书籍详情

数据通信原理、技术与应用:英文版

数据通信原理、技术与应用:英文版

作者:William Stallings著

出版社:清华大学出版社

出版时间:2005-07-01

ISBN:9787302111528

定价:¥38.00

购买这本书可以去
内容简介
  本书是著名作者William Stalling关于计算机网络化技术的最新力作。本书采用案例教学方法,详细介绍了应用于事务领域的数据通信和计算机网络的基本知识、规律、应用的技术和发展的方向。 本书的特点是系统性和实用性。本书除了阐述事务数据通俗的基本规律相关的基本概念之外,还介绍了因特网和万维网全面的知识,以及组织内部数据通信最新和最重要的技术——内联网技术和外联网技术的详细实例,并给出了事和环境和事务管理中关键的技术:局域网、广域网、高速网、ATM和TCP/IP协议簇。 本书可作为大学本科生和研究生的教材,也可用作专业人员的参考用书。
作者简介
暂缺《数据通信原理、技术与应用:英文版》作者简介
目录
Preface xi
Chapter 1 Introduction 1
1.1 Information and Communication 2
1.2 Data Communications and Networking for Today's Enterprise 3
1.3 The Nature of Business Information Requirements 7
1.4 Distributed Data Processing 9
1.5 The Internet and Distributed Applications 9
1.6 Networks 11
1.7 The Transmission of Information 16
1.8 Management Issues 18
1.9 Standards 19
1.10 lnternet Resources 19
1.11 Useful Publications 20
1.12 Review Questions 22
Appendix 1A Prefixes for Numerical Units 22
PART ONE REQUIREMENTS 24
Chapter 2 Business Information 25
2.1 Audio 27
2.2 Data 28
2.3 Image 30
2.4 Video 33
2.5 Performance Measures 34
2.6 Summary 40
2.7 Recommended Reading and Web Sites 41
2.8 Key Terms, P,.eview Questions, and Problems 41
Chapter 3 Distributed Data Processing 45
3.1 Centralized versus Distributed Processing 47
3.2 Forms of Distributed Data Processing 56
3.3 Distributed Data 58
3.4 Networking Implications of DDP 63
3.5 Summary 65
3.6 Recommended Reading 65
3.7 Key Terms, Review Questions, and Problems 68
Case Study I MasterCard International 71
PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS 74
Chapter 4 Internet History and Architecture 76
4.1 Internet History 77
4.2 Internet Architecture 83
4.3 Internet Domains 87
4.4 Summary 93
4.5 Recommended Reading and Web Sites 93
4.6 Key Terms, Review Questions, and Problems 93
Chapter 5 TCP/IP and O$I 97
5.1 A Simple Protocol Architecture 99
5.2 The TCP/IP Protocol Architecture 106
5.3 Internetworking 113
5.4 TCP and IP Details 116
5.5 The OSI Protocol Architecture 122
5.6 Summary 127
5.7 Recommended Reading and Web Sites 127
5.8 Key Terms, Review Questions, and Problems 128
Appendix 5A The Trivial File Transfer Protocol 130
Case Stndy II Florida Department of Management Services 1135
Chapter 6 Internet-Based Applications 140
6.1 Electronic Mail and SMTP 142
6.2 Web Access and HTTP 155
6.3 Internet Telephony and SIP 160
6.4 Summary 171
6.5 Recommended Reading and Web Sites 172
6.6 Key Terms, P~eview Questions, and Problems 173
Chapter 7 Client-Server and Intranet Computing 175
7.1 The Growth of Client/Server Computing 176
7.2 Client/Server Applications 180
7.3 Middleware 186
7.4 Intranets 193
7.5 Extranets 197
7.6 Summary 201
7,7 Recommended Reading and Web Sites 201
7.8 Key Terms, Review Questions, and Problems 202
Case Study lit ING Life 205
Chapter 8 Internet Operation 208
8.1 Internet Addressing 209
8.2 Internet Routing Protocols 212
8.3 The Need for Speed and Quality of Service 2t9
8.4 Differentiated Services 224
8.5 Summary 232
8.6 Recommended Reading 233
8.7 Key Terms, Review Questions, and Problerns 234
PART THREE LOCAL AREA NETWORKS 236
Chapter 9 LAN Architecture and Protocols 238
9.1 Background 239
9.2 LAN Configuration 243
9.3 Guided Transmission Media 245
9.4 LAN Protocol Architecture 254
9.5 Summary 260
9.6 Recommended Reading and Web Sites 261
9.7 Key Terms, Review Questions, and Problems 261
Appendix 9A Decibels and Signal Strength 263
Chapter 10 Ethernet and Fibre Channel 266
10.1 The Emergence of High-Speed LANs 268
10.2 Traditional Ethernet 269
10.3 Bridges, Hubs, and Switches 273
10.4 High-Speed Ethernet 279
10.5 Fibre Channel 285
10.6 Summary 291
10.7 Recommended Reading andWeb Sites 292
10.8 Key Terms, Review Questions, and Problems 293
Case Study IV Carlson Companies 295
Chapter 11 Wireless LANs 298
11.1 Overview 299
11.2 IEEE 802.11 Wireless LAN Standard 304
11.3 Bluetooth 310
11.4 Summary 317
11.5 Recommended Reading andWeb Sites 317
11.6 Key Terms, Review Questions, and Problems 318
Case StudyV St. Luke's Episcopal Hospital 320
PART FOUR WIDE AREA NETWORKS 323
Chapter 12 Circuit Switching and Packet Switching 325
12.1 Switching Techniques 326
12.2 Circuit-Switching Networks 328
12.3 Packet-Switching Networks 335
12.4 Traditional Wide Area Network Alternatives 340
12.5 Summary 348
12.6 Recommended Reading and Web Sites 348
12.7 Key Terms, Review Questions, and Problems 349
Case Study VI Staten Island University Hospital 351
Chapter 13 Frame Relay and ATM 354
13.1 Wide Area Networking Alternatives 356
13.2 Frame Relay 360
13.3 Asynchronous Transfer Mode (ATM) 367
13.4 Summary 376
13.5 Recommended Reading and Web Sites 376
13.6 Key Terms, Review Questions, and Problems 377
Case Study VII Olsten Staffing Services 380
Case Study VIII Guardian Life, Insurance 382
Chapter 14 Wireless WANs 386
14.1 Cellular Wireless Networks 388
14.2 Multiple Access 395
14.3 Third-Generation Wireless Communication 400
14.4 Satellite Communications 403
14.5 Sumanary 411
14.6 Recommended Reading and Web Sites 411
14.7 Key Terms, Review Questions, and Problems 412
Case Study IX Choice Hotels International 415
PART FIVE DATA COMMUNICATIONS 418
Chapter 15 Data Transmission 420
15.1 Signals for Conveying Information 421
15.2 Transmission Impairments and Channel Capacity 430
15.3 Summary 438
15.4 Recommended Reading 438
15.5 Key Terms, Review Questions, and Problems 439
Chapter 16 Data Communication Fundamentals 441
16.1 Analog and Digital Data Communications 442
16.2 Data Encoding Techniques 446
16.3 Asynchronous and Synchronous Transmission 455
16.4 Error Detection 459
16.5 Summary 462
16.6 Recommended Reading and Web Sites 463
16.7 Key Terms, Review Questions, and Problems 463
Chapter 17 Data Link Control and Multiplexing 466
17.1 Flow Control and Error Control 468
17.2 High-Level Data Link Control 470
17.3 Motivation for Multiplexing 475
17.4 Frequency Division Multiplexing 476
17.5 Synchronous Time Division Multiplexing 483
17.6 Summary 490
17.7 Recommended Reading and Web Sites 490
17.8 Key Terms, Review Questions, and Problems 491
Case Study X Haukekeland University Hospital 493
PART SIX AGEMENT ISSUES 496
Chapter 18 Network Security 498
18.1 Security Requirements and Attacks 500
18.2 Confidentiality with Symmetric Encryption 501
18.3 Message Authentication and Hash Functions 510
18.4 Public-Key Encryption and Digital Signatures 515
18.5 Virtual Private Networks and IPSec 522
18.6 Summary 529
18.7 Recommended Reading and Web Sites 530
18.8 Key Terms, Review Questions, and Problems 531
Case Study XI The Hacker in All of Us 534
Chapter 19 Network Management 539
19.1 Network Management Requirements 541
19.2 Network Management Systems 544
19.3 Simple Network Management Protocol (SNMP) 546
19.4 Recommended Reading andWeb Sites 557
19.5 Key Terms, Review Questions, and Problems 558
Glossary 560
References 567
猜您喜欢

读书导航