Introduction to Communications Technologies: A Guide for Non-Engineers, Third Edition 3rd New edition [Kõva köide]

(Ball State University, Muncie, Indiana, USA), (Ball State University, Muncie, Indiana, USA), (Ball State University, Muncie, Indiana, USA)
  • Formaat: Hardback, 364 pages, kõrgus x laius x paksus: 235x156x23 mm, kaal: 658 g, 183 Illustrations, black and white
  • Sari: Technology for Non-Engineers
  • Ilmumisaeg: 04-Aug-2015
  • Kirjastus: Productivity Press
  • ISBN-10: 1498702937
  • ISBN-13: 9781498702935
  • Kõva köide
  • Hind: 49,89 EUR*
  • Tavahind: 82,19 EUR
  • Säästad 39%
  • Lisa soovinimekirja
  • Lisa ostukorvi
  • Kogus:
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Raamatut on võimalik tellida. Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat.
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Raamatukogudele
    • EBL
  • Formaat: Hardback, 364 pages, kõrgus x laius x paksus: 235x156x23 mm, kaal: 658 g, 183 Illustrations, black and white
  • Sari: Technology for Non-Engineers
  • Ilmumisaeg: 04-Aug-2015
  • Kirjastus: Productivity Press
  • ISBN-10: 1498702937
  • ISBN-13: 9781498702935
Jones, Kovac, and Groom create a starting point for people in the business community who do not have a high level of technical expertise, but need to have some understanding of the technical functions of their information and communication technologies in a corporate environment. This edition incorporates current technologies and processes, and some forward perspectives on where the networks might go in the next few years. Among the topics are basic concepts of electricity, the basics of multi-protocol label switching networking, local area network technology, virtualization, the Cloud and Cloud computing, and network security and management. Annotation ©2015 Ringgold, Inc., Portland, OR (protoview.com) Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved. While formulas and functions are critical in creating the granular components and operations of individual technologies, understanding the applications and their purposes in the business environment only requires a basic scientific background. The third edition ofIntroduction to Communications Technologies: A Guide for Non-Engineers helps students in telecommunications business programs become familiar with and stay abreast of the ever-changing technology surrounding their industry.Used in the core curriculum at Ball State University’s graduate professional program in Information and Communication Sciences, this textbook is designed for graduate and undergraduate students who do not necessarily have a high level of technical expertise, but need to have some understanding of the technical functions of information and communication technologies to prepare them for working in a corporate environment.See What’s New in the Third Edition: Significant updates to the following chapters: Modulation Schemes; Signaling Formats, Multiplexing, and Digital Transmission; Packet Switching and Local Area Networks; Mobile Wireless Technologies; Network Security and ManagementAdded coverage of OFDMA, Metro Ethernet, 5G pre-standard configuration, ‘apps’ on mobile devices, and VoIP core switchingNew chapters on Big Data and the CloudAvoiding complicated equations and the need for calculus gymnastics, this textbook provides non-engineering students with a firm background and a broad understanding of the knowledge necessary to work within the fast-paced and ever-changing communications industry.
Preface xv
Authors xvii
1 Systems and Models of Communications Technologies: Shannon—Weaver, von Neumann, and the Open System Interconnection Model 1(12)
Computing Model
3(2)
Open System Interconnection Model
5(3)
Summary
8(1)
Review Questions
9(4)
Multiple Choice
9(1)
Matching Questions
10(1)
Short Essay Questions
11(2)
2 Basic Concepts of Electricity 13(20)
Common Units of Technical Measurement
13(1)
Signals
14(3)
Current
17(2)
Resistance
19(1)
Voltage
19(1)
Capacitance
20(1)
Inductance
21(1)
Power
22(1)
Electrical Circuits
22(2)
Filters
24(1)
AC-to-DC Conversion
24(3)
Summary
27(1)
Review Questions
28(5)
Multiple Choice
28(2)
Matching Questions
30(2)
Short Essay Questions
32(1)
3 Modulation Schemes 33(20)
Spectrum
33(3)
Amplitude Modulation
36(3)
Frequency Modulation
39(1)
Phase Modulation
40(1)
Pulse-Amplitude Modulation
41(1)
Pulse-Code Modulation
