Muutke küpsiste eelistusi

Data Communications and Computer Networks: A Business User's Approach 8th edition [Kõva köide]

(Uuem väljaanne: 9780357671115)
(DePaul University)
  • Formaat: Hardback, 456 pages, kõrgus x laius x paksus: 284x222x22 mm, kaal: 1202 g, illustrations
  • Ilmumisaeg: 01-Jan-2015
  • Kirjastus: Course Technology Inc
  • ISBN-10: 1305116631
  • ISBN-13: 9781305116634 (Uuem väljaanne: 9780357671115)
Teised raamatud teemal:
  • Kõva köide
  • Hind: 75,67 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 94,59 €
  • Säästad 20%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 456 pages, kõrgus x laius x paksus: 284x222x22 mm, kaal: 1202 g, illustrations
  • Ilmumisaeg: 01-Jan-2015
  • Kirjastus: Course Technology Inc
  • ISBN-10: 1305116631
  • ISBN-13: 9781305116634 (Uuem väljaanne: 9780357671115)
Teised raamatud teemal:
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.
Preface xvii
1 Introduction to Computer Networks and Data Communications
1(26)
The Language of Computer Networks
3(1)
The Big Picture of Networks
4(2)
Common Examples of Communications Networks
6(7)
The desktop computer and the Internet
6(2)
A laptop computer and a wireless connection
8(1)
Cell phone systems
9(1)
Other common network systems
10(3)
Convergence
13(1)
Network Architectures
13(8)
The TCP/IP Protocol Suite in Action
21(1)
Summary
22(1)
Key Terms
23(1)
Review Questions
24(1)
Exercises
24(1)
Thinking Outside the Box
25(1)
Hands-On Projects
25(2)
2 Fundamentals of Data and Signals
27(34)
Data and Signals
29(8)
Analog vs. digital
30(3)
Fundamentals of signals
33(4)
Converting Data into Signals
37(12)
Transmitting analog data with analog signals
38(1)
Transmitting digital data with square-wave digital signals: digital encoding schemes
38(5)
Transmitting digital data with discrete analog signals
43(3)
Transmitting analog data with digital signals
46(3)
Data Codes
49(5)
EBCDIC
51(1)
ASCII
52(1)
Unicode
53(1)
Data and Signal Conversions in Action: Two Examples
54(2)
Summary
56(1)
Key Terms
56(1)
Review Questions
57(1)
Exercises
57(1)
Thinking Outside the Box
58(1)
Hands-On Projects
59(2)
3 Conducted and Wireless Media
61(40)
Conducted Media
62(10)
Twisted pair wire
62(5)
Coaxial cable
67(1)
Fiber-optic cable
68(4)
Wireless Media
72(17)
Media Selection Criteria
89(3)
Conducted Media in Action: Two Examples
92(2)
Wireless Media in Action: Three Examples
94(3)
Summary
97(1)
Key Terms
97(1)
Review Questions
98(1)
Exercises
98(1)
Thinking Outside the Box
99(1)
Hands-On Projects
100(1)
4 Making Connections
101(18)
Interfacing a Computer to Peripheral Devices
102(6)
Characteristics of interface standards
103(1)
An early interface standard
104(1)
Universal Serial Bus (USB)
104(2)
Other interface standards
106(2)
Data Link Connections
108(3)
Asynchronous connections
109(1)
Synchronous connections
110(1)
Isochronous connections
111(1)
Terminal-to-Mainframe Computer Connections
111(2)
Making Computer Connections in Action
113(1)
Summary
114(1)
Key Terms
115(1)
Review Questions
115(1)
Exercises
116(1)
Thinking Outside the Box
116(1)
Hands-On Projects
117(2)
5 Making Connections Efficient: Multiplexing and Compression
119(28)
Frequency Division Multiplexing
120(3)
Time Division Multiplexing
123(6)
Synchronous time division multiplexing
123(5)
Statistical time division multiplexing
128(1)
Wavelength Division Multiplexing
129(2)
Code Division Multiplexing
131(2)
Discrete Multitone
133(1)
Comparison of Multiplexing Techniques
134(1)
Compression---Lossless vs. Lossy
135(7)
Lossless compression
136(2)
Lossy compression
138(4)
Business Multiplexing in Action
142(1)
Summary
143(1)
Key Terms
144(1)
Review Questions
