Understanding data communications and networks/ William A. Shay.

By: Shay, William AMaterial type: TextTextPublication details: Australia ; Belmont, Calif. : Thomson Brooks/Cole, 2004Edition: 3rd edDescription: xxv, 766 p. : ill. ; 25 cmISBN: 9788178001791Subject(s): Data Transmission Systems | Computer Networks | Computer networksDDC classification: 004.6
Contents:
CHAPTER 1 INTRODUCTION TO COMMUNICATIONS, STANDARDS, AND PROTOCOLS -- 1.1 Why Study Communications? A Brief History -- 1 Applications -- Issues -- 1.2 Computer Networks -- Common Bus Topology -- Star Topology -- Ring Topology -- Fully Connected Topology -- Combined Topologies -- 1.3 Standards and Standards Orgawzations -- The Need for Standards IS -- Standards Organizations -- 1.4 Open Systems and the OSI Model -- Overview of the Model -- Connection Strategies -- Physical Layer -- Data Link Layer -- Network Layer -- Transport Layer -- Session Layer -- Presentation Layer -- Application Layer -- Internet Layers -- Sununary -- 1.5 The Future of Data Communications -- Review Questions -- Exercises -- References -- CHAPTER 2 TRANSMISSION MEDIA AND CODES -- 2.1 Introduction -- 2.2 Conductive Metal -- Twisted Pair -- Coaxial Cable -- 2.3 Optical Fiber -- 2.4 Wireless Communications -- Microwave Transmission -- Satellite Transmission -- Geosynchronous Satellites -- Low Earth Orbit Satellites -- Wireless LANs -- Bluetooth -- Free Space Optics -- Summary -- 2.5 Codes -- Early Codes -- ASCn Code -- EBCDIC Code -- Unicode -- 2.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 3 ANAIOC AND DKIWl SICNAIS -- 3.1 Introduction -- 3.2 Digital Encoding Schemes -- NRZ Encoding -- Manchester Encoding lOQ -- 3.3 Analog Signals -- Fourier's Results -- Applications of Fourier's Results -- 3.4 Bit Rate -- The Nyquist Theorem and Noiseless Channels -- Noisy Channels -- Shannon's Result 110 -- 3.5 Digital-to-Analog Conversion -- Frequency Modulation -- Amplitude Modulation -- Phase Modulation -- Quadrature Amplitude Modulation -- 3.6 Analog-to-Digital Conversion -- Pulse Amplitude Modulation -- Pulse Code Modulation -- 3.7 Modems -- Signal Constellation -- Modem Standards -- Cable Modems -- 3.8 DSL -- How It Works -- Different DSL Technologies -- ADSL Lite (G.Lite, ITU standard ITU G.992.2) -- SDSL -- HDSL and HDSL2 -- SHDSL -- RADSL -- IDSL -- VDSL -- 3.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 4 MAKING CONNECTIONS -- 4.1 Introduction -- 4.2 Communication Carriers and Devices -- The Telephone System -- Call Routing -- Private Branch Exchanges -- Cellular Phones Fax Machines -- 4.3 Transmission Modes -- Serial and Parallel Transmission -- Asynchronous, Synchronous, and Isochronous Transmission -- Simplex, Half-Duplex, and Full-Duplex Communications -- 4.4 Interface Standards -- EIA-232 Interface -- EIA-232 Subsets -- Null Modems -- X.21 Interface -- USB -- USB Connections -- Data Transfer -- USB Packets -- FireWire -- Connections -- Communications -- Arbitration -- 4.5 Multiplexing -- Frequency-Division Multiplexing -- Time-Division Multiplexing -- Statistical Multiplexers -- Wave-Division Multiplexing -- 4.6 Digital Carriers -- T1 186 -- SONET -- Device Types -- P zyloads and Frames -- 4.7 Contention Protocols -- Aloha Protocols -- Carrier Sense Multiple Access -- Collision Detection -- Collision Avoidance -- Token Passing -- Summary of Protocols -- 4.8 Summary -- Review Questions -- Exercises -- References -- CHAPTER 5 DATA COMPRESSION -- 5.1 Introduction -- 5.2 Frequency-Dependent Codes