Business Data Communications and Networking, 13th Edition

Book description

TRY (FREE for 14 days), OR RENT this title: www.wileystudentchoice.com

As the world grows increasingly interconnected, data communications has become a critical aspect of business operations. Wireless and mobile technology allows us to seamlessly transition from work to play and back again, and the Internet of things has brought our appliances, vehicles, and homes into the network; as life increasingly takes place online, businesses recognize the opportunity for a competitive advantage. Today’s networking professionals have become central to nearly every aspect of business, and this book provides the essential foundation needed to build and manage the scalable, mobile, secure networks these businesses require. Although the technologies evolve rapidly, the underlying concepts are more constant.

This book combines the foundational concepts with practical exercises to provide a well-grounded approach to networking in business today. Key management and technical issues are highlighted and discussed in the context of real-world applications, and hands-on exercises reinforce critical concepts while providing insight into day-to-day operations. Detailed technical descriptions reveal the tradeoffs not presented in product summaries, building the analytical capacity needed to understand, evaluate, and compare current and future technologies.

Table of contents

  1. COVER
  2. TITLE PAGE
  3. ABOUT THE AUTHORS
  4. PREFACE
    1. PURPOSE OF THIS BOOK
    2. WHAT’S NEW IN THIS EDITION
    3. LAB EXERCISES www.wiley.com/college/fitzgerald
    4. ONLINE SUPPLEMENTS FOR INSTRUCTORS www.wiley.com/college/fitzgerald
    5. E-BOOK
    6. ACKNOWLEDGMENTS
  5. PART ONE: INTRODUCTION
    1. CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS
      1. 1.1 INTRODUCTION
      2. 1.2 DATA COMMUNICATIONS NETWORKS
      3. 1.3 NETWORK MODELS
      4. 1.4 NETWORK STANDARDS
      5. 1.5 FUTURE TRENDS
      6. 1.6 IMPLICATIONS FOR CYBER SECURITY
      7. SUMMARY
      8. KEY TERMS
      9. QUESTIONS
      10. EXERCISES
  6. PART TWO: FUNDAMENTAL CONCEPTS
    1. CHAPTER 2: APPLICATION LAYER
      1. 2.1 INTRODUCTION
      2. 2.2 APPLICATION ARCHITECTURES
      3. 2.3 WORLD WIDE WEB
      4. 2.4 ELECTRONIC MAIL
      5. 2.5 OTHER APPLICATIONS
      6. 2.6 IMPLICATIONS FOR CYBER SECURITY
      7. SUMMARY
      8. KEY TERMS
      9. QUESTIONS
      10. EXERCISES
    2. CHAPTER 3: PHYSICAL LAYER
      1. 3.1 INTRODUCTION
      2. 3.2 CIRCUITS
      3. 3.3 COMMUNICATION MEDIA
      4. 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA
      5. 3.5 ANALOG TRANSMISSION OF DIGITAL DATA
      6. 3.6 DIGITAL TRANSMISSION OF ANALOG DATA
      7. 3.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
    3. CHAPTER 4: DATA LINK LAYER
      1. 4.1 INTRODUCTION
      2. 4.2 MEDIA ACCESS CONTROL
      3. 4.3 ERROR CONTROL
      4. 4.4 DATA LINK PROTOCOLS
      5. 4.5 TRANSMISSION EFFICIENCY
      6. 4.6 IMPLICATIONS FOR CYBER SECURITY
      7. SUMMARY
      8. KEY TERMS
      9. QUESTIONS
      10. EXERCISES
    4. CHAPTER 5: NETWORK AND TRANSPORT LAYERS
      1. 5.1 INTRODUCTION
      2. 5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS
      3. 5.3 TRANSPORT LAYER FUNCTIONS
      4. 5.4 ADDRESSING
      5. 5.5 ROUTING
