Advanced Data Communications and Networks

by ;
Format: Nonspecific Binding
Pub. Date: 1998-05-12
Publisher(s): CRC Press
List Price: $120.00

Buy New

Usually Ships in 5-7 Business Days
$119.88

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:180 Days access
Downloadable:180 Days
$99.00
Online:365 Days access
Downloadable:365 Days
$117.00
Online:1825 Days access
Downloadable:Lifetime Access
$180.00
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$99.00*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book provides a comprehensive and practical treatment of such rapidly evolving areas as Fast Ethernet, ATM networks, FDDI networks and many others. It analyses practical LANs and WANs and deals with how they interconnect with other networks.

Table of Contents

Preface xvii
INTRODUCTION 1(14)
1.1 Introduction
1(1)
1.2 A little bit of history
1(7)
1.3 Information
8(1)
1.4 Digital versus analogue
9(1)
1.5 Conversion to digital
10(1)
1.6 Sampling theory
11(1)
1.7 Quantization
12(1)
1.8 Exercises
13(2)
COMPRESSION TECHNIQUES 15(14)
2.1 Introduction
15(1)
2.2 Compression methods
16(1)
2.3 Letter probabilities
16(3)
2.4 Coding methods
19(1)
2.5 Statistical encoding
20(1)
2.6 Repetitive sequence suppression
21(4)
2.7 Differential encoding
25(1)
2.8 Transform encoding
26(1)
2.9 Exercises
26(1)
2.10 Letter probablity program
27(2)
HUFFMAN/LEMPEL-ZIV COMPRESSION METHODS 29(10)
3.1 Introduction
29(1)
3.2 Huffman coding
29(2)
3.3 Adaptive Huffman coding
31(1)
3.4 Lempel-Ziv coding
31(1)
3.5 Lempel-Ziv-Welsh coding
32(2)
3.6 Variable-length-code LZW compression
34(1)
3.7 Disadvantages with LZ compression
34(1)
3.8 Practical Lempel-Ziv/Huffinan coding
34(3)
3.9 Exercises
37(2)
IMAGE COMPRESSION (GIF/TIFF/ PCX) 39(22)
4.1 Introduction
39(1)
4.2 Comparison of the different methods
40(1)
4.3 GIF coding
41(11)
4.4 V TIFF coding
52(4)
4.5 GIF interlaced images
56(1)
4.6 PCX coding
57(3)
4.7 Exercises
60(1)
IMAGE COMPRESSION (JPEG) 61(20)
5.1 Introduction
61(1)
5.2 JPEG coding
61(9)
5.3 JPEG decoding
70(2)
5.4 JPEG file format
72(6)
5.5 JPEG modes
78(1)
5.6 Exercises
79(2)
VIDEO SIGNALS 81(16)
6.1 Introduction
81(1)
6.2 Color-difference signals
81(3)
6.3 Quadrature modulation
84(2)
6.4 Baseband video signals
86(5)
6.5 Digitizing TV signals
91(2)
6.6 100 Hz pictures
93(1)
6.7 Compressed TV
94(1)
6.8 HDTV quality
94(1)
6.9 Exercise
95(2)
MOTION VIDEO COMPRESSION 97(14)
7.1 Motion video
97(1)
7.2 MPEG-I overview
97(1)
7.3 MPEG-1 video compression
98(1)
7.4 MPEG-1 compression process
99(5)
7.5 MPEG-l decoder
104(1)
7.6 MPEG-1 audio compression
105(1)
7.7 MPEG-2
105(2)
7.8 MPEG-2 system layer
107(1)
7.9 Other MPEG-2 enhancements
108(1)
7.10 MPEG-2 bit rate
108(1)
7.11 Exercises
109(2)
SPEECH AND AUDIO SIGNALS 111(18)
8.1 Introduction
111(1)
8.2 PCM parameters
111(2)
8.3 Differential encoding
113(4)
8.4 Speech compression
117(2)
8.5 A-Law and μ-Law companding
119(5)
8.6 Speech sampling
124(1)
8.7 PCM-TDM systems
124(2)
8.8 Exercises
126(3)
