图书介绍

数据通信与网络教程 第3版 英文版PDF|Epub|txt|kindle电子书版本网盘下载

数据通信与网络教程 第3版 英文版
  • (美)谢伊(Shay,W.A.)著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111137868
  • 出版时间:2004
  • 标注页数:766页
  • 文件大小:80MB
  • 文件页数:791页
  • 主题词:数据通信-教材-英文;计算机网络-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

数据通信与网络教程 第3版 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 INTRODUCTION TO COMMUNICATIONS,STANDARDS,AND PROTOCOLS1

1.1 WHY STUDY COMMUNICATIONS?1

A Brief History1

Applications4

Issues8

1.2 COMPUTER NETWORKS9

Common Bus Topology10

Star Topology11

Ring Topology12

Fully Connected Topology13

Combined Topologies13

1.3 STANDARDS AND STANDARDS ORGANIZATIONS15

The Need for Standards15

Standards Organizations16

1.4 OPEN SYSTEMSAND THE OSI MODEL18

CONTENTSPREFACE19

Overview of the Model22

Connection Strategies24

Physical Layer29

Data Link Layer30

Network Layer32

Transport Layer33

Session Layer36

Presentation Layer38

Application Layer40

Summary42

Internet Layers42

1.5 THE FUTURE OF DATA COMMUNICATIONS44

REVIEW QUESTIONS51

EXERCISES52

REFERENCES53

CHAPTER 2 TRANSMISSION MEDIA AND CODES54

2.1 INTRODUCTION54

2.2 CONDUCTIVE METAL57

Twisted Pair57

Coaxial Cable59

2.3 OPTICAL FIBER61

2.4 WIRELESS COMMUNICATIONS66

Microwave Transmission67

Satellite Transmission70

Geosynchronous Satellites71

Low Earth Orbit Satellites77

Wireless LANs81

Bluetooth82

Free Space Optics83

Summary84

2.5 CODES87

Early Codes87

ASCII Code89

EBCDIC Code92

Unicode92

2.6 SUMMARY93

REVIEW QUESTIONS94

EXERCISES95

REFERENCES96

CHAPTER 3 ANALOG AND DIGITAL SIGNALS97

3.1 INTRODUCTION97

3.2 DIGITAL ENCODING SCHEMES98

NRZ Encoding98

Manchester Encoding100

3.3 ANALOG SIGNALS101

Fourier's Results103

Applications of Fourier's ResUlts106

3.4 BIT RATE107

The Nyquist Theorem and Noiseless Channels107

Noisy Channels109

Shannon's Result110

3.5 DIGITAL-TO-ANALOG CONVERSION112

Frequency Modulation113

Amplitude Modulation114

Phase Modulation114

Quadrature Amplitude Modulation115

3.6 ANALOG-TO-DIGITAL CONVERSION118

Pulse Amplitude Modulation119

Pulse Code Modulation119

3.7 MODEMS121

Signal Constellation122

Modem Standards125

Cable Modems127

3.8 DSL131

How It Works132

ADSL Lite(G.Lite,ITU standard TTU G.992.2)135

Different DSL Technologies135

SDSL136

HDSL and HDSL2136

SHDSL137

RADSL137

IDSL137

VDSL137

3.9 SUMMARY138

REVIEW QUESTIONS139

EXERCISES141

REFERENCES143

CHAPTER 4 MAKING CONNECTIONS144

4.1 INTRODUCTION144

The Telephone System145

4.2 COMMUNICATION CARRIERS AND DEVICES145

Call Routing147

Private Branch Exchanges148

Cellular Phones149

Fax Machines151

4.3 TRANSMISSION MODES153

Serial and Parallel Transmission153

Asynchronous,Synchronous,and Isochronous Transmission154

Simplex,Half-Duplex,and Full-Duplex Communications158

4.4 INTERFACE STANDARDS159

EIA-232 Interface160

EIA-232 Subsets162

Null Modems163

X.21 Interface164

USB Connections166

USB166

Data Transfer168

USB Packets170

Fire Wire172

Connections173

Communications175

Arbitration176

4.5 MULTIPLEXING178

Frequency-Division Multiplexing180

Time-Division Multiplexing182

Statistical Multiplexers183

Wave-Division Multiplexing185

T1186

4.6 DIGITAL CARRIERS186

SONET188

Device Types189

Payloads and Frames191

4.7 CONTENTION PROTOCOLS195

Aloha Protocols196

Carrier Sense Multiple Access199

Collision Detection202

Collision Avoidance205

Token Passing205

Summary of Protocols207

4.8 SUMMARY207

REVIEW QUESTIONS210

EXERCISES212

REFERENCES214

CHAPTER 5 DATA COMPRESSION215

5.1 INTRODUCTION215

5.2 FREQUENCY-DEPENDENT CODES217

Huffman Code217

Arithmetic Compression220

