Mathematical Foundations of Computer Networking / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $70.78
Usually ships in 1-2 business days
(Save 16%)
Other sellers (Paperback)
  • All (2) from $70.78   
  • New (2) from $70.78   


“To design future networks that are worthy of society’s trust, we must put the ‘discipline’ of computer networking on a much stronger foundation. This book rises above the considerable minutiae of today’s networking technologies to emphasize the long-standing mathematical underpinnings of the field.”

–Professor Jennifer Rexford, Department of Computer Science, Princeton University

“This book is exactly the one I have been waiting for the last couple of years. Recently, I decided most students were already very familiar with the way the net works but were not being taught the fundamentalsthe math. This book contains the knowledge for people who will create and understand future communications systems."

–Professor Jon Crowcroft, The Computer Laboratory, University of Cambridge

The Essential Mathematical Principles Required to Design, Implement, or Evaluate Advanced Computer Networks

Students, researchers, and professionals in computer networking require a firm conceptual understanding of its foundations. Mathematical Foundations of Computer Networking provides an intuitive yet rigorous introduction to these essential mathematical principles and techniques.

Assuming a basic grasp of calculus, this book offers sufficient detail to serve as the only reference many readers will need. Each concept is described in four ways: intuitively; using appropriate mathematical notation; with a numerical example carefully chosen for its relevance to networking; and with a numerical exercise for the reader.

The first part of the text presents basic concepts, and the second part introduces four theories in a progression that has been designed to gradually deepen readers’ understanding. Within each part, chapters are as self-contained as possible.

The first part covers probability; statistics; linear algebra; optimization; and signals, systems, and transforms. Topics range from Bayesian networks to hypothesis testing, and eigenvalue computation to Fourier transforms.

These preliminary chapters establish a basis for the four theories covered in the second part of the book: queueing theory, game theory, control theory, and information theory. The second part also demonstrates how mathematical concepts can be applied to issues such as contention for limited resources, and the optimization of network responsiveness, stability, and throughput.

Read More Show Less

Product Details

  • ISBN-13: 9780321792105
  • Publisher: Addison-Wesley
  • Publication date: 4/29/2012
  • Series: Addison-Wesley Professional Computing Series
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 496
  • Sales rank: 1,428,836
  • Product dimensions: 6.80 (w) x 9.00 (h) x 1.10 (d)

Meet the Author

Srinivasan Keshav is a Professor and a Canada Research Chair at the David R. Cheriton School of Computer Science, University of Waterloo, Ontario, Canada.

Read More Show Less

Table of Contents

Preface xv

Chapter 1: Probability 1

1.1 Introduction 1

1.2 Joint and Conditional Probability 7

1.3 Random Variables 14

1.4 Moments and Moment Generating Functions 21

1.5 Standard Discrete Distributions 25

1.6 Standard Continuous Distributions 29

1.7 Useful Theorems 35

1.8 Jointly Distributed Random Variables 42

1.8.1 Bayesian Networks 44

1.9 Further Reading 47

1.10 Exercises 47

Chapter 2: Statistics 53

2.1 Sampling a Population 53

2.2 Describing a Sample Parsimoniously 57

2.3 Inferring Population Parameters from Sample Parameters 66

2.4 Testing Hypotheses about Outcomes of Experiments 70

2.5 Independence and Dependence: Regression and Correlation 86

2.6 Comparing Multiple Outcomes Simultaneously: Analysis of Variance 95

2.7 Design of Experiments 99

2.8 Dealing with Large Data Sets 100

2.9 Common Mistakes in Statistical Analysis 103

2.10 Further Reading 105

2.11 Exercises 105

Chapter 3: Linear Algebra 109

3.1 Vectors and Matrices 109

3.2 Vector and Matrix Algebra 111

3.3 Linear Combinations, Independence, Basis, and Dimension 114

3.4 Using Matrix Algebra to Solve Linear Equations 117

3.5 Linear Transformations, Eigenvalues, and Eigenvectors 125

3.6 Stochastic Matrices 138

3.7 Exercises 143

Chapter 4: Optimization 147

4.1 System Modeling and Optimization 147

4.2 Introduction to Optimization 149

4.3 Optimizing Linear Systems 152

4.4 Integer Linear Programming 157

4.5 Dynamic Programming 162

4.6 Nonlinear Constrained Optimization 164

4.7 Heuristic Nonlinear Optimization 167

4.8 Exercises 170

Chapter 5: Signals, Systems, and Transforms 173

5.1 Background 173

5.2 Signals 185

5.3 Systems 188

5.4 Analysis of a Linear Time-Invariant System 189

5.5 Transforms 195

5.6 The Fourier Series 196

5.7 The Fourier Transform and Its Properties 200

5.8 The Laplace Transform 209

5.9 The Discrete Fourier Transform and Fast Fourier Transform 216

5.10 The Z Transform 226

5.11 Further Reading 233

5.12 Exercises 234

Chapter 6: Stochastic Processes and Queueing Theory 237

6.1 Overview 237

6.2 Stochastic Processes 240

6.3 Continuous-Time Markov Chains 252

6.4 Birth-Death Processes 255

6.5 The M/M/1 Queue 262

6.6 Two Variations on the M/M/1 Queue 266

6.7 Other Queueing Systems 270

6.8 Further Reading 272

6.9 Exercises 272

Chapter 7: Game Theory 277

7.1 Concepts and Terminology 278

7.2 Solving a Game 291

7.3 Mechanism Design 301

7.4 Limitations of Game Theory 314

7.5 Further Reading 315

7.6 Exercises 316

Chapter 8: Elements of Control Theory 319

8.1 Overview of a Controlled System 320

8.2 Modeling a System 323

8.3 A First-Order System 329

8.4 A Second-Order System 331

8.5 Basics of Feedback Control 336

8.6 PID Control 341

8.7 Advanced Control Concepts 346

8.8 Stability 350

8.9 State Space–Based Modeling and Control 360

8.10 Digital Control 364

8.11 Partial Fraction Expansion 367

8.12 Further Reading 370

8.13 Exercises 370

Chapter 9: Information Theory 373

9.1 Introduction 373

9.2 A Mathematical Model for Communication 374

9.3 From Messages to Symbols 378

9.4 Source Coding 379

9.5 The Capacity of a Communication Channel 386

9.6 The Gaussian Channel 399

9.7 Further Reading 407

9.8 Exercises 407

Solutions to Exercises 411

Index 457

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted May 31, 2012

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)