42(2)
Amplitude Shift Keying
44(1)
Adaptive Differential Pulse-Code Modulation
44(1)
Phase-Shift Keying
45(1)
Orthogonal Frequency-Division Multiplexing
46(1)
Quadrature Amplitude Modulation
47(1)
Multiple-Frequency Shift Keying
48(1)
Summary
48(1)
Review Questions
49(4)
True/False
49(1)
Multiple Choice
49(1)
Short Essay Questions
50(3)
4 Signaling Formats, Multiplexing, and Digital Transmissions 53(12)
Digital Formats
53(4)
Multiplexing
57(1)
Frequency-Division Multiplexing
57(1)
Time-Division Multiplexing
58(1)
Digital Circuits
58(1)
Frequency-Hopping Spread Spectrum
59(1)
Direct-Sequence Spread Spectrum
60(1)
Summary
61(1)
Review Questions
61(4)
Multiple Choice
61(2)
Matching Questions
63(1)
Short Essay Questions
63(2)
5 Legacy to Current-Day Telephone Networks 65(28)
Circuit Switching vs. Packet Switching
66(8)
Legacy of the Circuit-Switching Network
66(5)
Signaling System 7
68(1)
Integrated Services Digital Network
69(2)
Packet Switching
71(2)
Packet Headers
72(1)
Quality of Service
72(1)
Connectionless vs. Connection Oriented
73(1)
Asynchronous Transfer Mode
73(1)
ATM Architecture
73(1)
Legacy Public Switched Telephone Network
74(10)
The Telephone
74(3)
Network Access
77(1)
Trunks and Lines
78(2)
Loop Start
78(1)
Ground Start
79(1)
Direct-Inward-Dial Trunks
79(1)
E&M Trunks
79(1)
Centrex
80(1)
Customer Premise Equipment
80(3)
Private Automatic Branch Exchanges
80(2)
Digital Key Systems and Hybrids
82(1)
Voice Processing
83(1)
Voice over Internet Protocol
84(2)
VoIP Benefits
84(1)
VoIP Challenges
85(1)
Latency
85(1)
Protocols Used in VoIP Environments
86(4)
Session Initiation Protocol
86(1)
Components of SIP
86(3)
Uniform Resource Indicators
86(1)
User Agents
86(1)
SIP Servers
86(1)
Proxy Servers
87(1)
Registrar Servers
87(1)
Redirect Servers
87(1)
SIP Call Flow
87(2)
Real-Time Transfer Protocol
89(1)
Multiprotocol Label Switching
89(1)
Summary
90(1)
Review Questions
90(3)
True/False
90(1)
Multiple Choice
91(1)
Short Essay Questions
92(1)
6 Basics of Multiprotocol Label Switching Networking 93(20)
Introduction
94(1)
What Is MPLS?
95(1)
Motivation behind MPLS
96(1)
Some Attractive Features of MPLS
97(1)
Principal Components of an MPLS Network
98(1)
Operation with Edge and Core Label-Switched Routers
99(4)
Labels and Label-Switched Routers
100(1)
Forwarding Packets with MPLS Labels
101(1)
Example of MPLS Label Swapping
102(1)
Label Switching
103(3)
Labels
103(1)
Labels and Label Edge Routers
103(1)
Labels and Shims
103(3)
Signaling and Label Distribution Protocols
106(3)
Network Topology Discovery
106(1)
Reservation Protocol
107(1)
Label Distribution Protocol
107(2)
Forwarding Equivalence Classes and LDP Paths
109(1)
Conclusion
110(1)
Review Questions
110(3)
True/False
110(1)
Multiple Choice
111(1)
Matching Questions
112(1)
Short Essay Questions
112(1)
7 Local Area Network Technology 113(18)
Business and Human Factors
114(1)
Costs of a LAN
115(3)
Initial Costs
115(1)
Ongoing Costs
116(2)
Personnel
116(1)
Equipment Maintenance, Upgrades, and Repairs
117(1)
Moves, Additions, and Changes
117(1)
Outside Links
117(1)
Software Licensing
117(1)
Technical Factors
118(7)
Working Parts of a LAN
118(5)
End-User Devices
118(1)
Physical Media
119(1)
Networking Equipment
119(4)
Network Operating Systems
123(1)
Common LAN Types
123(2)
Ethernet (802.3)
123(2)
Regulatory and Legal Factors
125(2)
Use and Function of Standards
125(1)
Process of Standardization
125(1)
Standard-Setting Bodies
126(1)
Legal Aspects
126(1)
Other Networks
127(1)
Summary
127(1)
Review Questions
128(3)
True/False
128(1)
Multiple Choice
129(1)
Short Essay Questions
130(1)
8 The Language of the Internet: Transmission Control Protocol/Internet Protocol (TCP/IP) 131(20)
Business and Human Factors
131(2)
Technical Factors
133(13)
Message Casting
133(2)
Message Addressing
135(2)
Network Routing
137(3)
Centralized Routing
138(1)
Decentralized Routing
139(1)
Language of the Network: Routed Protocols
140(5)
TCP/IP
140(2)
IPX/SPX
142(1)
SNA
142(2)
SNA Access Programs
144(1)
IPv6
145(1)
Regulatory and Legal Factors
146(1)
Summary
147(1)
Review Questions
148(3)
Multiple Choice
148(1)
Short Essay Questions
149(2)
9 Wireless Local Area Networks 151(20)
Business and Human Factors
151(1)
Technical Factors
152(14)
Basics of Radio Frequency
152(2)
Wireless Protocols
154(3)
802.11n Protocol
154(1)
802.11ac Protocol
155(2)
802.11ad Protocol
157(1)
What Is a WLAN?
