP conference for a number of years, it can be used as a textbook, for a graduate course on gigabit networking, or as a supplemental text for an undergraduate course in networking.

Because this text assumes a background in networking and focuses solely on gigabit networking, it is not sufficient as a stand-alone text for an undergraduate course. However, several chapters can serve as supplements to an existing text such as Tanenbaum's Computer Networks, Comer's Internetworking with TCP/IP, or Spragin's Telecommunications. Chapter 2 provides a useful tutorial on fiber optic networking. Chapters 5, 6, and 7 describe a number of high-speed networking technologies; and Chapters 9 and 10 may provide a useful perspective on protocol performance when studying the internetwork and transport layers. A study of flow control can be supplemented by Chapters 11, 12, and 13, which describe the difficult problems of performance guarantees.

For a graduate course on data networking, this book provides an introduction to a number of the key research issues in data networking and thus could serve as a useful textbook, perhaps supplemented by selected readings from the research literature.

Acknowledgements

As I wrote this book, I often became acutely aware that I knew less about gigabit networking than I had first thought. The field is exploding with new and interesting work. To help me fill gaps in my knowledge and improve the presentation of various topics, I've been able to lean on a number of people. Much of what is good in this book is due to their help. (All of what may be deemed bad about this book should be viewed as solely my fault.) I've tried to credit all those who helped, although I've no doubt missed a few.

Julio Escobar and Zygmunt Haas provided extensive comments on Chapter 2 that saved me from making a number of embarrassing mistakes. Chris Wilcox helped me better understand SONET. Bob Braudes, John Burruss, Norman Chang, Bruce Davie, Ole Jacobson, Joe Pagan, Steve Pink, Howard Salwen, and Jonathan Smith provided insightful comments on a number of chapters. Early in the writing of the book, both Dave Crocker and Brian Kernighan helped me work out a better presentation style in early drafts of Chapters 3 through 5, which helped immeasurably with later chapters. Simone Payment and Marty Rabinowitz of Addison-Wesley helped me with various issues of tasteful formatting.

A number of people provided advance copies of papers or reviewed pieces of the manuscript related to their work for accuracy. For their help, I'd like to thank David Anderson, Abhaya Asthana, Dave Banks, DickBinder, Dave Borman, Charlie Catlett, Chris Cooper, Jon Crowcroft, Deborah Estrin, Greg Finn, Ed Foudriat, Sandy Fraser, Victor Frost, Mark Garrett, Rafael Gidron, Rich Gitlin, Bryan Gorman, David Greaves, Roch Guerin, Gerard Holzmann, Jim Hughes, Van Jacobson, Bob Kahn, Chuck Kalmanek, Jim Kurose, Larry Landweber, Will Leland, Paul Messina, Dave Mills, Biswanath Mukherjee, Joe Pasquale, John Renwick, Paul Rupert, TimSalo, Chuck Seitz, Dave Sincoskie, Dan Stevenson, Dave Tennenhouse, and Lixia Zhang. Also thanks to Lawrence S. Brakmo for the data used to generate the slow-start graph in Chapter 10, and Mark Garrett for the data for the MPEG graph in Chapter 8.

I also want to thank the folks who got me into writing this book in the first place and helped me through the process. Dan Lynch all but dared me to put together a course on gigabit networking for INTEROP 1990. Experience with that course and interaction with the hundreds of students who have taken it to date have helped shape this book. I met John Wait of Addison-Wesley when we were both stuck in the Houston airport by a snowstorm in 1987, and he and his team (Kim Dawley, Kathleen Duff, and Kathleen Habib) have since waited patiently for me to produce a book on networking. Brian Kernighan's help, both as series editor and in his comments on several drafts of this book, was immensely helpful. Thanks also to my employer, Bolt Beranek and Newman, for allowing me to undertake this work, and to the Swedish Institute of Computer Science, where I spent a very productive sabbatical year. Finally, thanks to my wife, Carolyn, who had to put up with losing her husband on many weekends and evenings as I pounded away at the keyboard.

Palo Alto, August 1993



0201563339P04062001

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020