책 이미지

책 정보
· 분류 : 국내도서 > 대학교재/전문서적 > 공학계열 > 전기전자공학 > 네트워크/데이터통신
· ISBN : 9788963560014
· 쪽수 : 234쪽
· 출판일 : 2009-02-27
목차
1장
1.1 Why Study Communications?
1.2 Brief History
1.3 Circuit Switching Network
1.4 Packet Switching Network
1.5 Mobile access networks(WLAN)
1.6 Mobile access networks(이동통신)
1.7 Mobility vs Speed
1.8 Wireless Broadband Internet
1.9 동기식 vs 비동기식
1.10 Wibro 연관서비스 비교
1.11 Wireless access networks
1.12 Cellular standards: brief survey
1.13 Home networks
1.14 Internet structure
1.15 Standard
2장
2.1 Internet protocol stack
2.2 Open System & OSI Model
2.3 Connection Strategies
2.4 Delay
2.5 Physical layer
2.6 Data Link layer
2.7 Network layer
2.8 Transport layer
2.9 Session layer
2.10 Presentation layer
2.11 Application layer
3장
3.1 Introduction
3.2 Conductive Metal
3.3 Optical Fiber
3.4 Wireless Communications
3.5 Wireless Communications : 지상파 DMB
3.6 Wireless Communications : 위성 DMB
3.7 Wireless Communications : 기타
3.8 802.15: personal area network
3.9 Comparison of Transmission Media
3.10 Codes
4장
4.1 Introduction
4.2 Digital Encoding Schemes
4.3 Analog Signals
4.4 Bit Rate
4.5 Digital-to-Analog Conversion
5장
5.1 Analog-to-Digital Conversion
5.2 Modems
5.3 DSL
5.4 ADSL
5.5 OFDM
5.6 Different DSL Technologies
6장
6.1 Introduction
6.2 Communication Carrier
6.3 GSM
6.4 Transmission Modes
6.5 Interface Standards
6.6 USB
7장
7.1 Multiplexing
7.2 Digital Carriers
7.3 Contention Protocols
7.4 Token Passing
8장
8.1 Introduction
8.2 Frequency-Dependent Codes
8.3 Run-Length Encoding
8.4 Relative Encoding
8.5 Lempel-Ziv Encoding
8.6 Image Compression
8.7 Multimedia Compression
8.8 Mean Opinion Score
8.9 Speech codecs for VoIP
8.10 Comparison of speech coders
9장
9.1 Introduction
9.2 Simple Error Detection Tech.
9.3 Cyclic Redundancy Checks
9.4 Hamming Codes
9.5 Multiple-bit error correction
10장
10.1 What is network security?
10.2 Data Security
10.3 The language of cryptography
10.3 Symmetric key cryptography
10.4 Public Key Cryptography
10.5 Encryption Algorithms
10.6 Caesar cipher
10.7 Poly-alphabetic cipher
10.8 Transposition Cipher
10.9 Bit-Level Ciphering
10.10 Data Encryption Standard(DES)
10.11 DES, Triple DES, AES
10.12 Clipper Chip
11장
11.1 Cryptographic Algorithms
11.2 Key Distribution, Protection
11.3 Public Key Cryptography
11.4 RSA - Public Key
11.5 Public Key Encryption
11.6 Digital Signatures
11.7 Message Digests
11.8 Internet checksum
11.9 Hash Function Algorithms
12장
12.1 Location of Security Facilities
12.2 Trusted Intermediaries
12.3 Key Distribution Center(KDC)
12.4 Certification Authorities
12.5 Secure e-mail
12.6 Pretty good privacy(PGP)
12.7 Transport Layer Security and Server Authentication
12.8 X.509 Certificate
12.9 Handshakes
12.10 Internet security threats
12.11 Firewalls
12.12 Packet Filtering
12.13 Application gateways
13장
13.1 Introduction
13.2 Signaling
13.3 X-ON/X-OFF
13.4 Frame-Oriented Control
13.5 Unrestricted Protocol
13.6 Stop-and-Wait Protocol
13.7 Protocol Efficiency
13.8 Go-Back-n
14장
14.1 Go-back-n
14.2 Selective Repeat
14.3 Efficiency of Protocols