AUDIO SIGNALS 129(14)
9.1 Introduction
129(1)
9.2 Principles
129(1)
9.3 Digital audio standards
130(7)
9.4 Error control
137(1)
9.5 Interleaving
138(1)
9.6 CD audio system
139(2)
9.7 Digital audio compression
141(1)
9.8 The 44.1 kHz sampling rate
141(1)
9.9 Exercise
142(1)
AUDIO COMPRESSION (MPEG-AUDIO AND DOLBY AC-3) 143(16)
10.1 Introduction
143(1)
10.2 Psycho-acoustic model
143(2)
10.3 MPEG audio coding
145(5)
10.4 Backward/forward adaptive bit allocation methods
150(3)
10.5 Comparison between forward and backward adaptive methods
153(1)
10.6 Dolby AC-1 and AC-2
154(1)
10.7 Dolby AC-3 coding
155(1)
10.8 AC-3 parameters
156(1)
10.9 Exercises
157(2)
ERROR CODING PRINCIPLES 159(16)
11.1 Introduction
159(1)
11.2 Modulo-2 arithmetic
159(1)
11.3 Binary manipulation
160(1)
11.4 Hamming distance
161(1)
11.5 General probability theory
162(1)
11.6 Error probability
163(2)
11.7 Combinations of errors
165(3)
11.8 Linear and cyclic codes
168(1)
11.9 Block and convolutional coding
168(1)
11.10 Systematic and unsystematic coding
169(1)
11.11 Feedforward and feedback error correction
169(1)
11.12 Error types
170(2)
11.13 Coding gain
172(1)
11.14 Exercises
172(3)
ERROR CODING (DETECTION) 175(10)
12.1 Introduction
175(1)
12.2 Parity
175(1)
12.3 Block parity
176(1)
12.4 Checksum
177(1)
12.5 Cyclic redundancy checking (CRC)
177(6)
12.6 Exercises
183(2)
ERROR CODING (CORRECTION) 185(20)
13.1 Introduction
185(1)
13.2 Longitudinal/vertical redundancy checks (LRC/VRC)
185(1)
13.3 Hamming code
186(1)
13.4 Representations of Hamming code
187(5)
13.5 Single error correction/double error detection Hamming code
192(1)
13.6 Reed-Solomon coding
193(1)
13.7 Convolution codes
193(9)
13.8 Tutorial
202(3)
DATA ENCRYPTION PRINCIPLES 205(14)
14.1 Introduction
205(1)
14.2 Government pressure
205(1)
14.3 Cryptography
206(3)
14.4 Legal issues
209(1)
14.5 Basic encryption principles
210(5)
14.6 Exercises
215(4)
DATA ENCRYPTION 219(12)
15.1 Introduction
219(1)
15.2 Private-key encryption
219(9)
15.3 Public-key encryption
228(1)
15.4 Exercises
229(2)
TCP/IP 231(18)
16.1 Introduction
231(1)
16.2 TCP/IP gateways and hosts
232(1)
16.3 Function of the IP protocol
233(1)
16.4 Internet datagram
233(2)
16.5 ICMP
235(1)
16.6 TCP/IP internets
236(4)
16.7 Domain name system
240(1)
16.8 Internet naming structure
241(1)
16.9 Domain name server
242(1)
16.10 Bootp protocol
243(2)
16.11 Example network
245(3)
16.12 Exercises
248(1)
TCP/IP II 249(14)
17.1 Introduction
249(1)
17.2 IP Ver6
249(1)
17.3 Transmission control protocol
250(3)
17.4 TCP/IP commands
253(7)
17.5 Exercises
260(3)
ELECTRONIC MAIL 263(22)
18.1 Introduction
263(1)
18.2 Shared-file approach versus client/server approach
264(1)
18.3 Electronic mail overview
265(2)
18.4 Internet email address
267(1)
18.5 SMTP
267(7)
18.6 X.400
274(1)
18.7 MIME
275(7)
18.8 Exercises
282(3)
THE WORLD WIDE WEB 285(16)
19.1 Introduction
285(1)
19.2 Advantages and disadvantages of the WWW
286(2)
19.3 Client/server architecture
288(1)
