Chapter 1 Computer Networks 1
1.1 Data Communication 1
1.2 Linking Terminals and Computers 2
1.3 Data Communication Software 3
1.4 Networking 4
1.5 Summary 6
自测题 7
关键词解释 8
英文词汇 10
正文注释 10
参考译文 10
Chapter 2 Network Basics 15
2.1 What Is an Network? 15
2.2 LANs,MANs and WANs 15
2.3 Open Systems Interconnection(OSI)Reference Model 16
2.3.1 The Physical Layer 16
2.3.2 The Data Link Layer 17
2.3.3 The Network Layer 17
2.3.4 The Transport Layer 18
2.3.5 The Session Layer 19
2.3.6 The Presentation Layer 19
2.3.7 The Application Layer 20
2.4 OSI Model and Communication Between Systems 20
2.4.1 Information Formats 21
2.4.2 Connection-Oriented and Connectionless Network Services 21
2.5 Standards Organizations 21
2.5.1 International Organization for Standardization(ISO) 21
2.5.2 American National Standards Institute(ANSI) 21
2.5.3 Institute of Electrical and Electronic Engineers(IEEE) 21
2.5.4 Internet Architecture Board(IAB) 21
自测题 22
关键词解释 23
英文词汇 24
正文注释 25
参考译文 26
Chapter 3 Intranet 31
3.1 Intranet Introduction 31
3.2 Application in Remote Access 32
3.3 Intranet Securities 33
自测题 34
关键词解释 35
英文词汇 36
正文注释 37
参考译文 37
Chapter 4 Uses of Computer Networks 40
4.1 Business Applications 40
4.2 Home Applications 42
4.3 Mobile Users 46
4.4 Social Issues 49
自测题 51
关键词解释 54
英文词汇 55
正文注释 56
参考译文 56
Chapter 5 LAN and WAN 66
5.1 LAN Technology 66
5.1.1 What Is a LAN? 66
5.1.2 LAN Protocols and the OSI Reference Model 66
5.1.3 LAN Media—Access Methods 66
5.1.4 LAN Transmission Methods 66
5.1.5 LAN Topologies 67
5.1.6 LAN Devices 67
5.2 WAN Technology 68
5.2.1 What Is a WAN? 68
5.2.2 WAN Protocols and the OSI Reference Model 68
5.2.3 WAN Application Technology 68
5.2.4 WAN Devices 69
自测题 69
关键词解释 71
英文词汇 72
正文注释 73
参考译文 73
Chapter 6 Transmission Media(1)—Wired Media 77
6.1 Magnetic Media 77
6.2 Twisted Pair 78
6.3 Baseband Coaxial Cable 79
6.4 Broadband Coaxial Cable 79
6.5 Fiber Optics 80
自测题 81
关键词解释 82
英文词汇 83
正文注释 84
参考译文 84
Chapter 7 Transmission Media(2)—Wireless Media 88
7.1 Radio Transmission 88
7.2 Microwave Transmission 89
7.3 The Telephone System 91
自测题 92
关键词解释 92
英文词汇 93
正文注释 94
参考译文 94
Chapter 8 Bridges,Routers and Gateways 98
8.1 Benefits 98
8.2 Interconnection Basics 99
8.3 Bridges 100
8.4 Subnetworks 100
8.5 Routers 101
8.6 Gateways 102
8.7 Advantages 103
8.8 Intelligent Gateways 104
8.9 Conclusion 105
自测题 105
关键词解释 106
英文词汇 107
正文注释 107
参考译文 107
Chapter 9 Multiple Access Method 113
9.1 Frequency Division Multiple Access(FDMA) 114
9.2 Time Division Multiple Access(TDMA) 115
9.3 Code Division Multiple Access(CDMA) 116
9.4 Space-Division Multiple Access(SDMA) 117
自测题 118
关键词解释 119
英文词汇 120
正文注释 121
参考译文 121
Chapter 10 Fast and Switched Ethernet 126
10.1 Generations of LANs 126
10.1.1 First Generation 126
10.1.2 Second Generation 127
10.1.3 Third Generation 127
10.1.4 Fourth Generation 127
10.2 Switched Ethernet 127
10.2.1 Switched Ethernet Architecture 128
10.2.2 Store and Forward and Cut-Through Switches 129
10.3 Virtual LAN 130
10.4 Fast Ethernet 131
10.4.1 100BaseT 132
10.4.2 AnyLAN 132
10.5 Fast/Switched Ethernet Worksheet 133
10.6 Summary 133
自测题 133
关键词解释 134
英文词汇 135
正文注释 136
参考译文 136
Chapter 11 Frame Relay 143
11.1 The Purpose of Frame Relay 143
11.2 Pertinent Standards 144
11.3 Typical Frame Relay Topology 145
11.4 The Frame Relay Layers 145
11.5 The Frame Relay Core Functions 146
11.6 Potential Congestion Problems 146
自测题 147
关键词解释 148
英文词汇 149
正文注释 149
参考译文 150
Chapter 12 Asynchronous Transfer Mode(ATM) 153
12.1 What Is ATM? 153
12.2 The VPI and VCI Labels 153
12.3 ATM Layers 154
12.4 ATM Protocol Data Units(Cells) 155
12.5 Addressing in an ATM Network 156
自测题 157
关键词解释 158
英文词汇 158
正文注释 159
参考译文 159
