Preface |
|
xvii | |
INTRODUCTION |
|
1 | (14) |
|
|
1 | (1) |
|
1.2 A little bit of history |
|
|
1 | (7) |
|
|
8 | (1) |
|
1.4 Digital versus analogue |
|
|
9 | (1) |
|
1.5 Conversion to digital |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
COMPRESSION TECHNIQUES |
|
15 | (14) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (3) |
|
|
19 | (1) |
|
|
20 | (1) |
|
2.6 Repetitive sequence suppression |
|
|
21 | (4) |
|
2.7 Differential encoding |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
2.10 Letter probablity program |
|
|
27 | (2) |
HUFFMAN/LEMPEL-ZIV COMPRESSION METHODS |
|
29 | (10) |
|
|
29 | (1) |
|
|
29 | (2) |
|
3.3 Adaptive Huffman coding |
|
|
31 | (1) |
|
|
31 | (1) |
|
3.5 Lempel-Ziv-Welsh coding |
|
|
32 | (2) |
|
3.6 Variable-length-code LZW compression |
|
|
34 | (1) |
|
3.7 Disadvantages with LZ compression |
|
|
34 | (1) |
|
3.8 Practical Lempel-Ziv/Huffinan coding |
|
|
34 | (3) |
|
|
37 | (2) |
IMAGE COMPRESSION (GIF/TIFF/ PCX) |
|
39 | (22) |
|
|
39 | (1) |
|
4.2 Comparison of the different methods |
|
|
40 | (1) |
|
|
41 | (11) |
|
|
52 | (4) |
|
4.5 GIF interlaced images |
|
|
56 | (1) |
|
|
57 | (3) |
|
|
60 | (1) |
IMAGE COMPRESSION (JPEG) |
|
61 | (20) |
|
|
61 | (1) |
|
|
61 | (9) |
|
|
70 | (2) |
|
|
72 | (6) |
|
|
78 | (1) |
|
|
79 | (2) |
VIDEO SIGNALS |
|
81 | (16) |
|
|
81 | (1) |
|
6.2 Color-difference signals |
|
|
81 | (3) |
|
6.3 Quadrature modulation |
|
|
84 | (2) |
|
6.4 Baseband video signals |
|
|
86 | (5) |
|
6.5 Digitizing TV signals |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
MOTION VIDEO COMPRESSION |
|
97 | (14) |
|
|
97 | (1) |
|
|
97 | (1) |
|
7.3 MPEG-1 video compression |
|
|
98 | (1) |
|
7.4 MPEG-1 compression process |
|
|
99 | (5) |
|
|
104 | (1) |
|
7.6 MPEG-1 audio compression |
|
|
105 | (1) |
|
|
105 | (2) |
|
|
107 | (1) |
|
7.9 Other MPEG-2 enhancements |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (2) |
SPEECH AND AUDIO SIGNALS |
|
111 | (18) |
|
|
111 | (1) |
|
|
111 | (2) |
|
8.3 Differential encoding |
|
|
113 | (4) |
|
|
117 | (2) |
|
8.5 A-Law and μ-Law companding |
|
|
119 | (5) |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (3) |
AUDIO SIGNALS |
|
129 | (14) |
|
|
129 | (1) |
|
|
129 | (1) |
|
9.3 Digital audio standards |
|
|
130 | (7) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
9.7 Digital audio compression |
|
|
141 | (1) |
|
9.8 The 44.1 kHz sampling rate |
|
|
141 | (1) |
|
|
142 | (1) |
AUDIO COMPRESSION (MPEG-AUDIO AND DOLBY AC-3) |
|
143 | (16) |
|
|
143 | (1) |
|
10.2 Psycho-acoustic model |
|
|
143 | (2) |
|
|
145 | (5) |
|
10.4 Backward/forward adaptive bit allocation methods |
|
|
150 | (3) |
|
10.5 Comparison between forward and backward adaptive methods |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
ERROR CODING PRINCIPLES |
|
159 | (16) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
11.5 General probability theory |
|
|
162 | (1) |
|
|
163 | (2) |
|
11.7 Combinations of errors |
|
|
165 | (3) |
|
11.8 Linear and cyclic codes |
|
|
168 | (1) |
|
11.9 Block and convolutional coding |
|
|
168 | (1) |
|
11.10 Systematic and unsystematic coding |
|
|
169 | (1) |
|
11.11 Feedforward and feedback error correction |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (3) |
ERROR CODING (DETECTION) |
|
175 | (10) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
12.5 Cyclic redundancy checking (CRC) |
|
|
177 | (6) |
|
|
183 | (2) |
ERROR CODING (CORRECTION) |
|
185 | (20) |
|
|
185 | (1) |
|
13.2 Longitudinal/vertical redundancy checks (LRC/VRC) |
|
|
185 | (1) |
|
|
186 | (1) |
|
13.4 Representations of Hamming code |
|
|
187 | (5) |
|