      6. 5.6 TCP/IP EXAMPLE
      7. 5.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
  7. PART THREE: NETWORK TECHNOLOGIES
    1. CHAPTER 6: NETWORK DESIGN
      1. 6.1 INTRODUCTION
      2. 6.2 NEEDS ANALYSIS
      3. 6.3 TECHNOLOGY DESIGN
      4. 6.4 COST ASSESSMENT
      5. 6.5 IMPLICATIONS FOR CYBER SECURITY
      6. SUMMARY
      7. KEY TERMS
      8. QUESTIONS
      9. EXERCISES
    2. CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS
      1. 7.1 INTRODUCTION
      2. 7.2 LAN COMPONENTS
      3. 7.3 WIRED ETHERNET
      4. 7.4 WIRELESS ETHERNET
      5. 7.5 THE BEST PRACTICE LAN DESIGN
      6. 7.6 IMPROVING LAN PERFORMANCE
      7. 7.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
    3. CHAPTER 8: BACKBONE NETWORKS
      1. 8.1 INTRODUCTION
      2. 8.2 SWITCHED BACKBONES
      3. 8.3 ROUTED BACKBONES
      4. 8.4 VIRTUAL LANS
      5. 8.5 THE BEST PRACTICE BACKBONE DESIGN
      6. 8.6 IMPROVING BACKBONE PERFORMANCE
      7. 8.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
    4. CHAPTER 9: WIDE AREA NETWORKS
      1. 9.1 INTRODUCTION
      2. 9.2 DEDICATED-CIRCUIT NETWORKS
      3. 9.3 PACKET-SWITCHED NETWORKS
      4. 9.4 VIRTUAL PRIVATE NETWORKS
      5. 9.5 THE BEST PRACTICE WAN DESIGN
      6. 9.6 IMPROVING WAN PERFORMANCE
      7. 9.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
    5. CHAPTER 10: THE INTERNET
      1. 10.1 INTRODUCTION
      2. 10.2 HOW THE INTERNET WORKS
      3. 10.3 INTERNET ACCESS TECHNOLOGIES
      4. 10.4 THE FUTURE OF THE INTERNET
      5. 10.5 IMPLICATIONS FOR CYBER SECURITY
      6. SUMMARY
      7. KEY TERMS
      8. QUESTIONS
      9. EXERCISES
  8. PART FOUR: NETWORK MANAGEMENT
    1. CHAPTER 11: NETWORK SECURITY
      1. 11.1 INTRODUCTION
      2. 11.2 RISK ASSESSMENT
      3. 11.3 ENSURING BUSINESS CONTINUITY
      4. 11.4 INTRUSION PREVENTION
      5. 11.5 BEST PRACTICE RECOMMENDATIONS
      6. 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY
      7. SUMMARY
      8. KEY TERMS
      9. QUESTIONS
      10. EXERCISES
    2. CHAPTER 12: NETWORK MANAGEMENT
      1. 12.1 INTRODUCTION
      2. 12.2 DESIGNING FOR NETWORK PERFORMANCE
      3. 12.3 CONFIGURATION MANAGEMENT
      4. 12.4 PERFORMANCE AND FAULT MANAGEMENT
      5. 12.5 END USER SUPPORT
      6. 12.6 COST MANAGEMENT
      7. 12.7 IMPLICATIONS FOR CYBER SECURITY
      8. SUMMARY
      9. KEY TERMS
      10. QUESTIONS
      11. EXERCISES
  9. APPENDIX A: CONNECTOR CABLES
    1. A.1 RS232 (DB-25)/RS449 (DB-9)
    2. A.2 NULL MODEM CABLE CONNECTIONS
    3. A.3 DATA SIGNALING/SYNCHRONIZATION
    4. A.4 ETHERNET AND RJ-45
    5. A.5 UNIVERSAL SERIAL BUS
    6. A.6 FIREWIRE
  10. APPENDIX B: SPANNING TREE PROTOCOL
  11. APPENDIX C: IP TELEPHONY
  12. APPENDIX D: TCP/IP GAME
    1. D.1 INTRODUCTION
    2. D.2 APPLICATION LAYER
    3. D.3 TRANSPORT LAYER
    4. D.4 NETWORK LAYER
    5. D.5 DATA LINK LAYER
    6. D.6 PHYSICAL LAYER
    7. D.7 NOTE TO INSTRUCTORS
    8. D.8 PREPARING TO TEACH THE GAME
    9. D.9 TEACHING THE GAME
  13. GLOSSARY
  14. INDEX
  15. END USER LICENSE AGREEMENT

Product information

  • Title: Business Data Communications and Networking, 13th Edition
  • Author(s): Jerry FitzGerald, Alan Dennis, Alexandra Durcikova
  • Release date: November 2017
  • Publisher(s): Wiley
  • ISBN: 9781119368830