144(1)
Exercises
144(1)
Thinking Outside the Box
145(1)
Hands-On Projects
146(1)
6 Errors, Error Detection, and Error Control
147(28)
Noise and Errors
149(3)
White noise
149(1)
Impulse noise
150(1)
Crosstalk
150(1)
Echo
151(1)
Jitter
151(1)
Attenuation
152(1)
Error Prevention
152(1)
Error Detection
153(7)
Parity checks
154(2)
Arithmetic checksum
156(1)
Cyclic redundancy checksum
157(3)
Error Control
160(9)
Toss the frame/packet
160(1)
Return a message
161(6)
Correct the error
167(2)
Error Detection in Action
169(1)
Summary
170(1)
Key Terms
171(1)
Review Questions
171(1)
Exercises
172(1)
Thinking Outside the Box
172(1)
Hands-On Projects
173(2)
7 Local Area Networks: Part I
175(32)
Primary Function of Local Area Networks
176(2)
Advantages and Disadvantages of Local Area Networks
178(2)
The First Local Area Network: The Bus/Tree
180(2)
A More Modern LAN
182(4)
Contention-based protocols
184(2)
Switches
186(8)
Isolating traffic patterns and providing multiple access
190(1)
Full-duplex switches
190(1)
Virtual LANs
191(1)
Link aggregation
192(1)
Spanning tree algorithm
192(2)
Quality of service
194(1)
Wired Ethernet
194(3)
Wired Ethernet Frame Format
197(1)
LANs in Action: A Small Office Solution
198(3)
Summary
201(1)
Key Terms
202(1)
Review Questions
203(1)
Exercises
203(1)
Thinking Outside the Box
204(1)
Hands-On Projects
205(2)
8 Local Area Networks: Part II
207(34)
Wireless Ethernet
208(7)
Wireless LAN standards
211(1)
Wireless CSMA/CA
212(2)
CSMA/CA frame format
214(1)
Network Operating Systems
215(1)
Network Operating Systems Past and Present
216(9)
Novell NetWare
217(3)
Microsoft Windows NT and Windows Server
220(3)
UNIX
223(1)
Linux
223(1)
Mac OS X Server
224(1)
Servers
225(2)
Client/server networks versus peer-to-peer networks
227(1)
Network Support Software
227(3)
Utilities
228(2)
Internet software
230(1)
Software Licensing Agreements
230(2)
LAN Support Devices
232(2)
LAN Software in Action: A Small Company Makes a Choice
234(2)
Primary uses of current system
234(1)
Network maintenance and support
234(1)
Cost of the NOS
235(1)
Any unique hardware choices affecting NOS decision
235(1)
Single location or multiple locations
235(1)
Political pressures affecting decision
236(1)
Final decision
236(1)
Wireless Networking in Action: Creating a Wireless LAN for Home
236(1)
Summary
237(1)
Key Terms
238(1)
Review Questions
239(1)
Exercises
239(1)
Thinking Outside the Box
240(1)
Hands-On Projects
240(1)
9 Introduction to Metropolitan Area Networks and Wide Area Networks
241(28)
Metropolitan Area Network Basics
242(5)
SONET vs. Ethernet
244(3)
Wide Area Network Basics
247(7)
Types of network clouds
249(3)
Connection-oriented versus connectionless network applications
252(2)
Routing
254(7)
Dijkstra's least-cost algorithm
256(1)
Flooding
257(1)
Centralized versus distributed routing
258(2)
Adaptive versus fixed routing
260(1)
Routing examples
261(1)
Network Congestion
261(3)
The problems associated with network congestion
262(1)
Possible solutions to congestion
262(2)
WANs in Action: The Smartphone
264(1)
Summary
265(1)
Key Terms
266(1)
Review Questions
266(1)
Exercises
267(1)
Thinking Outside the Box
268(1)
Hands-On Projects
268(1)
10 The Internet
269(38)
Internet Protocols
271(15)
The Internet Protocol
272(5)
Internet Protocol version 6
277(3)
The Transmission Control Protocol
280(2)
The Internet Control Message Protocol
282(1)
User Datagram Protocol
282(1)
The Address Resolution Protocol
283(1)
The Dynamic Host Configuration Protocol
284(1)
Network Address Translation
284(1)
Tunneling protocols and virtual private networks
285(1)
The World Wide Web
286(3)
Locating a document on the Internet
287(2)
