CART

(0) items

Data Communications and Networking,9780072923544
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Data Communications and Networking

by
Edition:
3rd
ISBN13:

9780072923544

ISBN10:
0072923547
Format:
Hardcover
Pub. Date:
8/13/2003
Publisher(s):
McGraw-Hill Science/Engineering/Math
List Price: $146.30
More New and Used
from Private Sellers
Starting at $0.01
See Prices

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Data Communications and Networking
    Data Communications and Networking
  • Data Communications and Networking
    Data Communications and Networking
  • Data Communications and Networking
    Data Communications and Networking
  • Data Communications and Networking
    Data Communications and Networking
  • Data Communications and Networking (With E-Text)
    Data Communications and Networking (With E-Text)




Summary

Data Communications and Networking, 3/e provides a comprehensive and current introduction to networking technologies. The book is accessible to students from all backgrounds and uses hundreds of figures to visually represent concepts.The new edition has been completely updated to reflect the constantly changing world of network technologies. Enhanced coverage of bluetooth, wireless, satellites, as well as four new chapters on security have been added.The third edition has transitioned from using the 7-layer OSI model to the 5-layer Internet Model. More time is spent on TCP/IP in the new organization.Forouzan's book continues to be supported by an On-line Learning Center (OLC) that contains many extra resources for students and instructors. Some of the features include PowerPoints, solutions, self-quizzing, and Flash animations that illustrate concepts.

Table of Contents

Preface to the Third Edition xxix
Part 1 Overview of Data Communications and Networking 1(44)
Chapter 1 Introduction
3(24)
1.1 DATA COMMUNICATIONS
3(5)
Components
4(1)
Data Representation
5(1)
Direction of Data Flow
6(2)
1.2 NETWORKS
8(7)
Distributed Processing
8(1)
Network Criteria
8(1)
Physical Structures
8(5)
Categories of Networks
13(2)
1.3 THE INTERNET
15(3)
A Brief History
15(1)
The Internet Today
16(2)
1.4 PROTOCOLS AND STANDARDS
18(2)
Protocols
18(1)
Standards
18(1)
Standards Organizations
19(1)
Internet Standards
20(1)
1.5 KEY TERMS
20(1)
1.6 SUMMARY
21(1)
1.7 PRACTICE SET
22(5)
Review Questions
22(1)
Multiple-Choice Questions
23(2)
Exercises
25(2)
Chapter 2 Network Models
27(18)
2.1 LAYERED TASKS
27(2)
Sender, Receiver, and Carrier
27(1)
Hierarchy
28(1)
Services
29(1)
2.2 INTERNET MODEL
29(11)
Peer-to-Peer Processes
30(1)
Functions of Layers
31(8)
Summary of Layers
39(1)
2.3 OSI MODEL
40(1)
2.4 KEY TERMS
41(1)
2.5 SUMMARY
41(1)
2.6 PRACTICE SET
42(7)
Review Questions
42(1)
Multiple-Choice Questions
42(2)
Exercises
44(1)
Part 2 Physical Layer 45(194)
Chapter 3 Signals
49(36)
3.1 ANALOG AND DIGITAL
49(1)
Analog and Digital Data
49(1)
Analog and Digital Signals
49(1)
Periodic and Aperiodic Signals
50(1)
3.2 ANALOG SIGNALS
50(12)
Sine Wave
51(3)
Phase
54(1)
Examples of Sine Waves
54(1)
Time and Frequency Domains
54(2)
Composite Signals
56(3)
Bandwidth
59(3)
3.3 DIGITAL SIGNALS
62(4)
Bit Interval and Bit Rate
62(1)
Digital Signal as a Composite Analog Signal
63(1)
Digital Signal Through a Wide-Bandwidth Medium
63(1)
Digital Signal Through a Band-Limited Medium
63(2)
Digital versus Analog Bandwidth
65(1)
Higher Bit Rate
66(1)
3.4 ANALOG VERSUS DIGITAL
66(1)
Low-pass versus Band-pass
66(1)
Digital Transmission
66(1)
Analog Transmission
67(1)
3.5 DATA RATE LIMITS
67(2)
Noiseless Channel: Nyquist Bit Rate
67(1)
Noisy Channel: Shannon Capacity
68(1)
Using Both Limits
69(1)
3.6 TRANSMISSION IMPAIRMENT
69(3)
Attenuation
69(2)
Distortion
71(1)
Noise
71(1)
3.7 MORE ABOUT SIGNALS
72(2)
Throughput
72(1)
Propagation Speed
72(1)
Propagation Time
73(1)
Wavelength
73(1)
3.8 KEY TERMS
74(1)
3.9 SUMMARY
75(1)
3.10 PRACTICE SET
75(10)
Review Questions
75(1)
Multiple-Choice Questions
76(4)
Exercises
80(5)
Chapter 4 Digital Transmission
85(30)
4.1 LINE CODING
85(10)
Some Characteristics of Line Coding
85(3)
Line Coding Schemes
88(6)
Some Other Schemes
94(1)
4.2 BLOCK CODING
95(3)
Steps in Transformation
96(1)
Some Common Block Codes
97(1)
4.3 SAMPLING
98(5)
Pulse Amplitude Modulation (PAM)
99(1)
Pulse Code Modulation
99(2)
Sampling Rate: Nyquist Theorem
101(1)
How Many Bits per Sample?
102(1)
Bit Rate
103(1)
4.4 TRANSMISSION MODE
103(4)
Parallel Transmission
104(1)
Serial Transmission
104(3)
4.5 KEY TERMS
107(1)
4.6 SUMMARY
108(1)
4.7 PRACTICE SET
108(7)
Review Questions
108(1)
Multiple-Choice Questions
109(3)
Exercises
112(3)
Chapter 5 Analog Transmission
115(34)
5.1 MODULATION OF DIGITAL DATA
115(13)
Aspects of Digital-to-Analog Conversion
116(1)
Amplitude Shift Keying (ASK)
117(3)
Frequency Shift Keying (FSK)
120(2)
Phase Shift Keying (PSK)
122(3)
Quadrature Amplitude Modulation (QAM)
125(2)
Bit/Baud Comparison
127(1)
5.2 TELEPHONE MODEMS
128(5)
Modem Standards
130(3)
5.3 MODULATION OF ANALOG SIGNALS
133(5)
Amplitude Modulation (AM)
134(2)
Frequency Modulation (FM)
136(2)
Phase Modulation (PM)
138(1)
5.4 KEY TERMS
138(1)
5.5 SUMMARY
139(1)
5.6 PRACTICE SET
140(9)
Review Questions
140(1)
Multiple-Choice Questions
141(4)
Exercises
145(4)
Chapter 6 Multiplexing
149(24)
6.1 FDM
150(5)
Multiplexing Process
151(1)
Demultiplexing Process
151(2)
The Analog Hierarchy
153(2)
Other Applications of FDM
155(1)
Implementation
155(1)
6.2 WDM
155(2)
6.3 TDM
157(9)
Time Slots and Frames
157(1)
Interleaving
158(2)
Synchronizing
160(1)
Bit Padding
161(1)
Digital Signal (DS) Service
162(1)
T Lines
163(2)
Inverse TDM
165(1)
More TDM Applications
165(1)
6.4 KEY TERMS
166(1)
6.5 SUMMARY
166(1)
6.6 PRACTICE SET
167(6)
Review Questions
167(1)
Multiple-Choice Questions
167(2)
Exercises
169(4)
Chapter 7 Transmission Media
173(24)
7.1 GUIDED MEDIA
174(10)
Twisted-Pair Cable
174(3)
Coaxial Cable
177(2)
Fiber-Optic Cable
179(5)
7.2 UNGUIDED MEDIA: WIRELESS
184(6)
Radio Waves
186(2)
Microwaves
188(1)
Infrared
189(1)
7.3 KEY TERMS
190(1)
7.4 SUMMARY
190(1)
7.5 PRACTICE SET
191(6)
Review Questions
191(1)
Multiple-Choice Questions
192(3)
Exercises
195(2)
Chapter 8 Circuit Switching and Telephone Network
197(22)
8.1 CIRCUIT SWITCHING
197(7)
Space-Division Switch
199(2)
Time-Division Switch
201(2)
TDM Bus
203(1)
Space- and Time-Division Switch Combinations
203(1)
8.2 TELEPHONE NETWORK
204(7)
Major Components
204(1)
LATAs
205(2)
Making a Connection
207(1)
Analog Services
208(1)
Digital Services
209(1)
A Brief History
210(1)
8.3 KEY TERMS
211(1)
8.4 SUMMARY
211(1)
8.5 PRACTICE SET
212(7)
Review Questions
212(1)
Multiple-Choice Questions
213(2)
Exercises
215(4)
Chapter 9 High-Speed Digital Access: DSL, Cable Modems, and SONET
219(20)
9.1 DSL TECHNOLOGY
219(4)
ADSL
219(3)
Other DSL Technologies
222(1)
9.2 CABLE MODEM
223(5)
Traditional Cable Networks
223(1)
HFC Network
224(2)
Sharing
226(1)
CM and CMTS
226(1)
Data Transmission Schemes: DOCSIS
227(1)
9.3 SONET
228(4)
SONET Devices
229(1)
SONET Frame
229(1)
Frame Transmission
230(1)
Synchronous Transport Signals
230(1)
STS-1
230(1)
Virtual Tributaries
