Data and computer communications / William Stallings.
Material type:
TextPublisher: Boston : Prentice Hall, [2011]Edition: 9th edtionDescription: xxv, 881 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9780132172172
- 0131392050 (hc : alk. paper)
- 004.6 22 S W D
- TK5105 .S73 2011
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Course reserves | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main library A1 | CSDMT | COI | 004.6 S W D (Browse shelf(Opens below)) | Available | 00014799 | |||
Books
|
Main library A1 | CSDMT | COI | 004.6 S W D (Browse shelf(Opens below)) | Available | 00010155 |
Browsing Main library shelves, Shelving location: A1 Close shelf browser (Hides shelf browser)
| 004.6 S.W.D Data and computer communications / | 004.6 S.W.D Data and computer communications / | 004.6 S.W.D Data and computer communications / | 004.6 S W D Data and computer communications / | 004.6 S.W.D Data and computer communications / | 004.6 S W D Data and computer communications / | 004.6 T.A.C Computer networks / |
Includes bibliographical references and index.
Chapter 0 Reader's and Instructor's Guide
Chapter 1 Data Communications, Data Networking, and the Internet.
Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications.
Chapter 3 Data Transmission.
Chapter 4 Transmission Media
Chapter 5 Signal Encoding Techniques
Chapter 6 Digital Data Communication Techniques
Chapter 7 Data Link Control Protocols
Chapter 8 Multiplexing
Chapter 9 Spread Spectrum
Chapter 10 Circuit Switching and Packet Switching
Chapter 11 Asynchronous Transfer Mode
Chapter 12 Routing in Switched Networks
Chapter 13 Congestion Control in Data Networks
Chapter 14 Cellular Wireless Networks
Chapter 15 Local Area Network Overview
Chapter 16 Ethernet
Chapter 17 Wireless LANs
Chapter 18 Internetwork Protocols
Chapter 19 Internetwork Operation
Chapter 20 Internet Quality of Service
Chapter 21 Multiprotocol Label Switching
Chapter 22 Transport Protocols
Chapter 23 Computer and Network Security Threats
Chapter 24 Computer and Network Security Techniques
There are no comments on this title.