Cover image for Information Technology Network and Internet.
Information Technology Network and Internet.
Title:
Information Technology Network and Internet.
Author:
Bhunia, C.T.
ISBN:
9788122423198
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (467 pages)
Contents:
Cover -- Preface -- Contents -- 1. Information Technology in 21st Century -- Introduction -- Recent Progress of Computer Technologies -- Current and Future Communication Technologies -- Local Loop Transport Technology -- Multimedia Communication and Conferencing Standards -- UTN Personal Communication -- From 2G to 3G -- e-Business and e-Commerce -- Knowledge Age and Management -- 2. Network and Internet Technology -- History Behind Computer Network -- Objective of Networking -- Functions and Scopes of Networks -- Introduction of Internet -- Protocol -- Switching Techniques -- Layered Protocol -- OSI Protocol -- HDLC/SDLC Frame of Data Link Layer -- Error Control -- Control Field -- Other Protocols -- TCP/IP Protocols -- IP Header Descriptions -- Unregistered or Private Address Space -- Subnet Mask -- Classless Addressing and Routing -- Option Fields of IP -- Description of TCP Headers -- UDP Headers -- Address Resolution Protocol -- Proxy ARP -- Reverse Address Resolution Protocol -- IPv4 to IPv6 -- How Did IPv6 Come Up -- IPv6 in Details -- Details on Use of Extension Headers -- ICMP -- BOOTP -- DHCP -- IPv4 and IPv6 Address Compatibility -- Dual Stack/Tunneling -- Objective Type Questions -- Domain Name Service -- Voice Over Internet or Internet Telephony -- Technical Problems of Voice Packet Transmission Over Internet -- IPv6 for Real Time Services -- Physical Layer Interface -- Transmission Media Option -- 3. Advanced Error Control Techniques in Network -- Introduction -- Basic BEC Techniques -- Different Modified Techniques -- Sastry's Scheme and Morris Modification -- Other Modifications -- Two Level Coding -- Parity Selection in Two Level Coding -- Packet Combining Scheme -- Modified Packet Combining Scheme -- ARQs for Variable Error Rate Channels -- YAO Technique -- Chakraborty's Techniques -- New Schemes.

ARQ Schemes Under Practical Situations: -- GBN and SRQ under different schemes -- Issues of sending different signal waveforms for repeated retransmitted copies -- Application of Multilevel Coding Scheme in Variable Error Rate Channel -- Majority Technique -- Analysis of the Majority Scheme for SW ARQ -- 4. Data/Network Security Techniques and Approaches -- Data or Information Security Introduction -- Cryptography -- Conventional Encryption -- Classical Cipher -- Substitution Codes -- Transposition Codes -- Crypanalysis of Classical Ciphers -- General Attacks -- Secret and Private Key Cryptography -- Stream Cipher -- Block Ciphers -- DES -- Modes of Operation of DES -- Automatic Variable Key -- Proof of DES -- Merits and Demerits of DES -- Qualification of Performance -- Triple DES -- International Data Encryption Algorithm -- Advanced Encryption Standard -- Comparisons of Secret Key Cryptosystems -- Modes of Operations of AES -- Limitations of AES -- Limitations of Secret or Private Key Cryptography -- Key Transport Protocol -- Needham-Schroeder Protocol -- Key Agreement Protocol -- Diffie-Hellman Protocol -- Station to Station Protocol -- Merkles's Puzzle Technique of Key Agreement -- Quantum Security -- Public Key Cryptography -- Public key Cryplographic Algorithms -- RSA Algorithm -- Key Design Under RSA Algorithm -- RSA Encyption Function -- Decryption Function -- How Does RSA Work/Work/Proof of RSA -- How Secure is RSA -- Limitations of RSA Algorithm -- Trapdoor Knapsack Problem -- McElience's Public Key -- Comparison of RSA and TRAP DOOR Public Key Cryptosystems -- Public Key Cryptographic Mechanisms -- Digital Signature under RSA algorithm -- Check Functions for Authenticity, Integrity and Norepudiation of the Message Content -- Illustrate the Non-repudiation by Digital Signature of RSA -- Strength of Mechanism -- PGP (Pretty Good Privacy).

Modern Crypto Systems -- Integrated Solution for Error and Security -- Internet Security -- 5. Reviewing Information, IT and Looking into Future IT -- Information and Knowledge -- Proof of Tom Stonier's Theorem -- Tom Stonier's Theorem With Shannon's Theorem -- Proposing Laws of Information -- Mass Energy Equivalency -- Present Imbalance in IT Era, Digital Divide -- DD Between the Developed and the Developing -- DD Trend in Future -- DD Between India and China -- DD Within a Country -- DD in Language Zone -- Looking Differently -- Looking into Future IT.
Abstract:
In almost all technical institutions of learning, the laboratory work in any subject runs concurrently with the course in theory of the subject. Consequently, the students perform the laboratory work mechanically without intellectual involvement in the work. It is, therefore, necessary that the students, before conducting the experimental work, are familiarized with elementary theoretical and other aspects relevant to the experimental work. This book is an attempt to serve this objective for the subject of hydraulic engineering.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: