Preface |
|
xvii | |
|
1 Introduction to Computer Networks and Data Communications |
|
|
1 | (26) |
|
The Language of Computer Networks |
|
|
3 | (1) |
|
The Big Picture of Networks |
|
|
4 | (2) |
|
Common Examples of Communications Networks |
|
|
6 | (7) |
|
The desktop computer and the Internet |
|
|
6 | (2) |
|
A laptop computer and a wireless connection |
|
|
8 | (1) |
|
|
9 | (1) |
|
Other common network systems |
|
|
10 | (3) |
|
|
13 | (1) |
|
|
13 | (8) |
|
The TCP/IP Protocol Suite in Action |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (2) |
|
2 Fundamentals of Data and Signals |
|
|
27 | (34) |
|
|
29 | (8) |
|
|
30 | (3) |
|
|
33 | (4) |
|
Converting Data into Signals |
|
|
37 | (12) |
|
Transmitting analog data with analog signals |
|
|
38 | (1) |
|
Transmitting digital data with square-wave digital signals: digital encoding schemes |
|
|
38 | (5) |
|
Transmitting digital data with discrete analog signals |
|
|
43 | (3) |
|
Transmitting analog data with digital signals |
|
|
46 | (3) |
|
|
49 | (5) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Data and Signal Conversions in Action: Two Examples |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
3 Conducted and Wireless Media |
|
|
61 | (40) |
|
|
62 | (10) |
|
|
62 | (5) |
|
|
67 | (1) |
|
|
68 | (4) |
|
|
72 | (17) |
|
|
89 | (3) |
|
Conducted Media in Action: Two Examples |
|
|
92 | (2) |
|
Wireless Media in Action: Three Examples |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (18) |
|
Interfacing a Computer to Peripheral Devices |
|
|
102 | (6) |
|
Characteristics of interface standards |
|
|
103 | (1) |
|
An early interface standard |
|
|
104 | (1) |
|
Universal Serial Bus (USB) |
|
|
104 | (2) |
|
Other interface standards |
|
|
106 | (2) |
|
|
108 | (3) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Terminal-to-Mainframe Computer Connections |
|
|
111 | (2) |
|
Making Computer Connections in Action |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (2) |
|
5 Making Connections Efficient: Multiplexing and Compression |
|
|
119 | (28) |
|
Frequency Division Multiplexing |
|
|
120 | (3) |
|
Time Division Multiplexing |
|
|
123 | (6) |
|
Synchronous time division multiplexing |
|
|
123 | (5) |
|
Statistical time division multiplexing |
|
|
128 | (1) |
|
Wavelength Division Multiplexing |
|
|
129 | (2) |
|
Code Division Multiplexing |
|
|
131 | (2) |
|
|
133 | (1) |
|
Comparison of Multiplexing Techniques |
|
|
134 | (1) |
|
Compression---Lossless vs. Lossy |
|
|
135 | (7) |
|
|
136 | (2) |
|
|
138 | (4) |
|
Business Multiplexing in Action |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
6 Errors, Error Detection, and Error Control |
|
|
147 | (28) |
|
|
149 | (3) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (7) |
|
|
154 | (2) |
|
|
156 | (1) |
|
Cyclic redundancy checksum |
|
|
157 | (3) |
|
|
160 | (9) |
|
|
160 | (1) |
|
|
161 | (6) |
|
|
167 | (2) |
|
Error Detection in Action |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (2) |
|
7 Local Area Networks: Part I |
|
|
175 | (32) |
|
Primary Function of Local Area Networks |
|
|
176 | (2) |
|
Advantages and Disadvantages of Local Area Networks |
|
|
178 | (2) |
|
The First Local Area Network: The Bus/Tree |
|
|
180 | (2) |
|
|
182 | (4) |
|
Contention-based protocols |
|
|
184 | (2) |
|
|
186 | (8) |
|
Isolating traffic patterns and providing multiple access |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
194 | (3) |
|
Wired Ethernet Frame Format |
|
|
197 | (1) |
|
LANs in Action: A Small Office Solution |
|
|
198 | (3) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (2) |
|
8 Local Area Networks: Part II |
|
|
207 | (34) |
|
|
208 | (7) |
|
|
211 | (1) |
|
|
212 | (2) |
|
|
214 | (1) |
|
Network Operating Systems |
|
|
215 | (1) |
|
Network Operating Systems Past and Present |
|
|
216 | (9) |
|
|
217 | (3) |
|
Microsoft Windows NT and Windows Server |
|
|
220 | (3) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Client/server networks versus peer-to-peer networks |
|
|
227 | (1) |
|
|
227 | (3) |
|
|
228 | (2) |
|
|
230 | (1) |
|
Software Licensing Agreements |
|
|
230 | (2) |
|
|
232 | (2) |
|
LAN Software in Action: A Small Company Makes a Choice |
|
|
234 | (2) |
|
Primary uses of current system |
|
|
234 | (1) |
|
Network maintenance and support |