Huffman Code Arithmetic Compression -- 5.3 Run-Length Encoding -- Runs of the Same Bit -- Runs with Different Characters -- Facsimile Compression -- 5.4 Relative Encoding -- 5.5 Lempel-Ziv Compression -- 5.6 Image Compression -- Image Representation -- JPEG Compression -- DCT Phase -- Encoding Phase -- GIF Files -- 5.7 Multimedia Compression -- MPEG -- MP3 -- 5.8 -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 6 DATA INTEGRITY -- 6.1 Introduction -- 6.2 Simple Error Detection Techniques -- -- Parity Checks -- Analysis of Parity Checking -- Checksums -- 6.3 Cyclic Redundancy Checks for Error Detection -- Polynomial Division -- How CRC Works -- Analysis of CRC -- CRC Implementation Using Circular Shifts -- 6.4 Hamming Codes: Error Correction -- Single-Bit Error Correction -- Multiple-Bit Error Correction -- 6.5 Summary -- Review Questions -- Exercises -- References -- CHAPTER 7 DATA SECURITY -- 7.1 Introduction -- 7.2 Encryption Algorithms -- Caesar Cipher -- Polyalphabetic Cipher -- Transposition Cipher -- Bit-Level Ciphering -- Data Encryption Standards -- DES -- Triple DES -- AES and the Rijndael Algorithm -- Clipper Chip and the Skipjack Algorithm -- 7.3 Key Distriqution AND Protection -- Shamir's Method -- Diffie-Hellman Key Exchange -- 7.4 Public Key Encryption -- RSA Algorithm -- Digital Signatures -- Authentication and Message Digests -- Pretty Good Privacy -- 7-5 Transport Layer Security and Server Authentication -- Transport Layer Security -- X.509 Certificate -- Handshakes -- 7-6 Firewalls -- Packet Filtering -- Application-Level Gateway -- Stateful Inspection -- 7.7 Viruses -- Infecting Files -- Memory-Resident Viruses -- Virus Evolution -- Virus Sources -- 7.8 Threats and Attacks -- The Internet Worm -- Computer Hackers -- Other Threats -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 8 flow control -- 8.1 Introduction -- 8.2 Signaling -- DTE-DCE Flow Control X-ON/X-OFF -- Frame-Oriented Control -- Unrestricted Protocol -- Stop-and-Wait Protocol -- Protocol Efficiency -- Go-Back-h: a Sliding Window Protocol -- Frame Format -- Features -- Algorithm -- Selective Repeat: A Sliding Window Protocol -- Features -- Algorithm -- Efficiency of Sliding Window Protocols -- Protocol Correctness -- Finite State Machines -- STD for a Simplified Go-Back-n Protocol -- State Transition Diagram for a Faulty Go-Back-n Protocol -- Petri Nets -- Summary -- Review Questions -- Exercises -- References -- CHAPTIR9 local AREA NETWORKS -- Introduction -- Data Link Control -- High-level Data Link Control Protocol -- Frame Format -- HDLC Example -- Binary Synchronous Communications Protocol -- Ethernet: IEEE Standard -- Concepts -- Ethernet Frame Format -- Physical Implementations of 10 Mbps Ethernet -- Fast Ethernet (ICQ Mbps) -- 100BaseTX -- 100BaseFX -- 100BaseT4 -- Collision Domain -- Gigabit Ethernet -- MAC Sublayer -- lOOOBaseX -- lOOOBaseT -- Beyond Gigabit Rates -- Token Ring: IEEE Standard -- Token and Frame Formats -- Reserving and Claiming Tokens -- Ring Maintenance -- Wireless Networks: IEEE Standard -- Infrared and Radio Waves -- Contention -- Addressing -- Frame Format -- Wired Equivalent Privacy 453 -- Variations of 802.11 -- Summary -- Review Questions -- Exercises -- References -- CHAPTtR TO CONNECTING NETWORKS -- Introduction -- Layer 1 Connections -- Repeaters and Hubs -- Layer 2 Connections -- Bridges -- Bndging Different Types of LANs -- Routing -- Routing Tables -- Transparent Bridges -- Route Learning -- Frame Propagation -- Spanning Tree Algorithm -- Source-Routing Bridges -- Switches and Switched Ethernet -- Virtual LANs -- 10.4 Layer 3 Connections -- Routing Tables -- Centralized Routing -- Distributed Routing -- Static Routing -- Adaptive Routing -- 10.5 Dijkstra's Algorithm -- 10.6 The Bellman-Ford Algorithm -- Problems with the Bellman-Ford Algorithm -- 10.7 Additional Routing Methods -- Link State Routing -- Hierarchical Routing -- Routing Information Protocol -- Open Shortest Path First -- Border Gateway Protocol -- Summary of Routing Techniques -- 10.8 Congestion AND Deadlock -- Congestion -- Deadlock -- 10.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 11 INTERNET PROTOCOLS AND APPLICATIONS ' -- 11.1 Introduction -- 11.2 Internet Protocol -- Overview of TCP/IP -- Internet Addressing -- Classless Addresses -- Obtaining an Address -- Domain Name System -- IP Packets -- Fragmemaiion -- IP Routing -- Routers -- Multicast Routing -- Resource Reservation Protocol -- Internet Control Message Protocol -- IP Shortcomings -- Packet Headers -- IPSec -- IPv6 Addressing -- Compatibility with IPv4 -- Summary -- 11.4 Transport Protocols -- Transmission Control Protocol -- TCP Segment -- Connection Management -- Flow Control -- Congestion Control -- User Datagram Protocol -- Real-Time Transfer Protocol -- 11.5 Internet Applications -- Virtual Terminal Protocols -- Telnet -- Secure Shell -- File Transfers -- FTP -- Secure Copy -- Simple Mail Transfer Protocol -- Simple Network Management Protocol -- Management Information Base -- SNMP Commands ' -- 11.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 12 INTEBNET PROGRAMMING -- Introduction -- Socket Programming -- Sockets -- Client/Server Model -- Socket Data Structures -- Socket Commands -- Client/Server Example -- Client Source Code -- Server Source Code -- 12.3 World Wide Web -- Web Page Access -- Hypertext Markup Language -- Tags -- HTML Forms -- Client-Side Programming and JavaScript -- 12.4 Common Gateway Interface and Server-Side Programming: -- Setting up a Search Engine -- Forms -- Query Strings -- Example Search Engine -- 12.5 Perl Programming: Pizza Ordering System -- Customer Interaction -- Verifying Phone Numbers -- Updating Customer Information -- Placing an Order -- Verifying the Order -- 12.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 13 CIRCUIT TECHNOLOGIES -- 13.1 Introduction -- 13.2 Integrated Services Digital -- Network -- Services -- Architecture -- Protocols -- Signaling System -- Basic Service Protocols -- Call Setup -- Broadband ISDN -- 13.3 Virtual Circuit Protocols: X.25 and Frame Relay -- Packet-Switched Network Modes -- Virtual Circuits -- Datagram Service -- X.25 Interface Standard -- Packet Format -- Virtual Calls -- Frame Relay -- Frame Format -- Committed Information Rate -- Congestion Control -- 13.4 Asynchronous Transfer Mode -- Benefits of Small Fixed-Size Cells -- Overview of ATM Network -- Switching -- Banyan Switches -- Reference Model -- Cell Definition -- Header Error Control -- Cell Loss Priority -- Payload Type -- Virtual Circuits and Paths -- Connection Management -- Connection Parameters -- Adaptation Layers -- AAL1 -- AAL 2 -- AAL 5 -- Service-Specific Connection-Oriented Protocol -- Gigabit Ethernet versus ATM -- 13.5 Summary -- Review Questions -- Exercises -- References v
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
004.6 SHA/U (Browse shelf(Opens below)) Available P24465
Total holds: 0

Includes bibliographical references and index.

