书籍详情
数据通信与网络教程:英文版
作者:(美)沙伊(William A.Shay)著
出版社:机械工业出版社
出版时间:2003-01-01
ISBN:9787111108399
定价:¥69.00
购买这本书可以去
内容简介
The first edition of this book first appeared four years ago; much in the fields of data communications and computer networks has changed since then. Probably most visible is the emergence of the World Wide Web (WWW) and the many applications it supports. Perhaps less visible is the impact the Web has had on underlying network protocols to support these applications and the increased importance of issues involving privacy and security. In just a few years the scope of network users has changed forever. Not long ago most network users were primarily professionals,who might use email occasionally to talk to colleagues or request some vital information. Now network users number in the tens of millions and their uses range from professional needs to purely recreational activities. Although much of this book's content has changed, its purpose is still fundamentally tbe same. It is designed for junior-level students in a computer science program who have a minimum of two semesters of programming and a knowledge of precalculus and discrete mathematics. It covers standard topics found in a typical introductory course in data communications and computer networks, such as transmission media, analog and digital signals, data transmissions, compression and encryption methods, network topologies, data security, Ethernets and token ring protocols, wide area network protocols, and World Wide Web applications.
作者简介
暂缺《数据通信与网络教程:英文版》作者简介
目录
CHAPTER 1 INIRODUCTION TO COMMUNICATIONS, STANOARDS,
AND PTOTOCOLS
1 .1 WHY STUDY CoMMUNICATIONS?
A Brief History I · Applications 3 · Issues 6
1 .2 COMPUTER NETWORKS
Common Bus Topology 9 · Star Topology IO ·
Ring Topology 11· Fully Connected Topology l2 · Combined Topologies l3
1.3 STANDARDS AND STANDARDS ORGANIZATIONS
The Need for STandards 14 v Agencies l5
1.4 OPEN SYSTEMS AND THE OSI MODEL
Overview of the Model 20 · Physical Layer 23·Data Link Layer 28 · Network Layer 30· Transport
Layer 32 · Session Layer 38 · Presentation Layer 42 · Application Layer 45 · Summary 46
1.5 THE FUTURE OF DATA CoMMUNICTIONS
REVIEW QUESTIONS 51 ·EXERCISE5 53 · REFETENCES 54(HAPIER 2 IRANSMISSON FUNDAMENTALS
2.1 COMMUNICATIONS MEDIA
Conductive Mebal 59 · Optical Fiber 62 · Wireless Communications 66 · Summary · 8 1
2.2 COMMUNICATloN SERVICES AND DEVICES
Telephone System 83 · Integrated Services Digital Network 87 · Cellular Phones 88 · Fax Machines 90
2.3 Cooes
ASCII Code 93 · EBCDIC Code 94 · Baudot, Morse, and BCD Codes 97
2.4 ANALOG AND DIGITAL SIGNALS
Digital Encoding Schemes l02 · Analog Signals 105 Bit Rate 110
2.5 MODULATION AND DEMODULATION
Digital-to-Analog Conversion 116· Analog-to-Digital Conversion 121
2.6 MODEMS AND MODEM STANDARDS
Signal Constellation 126· Intelligent (Hayes Compatible)Modems 130 · Cable Modems 131· Null Modems 135
2.7 SUMMARY
REVIEW QUESTIONS 137· EXERCISES 139· REFEREMCES 143
CHAPTER 3 OATA COMMUNICATION
3.1 TRANSSION MODES
Serial and Parallel Transmission 146 · Asynchronous and Synchronous Transmission 147 · Simplex, Half-Duplex, and Full-Duplex Commanications 150
3.2 INTERFACE STANDARDS
RS-232 Interfce 152 · RS-232 Subsets 155· Null Modems 156 · RS-449 Interface 157 · X.21 Interface 159
3.3 MuLTIPLEXING
Frequency-Division Multiplexing 163· Time-Division Multiplexing 165 · Statistical Multiplexers 167 T-I CaRRier 169
3.4 CONTENTION PRoTocoLs
Aloha Protocols 174 · Carrier Sense Multiple Access 177 · Collision Detection 180 · Token
Passing 183 · Summary of prtocols 187
3.5 DATA COMPRESSION
Huffman Code 189 · Run-Length Encoding 192 · Relative Encoding 194 · Lempel-Ziv Encoding 195 · Image Compression 201 ·JPEG 203 · MPEG 211 · Summary of Compression Techniques 216
3.6 SUMMARY
REVIEW QUESTIONS 218 · EXERCISES 220 · REFERENCES 224
CHAPTER 4 DATA SECURITY AND INIEGRITY
4.1 INTRODUCTION
4.2 PARITY CHECKING
Parity Checking Analysis 228 · Double-Bit Error Detection 229 · Burst Error Detection 229
4.3 CVCLIC REDUNDANEY CHECKS
Polynomial Division 232 · How CRC Works 233 Analysis of CRC 235 · CRC Implementation Using Circular Shifts 239
4.4 HAMMING CODES
Single-Bit Error Correction 241 · Multiple-Bit Error Correction 244 · Comparison of Error Detection and Error Correcrion 244 ·
4.5 ENCRYPTION AND DECRYPTION
Caesar Cipher 247 · Polyalphabetic Cipher 248 · Transposition Cipher 250 · Bit-Level Ciphering 251· Data Encryption Standard 252 · Clipper Chip 256 · Key DisRibution and Protection 260 · Merkle's Puzles 260 · Shamir's Method 261
4.6 PUBLIC KEV ENCRYPTION
RSA Algorithm 264 · Digital Signatures 266 · Authentication Using Hash-Based Schemes 268 · Summary of Encryption Methods 272 · Encryption Potpouni 272
4.7 VIRUSES, WORMS, AND HACKERS
Infecting Files 275 · Memory-Resident Viruses 276 Virus Evolution 277 · Virus Sources 281 · The Internet Worm 281 · Computer Hackers 283
4.8 SuMMARY
RECIEW QUESTIONS 286 · EXERCISES 288 · REFERENCES 291
CHAPTER 5 PROTOCOL CONCEPTS
5.1 INTRODUCTION
5.2 BASIC FLOW CONTROL
Signaling 295 · Frame-Oriented ConUol 297 Protocol Efficiency 301
5.3 SLIDING WINDOW PRoTocoLs
Frame Format 306 · Go-back-n Protocol 307 Selective Repeat Protocol 314 · Sliding Window Protocol Efficiency 322 · Summary of Protocols 324
5.4 PROTOCOL CORRECTNESS
Finite State Machines 325 · Petri Nets 331
5.5 DATA LINK CONTROL PROTOCOLS
High-Level Data Link Control (HDLC) 336 · Other Bit-Oriented hotocols 344 · Binary Synchronous Communications Protocol 345 · Summary: Data Link Protocols 349
5.6 CASE STUDY: KERMIT
Frame Format 351 · Protocol 352 ·Commands 354
5.7 SUMMARY
REVIEW QUESTIONS 357 · EXERCISES 359 · REFERENCES 363
CHAPTER 6 LOCAL AREA NEIWORKING
6.1 NeTWORK TOPOLOGIES
6.2 ETHERNET: IEEE STANDARD 802.3
Relation to OSI 368 · Ethernet Components 368 · Cabe Specifications 371 · Connecting Segments 373 · Frame Format 374 · Efficiency 375
6.3 TOKEN RING: IEEE STANDARD 802.5
Token and Frame Formats 381 · Resercing and Claiming Tokens 383 · Ring Maintenance 389 · Efficiency 39l · Other Ring Networks 39
6.4 TOKEN Bus: IEEE STANDARD 802.4
Token Bus Operations 399 · Lost Tokens 402 Ring Initialization 403 · Prioritizing Frames 404\
6.5 INTERCONNECTING LANs
Layer l Connections 409 · Layer 2 Connections 410 Bridging Different TYpes of LANs 411 · Bridge Routing 413 Summary 426
6.6 CASE STUDY: NOVELL NETWARE
