Muutke küpsiste eelistusi

Data Communication and Computer Networks: A Business User's Approach 5th ed. [Kõva köide]

  • Formaat: Hardback, 506 pages, Figures; Tables, color; Illustrations, color; Illustrations, black and white
  • Ilmumisaeg: 01-Jun-2008
  • Kirjastus: Course Technology Inc
  • ISBN-10: 142390303X
  • ISBN-13: 9781423903031
Teised raamatud teemal:
  • Kõva köide
  • Hind: 72,09 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 506 pages, Figures; Tables, color; Illustrations, color; Illustrations, black and white
  • Ilmumisaeg: 01-Jun-2008
  • Kirjastus: Course Technology Inc
  • ISBN-10: 142390303X
  • ISBN-13: 9781423903031
Teised raamatud teemal:
Data communications and computer networks are becoming increasingly more important - today's business world could not function without either. Business managers, computer programmers, system designers, and home computer users alike need a thorough understanding of the basic features, operations, and limitations of different types of computer networks. Now in its fifth edition, "Data Communications and Computer Networks" introduces concepts that help the reader achieve an in-depth understanding of the often complex topic of data communications and computer networks by balancing the more technical aspects and the everyday practical aspects. The fifth edition retains many of the elements that made the fourth edition so popular, including readability and coverage of the most current technologies. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and expanded coverage of error detection and correction.
Preface xiv
Introduction to Computer Networks and Data Communications
1(32)
Introduction
2(1)
The Language of Computer Networks
3(1)
The Big Picture of Networks
4(1)
Communications Networks---Basic Connections
4(10)
Terminal/microcomputer-to-mainframe computer connections
6(1)
Microcomputer-to-local area network connections
7(1)
Microcomputer-to-Internet connections
8(1)
Local area network-to-local area network connections
9(1)
Personal area network-to-workstation connections
10(1)
Local area network-to-metropolitan area network connections
11(1)
Local area network-to-wide area network connections
11(1)
Wide area network-to-wide area network connections
12(1)
Sensor-to-local area network connections
12(1)
Satellite and microwave connections
13(1)
Wireless telephone connections
14(1)
Convergence
14(1)
Network Architectures
15(10)
The Open Systems Interconnection (OSI) model
16(4)
The TCP/IP protocol suite
20(2)
Logical and physical connections
22(3)
Network connections in Action
25(1)
The TCP/IP Protocol Suite in Action
25(2)
Summary
27(1)
Key Terms
28(1)
Review Questions
29(1)
Exercises
29(2)
Thinking Outside the Box
31(1)
Hands-On Projects
31(2)
Fundamentals of Data and Signals
33(36)
Introduction
34(1)
Data and Signals
35(9)
Analog vs. Digital
36(3)
Fundamentals of Signals
39(3)
Loss of signal strength
42(2)
Converting Data into Signals
44(15)
Transmitting analog data with analog signals
45(1)
Transmitting digital data with digital signals: Digital encoding schemes
45(5)
Transmitting digital data with analog signals
50(4)
Transmitting analog data with digital signals
54(5)
Data Codes
59(3)
EBCDIC
59(1)
ASCII
60(1)
Unicode
61(1)
Data and Signal Conversions in Action: Two Examples
62(2)
Summary
64(1)
Key Terms
65(1)
Review Questions
65(1)
Exercises
65(2)
Thinking Outside the Box
67(1)
Hands-On Projects
68(1)
Conducted and Wireless Media
69(46)
Introduction
70(1)
Conducted Media
70(12)
Twisted pair wire
70(6)
Coaxial cable
76(2)
Fiber-optic cable
78(4)
Wireless Media
82(19)
Terrestrial microwave transmission
84(1)
Satellite microwave transmission
85(5)
Cellular telephones
90(5)
Infrared transmissions
95(1)
Broadband wireless systems
96(1)
Bluetooth
97(1)
Wireless local area networks
98(1)
Free space optics and ultra-wideband
98(1)
zigBee
99(2)
Media Selection Criteria
101(4)
Cost
101(2)
Speed
103(1)
Expandability and distance
103(1)
Environment
104(1)
Security
104(1)
Conducted Media in Action: Two Examples
105(2)
Wirless Media in Action: Three Examples
107(3)
Summary
110(1)
Key Terms
110(1)
Review Questions
111(1)
Exercises
112(1)
Thinking Outside the Box
113(1)
Hands-On Projects
114(1)
Making Connections
115(24)
Introduction
116(1)
Interfacing a Computer to Peripheral Devices
117(9)
Characteristics of interface standards
117(1)
Two important interface standards
118(5)
Other interface standards
123(3)
Data Link Connections
126(4)
Asynchronous connections
126(2)
Synchronous connections
128(1)
Isochronous connections
129(1)
Terminal-to-Mainframe Computer Connections
130(2)
Making Computer Connections in Action
132(2)
Summary
134(1)
Key Terms
135(1)
Review Questions
135(1)
Exercises
135(1)
Thinking Outside the Box
136(1)
Hands-On Projects
137(2)
Making Connections Efficient: Multiplexing and Compression
139(34)
Introduction
140(1)
Frequency Division Multiplexing
140(3)
Time Division Multiplexing
143(9)
Synchronous time division multiplexing
143(7)
Statistical time division multiplexing
150(2)
Wavelength Division Multiplexing
152(2)
Discrete Multitone
154(1)
Code Division Multiplexing
155(2)
Comparison of Multiplexing Techniques
157(2)
Compression---Lossless versus Lossy
159(6)
Lossless compression
160(1)
Lossy compression
161(4)
Business Multiplexing in Action
165(2)
Summary
167(1)
Key Terms
168(1)
Review Questions
168(1)
Exercises
169(1)
Thinking Outside the Box
170(1)
Hands-On Projects
171(2)
Errors, Error Detection, and Error Control
173(30)
Introduction
174(1)
Noise and Errors
175(4)
White noise
175(1)
Impulse noise
175(2)
Crosstalk
177(1)
Echo
177(1)
Jitter
178(1)
Attenuation
179(1)
Error Prevention
179(1)
Error Detection
180(7)
Parity checks
181(2)
Arithmetic Checksum
183(1)
Cyclic redundancy checksum
184(3)
Error Control
187(9)
Do nothing
187(1)
Return a message
187(7)
Correct the error
194(2)
Error Detection In Action
196(1)
Summary
197(1)
Key Terms
198(1)
Review Questions
198(1)
Exercises
199(1)
Thinking Outside the Box
200(1)
Hands-On Projects
201(2)
Local Area Networks: The Basics
203(44)
Introduction
204(1)
Primary Function of Local Area Networks
205(2)
Advantages and Disadvantages of Local Area Networks
207(2)
The First Local Area Network---The Bus/Tree
209(2)
Star-wired Bus LANs
211(3)
Medium Access Control Protocols
214(2)
Contention-based protocols
214(2)
Bridges
216(3)
Transparent bridge
217(2)
Switches
219(6)
Virtual LANs
221(1)
Isolating traffic patterns and providing multiple access
222(1)
Full-duplex switches
223(2)
Popular Local Area Network Systems
225(8)
Wired Ethernet
225(3)
Wireless Ethernet
228(5)
IEEE 802
233(1)
IEEE 802.3 frame format
233(1)
LANs in Action: A Small Office Solution
234(4)
LANs In Action: A Home Office Solution
238(1)
Summary
239(2)
Key Terms
241(1)
Review Questions
242(1)
Exercises
242(3)
Thinking Outside the Box
245(1)
Hands-On Projects
246(1)
Local Area Networks: Software and Support Systems
247(36)
Introduction
248(1)
Network Operating Systems
249(2)
Current Network Operating Systems
251(14)
Novell NetWare
251(5)
Microsoft Windows NT and Windows Server 2000, 2003, and 2008
256(4)
Unix
260(1)
Linux
261(1)
Novell Linux
262(1)
Mac OS X Server
263(1)
Summary of network operating systems
263(2)
Network Servers
265(2)
Client/server networks vs. peer-to-peer networks
267(1)
Network Support Software
267(4)
Utilities
268(2)
Internet software
270(1)
Software Licensing Agreements
271(2)
LAN Support Devices
273(1)
LAN Software in Action: A Small Company Makes a Choice
274(3)
Primary uses of current system
275(1)
Network maintenance and support
275(1)
Cost of the NOS
275(1)
Any unique hardware choices affecting NOS decision
276(1)
Single location or multiple locations
276(1)
Political pressures affecting decision
276(1)
Final decision
277(1)
Wireless Networking in Action: Creating a Wireless LAN for Home
277(2)
Summary
279(1)
Key Terms
280(1)
Review Questions
280(1)
Exercises
281(1)
Thinking Outside the Box
282(1)
Hands-On Projects
282(1)
Introduction to Metropolitan Area Networks and Wide Area Networks
283(32)
Introduction
284(1)
Metropolitan Area Network Basics
284(5)
Sonet vs. Ethernet
286(3)
Wide Area Network Basics
289(8)
Types of Sub-networks
291(4)
Connection-oriented vs. connectionless network applications
295(2)
Routing
297(8)
Dijkstra's least-cost algorithm
299(1)
Flooding
300(1)
Centralized vs. distributed routing
301(3)
Adaptive vs. fixed routing
304(1)
Routing examples
305(1)
Network Congestion
305(3)
The problems associated with network congestion
306(1)
Possible solutions to congestion
306(2)
WANs in Action: Making Internet Connections
308(2)
A home-to-Internet connection
308(1)
A work-to-Internet connection
309(1)
Summary
310(1)
Key Terms
311(1)
Review Questions
312(1)
Exercises
312(2)
Thinking Outside the Box
314(1)
Hands-On Projects
314(1)
The Internet
315(44)
Introduction
316(1)
Internet Protocols
317(11)
The Internet Protocol (IP)
318(4)
The Transmission Control Protocol (TCP)
322(2)
Internet Control Message Protocol (ICMP)
324(1)
User Datagram Protocol (UDP)
325(1)
Address Resolution Protocol (ARP)
326(1)
Dynamic Host Configuration Protocol (DHCP)
326(1)
Network Address Translation (NAT)
327(1)
Tunneling Protocols and virtual private networks (VPNs)
328(1)
The World Wide Web
328(10)
Locating a document on the Internet
330(4)
Creating Web pages
334(4)
Internet Services
338(7)
Electronic mail (e-mail)
338(1)
File Transfer Protocol (FTP)
339(2)
Remote login (Telnet)
341(1)
Voice over IP
341(2)
Listservs
343(1)
Streaming audio and video
344(1)
Instant messaging
344(1)
The Internet and Business
345(2)
Cookies and state information
345(1)
Intranets and extranets
346(1)
The Future of the Internet
347(3)
IPv6
348(1)
Internet2
349(1)
The Internet In Action: A Company Creates a VPN
350(2)
Summary
352(2)
Key Terms
354(1)
Review Questions
354(1)
Exercises
355(1)
Thinking Outside the Box
356(1)
Hands-On Projects
357(2)
Voice and Data Delivery Networks
359(36)
Introduction
360(1)
The Basic Telephone System
360(8)
Telephone lines and trunks
360(2)
The telephone network before and after 1984
362(1)
Telephone networks after 1996
363(1)
Limitations of telephone signals
364(1)
The 56k Dial-Up Modem
365(3)
Digital Subscriber Line
368(3)
DSL basics
368(2)
DSL formats
370(1)
Cable Modems
371(2)
T-1 Leased Line Service
373(1)
Frame Relay
373(6)
Frame relay setup
376(2)
Committed information rate (CIR)
378(1)
Asynchronous Transfer Mode (ATM)
379(3)
ATM classes of service
380(2)
Advantages and disadvantages of ATM
382(1)
Comparison of DSL, Cable Modems, Frame Relay, and ATM
382(1)
Convergence
383(3)
Computer-Telephony Integration (CTI)
384(2)
Telecommunications Systems in Action: A Company Makes a Service Choice
386(3)
Prices
386(1)
Making the choice
386(3)
Summary
389(2)
Key Terms
391(1)
Review Questions
391(1)
Exercises
392(1)
Thinking Outside the Box
393(1)
Hands-On Projects
394(1)
Network Security
395(38)
Introduction
396(1)
Standard System Attacks
396(4)
Physical Protection
400(1)
Controlling Access
401(6)
Passwords and ID systems
402(2)
Access rights
404(2)
Auditing
406(1)
Securing Data
407(10)
Basic encryption and decryption techniques
407(10)
Securing Communications
417(7)
Spread Spectrum Technology
417(3)
Guarding against viruses
420(1)
Firewalls
421(3)
Wireless security
424(1)
Security Policy Design Issues
424(2)
Network Security In Action: Making Wireless LANs Secure
426(1)
Summary
427(2)
Key Terms
429(1)
Review Questions
429(1)
Exercises
430(1)
Thinking Outside the Box
431(1)
Hands-On Projects
431(2)
Network Design and Management
433(32)
Introduction
434(1)
Systems Development Life Cycle
435(1)
Network Modeling
436(4)
Wide area connectivity map
437(1)
Metropolitan area connectivity map
438(1)
Local area connectivity map
439(1)
Feasibility Studies
440(4)
Capacity Planning
444(3)
Creating a Baseline
447(3)
Network Administrator Skills
450(1)
Generating Usable Statistics
451(2)
Network Diagnostic Tools
453(4)
Tools that test and debug network hardware
453(1)
Network sniffers
454(1)
Managing operations
454(1)
Simple Network Management Protocol (SNMP)
455(2)
Capacity Planning and Network Design In Action: Better Box Corporation
457(2)
Summary
459(2)
Key Terms
461(1)
Review Questions
461(1)
Exercises
461(1)
Thinking Outside the Box
462(1)
Hands-On Projects
463(2)
Glossary 465(20)
Index 485