Data Communications
by Brian Brown
2000
Number of pages: 222
Description:
Contents: Evolution of modern telecommunication networks; Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Signal Characteristics; Standards Organizations; Electrical Standards and RS-232; Data Codes; Channel Organization; Asynchronous and Synchronous Protocols; Binary Synchronous; Bit Orientated Protocols; Simplex, Half-Duplex and Duplex Circuits; Modems; Modulation Methods; TCP/IP and Inter-Networking; Open Systems Interconnect (OSI) Model; WAN interconnections; etc.
Download or read it online for free here:
Read online
(online html)
Similar books
Internetworking Technologies
by Rahul Banerjee - Prentice-Hall of India
Advanced text on internetworking technologies for senior undergraduate/graduate students of computer science. This unique book provides an introduction to the key concepts related to front line areas of interwork specific research and development.
(15780 views)
by Rahul Banerjee - Prentice-Hall of India
Advanced text on internetworking technologies for senior undergraduate/graduate students of computer science. This unique book provides an introduction to the key concepts related to front line areas of interwork specific research and development.
(15780 views)
Network Programming
by Katta G. Murty - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(14732 views)
by Katta G. Murty - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(14732 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13682 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13682 views)
Communication Network Analysis
by Bruce Hajek
This text describes the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues. Written for the graduate course Communication Network Analysis.
(18931 views)
by Bruce Hajek
This text describes the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues. Written for the graduate course Communication Network Analysis.
(18931 views)