Muutke küpsiste eelistusi

E-raamat: Business Data Communications and Networking

(The University of Georgia), (University of Oklahoma), (Jerry FitzGerald & Associates)
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 30-Oct-2020
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119702665
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 48,10 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 30-Oct-2020
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119702665
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"This chapter introduces the basic concepts of data communications. It describes why it is important to study data communications, how data communications fit within the discipline of Management Information Systems (MIS), and introduces you to the three fundamental questions that this book answers. Next, it discusses the basic types and components of a data communications network. Also, it examines the importance of a network model based on layers. Finally, it describes the three key trends in the futureof networking"--

Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks.

Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.

About the Authors v
Preface vi
PART ONE INTRODUCTION
1(26)
Chapter 1 Introduction to Data Communications
1(26)
1.1 Introduction
1(4)
1.2 Data Communications Networks
5(3)
1.2.1 Components of a Network
6(1)
1.2.2 Types of Networks
7(1)
1.3 Network Models
8(6)
1.3.1 Open Systems Interconnection Reference Model
9(1)
1.3.2 Internet Model
10(2)
1.3.3 Message Transmission Using Layers
12(2)
1.4 Network Standards
14(4)
1.4.1 The Importance of Standards
14(1)
1.4.2 The Standards-Making Process
15(2)
1.4.3 Common Standards
17(1)
1.5 Future Trends
18(2)
1.5.1 Wireless LAN and BYOD
18(1)
1.5.2 The Internet of Things
18(1)
1.5.3 Massively Online
19(1)
1.6 Implications for Cyber Security
20(7)
PART TWO FUNDAMENTAL CONCEPTS
27(135)
Chapter 2 Application Layer
27(32)
2.1 Introduction
27(1)
2.2 Application Architectures
28(9)
2.2.1 Host-Based Architectures
29(1)
2.2.2 Client-Based Architectures
30(1)
2.2.3 Client-Server Architectures
30(3)
2.2.4 Cloud Computing Architectures
33(2)
2.2.5 Peer-to-Peer Architectures
35(1)
2.2.6 Choosing Architectures
36(1)
2.3 World Wide Web
37(4)
2.3.1 How the Web Works
37(1)
2.3.2 Inside an HTTP Request
38(1)
2.3.3 Inside an HTTP Response
39(2)
2.4 Electronic Mail
41(4)
2.4.1 How Email Works
41(3)
2.4.2 Inside an SMTP Packet
44(1)
2.4.3 Attachments in Multipurpose Internet Mail Extension
45(1)
2.5 Other Applications
45(3)
2.5.1 Telnet
46(1)
2.5.2 Videoconferencing
47(1)
2.6 Implications for Cyber Security
48(11)
Chapter 3 Physical Layer
59(32)
3.1 Introduction
59(2)
3.2 Circuits
61(4)
3.2.1 Circuit Configuration
61(1)
3.2.2 Data Flow
62(1)
3.2.3 Multiplexing
62(3)
3.3 Communication Media
65(6)
3.3.1 Twisted-Pair Cable
65(1)
3.3.2 Coaxial Cable
65(1)
3.3.3 Fiber-Optic Cable
66(1)
3.3.4 Radio
67(1)
3.3.5 Microwave
68(1)
3.3.6 Satellite
68(2)
3.3.7 Media Selection
70(1)
3.4 Digital Transmission of Digital Data
71(4)
3.4.1 Coding
71(1)
3.4.2 Transmission Modes
72(1)
3.4.3 Digital Transmission
73(1)
3.4.4 How Ethernet Transmits Data
74(1)
3.5 Analog Transmission of Digital Data
75(4)
3.5.1 Modulation
75(3)
3.5.2 Capacity of a Circuit
78(1)
3.5.3 How Modems Transmit Data
78(1)
3.6 Digital Transmission of Analog Data
79(4)
3.6.1 Translating from Analog to Digital
79(1)
3.6.2 How Telephones Transmit Voice Data
80(1)
3.6.3 How Instant Messenger Transmits Voice Data
81(1)
3.6.4 Voice over Internet Protocol (VoIP)
82(1)
3.7 Implications for Cyber Security
83(8)
Chapter 4 Data Link Layer
91(23)
4.1 Introduction
91(1)
4.2 Media Access Control
92(2)
4.2.1 Contention
92(1)
4.2.2 Controlled Access
92(1)
4.2.3 Relative Performance
93(1)
4.3 Error Control
94(6)
4.3.1 Sources of Errors
94(2)
4.3.2 Error Prevention
96(1)
4.3.3 Error Detection
97(1)
4.3.4 Error Correction via Retransmission
98(1)
4.3.5 Forward Error Correction
98(1)
4.3.6 Error Control in Practice
99(1)
4.4 Data Link Protocols
100(4)
4.4.1 Asynchronous Transmission
101(1)
4.4.2 Synchronous Transmission
101(3)
4.5 Transmission Efficiency
104(2)
4.6 Implications for Cyber Security
106(8)
Chapter 5 Network and Transport Layers
114(48)
5.1 Introduction
114(2)
5.2 Transport and Network Layer Protocols
116(2)
5.2.1 Transmission Control Protocol (TCP)
116(1)
5.2.2 Internet Protocol (IP)
117(1)
5.3 Transport Layer Functions
118(5)
5.3.1 Linking to the Application Layer
118(1)
5.3.2 Segmenting
119(1)
5.3.3 Session Management
120(3)
5.4 Addressing
123(8)
5.4.1 Assigning Addresses
124(5)
5.4.2 Address Resolution
129(2)
5.5 Routing
131(7)
5.5.1 Types of Routing
132(2)
5.5.2 Routing Protocols
134(2)
5.5.3 Multicasting
136(1)
5.5.4 The Anatomy of a Router
137(1)
5.6 TCP/IP Example
138(7)
5.6.1 Known Addresses
140(1)
5.6.2 Unknown Addresses
141(1)
5.6.3 TCP Connections
142(1)
5.6.4 TCP/IP and Network Layers
143(2)
5.7 Implications for Cyber Security
145(17)
PART THREE NETWORK TECHNOLOGIES
162(130)
Chapter 6 Network Design
162(20)
6.1 Introduction
162(4)
6.1.1 Network Architecture Components
163(1)
6.1.2 The Traditional Network Design Process
164(2)
6.1.3 The Building-Block Network Design Process
166(1)
6.2 Needs Analysis
166(5)
6.2.1 Network Architecture Component
168(1)
6.2.2 Application Systems
169(1)
6.2.3 Network Users
169(1)
6.2.4 Categorizing Network Needs
170(1)
6.2.5 Deliverables
171(1)
6.3 Technology Design
171(3)
6.3.1 Designing Clients and Servers
171(1)
6.3.2 Designing Circuits
171(3)
6.3.3 Network Design Tools
174(1)
6.3.4 Deliverables
174(1)
6.4 Cost Assessment
174(2)
6.4.1 Request for Proposal
175(1)
6.4.2 Selling the Proposal to Management
175(1)
6.4.3 Deliverables
176(1)
6.5 Implications for Cyber Security
176(6)
Chapter 7 Wired and Wireless Local Area Networks
182(38)
7.1 Introduction
182(1)
7.2 LAN Components
183(6)
7.2.1 Network Interface Cards
183(1)
7.2.2 Network Circuits
184(1)
7.2.3 Network Hubs, Switches, and Access Points
185(3)
7.2.4 Network Operating Systems
188(1)
7.3 Wired Ethernet
189(5)
7.3.1 Topology
190(2)
7.3.2 Media Access Control
192(1)
7.3.3 Types of Ethernet
193(1)
7.4 Wireless Ethernet
194(5)
7.4.1 Topology
194(1)
7.4.2 Media Access Control
194(2)
7.4.3 Wireless Ethernet Frame Layout
196(1)
7.4.4 Types of Wireless Ethernet
196(2)
7.4.5 Security
198(1)
7.5 The Best Practice LAN Design
199(8)
7.5.1 Designing User Access with Wired Ethernet
200(1)
7.5.2 Designing User Access with Wireless Ethernet
200(3)
7.5.3 Designing the Data Center
203(3)
7.5.4 Designing the e-Commerce Edge
206(1)
7.5.5 Designing the SOHO Environment
206(1)
7.6 Improving LAN Performance
207(3)
7.6.1 Improving Server Performance
208(2)
7.6.2 Improving Circuit Capacity
210(1)
7.6.3 Reducing Network Demand
210(1)
7.7 Implications for Cyber Security
210(10)
Chapter 8 Backbone Networks
220(23)
8.1 Introduction
220(1)
8.2 Switched Backbones
221(3)
8.3 Routed Backbones
224(3)
8.4 Virtual LANs
227(5)
8.4.1 Benefits of VLANs
227(2)
8.4.2 How VLANs Work
229(3)
8.5 The Best Practice Backbone Design
232(1)
8.6 Improving Backbone Performance
233(1)
8.6.1 Improving Device Performance
233(1)
8.6.2 Improving Circuit Capacity
234(1)
8.6.3 Reducing Network Demand
234(1)
8.7 Implications for Cyber Security
234(9)
Chapter 9 Wide Area Networks
243(31)
9.1 Introduction
243(1)
9.2 Dedicated-Circuit Networks
244(6)
9.2.1 Basic Architecture
245(3)
9.2.2 T-Carrier Services
248(1)
9.2.3 SONET Services
249(1)
9.3 Packet-Switched Networks
250(4)
9.3.1 Basic Architecture
250(1)
9.3.2 Frame Relay Services
251(1)
9.3.3 MPLS Services
252(1)
9.3.4 Ethernet Services
252(2)
9.4 Virtual Private Networks
254(4)
9.4.1 Basic Architecture
254(1)
9.4.2 VPN Types
255(1)
9.4.3 How VPNs Work
256(2)
9.5 The Best Practice WAN Design
258(3)
9.5.1 Software Defined WAN
258(1)
9.5.2 Choosing WAN Circuits
259(2)
9.6 Improving WAN Performance
261(1)
9.6.1 Improving Device Performance
261(1)
9.6.2 Improving Circuit Capacity
261(1)
9.6.3 Reducing Network Demand
262(1)
9.7 Implications for Cyber Security
262(12)
Chapter 10 The Internet
274(18)
10.1 Introduction
274(1)
10.2 How the Internet Works
275(4)
10.2.1 Basic Architecture
275(2)
10.2.2 Connecting to an ISP
277(1)
10.2.3 The Internet Today
278(1)
10.3 Internet Access Technologies
279(4)
10.3.1 Digital Subscriber Line
279(1)
10.3.2 Cable Modem
280(2)
10.3.3 Fiber to the Home
282(1)
10.4 The Future of the Internet
283(2)
10.4.1 Internet Governance
283(1)
10.4.2 Building the Future
284(1)
10.5 Implications for Cyber Security
285(7)
PART FOUR NETWORK MANAGEMENT
292
Chapter 11 Network Security
292(60)
11.1 Introduction
292(4)
11.1.1 Why Networks Need Security
294(1)
11.1.2 Types of Security Threats
294(1)
11.1.3 Network Controls
295(1)
11.2 Risk Assessment
296(8)
11.2.1 Develop Risk Measurement Criteria
297(1)
11.2.2 Inventory IT Assets
298(1)
11.2.3 Identify Threats
299(2)
11.2.4 Document Existing Controls
301(3)
11.2.5 Identify Improvements
304(1)
11.3 Ensuring Business Continuity
304(9)
11.3.1 Virus Protection
304(1)
11.3.2 Denial-of-Service Protection
305(3)
11.3.3 Theft Protection
308(1)
11.3.4 Device Failure Protection
309(1)
11.3.5 Disaster Protection
310(3)
11.4 Intrusion Prevention
313(23)
11.4.1 Security Policy
314(1)
11.4.2 Perimeter Security and Firewalls
314(6)
11.4.3 Server and Client Protection
320(3)
11.4.4 Encryption
323(6)
11.4.5 User Authentication
329(3)
11.4.6 Preventing Social Engineering
332(1)
11.4.7 Intrusion Prevention Systems
333(2)
11.4.8 Intrusion Recovery
335(1)
11.5 Best Practice Recommendations
336(2)
11.6 Implications for Your Cyber Security
338(14)
Chapter 12 Network Management
352
12.1 Introduction
352(1)
12.2 Designing for Network Performance
353(8)
12.2.1 Managed Networks
353(4)
12.2.2 Managing Network Traffic
357(1)
12.2.3 Reducing Network Traffic
358(3)
12.3 Configuration Management
361(3)
12.3.1 Configuring the Network and Client Computers
361(1)
12.3.2 Documenting the Configuration
362(2)
12.4 Performance and Fault Management
364(7)
12.4.1 Network Monitoring
364(2)
12.4.2 Failure Control Function
366(2)
12.4.3 Performance and Failure Statistics
368(2)
12.4.4 Improving Performance
370(1)
12.5 End User Support
371(2)
12.5.1 Resolving Problems
371(1)
12.5.2 Providing End User Training
372(1)
12.6 Cost Management
373(4)
12.6.1 Sources of Costs
373(2)
12.6.2 Reducing Costs
375(2)
12.7 Implications for Cyber Security
377
Appendices (Online)
Glossary (Online)
Index 1
Alan Dennis is a Fellow of the Association for Information Systems and a professor of information systems in the Kelley School of Business at Indiana University. He holds the John T. Chambers Chair in Internet Systems, which was established to honor John Chambers, president and chief executive officer of Cisco Systems, the worldwide leader of networking technologies for the Internet.

Alexandra Durcikova is an Associate Professor at the Price College of Business, University of Oklahoma. Alexandra has a PhD in management information systems from the University of Pittsburgh. She has earned an MSc degree in solid state physics from Comenius University, Bratislava, worked as an experimental physics researcher in the area of superconductivity and as an instructor of executive MBA students prior to pursuing her PhD. Alexandras research interests include knowledge management and knowledge management systems, the role of organizational climate in the use of knowledge management systems, knowledge management system characteristics, governance mechanisms in the use of knowledge management systems, and human compliance with security policy and characteristics of successful phishing attempts within the area of network security. Her research appears in Information Systems Research, MIS Quarterly, Journal of Management Information Systems, Information Systems Journal, Journal of Organizational and End User Computing, International Journal of Human-Computer Studies, International Journal of Human-Computer Studies, and Communications of the ACM.

Dr. Jerry FitzGerald wrote the early editions of this book in the 1980s. At the time, he was the principal in Jerry FitzGerald & Associates, a firm he started in 1977.