图书介绍

事务数据通信 英文版第3版pdf电子书版本下载

事务数据通信  英文版第3版
  • (美)(W.斯托林斯)WilliamStallings,(美)(R.V.斯莱克)RichardVanSlyke著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:7302028273
  • 出版时间:1998
  • 标注页数:558页
  • 文件大小:37MB
  • 文件页数:574页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

事务数据通信 英文版第3版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

BRIEE CONTENTSChapter 1 Introduction 1

CONTENIS■CHAPTER 1 Introduction 1

1.1 Information and Communication 1

1.3 The Nature of Business Information Requirements 2

1.2 The Manager s Dilemma 2

1.4 Distributed Data Processing 4

1.5 The Transmission of Information 4

1.6 Networks 6

1.7 Communications Software 8

1.8 Management Issues 10

1.9 Standards 11

1.10 Internet Resources 11

1.11 Useful Publications 12

PART 1 REQUIREMENTS 16

Chapter 2 Business Information 17

PART 1 REQUIREMENTS■CHAPTER 2 Business Information 17

2.1 Voice 18

2.2 Data 20

2.3 Image 21

2.4 Video 22

2.5 Response Time 23

Summary 26

Recommended Reading 28

Chapter 3 Distributed Data Processing 30

■CHAPTER 3 Distributed Data Processing 30

3.1 Centralized Versus Distributed Processing 31

3.2 Forms of Distributed Data Processing 41

3.3 Networking Implications of DDP 47

Summary 49

Recommended Reading 50

PART 2 FUNDAMENTALS 52

PART 2 FUNDAMENTALS■CHAPTER 4 Data Transmission and Transmission Media 53

Chapter 4 Data Transmission and Transmission Media 53

4.1 Signals for Conveying Information 54

4.2 Transmission Impairments and Channel Capacity 67

4.3 Transmission Media 74

4.4 Wireless Transmission 84

Recommended Reading 91

Summary 91

■CHAPTER 5 Data Communication Fundamentals 95

Chapter 5 Data Communication Fundamentals 95

5.1 Analog and Digital Data Communication 96

5.2 Data Encoding Techniques 100

5.3 Asynchronous and Synchronous Transmission 107

5.4 Interfacing 111

5.5 FloW Control 117

5.6 Error Detection 123

5.7 Error Correction 125

5.8 Data Link Control 127

Summary 134

Recommended Reading 135

■CHAPTER 6 Transmission Efficiency 139

Chapter 6 Transmission Efficiency 139

6.1 The Need for Transmission Efficiency 140

6.2 Frequency-Division Multiplexing 145

6.3 Synchronous Time-Division Multiplexing 148

6.4 Statistical Time-Division Multiplexing 154

6.5 Data Compression 157

Summary 165

Recommended Reading 166

PART 3 NETWORKING 168

PART 3 NETWORKING■CHAPTER 7 Traditional Wide-Area Networks 169

Chapter 7 Traditional Wide-Area Networks 169

7.1 LANS,MANS,AND WANS 170

7.2 Circuit-Switching Technology 173

7 3 Circuit-Switching Networks 182

7.4 Packet-Switching Networks 188

7.5 X25 195

7.6 Narrowband ISDN 199

7.7 Traditional Wide-Area Network Alternatives 207

Summary 212

Recommended Reading 213

■CHAPTER 8 High-Speed Wide-Area Networks 216

Chapter 8 High-Speed Wide-Area Networks 216

8.1 Wide-Area Networking Alternatives 217

8.2 Frame Relay 222

8.3 Asynchronous Transfer Mode(ATM) 230

8.4 Switched Multimegabit Data Service(SMDS) 238

8.5 Broadband ISDN 239

Summary 243

Recommended Reading 243

Case Study:Florida Power and Light 246

■CHAPTER 9 Local Area Networks 248

Chapter 9 Local Area Networks 248

9.1 Background 249

9.2 LAN Technology 254

9.3 LAN Standards 266

9.4 Ethernet and CSMA/CD 271

9.5 Token Ring 278

9.6 Bridges 279

Summary 282

Recommended Reading 283

Case Study:Levi Strauss 285

Chapter 10 High-Speed and Wireless LANs 288

■CHAPTER 10 High-Speed and Wireless LANs 288

10.1 The Emergence of High-Speed LANs 288

10.2 Fast Ethernet and Gigabit Ethernet 290

10.3 ATMLANs 295

10.4 Fibre Channel 299

10.5 Fiber Distributed Data Interface(FDDI) 305

10.6 Wireless LANs 305

Summary 311

Recommended Reading 311

Case Study:Rock and Roll Hall of Fame and Museum 313

Chapter 11 Wireless Networks 316

■CHAPTER 11 Wireless Networks 316

11.1 Mobile Telephony 317

11.2 The Advanced Mobile Phone Service(AMPS) 317

11.3 Global System for Mobile(GSM)Communications 322

11.4 Multiple Access 325

11.5 Third Generation Wireless Communication 329

11.6 Satellite Communication 330

11.7 Iridium-A Third Generation Satellite System 332

Recommended Reading 337

Case Study:Alohanet 339

Case Study:Indonesia s Palapa Satellite 341

PART 4 APPUCATIONS 342

Chapter 12 TCP/IP and Other Protocol Architectures 343

PART 4 APPLICATIONS■CHAPTER 12 TCP/IP and Other Protocol Architectures 343

12.1 A Simple Protocol Arehitecture 344

12.2 The TCP/IP Protocol Architecture 350

12.3 The OSI Protocol Architecture 357

12.4 IBN s System Network Architecture 358

12.5 Internetworking 364

Summary 368

Recommended Reading 370

Chapter 13 Distributed Applications 372

■CHAPTER 13 Distributed Applications 372

13.1 Electronic Mail 373

13.2 Electronic Data Interchange 387

13.3 WorldWide Web 395

Summary 402

Recommended Reading 404

Case Study:R.J.Reynolds Tobacco Co. 406

Chapter 14 Client/Server and Intranet Computing 408

■CHAPTER 14 Client/Server and Intranet Computing 408

14.1 The Growth of Client/Server Computing 408

14.2 Client/Server Applications 416

14.3 Middleware 421

14.4 Intranets 429

Summary 434

Recommended Reading 435

Case Study:Burlington Coat Factory 437

Case Study:Wisconsin Department of Natural Resources 440

PART 5 MANAGEMENT ISSUES 442

PART 5 MANAGEMENT ISSUES■CHAPTER 15 Doing Business on the Internet 443

Chapter 15 Doing Business on the Internet 443

15.1 The Internet 444

15.2 Security for Commerce on the Internet 452

15.3 Electronic Payment Systems 454

Recommended Reading 464

Case Study:Florida Department of Management Services 465

Chapter 16 Network Management 469

■CHAPTER 16 Network Management 469

16.1 Network Management Requirements 470

16.2 Network Management Systems 474

16.3 Technical Control 482

16.4 Performance Monitoring 485

16.5 Simple Network Management Protocol(SNMP) 489

Summary 500

Recommended Reading 501

Chapter 17 Network Security 504

■CHAPTER 17 Network Security 504

17.1 Security Threats 506

17.2 Eneryption Methods 510

17.3 Encryption Management 517

17.4 Digital Signatures 521

17.5 Web Security 525

Summary 529

Recommended Reading 529

A.1 The Importance of Standards 532

Appendix A Standards and Standards-Setting Organizations 532

■APPENDIX A Standards and Standards-Setting Organizations 532

A.2 Standards and Regulation 533

A.3 Standards-Setting Organizations 533

Glossary 539

References 546

Index 549

精品推荐