19.4 Web browsers
289(3)
19.5 Internet resources
292(1)
19.6 Universal resource locators (URLs)
292(3)
19.7 Universal resource identifier
295(1)
19.8 Intranets
295(1)
19.9 Firewalls
296(3)
19.10 Exercises
299(2)
HTTP 301(10)
20.1 Introduction
301(1)
20.2 HTTP operation
301(1)
20.3 Intermediate systems
302(1)
20.4 Cache
303(1)
20.5 HTML, messages
303(6)
20.6 Exercises
309(2)
HTML (INTRODUCTION) 311(18)
21.1 Introduction
311(2)
21.2 Links
313(1)
21.3 Lists
314(5)
21.4 Colors
319(1)
21.5 Background images
320(1)
21.6 Displaying images
321(3)
21.7 Horizontal lines
324(1)
21.8 Exercises
325(4)
HTML (TABLES, FORMS AND HELPERS) 329(16)
22.1 Introduction
329(1)
22.2 Anchors
329(2)
22.3 Tables
331(2)
22.4 CGI scripts
333(1)
22.5 Forms
334(5)
22.6 Multimedia
339(2)
22.7 Exercises
341(4)
JAVA/JAVASCRIPT 345(24)
23.1 Introduction
345(2)
23.2 JavaScript
347(1)
23.3 JavaScript values, variables and literals
348(3)
23.4 Expressions and operators
351(1)
23.5 JavaScript operators
352(5)
23.6 JavaScript statements
357(1)
23.7 Conditional statements
357(1)
23.8 Loops
358(1)
23.9 Comments
359(1)
23.10 Functions
360(1)
23.11 Objects and properties
361(1)
23.12 Document objects
361(1)
23.13 Event handling
362(3)
23.14 Object manipulation statements and operators
365(2)
23.15 Exercises
367(2)
WINDOWS NT 369(22)
24.1 Introduction
369(1)
24.2 Novell NetWare networking
370(1)
24.3 Servers, workstations and clients
370(1)
24.4 Workgroups and domains
371(1)
24.5 User and group accounts
372(1)
24.6 New user accounts
372(1)
24.7 File systems
373(3)
24.8 Windows NT networking
376(3)
24.9 Setting up TCP/IP networking on Windows NT
379(1)
24.10 Windows sockets
380(3)
24.11 Network dynamic data exchange (Net DDE)
383(1)
24.12 Robust networking
383(2)
24.13 Security model
385(1)
24.14 TCP/IP applications
386(1)
24.15 Windows NT network drives
387(1)
24.16 Exercises
388(3)
NETWARE 391(18)
25.1 Novell NetWare networking
391(1)
25.2 NetWare and TCP/IP integration
391(1)
25.3 NetWare architecture
391(3)
25.4 NetWare protocols
394(1)
25.5 IPX
395(5)
25.6 Novell NetWare setup
400(3)
25.7 NetWare 4.1
403(4)
25.8 Exercises
407(2)
UNIX 409(14)
26.1 Introduction
409(1)
26.2 Network setup
410(1)
26.3 TCP/IP protocols
410(2)
26.4 NFS
412(7)
26.5 Network configuration files
419(1)
26.6 Sample startup file
420(1)
26.7 Exercises
420(3)
NETWORKING ELEMENTS 423(22)
27.1 LANs, WANs, and MANs
423(2)
27.2 OSI model
425(2)
27.3 Communications standards and the OSI model
427(1)
27.4 Standards agencies
428(1)
27.5 Network cable types
428(2)
27.6 LAN topology
430(2)
27.7 Internetworking connections
432(4)
27.8 Internet routing protocols
436(4)
27.9 Network topologies
440(3)
27.10 Network loading
443(1)
27.11 Exercises
443(2)
ETHERNET 445(24)
28.1 Introduction
445(1)
28.2 IEEE standards
446(1)
28.3 Ethernet - media access control (MAC) layer
447(1)
28.4 IEEE 802.2 and Ethernet SNAP
448(2)
28.5 OSI and the IEEE 802.3 standard
450(2)
28.6 Ethernet transceivers
452(1)
28.7 NIC
453(4)
