Preface | p. xix |
Data Communications Basics | |
Introduction | p. 3 |
Data Communications | p. 3 |
Components | p. 4 |
Networks | p. 5 |
Distributed Processing | p. 5 |
Network Criteria | p. 6 |
Type of Networks | p. 7 |
Protocols and Standards | p. 10 |
Protocols | p. 10 |
Standards | p. 11 |
Standards Organizations | p. 12 |
Standards Creation Committees | p. 12 |
Forums | p. 12 |
Regulatory Agencies | p. 12 |
Network Models | p. 14 |
The OSI Model | p. 15 |
Presentation Layer | p. 16 |
The Internet Model | p. 22 |
Key Terms | p. 25 |
Summary | p. 25 |
Practice Set | p. 26 |
Application Layer | p. 31 |
Introduction | p. 31 |
Client-Server Paradigm | p. 32 |
Client | p. 34 |
Server | p. 34 |
Addressing | p. 34 |
Electronic Mail | p. 35 |
Email and Snail Mail | p. 35 |
Components | p. 36 |
Mail Delivery | p. 37 |
Mail Access Protocols | p. 38 |
Addresses | p. 39 |
Multipurpose Internet Mail Extension (MIME) | p. 40 |
File Transfer | p. 41 |
File Transfer Protocol (FTP) | p. 42 |
Trivial File Transfer Protocol (TFTP) | p. 43 |
General-Purpose Application: Telnet | p. 43 |
World Wide Web (WWW) | p. 45 |
Hypertext and Hypermedia | p. 45 |
Components of WWW | p. 47 |
Hypertext Transfer Protocol (HTTP) | p. 47 |
Addresses | p. 48 |
Videoconferencing | p. 50 |
Compression | p. 51 |
Group Discussion: Listserv | p. 51 |
Subscribing | p. 52 |
Sending Email | p. 52 |
Unsubscribing | p. 52 |
Business Application | p. 53 |
Chatting | p. 53 |
Key Terms | p. 54 |
Summary | p. 54 |
Practice Set | p. 55 |
Transport Layer | p. 59 |
Application-to-Application Delivery | p. 59 |
Duties | p. 60 |
Packetizing | p. 60 |
Creating Connection | p. 61 |
Addressing | p. 63 |
Reliability | p. 66 |
Internet Protocols | p. 69 |
User Datagram Protocol (UDP) | p. 70 |
Transmission Control Protocol (TCP) | p. 71 |
Key Terms | p. 73 |
Summary | p. 74 |
Practice Set | p. 74 |
Network Layer | p. 77 |
Introduction | p. 77 |
Addressing | p. 78 |
Address Hierarchy | p. 79 |
Address Resolution | p. 81 |
An Example | p. 83 |
Routing | p. 84 |
Which Route? | p. 85 |
How to Route? | p. 86 |
Routing Tables | p. 87 |
Size of Routing Table | p. 88 |
Static Versus Dynamic Routing | p. 89 |
Routing Protocols | p. 90 |
Packetizing: IP Protocol | p. 91 |
IP Protocol | p. 91 |
Datagram | p. 92 |
Fragmenting | p. 93 |
Key Terms | p. 95 |
Summary | p. 95 |
Practice Set | p. 95 |
Data Link Layer | p. 99 |
Duties of the Data Link Layer | p. 99 |
Hop-to-Hop Delivery | p. 100 |
Packetizing | p. 101 |
Addressing | p. 101 |
Address Resolution | p. 102 |
Error Control | p. 103 |
Source of Errors | p. 103 |
Types of Errors | p. 105 |
Error Prevention | p. 105 |
Error Detection | p. 106 |
Error Correction | p. 109 |
Flow Control | p. 111 |
Medium Access Control | p. 112 |
Controlled Access | p. 112 |
Random Access | p. 115 |
Data Link Protocols | p. 116 |
Asynchronous Protocols | p. 117 |
Synchronous Protocols | p. 117 |
Key Terms | p. 119 |
Summary | p. 119 |
Practice Set | p. 120 |
Physical Layer | p. 125 |
Digital and Analog | p. 125 |
Digital and Analog Data | p. 126 |
Digital and Analog Signals | p. 127 |
Complex Signal | p. 131 |
Bandwidth | p. 132 |
Digital Signal as a Complex Signal | p. 132 |
Transforming Data to Signals | p. 133 |
Digital Encoding: Digital-to-Digital Conversion | p. 134 |
Modulation of Digital Data: Digital-to-Analog Conversion | p. 136 |
Sampling Analog Data: Analog-to-Digital Conversion | p. 140 |
Transmission Modes | p. 142 |
Line Configuration | p. 146 |
Point-to-Point | p. 146 |
Multipoint | p. 147 |
Duplexity | p. 147 |
Half-Duplex | p. 147 |
Full-Duplex | p. 148 |
Multiplexing: Sharing the Media | p. 148 |
Channel versus Link | p. 148 |
Frequency-Division Multiplexing (FDM) | p. 149 |
Wave-Division Multiplexing (WDM) | p. 151 |
Time-Division Multiplexing (TDM) | p. 152 |
Inverse Multiplexing | p. 154 |
Key Terms | p. 156 |
Summary | p. 157 |
Practice Set | p. 158 |
Transmission Media | p. 163 |
Guided Media | p. 163 |
Twisted-Pair Cable | p. 164 |
Coaxial Cable | p. 166 |
Optical Fiber | p. 167 |
Unguided Media | p. 170 |
Terrestrial Microwave | p. 170 |
Media Comparison | p. 173 |
Key Terms | p. 175 |
Summary | p. 175 |
Practice Set | p. 176 |
Telephone and Cable TV Networks: Residential Connection to the Internet | p. 179 |
Telephone System | p. 179 |
Major Components | p. 180 |
LATAs | p. 181 |
Making a Connection | p. 182 |
Internet Access Via Telephone | p. 185 |
Conventional Modems | p. 186 |
56K Modems (V.90) | p. 188 |
DSL Modems | p. 189 |
Cable TV Network | p. 190 |
Internet Access via Cable TV | p. 191 |
Sharing | p. 192 |
Key Terms | p. 194 |
Summary | p. 194 |
Practice Set | p. 194 |
LAN and WAN Technology | |
Local Area Networks Part 1: Basic Concepts and Wired Ethernet LANs | p. 199 |
Basic Concepts | p. 199 |
LAN Components | p. 200 |
LAN Models | p. 200 |
LAN Applications | p. 203 |
Topology | p. 204 |
Project 802 | p. 206 |
Wired Ethernet Lans | p. 208 |
Traditional Ethernet | p. 208 |
Switched Ethernet | p. 211 |
Fast Ethernet | p. 212 |
Gigabit Ethernet | p. 214 |
Key Terms | p. 216 |
Summary | p. 217 |
Practice Set | p. 217 |
Local Area Networks Part 2: Wireless and Virtual LANs | p. 221 |
Wireless Lans | p. 221 |
Wireless Transmission | p. 222 |
IEEE 802.11: RF Lans | p. 223 |
Architecture | p. 223 |
Station Types | p. 225 |
Access Method | p. 225 |
Implementation | p. 226 |
IEEE 802.11: Infrared Lans | p. 227 |
Point-to-Point | p. 227 |
Diffused | p. 227 |
IEEE 802.15 Lans: Bluetooth Lans | p. 228 |
Applications | p. 228 |
Architecture | p. 228 |
Bluetooth Devices | p. 230 |
Virtual Lans | p. 230 |
Membership | p. 232 |
Configuration | p. 233 |
Communication Between Switches | p. 233 |
IEEE Standard | p. 234 |
Advantages | p. 234 |
Key Terms | p. 235 |
Summary | p. 236 |
Practice Set | p. 236 |
Wide Area Networks | p. 241 |
Point-to-Point WANs | p. 241 |
T Lines | p. 242 |
Sonet | p. 243 |
Switched WANs | p. 244 |
X.25 | p. 245 |
Frame Relay | p. 245 |
ATM | p. 247 |
ATM LANs | p. 251 |
ATM LAN Architecture | p. 251 |
Key Terms | p. 254 |
Summary | p. 255 |
Practice Set | p. 256 |
Internetworking and Internet | |
Connecting LANs and WANs: Making Backbone Networks | p. 261 |
Connecting Devices | p. 261 |
Repeaters | p. 262 |
Bridges | p. 264 |
Routers | p. 265 |
Switches | p. 267 |
Backbone Networks | p. 268 |
Logical Bus Backbone | p. 268 |
Logical Star Backbone | p. 270 |
Key Terms | p. 272 |
Summary | p. 273 |
Practice Set | p. 273 |
The Internet | p. 277 |
History and Administration | p. 277 |
Arpanet | p. 278 |
Birth of the Internet | p. 278 |
Transmission Control Protocol/Internetworking Protocol (TCP/IP) | p. 278 |
The Internet Today | p. 279 |
Growth of the Internet | p. 281 |
Internet Standards | p. 282 |
Internet Administration | p. 283 |
TCP/IP Protocol Suite | p. 284 |
Network Layer | p. 285 |
Transport Layer | p. 289 |
Application Layer | p. 292 |
Next Generation | p. 292 |
Access to the Internet | p. 293 |
Residential Access | p. 293 |
Organizational Access | p. 293 |
Private Networks: Intranet and Extranet | p. 293 |
Intranet | p. 293 |
Extranet | p. 294 |
Key Terms | p. 295 |
Summary | p. 296 |
Practice Set | p. 297 |
Security and Management | |
Network Security: Firewalls and VPNs | p. 303 |
Introduction | p. 304 |
Privacy | p. 304 |
Authentication | p. 304 |
Integrity | p. 305 |
Nonrepudiation | p. 305 |
Privacy | p. 305 |
Secret-Key Encryption/Decryption | p. 305 |
Public-Key Encryption | p. 306 |
Digital Signature | p. 307 |
Signing the Whole Document | p. 307 |
Signing the Digest | p. 308 |
Security in the Internet | p. 310 |
Application Layer Security | p. 310 |
Transport Layer Security | p. 310 |
Security at the IP Layer | p. 311 |
Firewalls | p. 311 |
Packet-Filter Firewall | p. 312 |
Proxy Firewall | p. 312 |
Virtual Private Networks (VPN) | p. 312 |
Achieving Privacy | p. 312 |
VPN Technology | p. 314 |
Access Control | p. 315 |
Passwords | p. 315 |
Tokens | p. 315 |
Biometrics | p. 315 |
Key Terms | p. 316 |
Summary | p. 317 |
Practice Set | p. 317 |
Network Analysis, Design, and Implementation | p. 321 |
Network Development Life Cycle | p. 321 |
Analysis Phase | p. 323 |
Baselining | p. 323 |
Needs Analysis | p. 324 |
Design Phase | p. 327 |
Upper-Layer Protocols | p. 327 |
Lower-Layer Protocols | p. 327 |
Hardware | p. 328 |
Global Connection | p. 328 |
Implementation Phase | p. 328 |
Purchasing | p. 329 |
Installation | p. 329 |
User Training | p. 329 |
Testing | p. 329 |
Documentation | p. 329 |
Key Terms | p. 330 |
Summary | p. 330 |
Practice Set | p. 331 |
Network Management | p. 333 |
Configuration Management | p. 334 |
Reconfiguration | p. 334 |
Documentation | p. 335 |
Fault Management | p. 336 |
Reactive Fault Management | p. 336 |
Proactive Fault Management | p. 337 |
Performance Management | p. 337 |
Capacity | p. 337 |
Traffic | p. 338 |
Throughput | p. 338 |
Response Time | p. 338 |
Accounting Management | p. 339 |
Security Management | p. 339 |
Network Management Tools | p. 339 |
Software Tools | p. 339 |
Hardware Tools | p. 341 |
Key Terms | p. 342 |
Summary | p. 343 |
Practice Set | p. 343 |
ASCII Code | p. 347 |
Numbering Systems and Transformation | p. 351 |
Numbering Systems | p. 351 |
Decimal Numbers | p. 351 |
Binary Numbers | p. 352 |
Octal Numbers | p. 353 |
Hexadecimal Numbers | p. 354 |
Transformation | p. 355 |
From Other Systems to Decimal | p. 356 |
From Decimal to Other Systems | p. 356 |
From Binary to Octal or Hexadecimal | p. 357 |
From Octal or Hexadecimal to Binary | p. 358 |
Contact Addresses | p. 359 |
ATM Forum | p. 359 |
Federal Communications Commission (FCC) | p. 359 |
Institute of Electrical and Electronics Engineers (IEEE) | p. 359 |
International Organization for Standardization (ISO) | p. 359 |
International Telecommunication Union (ITU) | p. 360 |
Internet Architecture Board (IAB) | p. 360 |
Internet Corporation for Assigned Names and Numbers (ICANN) | p. 360 |
Internet Engineering Steering Group (IESG) | p. 360 |
Internet Engineering Task Force (IETF) | p. 360 |
Internet Research Task Force (IRTF) | p. 360 |
Internet Society (ISOC) | p. 360 |
Glossary | p. 361 |
Index | p. 383 |
Table of Contents provided by Syndetics. All Rights Reserved. |