<p><i>Internet Technologies and Information Services: Second Edition</i> is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Intern
Information technology network and internet
โ Scribed by Bhunia, C. T
- Publisher
- New Age International (P) Ltd., Publishers
- Year
- 2008
- Tongue
- English
- Leaves
- 467
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In almost all technical institutions of learning, the laboratory work in any subject runs concurrently with the course in theory of the subject. Consequently, the students perform the laboratory work mechanically without intellectual involvement in the work. It is, therefore, necessary that the students, before conducting the experimental work, are familiarized with elementary theoretical and other aspects relevant to the experimental work. This book is an attempt to serve this objective for the subject of hydraulic engineering.;Cover; Preface; Contents; 1. Information Technology in 21st Century; 2. Network and Internet Technology; 3. Advanced Error Control Techniques in Network; 4. Data/Network Security Techniques and Approaches; 5. Reviewing Information, IT and Looking into Future IT
โฆ Table of Contents
Cover......Page 1
Preface......Page 8
Contents......Page 10
Introduction......Page 14
Recent Progress of Computer Technologies......Page 15
Current and Future Communication Technologies......Page 35
Local Loop Transport Technology......Page 80
Multimedia Communication and Conferencing Standards......Page 89
UTN Personal Communication......Page 94
From 2G to 3G......Page 95
e-Business and e-Commerce......Page 97
Knowledge Age and Management......Page 99
History Behind Computer Network......Page 112
Functions and Scopes of Networks......Page 128
Introduction of Internet......Page 150
Protocol......Page 152
Switching Techniques......Page 153
Layered Protocol......Page 155
OSI Protocol......Page 156
HDLC/SDLC Frame of Data Link Layer......Page 161
Error Control......Page 162
Control Field......Page 204
Other Protocols......Page 206
TCP/IP Protocols......Page 219
IP Header Descriptions......Page 220
Subnet Mask......Page 230
Classless Addressing and Routing......Page 234
Option Fields of IP......Page 237
Description of TCP Headers......Page 241
UDP Headers......Page 246
Address Resolution Protocol......Page 254
Proxy ARP......Page 258
Reverse Address Resolution Protocol......Page 259
IPv4 to IPv6......Page 261
How Did IPv6 Come Up......Page 265
IPv6 in Details......Page 266
Details on Use of Extension Headers......Page 269
ICMP......Page 271
BOOTP......Page 274
IPv4 and IPv6 Address Compatibility......Page 275
Dual Stack/Tunneling......Page 284
Objective Type Questions......Page 293
Domain Name Service......Page 300
Voice Over Internet or Internet Telephony......Page 302
Technical Problems of Voice Packet Transmission Over Internet......Page 303
IPv6 for Real Time Services......Page 305
Physical Layer Interface......Page 306
Transmission Media Option......Page 312
Introduction......Page 319
Basic BEC Techniques......Page 322
Different Modified Techniques......Page 325
Other Modifications......Page 326
Two Level Coding......Page 327
Parity Selection in Two Level Coding......Page 329
Packet Combining Scheme......Page 330
Modified Packet Combining Scheme......Page 331
YAO Technique......Page 334
Chakraborty's Techniques......Page 335
New Schemes......Page 336
ARQ Schemes Under Practical Situations:......Page 339
GBN and SRQ under different schemes......Page 340
Issues of sending different signal waveforms for repeated retransmitted copies......Page 341
Application of Multilevel Coding Scheme in Variable Error Rate Channel......Page 342
Analysis of the Majority Scheme for SW ARQ......Page 343
4. Data/Network Security Techniques and Approaches......Page 368
Cryptography......Page 371
Substitution Codes......Page 372
Crypanalysis of Classical Ciphers......Page 373
Secret and Private Key Cryptography......Page 375
Block Ciphers......Page 376
DES......Page 377
Modes of Operation of DES......Page 383
Automatic Variable Key......Page 386
Merits and Demerits of DES......Page 388
Qualification of Performance......Page 390
Triple DES......Page 392
International Data Encryption Algorithm......Page 393
Advanced Encryption Standard......Page 395
Comparisons of Secret Key Cryptosystems......Page 398
Modes of Operations of AES......Page 399
Limitations of AES......Page 400
Limitations of Secret or Private Key Cryptography......Page 401
Needham-Schroeder Protocol......Page 402
Station to Station Protocol......Page 403
Merkles's Puzzle Technique of Key Agreement......Page 404
Quantum Security......Page 405
RSA Algorithm......Page 408
Decryption Function......Page 409
How Secure is RSA......Page 411
Limitations of RSA Algorithm......Page 412
Trapdoor Knapsack Problem......Page 414
Public Key Cryptographic Mechanisms......Page 415
Digital Signature under RSA algorithm......Page 416
Check Functions for Authenticity, Integrity and Norepudiation of the Message Content......Page 417
Illustrate the Non-repudiation by Digital Signature of RSA......Page 424
PGP (Pretty Good Privacy)......Page 425
Integrated Solution for Error and Security......Page 429
Internet Security......Page 430
Information and Knowledge......Page 440
Proof of Tom Stonier's Theorem......Page 444
Tom Stonier's Theorem With Shannon's Theorem......Page 445
Proposing Laws of Information......Page 446
Present Imbalance in IT Era, Digital Divide......Page 447
DD Between the Developed and the Developing......Page 449
DD Trend in Future......Page 454
DD Between India and China......Page 457
DD Within a Country......Page 458
Looking Differently......Page 460
Looking into Future IT......Page 465
๐ SIMILAR VOLUMES
<p>Offers an historical perspective of the past 25 years of computers in libraries, profileing currently available processing systems according to their size and platform. The short- and long-term future of information technology in libraries.;College or university bookstores may order five or more
<P>In the not too distant future, internet access will be dominated by wireless networks. With that, wireless edge using optical core next-generation networks will become as ubiquitous as traditional telephone networks. This means that telecom engineers, chip designers, and engineering students must
<p>1.1 Scope This paper deals with the following subjects: 1. Introduction 2. Feasibility study definition in IT 3. Forming a feasibility study team 4. The feasibility study work 5. The feasibility study report 6. Discussion 1.2 Information Technology (IT) Information was defined as anything sensed
Software systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced