Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010341596 | TK5101 J66 2016 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved. While formulas and functions are critical in creating the granular components and operations of individual technologies, understanding the applications and their purposes in the business environment only requires a basic scientific background. The third edition of Introduction to Communications Technologies: A Guide for Non-Engineers helps students in telecommunications business programs become familiar with and stay abreast of the ever-changing technology surrounding their industry.
Used in the core curriculum at Ball State University's graduate professional program in Information and Communication Sciences, this textbook is designed for graduate and undergraduate students who do not necessarily have a high level of technical expertise, but need to have some understanding of the technical functions of information and communication technologies to prepare them for working in a corporate environment.
See What's New in the Third Edition:
Significant updates to the following chapters: Modulation Schemes; Signaling Formats, Multiplexing, and Digital Transmission; Packet Switching and Local Area Networks; Mobile Wireless Technologies; Network Security and Management Added coverage of OFDMA, Metro Ethernet, 5G pre-standard configuration, 'apps' on mobile devices, and VoIP core switching New chapters on Big Data and the CloudAvoiding complicated equations and the need for calculus gymnastics, this textbook provides non-engineering students with a firm background and a broad understanding of the knowledge necessary to work within the fast-paced and ever-changing communications industry.
Author Notes
Stephan S. Jones, PhD , is the director of the Center for Information and Communication Sciences, where he is also a professor delivering core technology courses in the graduate-only program. His industry experience is as a field engineer and owner of a telecommunications company providing voice and data solutions for business/commercial systems in the Midwest. In academe, he has published or edited numerous books and texts associated with simplifying complex communication technologies for non-engineering students to comprehend. He is actively engaged in supporting broadband technology deployments to underserved and unserved regions of the country and providing technical support for non-profit organizations with student participation.
Frank Groom, PhD , is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs . Among his best known books are The Future of ATM and The ATM Handbook . Dr. Groom earned his PhD from the University of Wisconsin- Milwaukee in information systems. He is the former senior director of information systems for Ameritech.
Ron Kovac , PhD, is a full professor in the Center for Information and Communication Sciences at Ball State University in Indiana. The center prepares graduate students in the field of telecommunications. Previous to this position, Dr. Kovac was the telecommunication manager for the state of New York and a CIO for a large computing center located on the east coast. Dr. Kovac's previous studies included electrical engineering, photography, and education. Dr. Kovac has published two books and over 50 articles and has completed numerous international consulting projects in both the education and telecommunications field. Additionally, he speaks worldwide on issues related to telecommunications and holds numerous certifications, including the CCNA, the CCAI, and the almost complete CCNP. Dr. Kovac is also a Fulbright Scholar and loves life, education and technology.
Table of Contents
Systems and Models of Communications Technologies: Shannon-Weaver, von Neumann, and the Open System Interconnection Model |
Computing Model |
Open System Interconnection Model |
Summary |
Review Questions |
Basic Concepts of Electricity |
Common Units of Technical Measurement |
Signals |
Current |
Resistance |
Voltage |
Capacitance |
Inductance |
Power |
Electrical Circuits |
Filters |
AC-to-DC Conversion |
Summary |
Review Questions |
Multiple Choice |
Matching Questions |
Short Essay Questions |
Modulation Schemes |
Spectrum |
Amplitude Modulation |
Frequency Modulation |
Phase Modulation |
Pulse-Amplitude Modulation |
Pulse-Code Modulation |
Amplitude Shift Keying |
Adaptive Differential Pulse-Code Modulation |
Phase-Shift Keying |
Orthogonal Frequency-Division Multiplexing |
Quadrature Amplitude Modulation |
Multiple-Frequency Shift Keying |
Summary |
Review Questions |
Multiple Choice |
Matching Questions |
Short Essay Questions |
Signaling Formats, Multiplexing, and Digital Transmissions |
Digital Formats |
Multiplexing |
Frequency-Division Multiplexing |
Time-Division Multiplexing |
Digital Circuits |
Frequency-Hopping Spread Spectrum |
Direct-Sequence Spread Spectrum |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Legacy to Current-Day Telephone Networks |
Circuit Switching vs. Packet Switching |
Legacy of the Circuit-Switching Network |
Packet Switching |
Asynchronous Transfer Mode |
Legacy Public Switched Telephone Network |
The Telephone |
Network Access |
Trunks and Lines |
Customer Premise Equipment |
Voice Processing |
Voice over Internet Protocol |
VoIP Benefits |
VoIP Challenges |
Protocols Used in VoIP Environments |
Session Initiation Protocol |
Components of SIP |
Real-Time Transfer Protocol |
Multiprotocol Label Switching |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Basics of Multiprotocol Label Switching Networking |
Introduction |
What Is MPLS? |
Motivation behind MPLS |
Some Attractive Features of MPLS |
Principal Components of an MPLS Network |
Operation with Edge and Core Label-Switched Routers |
Labels and Label-Switched Routers |
Forwarding Packets with MPLS Labels |
Example of MPLS Label Swapping |
Label Switching |
Labels |
Labels and Label Edge Routers |
Labels and Shims |
Signaling and Label Distribution Protocols |
Network Topology Discovery |
Reservation Protocol |
Label Distribution Protocol |
Forwarding Equivalence Classes and LDP Paths |
Conclusion |
Review Questions |
True/False |
Multiple Choice |
Matching Questions |
Short Essay Questions |
Local Area Network Technology |
Business and Human Factors |
Costs of a LAN |
Initial Costs |
Ongoing Costs |
Technical Factors |
Working Parts of a LAN |
Common LAN Types |
Regulatory and Legal Factors |
Use and Function of Standards |
Process of Standardization |
Standard-Setting Bodies |
Legal Aspects |
Other Networks |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
The Language of the Internet: Transmission Control Protocol/Internet Protocol (TCP/IP) |
Business and Human Factors |
Technical Factors |
Message Casting |
Message Addressing |
Network Routing |
Language of the Network: Routed Protocols |
IPv6 |
Regulatory and Legal Factors |
Summary |
Review Questions |
Multiple Choice |
Short Essay Questions |
Wireless Local Area Networks |
Business and Human Factors |
Technical Factors |
Basics of Radio Frequency |
Wireless Protocols |
What Is a WLAN? |
Aspects to Consider |
Access Technology |
Frequency Range |
Antennas |
Range and Bandwidth |
Interference |
Security |
Wireless Metropolitan Area Networks |
Regulatory and Legal Factors |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Mobile Wireless Technologies |
Advanced Mobile Phone Service |
Multiple-Access Technologies |
Mobile Switching |
Fourth-Generation Wireless (4G) |
Fifth-Generation Wireless (5G) |
Time-Division Synchronous Code-Division Multiple Access |
Enhanced Data Rate for GSM Environment (EDGE) |
General Packet Radio Service (GPRS) |
High-Speed Downlink Packet Access |
Antennas |
Smart Antennas |
Microwave Signals |
Engineering Issues for Microwave Signaling |
Summary |
Review Questions |
Multiple Choice |
Matching Questions |
Short Essay Questions |
Virtualization |
Compute Virtualization |
Hypervisor |
Kernel Module |
Virtual Machine Monitor |
Virtualized Storage |
Virtual Machine-Based Storage Options |
Virtual Provisioning and Automated Storage Tiering |
Thin Pools and Thin Logical Units |
Virtualizing the Workstation |
Benefits of Desktop Virtualization |
Desktop Virtualization Techniques |
Virtualizing the Application |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Analyzing Big Data |
Introduction to Big Data |
The Structure of Big Data |
The Four Types of Data Structures |
Analyzing Big Data |
Analyzing the Four Data Types |
Analyzing Structured Data |
Analyzing Unstructured and Semistructured Data |
The Corpus or Body of Work |
Reviewing Results |
Summary |
Review Questions |
True/False |
Multiple Choice |
The Cloud and Cloud Computing |
Introduction |
The History of Cloud Computing |
What Is the Cloud? |
Virtualization |
Delivery Models for Cloud Computing |
Deployment Models for Cloud Computing |
Public Cloud Deployment |
Private Cloud Deployment |
Hybrid Cloud Deployment |
Community Cloud Deployment |
Risks of the Cloud |
Future Predictions |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Video Basics |
The Business and Human Factors |
High-Quality VC |
Medium-Quality VC |
Low-Quality VC |
The Technical Factors |
Image Scanning |
Color |
Transmission of Video |
High-Definition Television |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Digital Media |
Introduction |
Digital Media |
Convergence |
Digital Photography |
Advantages of the Digital Form over Analog Form |
Technical Differences between Digital and Analog Forms |
Printing |
Advanced Darkroom Technique |
New Opportunities |
Digital Video |
Digital Video: Genesis and Advantages over Analog Video |
Technical Differences between the Digital and Analog Forms |
New Opportunities |
Digital Audio |
Advantages over Analog Version |
Technical Differences between Digital and Analog Forms |
New Opportunities |
3-D Digital Gaming |
Advantages over the Analog Version |
Technical Differences between the Digital and Analog Forms |
New Opportunities |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |
Network Security and Management |
Introduction |
Network Security Threats |
Who Are the Bad Guys? |
Hackers |
Types of Network and Computer Attacks |
Social Engineering Attacks |
DOS Attacks |
Malware Attacks |
Sniffing |
The Payback of Security |
Customer Trust |
Mobility |
Increased Productivity |
Reduced Cost |
Basics of Security |
Authentication |
What You Know |
What You Have |
Who You Are |
Accounting |
Encryption |
Symmetric Key |
Asymmetric Key |
Access Control and Site Security |
Security Policy |
Network Security Tools and Techniques |
Network Security |
Depth in Design |
Firewalls |
Intrusion Detection Systems and Intrusion Prevention Systems |
Honey Pot |
Host Security |
OS Security |
Software Security |
Antivirus Programs |
Spam/Pop-Up and Cookie Blockers |
Network Administration and Management |
Key Aspects of Network Administration and Management |
Network Management Tools |
Client/Server Architecture |
Simple Network Management Protocol |
Case Study: Network Security and BYOD |
Summary |
Review Questions |
True/False |
Multiple Choice |
Short Essay Questions |