This book addresses the main subject areas associated with multimedia communications (applications, networks, protocols, and standards) at a level that enables the reader to develop an in-depth understanding of the technical issues associated with this rapidly evolving subject. It is an updated approach to the author's Data Communications, Computer Networks and Open Systems, Fourth Edition, set in the context of the increasingly important area of multimedia. The book identifies the different types of multimedia applications, quantifies their communication requirements, and describes the operation and protocols of the different kinds of networks that are used to support them. These networks include LANs, the Internet and World Wide Web, and home-entertainment networks such as cable and satellite. It also includes coverage of the main compression algorithms used with text, images, speech, audio, and video. This book is suitable for programmers interested in learning the integral multimedia aspects of networked communications.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...