图书介绍
数据通信 原理、技术与应用 第5版PDF|Epub|txt|kindle电子书版本网盘下载
![数据通信 原理、技术与应用 第5版](https://www.shukui.net/cover/3/33133954.jpg)
- (美)斯托林斯(Stallings,W.)著 著
- 出版社: 北京:清华大学出版社
- ISBN:7302111529
- 出版时间:2005
- 标注页数:572页
- 文件大小:100MB
- 文件页数:588页
- 主题词:数据通信-高等学校-教材-英文
PDF下载
下载说明
数据通信 原理、技术与应用 第5版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction 1
1.1 Information and Communication 2
1.2 Data Communications and Networking for Today's Enterprise 3
1.3 The Nature of Business Information Requirements 7
1.4 Distributed Data Processing 9
1.5 The Internet and Distributed Applications 9
CONTENTS11
Preface11
1.6 Networks 11
1.7 The Transmission of Information 16
1.8 Management Issues 18
1.9 Standards 19
1.10 Internet Resources 19
1.11 Useful Publications 20
1.12 Review Questions 22
Appendix 1A Prefixes for Numerical Units 22
PART ONE REQUIREMENTS 24
Chapter 2 Business Information 25
2.1 Audio 27
2.2 Data 28
2.3 Image 30
2.4 Video 33
2.5 Performance Measures 34
2.6 Summary 40
2.7 Recommended Reading and Web Sites 41
2.8 Key Terms,Review Questions,and Problems 41
Chapter 3 Distributed Data Processing 45
3.1 Centralized versus Distributed Processing 47
3.2 Forms of Distributed Data Processing56
3.3 Distributed Data58
3.4 Networking Implications of DDP63
3.6 Recommended Reading65
3.5 Summary65
3.7 Key Terms,Review Questions,and Problems68
Casc StudyⅠ MasterCard International71
PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS74
Chapter 4 Internet History and Architecture76
4.1 Internet History77
4.2 Internet Architecture83
4.3 Internet Domains87
4.4 Summary93
4.5 Recommended Reading and Web Sites93
4.6 Key Terms,Review Questions,and Problems93
Chapter 5 TCP/IP and OSI97
5.1 A Simple Protocol Architecture99
5.2 The TCP/IP Protocol Architecture106
5.3 Internetworking113
5.4 TCP and IP Details116
5.5 The OSI Protocol Architecture122
5.6 Summary127
5.7 Recommended Reading and Web Sites127
5.8 Key Terms,Review Questions,and Problems128
Appendix 5A The Trivial File Transfer Protocol130
Case Study Ⅱ Florida Department of Management Services135
Chapter 6 Internet-Based Applications140
6.1 Electronic Mail and SMTP142
6.2 Web Access and HTTP155
6.3 Internet Telephony and SIP160
6.4 Summary171
6.5 Recommended Reading and Web Sites172
6.6 Key Terms,Review Questions,and Problems173
Chapter 7 Client-Server and Intranet Computing175
7.1 The Growth of Client/Server Computing176
7.2 Client/Server Applications180
7.3 Middleware186
7.4 Intranets193
7.5 Extranets197
7.6 Summary201
7.7 Recommended Reading and Web Sites201
7.8 Key Terms,Review Questions,and Problems202
Case Study Ⅲ ING Life205
Chapter 8 Internet Operation208
8.1 Internet Addressing209
8.2 Internet Routing Protocols212
8.3 The Need for Speed and Quality of Service219
8.4 Differentiated Services224
8.5 Summary232
8.6 Recommended Reading233
8.7 Key Terms,Review Questions,and Problems234
PARTTHREE LOCAL AREA NETWORKS236
Chapter 9 LAN Architecture and Protocols238
9.1 Background239
9.2 LAN Configuration243
9.3 Guided Transmission Media245
9.4 LAN Protocol Architecture254
9.5 Summary260
9.6 Recommended Reading and Web Sites261
9.7 Key Terms,Review Questions,and Problems261
Appendix 9A Decibels and Signal Strength263
Chapter 10 Ethernet and Fibre Channel266