NetWare Configuration 427 · Running Novell NetWare 429 · Security and Integrity 431 · Selected Novell Commands 434 · Login Scripts 436
6.7 SUMMARY
REVIEW QUESTIONS 440 · EXERCISES 443 · REFERENCES 446
CHAPIER 7 WIDE AREA NETWORKINe
7.1 INTROUCTION
7.2 NETWORK ROUTING
Routing Tables 452 · Types of Routing 453 Dijkstra's Algorithm 456 · Bellman-Ford Algorithm 459
Link State Routing 466 · Hierarchical Routing 467 Routing Information Protocol 470 · Open Shortest Path First 471 · Border Gateway Protocol 472 · Summary of Routing Techniques 473 · Congestion and Deadlock 473
7.3 PUBLIC DATA NETWORKS: THe X SERIES PROTOCOLS
Packet-Switched Network Modes 479 · X.25 Public Data Network Interface Standard 481 · Triple-X Standard for Non-X.25 Devices 486
7.4 INTERNET PROTOCLS
Overview of TCP/IP 491 · Internet Addressing 493 · Domain Name System 495 · IP Packets 497 · Fragmentation 500 · IP Routing 501 · Internet Control Message Protocol 504 · IPv6 506
7.5 TRANSPORT PROTOCOLS
Transmission Control Protocol 518 · User Datagram Protocol 529 · OSI Transport Protocols 529
7.6 SOCKET PRIGRAMMING
Sockets 532 · ClienT/Server Model 532 · Socket Data Structures 533 · Socket Commands 535 · Client/Server Example 535
7.7 SUMMARY
REVIEW QUESTIONS 551 · EXERCISES 553 · REFETENCES 557
CHAPTER 8 ADDITIONAL NETWORK PROTOCOLS
8.1 INTERNET APPLlCATlONS
Virtual Terminal 559 · Telnet 560 · File Transfers 564 Simple Mail Transfer Protocol 571 · Simple Network Management Protocol 573
8.2 WORLD WIDE WEN
Web Page Access 577 · Hypertext Markup Language 579 · HTML Forms 582 · JavaScript and Client-side Programming 587 · Common Gateway Interface and Server-side Programming 592
8.3 ELECTRONIC MAIL: X.400 AND X.500 STANDARDS
X.400 Mail Standards 598 · X.500 Directory Service 606 · Summary 610
8.4 INTEGRATED SERVICES DIGITAL NETWORK
ISDN Services 612 · ISDN Architecture 613 Protocols 6l5 · Broadband ISDN 624
8.5 ASYNCHRONOUS TRANSFER MODE
Benefits of Small Fixed-Size Cells 626 · Overview of ATM Network 628 · Switching 629 · Reference Model 631 · Cell Definition 633 · Virtual Circuits and Paths 636 · Connection Management 637 · Adaptation Layers 639
8.6 SYSTEMS NETWORK ARCHITECTURE
Lower Layers Physical Link Control 647 · Path Control 648 · Trznsmission Control 654 · Data Flow Control 657 · Higher Layers 659 REVIEW QUESTIONS 661 · EXERCISES 663 · REFERENCES 665
GLOSSARY
ACRONYMS
INDEX
AND PTOTOCOLS
1 .1 WHY STUDY CoMMUNICATIONS?
A Brief History I · Applications 3 · Issues 6
1 .2 COMPUTER NETWORKS
Common Bus Topology 9 · Star Topology IO ·
Ring Topology 11· Fully Connected Topology l2 · Combined Topologies l3
1.3 STANDARDS AND STANDARDS ORGANIZATIONS
The Need for STandards 14 v Agencies l5
1.4 OPEN SYSTEMS AND THE OSI MODEL
Overview of the Model 20 · Physical Layer 23·Data Link Layer 28 · Network Layer 30· Transport
Layer 32 · Session Layer 38 · Presentation Layer 42 · Application Layer 45 · Summary 46
1.5 THE FUTURE OF DATA CoMMUNICTIONS
REVIEW QUESTIONS 51 ·EXERCISE5 53 · REFETENCES 54(HAPIER 2 IRANSMISSON FUNDAMENTALS
2.1 COMMUNICATIONS MEDIA
Conductive Mebal 59 · Optical Fiber 62 · Wireless Communications 66 · Summary · 8 1
2.2 COMMUNICATloN SERVICES AND DEVICES
Telephone System 83 · Integrated Services Digital Network 87 · Cellular Phones 88 · Fax Machines 90
2.3 Cooes
ASCII Code 93 · EBCDIC Code 94 · Baudot, Morse, and BCD Codes 97
2.4 ANALOG AND DIGITAL SIGNALS
Digital Encoding Schemes l02 · Analog Signals 105 Bit Rate 110
2.5 MODULATION AND DEMODULATION
Digital-to-Analog Conversion 116· Analog-to-Digital Conversion 121
2.6 MODEMS AND MODEM STANDARDS
Signal Constellation 126· Intelligent (Hayes Compatible)Modems 130 · Cable Modems 131· Null Modems 135
2.7 SUMMARY
REVIEW QUESTIONS 137· EXERCISES 139· REFEREMCES 143
CHAPTER 3 OATA COMMUNICATION
3.1 TRANSSION MODES
Serial and Parallel Transmission 146 · Asynchronous and Synchronous Transmission 147 · Simplex, Half-Duplex, and Full-Duplex Commanications 150
3.2 INTERFACE STANDARDS
RS-232 Interfce 152 · RS-232 Subsets 155· Null Modems 156 · RS-449 Interface 157 · X.21 Interface 159
3.3 MuLTIPLEXING
Frequency-Division Multiplexing 163· Time-Division Multiplexing 165 · Statistical Multiplexers 167 T-I CaRRier 169
3.4 CONTENTION PRoTocoLs
Aloha Protocols 174 · Carrier Sense Multiple Access 177 · Collision Detection 180 · Token
Passing 183 · Summary of prtocols 187
3.5 DATA COMPRESSION
Huffman Code 189 · Run-Length Encoding 192 · Relative Encoding 194 · Lempel-Ziv Encoding 195 · Image Compression 201 ·JPEG 203 · MPEG 211 · Summary of Compression Techniques 216
3.6 SUMMARY
REVIEW QUESTIONS 218 · EXERCISES 220 · REFERENCES 224
CHAPTER 4 DATA SECURITY AND INIEGRITY
4.1 INTRODUCTION
4.2 PARITY CHECKING
Parity Checking Analysis 228 · Double-Bit Error Detection 229 · Burst Error Detection 229
4.3 CVCLIC REDUNDANEY CHECKS
Polynomial Division 232 · How CRC Works 233 Analysis of CRC 235 · CRC Implementation Using Circular Shifts 239
4.4 HAMMING CODES
Single-Bit Error Correction 241 · Multiple-Bit Error Correction 244 · Comparison of Error Detection and Error Correcrion 244 ·
4.5 ENCRYPTION AND DECRYPTION
Caesar Cipher 247 · Polyalphabetic Cipher 248 · Transposition Cipher 250 · Bit-Level Ciphering 251· Data Encryption Standard 252 · Clipper Chip 256 · Key DisRibution and Protection 260 · Merkle's Puzles 260 · Shamir's Method 261
4.6 PUBLIC KEV ENCRYPTION
RSA Algorithm 264 · Digital Signatures 266 · Authentication Using Hash-Based Schemes 268 · Summary of Encryption Methods 272 · Encryption Potpouni 272
4.7 VIRUSES, WORMS, AND HACKERS
Infecting Files 275 · Memory-Resident Viruses 276 Virus Evolution 277 · Virus Sources 281 · The Internet Worm 281 · Computer Hackers 283
4.8 SuMMARY
RECIEW QUESTIONS 286 · EXERCISES 288 · REFERENCES 291
CHAPTER 5 PROTOCOL CONCEPTS
5.1 INTRODUCTION
5.2 BASIC FLOW CONTROL
Signaling 295 · Frame-Oriented ConUol 297 Protocol Efficiency 301
5.3 SLIDING WINDOW PRoTocoLs
Frame Format 306 · Go-back-n Protocol 307 Selective Repeat Protocol 314 · Sliding Window Protocol Efficiency 322 · Summary of Protocols 324
5.4 PROTOCOL CORRECTNESS
Finite State Machines 325 · Petri Nets 331
5.5 DATA LINK CONTROL PROTOCOLS
High-Level Data Link Control (HDLC) 336 · Other Bit-Oriented hotocols 344 · Binary Synchronous Communications Protocol 345 · Summary: Data Link Protocols 349
5.6 CASE STUDY: KERMIT
