Understanding data communications and networks/ (Record no. 1974)

MARC details
000 -LEADER
fixed length control field 11565cam a22002174a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788178001791
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Item number SHA/U
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shay, William A.
245 10 - TITLE STATEMENT
Title Understanding data communications and networks/
Statement of responsibility, etc. William A. Shay.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Australia ;
-- Belmont, Calif. :
Name of publisher, distributor, etc. Thomson Brooks/Cole,
Date of publication, distribution, etc. 2004.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 766 p. :
Other physical details ill. ;
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note CHAPTER 1 INTRODUCTION TO COMMUNICATIONS, STANDARDS, AND PROTOCOLS -- 1.1 Why Study Communications? A Brief History -- 1 Applications -- Issues -- 1.2 Computer Networks -- Common Bus Topology -- Star Topology -- Ring Topology -- Fully Connected Topology -- Combined Topologies -- 1.3 Standards and Standards Orgawzations -- The Need for Standards IS -- Standards Organizations -- 1.4 Open Systems and the OSI Model -- Overview of the Model -- Connection Strategies -- Physical Layer -- Data Link Layer -- Network Layer -- Transport Layer -- Session Layer -- Presentation Layer -- Application Layer -- Internet Layers -- Sununary -- 1.5 The Future of Data Communications -- Review Questions -- Exercises -- References -- CHAPTER 2 TRANSMISSION MEDIA AND CODES -- 2.1 Introduction -- 2.2 Conductive Metal -- Twisted Pair -- Coaxial Cable -- 2.3 Optical Fiber -- 2.4 Wireless Communications -- Microwave Transmission -- Satellite Transmission -- Geosynchronous Satellites -- Low Earth Orbit Satellites -- Wireless LANs -- Bluetooth -- Free Space Optics -- Summary -- 2.5 Codes -- Early Codes -- ASCn Code -- EBCDIC Code -- Unicode -- 2.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 3 ANAIOC AND DKIWl SICNAIS -- 3.1 Introduction -- 3.2 Digital Encoding Schemes -- NRZ Encoding -- Manchester Encoding lOQ -- 3.3 Analog Signals -- Fourier's Results -- Applications of Fourier's Results -- 3.4 Bit Rate -- The Nyquist Theorem and Noiseless Channels -- Noisy Channels -- Shannon's Result 110 -- 3.5 Digital-to-Analog Conversion -- Frequency Modulation -- Amplitude Modulation -- Phase Modulation -- Quadrature Amplitude Modulation -- 3.6 Analog-to-Digital Conversion -- Pulse Amplitude Modulation -- Pulse Code Modulation -- 3.7 Modems -- Signal Constellation -- Modem Standards -- Cable Modems -- 3.8 DSL -- How It Works -- Different DSL Technologies -- ADSL Lite (G.Lite, ITU standard ITU G.992.2) -- SDSL -- HDSL and HDSL2 -- SHDSL -- RADSL -- IDSL -- VDSL -- 3.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 4 MAKING CONNECTIONS -- 4.1 Introduction -- 4.2 Communication Carriers and Devices -- The Telephone System -- Call Routing -- Private Branch Exchanges -- Cellular Phones Fax Machines -- 4.3 Transmission Modes -- Serial and Parallel Transmission -- Asynchronous, Synchronous, and Isochronous Transmission -- Simplex, Half-Duplex, and Full-Duplex Communications -- 4.4 Interface Standards -- EIA-232 Interface -- EIA-232 Subsets -- Null Modems -- X.21 Interface -- USB -- USB Connections -- Data Transfer -- USB Packets -- FireWire -- Connections -- Communications -- Arbitration -- 4.5 Multiplexing -- Frequency-Division Multiplexing -- Time-Division Multiplexing -- Statistical Multiplexers -- Wave-Division Multiplexing -- 4.6 Digital Carriers -- T1 186 -- SONET -- Device Types -- P zyloads and Frames -- 4.7 Contention Protocols -- Aloha Protocols -- Carrier Sense Multiple Access -- Collision Detection -- Collision Avoidance -- Token Passing -- Summary of Protocols -- 4.8 Summary -- Review Questions -- Exercises -- References -- CHAPTER 5 DATA COMPRESSION -- 5.1 Introduction -- 5.2 Frequency-Dependent Codes Huffman Code Arithmetic Compression -- 5.3 Run-Length Encoding -- Runs of the Same Bit -- Runs with Different Characters -- Facsimile Compression -- 5.4 Relative Encoding -- 5.5 Lempel-Ziv Compression -- 5.6 Image Compression -- Image Representation -- JPEG Compression -- DCT Phase -- Encoding Phase -- GIF Files -- 5.7 Multimedia Compression -- MPEG -- MP3 -- 5.8 -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 6 DATA INTEGRITY -- 6.1 Introduction -- 6.2 Simple Error Detection Techniques -- -- Parity Checks -- Analysis of Parity Checking -- Checksums -- 6.3 Cyclic Redundancy Checks for Error Detection -- Polynomial Division -- How CRC Works -- Analysis of CRC -- CRC Implementation Using Circular Shifts -- 6.4 Hamming Codes: Error Correction -- Single-Bit Error Correction -- Multiple-Bit Error Correction -- 6.5 Summary -- Review Questions -- Exercises -- References -- CHAPTER 7 DATA SECURITY -- 7.1 Introduction -- 7.2 Encryption Algorithms -- Caesar Cipher -- Polyalphabetic Cipher -- Transposition Cipher -- Bit-Level Ciphering -- Data Encryption Standards -- DES -- Triple DES -- AES and the Rijndael Algorithm -- Clipper Chip and the Skipjack Algorithm -- 7.3 Key Distriqution AND Protection -- Shamir's Method -- Diffie-Hellman Key Exchange -- 7.4 Public Key Encryption -- RSA Algorithm -- Digital Signatures -- Authentication and Message Digests -- Pretty Good Privacy -- 7-5 Transport Layer Security and Server Authentication -- Transport Layer Security -- X.509 Certificate -- Handshakes -- 7-6 Firewalls -- Packet Filtering -- Application-Level Gateway -- Stateful Inspection -- 7.7 Viruses -- Infecting Files -- Memory-Resident Viruses -- Virus Evolution -- Virus Sources -- 7.8 Threats and Attacks -- The Internet Worm -- Computer Hackers -- Other Threats -- Summary -- Review Questions -- Exercises -- References -- CHAPTER 8 flow control -- 8.1 Introduction -- 8.2 Signaling -- DTE-DCE Flow Control X-ON/X-OFF -- Frame-Oriented Control -- Unrestricted Protocol -- Stop-and-Wait Protocol -- Protocol Efficiency -- Go-Back-h: a Sliding Window Protocol -- Frame Format -- Features -- Algorithm -- Selective Repeat: A Sliding Window Protocol -- Features -- Algorithm -- Efficiency of Sliding Window Protocols -- Protocol Correctness -- Finite State Machines -- STD for a Simplified Go-Back-n Protocol -- State Transition Diagram for a Faulty Go-Back-n Protocol -- Petri Nets -- Summary -- Review Questions -- Exercises -- References -- CHAPTIR9 local AREA NETWORKS -- Introduction -- Data Link Control -- High-level Data Link Control Protocol -- Frame Format -- HDLC Example -- Binary Synchronous Communications Protocol -- Ethernet: IEEE Standard -- Concepts -- Ethernet Frame Format -- Physical Implementations of 10 Mbps Ethernet -- Fast Ethernet (ICQ Mbps) -- 100BaseTX -- 100BaseFX -- 100BaseT4 -- Collision Domain -- Gigabit Ethernet -- MAC Sublayer -- lOOOBaseX -- lOOOBaseT -- Beyond Gigabit Rates -- Token Ring: IEEE Standard -- Token and Frame Formats -- Reserving and Claiming Tokens -- Ring Maintenance -- Wireless Networks: IEEE Standard -- Infrared and Radio Waves -- Contention -- Addressing -- Frame Format -- Wired Equivalent Privacy 453 -- Variations of 802.11 -- Summary -- Review Questions -- Exercises -- References -- CHAPTtR TO CONNECTING NETWORKS -- Introduction -- Layer 1 Connections -- Repeaters and Hubs -- Layer 2 Connections -- Bridges -- Bndging Different Types of LANs -- Routing -- Routing Tables -- Transparent Bridges -- Route Learning -- Frame Propagation -- Spanning