28.8 Standard Ethernet limitations
457(2)
28.9 Ethernet types
459(1)
28.10 Twisted-pair hubs
460(2)
28.11 100 Mbps Ethernet
462(5)
28.12 Ethernet security
467(1)
28.13 Exercises
468(1)
TOKEN RING 469(10)
29.1 Introduction
469(1)
29.2 Operation
469(2)
29.3 Token Ring - media access control (MAC)
471(2)
29.4 Token Ring maintenance
473(1)
29.5 Token Ring multistation access units (MAUs)
474(1)
29.6 Cabling and connectors
475(1)
29.7 Repeaters
476(1)
29.8 Jitter suppression
477(1)
29.9 Exercise
477(2)
FDDI 479(18)
30.1 Introduction
479(1)
30.2 Operation
479(2)
30.3 FDDI layers
481(2)
30.4 SMT protocol
483(1)
30.5 Physical connection management
483(1)
30.6 Fault tolerance method
483(1)
30.7 FDDI token format
484(1)
30.8 FDDI Frame format
484(2)
30.9 MAC protocol
486(1)
30.10 Applications of FDDI networks
487(1)
30.11 FDDI backbone network
488(1)
30.12 FDDI attachments
488(2)
30.13 FDDI media
490(1)
30.14 FDDI specification
490(1)
30.15 FDDI-II
491(1)
30.16 Standards
492(1)
30.17 Practical FDDI network - EaStMAN
493(2)
30.18 Exercises
495(2)
ASYNCHRONOUS TRANSFER MODE (ATM) 497(18)
31.1 Introduction
497(1)
31.2 Real-time sampling
498(1)
31.3 PCM-TDM systems and ISDN
499(1)
31.4 Objectives of ATM
500(1)
31.5 ATM versus ISDN and PCM-TDM
501(1)
31.6 Statistical multiplexing
502(1)
31.7 ATM user network interfaces (UNIs)
502(1)
31.8 ATM cells
502(1)
31.9 Routing cell within an ATM network
503(2)
31.10 Virtual channels and virtual paths
505(1)
31.11 ATM and the OSI model
506(1)
31.12 ATM physical layer
507(1)
31.13 AAL service levels
508(4)
31.14 ATM flow control
512(1)
31.15 Practical ATM networks
513(1)
31.16 Tutorial
513(2)
INTEGRATED SERVICES DIGITAL NETWORK (ISDN) 515(14)
32.1 Introduction
515(1)
32.2 ISDN channels
516(1)
32.3 ISDN physical layer interfacing
517(4)
32.4 ISDN data link layer
521(4)
32.5 ISDN network layer
525(1)
32.6 Exercises
526(3)
MODEMS 529(16)
33.1 Introduction
529(1)
33.2 RS-232 communications
530(2)
33.3 Modem standards
532(1)
33.4 Modem commands
532(3)
33.5 Modem setups
535(2)
33.6 Modem indicators
537(1)
33.7 Digital Modulation
538(2)
33.8 Typical modems
540(1)
33.9 Fax transmission
541(2)
33.10 Exercises
543(2)
ASCII CODING 545(6)
A.l International alphabet No. 5
545(2)
A.2 Extended ASCII code
547(2)
A.3 RS-232C interface
549(1)
A.4 RS-449 interface
549(2)
CABLE SPECIFICATIONS 551(6)
B.1 Introduction
551(6)
RLE PROGRAM 557(4)
C.1 RLE program
557(4)
SNR FOR PCM 561(2)
D.1 SNR
561(2)
RFC STANDARDS 563(4)
UNIX NETWORK STARTUP FILES 567(12)
F.2 rc file
571(8)
ETHERNET MONITORING SYSTEM
G.1 Ethernet receiver
ENCRYPTION 579(4)
H.1 Cracking the code
579(1)
H.2 Random number generators
579(1)
H.3 Survey of private-key cryptosystems
580(2)
H.4 Public-key cryptosystems
582(1)
DIGITAL LINE GROUP CODES 583
I.1 Line codes
583(1)
I.2 NRZI
583(2)
I.3 DSV
585(1)
I.3 4B5B
585(1)
I.3 EFM
586(1)
I.3 5B6B
587(1)
I.3 8B6T
588(1)
I.3 8/10 code
589
COMMON ABBREVIATIONS 553(48)
Index 601

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.