13.5 Single error correction/double error detection Hamming code |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (9) |
|
|
202 | (3) |
DATA ENCRYPTION PRINCIPLES |
|
205 | (14) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (3) |
|
|
209 | (1) |
|
14.5 Basic encryption principles |
|
|
210 | (5) |
|
|
215 | (4) |
DATA ENCRYPTION |
|
219 | (12) |
|
|
219 | (1) |
|
15.2 Private-key encryption |
|
|
219 | (9) |
|
15.3 Public-key encryption |
|
|
228 | (1) |
|
|
229 | (2) |
TCP/IP |
|
231 | (18) |
|
|
231 | (1) |
|
16.2 TCP/IP gateways and hosts |
|
|
232 | (1) |
|
16.3 Function of the IP protocol |
|
|
233 | (1) |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
236 | (4) |
|
|
240 | (1) |
|
16.8 Internet naming structure |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (3) |
|
|
248 | (1) |
TCP/IP II |
|
249 | (14) |
|
|
249 | (1) |
|
|
249 | (1) |
|
17.3 Transmission control protocol |
|
|
250 | (3) |
|
|
253 | (7) |
|
|
260 | (3) |
ELECTRONIC MAIL |
|
263 | (22) |
|
|
263 | (1) |
|
18.2 Shared-file approach versus client/server approach |
|
|
264 | (1) |
|
18.3 Electronic mail overview |
|
|
265 | (2) |
|
18.4 Internet email address |
|
|
267 | (1) |
|
|
267 | (7) |
|
|
274 | (1) |
|
|
275 | (7) |
|
|
282 | (3) |
THE WORLD WIDE WEB |
|
285 | (16) |
|
|
285 | (1) |
|
19.2 Advantages and disadvantages of the WWW |
|
|
286 | (2) |
|
19.3 Client/server architecture |
|
|
288 | (1) |
|
|
289 | (3) |
|
|
292 | (1) |
|
19.6 Universal resource locators (URLs) |
|
|
292 | (3) |
|
19.7 Universal resource identifier |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (3) |
|
|
299 | (2) |
HTTP |
|
301 | (10) |
|
|
301 | (1) |
|
|
301 | (1) |
|
20.3 Intermediate systems |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (6) |
|
|
309 | (2) |
HTML (INTRODUCTION) |
|
311 | (18) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
314 | (5) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (3) |
|
|
324 | (1) |
|
|
325 | (4) |
HTML (TABLES, FORMS AND HELPERS) |
|
329 | (16) |
|
|
329 | (1) |
|
|
329 | (2) |
|
|
331 | (2) |
|
|
333 | (1) |
|
|
334 | (5) |
|
|
339 | (2) |
|
|
341 | (4) |
JAVA/JAVASCRIPT |
|
345 | (24) |
|
|
345 | (2) |
|
|
347 | (1) |
|
23.3 JavaScript values, variables and literals |
|
|
348 | (3) |
|
23.4 Expressions and operators |
|
|
351 | (1) |
|
23.5 JavaScript operators |
|
|
352 | (5) |
|
23.6 JavaScript statements |
|
|
357 | (1) |
|
23.7 Conditional statements |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
23.11 Objects and properties |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (3) |
|
23.14 Object manipulation statements and operators |
|
|
365 | (2) |
|
|
367 | (2) |
WINDOWS NT |
|
369 | (22) |
|
|
369 | (1) |
|
24.2 Novell NetWare networking |
|
|
370 | (1) |
|
24.3 Servers, workstations and clients |
|
|
370 | (1) |
|
24.4 Workgroups and domains |
|
|
371 | (1) |
|
24.5 User and group accounts |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (3) |
|
24.8 Windows NT networking |
|
|
376 | (3) |
|
24.9 Setting up TCP/IP networking on Windows NT |
|
|
379 | (1) |
|
|
380 | (3) |
|
24.11 Network dynamic data exchange (Net DDE) |
|
|
383 | (1) |
|
|
383 | (2) |
|
|
385 | (1) |
|
24.14 TCP/IP applications |
|
|
386 | (1) |
|
24.15 Windows NT network drives |
|
|
387 | (1) |
|
|
388 | (3) |
NETWARE |
|
391 | (18) |
|
25.1 Novell NetWare networking |
|
|
391 | (1) |
|
25.2 NetWare and TCP/IP integration |
|
|
391 | (1) |
|
25.3 NetWare architecture |
|
|
391 | (3) |
|
|
394 | (1) |
|
|
395 | (5) |
|
25.6 Novell NetWare setup |
|
|
400 | (3) |
|
|
403 | (4) |
|
|
407 | (2) |
UNIX |
|
409 | (14) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (2) |
|
|
412 | (7) |
|
26.5 Network configuration files |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (3) |
NETWORKING ELEMENTS |
|
423 | (22) |
|
27.1 LANs, WANs, and MANs |
|
|
423 | (2) |
|
|
425 | (2) |
|
27.3 Communications standards and the OSI model |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
428 | (2) |
|
|
430 | (2) |
|
27.7 Internetworking connections |
|
|
432 | (4) |
|
27.8 Internet routing protocols |
|
|
436 | (4) |
|
|
440 | (3) |
|
|
443 | (1) |
|
|
443 | (2) |
ETHERNET |
|
445 | (24) |
|
|
445 | (1) |
|
|
446 | (1) |
|
28.3 Ethernet - media access control (MAC) layer |
|
|
447 | (1) |
|
28.4 IEEE 802.2 and Ethernet SNAP |
|
|
448 | (2) |
|
28.5 OSI and the IEEE 802.3 standard |
|
|
450 | (2) |
|
28.6 Ethernet transceivers |
|
|
452 | (1) |
|
|
453 | (4) |
|
28.8 Standard Ethernet limitations |
|
|
457 | (2) |
|
|
459 | (1) |
|
|
460 | (2) |
|
|
462 | (5) |
|
|
467 | (1) |
|
|
468 | (1) |
TOKEN RING |
|
469 | (10) |
|
|
469 | (1) |
|
|
469 | (2) |
|
29.3 Token Ring - media access control (MAC) |
|
|
471 | (2) |
|
29.4 Token Ring maintenance |
|
|
473 | (1) |
|
29.5 Token Ring multistation access units (MAUs) |
|
|
474 | (1) |
|
29.6 Cabling and connectors |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
|
477 | (2) |
FDDI |
|
479 | (18) |
|
|
479 | (1) |
|
|
479 | (2) |
|
|
481 | (2) |
|
|
483 | (1) |
|
30.5 Physical connection management |
|
|
483 | (1) |
|
30.6 Fault tolerance method |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (2) |
|
|
486 | (1) |
|
30.10 Applications of FDDI networks |
|
|
487 | (1) |
|
30.11 FDDI backbone network |
|
|
488 | (1) |
|
|
488 | (2) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
30.17 Practical FDDI network - EaStMAN |
|
|
493 | (2) |
|
|
495 | (2) |
ASYNCHRONOUS TRANSFER MODE (ATM) |
|
497 | (18) |
|
|
497 | (1) |
|
|
498 | (1) |
|
31.3 PCM-TDM systems and ISDN |
|
|
499 | (1) |
|
|
500 | (1) |
|
31.5 ATM versus ISDN and PCM-TDM |
|
|
501 | (1) |
|
31.6 Statistical multiplexing |
|
|
502 | (1) |
|
31.7 ATM user network interfaces (UNIs) |
|
|
502 | (1) |
|
|
502 | (1) |
|
31.9 Routing cell within an ATM network |
|
|
503 | (2) |
|
31.10 Virtual channels and virtual paths |
|
|
505 | (1) |
|
31.11 ATM and the OSI model |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
508 | (4) |
|
|
512 | (1) |
|
31.15 Practical ATM networks |
|
|
513 | (1) |
|
|
513 | (2) |
INTEGRATED SERVICES DIGITAL NETWORK (ISDN) |
|
515 | (14) |
|
|
515 | (1) |
|
|
516 | (1) |
|
32.3 ISDN physical layer interfacing |
|
|
517 | (4) |
|
32.4 ISDN data link layer |
|
|
521 | (4) |
|
|
525 | (1) |
|
|
526 | (3) |
MODEMS |
|
529 | (16) |
|
|
529 | (1) |
|
33.2 RS-232 communications |
|
|
530 | (2) |
|
|
532 | (1) |
|
|
532 | (3) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
538 | (2) |
|
|
540 | (1) |
|
|
541 | (2) |
|
|
543 | (2) |
ASCII CODING |
|
545 | (6) |
|
A.l International alphabet No. 5 |
|
|
545 | (2) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
549 | (2) |
CABLE SPECIFICATIONS |
|
551 | (6) |
|
|
551 | (6) |
RLE PROGRAM |
|
557 | (4) |
|
|
557 | (4) |
SNR FOR PCM |
|
561 | (2) |
|
|
561 | (2) |
RFC STANDARDS |
|
563 | (4) |
UNIX NETWORK STARTUP FILES |
|
567 | (12) |
|
|
571 | (8) |
ETHERNET MONITORING SYSTEM |
|
|
|
ENCRYPTION |
|
579 | (4) |
|
|
579 | (1) |
|
H.2 Random number generators |
|
|
579 | (1) |
|
H.3 Survey of private-key cryptosystems |
|
|
580 | (2) |
|
H.4 Public-key cryptosystems |
|
|
582 | (1) |
DIGITAL LINE GROUP CODES |
|
583 | |
|
|
583 | (1) |
|
|
583 | (2) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | |
COMMON ABBREVIATIONS |
|
553 | (48) |
Index |
|
601 | |