Tree Algorithm -- Source-Routing Bridges -- Switches and Switched Ethernet -- Virtual LANs -- 10.4 Layer 3 Connections -- Routing Tables -- Centralized Routing -- Distributed Routing -- Static Routing -- Adaptive Routing -- 10.5 Dijkstra's Algorithm -- 10.6 The Bellman-Ford Algorithm -- Problems with the Bellman-Ford Algorithm -- 10.7 Additional Routing Methods -- Link State Routing -- Hierarchical Routing -- Routing Information Protocol -- Open Shortest Path First -- Border Gateway Protocol -- Summary of Routing Techniques -- 10.8 Congestion AND Deadlock -- Congestion -- Deadlock -- 10.9 Summary -- Review Questions -- Exercises -- References -- CHAPTER 11 INTERNET PROTOCOLS AND APPLICATIONS ' -- 11.1 Introduction -- 11.2 Internet Protocol -- Overview of TCP/IP -- Internet Addressing -- Classless Addresses -- Obtaining an Address -- Domain Name System -- IP Packets -- Fragmemaiion -- IP Routing -- Routers -- Multicast Routing -- Resource Reservation Protocol -- Internet Control Message Protocol -- IP Shortcomings -- Packet Headers -- IPSec -- IPv6 Addressing -- Compatibility with IPv4 -- Summary -- 11.4 Transport Protocols -- Transmission Control Protocol -- TCP Segment -- Connection Management -- Flow Control -- Congestion Control -- User Datagram Protocol -- Real-Time Transfer Protocol -- 11.5 Internet Applications -- Virtual Terminal Protocols -- Telnet -- Secure Shell -- File Transfers -- FTP -- Secure Copy -- Simple Mail Transfer Protocol -- Simple Network Management Protocol -- Management Information Base -- SNMP Commands ' -- 11.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 12 INTEBNET PROGRAMMING -- Introduction -- Socket Programming -- Sockets -- Client/Server Model -- Socket Data Structures -- Socket Commands -- Client/Server Example -- Client Source Code -- Server Source Code -- 12.3 World Wide Web -- Web Page Access -- Hypertext Markup Language -- Tags -- HTML Forms -- Client-Side Programming and JavaScript -- 12.4 Common Gateway Interface and Server-Side Programming: -- Setting up a Search Engine -- Forms -- Query Strings -- Example Search Engine -- 12.5 Perl Programming: Pizza Ordering System -- Customer Interaction -- Verifying Phone Numbers -- Updating Customer Information -- Placing an Order -- Verifying the Order -- 12.6 Summary -- Review Questions -- Exercises -- References -- CHAPTER 13 CIRCUIT TECHNOLOGIES -- 13.1 Introduction -- 13.2 Integrated Services Digital -- Network -- Services -- Architecture -- Protocols -- Signaling System -- Basic Service Protocols -- Call Setup -- Broadband ISDN -- 13.3 Virtual Circuit Protocols: X.25 and Frame Relay -- Packet-Switched Network Modes -- Virtual Circuits -- Datagram Service -- X.25 Interface Standard -- Packet Format -- Virtual Calls -- Frame Relay -- Frame Format -- Committed Information Rate -- Congestion Control -- 13.4 Asynchronous Transfer Mode -- Benefits of Small Fixed-Size Cells -- Overview of ATM Network -- Switching -- Banyan Switches -- Reference Model -- Cell Definition -- Header Error Control -- Cell Loss Priority -- Payload Type -- Virtual Circuits and Paths -- Connection Management -- Connection Parameters -- Adaptation Layers -- AAL1 -- AAL 2 -- AAL 5 -- Service-Specific Connection-Oriented Protocol -- Gigabit Ethernet versus ATM -- 13.5 Summary -- Review Questions -- Exercises -- References v
650 00 - SUBJECT
Keyword Data Transmission Systems.
650 00 - SUBJECT
Keyword Computer Networks.
651 ## - SUBJECT--GEOGRAPHIC NAME
Geographic name Computer networks.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Date last checked out Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 01/06/2016 004.6 SHA/U P24465 14/07/2018 14/07/2018 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha