图书介绍

计算机通信与网络技术PDF|Epub|txt|kindle电子书版本网盘下载

计算机通信与网络技术
  • (美) 加洛(Gallo 著
  • 出版社: 北京:高等教育出版社
  • ISBN:7040137275
  • 出版时间:2003
  • 标注页数:632页
  • 文件大小:218MB
  • 文件页数:658页
  • 主题词:计算机通信网-高等学校-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机通信与网络技术PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Ⅰ COMPUTER COMMUNICATIONS AND NETWORK BASICS1

1 Overview of Computer Communications and Networking2

1.1 What Does Computer Communications and Networking Technologies Mean?3

1.2 What Is a Computer Network?4

Network Members:Devices,Nodes,and Hosts4

Network Media and Communication Protocols5

1.3 Types of Computer Networks7

Classifying Networks by the Area They Encompass7

Classifying Networks by Their Topology9

Switched Networks14

1.4 Network Addressing,Routing,Reliability,Interoperability,and Security16

Addressing16

Routing17

Reliability17

Interoperability18

Security18

1.5 Network Standards19

De Jure Standards20

De Facto Standards20

Proprietary Standards21

Consortia Standards21

Internet Standards Development22

1.6 The Telephone System and Data Communications23

The Invention of the Telephone23

The Evolution of the Telephone Industry and AT&T24

The AT&T Breakup of 198425

The Telecommunications Act of 199626

Data Communications versus Telecommunications27

1.7 Organization of the Book28

End-of-Chapter Commentary29

Chapter Review Moterials30

2 Essential Terms and Concepts33

2.1 Network Applications and Application Protocols34

2.2 Computer Communications and Networking Models37

Decentralized Systems37

CentralizedSystems38

Distributed Systems38

Client/Server Model40

Peer-to-Peer Model41

Web-Based Model43

Emerging File-Sharing Model Servant44

2.3 Communication Service Methods and Data Transmission Modes45

Serial and Parallel Communications45

Synchronous,Asynchronous,and Isochronous Communications46

Simplex and Duplex Communications48

2.4 Analog and Digital Communications49

Analog Communications49

Digital Communications51

2.5 Speed and Capacity of a Communications Channel54

Bandwidth andData Rate54

Throughput55

Noise55

2.6 Multiplexing and Switching59

Multiplexing59

Switching62

2.7 Network Architecture and the OSI Reference Model65

The OSI Model65

OSI Service Types67

OSI Today70

End-of-Chapter Commentary71

Chapter Review Materials72

3 Analog and Digital Communications Concepts76

3.1 Representing Data as Analog Signals77

Converting Analog Data to Analog Signals77

Converting Digital Data to Analog Signals79

3.2 Representing Data as Digital Signals87

Converting Analog Data to Digital Signals87

Converting Digital Data to Digital Signals90

3.3 Data Rate and Baud Rate Redux92

3.4 Digital Carrier Systems93

T1 and DS Circuits93

Fractional T195

SONET and OC Circuits98

End-of-Chapter Commentary100

Chapter Review Materials100

Ⅱ Physical,Data Link,and Network Layer Concepts107

4 Physical Layer Concepts108

4.1 What Is the Physical Layer?109

4.2 The Physical and Electrical Characteristics of Wire110

Physical Characteristics111

Electrical Characteristics114

4.3 Copper Media116

Unshielded and Shielded Twisted-Pair Cable116

IBM Cable118

Coaxial Cable119

Twin Axial Cable120

4.4 Fiber-Optic Media120

4.5 Wireless Communications124

Radio Transmission124

Infrared Transmission127

Wireless LAN Standards128

4.6 Satellite Communications129

4.7 Structured Cabling Systems133

End-of-Chapter Commentary135

Chapter Review Materials135

5 Data Link Layer Concepts and IEEE LAN Standards139

5.1 What Is the Data Link Layer?140

Overview140

The IEEE and the Data Link Layer141

5.2 The Logical Link Control(LLC)Sublayer142

Framing142

Flow Control146

Error Control152

5.3 The Media Access Control(MAC)Sublayer158

Random Access Protocols158

Token Passing Protocols161

Random Access versus Token Passing Protocols162

5.4 Data Prioritization and Quality of Service163

End-of-Chapter Commentary166

Chapter Review Materials166

6 Network Hardware Components(Layers 1 and 2)170

6.1 What Are Connectors?171

Overview171

UTP Cable Connectors171

Coaxial Cable Connectors172

Fiber-Optic Cable Connectors173

Other Connectors173

6.2 Transceivers and Media Converters174

Transceivers174

Media Converters176

6.3 Repeaters177

Repeaters versus Hubs177

6.4 Network Interface Cards and PC Cards179

Network Interface Cards179

PC Cards181

6.5 Bridges182

Overview182

Bridge Standards183

Bridges versus Repeaters187

6.6 Switches188

Store-and-Forward Switch188

Cut-Through Switch189

Hybrid Switch190

Switch Performance190

End-of-Chapter Commentary192

Chapter Review Materials192

7 Internetworking and Network Layer Concepts and Components195

7.1 Internetworking Concepts196

7.2 The Network Layer and Routing Concepts200

Network Layer Overview200

Routing Protocol Concepts202

Routing Algorithms205

7.3 Sample Routing Protocols208

Autonomous Systems and Interior and Border Gateway Protocols208

RIP208

RIP-2211

OSPF212

Other Routing Protocols214

Classless Interdomain Routing215

7.4 Routers and Switches215

Overview(Review)of Switches and Switching215

Layer-2 and Layer-3 Switches versus Routers216

Layer-4 Switching217

IP Switching217

Brouter versus Router218

7.5 Virtual Private Networks(VPNs)218

VPN Strategies218

VPN Benefits221

End-of-Chapter Commentary223

Chapter Review Materials223

8 The Internet and TCP/IP229

8.1 What Is the Internet?230

8.2 Internet History231

ARPANET231

BITNET,CSNET,and UUCP231

NSFNET233

A Commercial Internet236

The Current Public Internet237

Other Internet Backbone Initiatives238

8.3 Internet Administration240

Governance and Organization240

Standards Development241

Internet Security242

8.4 What Is TCP/IP?243

A Brief History243

The TCP/IP Model versus the OSI Model245

8.5 TCP/IP's Transport and Network Layer Protocols248

Overview of Internet-Based Communications and the Role of UDP,TCP,IP,and Port Numbers248

