数据通信原理、技术与应用:英文版

数据通信原理、技术与应用:英文版
作 者: William Stallings
出版社: 清华大学出版社
丛编项: 大学计算机教育国外著名教材系列
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 计算机网络通信/IP技术
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《数据通信原理、技术与应用:英文版》作者简介

内容简介

本书是著名作者William Stalling关于计算机网络化技术的最新力作。本书采用案例教学方法,详细介绍了应用于事务领域的数据通信和计算机网络的基本知识、规律、应用的技术和发展的方向。 本书的特点是系统性和实用性。本书除了阐述事务数据通俗的基本规律相关的基本概念之外,还介绍了因特网和万维网全面的知识,以及组织内部数据通信最新和最重要的技术——内联网技术和外联网技术的详细实例,并给出了事和环境和事务管理中关键的技术:局域网、广域网、高速网、ATM和TCP/IP协议簇。 本书可作为大学本科生和研究生的教材,也可用作专业人员的参考用书。

图书目录

Preface xi

Chapter 1 Introduction 1

1.1 Information and Communication 2

1.2 Data Communications and Networking for Today's Enterprise 3

1.3 The Nature of Business Information Requirements 7

1.4 Distributed Data Processing 9

1.5 The Internet and Distributed Applications 9

1.6 Networks 11

1.7 The Transmission of Information 16

1.8 Management Issues 18

1.9 Standards 19

1.10 lnternet Resources 19

1.11 Useful Publications 20

1.12 Review Questions 22

Appendix 1A Prefixes for Numerical Units 22

PART ONE REQUIREMENTS 24

Chapter 2 Business Information 25

2.1 Audio 27

2.2 Data 28

2.3 Image 30

2.4 Video 33

2.5 Performance Measures 34

2.6 Summary 40

2.7 Recommended Reading and Web Sites 41

2.8 Key Terms, P,.eview Questions, and Problems 41

Chapter 3 Distributed Data Processing 45

3.1 Centralized versus Distributed Processing 47

3.2 Forms of Distributed Data Processing 56

3.3 Distributed Data 58

3.4 Networking Implications of DDP 63

3.5 Summary 65

3.6 Recommended Reading 65

3.7 Key Terms, Review Questions, and Problems 68

Case Study I MasterCard International 71

PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS 74

Chapter 4 Internet History and Architecture 76

4.1 Internet History 77

4.2 Internet Architecture 83

4.3 Internet Domains 87

4.4 Summary 93

4.5 Recommended Reading and Web Sites 93

4.6 Key Terms, Review Questions, and Problems 93

Chapter 5 TCP/IP and O$I 97

5.1 A Simple Protocol Architecture 99

5.2 The TCP/IP Protocol Architecture 106

5.3 Internetworking 113

5.4 TCP and IP Details 116

5.5 The OSI Protocol Architecture 122

5.6 Summary 127

5.7 Recommended Reading and Web Sites 127

5.8 Key Terms, Review Questions, and Problems 128

Appendix 5A The Trivial File Transfer Protocol 130

Case Stndy II Florida Department of Management Services 1135

Chapter 6 Internet-Based Applications 140

6.1 Electronic Mail and SMTP 142

6.2 Web Access and HTTP 155

6.3 Internet Telephony and SIP 160

6.4 Summary 171

6.5 Recommended Reading and Web Sites 172

6.6 Key Terms, P~eview Questions, and Problems 173

Chapter 7 Client-Server and Intranet Computing 175

7.1 The Growth of Client/Server Computing 176

7.2 Client/Server Applications 180

7.3 Middleware 186

7.4 Intranets 193

7.5 Extranets 197

7.6 Summary 201

7,7 Recommended Reading and Web Sites 201

7.8 Key Terms, Review Questions, and Problems 202

Case Study lit ING Life 205

Chapter 8 Internet Operation 208

8.1 Internet Addressing 209

8.2 Internet Routing Protocols 212

8.3 The Need for Speed and Quality of Service 2t9

8.4 Differentiated Services 224

8.5 Summary 232

8.6 Recommended Reading 233

8.7 Key Terms, Review Questions, and Problerns 234

PART THREE LOCAL AREA NETWORKS 236

Chapter 9 LAN Architecture and Protocols 238

9.1 Background 239

9.2 LAN Configuration 243

9.3 Guided Transmission Media 245

9.4 LAN Protocol Architecture 254

9.5 Summary 260

9.6 Recommended Reading and Web Sites 261

9.7 Key Terms, Review Questions, and Problems 261

