Student Center | Instructor Center | Information Center | Home
Communication Networks, 2/e
Information Center
Sample Chapter
Table of Contents
About the Authors
Book Preface
Overview
What's New
Feature Summary
McGraw-Hill Engine...

Feedback
Help Center




What's New

Changes from the First Edition
The second edition contains the following changes from the first edition:
    • The material in the text has been rearranged so that optional sections can be skipped without a disruption in the topic flow. The sections that contain optional material are still indicated by a diamond in the heading. The optional sections that contain detailed mathematics are now indicated by a sidebar.
    • Note I’ve placed info about text rearrangement first. For the second bullet highlight virtual lab (just a one sentence statement since you’ll discuss in the next section)
    • The introduction in Chapter 1 has been simplified by reducing the number of concepts introduced in the discussion of network evolution.
    • The introduction of the notion of layering has been improved by elaborating on the interaction between the application layer and transport layer protocols and by simplifying the discussion on the OSI reference model. The introduction of a network analyzer to provide real-world examples enables the student to immediately observe how the layers work together.
    • The discussion of PCM speech coding has been moved from Chapter 12 to Chapter 3.
    • Chapter 4 provides more detail on SONET and optical transport networks. Satellite cellular networks have been dropped.
    • Chapter 5 now consists of two parts to separate the initial focus of the first part, peer-to-peer protocols, from the focus of the second part, data link layer protocols. There is now a new separate section on framing techniques.
    • Chapter 6 has also been divided into a section on medium access control in general (Part 1), and the application of medium access controls in LANs (Part 2). We have attempted to concentrate the detailed mathematical discussion of medium access control to the last section in the chapter.
    • In Chapter 7 we have streamlined the discussion of packet networks, and we have clearly separated the more advanced discussion of traffic management mechanisms.
    • The main change in Chapter 8 is the extensive use of packet capture examples to illustrate the operation of TCP/IP protocols.
    • The chapter on advanced network architectures has been revised extensively. The discussion of ATM over IP has been replaced by a discussion of the overlay and peer models to network interconnection. The chapter now contains discussion on virtual networks, and GMPLS. The material on RTP and SIP has been moved from Chapter 12 to this chapter.
    • Chapter 11 has been updated with brief discussions of the Advanced Encryption Standard and of 802.11 security.