10.1 The Emergence of High-Speed LANs268
10.2 Traditional Ethernet269
10.3 Bridges,Hubs,and Switches273
10.4 High-Speed Ethernet279
10.5 Fibre Channel285
10.6 Summary291
10.7 Recommended Reading and Web Sites292
10.8 Key Terms,Review Questions,and Problems293
Case Study Ⅳ Carlson Companies295
Chapter 11 Wireless LANs298
11.1 Overview299
11.2 IEEE 802.11 Wireless LAN Standard304
11.3 Bluetooth310
11.4 Summary317
11.5 Recommended Reading andWeb Sites317
11.6 KeyTerms,Review Questions,and Problems318
Case Study Ⅴ St.Luke's Episcopal Hospital320
PART FOUR WIDE AREA NETWORKS323
Chapter 12 Circuit Switching and Packet Switching325
12.1 Switching Techniques326
12.2 Circuit-Switching Networks328
12.3 Packet-Switching Networks335
12.4 Traditional Wide Area Network alternatives340
12.5 Summary348
12.6 Recommended Reading and Web Sites348
12.7 KeyTerms,Review Questions,and Problems349
Case Study Ⅵ Staten Island University Hospital351
Chapter 13 Frame Relay and ATM354
13.1 Wide Area Networking Alternatives356
13.2 Frame Relay360
13.3 Asynchronous Transfer Mode(ATM)367
13.5 Recommended Reading and Web Sites376
13.4 Summary376
13.6 Key Terms,Review Questions,and Problems377
Case Study Ⅶ Olsten Staffing Services380
Case Study Ⅷ Guardian Life Insurance382
Chapter 14 Wireless WANs386
14.1 Cellular Wireless Networks388
14.2 Multiple Access395
14.3 Third-Generation Wireless Communication400
14.4 Satellite Communications403
14.5 Summary411
14.6 Recommended Reading andWeb Sites411
14.7 Key Terms,Review Questions,and Problems412
Case Study Ⅸ Choice Hotels International415
PART FIVE DATA COMMUNICATIONS418
Chapter 15 Data Transmission420
15.1 Signals for Conveying Information421
15.2 Transmission Impairments and Channel Capacity430
15.3 Summary438
15.4 Recommended Reading438
15.5 Key Terms,Review Questions,and Problems439
Chapter 16 Data Communication Fundamentals441
16.1 Analog and Digital Data Communications442
16.2 Data Encoding Techniques446
16.3 Asynchronous and Synchronous Transmission455
16.4 Error Detection459
16.5 Summary462
16.6 Recommended Reading and Web Sites463
16.7 KeyTerms,Review Questions,and Problems463
Chapter 17 Data Link Control and Multiplexing466
17.1 Flow Control and Error Control468
17.2 High-Level Data Link Control470
17.3 Motivation for Multiplexing475
17.4 Frequency Division Multiplexing476
17.5 Synchronous Time Division Multiplexing483
17.7 Recommended Reading and Web Sites490
17.6 Summary490
17.8 Key Terms,Review Questions,and Problems491
Case Study Ⅹ Haukeland University Hospital493
PART SIX MANAGEMENT ISSUES496
Chapter 18 Network Security498
18.1 Security Requirements and Attacks500
18.2 Confidentiality with Symmetric Encryption501
18.3 Message Authentication and Hash Functions510
18.4 Public-Key Encryption and Digital Signatures515
18.5 Virtual Private Networks and IPSec522
18.6 Summary529
18.7 Recommended Reading and Web Sites530
18.8 Key Terms,Review Questions,and Problems531
Case Study Ⅺ The Hacker in All of Us534
Chapter 19 Network Management539
19.1 Network Management Requirements541
19.2 Network Management Systems544
19.3 Simple Network Management Protocol(SNMP)546
19.4 Recommended Reading and Web Sites557
19.5 Key Terms,Review Questions,and Problems558
Glossary560
References567