5.3 RUN-LENGTH ENCODING225

Runs of the Same Bit225

Runs with Different Characters226

Facsimile Compression226

5.4 RELATIVE ENCODING229

5.5 LEMPEL-ZIV COMPRESSION229

Image Representation235

5.6 IMAGE COMPRESSION235

JPEG Compression238

DCT Phase238

Encoding Phase244

GIFFiles245

5.7 MULTIMEDIA COMPRESSION246

MPEG246

MP3251

5.8 SUMMARY254

REVIEW QUESTIONS254

EXERCISES255

REFERENCES257

CHAPTER 6 DATA INTEGRITY258

6.1 INTRODUCTION258

Parity Checks259

6.2 SIMPLE ERROR DETECTION TECHNIQUES259

Analysis of Parity Checking260

Checksums261

6.3 CYCLIC REDUNDANCY CHECKS FOR ERROR DETECTION261

Polynomial Division262

How CRC Works263

Analysis of CRC265

CRC Implementation Using Circular Shifts268

6.4 HAMMING CODES:ERROR CORRECTION270

Single-Bit Error Correction270

Multiple-Bit Error Correction273

6.5 SUMMARY274

REVIEW QUESTIONS275

EXERCISES276

REFERENCES277

CHAPTER 7 DATA SECU RITY279

7.1 INTRODUCTION279

7.2 ENCRYPTION ALGORITHMS281

Caesar Cipher282

Polyalphabetic Cipher284

Transposition Cipher284

Bit-Level Ciphering285

Data Encryption Standards287

DES287

Triple DES291

AES and the Rijndael Algorithm292

Clipper Chip and the Skipjack Algorithm296

7.3 KEY DISTRIBUTION AND PROTECTION299

Diffie-Hellman Key Exchange300

Shamir's Method300

7.4 PUBLIC KEY ENCRYPTION302

RSA Algorithm302

Digital Signatures305

Authentication and Message Digests308

Pretty Good Privacy311

7.5 TRANSPORT LAYER SECURITY AND SERVER AUTHENTICATION315

Transport Layer Security316

X.509 Certificate317

Handshakes320

7.6 FIREWALLS323

Packet Filtering324

Application-Level Gateway325

Stateful Inspection327

7.7 VIRUSES329

Infecting Files330

Memory-Resident Viruses332

Virus Evolution333

Virus Sources335

7.8 THREATS AND ATTACKS336

The Internet Worm336

Computer Hackers338

Other Threats339

7.9 SUMMARY341

REVIEW QUESTIONS345

EXERCISES346

REFERENCES348

8.1 INTRODUCTION350

CHAPTER 8 FLOW CONTROL350

8.2 SIGNALING352

DTE-DCE Flow Control353

X-ON/X-OFF353

8.3 FRAME-ORIENTED CONTROL354

Unrestricted Protocol355

Stop-and-Wait Protocol356

Protocol Efficiency358

8.4 Go-BACK-n:A SLIDING WINDOW PROTOCOL360

Frame Format362

Features363

Algorithm366

Features370

8.5 SELECTIVE REPEAT:A SLIDING WINDOW PROTOCOL370

Algorithm374

8.6 EFFICIENCY OF SLIDING WINDOW PROTOCOLS377

8.7 PROTOCOL CORRECTNESS380

Finite State Machines380

STD for a Simplified Go-Back-n Protocol381

State Transition Diagram for a Faulty Go-Back-n Protocol383

Petri Nets386

8.8 SUMMARY390

REVIEW QUESTIONS392

EXERCISES393

REFERENCES395

CHAPTER 9 LOCAL AREA NETWORKS396

9.1 INTRODUCTION396

9.2 DATA LINK CONTROL398

High-level Data Link Control Protocol400

Frame Format402

HDLC Example405

Binary Synchronous Communications Protocol408

9.3 ETHERNET:IEEE STANDARD 802.3410

Concepts411

Ethernet Frame Format413

Physical Implementations of 10 Mbps Ethernet415

9.4 FAST ETHERNET(100 MBPS)417

100BaseTX418

100BaseFX421

100BaseT4422

9.5 GIGABIT ETHERNET424

Collision Domain424

MAC Sublayer425

1000BaseX427

1000BaseT428

Beyond Gigabit Rates430

9.6 TOKEN RING:IEEE STANDARD 802.5433

Token and Frame Formats434

Reserving and Claiming Tokens436

Ring Maintenance440

9.7 WIRELESS NETWORKS:IEEE STANDARD 802.11443

Infrared and Radio Waves444

Contention447

Addressing449

Frame Format451

Wired Equivalent Privacy453

Variations of 802.11454

9.8 SUMMARY455

REVIEW QUESTIONS457

EXERCISES459

REFERENCES461

CHAPTER 10 CONNECTING NETWORKS462

10.1 INTRODUCTION462

10.2 LAYER 1 CONNECTIONS465

Repeaters and Hubs465

10.3 LAYER 2 CONNECTIONS467

Bridges467

Bridging Different Types of LANs468

Routing Tables469

Routing469

Transparent Bridges471

Route Learning471

Frame Propagation473

Spanning Tree Algorithm475

Source-Routing Bridges479

Switches and Switched Ethernet480

Virtual LANs484

10.4 LAYER 3 CONNECTIONS487

Routing Tables488

Centralized Routing490

Distributed Routing491

Static Routing492

Adaptive Routing492

10.5 DIJKSTRA'S ALGORITHM493

10.6 THE BELLMAN-FORD ALGORITHM496

Problems with the Bellman-Ford Algorithm500

10.7 ADDITIONAL ROUTING METHODS502

Link State Routing502

Hierarchical Routing503

Routing Information Protocol506

Open Shortest Path First509

Border Gateway Protocol510

Summary of Routing Techniques512

10.8 CONGESTION AND DEADLOCK512

Congestion512

Deadlock515

10.9 SUMMARY517

REVIEW QUESTIONS519

EXERCISES520

REFERENCES523

CHAPTER 11 INTERNET PROTOCOLS AND APPLICATIONS524

11.1 INTRODUCTION524

11.2 INTERNET PROTOCOL525

Overview of TCP/IP526

Interrnet Addressing528

Classless Addresses531

Obtaining an Address533

Domain Name System534

IP Packets537

Fragmentation540

IP Routing541

Routers546

Multicast Routing549

Resource Reservation Protocol555

Internet Control Message Protocol557

11.3 IPv6559

IP Shortcomings560

Packet Headers561

IPSec564

IPv6 Addressing566

Compatibility with IPv4569

Summary570

11.4 TRANSPORT PROTOCOLS571

Transmission Control Protocol573

TCP Segment574

Connection Management577

Flow Contol580

Congestion Control582

User Datagram Protocol584

Real-Time Transfer Protocol585

11.5 INTERNET APPLICATIONS589

Virtual Terminal Protocols589

Telnet590

Secure Shell593

File Transfers596

FTP597

Secure Copy600

Simple Mail Transfer Protocol600

Simple Network Management Protocol604

Management Information Base605

SNMP Commands606

11.6 SUMMARY608

REVIEW QUESTIONS610

EXERCISES612

REFERENCES614

CHAPTER 12 INTERNET PROGRAMMING616

12.1 INTRODUCTION616

12.2 SOCKET PROGRAMMING617

Sockets618

Client/Server Model619

Socket Data Structures620

Client/Server Example621

Socket Commands621

Client Source Code624

Server Source Code631

12.3 WORLD WIDE WEB633

Web Page Access634

Hypertext Markup Language636

Tags637

HTML Forms641

Client-Side Programming and JavaScript644

12.4 COMMON GATEWAY INTERFACE AND SERVER-SIDE PROGRAMMING:SETTING UP A SEARCH ENGINE649

Forms650

Query Strings651

Example Search Engine651

12.5 PERL PROGRAMMING:PIZZA ORDERING SYSTEM654

Customer Interaction655

Verifying Phone Numbers658

Updating Customer Information665

Placing an Order668

Verifying the Order669

12.6 SUMMARY672

REVIEW QUESTIONS673

EXERCISES674

REFERENCES676

CHAPTER 13 CIRCUIT TECHNOLOGIES677

13.1 INTRODUCTION677

13.2 INTEGRATED SERVICES DIGITAL NETWORK678

Services679

Architecture681

Protocols683

Signaling System 7684

Basic Service Protocols686

Call Setup689

Broadband ISDN691

13.3 VIRTUAL CIRCUIT PROTOCOLS:X.25 AND FRAME RELAY692

Packet-Switched Network Modes693

Virtual Circuits693

Datagram Service695

X.25 Interface Standard696

Packet Format697

Virtual Calls698

Frame Relay699

Frame Format701

Committed Information Rate702

Congestion Control703

13.4 ASYNCHRONOUS TRANSFER MODE705

Benefits of Small Fixed-Size Cells706

Overview of ATM Network708

Switching709

Banyan Switches710

Reference Model712

Cell Definition713

Header Error Control714

Cell Loss Priority716

Payload Type716

Virtual Circuits and Paths716

Connection Management717

Connection Parameters719

Adaptation Layers720

AAL1721

AAL2723

AAL5724

Service-Specific Connection-Oriented Protocol725

Gigabit Ethernet versus ATM726

13.5 SUMMARY727

REVIEW QUESTIONS727

EXERCISES729

REFERENCES730

GLOSSARY731

ACRONYMS748

INDEX752

热门推荐