Description
Business Data Communications and Networking 14th Edition by Jerry FitzGerald, ISBN-13: 978-1119702849
[PDF eBook eTextbook]
- Publisher: Wiley; 14th edition (December 3, 2020)
- Language: English
- ISBN-10: 1119702844
- ISBN-13: 978-1119702849
Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks.
Table of Contents:
COVER
TITLE PAGE
COPYRIGHT
DEDICATION
ABOUT THE AUTHORS
PREFACE
PURPOSE OF THIS BOOK
WHAT’S NEW IN THIS EDITION
LAB EXERCISES
ONLINE SUPPLEMENTS FOR INSTRUCTORS
E-BOOK
ACKNOWLEDGMENTS
PART ONE: INTRODUCTION
CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS
1.1 INTRODUCTION
1.2 DATA COMMUNICATIONS NETWORKS
1.3 NETWORK MODELS
1.4 NETWORK STANDARDS
1.5 FUTURE TRENDS
1.6 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 1A
HANDS-ON ACTIVITY 1B
PART TWO: FUNDAMENTAL CONCEPTS
CHAPTER 2: APPLICATION LAYER
2.1 INTRODUCTION
2.2 APPLICATION ARCHITECTURES
2.3 WORLD WIDE WEB
2.4 ELECTRONIC MAIL
2.5 OTHER APPLICATIONS
2.6 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 2A
HANDS-ON ACTIVITY 2B
CHAPTER 3: PHYSICAL LAYER
3.1 INTRODUCTION
3.2 CIRCUITS
3.3 COMMUNICATION MEDIA
3.4 DIGITAL TRANSMISSION OF DIGITAL DATA
3.5 ANALOG TRANSMISSION OF DIGITAL DATA
3.6 DIGITAL TRANSMISSION OF ANALOG DATA
3.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 3A
HANDS-ON ACTIVITY 3B
HANDS-ON ACTIVITY 3C
CHAPTER 4: DATA LINK LAYER
4.1 INTRODUCTION
4.2 MEDIA ACCESS CONTROL
4.3 ERROR CONTROL
4.4 DATA LINK PROTOCOLS
4.5 TRANSMISSION EFFICIENCY
4.6 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 4A
CHAPTER 5: NETWORK AND TRANSPORT LAYERS
5.1 INTRODUCTION
5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS
5.3 TRANSPORT LAYER FUNCTIONS
5.4 ADDRESSING
5.5 ROUTING
5.6 TCP/IP EXAMPLE
5.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 5A
HANDS-ON ACTIVITY 5B
HANDS-ON ACTIVITY 5C
HANDS-ON ACTIVITY 5D
HANDS-ON ACTIVITY 5E
HANDS-ON ACTIVITY 5F
PART THREE: NETWORK TECHNOLOGIES
CHAPTER 6: NETWORK DESIGN
6.1 INTRODUCTION
6.2 NEEDS ANALYSIS
6.3 TECHNOLOGY DESIGN
6.4 COST ASSESSMENT
6.5 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 6A
CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS
7.1 INTRODUCTION
7.2 LAN COMPONENTS
7.3 WIRED ETHERNET
7.4 WIRELESS ETHERNET
7.5 THE BEST PRACTICE LAN DESIGN
7.6 IMPROVING LAN PERFORMANCE
7.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 7A
HANDS-ON ACTIVITY 7B
HANDS-ON ACTIVITY 7C
CHAPTER 8: BACKBONE NETWORKS
8.1 INTRODUCTION
8.2 SWITCHED BACKBONES
8.3 ROUTED BACKBONES
8.4 VIRTUAL LANS
8.5 THE BEST PRACTICE BACKBONE DESIGN
8.6 IMPROVING BACKBONE PERFORMANCE
8.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 8A
HANDS-ON ACTIVITY 8B
CHAPTER 9: WIDE AREA NETWORKS
9.1 INTRODUCTION
9.2 DEDICATED-CIRCUIT NETWORKS
9.3 PACKET-SWITCHED NETWORKS
9.4 VIRTUAL PRIVATE NETWORKS
9.5 THE BEST PRACTICE WAN DESIGN
9.6 IMPROVING WAN PERFORMANCE
9.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 9A
HANDS-ON ACTIVITY 9B
HANDS-ON ACTIVITY 9C
HANDS-ON ACTIVITY 9D
CHAPTER 10: THE INTERNET
10.1 INTRODUCTION
10.2 HOW THE INTERNET WORKS
10.3 INTERNET ACCESS TECHNOLOGIES
10.4 THE FUTURE OF THE INTERNET
10.5 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 10A
HANDS-ON ACTIVITY 10B
HANDS-ON ACTIVITY 10C
PART FOUR: NETWORK MANAGEMENT
CHAPTER 11: NETWORK SECURITY
11.1 INTRODUCTION
11.2 RISK ASSESSMENT
11.3 ENSURING BUSINESS CONTINUITY
11.4 INTRUSION PREVENTION
11.5 BEST PRACTICE RECOMMENDATIONS
11.6 IMPLICATIONS FOR YOUR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 11A
HANDS-ON ACTIVITY 11B
HANDS-ON ACTIVITY 11C
HANDS-ON ACTIVITY 11D
CHAPTER 12: NETWORK MANAGEMENT
12.1 INTRODUCTION
12.2 DESIGNING FOR NETWORK PERFORMANCE
12.3 CONFIGURATION MANAGEMENT
12.4 PERFORMANCE AND FAULT MANAGEMENT
12.5 END USER SUPPORT
12.6 COST MANAGEMENT
12.7 IMPLICATIONS FOR CYBER SECURITY
SUMMARY
KEY TERMS
QUESTIONS
EXERCISES
MINICASES
TECH UPDATES
HANDS-ON ACTIVITY 12A
HANDS-ON ACTIVITY 12B
HANDS-ON ACTIVITY 12C
INDEX
Alan Dennis is a Fellow of the Association for Information Systems and a professor of information systems in the Kelley School of Business at Indiana University. He holds the John T. Chambers Chair in Internet Systems, which was established to honor John Chambers, president and chief executive officer of Cisco Systems, the worldwide leader of networking technologies for the Internet.
Alexandra Durcikova is an Associate Professor at the Price College of Business, University of Oklahoma. Alexandra has a PhD in management information systems from the University of Pittsburgh. She has earned an MSc degree in solid state physics from Comenius University, Bratislava, worked as an experimental physics researcher in the area of superconductivity and as an instructor of executive MBA students prior to pursuing her PhD. Alexandra’s research interests include knowledge management and knowledge management systems, the role of organizational climate in the use of knowledge management systems, knowledge management system characteristics, governance mechanisms in the use of knowledge management systems, and human compliance with security policy and characteristics of successful phishing attempts within the area of network security. Her research appears in Information Systems Research, MIS Quarterly, Journal of Management Information Systems, Information Systems Journal, Journal of Organizational and End User Computing, International Journal of Human-Computer Studies, International Journal of Human-Computer Studies, and Communications of the ACM.
Dr. Jerry FitzGerald wrote the early editions of this book in the 1980s. At the time, he was the principal in Jerry FitzGerald & Associates, a firm he started in 1977.
What makes us different?
• Instant Download
• Always Competitive Pricing
• 100% Privacy
• FREE Sample Available
• 24-7 LIVE Customer Support