Muutke küpsiste eelistusi

Data Communication and Computer Networks: A Business User's Approach 9th edition [Pehme köide]

(DePaul University), (Georgia Northwestern Technical College)
  • Formaat: Paperback / softback, 456 pages, kõrgus x laius x paksus: 20x215x274 mm, kaal: 1065 g
  • Ilmumisaeg: 28-Mar-2022
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0357504402
  • ISBN-13: 9780357504406
Teised raamatud teemal:
  • Pehme köide
  • Hind: 91,87 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 114,84 €
  • Säästad 20%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 456 pages, kõrgus x laius x paksus: 20x215x274 mm, kaal: 1065 g
  • Ilmumisaeg: 28-Mar-2022
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0357504402
  • ISBN-13: 9780357504406
Teised raamatud teemal:
Whether you are preparing for a career as a business manager, computer programmer or system designer, or you simply want to be an informed home computer user, West's DATA COMMUNICATIONS AND COMPUTER NETWORKS, 9th Edition provides an understanding of the essential features, operations and limitations of today's computer networks. You learn about systems both on premises and in the cloud as the author balances technical concepts with practical, everyday issues. Updates address the latest developments and practices in cloud business principles and security techniques, software-defined networking, 5G, the Internet of Things, data analytics and supporting remote workforces. This edition also covers the CompTIA s Cloud Essentials+ exam to help you prepare for this vendor-neutral, business-oriented cloud computing certification. Hands-on learning features and thought-provoking content also guide you through virtual networking technologies, industry convergence and wired and wireless LAN technologies.
Chapter 1 Introduction to Data Communications and Computer Networks 1(36)
1-1 The Language of Computer Networking
3(2)
Remember this...
4(1)
Self-check
4(1)
1-2 The Big Picture of Networks
5(1)
Remember this...
6(1)
Self-check
6(1)
1-3 Common Network Examples
6(8)
The Desktop Computer and the Internet
6(2)
A Laptop Computer and a Wireless Connection
8(1)
Cellular Network
9(1)
Other Common Network Systems
9(4)
Sensor Networks
10(1)
Business Mainframe Network
11(1)
Satellite Networks
11(1)
Cloud Networks
11(2)
Remember this...
13(1)
Self-check
13(1)
1-4 Network Architectures
14(8)
The TCP/IP Protocol Suite
14(3)
Application Layer
16(1)
Transport Layer
16(1)
Network Layer
16(1)
Data Link Layer
16(1)
Physical Layer
17(1)
The OSI Model
17(1)
Logical and Physical Connections
18(1)
The TCP/IP Protocol Suite in Action
19(3)
Remember this...
22(1)
Self-check
22(1)
1-5 Cloud Computing
22(5)
Cloud Computing Characteristics
22(2)
Cloud Service Models
24(2)
Remember this...
26(1)
Self-check
26(1)
Summary
27(1)
Key Terms
28(1)
Review Questions
29(2)
Hands-On Project 1
31(2)
Reflection Discussion 1
33(1)
Solutions to Self-Check Questions
34(3)
Chapter 2 Conducted and Radiated Media 37(37)
2-1 Cabling Standards
38(4)
Personal Area Network (PAN) Connection Standards
39(2)
Universal Serial Bus (USB)
39(1)
Thunderbolt
40(1)
Lightning
41(1)
Remember this...
41(1)
Self-check
42(1)
2-2 Conducted Media
42(12)
Twisted Pair Cable
42(5)
Types of Twisted Pair Cable
43(2)
Unshielded and Shielded Twisted Pair
45(2)
Coaxial Cable
47(1)
Fiber-Optic Cable
48(3)
Cable Connectors
51(2)
Twisted Pair Cable Connectors
51(1)
Coaxial Connectors
51(1)
Fiber Connectors
52(1)
Summary of Wired LAN Technologies
53(1)
Remember this...
54(1)
Self-check
54(1)
2-3 Radiated Media on LANs
54(9)
Wi-Fi
55(3)
Wireless LAN Standards
57(1)
Bluetooth
58(1)
Zigbee
59(1)
Other Wireless Technologies in a LAN Environment
60(2)
Infrared (IR)
60(1)
Ultra-Wideband (UWB)
61(1)
Near-Field Communication (NFC)
61(1)
Summary of Wireless LAN Technologies
62(1)
Remember this...
62(1)
Self-check
63(1)
2-4 Media Selection Criteria
63(3)
Cost
63(1)
Speed
64(1)
Expandability and Distance
64(1)
Environment
65(1)
Security
65(1)
Remember this...
65(1)
Self-check
65(1)
Summary
66(1)
Key Terms
67(1)
Review Questions
68(2)
Hands-On Project 2
70(1)
Reflection Discussion 2
71(1)
Solutions to Self-Check Questions
72(2)
Chapter 3 Fundamentals of Data and Signals 74(34)
3-1 Data and Signals
75(8)
Analog vs. Digital
75(4)
Analog Data and Signals
76(1)
Digital Data and Signals
77(2)
Fundamentals of Signals
79(4)
Remember this...
83(1)
Self-check
83(1)
3-2 Converting Data into Signals
83(14)
Transmitting Analog Data with Analog Signals
83(1)
Transmitting Digital Data with Square-Wave Digital Signals: Digital Encoding Schemes
84(4)
Nonreturn to Zero Digital Encoding Schemes
84(1)
Manchester Code Digital Encoding Schemes
85(1)
46/5B Digital Encoding Scheme
86(2)
Transmitting Digital Data with Discrete Analog Signals
88(4)
Amplitude Shift Keying
88(1)
Frequency Shift Keying
89(1)
Phase Shift Keying
89(3)
Transmitting Analog Data with Digital Signals
92(4)
Pulse Code Modulation
92(2)
Delta Modulation
94(2)
Remember this...
96(1)
Self-check
97(1)
3-3 Characters and Codes
97(3)
ASCII
97(1)
Unicode
97(2)
Remember this...
99(1)
Self-check
99(1)
Summary
100(1)
Key Terms
101(1)
Review Questions
101(2)
Hands-On Project 3
103(2)
Reflection Discussion 3
105(1)
Solutions to Self-Check Questions
106(2)
Chapter 4 Frames and Errors 108(33)
4-1 Data Link Frames
108(3)
Data Link Responsibilities
109(1)
Frame Components
109(1)
Remember this...
110(1)
Self-check
111(1)
4-2 Noise and Errors
111(5)
Gaussian Noise
111(1)
Impulse Noise
112(1)
Crosstalk
113(1)
Echo
113(1)
Jitter
114(1)
Attenuation
114(1)
Error Prevention
114(1)
Remember this...
115(1)
Self-check
116(1)
4-3 Error Detection
116(6)
Parity Checks
116(2)
Simple Parity
116(1)
Longitudinal Parity
117(1)
Arithmetic Checksum
118(2)
Cyclic Redundancy Check
120(1)
Remember this...
121(1)
Self-check
122(1)
4-4 Error Control
122(8)
Toss the Frame or Packet
122(1)
Return the Message
122(4)
Stop-and-Wait Error Control
122(1)
Sliding Window Error Control
123(3)
Correct the Error
126(3)
Remember this...
129(1)
Self-check
129(1)
Summary
130(1)
Key Terms
131(1)
Review Questions
132(2)
Hands-On Project 4
134(4)
Reflection Discussion 4
138(1)
Solutions to Self-Check Questions
139(2)
Chapter 5 Wired and Wireless Local Area Networks 141(34)
5-1 Using LANs
142(3)
Putting LANs to Work
143(1)
Advantages and Disadvantages of LANs
144(1)
Remember this...
145(1)
Self-check
145(1)
5-2 Evolution of LAN Technologies
145(6)
Bus Topology
145(2)
Star-Wired Bus Topology
147(1)
Contention-Based Protocols
148(1)
Star Topology
149(1)
Remember this...
150(1)
Self-check
150(1)
5-3 Switches
151(7)
MAC (Medium Access Control) Addresses
151(3)
Virtual LANs
154(1)
Link Aggregation
155(1)
Spanning Tree Algorithm
156(1)
Quality of Service
157(1)
Remember this...
158(1)
Self-check
158(1)
5-4 Wired LANs
158(5)
Ethernet Standards
158(2)
Wired Ethernet Frame Format
160(2)
Remember this...
162(1)
Self-check
163(1)
5-5 Wireless LANs
163(3)
Wireless CSMA/CA
163(1)
CSMA/CA Frame Format
164(2)
Remember this...
166(1)
Self-check
166(1)
Summary
166(7)
Key Terms
168(1)
Review Questions
168(2)
Hands-On Project 5
170(3)
Reflection Discussion 5
173(1)
Solutions to Self-Check Questions
174(1)
Chapter 6 Network Systems and Software 175(40)
6-1 Network Servers and Software
175(8)
RAID Configurations
176(2)
Storage Types
178(1)
Utilities
179(1)
Software Licensing Models
180(2)
Remember this...
182(1)
Self-check
182(1)
6-2 Server Operating Systems
183(4)
Unix
183(1)
Linux
183(1)
Microsoft Windows Server
184(3)
Remember this...
187(1)
Self-check
187(1)
6-3 Network Devices
187(3)
Command Modes
187(1)
Configuring with Commands
188(1)
Remember this...
189(1)
Self-check
189(1)
6-4 Virtualization
190(4)
Hypervisors
190(1)
Advantages and Disadvantages of Virtualization
191(1)
Virtualizing Network Devices
192(1)
Software-Defined Networking (SDN)
193(1)
Remember this...
194(1)
Self-check
194(1)
6-5 Cloud Computing
194(10)
Popular Cloud Platforms
194(2)
Service Categories
196(1)
Pricing Strategies
197(1)
Cloud Storage
198(2)
Cloud-Native Storage
198(1)
Storage Optimization
199(1)
Cloud-Native Computing
200(3)
Containerization
202(1)
Serverless Computing
203(1)
Remember this...
203(1)
Self-check
204(1)
Summary
204(2)
Key Terms
206(1)
Review Questions
206(2)
Hands-On Project 6
208(4)
Reflection Discussion 6
212(1)
Solutions to Self-Check Questions
213(2)
Chapter 7 The Internet 215(40)
7-1 Internet Protocol (IP)
216(7)
IP Packets
217(1)
Internet Protocol Version 4 (IPv4)
218(3)
IPv4 Addresses
219(2)
Internet Protocol Version 6 (IPv6)
221(2)
IPv6 Addresses
223(1)
Remember this...
223(1)
Self-check
223(1)
7-2 Locating a Resource on the Internet
223(6)
Uniform Resource Locator (URL)
224(1)
Domain Name System (DNS)
225(1)
Dynamic Host Configuration Protocol (DHCP)
225(1)
Network Address Translation (NAT)
226(2)
Remember this...
228(1)
Self-check
228(1)
7-3 Protocols of the Internet
229(4)
Transmission Control Protocol (TCP)
229(1)
TCP Segment Format
229(1)
User Datagram Protocol (UDP)
230(1)
Address Resolution Protocol (ARP)
231(1)
Internet Control Message Protocol (ICMP)
231(2)
Remember this...
233(1)
Self-check
233(1)
7-4 Internet Services
233(11)
Email
233(1)
File Transfer Protocol (FTP)
234(2)
Intranets and Extranets
236(1)
Remote Login
236(2)
Telnet
236(1)
Secure Remote Login Protocols
237(1)
Voice over IP (VolP)
238(2)
Media Streaming
240(1)
The Internet of Things (loT)
240(2)
Data Analytics
242(1)
Remember this...
243(1)
Self-check
243(1)
Summary
244(1)
Key Terms
245(1)
Review Questions
246(2)
Hands-On Project 7
248(3)
Reflection Discussion 7
251(2)
Solutions to Self-Check Questions
253(2)
Chapter 8 Risk, Security, and Compliance 255(48)
8-1 Network Security Risks
256(6)
Common Vulnerabilities and Attack Types
256(3)
Compromise Users
256(1)
Compromise Software
256(1)
Compromise Availability
256(1)
Compromise Accounts
257(1)
Other Attack Strategies
257(2)
Risk and Security Assessments
259(2)
Risk Response
261(1)
Security Policies
261(1)
Incident Response
261(1)
Remember this...
262(1)
Self-check
262(1)
8-2 Network Security Technologies
262(7)
Physical Security
263(1)
Prevention Methods
263(1)
Detection Methods
263(1)
Anti-Malware
264(1)
Proxy Server
264(1)
Access Control Lists (ACLs)
265(1)
Firewalls
265(2)
Firewall Effectiveness
265(1)
Firewall Functionality in the Cloud
266(1)
Firewall Limitations
267(1)
Intrusion Detection and Prevention Systems
267(1)
Remember this...
268(1)
Self-check
269(1)
8-3 Data Security Technologies
269(10)
CIA Triad
269(1)
Data Security Regulations and Compliance
270(1)
Encryption
271(4)
Monoalphabetic Substitution-Based Ciphers
272(1)
Polyalphabetic Substitution-Based Ciphers
272(1)
Transposition-Based Ciphers
273(1)
DES (Data Encryption Standard) and AES (Advanced Encryption Standard)
274(1)
Public Key Cryptography
275(1)
Public Key Infrastructure (PKI)
275(3)
Technologies That Use Encryption
278(1)
Digital Signatures
278(1)
Tunneling Protocols
278(1)
Remember this...
279(1)
Self-check
279(1)
8-4 IAM (Identity and Access Management)
279(9)
Access Rights
280(1)
Authentication
280(5)
Hashing
281(3)
Blockchain
284(1)
Single Sign-On (SSO) and Federated Identity Management (FIM)
284(1)
Authorization
285(1)
Accounting
285(1)
Remember this...
286(1)
Self-check
287(1)
8-5 Wireless Security
288(3)
Securing Wireless LANs
288(1)
Spread Spectrum Technology
288(2)
Frequency Hopping Spread Spectrum
288(2)
Direct Sequence Spread Spectrum
290(1)
Remember this...
290(1)
Self-check
290(1)
Summary
291(2)
Key Terms
293(1)
Review Questions
294(1)
Hands-On Project 8
295(5)
Reflection Discussion 8
300(1)
Solutions to Self-Check Questions
301(2)
Chapter 9 Wide Area Networks 303(33)
9-1 Networks That Connect LANs
304(2)
Campus Area Networks (CANS)
304(1)
Metropolitan Area Networks (MANS)
304(1)
WAN Topology
305(1)
Remember this...
306(1)
Self-check
306(1)
9-2 Routing
306(6)
Best Paths
307(1)
Dynamic Versus Static Routing
308(1)
Routing Protocols
309(3)
Routing Information Protocol (RIP)
309(2)
Open Shortest Path First (OSPF)
311(1)
Intermediate System to Intermediate System (IS-IS)
311(1)
Enhanced Interior Gateway Routing Protocol (EIGRP)
311(1)
Border Gateway Protocol (BGP)
311(1)
Remember this...
312(1)
Self-check
312(1)
9-3 Multiplexing
312(8)
Time Division Multiplexing (TDM)
313(2)
Synchronous Time Division Multiplexing
313(1)
Statistical Time Division Multiplexing
314(1)
Frequency Division Multiplexing (FDM)
315(1)
Wavelength Division Multiplexing (WDM)
316(1)
Wi-Fi Multiplexing
316(2)
Cellular Network Multiplexing
318(1)
Global System for Mobile Communications (GSM)
318(1)
Code Division Multiplexing (CDM)
318(1)
Orthogonal Frequency Division Multiplexing (OFDM)
319(1)
Remember this...
319(1)
Self-check
320(1)
9-4 Compression
320(6)
Lossless Compression
320(2)
Run-Length Encoding
321(1)
Lempel-Ziv Technique
321(1)
Lossy Compression
322(3)
MP3 (MPEG [ Moving Picture Experts Group] Audio Layer-3)
322(1)
JPEG (Joint Photographic Experts Group)
322(3)
MPEG (Moving Picture Experts Group)
325(1)
Remember this...
325(1)
Self-check
326(1)
Summary
326(2)
Key Terms
328(1)
Review Questions
329(1)
Hands-On Project 9
330(4)
Reflection Discussion 9
334(1)
Solutions to Self-Check Questions
335(1)
Chapter 10 Connecting Networks and Resources 336(36)
10-1 Small Business and Consumer-Grade WAN Services
337(10)
Digital Subscriber Line (DSL)
337(2)
DSL Basics
337(2)
DSL Formats
339(1)
Cable Modems
339(2)
Fiber Internet
341(1)
Satellite
342(2)
Cellular Networks
344(2)
Remember this...
346(1)
Self-check
347(1)
10-2 Enterprise-Grade WAN Services
347(8)
Legacy WAN Technologies
347(1)
MPLS
348(1)
Ethernet
349(2)
Virtual Private Network (VPN)
351(3)
Cloud Connectivity
354(1)
Remember this...
355(1)
Self-check
355(1)
10-3 WAN Virtualization
355(4)
Software-Defined WAN (SD-WAN)
356(1)
Software-Defined Branch (SD-Branch)
357(1)
Secure Access Service Edge (SASE)
358(1)
Remember this...
358(1)
Self-check
358(1)
10-4 Cloud-Supported Technologies
359(4)
Digital Marketing
359(1)
Remote Workers
360(1)
Edge Computing
361(1)
Remember this...
362(1)
Self-check
362(1)
Summary
363(2)
Key Terms
365(1)
Review Questions
365(2)
Hands-On Project 10
367(2)
Reflection Discussion 10
369(1)
Solutions to Self-Check Questions
370(2)
Chapter 11 Network Design and Management 372(42)
11-1 Planning for Changes
373(5)
Project Management
373(1)
Application Lifecycle Management (ALM)
374(2)
Change Management
376(2)
Remember this...
378(1)
Self-check
378(1)
11-2 Analyzing Design
378(7)
Network Modeling
378(3)
Wide Area Connectivity Map
379(1)
Metropolitan Area Connectivity Map
379(1)
Local Area Connectivity Map
379(2)
Gap Analysis
381(1)
Feasibility Studies
381(1)
Capacity Planning
382(1)
Testing Environments
383(1)
Remember this...
384(1)
Self-check
385(1)
11-3 Network Monitoring and Management
385(8)
Network Monitoring Tools
385(5)
Monitoring Network Hardware
385(1)
Monitoring Network Traffic
386(1)
Alerts and Logs
387(1)
Syslog
387(1)
Simple Network Management Protocol (SNMP)
388(1)
NetFlow
389(1)
Creating a Baseline
390(2)
Remember this...
392(1)
Self-check
393(1)
11-4 Cloud Deployment and Management
393(11)
Cloud Migration
393(3)
Migration Phases
394(1)
Migration Strategies
395(1)
Cloud Provisioning and Configuration Management
396(5)
Automation
396(2)
Infrastructure as Code (laC)
398(1)
Automation and Orchestration Tools
399(2)
Cloud Monitoring and Optimization
401(2)
Remember this...
403(1)
Self-check
403(1)
Summary
404(2)
Key Terms
406(1)
Review Questions
406(2)
Hands-On Project 11
408(3)
Reflection Discussion 11
411(1)
Solutions to Self-Check Questions
412(2)
Chapter 12 Business Principles in IT 414(35)
12-1 People Resources
415(5)
Network Administrator Skills and Certifications
415(1)
Professional Development
416(2)
Training Users
418(1)
Policies and Procedures
419(1)
Remember this...
420(1)
Self-check
420(1)
12-2 Vendor Relations
420(6)
Vendor Services
421(2)
Support Plans
421(1)
Time to Market
422(1)
Managed Services
422(1)
Vendor Lock-In
422(1)
Vendor Documentation
423(1)
Request for Information (RFI)
423(1)
Statement of Work (SOW)
423(1)
Service Level Agreement (SLA)
423(1)
Project Evaluations
424(1)
Remember this...
425(1)
Self-check
425(1)
12-3 Financial Aspects of Cloud
426(6)
CapEx vs. OpEx
426(1)
Tracking Cloud Expenses
427(1)
Cloud Cost Optimization
428(2)
Instance Pricing Options
429(1)
Data Replication Cost vs. Benefit
430(1)
Licensing in the Cloud
430(1)
Remember this...
431(1)
Self-check
432(1)
12-4 Continuity and Recovery
432(7)
Business Continuity
432(1)
Disaster Recovery
433(5)
MTBF and MTTR
433(2)
Backups
435(2)
RTO and RPO
437(1)
Remember this...
438(1)
Self-check
439(1)
Summary
439(2)
Key Terms
441(1)
Review Questions
442(1)
Hands-On Project 12
443(3)
Reflection Discussion 12
446(1)
Solutions to Self-Check Questions
447(2)
Appendix A CompTIA Cloud Essentials+ CLO-002 Certification Exam Objectives 449(8)
Domain 1.0 Cloud Concepts-24% of Exam
450(1)
Domain 2.0 Business Principles of Cloud Environments-28% of Exam
451(2)
Domain 3.0 Management and Technical Operations-26% of Exam
453(1)
Domain 4.0 Governance, Risk, Compliance, and Security for the Cloud-22% of Exam
454(3)
Glossary 457(21)
Index 478
Jill West authors Cengage courses for CompTIA Cloud+, CompTIA Network+, Data Communications, Technology for Success and the popular Shelly Cashman Series. She has taught kindergarten through college and currently teaches computer technology courses at Georgia Northwestern Technical College. Jill specializes in designing innovative, critical-thinking activities and building courses that teach to popular IT certifications. She regularly presents at conferences and webinars on preparing for CompTIA certifications, teaching cloud computing and computer networking and mentoring lifelong student learners in IT. Shes a member of the 2019 inaugural cohort of Faculty Ambassadors for AWS Educate and is currently an AWS Academy Accredited Educator. Jill and her husband, Mike, live in northwest Georgia with two children at home and two off to college. Curt M. White is an associate professor in the College of Computing and Digital Media at DePaul University, where he has been since 1988. Currently in his 37th year of teaching, he previously taught at Wayne State University, Illinois State University, Purdue UniversityFort Wayne, and Dominican University. Dr. White has published more than 30 articles on computer science and computer science education, two chapters in books, and two college textbooks. In 1997, he chaired the ACM SIGCSE's national conference on computer science education and more recently served as president of the Consortium for Computing Sciences in Colleges. He completed a bachelor's, master's, and Ph.D. in computer science from Wayne State University.