书籍详情
数据通信与网络(第2版 英文影印版)
作者:(美)William A.Shay
出版社:中信出版社
出版时间:2002-09-01
ISBN:9787800733826
定价:¥69.00
内容简介
ACCA——国际领先的专业会计师组织一百多年来,英国特许公认会计师公会(The Association of CharteredCertified Accountants,简称ACCA)在全世界范围内备受尊崇。无论您的背景如何。ACCA都能通过使您受益终生的课程满足您个性化的需求和目标。ACCA成立于1904年,是目前世界上最负盛名的专业会计师团体之一,也是国际上海外学员最多、学员规模发展最快的专业会计师组织。目前在160个国家和地区拥有近30万会员和学员,设有200多个考点,具有真正的国际性。ACCA以高质量的课程设计,高标准的培训要求和高水平的考试安排,赢得联合国和大量国际组织的高度评价,更为众多的跨国公司和专业机构所推崇。ACCA以其独到的全球观念引领会计培训之新潮,率先全面推出以国际会计准则和国际审计准则为基础的教材和考试,以适应世界经济一体化的大趋势。ACCA与我国合作培养的人才,大部分在政府机构、三资企业、著名会计师事务所和大型企业中担任重要职务。
作者简介
刘伟华,男,1971年出于山东省威海市。1996年毕业于外交学院,获文学硕士学位;1996年11月赴日本开发银行研修,并获开发金融管理证书;2000年毕业于英国爱丁堡商学院,获工商管理硕士学位。刘伟华在投资管理、企业融资、兼并收购、公司战略等方面富有经验。精通英、德两门外语,是瓦特俱乐部的会员并入选《国际专业人士名人录》。刘伟华自1996年起就职于国家开发银行,曾任开行国际基金部经理,参与首家中外合资基金——中瑞合作基金的创建和管理,负责基金在项目和投资组合两层面的管理与运营。同时,他是开行投资银行业务的设施项目的投资和融资业务,并涉足商业货款。出口信货和资本市场等传统银行业务。TOP目录 引 言 如何使用本交互式教材—学习大纲—学习指导—考试结构 A部分:财务战略的性质和范围第 1 章 财务战略的性质和范围 B部分:投资评估第 2 章 资本投资 第 3 章 投资评估的折现现金流法第 4 章 项目评估、敏感性分析和资本分配第 5 章 折现现金流法中的通货膨胀和税务因素C部分:融资第 6 章 融资渠道:股本金第 7 章 其他融资渠道第 8 章 融资方式第 9 章 资金成本D部分:资本市场第10章 资本市场第11章 股市的效率E部分:流动资金第12章 流动资金管理简介第13章 库存和应收款管理第14章 现金和应付款的管理F部分:兼并与收购第15章 兼并与收购第16章 企业估值第17章 公司重组模拟试题库模拟试题库答案数学表专有名词对照表 TOP 其它信息 装帧:平装页数:426 开本:16正文语种:中文
目录
CHAPTER 1 INIRODUCTION IO COMMUNICATIONS, STANDARDS, AND PROTOCOLS
1 .1 WHY STUDY COMMUNICATIONS?
A Brief History
Applications
Issues
1.2 COMPUTER NETWORKS
Common Bus Topology
Star Topology
Ring Topology
Fully Connected Topology
Combined Topologies
1.3 STANDARDS AND STANDARDS ORGANIZATIONS
The Need for Standards
Agencies
1.4 OPEN SYSTEMS AND THE OSI MODEL
Overview of the Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Summary
1.5 THE FUTURE OF DATA COMMUNICATIONS
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 2 TRANSMISSION FUNDAMERTALS
2.1 COMMUNICATIONS MEDIA
Conductive Metal
Optical Fiber
Wireless Communications
Summary
2.2 COMMUNIICATION SERVICES AND DEVICES
Telephone System
Integrated Services Digital Network
Cellular Phones
Fax Machines
2.3 CODES
ASCII Code
EBCDIC Code
Baudot, Morse, and BCD Codes
2.4 ANALOG AND DIGITAL SIGNALS
Digital Encoding Schemes
Analog Signals
Bit Rate
2.5 MODULATION AND DEMODULATION
Digital-to-Analog Conversion
Analog-to-Digital Conversion
2.6 MODEMS AND WODEM STANDARDS
Signal Constellation
Intelligent (Hayes Compatible) Modems
Cable Modems
Null Modems
2.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 3 DATA COMMUNICATION
3. 1 TRANSMISSION MODES
Serial and Parallel Transmission
Asynchronous and Synchronous Transmission
Simplex, Half-Duplex, and Full-Duplex Communications
3. 2 INTERFACE STANDARDS
RS-232 Interface
RS-232 Subsets
Null Modems
RS-449 Interface
X.2l Interface
3.3 MULTIPLEXING
Frequency-Division Multiplexing
Time-Division Multiplexing
Statistical Multiplexers
T-l Carrier
3. 4 CONTENTION PROTOCOLS
Aloha Protocols
Carrier Sense Multiple Access
Collision Detection
Token Passing
Summary of Protocols
3.5 DATA COMPRESSION
Huffman Code
Run-Length Encoding
Relative Encoding
Lempel-Ziv Encoding
Image Compression
JPEG
MPEG
Summary of Compression Techniques
3.6 SUMMARY
REVIEW QUESTIONS
EXERCISE5
REFERENCES
CHAPTER 4 DATA SECURITV AND INIEGRITV
4.1 INTRODUCTION
4.2 PARITY CHECKING
Parity Checking Analysis
Double-Bit Error Detection
Burst Error Detection
4.3 CYCLIC REDUNDANCY CHECKS
Polynomial Division
How CRC Works
Analysis of CRC
CRC Implementation Using Circular Shifts
4.4 HAMMING CODES
Single-Bit Error Correction
Multiple-Bit Error Correction
Comparison of Error Detection and Error Correction
4.5 ENCRVPTION AND DECRVPTION
Caesar Cipher
Polyalphabetic Cipher
Transposition Cipher
Bit-Level Ciphering
Data Encryption Standard
Clipper Chip
Key Distribution and Protection
Merkle's Puzzles
Shamir's Method
4.6 PUBLIC KEY ENCRVPTION
RSA Algorithm
Digital Signatures
Authentication Using Hash-Based Schemes
Summary of Encryption Methods
Encryption Potpourri
4.7 VIRUSES, WORMS AND HACKERS
Infecting Files
Memory-Resident Viruses
Virus Evolution
Virus Sources
The Internet Worm
Computer Hackers
4.8 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 5 PROTOCOL CONCEPTS
5.1 INTRODUCTION
5.2 BASIC FLOW CONTROL
Signaling
Frame-Oriented Control
Protocol Efficiency
5.3 SLIDING WINDOW PROTOCOLS
Frame Format
Go-back-n Protocol
Selective Repeat Protocol
Sliding Window Protocol Efficiency
Summary of Protocols
5.4 PROTOCOL CORRECTNESS
Finite State Machines
Petri Nets
3.3 DATA LINK CONTROL PROTOCOLS
High-Level Data Link Control (HDLC)
Other Bit-Oriented Protocols
Binary Synchronous Communications Protocol
Summary: Data Link Protocols
5.6 CASE STUDY: KERMIT
Frame Format
Protocol
Commands
5.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 6 LOCAL AREA NETWORKING
6.1 NETWORK TOPOLOGIES
6.2 ETHERNET: IEEE STANDARD 802.3
Relation to OSI
Ethernet Components
Cable Specifications
Connecting Segments
Frame Format
Efficiency
6.3 TOKEN RING: IEEE STANDARD 802.5
Token and Frame Formats
Reserving and Claiming Tokens
Ring Maintenance
Efficiency
Other Ring Networks
6.4 TOKEN Bus: IEEE STANDARD 802.4
Token Bus Operations
Lost Tokens
Ring Initialization
Prioritizing Frames
6.5 INTERCONNECTING LANS
Layer l Connections
Layer 2 Connections
Bridging Different Types of LANs
Bridge Routing
Summary
6.6 CASE STUDY: NOVELL NETWARE
NetWare Configuration
Running Novell NetWare
Security and Integrity
Selected Novell Commands
Login Scripts
6.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 7 WIDE AREA NETWORKING
7.1 INTRODUCTION
7.2 NETWORK ROUTING
Routing Tables
Types of Routing
Dijkstra's Algorithm
Bellman-Ford Algorithm
Link State Routing
Hierarchical Routing
Routing Information Protocol
Open Shortest Path First
Border Gateway Protocol
Summary of Routing Techniques
Congestion and Deadlock
7.3 PUBLIC DATA NETWORKS: THE X SERIES PROTOCOLS
Packet-Switched Network Modes
X.25 Public Data Network Interface Standard
Triple-X Standard for Non-X.25 Devices
7. 4 INTERNET PROTOCOLS
Overview of TCP/IP
Internet Addressing
Domain Name System
IP Packets
Fragmentation
IP Routing
Internet Control Message Protocol
IPv6
7.5 TRANSPRT PROTOCOLS
Transmission Control Protocol
User Datagram Protocol
OSI Transport Protocols
7.6 SOCKET PROERAMMING
Sockets
Client/Server Model
Socket Data Structures
Socket Commands
Client/Server Example
7.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 8 ADDITIONAL NEIWORK PROTOCOLS
8.1 INTERNET APPLICATIONS
Virtual Terminal
Telnet
File Transfers
Simple Mail Transfer Protocol
Simple Network Management Protocol
8.2 WORLD WIDE WEB
Web Page Access
Hypertext Markup Language
HTML Forms
JavaScript and Client-side Programming
Common Gateway Interface and Server-side Programming
8.3 ELECTRONIC MAIL: X.400 AND X.500 STANDARDS
X.400 Mail Standards
X.500 Directory Service
Summary
8.4 INTEGRATED SERVICES DIGITAL NETWORK
ISDN Services
ISDN Architecture
Protocols
Broadband ISDN
8.5 ASYNCHRONOUS TRANSFER MODE
Benefits of Small Fixed-Size Cells
Overview of ATM Network
Switching
Reference Model
Cell Definition
Virtual Circuits and Paths
Connection Management
Adaptation Layers
8.6 SYSTEMS NETWORK ARCHITECTURE
Lower Layers Physical Link Control
Path Control
Transmission Control
Data Flow Control
Higher Layers
REVIEW QUESTIONS
EXERCISES
REFERENCES
GLOSSARY
ACRONYMS
INDEX
1 .1 WHY STUDY COMMUNICATIONS?
A Brief History
Applications
Issues
1.2 COMPUTER NETWORKS
Common Bus Topology
Star Topology
Ring Topology
Fully Connected Topology
Combined Topologies
1.3 STANDARDS AND STANDARDS ORGANIZATIONS
The Need for Standards
Agencies
1.4 OPEN SYSTEMS AND THE OSI MODEL
Overview of the Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Summary
1.5 THE FUTURE OF DATA COMMUNICATIONS
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 2 TRANSMISSION FUNDAMERTALS
2.1 COMMUNICATIONS MEDIA
Conductive Metal
Optical Fiber
Wireless Communications
Summary
2.2 COMMUNIICATION SERVICES AND DEVICES
Telephone System
Integrated Services Digital Network
Cellular Phones
Fax Machines
2.3 CODES
ASCII Code
EBCDIC Code
Baudot, Morse, and BCD Codes
2.4 ANALOG AND DIGITAL SIGNALS
Digital Encoding Schemes
Analog Signals
Bit Rate
2.5 MODULATION AND DEMODULATION
Digital-to-Analog Conversion
Analog-to-Digital Conversion
2.6 MODEMS AND WODEM STANDARDS
Signal Constellation
Intelligent (Hayes Compatible) Modems
Cable Modems
Null Modems
2.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 3 DATA COMMUNICATION
3. 1 TRANSMISSION MODES
Serial and Parallel Transmission
Asynchronous and Synchronous Transmission
Simplex, Half-Duplex, and Full-Duplex Communications
3. 2 INTERFACE STANDARDS
RS-232 Interface
RS-232 Subsets
Null Modems
RS-449 Interface
X.2l Interface
3.3 MULTIPLEXING
Frequency-Division Multiplexing
Time-Division Multiplexing
Statistical Multiplexers
T-l Carrier
3. 4 CONTENTION PROTOCOLS
Aloha Protocols
Carrier Sense Multiple Access
Collision Detection
Token Passing
Summary of Protocols
3.5 DATA COMPRESSION
Huffman Code
Run-Length Encoding
Relative Encoding
Lempel-Ziv Encoding
Image Compression
JPEG
MPEG
Summary of Compression Techniques
3.6 SUMMARY
REVIEW QUESTIONS
EXERCISE5
REFERENCES
CHAPTER 4 DATA SECURITV AND INIEGRITV
4.1 INTRODUCTION
4.2 PARITY CHECKING
Parity Checking Analysis
Double-Bit Error Detection
Burst Error Detection
4.3 CYCLIC REDUNDANCY CHECKS
Polynomial Division
How CRC Works
Analysis of CRC
CRC Implementation Using Circular Shifts
4.4 HAMMING CODES
Single-Bit Error Correction
Multiple-Bit Error Correction
Comparison of Error Detection and Error Correction
4.5 ENCRVPTION AND DECRVPTION
Caesar Cipher
Polyalphabetic Cipher
Transposition Cipher
Bit-Level Ciphering
Data Encryption Standard
Clipper Chip
Key Distribution and Protection
Merkle's Puzzles
Shamir's Method
4.6 PUBLIC KEY ENCRVPTION
RSA Algorithm
Digital Signatures
Authentication Using Hash-Based Schemes
Summary of Encryption Methods
Encryption Potpourri
4.7 VIRUSES, WORMS AND HACKERS
Infecting Files
Memory-Resident Viruses