Chapter 13 Mobile Communications Technologies 163
13.1 What Is Mobile Communications System? 163
13.2 Typical Cellular Systems Topology 163
13.3 Cordless Systems Operations in More Detail 164
13.3.1 CT2 164
13.3.2 DECT 165
13.4 Third-Generation Mobile Systems 165
13.5 Mobile Communications Summary 166
自测题 167
关键词解释 168
英文词汇 169
正文注释 170
参考译文 170
Chapter 14 Error Control Techniques 174
14.1 What Is Error Control? 174
14.2 Error Detection and Correction 174
14.2.1 Error-Correcting Codes 175
14.2.2 Error-Detecting Codes 175
14.3 Error Control Techniques 176
14.3.1 Forward Error Correction(FEC) 176
14.3.2 Automatic Repeat Request(ARQ) 176
14.3.3 FEC vs ARQ 177
14.4 Hybrid Error Control 177
自测题 178
关键词解释 179
英文词汇 179
正文注释 180
参考译文 181
Chapter 15 Network Protocol 184
15.1 Protocols and the OSI Model 184
15.2 Internet Protocol 185
15.3 The IP Address 186
15.4 Functions of IPv4 Header Fields 186
15.5 Problems with IP and the IP Address 187
15.6 TCP Operations 187
自测题 188
关键词解释 189
英文词汇 190
正文注释 190
参考译文 191
Chapter 16 The Wireless Web 195
16.1 WAP—the Wireless Application Protocol 195
16.2 I-mode 197
16.3 Second-Generation Wireless Web 202
自测题 205
关键词解释 207
英文词汇 207
正文注释 208
参考译文 208
Chapter 17 Computer Viruses 217
17.1 History 217
17.2 How Viruses Act 217
17.3 What Kind of Viruses Are There 218
17.3.1 Macro Viruses 218
17.3.2 Network Viruses 218
17.3.3 Logic Bombs 219
17.3.4 RATs 219
17.3.5 What Is a Computer Worm? 220
17.3.6 Well Known Examples of the Computer Worm 221
17.3.7 Protecting Yourself Against Computer Worms 221
17.3.8 Security Method 221
自测题 223
关键词解释 225
英文词汇 225
正文注释 225
参考译文 226
Chapter 18 Network Management Basics 231
18.1 What Is Network Management? 231
18.2 Network Management Architecture 231
18.3 ISO Network Management Model 232
18.3.1 Performance Management 232
18.3.2 Configuration Management 233
18.3.3 Accounting Management 233
18.3.4 Fault Management 233
18.3.5 Security Management 234
自测题 234
关键词解释 235
英文词汇 236
正文注释 237
参考译文 237
Chapter 19 Linux 240
19.1 What Is Linux? 240
19.2 Linux Versus UNIX 240
19.3 Linux Features 241
19.4 Hardware Requirements 242
19.5 Common Commands 242
自测题 244
关键词解释 245
英文词汇 245
正文注释 246
参考译文 246
Chapter 20 Network Services 250
20.1 DNS—Domain Name System 250
20.2 Electronic Mail 251
20.3 The World Wide Web 252
20.3.1 The Client Side 252
20.3.2 The Server Side 253
20.4 Usenet News 253
自测题 254
关键词解释 255
英文词汇 256
正文注释 257
参考译文 257
Chapter 21 Internet Security(1) 261
21.1 Protecting Confidential Information 261
21.1.1 Network Packet Sniffers 262
21.1.2 IP Spoofing 263
21.1.3 Password Attacks 263
21.1.4 Distribution of Sensitive Information 263
21.1.5 Man-in-the-Middle Attacks 264
21.2 Protecting Your Network:Maintaining Internal Network System Integrity 264
21.2.1 Network Packet Sniffers 265
21.2.2 IP Spoofing 265
21.2.3 Password Attacks 265
21.2.4 Denial-of-Service Attacks 266
21.2.5 Application-Layer Attacks 266
自测题 267
关键词解释 268
英文词汇 269
正文注释 270
参考译文 271
Chapter 22 Internet Security(2) 276
22.1 Trusted,Untrusted and Unknown Networks 276
22.1.1 Trusted Networks 276
22.1.2 Untrusted Networks 277
22.1.3 Unknown Networks 277
22.2 Establishing a Security Perimeter 277
22.3 Developing Your Security Design 278
22.3.1 Knowing Your Enemy 278
22.3.2 Counting the Cost 279
22.3.3 Identifying Your Assumptions 279
22.3.4 Controlling Your Secrets 279
22.3.5 Remembering Human Factors 279
22.3.6 Knowing Your Weaknesses 280
22.3.7 Limiting the Scope of Access 280
22.3.8 Understanding Your Environment 280
22.3.9 Limiting Your Trust 280
22.3.10 Remembering Physical Security 281
22.3.11 Making Security Pervasive 281
自测题 281
关键词解释 282
英文词汇 283
正文注释 284
参考译文 285
附录 自测题答案 289
参考文献 291