|
|
234 | (1) |
|
|
235 | (1) |
|
Any unique hardware choices affecting NOS decision |
|
|
235 | (1) |
|
Single location or multiple locations |
|
|
235 | (1) |
|
Political pressures affecting decision |
|
|
236 | (1) |
|
|
236 | (1) |
|
Wireless Networking in Action: Creating a Wireless LAN for Home |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
9 Introduction to Metropolitan Area Networks and Wide Area Networks |
|
|
241 | (28) |
|
Metropolitan Area Network Basics |
|
|
242 | (5) |
|
|
244 | (3) |
|
|
247 | (7) |
|
|
249 | (3) |
|
Connection-oriented versus connectionless network applications |
|
|
252 | (2) |
|
|
254 | (7) |
|
Dijkstra's least-cost algorithm |
|
|
256 | (1) |
|
|
257 | (1) |
|
Centralized versus distributed routing |
|
|
258 | (2) |
|
Adaptive versus fixed routing |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (3) |
|
The problems associated with network congestion |
|
|
262 | (1) |
|
Possible solutions to congestion |
|
|
262 | (2) |
|
WANs in Action: The Smartphone |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (38) |
|
|
271 | (15) |
|
|
272 | (5) |
|
Internet Protocol version 6 |
|
|
277 | (3) |
|
The Transmission Control Protocol |
|
|
280 | (2) |
|
The Internet Control Message Protocol |
|
|
282 | (1) |
|
|
282 | (1) |
|
The Address Resolution Protocol |
|
|
283 | (1) |
|
The Dynamic Host Configuration Protocol |
|
|
284 | (1) |
|
Network Address Translation |
|
|
284 | (1) |
|
Tunneling protocols and virtual private networks |
|
|
285 | (1) |
|
|
286 | (3) |
|
Locating a document on the Internet |
|
|
287 | (2) |
|
|
289 | (7) |
|
|
289 | (1) |
|
The File Transfer Protocol |
|
|
290 | (2) |
|
|
292 | (1) |
|
|
292 | (3) |
|
|
295 | (1) |
|
Streaming audio and video |
|
|
295 | (1) |
|
Instant messages, tweets, and blogs |
|
|
295 | (1) |
|
The Internet and Business |
|
|
296 | (2) |
|
Cookies and state information |
|
|
297 | (1) |
|
|
297 | (1) |
|
The Future of the Internet |
|
|
298 | (1) |
|
The Internet in Action: A Company Creates a VPN |
|
|
299 | (2) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (3) |
|
11 Voice and Data Delivery Networks |
|
|
307 | (32) |
|
The Basic Telephone System |
|
|
308 | (6) |
|
Telephone lines and trunks |
|
|
308 | (2) |
|
The telephone network before and after 1984 |
|
|
310 | (1) |
|
Telephone networks after 1996 |
|
|
311 | (1) |
|
Limitations of telephone signals |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (3) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (3) |
|
Committed information rate or service level agreements |
|
|
321 | (1) |
|
Asynchronous Transfer Mode |
|
|
322 | (3) |
|
|
323 | (2) |
|
Advantages and disadvantages of ATM |
|
|
325 | (1) |
|
|
325 | (1) |
|
Summary of the Data Delivery Services |
|
|
326 | (1) |
|
|
327 | (3) |
|
Computer-telephony integration |
|
|
328 | (2) |
|
|
330 | (1) |
|
Telecommunications Systems in Action: A Company Makes a Service Choice |
|
|
330 | (3) |
|
|
330 | (1) |
|
|
330 | (3) |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (2) |
|
|
339 | (34) |
|
|
340 | (3) |
|
|
343 | (1) |
|
|
344 | (6) |
|
|
346 | (1) |
|
|
347 | (2) |
|
|
349 | (1) |
|
|
350 | (9) |
|
Basic encryption and decryption techniques |
|
|
350 | (9) |
|
|
359 | (6) |
|
Spread spectrum technology |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
362 | (3) |
|
|
365 | (1) |
|
Security Policy Design Issues |
|
|
365 | (2) |
|
Network Security in Action: Making Wireless LANs Secure |
|
|
367 | (1) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
13 Network Design and Management |
|
|
373 | (28) |
|
Systems Development Life Cycle |
|
|
374 | (2) |
|
|
376 | (3) |
|
Wide area connectivity map |
|
|
377 | (1) |
|
Metropolitan area connectivity map |
|
|
378 | (1) |
|
Local area connectivity map |
|
|
378 | (1) |
|
|
379 | (3) |
|
|
382 | (3) |
|
|
385 | (3) |
|
Network Administrator Skills |
|
|
388 | (1) |
|
Generating Usable Statistics |
|
|
389 | (1) |
|
|
390 | (4) |
|
Tools that test and debug network hardware |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
Simple network management protocol |
|
|
392 | (2) |
|
Capacity Planning and Network Design in Action: Better Box Corporation |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (2) |
Glossary |
|
401 | (14) |
Index |
|
415 | |