The User Datagram Protocol(UDP)249

The Transport Control Protocol(TCP)252

The Internet Protocol(IP)260

8.6 IP Addresses263

IPv4263

Subnetting IPv4 Addresses265

IP Address Resolutions:DNS270

IP Address and Name Assignment273

8.7 IPv6274

The Need for IPv6274

I Pv6 versus IPv4275

I Pv6 Addresses278

I Pv6 Migration280

8.8 TCP/IP Application Level Protocols281

Electronic Mail:SMTP,MIME,and POP281

The TELNET Protocol291

The File Transfer Protocol(FTP)293

The Hypertext Transfer Protocol(HTTP)295

End-of-Chapter Commentary304

Chapter Review Materials304

Ⅲ Local and Wide Area Networking Technologies311

9 Ethernet and IEEE 802.3 Networks312

9.1 The History of Ethernet313

In the Beginning313

Ethernet versus IEEE 802.3314

9.2 10-MBPS Ethernet/802.3 LANS316

Physical and Data Link LayerInformation316

The Concept of Network Diameter and Collision Domain321

The 5-4-3 Repeater Placement Rule324

Workarounds to the 5-4-3 Repeater Placement Rule325

Performance Issues326

9.3 Switched Ethernet,Full-Duplex Ethernet,and Virtual LANs328

The Concept of Segmentation328

Switched Ethernet330

Full-Duplex Ethernet335

Virtual Local Area Networks(VLANs)336

9.4 100-MBPS Ethernet LANs337

Fast Ethernet338

100VG-AnyLAN342

9.5 Gigabit Ethernet346

Overview346

IEEE 802.3z:Gigabit Ethernet over Fiber348

IEEE 802.3ab:Gigabit Ethernet over Copper350

Gigabit Ethernet versus Asynchronous TransferMode (ATM)351

Gigabit Ethernet's Bottom Line352

Is Faster Better?353

Ethernet as a WAN Protocol:IEEE 802.3ae—10-Gigabit Ethernet353

9.6 Other Ethernet-Related Projects354

End-of-Chapter Commentary355

Chapter Review Materials355

10 Token Ring361

10.1 What Is Token Ring?362

10.2 Physical Layer Specifications364

10.3 Frame Formats365

The Token Frame365

The Data Frame366

10.4 Priority and Reservation368

10.5 Monitor Stations369

10.6 Second-Generation Token Ring370

Switched Token Ring370

Dedicated Token Ring372

Full-Duplex Token Ring373

High-Speed Token Ring373

10.7 Token Ring versus Token Bus374

End-of-Chapter Commentary375

Chapter Review Materials375

11 Fiber Distributed Data Interface(FDDI)378

11.1 What Is FDDI?379

11.2 Physical Layer Specifications381

11.3 Frame Formats and Medium Access Specifications382

Frame Formats382

MAC Sublayer:FDDI versus Token Ring384

Operation385

11.4 Configuration and Design Issues386

11.5 Interconnecting FDDI with Ethernet/802.3 or ATM Networks388

11.6 The Future of FDDI390

End-of-Chapter Commentary390

Chapter Review Materials391

12 Integrated Services Digital Network(ISDN)393

12.1 What Is ISDN?394

History394

Standards396

12.2 ISDN Components398

Modules,Equipment,and Adapters398

Interfaces399

12.3 ISDN Channel Types400

B Channel401

D Channel401

H Channel402

12.4 Basic and Primary Rate Interfaces402

Basic Rate Interface(BRI)402

Primary Rate Interface(PRI)403

12.5 ISDN Protocols404

Overview404

Link Access Protocol-D Channel(LAP-D)405

12.6 ISDN Features,Services,and Applications406

Service Profile Identification(SPID)Numbers406

Line and Feature Sets406

Teleservices407

ISDN versus Regular Phone Service407

ISDN and the Internet408

LAN-to-LAN Connections409

12.7 Other ISDN Initiatives410

Always On/Dynamic ISDN410

Broadband ISDN411

End-of-Chapter Commentary411

Chapter Review Materials412

13 Frame Relay416

13.1 What Is Frame Relay?417

13.2 Frame Relay Circuits420

Permanent Virtual Circuit(PVC)420

Committed Information Rate(CIR)422

CIR and Oversubscription423

Switched Virtual Circuit(SVC)426

13.3 Technical Overview and Data Link Layer Issues427

Basic Operation427

Frame Relay Frames428

Data Link Connection Identifier(DLCI)430

Congestion Control and Management432

Link Management434

13.4 Additional Frame Relay Information434

Voice Over Frame Relay434

Frame Relay versus Other LAN-to-LAN Technologies436

Frame Relay in the News436

End-of-Chapter Commentary437

Chapter Review Materials437

14 Switched Multimegabit Data Service(SMDS)441

14.1 What Is SMDS?442

Overview442

History443

Development Rationale443

14.2 SMDS Technical Overview444

Physical Layer Specifications444

Data Link Layer Specifications:DQDB446

14.3 The SMDS Interface Protocol(SIP)447

14.4 SMDS Addressing451

14.5 SMDS versus Other LAN-to-LAN Technologies452

SMDS versus Frame Relay and ATM452

14.6 Status of SMDS Today453

End-of-Chapter Commentary455

Chapter Review Materials455

15 Asynchronous Transfer Mode(ATM)458

15.1 What Is ATM?459

Overview459

History459

15.2 General Concepts and Operation461

General Concepts461

Operation461

15.3 ATM Interface Standards463

15.4 ATM Cells,Virtual Connections,and Addressing465

ATM Cells465

Virtual Connections467

Addressing469

15.5 ATM Adaptation Layer(AAL)470

15.6 ATM and Convergence Technology472

15.7 ATM versus Other Technologies and Services473

ATM versus Fast and Gigabit Ethernet473

ATM versus Frame Relay474

ATM versus SONET475

ATM as an Emulated LAN Technology475

End-of-Chapter Commentary477

Chapter Review Materials477

Ⅳ Related Networking Concepts,Applications,and Technologies477

16 Dialup and Home Networking482

16.1 What Is Dialup Networking?483

Terminal Dialup Connection483

Network Dialup Connection485

16.2 Analog Modem Concepts485

Overview485

Modem Standards486

DCE,DTE,Compression,and Error Control486

56K Modems489

16.3 DSL Service490

Overview490

DSL Transmission Rates and Circuit Quality492

Types of DSL Service494

16.4 Cable Modems498

16.5 Home Networking Concepts and Issues501

Connecting to the Internet502

Interconnecting More Than One Home Computer504

The Home Network Infrastructure505

Home Network Security505

Potential Problems When Configuring a Home Network506

End-of-Chapter Commentary507

Chapter Review Materials508

17 Network Security Issues512

17.1 What Is Network Security?513

17.2 Threat Assessment513

Identifying Critical Assets514

Who Covets Your Assets?516

Risk Analysis517

War Games518

Documentation518

17.3 Network Attacks and Security Measures Considerations518

Examples of Network Attacks518

Denial of Service(DoS)Attacks519

Obstacles to Implementing Network Security521

Security Measures Considerations521

17.4 Firewalls524

Overview524

Type of Firewalls524

Firewalls and Multiprotocol Environments526

Firewall Implementation Considerations527

17.5 Encryption Methods528

Overview528

Public Key Infrastructure(PKI)530

Data Encryption Standard(DES)530

Pretty Good Privacy(PGP)531

RSA532

17.6 Authentication and Access Control Measures537

Digital Certificates538

SmartCards538

Kerberos539

17.7 Virtual Private Networks and Internet Security539

VPN Security Protocols540

The IP Security Protocol(IPSec)541

Protecting VPN Connections544

End-of-Chapter Commentary545

Chapter Review Materials545

18 Network Convergence549

18.1 What Is Network Convergence?550

Overview550

Convergence Is More Than Combining Voice and Data552

18.2 Networking Issues and Convergence554

Network Media and Convergence554

Network Applications and Convergence556

Convergence and Multimedia Networking557

18.3 Effects of Network Convergence on Businesses559

Convergence Effects on Legacy Networks and Systems559

Convergence Effects on Computing and Networking Styles560

Convergence Effects on Network Performance and Growth Rate561

Organizational Changes and Convergence562

Network Management and Convergence563

Convergence and the Internet with Corporate Network Applications564

18.4 Convergence at Home565

End-of-Chapter Commentary566

Chapter Review Materials567

A Vendor Ethernet/802.3 Prefixes570

B Using Parity for Single-Bit Error Correction571

C Guidelines for Installing UTP Cable574

D Network Design and Analysis Guidelines;Network Politics576

E X.25582

Glossary587

Index617

热门推荐