Description
Efnisyfirlit
- COVER
- TITLE PAGE
- COPYRIGHT
- DEDICATION
- ABOUT THE AUTHORS
- PREFACE
- PURPOSE OF THIS BOOK
- WHAT’S NEW IN THIS EDITION
- LAB EXERCISES
- ONLINE SUPPLEMENTS FOR INSTRUCTORS
- E-BOOK
- ACKNOWLEDGMENTS
- PART ONE: INTRODUCTION
- CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS
- 1.1 INTRODUCTION
- 1.2 DATA COMMUNICATIONS NETWORKS
- 1.3 NETWORK MODELS
- 1.4 NETWORK STANDARDS
- 1.5 FUTURE TRENDS
- 1.6 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 1A
- HANDS-ON ACTIVITY 1B
- PART TWO: FUNDAMENTAL CONCEPTS
- CHAPTER 2: APPLICATION LAYER
- 2.1 INTRODUCTION
- 2.2 APPLICATION ARCHITECTURES
- 2.3 WORLD WIDE WEB
- 2.4 ELECTRONIC MAIL
- 2.5 OTHER APPLICATIONS
- 2.6 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 2A
- HANDS-ON ACTIVITY 2B
- CHAPTER 3: PHYSICAL LAYER
- 3.1 INTRODUCTION
- 3.2 CIRCUITS
- 3.3 COMMUNICATION MEDIA
- 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA
- 3.5 ANALOG TRANSMISSION OF DIGITAL DATA
- 3.6 DIGITAL TRANSMISSION OF ANALOG DATA
- 3.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 3A
- HANDS-ON ACTIVITY 3B
- HANDS-ON ACTIVITY 3C
- CHAPTER 4: DATA LINK LAYER
- 4.1 INTRODUCTION
- 4.2 MEDIA ACCESS CONTROL
- 4.3 ERROR CONTROL
- 4.4 DATA LINK PROTOCOLS
- 4.5 TRANSMISSION EFFICIENCY
- 4.6 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 4A
- CHAPTER 5: NETWORK AND TRANSPORT LAYERS
- 5.1 INTRODUCTION
- 5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS
- 5.3 TRANSPORT LAYER FUNCTIONS
- 5.4 ADDRESSING
- 5.5 ROUTING
- 5.6 TCP/IP EXAMPLE
- 5.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 5A
- HANDS-ON ACTIVITY 5B
- HANDS-ON ACTIVITY 5C
- HANDS-ON ACTIVITY 5D
- HANDS-ON ACTIVITY 5E
- HANDS-ON ACTIVITY 5F
- PART THREE: NETWORK TECHNOLOGIES
- CHAPTER 6: NETWORK DESIGN
- 6.1 INTRODUCTION
- 6.2 NEEDS ANALYSIS
- 6.3 TECHNOLOGY DESIGN
- 6.4 COST ASSESSMENT
- 6.5 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 6A
- CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS
- 7.1 INTRODUCTION
- 7.2 LAN COMPONENTS
- 7.3 WIRED ETHERNET
- 7.4 WIRELESS ETHERNET
- 7.5 THE BEST PRACTICE LAN DESIGN
- 7.6 IMPROVING LAN PERFORMANCE
- 7.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 7A
- HANDS-ON ACTIVITY 7B
- HANDS-ON ACTIVITY 7C
- CHAPTER 8: BACKBONE NETWORKS
- 8.1 INTRODUCTION
- 8.2 SWITCHED BACKBONES
- 8.3 ROUTED BACKBONES
- 8.4 VIRTUAL LANS
- 8.5 THE BEST PRACTICE BACKBONE DESIGN
- 8.6 IMPROVING BACKBONE PERFORMANCE
- 8.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 8A
- HANDS-ON ACTIVITY 8B
- CHAPTER 9: WIDE AREA NETWORKS
- 9.1 INTRODUCTION
- 9.2 DEDICATED-CIRCUIT NETWORKS
- 9.3 PACKET-SWITCHED NETWORKS
- 9.4 VIRTUAL PRIVATE NETWORKS
- 9.5 THE BEST PRACTICE WAN DESIGN
- 9.6 IMPROVING WAN PERFORMANCE
- 9.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 9A
- HANDS-ON ACTIVITY 9B
- HANDS-ON ACTIVITY 9C
- HANDS-ON ACTIVITY 9D
- CHAPTER 10: THE INTERNET
- 10.1 INTRODUCTION
- 10.2 HOW THE INTERNET WORKS
- 10.3 INTERNET ACCESS TECHNOLOGIES
- 10.4 THE FUTURE OF THE INTERNET
- 10.5 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 10A
- HANDS-ON ACTIVITY 10B
- HANDS-ON ACTIVITY 10C
- PART FOUR: NETWORK MANAGEMENT
- CHAPTER 11: NETWORK SECURITY
- 11.1 INTRODUCTION
- 11.2 RISK ASSESSMENT
- 11.3 ENSURING BUSINESS CONTINUITY
- 11.4 INTRUSION PREVENTION
- 11.5 BEST PRACTICE RECOMMENDATIONS
- 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 11A
- HANDS-ON ACTIVITY 11B
- HANDS-ON ACTIVITY 11C
- HANDS-ON ACTIVITY 11D
- CHAPTER 12: NETWORK MANAGEMENT
- 12.1 INTRODUCTION
- 12.2 DESIGNING FOR NETWORK PERFORMANCE
- 12.3 CONFIGURATION MANAGEMENT
- 12.4 PERFORMANCE AND FAULT MANAGEMENT
- 12.5 END USER SUPPORT
- 12.6 COST MANAGEMENT
- 12.7 IMPLICATIONS FOR CYBER SECURITY
- SUMMARY
- KEY TERMS
- QUESTIONS
- EXERCISES
- MINICASES
- TECH UPDATES
- HANDS-ON ACTIVITY 12A
- HANDS-ON ACTIVITY 12B
- HANDS-ON ACTIVITY 12C
- INDEX
- END USER LICENSE AGREEMENT
Reviews
There are no reviews yet.