231(1)
Higher-Rate Services
232(1)
9.4 KEY TERMS
232(1)
9.5 SUMMARY
233(1)
9.6 PRACTICE SET
234(9)
Review Questions
234(1)
Multiple-Choice Questions
234(3)
Exercises
237(2)
Part 3 Data Link Layer 239(228)
Chapter 10 Error Detection and Correction
243(24)
10.1 TYPES OF ERRORS
243(2)
Single-Bit Error
243(1)
Burst Error
244(1)
10.2 DETECTION
245(11)
Redundancy
245(1)
Parity Check
246(3)
Cyclic Redundancy Check (CRC)
249(4)
Checksum
253(3)
10.3 ERROR CORRECTION
256(4)
Error Correction by Retransmission
256(1)
Forward Error Correction
256(4)
Burst Error Correction
260(1)
10.4 KEY TERMS
260(1)
10.5 SUMMARY
261(1)
10.6 PRACTICE SET
261(6)
Review Questions
261(1)
Multiple-Choice Questions
262(3)
Exercises
265(2)
Chapter 11 Data Link Control and Protocols
267(28)
11.1 FLOW AND ERROR CONTROL
267(1)
Flow Control
267(1)
Error Control
268(1)
Flow and Error Control Mechanisms
268(1)
11.2 STOP-AND-WAIT ARQ
268(4)
Operation
269(3)
Bidirectional Transmission
272(1)
11.3 GO-BACK-N ARQ
272(6)
Sequence Numbers
273(1)
Sender Sliding Window
273(1)
Receiver Sliding Window
274(1)
Control Variables
274(1)
Timers
274(1)
Acknowledgment
275(1)
Resending Frame
275(1)
Operation
275(2)
Sender Window Size
277(1)
Bidirectional Transmission and Piggybacking
277(1)
11.4 SELECTIVE REPEAT ARQ
278(3)
Sender and Receiver Windows
278(1)
Operation
278(1)
Sender Window Size
279(1)
Bidirectional Transmission and Piggybacking
280(1)
Bandwidth-Delay Product
280(1)
Pipelining
281(1)
11.5 HDLG
281(9)
Configurations and Transfer Modes
281(1)
Frames
282(1)
Frame Format
282(1)
Frame Type
283(4)
Examples
287(1)
Data Transparency
288(2)
11.6 KEY TERMS
290(1)
11.7 SUMMARY
290(1)
11.8 PRACTICE SET
291(4)
Review Questions
291(1)
Multiple-Choice Questions
291(2)
Exercises
293(2)
Chapter 12 Point-to-Point Access: PPP
295(16)
12.1 POINT-TO-POINT PROTOCOL
295(2)
Frame Format
295(1)
Transition States
296(1)
12.2 PPP STACK
297(8)
Link Control Protocol (LCP)
297(3)
Authentication Protocols
300(2)
Network Control Protocol (NCP)
302(2)
An Example
304(1)
12.3 KEY TERMS
305(1)
12.4 SUMMARY
305(1)
12.5 PRACTICE SET
305(6)
Review Questions
305(1)
Multiple-Choice Questions
306(2)
Exercises
308(3)
Chapter 13 Multiple Access
311(22)
13.1 RANDOM ACCESS
311(6)
Multiple Access (MA)
312(2)
Carrier Sense Multiple Access (CSMA)
314(1)
CSMA/CD
315(1)
CSMA/CA
316(1)
13.2 CONTROLLED ACCESS
317(3)
Reservation
318(1)
Polling
318(1)
Token Passing
319(1)
13.3 CHANNELIZATION
320(6)
FDMA
321(1)
TDMA
321(1)
CDMA
321(5)
13.4 KEY TERMS
326(1)
13.5 SUMMARY
326(1)
13.6 PRACTICE SET
327(6)
Review Questions
327(1)
Multiple-Choice Questions
327(3)
Exercises
330(3)
Chapter 14 Local Area Networks: Ethernet
333(28)
14.1 TRADITIONAL ETHERNET
334(10)
MAC Sublayer
334(3)
Physical Layer
