Title:
Business data communications
Personal Author:
Series:
McGraw-Hill Forouzan networking series
Publication Information:
New York, NY : McGraw-Hill Higher Education, 2003
ISBN:
9780072397024
9780071121941
Subject Term:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010141345 | HD30.37 F67 2003 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Designed for use in a data communications course for business majors. This book blends technical presentation of important networking concepts with many business applications. It includes pedagogy as a key component. It includes: PowerPoints, solutions, quizzes, animations of key concepts, and a testbank.
Table of Contents
Preface | p. xix |
Part I Data Communications Basics | |
Chapter 1 Introduction | p. 3 |
1.1 Data Communications | p. 3 |
Components | p. 4 |
1.2 Networks | p. 5 |
Distributed Processing | p. 5 |
Network Criteria | p. 6 |
Type of Networks | p. 7 |
1.3 Protocols and Standards | p. 10 |
Protocols | p. 10 |
Standards | p. 11 |
1.4 Standards Organizations | p. 12 |
Standards Creation Committees | p. 12 |
Forums | p. 12 |
Regulatory Agencies | p. 12 |
1.5 Network Models | p. 14 |
The OSI Model | p. 15 |
Presentation Layer | p. 16 |
The Internet Model | p. 22 |
1.6 Key Terms | p. 25 |
1.7 Summary | p. 25 |
Practice Set | p. 26 |
Chapter 2 Application Layer | p. 31 |
2.1 Introduction | p. 31 |
2.2 Client-Server Paradigm | p. 32 |
Client | p. 34 |
Server | p. 34 |
2.3 Addressing | p. 34 |
2.4 Electronic Mail | p. 35 |
Email and Snail Mail | p. 35 |
Components | p. 36 |
Mail Delivery | p. 37 |
Mail Access Protocols | p. 38 |
Addresses | p. 39 |
Multipurpose Internet Mail Extension (MIME) | p. 40 |
2.5 File Transfer | p. 41 |
File Transfer Protocol (FTP) | p. 42 |
Trivial File Transfer Protocol (TFTP) | p. 43 |
2.6 General-Purpose Application: Telnet | p. 43 |
2.7 World Wide Web (WWW) | p. 45 |
Hypertext and Hypermedia | p. 45 |
Components of WWW | p. 47 |
Hypertext Transfer Protocol (HTTP) | p. 47 |
Addresses | p. 48 |
2.8 Videoconferencing | p. 50 |
Compression | p. 51 |
2.9 Group Discussion: Listserv | p. 51 |
Subscribing | p. 52 |
Sending Email | p. 52 |
Unsubscribing | p. 52 |
Business Application | p. 53 |
2.10 Chatting | p. 53 |
2.11 Key Terms | p. 54 |
2.12 Summary | p. 54 |
Practice Set | p. 55 |
Chapter 3 Transport Layer | p. 59 |
3.1 Application-to-Application Delivery | p. 59 |
3.2 Duties | p. 60 |
Packetizing | p. 60 |
Creating Connection | p. 61 |
Addressing | p. 63 |
Reliability | p. 66 |
3.3 Internet Protocols | p. 69 |
User Datagram Protocol (UDP) | p. 70 |
Transmission Control Protocol (TCP) | p. 71 |
3.4 Key Terms | p. 73 |
3.5 Summary | p. 74 |
Practice Set | p. 74 |
Chapter 4 Network Layer | p. 77 |
4.1 Introduction | p. 77 |
4.2 Addressing | p. 78 |
Address Hierarchy | p. 79 |
Address Resolution | p. 81 |
An Example | p. 83 |
4.3 Routing | p. 84 |
Which Route? | p. 85 |
How to Route? | p. 86 |
Routing Tables | p. 87 |
Size of Routing Table | p. 88 |
Static Versus Dynamic Routing | p. 89 |
Routing Protocols | p. 90 |
4.4 Packetizing: IP Protocol | p. 91 |
IP Protocol | p. 91 |
Datagram | p. 92 |
4.5 Fragmenting | p. 93 |
4.6 Key Terms | p. 95 |
4.7 Summary | p. 95 |
Practice Set | p. 95 |
Chapter 5 Data Link Layer | p. 99 |
5.1 Duties of the Data Link Layer | p. 99 |
5.2 Hop-to-Hop Delivery | p. 100 |
5.3 Packetizing | p. 101 |
5.4 Addressing | p. 101 |
Address Resolution | p. 102 |
5.5 Error Control | p. 103 |
Source of Errors | p. 103 |
Types of Errors | p. 105 |
Error Prevention | p. 105 |
Error Detection | p. 106 |
Error Correction | p. 109 |
5.6 Flow Control | p. 111 |
5.7 Medium Access Control | p. 112 |
Controlled Access | p. 112 |
Random Access | p. 115 |
5.8 Data Link Protocols | p. 116 |
Asynchronous Protocols | p. 117 |
Synchronous Protocols | p. 117 |
5.9 Key Terms | p. 119 |
