Muutke küpsiste eelistusi

Data Communications and Computer Networks: A Business User's Approach 7th ed. [Kõva köide]

(Pittsburgh Energy Technology Center)
  • Formaat: Hardback, 421 pages, kõrgus x laius x paksus: 277x216x23 mm, kaal: 1134 g, Figures; Tables, black and white
  • Ilmumisaeg: 21-Jan-2012
  • Kirjastus: Wadsworth Publishing Co Inc
  • ISBN-10: 1133626467
  • ISBN-13: 9781133626466
Teised raamatud teemal:
  • Kõva köide
  • Hind: 283,54 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 421 pages, kõrgus x laius x paksus: 277x216x23 mm, kaal: 1134 g, Figures; Tables, black and white
  • Ilmumisaeg: 21-Jan-2012
  • Kirjastus: Wadsworth Publishing Co Inc
  • ISBN-10: 1133626467
  • ISBN-13: 9781133626466
Teised raamatud teemal:
Data communications and computer networks are vital in today's business world. Whether your career entails business management, computer programming, system design, or a related area, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 7th Edition will give you the thorough understanding you need of basic features, operations, and limitations of different types of computer networks. The Seventh Edition retains many of the elements that made past editions so popular, including readability, coverage of the most current technologies, and a balanced presentation of both technical and practical everyday aspects of data communications. This book offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction.
Preface xv
1 Introduction to Computer Networks and Data Communications
1(28)
The Language of Computer Networks
3(1)
The Big Picture of Networks
4(1)
Communications Networks---Basic Layouts
5(8)
Microcomputer-to-local area network layouts
6(1)
Microcomputer-to-internet layouts
7(1)
Local area network-to-local area network layouts
7(1)
Personal area network-to-workstation layouts
8(1)
Local area network-to-metropolitan area network layouts
9(1)
Local area network-to-wide area network layouts
9(1)
Wide area network-to-wide area network layouts
10(1)
Sensor-to-local area network layouts
10(1)
Satellite and microwave layouts
11(1)
Cell phone layouts
11(1)
Terminal/microcomputer-to-mainframe computer layouts
12(1)
Convergence
13(1)
Network Architectures
14(8)
The TCP/IP protocol suite
15(3)
The OSI model
18(2)
Logical and physical connections
20(2)
Network Layouts in Action
22(1)
The TCP/IP Protocol Suite in Action
23(6)
Summary
24(2)
Key Terms
26(1)
Review Questions
26(1)
Exercises
26(1)
Thinking Outside the Box
27(1)
Hands-On Projects
27(2)
2 Fundamentals of Data and Signals
29(34)
Data and Signals
31(8)
Analog vs. digital
32(3)
Fundamentals of signals
35(4)
Converting Data into Signals
39(12)
Transmitting analog data with analog signals
40(1)
Transmitting digital data with digital signals: digital encoding schemes
40(5)
Transmitting digital data with discrete analog signals
45(3)
Transmitting analog data with digital signals
48(3)
Data Codes
51(5)
EBCDIC
53(1)
ASCII
54(1)
Unicode
55(1)
Data and Signal Conversions in Action: Two Examples
56(7)
Summary
58(1)
Key Terms
58(1)
Review Questions
59(1)
Exercises
59(1)
Thinking Outside the Box
60(1)
Hands-On Projects
61(2)
3 Conducted and Wireless Media
63(40)
Conducted Media
64(10)
Twisted pair wire
64(5)
Coaxial cable
69(1)
Fiber-optic cable
70(4)
Wireless Media
74(17)
Media Selection Criteria
91(3)
Conducted Media in Action: Two Examples
94(2)
Wireless Media in Action: Three Examples
96(7)
Summary
99(1)
Key Terms
99(1)
Review Questions
100(1)
Exercises
100(1)
Thinking Outside the Box
101(1)
Hands-On Projects
102(1)
4 Making Connections
103(18)
Interfacing a Computer to Peripheral Devices
104(6)
Characteristics of interface standards
105(1)
An early interface standard
106(1)
Universal Serial Bus (USB)
106(2)