157(2)
Aspects to Consider
159(6)
Access Technology
159(1)
Frequency Range
160(1)
Antennas
161(2)
Range and Bandwidth
163(1)
Interference
164(1)
Security
164(1)
Wireless Metropolitan Area Networks
165(1)
Regulatory and Legal Factors
165(1)
Summary
166(1)
Review Questions
166(5)
True/False
166(1)
Multiple Choice
167(2)
Short Essay Questions
169(2)
10 Mobile Wireless Technologies 171(26)
Advanced Mobile Phone Service
171(2)
Multiple-Access Technologies
173(16)
Mobile Switching
175(2)
Fourth-Generation Wireless (4G)
177(1)
Future of 4G
177(1)
Future of Worldwide Interoperability for Microwave Access (WiMAX)
178(1)
Fifth-Generation Wireless (5G)
178(1)
Time-Division Synchronous Code-Division Multiple Access
179(1)
Enhanced Data Rate for GSM Environment (EDGE)
179(1)
General Packet Radio Service (GPRS)
180(1)
High-Speed Downlink Packet Access
180(1)
Antennas
181(2)
Smart Antennas
183(1)
Microwave Signals
184(3)
Engineering Issues for Microwave Signaling
187(2)
Summary
189(1)
Review Questions
190(7)
Multiple Choice
190(1)
Matching Questions
191(4)
Short Essay Questions
195(2)
11 Virtualization 197(12)
Compute Virtualization
197(2)
Hypervisor
198(1)
Kernel Module
198(1)
Virtual Machine Monitor
199(1)
Virtualized Storage
199(3)
Virtual Machine—Based Storage Options
200(1)
Block-Level Storage
200(1)
File-Level Storage
200(1)
Virtual Provisioning and Automated Storage Tiering
201(1)
Thin Pools and Thin Logical Units (LUNs)
201(1)
Virtualizing the Workstation
202(4)
Benefits of Desktop Virtualization
202(1)
Desktop Virtualization Techniques
203(2)
Remote Desktop Service
204(1)
Virtual Desktop Infrastructure
204(1)
VDI Benefits
204(1)
VDI Limitations and Considerations
205(1)
Virtualizing the Application
205(2)
Application Encapsulation
205(1)
Application Streaming
206(1)
Summary
206(1)
Review Questions
207(2)
True/False
207(1)
Multiple Choice
207(1)
Short Essay Questions
208(1)
12 Analyzing Big Data 209(12)
Introduction to Big Data
209(1)
The Structure of Big Data
210(1)
The Four Types of Data Structures
210(1)
Analyzing Big Data
211(1)
Analyzing the Four Data Types
212(5)
Analyzing Structured Data
212(2)
Analyzing Unstructured and Semistructured Data
214(2)
The Corpus or Body of Work
216(1)
Reviewing Results
217(1)
Summary
217(1)
Review Questions
218(3)
True/False
218(1)
Multiple Choice
218(3)
13 The Cloud and Cloud Computing 221(12)
Introduction
221(1)
The History of Cloud Computing
221(1)
What Is the Cloud?
222(1)
Virtualization
223(1)
Delivery Models for Cloud Computing
224(1)
Deployment Models for Cloud Computing
225(2)
Public Cloud Deployment
226(1)
Private Cloud Deployment
226(1)
Hybrid Cloud Deployment
226(1)
Community Cloud Deployment
227(1)
Risks of the Cloud
227(1)
Future Predictions
228(1)
Summary
229(1)
Review Questions
230(3)
True/False
230(1)
Multiple Choice
230(1)
Short Answer Questions
231(2)
14 Video Basics 233(16)
The Business and Human Factors
233(1)
High-Quality VC
234(1)
Medium-Quality VC
235(1)
Low-Quality VC
236(1)
The Technical Factors
236(1)
Image Scanning
237(3)
Color
240(1)
Transmission of Video
241(1)
High-Definition Television
242(2)
Summary
244(1)
Review Questions
245(4)
True/False
245(1)
Multiple Choice
246(1)
Short Essay Questions
247(2)
15 Digital Media 249(28)
Introduction
249(1)
Digital Media
250(2)
Convergence
250(2)
Digital Photography
252(8)
Advantages of the Digital Form over Analog Form
252(1)
Convenience
252(1)
Personalization
252(1)
Technical Differences between Digital and Analog Forms
252(5)
Camera Sensor
254(1)
Storage Media
255(1)
Compression
256(1)
Digital Darkroom Techniques
257(1)
Printing
257(1)
Advanced Darkroom Technique
258(1)
New Opportunities
259(1)
Digital Video
260(3)
Digital Video: Genesis and Advantages over Analog Video
260(1)
Technical Differences between the Digital and Analog Forms
261(2)
New Opportunities
263(1)
Digital Audio
263(4)
Advantages over Analog Version
263(1)
Technical Differences between Digital and Analog Forms
264(1)
New Opportunities
265(2)
3-D Digital Gaming
267(6)
Advantages over the Analog Version
267(2)
Technical Differences between the Digital and Analog Forms
269(3)
New Opportunities
272(1)
Summary
273(1)
Review Questions
274(3)
True/False
274(1)
Multiple Choice
275(1)
Short Answer Questions
276(1)
16 Network Security and Management 277(30)
Introduction
277(1)
Network Security Threats
278(1)
Who Are the Bad Guys?
