Book Description TRY (FREE for 14 days), OR RENT this title: www.wileystudentchoice.com As the world grows increasingly interconnected, data communications has become a critical aspect of business operations. Wireless and mobile technology allows us to seamlessly transition from work to play and back again, and the Internet of things has brought our appliances, vehicles, and homes into the network; as life increasingly takes place online, businesses recognize the opportunity for a competitive advantage. Today’s networking professionals have become central to nearly every aspect of business, and this book provides the essential foundation needed to build and manage the scalable, mobile, secure networks these businesses require. Although the technologies evolve rapidly, the underlying concepts are more constant. This book combines the foundational concepts with practical exercises to provide a well-grounded approach to networking in business today. Key management and technical issues are highlighted and discussed in the context of real-world applications, and hands-on exercises reinforce critical concepts while providing insight into day-to-day operations. Detailed technical descriptions reveal the tradeoffs not presented in product summaries, building the analytical capacity needed to understand, evaluate, and compare current and future technologies. Show and hide more
Table of Contents
COVER TITLE PAGE ABOUT THE AUTHORS PREFACE PURPOSE OF THIS BOOK WHAT’S NEW IN THIS EDITION LAB EXERCISES www.wiley.com/college/fitzgerald ONLINE SUPPLEMENTS FOR INSTRUCTORS www.wiley.com/college/fitzgerald E-BOOK ACKNOWLEDGMENTS PART ONE: INTRODUCTION CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS 1.1 INTRODUCTION 1.2 DATA COMMUNICATIONS NETWORKS 1.3 NETWORK MODELS 1.4 NETWORK STANDARDS 1.5 FUTURE TRENDS 1.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES PART TWO: FUNDAMENTAL CONCEPTS CHAPTER 2: APPLICATION LAYER 2.1 INTRODUCTION 2.2 APPLICATION ARCHITECTURES 2.3 WORLD WIDE WEB 2.4 ELECTRONIC MAIL 2.5 OTHER APPLICATIONS 2.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 3: PHYSICAL LAYER 3.1 INTRODUCTION 3.2 CIRCUITS 3.3 COMMUNICATION MEDIA 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA 3.5 ANALOG TRANSMISSION OF DIGITAL DATA 3.6 DIGITAL TRANSMISSION OF ANALOG DATA 3.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 4: DATA LINK LAYER 4.1 INTRODUCTION 4.2 MEDIA ACCESS CONTROL 4.3 ERROR CONTROL 4.4 DATA LINK PROTOCOLS 4.5 TRANSMISSION EFFICIENCY 4.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 5: NETWORK AND TRANSPORT LAYERS 5.1 INTRODUCTION 5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS 5.3 TRANSPORT LAYER FUNCTIONS 5.4 ADDRESSING 5.5 ROUTING 5.6 TCP/IP EXAMPLE 5.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES PART THREE: NETWORK TECHNOLOGIES CHAPTER 6: NETWORK DESIGN 6.1 INTRODUCTION 6.2 NEEDS ANALYSIS 6.3 TECHNOLOGY DESIGN 6.4 COST ASSESSMENT 6.5 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS 7.1 INTRODUCTION 7.2 LAN COMPONENTS 7.3 WIRED ETHERNET 7.4 WIRELESS ETHERNET 7.5 THE BEST PRACTICE LAN DESIGN 7.6 IMPROVING LAN PERFORMANCE 7.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 8: BACKBONE NETWORKS 8.1 INTRODUCTION 8.2 SWITCHED BACKBONES 8.3 ROUTED BACKBONES 8.4 VIRTUAL LANS 8.5 THE BEST PRACTICE BACKBONE DESIGN 8.6 IMPROVING BACKBONE PERFORMANCE 8.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 9: WIDE AREA NETWORKS 9.1 INTRODUCTION 9.2 DEDICATED-CIRCUIT NETWORKS 9.3 PACKET-SWITCHED NETWORKS 9.4 VIRTUAL PRIVATE NETWORKS 9.5 THE BEST PRACTICE WAN DESIGN 9.6 IMPROVING WAN PERFORMANCE 9.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 10: THE INTERNET 10.1 INTRODUCTION 10.2 HOW THE INTERNET WORKS 10.3 INTERNET ACCESS TECHNOLOGIES 10.4 THE FUTURE OF THE INTERNET 10.5 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES PART FOUR: NETWORK MANAGEMENT CHAPTER 11: NETWORK SECURITY 11.1 INTRODUCTION 11.2 RISK ASSESSMENT 11.3 ENSURING BUSINESS CONTINUITY 11.4 INTRUSION PREVENTION 11.5 BEST PRACTICE RECOMMENDATIONS 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES CHAPTER 12: NETWORK MANAGEMENT 12.1 INTRODUCTION 12.2 DESIGNING FOR NETWORK PERFORMANCE 12.3 CONFIGURATION MANAGEMENT 12.4 PERFORMANCE AND FAULT MANAGEMENT 12.5 END USER SUPPORT 12.6 COST MANAGEMENT 12.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES APPENDIX A: CONNECTOR CABLES A.1 RS232 (DB-25)/RS449 (DB-9) A.2 NULL MODEM CABLE CONNECTIONS A.3 DATA SIGNALING/SYNCHRONIZATION A.4 ETHERNET AND RJ-45 A.5 UNIVERSAL SERIAL BUS A.6 FIREWIRE APPENDIX B: SPANNING TREE PROTOCOL APPENDIX C: IP TELEPHONY APPENDIX D: TCP/IP GAME D.1 INTRODUCTION D.2 APPLICATION LAYER D.3 TRANSPORT LAYER D.4 NETWORK LAYER D.5 DATA LINK LAYER D.6 PHYSICAL LAYER D.7 NOTE TO INSTRUCTORS D.8 PREPARING TO TEACH THE GAME D.9 TEACHING THE GAME GLOSSARY INDEX END USER LICENSE AGREEMENT