CHAPTER 1 INTRODUCTION TO COMMUNICATIONS, STANDARDS, AND PROTOCOLS -- 1.1 Why Study Communications? A Brief History -- 1 Applications -- Issues -- 1.2 Computer Networks -- Common Bus Topology -- Star Topology -- Ring Topology -- Fully Connected Topology -- Combined Topologies -- 1.3 Standards and Standards Orgawzations -- The Need for Standards IS -- Standards Organizations -- 1.4 Open Systems and the OSI Model -- Overview of the Model -- Connection Strategies -- Physical Layer -- Data Link Layer -- Network Layer -- Transport Layer -- Session Layer -- Presentation Layer -- Application Layer -- Internet Layers -- Sununary -- 1.5 The Future of Data Communications -- Review Questions -- Exercises -- References -- CHAPTER 2 TRANSMISSION MEDIA AND CODES -- 2.1 Introduction -- 2.2 Conductive Metal -- Twisted Pair -- Coaxial Cable -- 2.3 Optical Fiber -- 2.4 Wireless Communications -- Microwave Transmission -- Satellite Transmission -- Geosynchronous Satellites -- Low Earth Orbit Satellites -- Wireless LANs -- Bluetooth -- Free Space Optics -- Summary -- 2.5 Codes -- Early Codes -- ASCn Code -- EBCDIC Code -- Unicode -- 2.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 3 ANAIOC AND DKIWl SICNAIS -- 3.1 Introduction -- 3.2 Digital Encoding Schemes -- NRZ Encoding -- Manchester Encoding lOQ -- 3.3 Analog Signals -- Fourier's Results -- Applications of Fourier's Results -- 3.4 Bit Rate -- The Nyquist Theorem and Noiseless Channels -- Noisy Channels -- Shannon's Result 110 -- 3.5 Digital-to-Analog Conversion -- Frequency Modulation -- Amplitude Modulation -- Phase Modulation -- Quadrature Amplitude Modulation -- 3.6 Analog-to-Digital Conversion -- Pulse Amplitude Modulation -- Pulse Code Modulation -- 3.7 Modems -- Signal Constellation -- Modem Standards -- Cable Modems -- 3.8 DSL -- How It Works -- Different DSL Technologies -- ADSL Lite (G.Lite, ITU standard ITU G.992.2) -- SDSL -- HDSL and HDSL2 -- SHDSL -- RADSL -- IDSL -- VDSL -- 3.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 4 MAKING CONNECTIONS -- 4.1 Introduction -- 4.2 Communication Carriers and Devices -- The Telephone System -- Call Routing -- Private Branch Exchanges -- Cellular Phones Fax Machines -- 4.3 Transmission Modes -- Serial and Parallel Transmission -- Asynchronous, Synchronous, and Isochronous Transmission -- Simplex, Half-Duplex, and Full-Duplex Communications -- 4.4 Interface Standards -- EIA-232 Interface -- EIA-232 Subsets -- Null Modems -- X.21 Interface -- USB -- USB Connections -- Data Transfer -- USB Packets -- FireWire -- Connections -- Communications -- Arbitration -- 4.5 Multiplexing -- Frequency-Division Multiplexing -- Time-Division Multiplexing -- Statistical Multiplexers -- Wave-Division Multiplexing -- 4.6 Digital Carriers -- T1 186 -- SONET -- Device Types -- P zyloads and Frames -- 4.7 Contention Protocols -- Aloha Protocols -- Carrier Sense Multiple Access -- Collision Detection -- Collision Avoidance -- Token Passing -- Summary of Protocols -- 4.8 Summary -- Review Questions -- Exercises -- References -- CHAPTER 5 DATA COMPRESSION -- 5.1 Introduction -- 5.2 Frequency-Dependent Codes Huffman Code Arithmetic Compression -- 5.3 Run-Length Encoding -- Runs of the Same Bit -- Runs with Different Characters -- Facsimile Compression -- 5.4 Relative Encoding -- 5.5 Lempel-Ziv Compression -- 5.6 Image Compression -- Image Representation -- JPEG Compression -- DCT Phase -- Encoding Phase -- GIF Files -- 5.7 Multimedia Compression -- MPEG -- MP3 -- 5.8 -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 6 DATA INTEGRITY -- 6.1 Introduction -- 6.2 Simple Error Detection Techniques -- -- Parity Checks -- Analysis of Parity Checking -- Checksums -- 6.3 Cyclic Redundancy Checks for Error Detection -- Polynomial Division -- How CRC Works -- Analysis of CRC -- CRC Implementation Using Circular Shifts -- 6.4 Hamming Codes: Error Correction -- Single-Bit Error Correction -- Multiple-Bit Error Correction -- 6.5 Summary -- Review Questions -- Exercises -- References -- CHAPTER 7 DATA SECURITY -- 7.1 Introduction -- 7.2 Encryption Algorithms -- Caesar Cipher -- Polyalphabetic Cipher -- Transposition Cipher -- Bit-Level Ciphering -- Data Encryption Standards -- DES -- Triple DES -- AES and the Rijndael Algorithm -- Clipper Chip and the Skipjack Algorithm -- 7.3 Key Distriqution AND Protection -- Shamir's Method -- Diffie-Hellman Key Exchange -- 7.4 Public Key Encryption -- RSA Algorithm -- Digital Signatures -- Authentication and Message Digests -- Pretty Good Privacy -- 7-5 Transport Layer Security and Server Authentication -- Transport Layer Security -- X.509 Certificate -- Handshakes -- 7-6 Firewalls -- Packet Filtering -- Application-Level Gateway -- Stateful Inspection -- 7.7 Viruses -- Infecting Files -- Memory-Resident Viruses -- Virus Evolution -- Virus Sources -- 7.8 Threats and Attacks -- The Internet Worm -- Computer Hackers -- Other Threats -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 8 flow control -- 8.1 Introduction -- 8.2 Signaling -- DTE-DCE Flow Control X-ON/X-OFF -- Frame-Oriented Control -- Unrestricted Protocol -- Stop-and-Wait Protocol -- Protocol Efficiency -- Go-Back-h: a Sliding Window Protocol -- Frame Format -- Features -- Algorithm -- Selective Repeat: A Sliding Window Protocol -- Features -- Algorithm -- Efficiency of Sliding Window Protocols -- Protocol Correctness -- Finite State Machines -- STD for a Simplified Go-Back-n Protocol -- State Transition Diagram for a Faulty Go-Back-n Protocol -- Petri Nets -- Summary -- Review Questions -- Exercises -- References -- CHAPTIR9 local AREA NETWORKS -- Introduction -- Data Link Control -- High-level Data Link Control Protocol -- Frame Format -- HDLC Example -- Binary Synchronous Communications Protocol -- Ethernet: IEEE Standard -- Concepts -- Ethernet Frame Format -- Physical Implementations of 10 Mbps Ethernet -- Fast Ethernet (ICQ Mbps) -- 100BaseTX -- 100BaseFX -- 100BaseT4 -- Collision Domain -- Gigabit Ethernet -- MAC Sublayer -- lOOOBaseX -- lOOOBaseT -- Beyond Gigabit Rates -- Token Ring: IEEE Standard -- Token and Frame Formats -- Reserving and Claiming Tokens -- Ring Maintenance -- Wireless Networks: IEEE Standard -- Infrared and Radio Waves -- Contention -- Addressing -- Frame Format -- Wired Equivalent Privacy 453 -- Variations of 802.11 -- Summary -- Review Questions -- Exercises -- References -- CHAPTtR TO CONNECTING NETWORKS -- Introduction -- Layer 1 Connections -- Repeaters and Hubs -- Layer 2 Connections -- Bridges -- Bndging Different Types of LANs -- Routing -- Routing Tables -- Transparent Bridges -- Route Learning -- Frame Propagation -- Spanning Tree Algorithm -- Source-Routing