Financial Strategy

副标题:无

作   者:刘伟华译

分类号:

ISBN:9787800733826

微信扫一扫,移动浏览光盘

简介

   这是一本理论与实践相结合的教科书,其理论性足以挑战有志于对该领域进行钻研的学生,实践上又能使学生贴近通信系统与网络的现实。其中极有价值的经验将会使所有的学生从中受益。    本书除包含第1版的基础知识外,又增加了以下内容:    ·改进了无线通信尤其是卫星传输的内容    ·更新了用于现代技术的调制解调标准    ·扩充了Lempel-Ziv压缩技术    ·增加了用于图像和多媒体传输的JPEG和MPEG压缩技术    ·增加了加密方法、公共密匙及基于Hash方案的认证内容    ·增加了ATM协议    ·增加了网络环境下的客户/服务器编程    ·修订了TCP尤其是拥塞控制的内容   

目录

chapter 1 iniroduction io communications, standards, and protocols

1 .1 why study communications?

a brief history

applications

issues

1.2 computer networks

common bus topology
star topology
ring topology
fully connected topology
combined topologies

1.3 standards and standards organizations

the need for standards
agencies

1.4 open systems and the osi model

overview of the model
physical layer

data link layer
network layer
transport layer
.session layer
presentation layer
application layer
summary

1.5 the future of data communications

review questions
exercises
references


chapter 2 transmission fundamertals

2.1 communications media

conductive metal
optical fiber
wireless communications
summary

2.2 communiication services and devices

telephone system
integrated services digital network
cellular phones
fax machines

2.3 codes

ascii code
ebcdic code
baudot, morse, and bcd codes

2.4 analog and digital signals

digital encoding schemes
analog signals

bit rate

2.5 modulation and demodulation

digital-to-analog conversion
analog-to-digital conversion

2.6 modems and wodem standards

signal constellation
intelligent (hayes compatible) modems
cable modems
null modems

2.7 summary

review questions
exercises
references


chapter 3 data communication

3. 1 transmission modes

serial and parallel transmission
asynchronous and synchronous transmission
simplex, half-duplex, and full-duplex communications

3. 2 interface standards

rs-232 interface
rs-232 subsets
null modems
rs-449 interface
x.2l interface

3.3 multiplexing

frequency-division multiplexing
time-division multiplexing
statistical multiplexers

t-l carrier

3. 4 contention protocols

aloha protocols
carrier sense multiple access
collision detection
token passing
summary of protocols

3.5 data compression

huffman code
run-length encoding
relative encoding
lempel-ziv encoding
image compression
jpeg
mpeg
summary of compression techniques

3.6 summary

review questions
exercise5
references


chapter 4 data securitv and iniegritv

4.1 introduction

4.2 parity checking

parity checking analysis
double-bit error detection
burst error detection

4.3 cyclic redundancy checks

polynomial division
how crc works

analysis of crc
crc implementation using circular shifts

4.4 hamming codes

single-bit error correction
multiple-bit error correction
comparison of error detection and error correction

4.5 encrvption and decrvption

caesar cipher
polyalphabetic cipher
transposition cipher
bit-level ciphering
data encryption standard
clipper chip
key distribution and protection
merkle's puzzles
shamir's method

4.6 public key encrvption

rsa algorithm
digital signatures
authentication using hash-based schemes
summary of encryption methods
encryption potpourri

4.7 viruses, worms and hackers

infecting files
memory-resident viruses

virus evolution
virus sources
the internet worm
computer hackers

4.8 summary

review questions
exercises
references


chapter 5 protocol concepts

5.1 introduction

5.2 basic flow control

signaling
frame-oriented control

protocol efficiency

5.3 sliding window protocols

frame format
go-back-n protocol

selective repeat protocol
sliding window protocol efficiency
summary of protocols

5.4 protocol correctness

finite state machines
petri nets

3.3 data link control protocols

high-level data link control (hdlc)
other bit-oriented protocols
binary synchronous communications protocol
summary: data link protocols

5.6 case study: kermit

frame format
protocol
commands

5.7 summary

review questions
exercises
references


chapier 6 local area networking

6.1 network topologies

6.2 ethernet: ieee standard 802.3

relation to osi
ethernet components
cable specifications
connecting segments
frame format
efficiency

6.3 token ring: ieee standard 802.5

token and frame formats
reserving and claiming tokens
ring maintenance
efficiency
other ring networks

6.4 token bus: ieee standard 802.4

token bus operations
lost tokens

ring initialization
prioritizing frames

6.5 interconnecting lans

layer l connections
layer 2 connections

bridging different types of lans
bridge routing

summary

6.6 case study: novell netware

netware configuration
running novell netware
security and integrity
selected novell commands
login scripts

6.7 summary

review questions
exercises
references

chapter 7 wide area networking

7.1 introduction

7.2 network routing

routing tables
types of routing

dijkstra's algorithm
bellman-ford algorithm

link state routing
hierarchical routing

routing information protocol
open shortest path first
border gateway protocol
summary of routing techniques
congestion and deadlock

7.3 public data networks: the x series protocols

packet-switched network modes
x.25 public data network interface standard
triple-x standard for non-x.25 devices

7. 4 internet protocols

overview of tcp/ip
internet addressing
domain name system
ip packets
fragmentation
ip routing
internet control message protocol
ipv6

7.5 transprt protocols

transmission control protocol
user datagram protocol
osi transport protocols

7.6 socket proeramming

sockets
client/server model
socket data structures
socket commands
client/server example

7.7 summary

review questions
exercises
references


chapier 8 additional neiwork protocols

8.1 internet applications

virtual terminal
telnet
file transfers

simple mail transfer protocol
simple network management protocol

8.2 world wide web

web page access
hypertext markup language
html forms
javascript and client-side programming
common gateway interface and server-side programming

8.3 electronic mail: x.400 and x.500 standards

x.400 mail standards
x.500 directory service
summary

8.4 integrated services digital network

isdn services
isdn architecture

protocols
broadband isdn

8.5 asynchronous transfer mode

benefits of small fixed-size cells
overview of atm network
switching
reference model
cell definition
virtual circuits and paths
connection management
adaptation layers

8.6 systems network architecture

lower layers physical link control
path control
transmission control
data flow control
higher layers


review questions
exercises
references


glossary

acronyms

index


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Financial Strategy
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon