图书介绍

数据通信与网络教程 英文版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

数据通信与网络教程 英文版
  • (美)William A.Shay著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111108396
  • 出版时间:2003
  • 标注页数:711页
  • 文件大小:34MB
  • 文件页数:728页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

数据通信与网络教程 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 INTRODUCTION TO COMMUNICATIONS,STANDARDS,AND PROTOCOLS1

1.1 VVHY STUDY COMMUNICATIONS?1

A Brief History1

Applications3

Issues6

1.2 COMPUTER NETWORKS7

Common Bus Topology9

StarTopology10

Ring Topology11

Fully Connected Topology12

Combined Topologies13

1.3 STANDARDS AND STANDARDS ORGANIZATIONS14

The Need for Standards14

Agencies15

1.4 OPEN SYSTEMS AND THE OSI MODEL17

Overview of the Model20

Physical Layer23

Data Link Layer28

Network Layer30

Transport Layer32

Session Layer38

Presentation Layer42

Application Layer45

Summary46

1.5 THE FUTURE OF DATA COMMUNICATIONS47

REVIEW QUESTIONS51

EXERCISES53

REFERENCES54

CHAPTER 2 TRANSMISSION FUNDAMENTALS56

2.1 COMMUNICATIONS MEDIA57

Conductive Metal59

Optical Fiber62

Wireless Communications66

Summary81

Telephone System83

2.2 COMMUNICATION SERVICES AND DEVICES83

Integrated Services Digital Network87

Cellular Phones88

FaX Machines90

2.3 CODES92

ASCII Code93

EBCDIC Code94

Baudot,Morse,and BCD Codes97

2.4 ANALOG AND DIGITAL SIGNALS101

Digital Encoding Schemes102

Analog Signals105

Bit Rate110

2.5 MODULATION AND DEMODULATION115

Digital-to-Analog Conversion116

Analog-to-Digital Conversion121

2.6 MODEMS AND MODEM STANDARDS124

Signal Constellation126

Intelligent(Hayes Compatible)Modems130

Cable Modems131

NulI Modems135

2.7 SUMMARY135

REVIEW QUESTIONS137

EXERCISES139

REFERENCES143

CHAPTER 3 DATA COMMUNICATION145

Serial and Parallel Transmission146

3.1 TRANSMISSION MODES146

Asynchronous and Synchronous Transmission147

Simplex,Half-Duplex,and Full-Duplex Communications150

3.2 INTERFACE STANDARDS151

RS-232 Interface152

RS-232 Subsets155

Null Modems156

RS-449 Interface157

X.21 Interface159

3.3 MULTIPLEXING161

Frequency-Division Multiplexing163

Time-Division Multiplexing165

Statistical Multiplexers167

T-l Carrier169

3.4 CONTENTION PROTOCOLS172

Aloha Protocols174

Carrier Sense Multiple Access177

Collision Detection180

Token Passing183

Summary of Protocols187

3.5 DATA COMPRESSION188

Huffman Code189

Run-Length Encoding192

Relative Encoding194

Lempel-Ziv Encoding195

Image Compression201

JPEG203

MPEG211

Summary of Compression Techniques216

3.6 SUMMARY217

REVIEW QUESTIONS218

EXERCISES220

REFERENCES224

CHAPTER 4 DATA SECURITY AND INTEGRITY226

4.1 I NTRODUCTION226

Parity Checking Analysis228

4.2 PARITY CHECKING228

Double-Bit Error Detection229

Burst Error Detection229

4.3 CYCLIC REDUNDANCY CHECKS231

Polynomial Division232

How CRC Works233

Analysis of CRC235

CRC Implementation Using Circular Shifts239

Single-Bit Error Correction241

4.4 HAMMING CODES241

Multiple-Bit Error Correction244

Comparison of Error Detection and Error Correction244

4.5 ENCRYPTION AND DECRYPTION245

Caesar Cipher247

Polyalphabetic Cipher248

Transposition Cipher250

Bit-Level Ciphering251

Data Encryption Standard252

Clipper Chip256

Key Distribution and Protection260

Merkle's Puzzles260

Shamir's Method261

4.6 PUBLIC KEY ENCRYPTION262

RSA Algorithm264

Digital Signatures266

Authentication Using Hash-Based Schemes268

Encryption Potpourri272

Summary of Encryption Methods272

4.7 VIRUSES,WORMS,AND HACKERS275

Infecting Files275

Memory-Resident Viruses276

Virus Evolution277

Virus Sources281

The Internet Worm281

Computer Hackers283

4.8 SUMMARY284

REVIEW QUESTIONS286

EXERCISES288

REFERENCES291

CHAPTER 5 PROTOCOLCONCEPTS293

5.1 INTRODUCTION293

5.2 BASIC FLOW CONTROL295

Signaling295

Frame-Oriented Control297

Protocol Efficiency301

5.3 SLIDING WINDOW PROTOCOLS304

Frame Format306

Go-back-n Protocol307

Selective Repeat Protocol314

Sliding Window Protocol Efficiency322

Summary of Protocols324

5.4 PROTOCOL CORRECTNESS325

Finite State Machines325

Petri Nets331

5.5 DATA LINK CONTROL PROTOCOLS336

High-Level Data Link Control(HDLC)336

Other Bit-Oriented Protocols344

Binary Synchronous Communications Protocol345

Summary:Data Link Protocols349

5.6 CASE STUDY:KERMIT350

Frame Format351

Protocol352

Commands354

5.7 SUMMARY356

REVIEW QUESTIONS357

EXERCISES359

REFERENCES363

CHAPTER 6 LOCAL AREA N ETWORKING364

6.1 NETWORK TOPOLOGIES364

6.2 ETHERNET:IEEE STANDARD 802.3367

Ethernet Components368

Relation to OSI368

Cable Specifications371

Connecting Segments373

Frame Format374

Efficiency375

6.3 TOKEN RING:IEEE STANDARD 802.5379

Token and Frame Formats381

Reserving and Claiming Tokens383

Ring Maintenance389

Efficiency391

Other Ring Networks392

6.4 TOKEN Bus:IEEE STANDARD 802.4397

Token Bus Operations399

Lost Tokens402

Ring Initialization403

Prioritizing Frames404

6.5 INTERCONNECTING LANS407

Layer 1 Connections409

Layer 2 Connections410

Bridging Different Types of LANs411

Bridge Routing413

Summary426

6.6 CASE STUDY:NOVELL NETWARE427

NetWare Configuration427

Running Novell NetWare429

Security and Integrity431

Selected Novell Commands434

Login Scripts436

6.7 SUMMARY439

REVIEW QUESTIONS440

EXERCISES443

REFERENCES446

CHAPTER 7 WIDE AREA NETWORKING448

7.1 INTRODUCTION448

7.2 NETWORK ROUTING451

Routing Tables452

Types of Routing453

Dijkstra's Algorithm456

Bellman-Ford Algorithm459

Link State Routing466

Hierarchical Routing467

Routing Information Protocol470

Open Shortest Path First471

?order Gateway Protocol472

Congestion and Deadlock473

Summary of Routing Techniques473

7.3 PUBLIC DATA NETWORKS:THE X SERIES PROTOCOLS478

Packet-Switched Network Modes479

X.25 Public Data Network Interface Standard481

Triple-X Standard for Non-X.25 Devices486

7.4 INTERNET PROTOCOLS490

Overview of TCP/IP491

Internet Addressing493

Domain Name System495

IP Packets497

Fragmentation500

IP Routing501

Intemet Control Message Protocol504

IPv6506

7.5 TRANSPORT PROTOCOLS515

Transmission Control Protocol518

OSI Transport Protocols529

User Datagram Protocol529

7.6 SOCKET PROGRAMMING531

Sockets532

Client/Server Model532

Socket Data Structures533

Socket Commands535

Client/Server Example535

7.7 SUMMARY548

REVIEW QUESTIONS551

EXERCISES553

REFERENCES557

CHAPTER 8 ADDITIONAL NETWORK PROTOCOLS559

8.1 INTERNET APPLICATIONS559

Virtual Terminal559

Telnet560

File Transfers564

Simple Mail Transfer Protocol571

Simple Network Management Protocol573

8.2 WORLD WIDE WEB576

Web Page Access577

Hypertext Markup Language579

HTML Forms582

JavaScript and Client-side Programming587

Common Gateway Interface and Server-side Programming592

8.3 ELECTRONIC MAIL:X.400 AND X.500 STANDARDS597

X.400 Mail Standards598

X.500 Directory Service606

8.4 INTEGRATED SERVICES DIGITAL NETWORK610

Summary610

ISDN Services612

ISDN Architecture613

Protocols615

Broadband ISDN624

8.5 ASYNCHRONOUS TRANSFER MODE625

Benefits of Small Fixed-Size Cells626

Overview of ATM Network628

Switching629

Reference Model631

Cell Definition633

Virtual Circuits and Paths636

Connection Management637

Adaptation Layers639

8.6 SYSTEMS NETWORK ARCHITECTURE646

Lower Layers Physical Link Control647

Path Control648

Transmission Conteol654

Data Flow Control657

Higher Layers659

REVIEW QUESTIONS661

EXERCISES663

REFERENCES665

GLOSSARY667

ACRONYMS695

INDEX699

热门推荐