337(2)
Physical Layer Implementation
339(2)
Bridged Ethernet
341(1)
Switched Ethernet
342(1)
Full-Duplex Ethernet
343(1)
14.2 FAST ETHERNET
344(6)
Mac Sublayer
344(1)
Physical Layer
345(1)
Physical Layer Implementation
346(4)
14.3 GIGABIT ETHERNET
350(4)
MAC Sublayer
350(1)
Physical Layer
350(1)
Physical Layer Implementation
351(3)
14.4 KEY TERMS
354(1)
14.5 SUMMARY
355(1)
14.6 PRACTICE SET
356(5)
Review Questions
356(1)
Multiple-Choice Questions
356(2)
Exercises
358(3)
Chapter 15 Wireless LANs
361(26)
15.1 IEEE 802.11
361(11)
Architecture
361(2)
Physical Layer
363(2)
MAC Layer
365(5)
Addressing Mechanism
370(2)
15.2 BLUETOOTH
372(8)
Architecture
373(1)
Bluetooth Layers
374(1)
Radio Layer
375(1)
Baseband Layer
375(3)
L2CAP
378(1)
Other Upper Layers
379(1)
15.3 KEY TERMS
380(1)
15.4 SUMMARY
380(1)
15.5 PRACTICE SET
381(6)
Review Questions
381(1)
Multiple-Choice Questions
381(4)
Exercises
385(2)
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
387(22)
16.1 CONNECTING DEVICES
387(9)
Repeaters
387(2)
Hubs
389(1)
Bridges
390(6)
Two-Layer Switch
396(1)
Router and Three-Layer Switches
396(1)
16.2 BACKBONE NETWORKS
396(3)
Bus Backbone
397(1)
Star Backbone
398(1)
Connecting Remote LANs
398(1)
16.3 VIRTUAL LANS
399(5)
Membership
401(1)
Configuration
402(1)
Communication Between Switches
403(1)
IEEE Standard
403(1)
Advantages
403(1)
16.4 KEY TERMS
404(1)
16.5 SUMMARY
404(1)
16.6 PRACTICE SET
405(4)
Review Questions
405(1)
Multiple-Choice Questions
405(2)
Exercises
407(2)
Chapter 17 Cellular Telephone and Satellite Networks
409(26)
17.1 CELLULAR TELEPHONY
409(11)
Frequency-Reuse Principle
409(1)
Transmitting
410(1)
Receiving
411(1)
Handoff
411(1)
Roaming
411(1)
First Generation
411(1)
Second Generation
412(7)
Third Generation
419(1)
17.2 SATELLITE NETWORKS
420(8)
Orbits
420(1)
Footprint
421(1)
Three Categories of Satellites
422(1)
GEO Satellites
423(1)
MEO Satellites
424(1)
LEO Satellites
425(3)
17.3 KEY TERMS
428(1)
17.4 SUMMARY
428(1)
17.5 PRACTICE SET
429(6)
Review Questions
429(1)
Multiple-Choice Questions
429(4)
Exercises
433(2)
Chapter 18 Virtual Circuit Switching: Frame Relay and ATM
435(32)
18.1 VIRTUAL CIRCUIT SWITCHING
435(6)
Global Addressing
436(1)
Virtual Circuit Identifier
436(1)
Three Phases
436(1)
Data Transfer Phase
437(1)
Setup Phase
437(3)
Teardown Phase
440(1)
18.2 FRAME RELAY
441(5)
Architecture
442(1)
Frame Relay Layers
443(1)
FRADs
444(1)
VOFR
445(1)
LMI
445(1)
Congestion Control and Quality of Service
446(1)
18.3 ATM
446(14)
Design Goals
446(1)
Problems
446(3)
Architecture
449(3)
Switching
452(1)
ATM Layers
453(6)
Congestion Control and Quality of Service
459(1)
ATM LANs
459(1)
18.4 KEY TERMS
460(1)
18.5 SUMMARY
460(1)
18.6 PRACTICE SET
461(10)
Review Questions
461(1)
Multiple-Choice Questions
462(2)
Exercises
464(3)
Part 4 Network Layer 467(122)
Chapter 19 Host-to-Host Delivery: Internetworking, Addressing, and Routing
471(42)
19.1 INTERNETWORKS
471(6)
Need for Network Layer
472(2)
Internet as a Packet-Switched Network
474(2)
Internet as a Connectionless Network
476(1)
19.2 ADDRESSING
477(20)
Internet Address
477(2)
Classful Addressing
479(7)
Subnetting
486(4)
Supernetting
490(1)
Classless Addressing
491(1)
Dynamic Address Configuration
492(2)
Network Address Translation (NAT)
494(3)
19.3 ROUTING
497(6)
Routing Techniques
497(2)
Static versus Dynamic Routing
499(1)
Routing Table for Glassful Addressing
500(1)
Routing Table for Classless Addressing: CIDR
501(2)
19.4 KEY TERMS
503(1)
19.5 SUMMARY
503(1)
19.6 PRACTICE SET
504(9)
Review Questions
504(1)
Multiple-Choice Questions
505(3)
Exercises
508(5)
Chapter 20 Network Layer Protocals: ARP, IPv4, ICMP, IPv6, and ICMPv6
513(30)
20.1 ARP
514(5)
Mapping
514(2)
Packet Format
516(1)
Encapsulation
517(1)
Operation
517(2)
20.2 IP
519(6)
Datagram
520(3)
Fragmentation
523(2)
20.3 ICMP
525(3)
Types of Messages
526(2)
20.4 IPV6
528(7)
IPv6 Addresses
529(1)
Categories of Addresses
530(1)
IPv6 Packet Format
531(1)
Fragmentation
532(1)
ICMPv6
532(1)
Transition from IPv4 to IPv6
533(2)
20.5 KEY TERMS
535(1)
20.6 SUMMARY
535(1)
20.7 PRACTICE SET
536(7)
Review Questions
536(1)
Multiple-Choice Questions
537(3)
Exercises
540(3)
Chapter 21 Unicast and Multicast Routing: Routing Protocals
543(46)
21.1 UNICAST ROUTING
543(2)
Metric
544(1)
Interior and Exterior Routing
544(1)
21.2 UNICAST ROUTING PROTOCOLS
545(16)
RIP
546(2)
OSPF
548(9)
BGP
557(4)
21.3 MULTICAST ROUTING 560 IGMP
561(8)
Multicast Trees
567(1)
MBONE
568(1)
21.4 MULTICAST ROUTING PROTOCOLS
569(8)
DVMRP
570(2)
MOSPF
572(2)
CBT
574(2)
PIM
576(1)
Applications
576(1)
21.5 KEY TERMS
577(1)
21.6 SUMMARY
577(2)
21.7 PRACTICE SET
579(14)
Review Questions
579(1)
Multiple-Choice Questions
579(7)
Exercises
586(3)
Part 5 Transport Layer 589(78)
Chapter 22 Process-to-Process Delivery: UDP and TCP
593(40)
22.1 PROCESS-TO-PROCESS DELIVERY
593(8)
Client-Server Paradigm
594(1)
Addressing
594(3)
Multiplexing and Demultiplexing
597(1)
Connectionless versus Connection-Oriented Service
597(3)
Reliable versus Unreliable
600(1)
22.2 USER DATAGRAM PROTOCOL (UDP)
601(2)
Port Numbers
601(1)
User Datagram
601(1)
Applications
602(1)
22.3 TRANSMISSION CONTROL PROTOCOL (TCP)
603(22)
Port Numbers
603(1)
TCP Services
603(3)
Numbering Bytes
606(1)
Sequence Number
607(1)
Segment
608(1)
Connection
609(3)
State Transition Diagram
612(2)
Flow Control
614(4)
Silly Window Syndrome
618(1)
Error Control
619(2)
TCP Timers
621(3)
Congestion Control
624(1)
Other Features
624(1)
22.4 KEY TERMS