Bridges -- Switches and Switched Ethernet -- Virtual LANs -- 10.4 Layer 3 Connections -- Routing Tables -- Centralized Routing -- Distributed Routing -- Static Routing -- Adaptive Routing -- 10.5 Dijkstra's Algorithm -- 10.6 The Bellman-Ford Algorithm -- Problems with the Bellman-Ford Algorithm -- 10.7 Additional Routing Methods -- Link State Routing -- Hierarchical Routing -- Routing Information Protocol -- Open Shortest Path First -- Border Gateway Protocol -- Summary of Routing Techniques -- 10.8 Congestion AND Deadlock -- Congestion -- Deadlock -- 10.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 11 INTERNET PROTOCOLS AND APPLICATIONS ' -- 11.1 Introduction -- 11.2 Internet Protocol -- Overview of TCP/IP -- Internet Addressing -- Classless Addresses -- Obtaining an Address -- Domain Name System -- IP Packets -- Fragmemaiion -- IP Routing -- Routers -- Multicast Routing -- Resource Reservation Protocol -- Internet Control Message Protocol -- IP Shortcomings -- Packet Headers -- IPSec -- IPv6 Addressing -- Compatibility with IPv4 -- Summary -- 11.4 Transport Protocols -- Transmission Control Protocol -- TCP Segment -- Connection Management -- Flow Control -- Congestion Control -- User Datagram Protocol -- Real-Time Transfer Protocol -- 11.5 Internet Applications -- Virtual Terminal Protocols -- Telnet -- Secure Shell -- File Transfers -- FTP -- Secure Copy -- Simple Mail Transfer Protocol -- Simple Network Management Protocol -- Management Information Base -- SNMP Commands ' -- 11.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 12 INTEBNET PROGRAMMING -- Introduction -- Socket Programming -- Sockets -- Client/Server Model -- Socket Data Structures -- Socket Commands -- Client/Server Example -- Client Source Code -- Server Source Code -- 12.3 World Wide Web -- Web Page Access -- Hypertext Markup Language -- Tags -- HTML Forms -- Client-Side Programming and JavaScript -- 12.4 Common Gateway Interface and Server-Side Programming: -- Setting up a Search Engine -- Forms -- Query Strings -- Example Search Engine -- 12.5 Perl Programming: Pizza Ordering System -- Customer Interaction -- Verifying Phone Numbers -- Updating Customer Information -- Placing an Order -- Verifying the Order -- 12.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 13 CIRCUIT TECHNOLOGIES -- 13.1 Introduction -- 13.2 Integrated Services Digital -- Network -- Services -- Architecture -- Protocols -- Signaling System -- Basic Service Protocols -- Call Setup -- Broadband ISDN -- 13.3 Virtual Circuit Protocols: X.25 and Frame Relay -- Packet-Switched Network Modes -- Virtual Circuits -- Datagram Service -- X.25 Interface Standard -- Packet Format -- Virtual Calls -- Frame Relay -- Frame Format -- Committed Information Rate -- Congestion Control -- 13.4 Asynchronous Transfer Mode -- Benefits of Small Fixed-Size Cells -- Overview of ATM Network -- Switching -- Banyan Switches -- Reference Model -- Cell Definition -- Header Error Control -- Cell Loss Priority -- Payload Type -- Virtual Circuits and Paths -- Connection Management -- Connection Parameters -- Adaptation Layers -- AAL1 -- AAL 2 -- AAL 5 -- Service-Specific Connection-Oriented Protocol -- Gigabit Ethernet versus ATM -- 13.5 Summary -- Review Questions -- Exercises -- References v

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha