ebook img

Handbook of Data Communications and Networks PDF

1115 Pages·1999·48.63 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook of Data Communications and Networks

Handbook of Data Communications and Networks Handbook of Data Communications and Networks by Bill Buchanan Napier University '~·' SPRINGER SCIENCE+BUSINESS MEDIA, LLC Library of Congress Cataloging-in-Publication Data ISBN 978-1-4757-0907-0 ISBN 978-1-4757-0905-6 (eBook) DOI 10.1007/978-1-4757-0905-6 Printed on acid-free paper All Rights Reserved © 1999 Springer Science+Business Media New York Originally published by Kluwer Academic Publishers, Boston in 1999 No part of the material protected by this copyright notice may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without written permission from the copyright owner. 0 Table of Contents Preface xxi 1 INTRODUCTION 1 1.1 Introduction 1 1.2 A little bit ofhistory 1 1.3 Infonnation 7 1.4 Conversion to digital 8 1.5 Sampling theory 9 1.6 Quantization 10 2 COMPRESSION TECHNIQUES 12 2. I Introduction 12 2.2 Compression methods 13 2.3 Letter probabilities 13 2.4 Coding methods 16 2.5 Statistical encoding 16 2.6 Repetitive sequence suppression 17 2.7 Differential encoding 21 2.8 Transfonn encoding 22 2.9 Letter probability program 22 3 HUFFMAN/LEMPEL-ZIV COMPRESSION METHODS 24 3. I Introduction 24 3.2 Huffman coding 24 3.3 Adaptive Huffinan coding 25 3.4 Lempel-Ziv coding 26 3.5 Lempel-Ziv-Welsh coding 26 3.6 Variable-length-code LZW compression 28 3.7 Disadvantages with LZ compression 28 3.8 Practical Lempel-Ziv/Huffman coding 28 4 IMAGE COMPRESSION (GIF/TIFF/PCX) 32 4.1 Introduction 32 4.2 Comparison of the different methods 33 4.3 GIF coding 34 4.4 TIFF coding 44 4.5 G IF interlaced images 48 4.6 PCX coding 48 5 IMAGE COMPRESSION (JPEG) 51 5.1 Introduction 51 Vll viii Contents 5.2 JPEG coding 51 5.3 JPEG decoding 59 5.4 JPEG file format 61 5.5 JPEG modes 67 6 VIDEO SIGNALS 68 6.1 Introduction 68 6.2 Color-difference signals 68 6.3 Quadrature modulation 70 6.4 Baseband video signals 73 6.5 Extra notes 77 7 DIGITAL TV 78 7.1 Introduction 78 7.2 100 Hz pictures 80 7.3 Analogue component hybrid systems 80 7.4 Compressed TV 81 7.5 HDTV quality 81 8 MOTION VIDEO COMPRESSION 83 8.1 Motion video 83 8.2 MPEG-1 overview 83 8.3 MPEG-1 video compression 84 8.4 MPEG-1 compression process 85 8.5 MPEG-1 decoder 89 8.6 MPEG-1 audio compression 90 8.7 MPEG-2 90 8.8 MPEG-2 system layer 91 8.9 Other MPEG-2 enhancements 92 8.10 MPEG-2 bit rate 92 8.11 Practical MPEG compression process 93 9 SPEECH AND AUDIO SIGNALS 96 9.1 Introduction 96 9.2 PCM parameters 96 9.3 Differential encoding 98 9.4 Speech compression 102 9.5 A-Law and 11-Law companding 103 9.6 Speech sampling 107 9.7 PCM-TDM systems 107 10 AUDIO SIGNALS 110 10.1 Introduction 110 10.:2 Principles 110 10.3 Digital audio standards 111 10.4 Error control 117 10.5 Interleaving 117 Contents IX 10.6 CD audio system 118 10.7 Digital audio compression 121 10.8 The 44.1 kHz sampling rate 121 11 AUDIO COMPRESSION (MPEG-AUDIO AND DOLBY AC-3) 122 11.1 Introduction 122 11.2 Psycho-acoustic model 122 11.3 MPEG audio coding 123 11.4 Backward/forward adaptive bit allocation methods 129 11.5 Comparison between forward and backward adaptive methods 130 11.6 Dolby AC-1 and AC-2 132 11.7 Dolby AC-3 coding 132 11.8 AC-3 parameters 133 12 ERROR CODING PRINCIPLES 135 12.1 Introduction 135 12.2 Modulo-2 arithmetic 135 12.3 Binary manipulation 136 12.4 Hamming distance 137 12.5 General probability theory 138 12.6 Error probability 139 12.7 Combinations of errors 140 12.8 Linear and cyclic codes 143 12.9 Block and convolutional coding 143 12.10 Systematic and unsystematic coding 144 12.11 Feedforward and feedback error correction 144 12.12 Error types 145 12.13 Coding gain 146 13 ERROR CODING (DETECTION) 147 13.1 Introduction 147 13.2 Parity 147 13.3 Block parity 147 13.4 Checksum 148 13.5 Cyclic redundancy checking (CRC) 149 14 ERROR CODING (CORRECTION) 154 14.1 Introduction 154 14.2 Longitudinal/vertical redundancy checks (LRC!VRC) 154 14.3 Hamming code 155 14.4 Representations of Hamming code 156 14.5 Single error correction/double error detection Hamming code 160 14.6 Reed-Solomon coding 160 14.7 Convolution codes 161 15 DATA ENCRYPTION PRINCIPLES 170 15.1 Introduction 170 X Contents 15.2 Government pressure 170 15.3 Cryptography 171 15.4 Legal issues 172 15.5 Basic encryption principles 174 16 DATA ENCRYPTION 180 16.1 Introduction 180 16.2 Cracking the code 180 16.3 Random number generators 181 16.4 Survey of private-key cryptosystems 181 16.5 Private-key encryption 182 17 PUBLIC-KEY ENCRYPTION 190 17.1 Introduction 190 17.2 RSA 191 18 TRANSMISSION CONTROL PROTOCOL (TCP) AND INTERNET PROTOCOL (IP) 195 18.1 Introduction 195 18.2 TCP/IP gateways and hosts 196 18.3 Function of the IP protocol 196 18.4 Internet datagram 197 18.5 ICMP 198 18.6 TCP/IP internets 199 18.7 Domain name system 203 18.8 Internet naming structure 204 18.9 Domain name server 204 18.10 Bootp protocol 206 18.11 Example network 208 19 TCP, IP VER6 AND TCPIIP COMMAND 211 19.1 Introduction 211 19.2 IP Ver6 211 19.3 Transmission control protocol 213 19.4 TCP/IP commands 215 20 WINSOCK PROGRAMMING 220 20.1 Introduction 220 20.2 Windows Sockets 220 21 ELECTRONIC MAIL 229 21.1 Introduction 229 21.2 Shared-file approach versus client/server approach 230 21.3 Electronic mail overview 231 21.4 Internet email address 232 21.5 SMTP 233 21.6 X.400 239 Contents xi 21.7 MIME 239 22 THE WORLD WIDE WEB 247 22.1 Introduction 247 22.2 Advantages and disadvantages ofthe WWW 249 22.3 Client/server architecture 250 22.4 Web browsers 250 22.5 Internet resources 251 22.6 Universal resource locators (URLs) 252 22.7 Universal resource identifier 255 23 INTRANETS 256 23.1 Introduction 256 23.2 Firewalls 257 23.3 Extranets 259 23.4 Network security 259 24 HTTP 262 24.1 Introduction 262 24.2 HTTP operation 262 24.3 Intermediate systems 262 24.4 Cache 264 24.5 HTML messages 264 25 HTML (INTRODUCTION) 269 25.1 Introduction 269 25.2 Links 270 25.3 Lists 272 25.4 Colors 275 25.5 Background images 276 25.6 Displaying images 277 25.7 Horizontal lines 280 26 HTML (TABLES, FORMS AND HELPERS) 281 26.1 Introduction 281 26.2 Anchors 281 26.3 Tables 282 26.4 CGI scripts 286 26.5 Forms 286 26.6 Multimedia 290 27 JAVA (INTRODUCTION) 292 27.1 Introduction 292 27.2 Standalone programs 294 27.3 Data types 295 27.4 Characters and strings 296 27.5 Java operators 298 xii Contents 27.6 Selection statements 302 27.7 Loops 305 27.8 Classes 307 27.9 Constructors 310 27.10 Method overloading 311 27.11 Static methods 313 27.12 Constants 314 27.13 Package statements 316 27.14 Import statements 316 27.15 Mathematical operations 318 27.16 Arrays 320 28 JAVA (EVENTS AND WINDOWS) 324 28.1 Introduction 324 28.2 Applet tag 324 28.3 Creating an applet 325 28.4 Applet basics 326 28.5 The paint() object 327 28.6 Java events 327 28.7 Java 1.0 and Java 1.1 328 28.8 Initialization and exit methods 329 28.9 Mouse events in Java 1.0 330 28.10 Mouse event handling in Java 1.1 331 28.11 Mouse selection in Java 1.0 333 28.12 Keyboard input in Java 1.0 335 28.13 Keyboard events in Java 1.1 337 28.14 Buttons and events 339 28.15 Action with Java 1.0 339 28.16 Action Listener in Java 1.1 342 28.17 Checkboxes 345 28.18 Item listener in Java 1.1 345 28.19 Radio buttons 347 28.20 Pop-up menu choices 348 28.21 Other pop-up menu options 350 28.22 Multiple menus 352 28.23 Menu bar 353 28.24 List box 355 28.25 File dialog 358 29 JAVA (NETWORKING) 359 29.1 Introduction 359 29.2 Java networking functions 359 29.3 Connecting to a WWW site 366 29.4 Socket programming 369 29.5 Creating a socket 372 29.6 Client/server program 374

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.