625(1)
22.5 SUMMARY
626(1)
22.6 PRACTICE SET
626(7)
Review Questions
626(1)
Multiple-Choice Questions
627(4)
Exercises
631(2)
Chapter 23 Congestion Control and Quality of Service
633(34)
23.1 DATA TRAFFIC
633(3)
Traffic Descriptor
633(1)
Traffic Profiles
634(2)
23.2 CONGESTION
636(2)
Network Performance
636(2)
23.3 CONGESTION CONTROL
638(1)
Open-Loop Congestion Control
638(1)
Closed-Loop Congestion Control
639(1)
23.4 TWO EXAMPLES
639(4)
Congestion Control in TCP
639(2)
Congestion Control in Frame Relay
641(2)
23.5 QUALITY OF SERVICE
643(1)
Flow Characteristics
643(1)
Flow Classes
644(1)
23.6 TECHNIQUES TO IMPROVE QOS
644(5)
Scheduling
644(2)
Traffic Shaping
646(3)
Resource Reservation
649(1)
Admission Control
649(1)
23.7 INTEGRATED SERVICES
649(4)
Signaling
649(1)
Flow Specification
649(1)
Admission
650(1)
Service Classes
650(1)
RSVP
650(3)
Problems with Integrated Services
653(1)
23.8 DIFFERENTIATED SERVICES
653(2)
23.9 QOS IN SWITCHED NETWORKS
655(4)
QoS in Frame Relay
655(2)
QoS in ATM
657(2)
23.10 KEY TERMS
659(1)
23.11 SUMMARY
660(1)
23.12 PRACTICE SET
660(11)
Review Questions
660(1)
Multiple-Choice Questions
661(4)
Exercises
665(2)
Part 6 Application Layer 667(124)
Chapter 24 Client-Server Model: Socket Interface
671(14)
24.1 CLIENT-SERVER MODEL
671(4)
Relationship
671(2)
Concurrency
673(1)
Processes
674(1)
24.2 SOCKET INTERFACE
675(5)
Sockets
675(2)
Connectionless Iterative Server
677(1)
Connection-Oriented Concurrent Server
678(2)
Client and Server Programs
680(1)
24.3 KEY TERMS
680(1)
24.4 SUMMARY
680(1)
24.5 PRACTICE SET
681(4)
Review Questions
681(1)
Multiple-Choice Questions
681(3)
Exercises
684(1)
Chapter 25 Domain Name System (DNS)
685(20)
25.1 NAME SPACE
685(1)
Flat Name Space
685(1)
Hierarchical Name Space
686(1)
25.2 DOMAIN NAME SPACE
686(3)
Label
686(1)
Domain Name
687(1)
Domain
688(1)
25.3 DISTRIBUTION OF NAME SPACE
689(2)
Hierarchy of Name Servers
689(1)
Zone
689(1)
Root Server
690(1)
Primary and Secondary Servers
690(1)
25.4 DNS IN THE INTERNET
691(3)
Generic Domains
691(2)
Country Domains
693(1)
Inverse Domain
693(1)
25.5 RESOLUTION
694(3)
Resolver
694(1)
Mapping Names to Addresses
695(1)
Mapping Addresses to Names
695(1)
Recursive Resolution
695(1)
Iterative Resolution
696(1)
Caching
696(1)
25.6 DNS MESSAGES
697(1)
Header
697(1)
Question Section
698(1)
Answer Section
698(1)
Authoritative Section
698(1)
Additional Information Section
698(1)
25.7 DDNS
698(1)
25.8 ENCAPSULATION
699(1)
25.9 KEY TERMS
699(1)
25.10 SUMMARY
699(1)
25.11 PRACTICE SET
700(5)
Review Questions
700(1)
Multiple-Choice Questions
701(2)
Exercises
703(2)
Chapter 26 Electronic Mail (SMTP) and File Transfer (FTP0
705(26)
26.1 ELECTRONIC MAIL
705(13)
Sending Mail
705(1)
Receiving Mail
706(1)
Addresses
706(1)
User Agent (UA)
707(1)
Multipurpose Internet Mail Extensions (MIME)
708(6)
Mail Transfer Agent (MTA)
714(1)
Mail Delivery
715(2)
Mail Access Protocols
717(1)
Web-Based Mail
718(1)
26.2 FILE TRANSFER
718(7)
Connections
720(1)
Communication
720(2)
File Transfer
722(1)
User Interface
723(1)
Anonymous FTP
724(1)
26.3 KEY TERMS
725(1)
26.4 SUMMARY
725(1)
26.5 PRACTICE SET
726(5)
Review Questions
726(1)
Multiple-Choice Questions
726(3)
Exercises
729(2)
Chapter 27 HTTP and WWW
27.1 HTTP
731(7)
Transaction
732(1)
Request Messages
732(2)
Response Message
734(1)
Headers
735(1)
Some Examples
736(2)
Some Other Features
738(1)
27.2 WORLD WIDE WEB
738(14)
Hypertext and Hypermedia
739(1)
Browser Architecture
740(1)
Static Documents
740(1)
HTML
741(2)
Examples
743(2)
Dynamic Documents
745(1)
Common Gateway Interface (CGI)
746(1)
Examples
746(1)
Active Documents
747(1)
Java
748(3)
Examples
751(1)
27.3 KEY TERMS
752(1)
27.4 SUMMARY
752(1)
27.5 PRACTICE SET
753(8)
Review Questions
753(1)
Multiple-Choice Questions
753(5)
Exercises
758(3)
Chapter 28 Multimedia
761(30)
28.1 DIGITIZING AUDIO AND VIDEO
762(1)
Digitizing Audio
762(1)
Digitizing Video
762(1)
28.2 AUDIO AND VIDEO COMPRESSION
763(6)
Audio Compression
763(1)
Video Compression
764(5)
28.3 STREAMING STORED AUDIO/VIDEO
769(3)
First Approach: Using a Web Server
769(1)
Second Approach: Using a Web Server with Metafile
770(1)
Third Approach: Using a Media Server
770(1)
Fourth Approach: Using a Media Server and RTSP
771(1)
28.4 STREAMING LIVE AUDIO/VIDEO
772(1)
28.5 REAL-TIME INTERACTIVE AUDIO/VIDEO
772(7)
Characteristics
773(4)
Real-Time Transport Protocol
777(1)
Real-Time Transport Control Protocol (RTCP)
778(1)
28.6 VOICE OVER IP
779(5)
SIP
779(2)
H.323
781(3)
28.7 KEY TERMS
784(1)
28.8 SUMMARY
784(1)
28.9 PRACTICE SET
785(10)
Review Questions
785(1)
Multiple-Choice Questions
786(3)
Exercises
789(2)
Part 7 Security 791(70)
Chapter 29 Cryptography
795(20)
29.1 INTRODUCTION
795(1)
29.2 SYMMETRIC-KEY CRYPTOGRAPHY
796(12)
Traditional Ciphers
797(4)
Block Cipher
801(4)
Operation Modes
805(3)
29.3 PUBLIC-KEY CRYPTOGRAPHY
808(2)
RSA
809(1)
Choosing Public and Private Keys
810(1)
29.4 KEY TERMS
810(1)
29.5 SUMMARY
810(1)
29.6 PRACTICE SET
811(4)
Review Questions
811(1)
Multiple-Choice Questions
811(2)
Exercises
813(2)
Chapter 30 Message Security, User Authentication, and Key Management
815(26)
30.1 MESSAGE SECURITY
815(2)
Privacy
816(1)
Message Authentication
817(1)
Integrity
817(1)
Nonrepudiation
817(1)
30.2 DIGITAL SIGNATURE
817(3)
Signing the Whole Document
817(1)
Signing the Digest
818(2)
30.3 USER AUTHENTICATION
820(3)
User Authentication with Symmetric-Key Cryptography
820(2)
User Authentication with Public-Key Cryptography
822(1)
30.4 KEY MANAGEMENT
823(8)
Symmetric Key Distribution
823(6)
Public-Key Certification
829(2)
30.5 KERBEROS
831(4)
Servers
831(1)
Operation
832(2)
Using Different Servers
834(1)
Kerberos Version 5
834(1)
Realms
834(1)
30.6 KEY TERMS
835(1)
30.7 SUMMARY
835(1)
30.8 PRACTICE SET
836(5)
Review Questions
836(1)
Multiple-Choice Questions
836(3)
Exercises
839(2)
Chapter 31 Security Protocals in the Internet
841(24)
31.1 IP LEVEL SECURITY: IPSEC
841(5)
Security Association
842(1)
Two Modes
842(1)
Two Security Protocols
842(2)
Encapsulating Security Payload
844(2)
31.2 TRANSPORT LAYER SECURITY
846(2)
Position of TLS
846(1)
Two Protocols
846(2)
31.3 APPLICATION LAYER SECURITY: PGP
848(1)
31.4 FIREWALLS
849(2)
Packet-Filter Firewall
849(1)
Proxy Firewall
850(1)
31.5 VIRTUAL PRIVATE NETWORK
851(4)
Private Networks
851(1)
Achieving Privacy
852(2)
VPN Technology
854(1)
31.6 KEY TERMS
855(1)
31.7 SUMMARY
855(1)
31.8 PRACTICE SET
856(9)
Review Questions
856(1)
Multiple-Choice Questions
856(3)
Exercises
859(2)
Appendix A ASCII Code 861(4)
Appendix B Numbering Systems and Transformation 865(8)
B.1 NUMBERING SYSTEMS
865(4)
Decimal Numbers
865(1)
Binary Numbers
866(1)
Octal Numbers
867(1)
Hexadecimal Numbers
868(1)
B.2 TRANSFORMATION
869(4)
From Other Systems to Decimal
870(1)
From Decimal to Other Systems
870(1)
From Binary to Octal or Hexadecimal
871(1)
From Octal or Hexadecimal to Binary
872(1)
Appendix C The OSI Model 873(5)
C.1 THE MODEL
873(1)
C.2 LAYERS IN THE OSI MODEL
873(4)
First Four Layers
873(1)
Session Layer
874(1)
Presentation Layer
874(2)
Application Layer
876(1)
C.3 COMPARISON
877(1)
Appendix D 8B/6T Code 878(3)
Appendix E Checksum Calculation 881(4)
E.1 BINARY NOTATION
881(1)
Partial Sum
881(1)
Sum
881(1)
Checksum
881(1)
E.2 HEXADECIMAL NOTATION
882(3)
Partial Sum
882(1)
Sum
883(1)
Checksum
884(1)
Appendix F Structure of a Router 885(4)
F.1 COMPONENTS
885(4)
Input Ports
885(1)
Output Ports
886(1)
Routing Processor
886(1)
Switching Fabrics
886(3)
Appendix G ATM LANs 889(6)
G.1 ATM LAN ARCHITECTURE
889(2)
Pure ATM Architecture
890(1)
Legacy LAN Architecture
890(1)
Mixed Architecture
891(1)
G.2 LAN EMULATION (LANE)
891(1)
G.3 CLIENT-SERVER MODEL
892(3)
LAN Emulation Client (LEC)
892(1)
LAN Emulation Configuration Server (LEGS)
893(1)
LAN Emulation Server (LES)
893(1)
Broadcast/Unknown Server (BUS)
893(2)
Appendix H Client-Server Programs 895(6)
H.1 UDP CLIENT-SERVER PROGRAMS
895(2)
Server Program
895(1)
Client Program
896(1)
H.2 TCP CLIENT-SERVER PROGRAMS
897(4)
Server Program
898(1)
Client Program
899(2)
Appendix I RFCs 901(2)
Appendix J UDP and TCP Ports 903(2)
Appendix K Contract Addresses 905(2)
Acronyms 907(4)
Glossary 911(38)
Index 949


Please wait while the item is added to your cart...