Frame Format 351 · Protocol 352 ·Commands 354
5.7 SUMMARY
REVIEW QUESTIONS 357 · EXERCISES 359 · REFERENCES 363
CHAPTER 6 LOCAL AREA NEIWORKING
6.1 NeTWORK TOPOLOGIES
6.2 ETHERNET: IEEE STANDARD 802.3
Relation to OSI 368 · Ethernet Components 368 · Cabe Specifications 371 · Connecting Segments 373 · Frame Format 374 · Efficiency 375
6.3 TOKEN RING: IEEE STANDARD 802.5
Token and Frame Formats 381 · Resercing and Claiming Tokens 383 · Ring Maintenance 389 · Efficiency 39l · Other Ring Networks 39
6.4 TOKEN Bus: IEEE STANDARD 802.4
Token Bus Operations 399 · Lost Tokens 402 Ring Initialization 403 · Prioritizing Frames 404\
6.5 INTERCONNECTING LANs
Layer l Connections 409 · Layer 2 Connections 410 Bridging Different TYpes of LANs 411 · Bridge Routing 413 Summary 426
6.6 CASE STUDY: NOVELL NETWARE
NetWare Configuration 427 · Running Novell NetWare 429 · Security and Integrity 431 · Selected Novell Commands 434 · Login Scripts 436
6.7 SUMMARY
REVIEW QUESTIONS 440 · EXERCISES 443 · REFERENCES 446
CHAPIER 7 WIDE AREA NETWORKINe
7.1 INTROUCTION
7.2 NETWORK ROUTING
Routing Tables 452 · Types of Routing 453 Dijkstra's Algorithm 456 · Bellman-Ford Algorithm 459
Link State Routing 466 · Hierarchical Routing 467 Routing Information Protocol 470 · Open Shortest Path First 471 · Border Gateway Protocol 472 · Summary of Routing Techniques 473 · Congestion and Deadlock 473
7.3 PUBLIC DATA NETWORKS: THe X SERIES PROTOCOLS
Packet-Switched Network Modes 479 · X.25 Public Data Network Interface Standard 481 · Triple-X Standard for Non-X.25 Devices 486
7.4 INTERNET PROTOCLS
Overview of TCP/IP 491 · Internet Addressing 493 · Domain Name System 495 · IP Packets 497 · Fragmentation 500 · IP Routing 501 · Internet Control Message Protocol 504 · IPv6 506
7.5 TRANSPORT PROTOCOLS
Transmission Control Protocol 518 · User Datagram Protocol 529 · OSI Transport Protocols 529
7.6 SOCKET PRIGRAMMING
Sockets 532 · ClienT/Server Model 532 · Socket Data Structures 533 · Socket Commands 535 · Client/Server Example 535
7.7 SUMMARY
REVIEW QUESTIONS 551 · EXERCISES 553 · REFETENCES 557
CHAPTER 8 ADDITIONAL NETWORK PROTOCOLS
8.1 INTERNET APPLlCATlONS
Virtual Terminal 559 · Telnet 560 · File Transfers 564 Simple Mail Transfer Protocol 571 · Simple Network Management Protocol 573
8.2 WORLD WIDE WEN
Web Page Access 577 · Hypertext Markup Language 579 · HTML Forms 582 · JavaScript and Client-side Programming 587 · Common Gateway Interface and Server-side Programming 592
8.3 ELECTRONIC MAIL: X.400 AND X.500 STANDARDS
X.400 Mail Standards 598 · X.500 Directory Service 606 · Summary 610
8.4 INTEGRATED SERVICES DIGITAL NETWORK
ISDN Services 612 · ISDN Architecture 613 Protocols 6l5 · Broadband ISDN 624
8.5 ASYNCHRONOUS TRANSFER MODE
Benefits of Small Fixed-Size Cells 626 · Overview of ATM Network 628 · Switching 629 · Reference Model 631 · Cell Definition 633 · Virtual Circuits and Paths 636 · Connection Management 637 · Adaptation Layers 639
8.6 SYSTEMS NETWORK ARCHITECTURE
Lower Layers Physical Link Control 647 · Path Control 648 · Trznsmission Control 654 · Data Flow Control 657 · Higher Layers 659 REVIEW QUESTIONS 661 · EXERCISES 663 · REFERENCES 665
GLOSSARY
ACRONYMS
INDEX
猜您喜欢