5.10 Summary | p. 119 |
Practice Set | p. 120 |
Chapter 6 Physical Layer | p. 125 |
6.1 Digital and Analog | p. 125 |
Digital and Analog Data | p. 126 |
Digital and Analog Signals | p. 127 |
Complex Signal | p. 131 |
Bandwidth | p. 132 |
Digital Signal as a Complex Signal | p. 132 |
6.2 Transforming Data to Signals | p. 133 |
Digital Encoding: Digital-to-Digital Conversion | p. 134 |
Modulation of Digital Data: Digital-to-Analog Conversion | p. 136 |
Sampling Analog Data: Analog-to-Digital Conversion | p. 140 |
6.3 Transmission Modes | p. 142 |
6.4 Line Configuration | p. 146 |
Point-to-Point | p. 146 |
Multipoint | p. 147 |
6.5 Duplexity | p. 147 |
Half-Duplex | p. 147 |
Full-Duplex | p. 148 |
6.6 Multiplexing: Sharing the Media | p. 148 |
Channel versus Link | p. 148 |
Frequency-Division Multiplexing (FDM) | p. 149 |
Wave-Division Multiplexing (WDM) | p. 151 |
Time-Division Multiplexing (TDM) | p. 152 |
Inverse Multiplexing | p. 154 |
6.7 Key Terms | p. 156 |
6.8 Summary | p. 157 |
Practice Set | p. 158 |
Chapter 7 Transmission Media | p. 163 |
7.1 Guided Media | p. 163 |
Twisted-Pair Cable | p. 164 |
Coaxial Cable | p. 166 |
Optical Fiber | p. 167 |
Unguided Media | p. 170 |
Terrestrial Microwave | p. 170 |
Media Comparison | p. 173 |
7.2 Key Terms | p. 175 |
7.3 Summary | p. 175 |
Practice Set | p. 176 |
Chapter 8 Telephone and Cable TV Networks: Residential Connection to the Internet | p. 179 |
8.1 Telephone System | p. 179 |
Major Components | p. 180 |
LATAs | p. 181 |
Making a Connection | p. 182 |
8.2 Internet Access Via Telephone | p. 185 |
Conventional Modems | p. 186 |
56K Modems (V.90) | p. 188 |
DSL Modems | p. 189 |
8.3 Cable TV Network | p. 190 |
Internet Access via Cable TV | p. 191 |
Sharing | p. 192 |
8.4 Key Terms | p. 194 |
8.5 Summary | p. 194 |
Practice Set | p. 194 |
Part II LAN and WAN Technology | |
Chapter 9 Local Area Networks Part 1: Basic Concepts and Wired Ethernet LANs | p. 199 |
9.1 Basic Concepts | p. 199 |
LAN Components | p. 200 |
LAN Models | p. 200 |
LAN Applications | p. 203 |
Topology | p. 204 |
Project 802 | p. 206 |
9.2 Wired Ethernet Lans | p. 208 |
Traditional Ethernet | p. 208 |
Switched Ethernet | p. 211 |
Fast Ethernet | p. 212 |
Gigabit Ethernet | p. 214 |
9.3 Key Terms | p. 216 |
9.4 Summary | p. 217 |
Practice Set | p. 217 |
Chapter 10 Local Area Networks Part 2: Wireless and Virtual LANs | p. 221 |
10.1 Wireless Lans | p. 221 |
Wireless Transmission | p. 222 |
10.2 IEEE 802.11: RF Lans | p. 223 |
Architecture | p. 223 |
Station Types | p. 225 |
Access Method | p. 225 |
Implementation | p. 226 |
10.3 IEEE 802.11: Infrared Lans | p. 227 |
Point-to-Point | p. 227 |
Diffused | p. 227 |
10.4 IEEE 802.15 Lans: Bluetooth Lans | p. 228 |
Applications | p. 228 |
Architecture | p. 228 |
Bluetooth Devices | p. 230 |
10.5 Virtual Lans | p. 230 |
Membership | p. 232 |
Configuration | p. 233 |
Communication Between Switches | p. 233 |
IEEE Standard | p. 234 |
Advantages | p. 234 |
10.6 Key Terms | p. 235 |
10.7 Summary | p. 236 |
Practice Set | p. 236 |
Chapter 11 Wide Area Networks | p. 241 |
11.1 Point-to-Point WANs | p. 241 |
T Lines | p. 242 |
Sonet | p. 243 |
11.2 Switched WANs | p. 244 |
X.25 | p. 245 |
Frame Relay | p. 245 |
ATM | p. 247 |
11.3 ATM LANs | p. 251 |
ATM LAN Architecture | p. 251 |
11.4 Key Terms | p. 254 |
11.5 Summary | p. 255 |
Practice Set | p. 256 |
Part III Internetworking and Internet | |
Chapter 12 Connecting LANs and WANs: Making Backbone Networks | p. 261 |
12.1 Connecting Devices | p. 261 |
Repeaters | p. 262 |
Bridges | p. 264 |
Routers | p. 265 |
Switches | p. 267 |
12.2 Backbone Networks | p. 268 |
Logical Bus Backbone | p. 268 |
Logical Star Backbone | p. 270 |
12.3 Key Terms | p. 272 |
12.4 Summary | p. 273 |
Practice Set | p. 273 |
Chapter 13 The Internet | p. 277 |
13.1 History and Administration | p. 277 |
