Book 4: Table of Contents |
Part 1 NETWORK TECHNOLOGY |
Page |
1. Protocols and Transmission Control |
|
Introduction |
2 |
1.1 Network Architecture |
3 |
1.1.1 The Background of the Birth of Network Architecture |
3 |
1.1.2 Outline and Standards of Network Architecture |
3 |
1.1.3 The Types of Network Architecture |
5 |
1.1.4 De Facto Standards |
5 |
1.1.5 Network Topology and Connection Methods |
5 |
1.2 OSI - Standardization of Communication Protocols |
7 |
1.2.1 Overview of OSI |
7 |
1.2.2 OSI Basic Reference Model |
9 |
1.2.3 Communication Procedures in OSI |
12 |
1.3 TCP/IP - The De Facto Standard of Communication Protocols |
13 |
1.3.1 Overview of TCP/IP |
13 |
1.3.2 Communication Procedures in TCP/IP |
16 |
1.4 Addresses Used for TCP/IP |
16 |
1.4.1 IP Address |
16 |
1.4.2 MAC Addresses |
20 |
1.5 Terminal Interfaces |
21 |
1.5.1 V-series |
21 |
1.5.2 X-series |
22 |
1.5.3 I-series |
22 |
1.5.4 RS-232C |
23 |
1.6 Transmission Control |
23 |
1.6.1 Overview and Flow of Transmission Control |
24 |
1.6.2 Transmission Control Procedures |
25 |
Exercises |
30 |
2. Encoding and Transmission |
|
Introduction |
33 |
2.1 Modulation and Encoding |
33 |
2.1.1 Communication Lines |
33 |
2.1.2 Modulation Technique |
33 |
2.1.3 Encoding Technique |
34 |
2.2 Transmission Technology |
36 |
2.2.1 Error Control |
36 |
2.2.2 Synchronous Control |
38 |
2.2.3 Multiplexing Methods |
39 |
2.2.4 Compression and Decompression Methods |
42 |
2.3 Transmission Methods and Communication Lines |
45 |
2.3.1 Classes of Transmission Channel |
45 |
2.3.2 Types of Communication Lines |
46 |
2.3.3 Switching Methods |
47 |
Exercises |
54 |
3. Networks (LAN and WAN) |
|
Introduction |
58 |
3.1 LAN |
59 |
3.1.1 Features of LAN |
59 |
3.1.2 Topology of LAN |
59 |
3.1.3 LAN Connection Architecture |
60 |
3.1.4 LAN Components |
61 |
3.1.5 LAN Access Control Methods |
65 |
3.1.6 Inter-LAN Connection Equipment |
68 |
3.1.7 LAN Speed-up Technology |
70 |
3.2 The Internet |
72 |
3.2.1 The Historical Background of the Development of the Internet |
72 |
3.2.2 The Structure of the Internet |
73 |
3.2.3 Internet Technology |
75 |
3.2.4 Types of Servers |
76 |
Exercises3.2.5 Internet Services |
78 |
3.2.6 Search Engines |
80 |
3.2.7 Internet Related Knowledge |
81 |
3.3 Network Security |
83 |
3.3.1 Confidentiality Protection and Falsification Prevention |
83 |
3.3.2 Illegal Intrusion and Protection against Computer Viruses |
89 |
3.3.3 Availability Measures |
91 |
3.3.4 Privacy Protection |
93 |
Exercises |
95 |
4. Communication Equipment and Network Software |
|
4.1 Communication Equipment |
99 |
4.1.1 Transmission Media (Communication Cables) |
99 |
4.1.2 Peripheral Communication Equipment |
101 |
4.2 Network Software |
103 |
4.2.1 Network Management |
104 |
4.2.2 Network OS (NOS) |
105 |
Exercises |
107 |
Answers to Exercises |
108 |
Answers for No.4 Part1 Chapter1 (Protocols and Transmission Control) |
108 |
Answers for No.4 Part1 Chapter2 (Encoding and Transmission) |
115 |
Answers for No.4 Part1 Chapter3 (Networks(LAN and WAN) |
123 |
Answers for No.4 Part1 Chapter4 (Communication Equipment and Network Software) |
130 |
Part 2 DATABASE TECHNOLOGY |
|
1. Overview of Database |
|
1.1 Purpose of Database |
134 |
1.2 Database Model |
136 |
1.2.1 Data Modeling |
136 |
1.2.2 Conceptual Data Model |
137 |
1.2.3 Logical Data Model |
137 |
1.2.4 3-Tier Schema |
139 |
1.3 Data Analysis |
141 |
1.3.1 ERD |
141 |
1.3.2 Normalization |
141 |
1.4 Data Manipulation |
151 |
1.4.1 Set Operation |
151 |
1.4.2 Relational Operation |
153 |
Exercises |
155 |
2. Database Language |
|
2.1 What are Database Languages? |
162 |
2.1.1 Data Definition Language |
162 |
2.1.2 Data Manipulation Language |
162 |
2.1.3 End User Language |
162 |
2.2 SQL |
163 |
2.2.1 SQL: Database Language |
163 |
2.2.2 Structure of SQL |
163 |
2.3 Database Definition, Data Access Control and Loading |
165 |
2.3.1 Definition of Database |
165 |
2.3.2 Definition of Schema |
165 |
2.3.3 Definition of Table |
166 |
2.3.4 Characteristics and Definition of View |
168 |
2.3.5 Data Access Control |
169 |
2.3.6 Data Loading |
170 |
2.4 Database Manipulation |
171 |
2.4.1 Query Processing |
171 |
2.4.2 Join Processing |
184 |
2.4.3 Using Subqueries |
186 |
2.4.4 Use of View |
190 |
2.4.5 Change Processing |
190 |
2.4.6 Summary of SQL |
192 |
2.5 Extended Use of SQL |
199 |
2.5.1 Embedded SQL |
199 |
2.5.2 Cursor Operation |
199 |
2.5.3 Non-Cursor Operation |
203 |
Exercises |
204 |
3. Database Management |
|
3.1 Functions and Characteristics of Database Management System (DBMS) |
209 |
3.1.1 Roles of DBMS |
209 |
3.1.2 Functions of DBMS |
210 |
3.1.3 Characteristics of DBMS |
212 |
3.1.4 Types of DBMS |
216 |
3.2 Distributed Database |
219 |
3.2.1 Characteristics of Distributed Database |
219 |
3.2.2 Structure of Distributed Database |
220 |
3.2.3 Client Cache |
221 |
3.2.4 Commitment |
221 |
3.2.5 Replication |
224 |
3.3 Measures for Database Integrity |
225 |
Exercises |
226 |
Answers to Exercises |
227 |
Answers for No.4 Part2 Chapter1 (Overview of Database) |
227 |
Answers for No.4 Part2 Chapter2 (Database Language) |
236 |
Answers for No.4 Part2 Chapter3 (Database Management) |
243 |
Index |
246 |
FE No.4 NETWORK AND DATABASE TECHNOLOGIES |
|