| |
| |
| |
Reader's and Instructor's Guide | |
| |
| |
| |
Outline of This Book | |
| |
| |
| |
Topic Ordering | |
| |
| |
| |
Internet and Web Resources | |
| |
| |
| |
Useful Publications | |
| |
| |
| |
Introduction | |
| |
| |
| |
Information and Communication | |
| |
| |
| |
Data Communications and Networking for Today's Enterprise | |
| |
| |
| |
Convergence and Unified Communications | |
| |
| |
| |
The Nature of Business Information Requirements | |
| |
| |
| |
The Transmission of Information | |
| |
| |
| |
Distributed Data Processing | |
| |
| |
| |
The Internet and Distributed Applications | |
| |
| |
| |
Networks | |
| |
| |
| |
Management Issues | |
| |
| |
| |
Standards | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Prefixes for Numerical Units | |
| |
| |
| |
Unified Communications at Boeing(ONLINE) | |
| |
| |
| |
Requirements | |
| |
| |
| |
Business Information | |
| |
| |
| |
Audio | |
| |
| |
| |
Data | |
| |
| |
| |
Image | |
| |
| |
| |
Video | |
| |
| |
| |
Performance Measures | |
| |
| |
Application Note: File Sizes | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
CORE Credit Union (Online) | |
| |
| |
| |
Distributed Data Processing | |
| |
| |
| |
Centralized Versus Distributed Processing | |
| |
| |
| |
Forms of Distributed Data Processing | |
| |
| |
| |
Distributed Data | |
| |
| |
| |
Networking Implications of DDP | |
| |
| |
| |
Big Data Infrastructure Considerations | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Managing Massive Data Warehouses at MasterCard International (Online) | |
| |
| |
| |
Data Communications | |
| |
| |
| |
Data Transmission | |
| |
| |
| |
Signals for Conveying Information | |
| |
| |
| |
Transmission Impairments and Channel Capacity | |
| |
| |
Application Note: Analog Signals | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Data Communication Fundamentals | |
| |
| |
| |
Analog and Digital Data Communications | |
| |
| |
| |
Data Encoding Techniques | |
| |
| |
| |
Asynchronous and Synchronous Transmission | |
| |
| |
| |
Error Detection | |
| |
| |
Application Note: Devices, Encoding, Communication Parameters and Protocols | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Data Link Control and Multiplexing | |
| |
| |
| |
Flow Control and Error Control | |
| |
| |
| |
Motivation for Multiplexing | |
| |
| |
| |
Frequency-Division Multiplexing | |
| |
| |
| |
Synchronous Time-Division Multiplexing | |
| |
| |
Application Note: Changing Communications | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
High-Level Data Link Control Protocol | |
| |
| |
| |
Broadband Access: Global and Local Issues (Online) | |
| |
| |
| |
The Internet and Distributed Applications | |
| |
| |
| |
The Internet | |
| |
| |
| |
The Structure of the Internet | |
| |
| |
| |
Internet Domains | |
| |
| |
Application Note: Fitting DNS into your organizational structure | |
| |
| |
| |
Dynamic Host Configuration Protocol | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Net Neutrality (Online) | |
| |
| |
| |
TCP/IP | |
| |
| |
| |
A Simple Protocol Architecture | |
| |
| |
| |
The TCP/IP Protocol Architecture | |
| |
| |
| |
Internetworking | |
| |
| |
| |
Virtual Private Networks and IP Security | |
| |
| |
Application Note: Practical Guide to Networking | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
TCP, UDP, and IP Details | |
| |
| |
| |
The Trivial File Transfer Protocol | |
| |
| |
| |
Client/Server, Intranet, and Cloud Computing | |
| |
| |
| |
The Growth of Client/Server Computing | |
| |
| |
| |
Client/Server Applications | |
| |
| |
| |
Middleware | |
| |
| |
| |
Intranets | |
| |
| |
| |
Extranets | |
| |
| |
| |
Service-Oriented Architecture | |
| |
| |
Application Note: To Be Fat or Thin�That is the Question | |
| |
| |
| |
Cloud Computing | |
| |
| |
| |
Summary | |
| |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
| |
Shifting Sands: Chevron�s Migration to the Cloud | |
| |
| |
Internet-Based Applications | |
| |
| |
Electronic Mail | |
| |
| |
Web Access and HTTP | |
| |
| |
Web Security | |
| |
| |
Multimedia Applications | |
| |
| |
Acceptable Use Policiess | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
E-Business at Guardian Life (Online) | |
| |
| |
Internet Operation | |
| |
| |
Internet Addressing | |
| |
| |
Internet Routing Protocols | |
| |
| |
Multicasting | |
| |
| |
Quality of Service | |
| |
| |
Differentiated Services | |
| |
| |
Service Level Agreements | |
| |
| |
IP Performance Metrics | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Local Area Networks | |
| |
| |
LAN Architecture and Infrastructure | |
| |
| |
Background | |
| |
| |
LAN Configuration | |
| |
| |
Guided Transmission Media | |
| |
| |
LAN Protocol Architecture | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Decibels and Signal Strength | |
| |
| |
Carlson Companies | |
| |
| |
Ethernet, Switches, and Virtual LANs | |
| |
| |
Traditional Ethernet | |
| |
| |
Bridges, Hubs, and Switches | |
| |
| |
High-Speed Ethernet | |
| |
| |
Virtual LANs | |
| |
| |
Power over Ethernet | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Wireless LANs | |
| |
| |
Overview | |
| |
| |
Wi-Fi Architecture and Services | |
| |
| |
IEEE 802.11 MAC and Physical Layer Standards | |
| |
| |
Gigibit WLANs | |
| |
| |
IEEE 802.11 Security Considerations | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
St. Luke�s Health Care System: Using Mobility to Advance Health Care Delivery | |
| |
| |
Wide Area Networks | |
| |
| |
WAN Technology and Protocols | |
| |
| |
Switching Techniques | |
| |
| |
Circuit-Switching Networks | |
| |
| |
Packet-Switching Networks | |
| |
| |
Traditional Wide Area Network Alternatives | |
| |
| |
Voice over IP | |
| |
| |
Presence | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
WAN Services | |
| |
| |
Wide Area Networking Alternatives | |
| |
| |
Frame Relay | |
| |
| |
Asynchronous Transfer Mode (ATM) | |
| |
| |
Multiprotocol Label Switching (MPLS) | |
| |
| |
Wide Area Ethernet | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Wireless WANs | |
| |
| |
Cellular Wireless Networks | |
| |
| |
Multiple Access | |
| |
| |
Third-Generation Wireless Communication | |
| |
| |
Fourth-Generation Wireless Communciation | |
| |
| |
Satellite Communications | |
| |
| |
Summary | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Choice Hotels | |
| |
| |
Management Issues | |
| |
| |
Computer and Network Security Threats | |
| |
| |
Computer Security Concepts | |
| |
| |
Threats, Attacks, and Assets | |
| |
| |
Intruders | |
| |
| |
Malicious Software Overview | |
| |
| |
Viruses, Worms, Bots, and Spam | |
| |
| |
Keyloggers, Phishing, Spyware | |
| |
| |
Computer Security Trends | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Computer and Network Security Techniques | |
| |
| |
Virtual Private Networks and IPsec | |
| |
| |
SSL and TLS | |
| |
| |
Wi-Fi Protected Access | |
| |
| |
Intrusion Detection | |
| |
| |
Firewalls | |
| |
| |
Malware Defense | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Cloud Computing (In)Security | |
| |
| |
Network Management (Online) | |
| |
| |
Network Planning and Design (Online) | |
| |
| |
Business Data Communications Projects | |
| |
| |
Animations and Animation Projects | |
| |
| |
Practical Exercises | |
| |
| |
Wireshark Projects | |
| |
| |
Research Projects | |
| |
| |
Security Case Studies | |
| |
| |
Reading/Report Assignments | |
| |
| |
Writing Assignments | |
| |
| |
Network Management (Online) | |
| |
| |
Network Management Requirements | |
| |
| |
Network Management Systems | |
| |
| |
Simple Network Management Protocol (SNMP) | |
| |
| |
Key Terms, Review Questions, and Problems | |
| |
| |
Network Planning and Design (Online) | |
| |
| |
The Project Environment�The Big Picture | |
| |
| |
Planning | |
| |
| |
Design Techniques | |
| |
| |
Some Capacity Planning and Network Design Tools | |
| |
| |
Some Simple Design Algorithms | |
| |
| |
Selling Books Online�A Case Study | |
| |
| |
Standards Organizations | |
| |
| |
Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) | |
| |
| |
The International Reference Alphabet | |
| |
| |
The TCP/IP Checksum | |
| |
| |
IBM's System Network Architecture (SNA) | |
| |
| |
Fibre Channel | |
| |
| |
Bluetooth | |
| |
| |
Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM) | |
| |
| |
Cryptographic Algorithms | |
| |
| |
Sliding-Window Flow Control and Error Control | |
| |
| |
The OSI Model | |
| |
| |
Code Division Multiple Access | |