Internet Services
289(7)
Electronic mail (e-mail)
289(1)
The File Transfer Protocol
290(2)
Remote login (Telnet)
292(1)
Voice over IP
292(3)
Listservs
295(1)
Streaming audio and video
295(1)
Instant messages, tweets, and blogs
295(1)
The Internet and Business
296(2)
Cookies and state information
297(1)
Intranets and extranets
297(1)
The Future of the Internet
298(1)
The Internet in Action: A Company Creates a VPN
299(2)
Summary
301(1)
Key Terms
302(1)
Review Questions
303(1)
Exercises
303(1)
Thinking Outside the Box
304(1)
Hands-On Projects
304(3)
11 Voice and Data Delivery Networks
307(32)
The Basic Telephone System
308(6)
Telephone lines and trunks
308(2)
The telephone network before and after 1984
310(1)
Telephone networks after 1996
311(1)
Limitations of telephone signals
312(1)
Dial-up Internet service
313(1)
Digital Subscriber Line
314(3)
DSL basics
315(1)
DSL formats
316(1)
Cable Modems
317(1)
T-1 Leased Line Service
318(1)
Frame Relay
319(3)
Committed information rate or service level agreements
321(1)
Asynchronous Transfer Mode
322(3)
ATM classes of service
323(2)
Advantages and disadvantages of ATM
325(1)
MPLS and VPN
325(1)
Summary of the Data Delivery Services
326(1)
Convergence
327(3)
Computer-telephony integration
328(2)
Unified communications
330(1)
Telecommunications Systems in Action: A Company Makes a Service Choice
330(3)
Choices
330(1)
Making the choice
330(3)
Summary
333(2)
Key Terms
335(1)
Review Questions
335(1)
Exercises
336(1)
Thinking Outside the Box
337(1)
Hands-On Projects
337(2)
12 Network Security
339(34)
Common System Attacks
340(3)
Physical Protection
343(1)
Controlling Access
344(6)
Passwords and ID systems
346(1)
Access rights
347(2)
Auditing
349(1)
Securing Data
350(9)
Basic encryption and decryption techniques
350(9)
Securing Communications
359(6)
Spread spectrum technology
359(2)
Guarding against viruses
361(1)
Firewalls
362(3)
Wireless security
365(1)
Security Policy Design Issues
365(2)
Network Security in Action: Making Wireless LANs Secure
367(1)
Summary
368(2)
Key Terms
370(1)
Review Questions
370(1)
Exercises
371(1)
Thinking Outside the Box
371(1)
Hands-On Projects
372(1)
13 Network Design and Management
373(28)
Systems Development Life Cycle
374(2)
Network Modeling
376(3)
Wide area connectivity map
377(1)
Metropolitan area connectivity map
378(1)
Local area connectivity map
378(1)
Feasibility Studies
379(3)
Capacity Planning
382(3)
Creating a Baseline
385(3)
Network Administrator Skills
388(1)
Generating Usable Statistics
389(1)
Network Diagnostic Tools
390(4)
Tools that test and debug network hardware
390(1)
Network sniffers
391(1)
Managing operations
391(1)
Simple network management protocol
392(2)
Capacity Planning and Network Design in Action: Better Box Corporation
394(2)
Summary
396(1)
Key Terms
397(1)
Review Questions
398(1)
Exercises
398(1)
Thinking Outside the Box
399(1)
Hands-On Projects
399(2)
Glossary 401(14)
Index 415
Curt M. White is an associate professor in the College of Computing and Digital Media at DePaul University, where he has been since 1988. Currently in his 37th year of teaching, he previously taught at Wayne State University, Illinois State University, Purdue University-Fort Wayne, and Dominican University. Dr. White has published more than 30 articles on computer science and computer science education, two chapters in books, and two college textbooks. In 1997, he chaired the ACM SIGCSE's national conference on computer science education and more recently served as president of the Consortium for Computing Sciences in Colleges. He completed a bachelor's, master's, and Ph.D. in computer science from Wayne State University.