Other interface standards
108(2)
Data Link Connections
110(3)
Asynchronous connections
110(2)
Synchronous connections
112(1)
Isochronous connections
113(1)
Terminal-to-Mainframe Computer Connections
113(2)
Making Computer Connections in Action
115(6)
Summary
116(1)
Key Terms
117(1)
Review Questions
117(1)
Exercises
118(1)
Thinking Outside the Box
118(1)
Hands-On Projects
119(2)
5 Making Connections Efficient: Multiplexing and Compression
121(28)
Frequency Division Multiplexing
122(3)
Time Division Multiplexing
125(6)
Synchronous time division multiplexing
125(5)
Statistical time division multiplexing
130(1)
Wavelength Division Multiplexing
131(2)
Discrete Multitone
133(1)
Code Division Multiplexing
134(2)
Comparison of Multiplexing Techniques
136(1)
Compression---Lossless vs. Lossy
137(7)
Lossless compression
138(2)
Lossy compression
140(4)
Business Multiplexing in Action
144(5)
Summary
145(1)
Key Terms
146(1)
Review Questions
146(1)
Exercises
146(1)
Thinking Outside the Box
147(1)
Hands-On Projects
148(1)
6 Errors, Error Detection, and Error Control
149(26)
Noise and Errors
151(3)
White noise
151(1)
Impulse noise
152(1)
Crosstalk
152(1)
Echo
153(1)
Jitter
153(1)
Attenuation
154(1)
Error Prevention
154(1)
Error Detection
155(6)
Parity checks
156(2)
Arithmetic checksum
158(1)
Cyclic redundancy checksum
159(2)
Error Control
161(9)
Toss the frame/packet
162(1)
Return a message
162(6)
Correct the error
168(2)
Error Detection in Action
170(5)
Summary
171(1)
Key Terms
172(1)
Review Questions
172(1)
Exercises
173(1)
Thinking Outside the Box
173(1)
Hands-On Projects
174(1)
7 Local Area Networks: Part I
175(32)
Primary Function of Local Area Networks
176(2)
Advantages and Disadvantages of Local Area Networks
178(2)
The First Local Area Network: The Bus/Tree
180(2)
A More Modern LAN
182(4)
Contention-based protocols
184(2)
Switches
186(8)
Isolating traffic patterns and providing multiple access
190(1)
Full-duplex switches
190(1)
Virtual LANs
191(1)
Link aggregation
192(1)
Spanning tree algorithm
192(2)
Quality of service
194(1)
Wired Ethernet
194(3)
Wired Ethernet Frame Format
197(1)
LANs in Action: A Small Office Solution
198(9)
Summary
201(1)
Key Terms
202(1)
Review Questions
203(1)
Exercises
203(1)
Thinking Outside the Box
204(1)
Hands-On Projects
205(2)
8 Local Area Networks: Part II
207(34)
Wireless Ethernet
209(6)
Wireless LAN standards
211(1)
Wireless CSMA/CA
212(2)
CSMA/CA frame format
214(1)
Network Operating Systems
215(1)
Network Operating Systems Past and Present
216(9)
Novell NetWare
217(3)
Microsoft Windows NT and Windows Server 2000, 2003, and 2008
220(3)
UNIX
223(1)
Linux
223(1)
Mac OS X Server
224(1)
Servers
225(2)
Client/server networks vs. peer-to-peer networks
227(1)
Network Support Software
227(3)
Utilities
228(2)
Internet software
230(1)
Software Licensing Agreements
230(2)
LAN Support Devices
232(2)
Lan Software in Action: A Small Company Makes a Choice
234(2)
Primary uses of current system
234(1)
Network maintenance and support
234(1)
Cost of the NOS
235(1)
Any unique hardware choices affecting NOS decision
235(1)
Single location or multiple locations
235(1)
Political pressures affecting decision
236(1)
Final decision
236(1)
Wireless Networking in Action: Creating a Wireless LAN for Home
236(5)
Summary
237(1)
Key Terms
238(1)
Review Questions
239(1)
Exercises
239(1)
Thinking Outside the Box
240(1)
Hands-On Projects
240(1)
9 Introduction to Metropolitan Area Networks and Wide Area Networks
241(28)
Metropolitan Area Network Basics
242(5)
SONET vs. Ethernet
244(3)
Wide Area Network Basics
247(7)
Types of network clouds
249(3)
Connection-oriented vs. connectionless network applications
252(2)
Routing
254(7)
Dijkstra's least-cost algorithm
256(1)
Flooding
257(1)
Centralized vs. distributed routing