Arpanet | p. 278 |
Birth of the Internet | p. 278 |
Transmission Control Protocol/Internetworking Protocol (TCP/IP) | p. 278 |
The Internet Today | p. 279 |
Growth of the Internet | p. 281 |
Internet Standards | p. 282 |
Internet Administration | p. 283 |
13.2 TCP/IP Protocol Suite | p. 284 |
Network Layer | p. 285 |
Transport Layer | p. 289 |
Application Layer | p. 292 |
13.3 Next Generation | p. 292 |
13.4 Access to the Internet | p. 293 |
Residential Access | p. 293 |
Organizational Access | p. 293 |
13.5 Private Networks: Intranet and Extranet | p. 293 |
Intranet | p. 293 |
Extranet | p. 294 |
13.6 Key Terms | p. 295 |
13.7 Summary | p. 296 |
Practice Set | p. 297 |
Part IV Security and Management | |
Chapter 14 Network Security: Firewalls and VPNs | p. 303 |
14.1 Introduction | p. 304 |
Privacy | p. 304 |
Authentication | p. 304 |
Integrity | p. 305 |
Nonrepudiation | p. 305 |
14.2 Privacy | p. 305 |
Secret-Key Encryption/Decryption | p. 305 |
Public-Key Encryption | p. 306 |
14.3 Digital Signature | p. 307 |
Signing the Whole Document | p. 307 |
Signing the Digest | p. 308 |
14.4 Security in the Internet | p. 310 |
Application Layer Security | p. 310 |
Transport Layer Security | p. 310 |
Security at the IP Layer | p. 311 |
14.5 Firewalls | p. 311 |
Packet-Filter Firewall | p. 312 |
Proxy Firewall | p. 312 |
14.6 Virtual Private Networks (VPN) | p. 312 |
Achieving Privacy | p. 312 |
VPN Technology | p. 314 |
14.7 Access Control | p. 315 |
Passwords | p. 315 |
Tokens | p. 315 |
Biometrics | p. 315 |
14.8 Key Terms | p. 316 |
14.9 Summary | p. 317 |
Practice Set | p. 317 |
Chapter 15 Network Analysis, Design, and Implementation | p. 321 |
15.1 Network Development Life Cycle | p. 321 |
15.2 Analysis Phase | p. 323 |
Baselining | p. 323 |
Needs Analysis | p. 324 |
15.3 Design Phase | p. 327 |
Upper-Layer Protocols | p. 327 |
Lower-Layer Protocols | p. 327 |
Hardware | p. 328 |
Global Connection | p. 328 |
15.4 Implementation Phase | p. 328 |
Purchasing | p. 329 |
Installation | p. 329 |
User Training | p. 329 |
Testing | p. 329 |
Documentation | p. 329 |
15.5 Key Terms | p. 330 |
15.6 Summary | p. 330 |
Practice Set | p. 331 |
Chapter 16 Network Management | p. 333 |
16.1 Configuration Management | p. 334 |
Reconfiguration | p. 334 |
Documentation | p. 335 |
16.2 Fault Management | p. 336 |
Reactive Fault Management | p. 336 |
Proactive Fault Management | p. 337 |
16.3 Performance Management | p. 337 |
Capacity | p. 337 |
Traffic | p. 338 |
Throughput | p. 338 |
Response Time | p. 338 |
16.4 Accounting Management | p. 339 |
16.5 Security Management | p. 339 |
16.6 Network Management Tools | p. 339 |
Software Tools | p. 339 |
Hardware Tools | p. 341 |
16.7 Key Terms | p. 342 |
16.8 Summary | p. 343 |
Practice Set | p. 343 |
Appendix A ASCII Code | p. 347 |
Appendix B Numbering Systems and Transformation | p. 351 |
B.1 Numbering Systems | p. 351 |
Decimal Numbers | p. 351 |
Binary Numbers | p. 352 |
Octal Numbers | p. 353 |
Hexadecimal Numbers | p. 354 |
B.2 Transformation | p. 355 |
From Other Systems to Decimal | p. 356 |
From Decimal to Other Systems | p. 356 |
From Binary to Octal or Hexadecimal | p. 357 |
From Octal or Hexadecimal to Binary | p. 358 |
Appendix C Contact Addresses | p. 359 |
ATM Forum | p. 359 |
Federal Communications Commission (FCC) | p. 359 |
Institute of Electrical and Electronics Engineers (IEEE) | p. 359 |
International Organization for Standardization (ISO) | p. 359 |
International Telecommunication Union (ITU) | p. 360 |
Internet Architecture Board (IAB) | p. 360 |
Internet Corporation for Assigned Names and Numbers (ICANN) | p. 360 |
Internet Engineering Steering Group (IESG) | p. 360 |
Internet Engineering Task Force (IETF) | p. 360 |
Internet Research Task Force (IRTF) | p. 360 |
Internet Society (ISOC) | p. 360 |
Glossary | p. 361 |
Index | p. 383 |