Virus Evolution
Virus Sources
The Internet Worm
Computer Hackers
4.8 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 5 PROTOCOL CONCEPTS
5.1 INTRODUCTION
5.2 BASIC FLOW CONTROL
Signaling
Frame-Oriented Control
Protocol Efficiency
5.3 SLIDING WINDOW PROTOCOLS
Frame Format
Go-back-n Protocol
Selective Repeat Protocol
Sliding Window Protocol Efficiency
Summary of Protocols
5.4 PROTOCOL CORRECTNESS
Finite State Machines
Petri Nets
3.3 DATA LINK CONTROL PROTOCOLS
High-Level Data Link Control (HDLC)
Other Bit-Oriented Protocols
Binary Synchronous Communications Protocol
Summary: Data Link Protocols
5.6 CASE STUDY: KERMIT
Frame Format
Protocol
Commands
5.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 6 LOCAL AREA NETWORKING
6.1 NETWORK TOPOLOGIES
6.2 ETHERNET: IEEE STANDARD 802.3
Relation to OSI
Ethernet Components
Cable Specifications
Connecting Segments
Frame Format
Efficiency
6.3 TOKEN RING: IEEE STANDARD 802.5
Token and Frame Formats
Reserving and Claiming Tokens
Ring Maintenance
Efficiency
Other Ring Networks
6.4 TOKEN Bus: IEEE STANDARD 802.4
Token Bus Operations
Lost Tokens
Ring Initialization
Prioritizing Frames
6.5 INTERCONNECTING LANS
Layer l Connections
Layer 2 Connections
Bridging Different Types of LANs
Bridge Routing
Summary
6.6 CASE STUDY: NOVELL NETWARE
NetWare Configuration
Running Novell NetWare
Security and Integrity
Selected Novell Commands
Login Scripts
6.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPTER 7 WIDE AREA NETWORKING
7.1 INTRODUCTION
7.2 NETWORK ROUTING
Routing Tables
Types of Routing
Dijkstra's Algorithm
Bellman-Ford Algorithm
Link State Routing
Hierarchical Routing
Routing Information Protocol
Open Shortest Path First
Border Gateway Protocol
Summary of Routing Techniques
Congestion and Deadlock
7.3 PUBLIC DATA NETWORKS: THE X SERIES PROTOCOLS
Packet-Switched Network Modes
X.25 Public Data Network Interface Standard
Triple-X Standard for Non-X.25 Devices
7. 4 INTERNET PROTOCOLS
Overview of TCP/IP
Internet Addressing
Domain Name System
IP Packets
Fragmentation
IP Routing
Internet Control Message Protocol
IPv6
7.5 TRANSPRT PROTOCOLS
Transmission Control Protocol
User Datagram Protocol
OSI Transport Protocols
7.6 SOCKET PROERAMMING
Sockets
Client/Server Model
Socket Data Structures
Socket Commands
Client/Server Example
7.7 SUMMARY
REVIEW QUESTIONS
EXERCISES
REFERENCES
CHAPIER 8 ADDITIONAL NEIWORK PROTOCOLS
8.1 INTERNET APPLICATIONS
Virtual Terminal
Telnet
File Transfers
Simple Mail Transfer Protocol
Simple Network Management Protocol
8.2 WORLD WIDE WEB
Web Page Access
Hypertext Markup Language
HTML Forms
JavaScript and Client-side Programming
Common Gateway Interface and Server-side Programming
8.3 ELECTRONIC MAIL: X.400 AND X.500 STANDARDS
X.400 Mail Standards
X.500 Directory Service
Summary
8.4 INTEGRATED SERVICES DIGITAL NETWORK
ISDN Services
ISDN Architecture
Protocols
Broadband ISDN
8.5 ASYNCHRONOUS TRANSFER MODE
Benefits of Small Fixed-Size Cells
Overview of ATM Network
Switching
Reference Model
Cell Definition
Virtual Circuits and Paths
Connection Management
Adaptation Layers
8.6 SYSTEMS NETWORK ARCHITECTURE
Lower Layers Physical Link Control
Path Control
Transmission Control
Data Flow Control
Higher Layers
REVIEW QUESTIONS
EXERCISES
REFERENCES
GLOSSARY
ACRONYMS
INDEX
猜您喜欢