BN.com Gift Guide

Advanced Data Communications and Networks

Overview

The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry. Now there is a textbook that discusses data communications and networking in a readable form that can be easily understood by students who will become the IS professionals of the future.

Advanced Data Communications and Networks provides a comprehensive and practical treatment of rapidly ...

See more details below
Paperback
$95.13
BN.com price
(Save 4%)$99.95 List Price
Other sellers (Paperback)
  • All (12) from $32.84   
  • New (6) from $102.52   
  • Used (6) from $32.84   
Sending request ...

Overview

The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry. Now there is a textbook that discusses data communications and networking in a readable form that can be easily understood by students who will become the IS professionals of the future.

Advanced Data Communications and Networks provides a comprehensive and practical treatment of rapidly evolving areas. The text is divided into seven main sections and appendices:
" General data compression
" Video, images, and sound
" Error coding and encryption
" TCP/IP and the Internet
" Network operating systems
" LANs/WANs
" Cables and connectors

Other topics include error detection/correction, image/video compression, digital video, digital audio, TCP/IP, HTTP, electronic mail, HTML, Windows NT, NetWare, UNIX, Fast Ethernet, ATM, FDDI, and much more.

Written by a respected academician who is also an accomplished engineer, this textbook uses the author's wide practical experience in applying techniques and theory toward solving real engineering problems. It also includes an accompanying Web site that contains software, source code, and other supplemental information.

Read More Show Less

Product Details

  • ISBN-13: 9780412806308
  • Publisher: CRC Press
  • Publication date: 5/1/1998
  • Pages: 638
  • Product dimensions: 7.50 (w) x 9.25 (h) x 1.35 (d)

Table of Contents

INTRODUCTION
Introduction
A Little Bit of History
Information
Digital versus Analogue
Conversion to Digital
Sampling Theory
Quantization
Exercises

COMPRESSION TECHNIQUES
Introduction
Compression Methods
Letter Probabilities
Coding Methods
Statistical Encoding
Repetitive Sequence Suppression
Differential Encoding
Transform Encoding
Exercises
Letter Probability Program

HUFFMAN/LEMPEL-ZIV COMPRESSION METHODS
Introduction
Huffman Coding
Adaptive Huffman Coding
Lempel-Ziv Coding
Lempel-Ziv-Welsh Coding
Variable-Length-Code LZW Compression
Disadvantages with LZ Compression
Practical Lempel-Ziv/Huffman Coding
Exercises

IMAGE COMPRESSION (GIF/TIFF/PCX)
Introduction
Comparison of the Different Methods
GIF Coding
TIFF Coding
GIF Interlaced Images
PCX Coding
Exercises

VIDEO SIGNALS
Introduction
Color-Difference Signals
Quadrature Modulation
Baseband Video Signals
Digitizing TV Signals
100 Hz Pictures
Compressed TV
HDTV Quality
Exercise

MOTION VIDEO COMPRESSION
Motion Video
MPEG-1 Overview
MPEG-1 Video Compression
MPEG-1 Compression Process
MPEG-1 Decoder
MPEG-1 Audio Compression
MPEG-2
MPEG-2 System Layer
Other MPEG-2 Enhancements
MPEG-2 Bit Rate
Exercises

SPEECH AND AUDIO SIGNALS
Introduction
PCM Parameters
Differential Encoding
Speech Compression
A-Law and ยต-Law Companding
Speech Sampling
PCM-TDM Systems
Exercises

AUDIO SIGNALS
Introduction
Principles
Digital Audio Standards
Error Control
Interleaving
CD Audio System
Digital Audio Compression
The 44.1 kHz Sampling Rate
Exercise

AUDIO COMPRESSION (MPEG-AUDIO AND DOLBY)
Introduction
Psycho-Acoustic Model
MPEG Audio Coding
Backward/Forward Adaptive Bit Allocation Methods
Comparison between Forward and Backward Adaptive Methods
Dolby AC-1 and AC-2
Dolby AC-3 Coding
AC-3 Parameters
Exercises

ERROR CODING PRINCIPLES
Introduction
Modulo-2 Arithmetic
Binary Manipulation
Hamming Distance
General Probability Theory
Error Probability
Combinations of Errors
Linear and Cyclic Codes
Block and Convolutional Coding
Systematic and Unsystematic Coding
Feedforward and Feedback Error Correction
Error Types
Coding Gain
Exercises

ERROR CODING (DETECTION)
Introduction
Parity
Block Parity
Checksum
Cyclic Redundancy Checking (CRC)
Exercises

ERROR CODING (CORRECTION)
Introduction
Longitudinal/Vertical Redundancy Checks (LRC/VRC)
Hamming Code
Representations of Hamming Code
Single Error Correction/Double Error Detection Hamming Code
Reed-Solomon Coding
Convolutional Codes
Tutorial

DATA ENCRYPTION PRINCIPLES
Introduction
Government Pressure
Cryptography
Legal Issues
Basic Encryption Principles
Exercises

DATA ENCRYPTION
Introduction
Private-Key Encryption
Public-Key Encryption
Exercises

TCP/IP
Introduction
TCP/IP Gateways and Hosts
Function of the IP Protocol
Internet Datagram
ICMP
TCP/IP Internets
Domain Name System
Internet Naming Structure
Domain Name Server
BootpProtocol
Example Network
Exercises

TCP/IP II
Introduction
IP Ver6
Transmission Control Protocol
TCP/IP Commands
Exercises

ELECTRONIC MAIL
Introduction
Shared-File Approach Versus Client/Server Approach
Electronic Mail Overview
Internet Email Address
SMTP
X.400
MIME
Exercises

THE WORLD WIDE WEB
Introduction
Advantages and Disadvantages of the WWW
Client/Server Architecture
Web Browsers
Internet Resources
Universal Resource Locators (URLs)
Universal Resource Identifier
Intranets
Firewalls
Exercises

HTTP
Introduction
http Operation
Intermediate Systems
Cache
HTML Messages
Exercises

HTML (INTRODUCTION)
Introduction
Links
Lists
Colors
Background Images
Displaying Images
Horizontal Lines
Exercises

HTML (TABLES, FORMS AND HELPERS)
Introduction
Anchors
Tables
CGI Scripts
Forms
Multimedia
Exercises

JAVA/JAVASCRIPT
Introduction
JavaScript
JavaScript Values, Variables and Literals
Expressions and Operators
JavaScript Operators
JavaScript Statements
Conditional Statements
Loops
Comments
Functions
Objects and Properties
Document Objects
Event Handling
Object Manipulation Statements and Operators
Exercises

WINDOWS NT
Introduction
Novell NetWare Networking
Servers, Workstations and Clients
Workgroups and Domains
User and Group Accounts
New User Accounts
File Systems
Windows NT Networking
Setting UP TCP/IP Networking on Windows NT
Windows Sockets
Network Dynamic Data Exchange (Net DDE)
Robust Networking
Security Model
TCP/IP Applications
Windows NT Network Drives
Exercises

NETWARE
Novell NetWare Networking
NetWare and TCP/IP Integration
NetWare Architecture
NetWare Protocols
IPX
Novell NetWare Setup
NetWare 4.1
Exercises

UNIX
Introduction
Network Setup
TCP/IP Protocols
NFS
Network Configuration Files
Sample Startup File
Exercises

NETWORKING ELEMENTS
LANs, WANs, and MANs
OSI Model
Communications Standards and the OSI Model
Standards Agencies
Network Cable Types
LAN Topology
Internetworking Connections
Internet Routing Protocols
Network Topologies
Network Loading
Exercises

ETHERNET
Introduction
IEEE Standards
Ethernet-Media Access Control (MAC) Layer
IEEE 802.2 and Ethernet SNAP
OSI and the IEEE 802.3 Standard
Ethernet Transceivers
NIC
Standard Ethernet Limitations
Ethernet Types
Twisted-Pair Hubs
100 Mbps Ethernet
Ethernet Security
Exercises

TOKEN RING
Introduction
Operation
Token Ring-Media Access Control (MAC)
Token Ring Maintenance
Token Ring Multistation Access Units (MAUs)
Cabling and Connectors
Repeaters
Jitter Suppression
Exercise

FDDI
Introduction
Operation
FDDI Layers
SMT Protocol
Physical Connection Management
Fault Tolerance Method
FDDI Token Format
FDDI Frame Format
MAC Protocol
Applications of FDDI Networks
FDDI Backbone Network
FDDI Attachments
FDDI Media
FDDI Specification
FDDI-II
Standards
Practical FDDI Network-EaStMAN
Exercises

ASYNCHRONOUS TRANSFER MODE (ATM)
Introduction
Real-Time Sampling
PCM-TDM Systems and ISDN
Objectives of ATM
ATM versus ISDN and PCM-TDM
Statistical Multiplexing
ATM User Network Interfaces (UNIs)
ATM Cells
Routing Cell Within an ATM Network
Virtual Channels and Virtual Paths
ATM and the OSI Model
ATM Physical Layer
AAL Service Levels
ATM Flow Control
Practical ATM Networks
Tutorial

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
Introduction
ISDN Channels
ISDN Physical Layer Interfacing
ISDN Data Link Layer
ISDN Network Layer
Exercises

MODEMS
Introduction
RS-232 Communications
Modem Standards
Modem Commands
Modem Setups
Modem Indicators
Digital Modulation
Typical Modems
Fax Transmission
Exercises

ASCII CODING
International Alphabet No. 5
Extended ASCII Code
RS-232C Interface
RS-449 Interface

CABLE SPECIFICATIONS
Introduction

RLE PROGRAM
RLE Program

SNR FOR PCM
SNR

RFC STANDARDS

UNIX NETWORK STARTUP FILES
netnfsrc file
rc file

ETHERNET MONITORING SYSTEM
Ethernet Receiver

ENCRYPTION
Cracking the Code
Random Number Generators
Survey of Private-Key Cryptosystems
Public-Key Cryptosystems

DIGITAL LINE GROUP CODES
Line Codes
NRZI
DSV
4B5B
EFM
5B6B
8B6T
8/10 Code

COMMON ABBREVIATIONS

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)