Data Communications
by Brian Brown
2000
Number of pages: 222
Description:
Contents: Evolution of modern telecommunication networks; Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Signal Characteristics; Standards Organizations; Electrical Standards and RS-232; Data Codes; Channel Organization; Asynchronous and Synchronous Protocols; Binary Synchronous; Bit Orientated Protocols; Simplex, Half-Duplex and Duplex Circuits; Modems; Modulation Methods; TCP/IP and Inter-Networking; Open Systems Interconnect (OSI) Model; WAN interconnections; etc.
Download or read it online for free here:
Read online
(online html)
Similar books
An Introduction to ATM Networks
by Harry G. Perros - Wiley
Asynchronous Transfer Mode (ATM) has become an integral part of the networking infrastructure. This introductory text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an accessible way.
(11229 views)
by Harry G. Perros - Wiley
Asynchronous Transfer Mode (ATM) has become an integral part of the networking infrastructure. This introductory text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an accessible way.
(11229 views)
Introduction to Networking Technologies
- IBM Redbooks
This tutorial describes a sampling of technologies of various types. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking, with the applicability of these technologies.
(17547 views)
- IBM Redbooks
This tutorial describes a sampling of technologies of various types. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking, with the applicability of these technologies.
(17547 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13066 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13066 views)
An Introduction to Computer Networks
by Peter L Dordal - Loyola University Chicago
A free general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text ...
(17015 views)
by Peter L Dordal - Loyola University Chicago
A free general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text ...
(17015 views)