Logo

Data Communications by Brian Brown

Small book cover: Data Communications

Data Communications
by


Number of pages: 222

Description:
Contents: Evolution of modern telecommunication networks; Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Signal Characteristics; Standards Organizations; Electrical Standards and RS-232; Data Codes; Channel Organization; Asynchronous and Synchronous Protocols; Binary Synchronous; Bit Orientated Protocols; Simplex, Half-Duplex and Duplex Circuits; Modems; Modulation Methods; TCP/IP and Inter-Networking; Open Systems Interconnect (OSI) Model; WAN interconnections; etc.

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Open NetworksOpen Networks
by - Free Technology Academy
This book explores the open technologies that are at the foundations of modern computer networks. The Internet is built on top of open protocols and open standards. Open networks use the devices made available by the members of the community.
(8914 views)
Book cover: Understanding OSIUnderstanding OSI
by - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(14986 views)
Book cover: Introduction to Networking: How the Internet WorksIntroduction to Networking: How the Internet Works
by - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
(3628 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(8907 views)