Appendix 9A Decibels and Signal Strength 263

Chapter 10 Ethernet and Fibre Channel 266

10.1 The Emergence of High-Speed LANs 268

10.2 Traditional Ethernet 269

10.3 Bridges, Hubs, and Switches 273

10.4 High-Speed Ethernet 279

10.5 Fibre Channel 285

10.6 Summary 291

10.7 Recommended Reading andWeb Sites 292

10.8 Key Terms, Review Questions, and Problems 293

Case Study IV Carlson Companies 295

Chapter 11 Wireless LANs 298

11.1 Overview 299

11.2 IEEE 802.11 Wireless LAN Standard 304

11.3 Bluetooth 310

11.4 Summary 317

11.5 Recommended Reading andWeb Sites 317

11.6 Key Terms, Review Questions, and Problems 318

Case StudyV St. Luke's Episcopal Hospital 320

PART FOUR WIDE AREA NETWORKS 323

Chapter 12 Circuit Switching and Packet Switching 325

12.1 Switching Techniques 326

12.2 Circuit-Switching Networks 328

12.3 Packet-Switching Networks 335

12.4 Traditional Wide Area Network Alternatives 340

12.5 Summary 348

12.6 Recommended Reading and Web Sites 348

12.7 Key Terms, Review Questions, and Problems 349

Case Study VI Staten Island University Hospital 351

Chapter 13 Frame Relay and ATM 354

13.1 Wide Area Networking Alternatives 356

13.2 Frame Relay 360

13.3 Asynchronous Transfer Mode (ATM) 367

13.4 Summary 376

13.5 Recommended Reading and Web Sites 376

13.6 Key Terms, Review Questions, and Problems 377

Case Study VII Olsten Staffing Services 380

Case Study VIII Guardian Life, Insurance 382

Chapter 14 Wireless WANs 386

14.1 Cellular Wireless Networks 388

14.2 Multiple Access 395

14.3 Third-Generation Wireless Communication 400

14.4 Satellite Communications 403

14.5 Sumanary 411

14.6 Recommended Reading and Web Sites 411

14.7 Key Terms, Review Questions, and Problems 412

Case Study IX Choice Hotels International 415

PART FIVE DATA COMMUNICATIONS 418

Chapter 15 Data Transmission 420

15.1 Signals for Conveying Information 421

15.2 Transmission Impairments and Channel Capacity 430

15.3 Summary 438

15.4 Recommended Reading 438

15.5 Key Terms, Review Questions, and Problems 439

Chapter 16 Data Communication Fundamentals 441

16.1 Analog and Digital Data Communications 442

16.2 Data Encoding Techniques 446

16.3 Asynchronous and Synchronous Transmission 455

16.4 Error Detection 459

16.5 Summary 462

16.6 Recommended Reading and Web Sites 463

16.7 Key Terms, Review Questions, and Problems 463

Chapter 17 Data Link Control and Multiplexing 466

17.1 Flow Control and Error Control 468

17.2 High-Level Data Link Control 470

17.3 Motivation for Multiplexing 475

17.4 Frequency Division Multiplexing 476

17.5 Synchronous Time Division Multiplexing 483

17.6 Summary 490

17.7 Recommended Reading and Web Sites 490

17.8 Key Terms, Review Questions, and Problems 491

Case Study X Haukekeland University Hospital 493

PART SIX AGEMENT ISSUES 496

Chapter 18 Network Security 498

18.1 Security Requirements and Attacks 500

18.2 Confidentiality with Symmetric Encryption 501

18.3 Message Authentication and Hash Functions 510

18.4 Public-Key Encryption and Digital Signatures 515

18.5 Virtual Private Networks and IPSec 522

18.6 Summary 529

18.7 Recommended Reading and Web Sites 530

18.8 Key Terms, Review Questions, and Problems 531

Case Study XI The Hacker in All of Us 534

Chapter 19 Network Management 539

19.1 Network Management Requirements 541

19.2 Network Management Systems 544

19.3 Simple Network Management Protocol (SNMP) 546

19.4 Recommended Reading andWeb Sites 557

19.5 Key Terms, Review Questions, and Problems 558

Glossary 560

References 567