258(2)
Adaptive vs. fixed routing
260(1)
Routing examples
261(1)
Network Congestion
261(3)
The problems associated with network congestion
262(1)
Possible solutions to congestion
262(2)
WANs in Action: The Smartphone
264(5)
Summary
265(1)
Key Terms
266(1)
Review Questions
266(1)
Exercises
267(1)
Thinking Outside the Box
268(1)
Hands-On Projects
268(1)
10 The Internet
269(38)
Internet Protocols
271(15)
The Internet Protocol
272(5)
Internet Protocol version 6
277(3)
The Transmission Control Protocol
280(2)
The Internet Control Message Protocol
282(1)
User Datagram Protocol
282(1)
The Address Resolution Protocol
283(1)
The Dynamic Host Configuration Protocol
284(1)
Network Address Translation
284(1)
Tunneling protocols and virtual private networks
285(1)
The World Wide Web
286(3)
Locating a document on the Internet
287(2)
Internet Services
289(7)
Electronic mail (e-mail)
289(1)
The File Transfer Protocol
290(2)
Remote login (Telnet)
292(1)
Voice over IP
292(3)
Listservs
295(1)
Streaming audio and video
295(1)
Instant messages, tweets, and blogs
295(1)
The Internet and Business
296(2)
Cookies and state information
297(1)
Intranets and extranets
297(1)
The Future of the Internet
298(1)
The Internet in Action: A Company Creates a VPN
299(8)
Summary
301(1)
Key Terms
302(1)
Review Questions
303(1)
Exercises
303(1)
Thinking Outside the Box
304(1)
Hands-On Projects
304(3)
11 Voice and Data Delivery Networks
307(32)
The Basic Telephone System
308(6)
Telephone lines and trunks
308(2)
The telephone network before and after 1984
310(1)
Telephone networks after 1996
311(1)
Limitations of telephone signals
312(1)
Dial-up Internet service
313(1)
Digital Subscriber Line
314(3)
DSL basics
315(1)
DSL formats
316(1)
Cable Modems
317(1)
T-1 Leased Line Service
318(1)
Frame Relay
319(3)
Committed information rate or service level agreements
321(1)
Asynchronous Transfer Mode
322(3)
ATM classes of service
323(2)
Advantages and disadvantages of ATM
325(1)
MPLS and VPN
325(1)
Summary of the Data Delivery Services
326(1)
Convergence
327(3)
Computer-telephony integration
328(2)
Unified communications
330(1)
Telecommunications Systems in Action: A Company Makes a Service Choice
330(9)
Prices
330(1)
Making the choice
330(3)
Summary
333(2)
Key Terms
335(1)
Review Questions
335(1)
Exercises
336(1)
Thinking Outside the Box
337(1)
Hands-On Projects
337(2)
12 Network Security
339(34)
Standard System Attacks
340(3)
Physical Protection
343(1)
Controlling Access
344(6)
Passwords and ID systems
346(1)
Access rights
347(2)
Auditing
349(1)
Securing Data
350(9)
Basic encryption and decryption techniques
350(9)
Securing Communications
359(6)
Spread spectrum technology
359(2)
Guarding against viruses
361(1)
Firewalls
362(3)
Wireless security
365(1)
Security Policy Design Issues
365(2)
Network Security in Action: Making Wireless LANs Secure
367(6)
Summary
368(2)
Key Terms
370(1)
Review Questions
370(1)
Exercises
371(1)
Thinking Outside the Box
371(1)
Hands-On Projects
372(1)
13 Network Design and Management
373(28)
Systems Development Life Cycle
374(2)
Network Modeling
376(3)
Wide area connectivity map
377(1)
Metropolitan area connectivity map
378(1)
Local area connectivity map
378(1)
Feasibility Studies
379(3)
Capacity Planning
382(3)
Creating a Baseline
385(3)
Network Administrator Skills
388(1)
Generating Usable Statistics
389(1)
Network Diagnostic Tools
390(4)
Tools that test and debug network hardware
390(1)
Network sniffers
391(1)
Managing operations
391(1)
Simple network management protocol
392(2)
Capacity Planning and Network Design in Action: Better Box Corporation
394(7)
Summary
396(1)
Key Terms
397(1)
Review Questions
398(1)
Exercises
398(1)
Thinking Outside the Box
399(1)
Hands-On Projects
399(2)
Glossary 401(14)
Index 415