278(2)
Hackers
278(2)
Types of Network and Computer Attacks
280(2)
Social Engineering Attacks
280(1)
DOS Attacks
280(1)
Malware Attacks
281(1)
Virus
281(1)
Worm
281(1)
Trojan Horse
281(1)
Sniffing
282(1)
Data Theft
282(1)
Data Alternation
282(1)
Spoofing
282(1)
The Payback of Security
282(1)
Customer Trust
282(1)
Mobility
283(1)
Increased Productivity
283(1)
Reduced Cost
283(1)
Basics of Security
283(1)
Authentication
283(2)
What You Know
284(1)
What You Have
284(1)
Who You Are
284(1)
Accounting
285(1)
Encryption
285(4)
Symmetric Key
286(1)
Asymmetric Key
286(3)
Access Control and Site Security
289(1)
Security Policy
290(1)
Network Security Tools and Techniques
290(1)
Network Security
290(4)
Depth in Design
290(2)
Firewalls
292(1)
Intrusion Detection Systems and Intrusion Prevention Systems
292(2)
Honey Pot
294(1)
Host Security
294(2)
OS Security
294(1)
Software Security
294(1)
Antivirus Programs
295(1)
Spam/Pop-Up and Cookie Blockers
296(1)
Network Administration and Management
296(1)
Key Aspects of Network Administration and Management
296(1)
Network Management Tools
297(5)
Client/Server Architecture
297(2)
Client
297(1)
Server
298(1)
Network OSs
298(1)
Simple Network Management Protocol
299(5)
Management Station
300(1)
Management Agents
300(1)
Management Information Base
301(1)
Network Management Protocol
301(1)
Case Study: Network Security and BYOD
302(1)
Summary
303(1)
Review Questions
304(3)
True/False
304(1)
Multiple Choice
304(2)
Short Essay Questions
306(1)
Appendix: Answer Key to
Chapter Questions
307(22)
Index 329
Stephan S. Jones, PhD, is the director of the Center for Information and Communication Sciences, where he is also a professor delivering core technology courses in the graduate-only program. His industry experience is as a field engineer and owner of a telecommunications company providing voice and data solutions for business/commercial systems in the Midwest. In academe, he has published or edited numerous books and texts associated with simplifying complex communication technologies for non-engineering students to comprehend. He is actively engaged in supporting broadband technology deployments to underserved and unserved regions of the country and providing technical support for non-profit organizations with student participation. Frank Groom, PhD, is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs. Among his best known books are The Future of ATM and The ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin- Milwaukee in information systems. He is the former senior director of information systems for Ameritech. Ron Kovac, PhD, is a full professor in the Center for Information and Communication Sciences at Ball State University in Indiana. The center prepares graduate students in the field of telecommunications. Previous to this position, Dr. Kovac was the telecommunication manager for the state of New York and a CIO for a large computing center located on the east coast. Dr. Kovac's previous studies included electrical engineering, photography, and education. Dr. Kovac has published two books and over 50 articles and has completed numerous international consulting projects in both the education and telecommunications field. Additionally, he speaks worldwide on issues related to telecommunications and holds numerous certifications, including the CCNA, the CCAI, and the almost complete CCNP. Dr. Kovac is also a Fulbright Scholar and loves life, education and technology.

Tellige see raamat tutvumiseks meie kauplusesse!Raekoja plats 11, 51004 Tartu

Juhul, kui soovite raamatuga enne ostu tutvuda, siis palun sisestaga allpool oma nimi ning e-mail.
Võimaluse korral tellime raamatu poodi ning teavitame ka teid, kui raamat on müügile jõudnud.

* - väljad on kohustuslikud