Home > Computing and Information Technology > Computer networking and communications > Business Data Communications and Networking
46%
Business Data Communications and Networking

Business Data Communications and Networking

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks. Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.

Table of Contents:
About the Authors v Preface vi Part One Introduction 1 Chapter 1 Introduction to Data Communications 1 1.1 Introduction 1 1.2 Data Communications Networks 5 1.2.1 Components of a Network 6 1.2.2 Types of Networks 7 1.3 Network Models 8 1.3.1 Open Systems Interconnection Reference Model 9 1.3.2 Internet Model 10 1.3.3 Message Transmission Using Layers 12 1.4 Network Standards 14 1.4.1 The Importance of Standards 14 1.4.2 The Standards-Making Process 15 1.4.3 Common Standards 17 1.5 Future Trends 18 1.5.1 Wireless LAN and BYOD 18 1.5.2 The Internet of Things 18 1.5.3 Massively Online 19 1.6 Implications for Cyber Security 20 Part Two Fundamental Concepts 27 Chapter 2 Application Layer 27 2.1 Introduction 27 2.2 Application Architectures 28 2.2.1 Host-Based Architectures 29 2.2.2 Client-Based Architectures 30 2.2.3 Client–Server Architectures 30 2.2.4 Cloud Computing Architectures 33 2.2.5 Peer-to-Peer Architectures 35 2.2.6 Choosing Architectures 36 2.3 World Wide Web 37 2.3.1 How the Web Works 37 2.3.2 Inside an HTTP Request 38 2.3.3 Inside an HTTP Response 39 2.4 Electronic Mail 41 2.4.1 How Email Works 41 2.4.2 Inside an SMTP Packet 44 2.4.3 Attachments in Multipurpose Internet Mail Extension 45 2.5 Other Applications 45 2.5.1 Telnet 46 2.5.2 Videoconferencing 47 2.6 Implications for Cyber Security 48 Chapter 3 Physical Layer 59 3.1 Introduction 59 3.2 Circuits 61 3.2.1 Circuit Configuration 61 3.2.2 Data Flow 62 3.2.3 Multiplexing 62 3.3 Communication Media 65 3.3.1 Twisted-Pair Cable 65 3.3.2 Coaxial Cable 65 3.3.3 Fiber-Optic Cable 66 3.3.4 Radio 67 3.3.5 Microwave 68 3.3.6 Satellite 68 3.3.7 Media Selection 70 3.4 Digital Transmission of Digital Data 71 3.4.1 Coding 71 3.4.2 Transmission Modes 72 3.4.3 Digital Transmission 73 3.4.4 How Ethernet Transmits Data 74 3.5 Analog Transmission of Digital Data 75 3.5.1 Modulation 75 3.5.2 Capacity of a Circuit 78 3.5.3 How Modems Transmit Data 78 3.6 Digital Transmission of Analog Data 79 3.6.1 Translating from Analog to Digital 79 3.6.2 How Telephones Transmit Voice Data 80 3.6.3 How Instant Messenger Transmits Voice Data 81 3.6.4 Voice over Internet Protocol (VoIP) 82 3.7 Implications for Cyber Security 83 Chapter 4 Data Link Layer 91 4.1 Introduction 91 4.2 Media Access Control 92 4.2.1 Contention 92 4.2.2 Controlled Access 92 4.2.3 Relative Performance 93 4.3 Error Control 94 4.3.1 Sources of Errors 94 4.3.2 Error Prevention 96 4.3.3 Error Detection 97 4.3.4 Error Correction via Retransmission 98 4.3.5 Forward Error Correction 98 4.3.6 Error Control in Practice 99 4.4 Data Link Protocols 100 4.4.1 Asynchronous Transmission 101 4.4.2 Synchronous Transmission 101 4.5 Transmission Efficiency 104 4.6 Implications for Cyber Security 106 Chapter 5 Network and Transport Layers 114 5.1 Introduction 114 5.2 Transport and Network Layer Protocols 116 5.2.1 Transmission Control Protocol (TCP) 116 5.2.2 Internet Protocol (IP) 117 5.3 Transport Layer Functions 118 5.3.1 Linking to the Application Layer 118 5.3.2 Segmenting 119 5.3.3 Session Management 120 5.4 Addressing 123 5.4.1 Assigning Addresses 124 5.4.2 Address Resolution 129 5.5 Routing 131 5.5.1 Types of Routing 132 5.5.2 Routing Protocols 134 5.5.3 Multicasting 136 5.5.4 The Anatomy of a Router 137 5.6 TCP/IP Example 138 5.6.1 Known Addresses 140 5.6.2 Unknown Addresses 141 5.6.3 TCP Connections 142 5.6.4 TCP/IP and Network Layers 143 5.7 Implications for Cyber Security 145 Part Three Network Technologies 162 Chapter 6 Network Design 162 6.1 Introduction 162 6.1.1 Network Architecture Components 163 6.1.2 The Traditional Network Design Process 164 6.1.3 The Building-Block Network Design Process 166 6.2 Needs Analysis 166 6.2.1 Network Architecture Component 168 6.2.2 Application Systems 169 6.2.3 Network Users 169 6.2.4 Categorizing Network Needs 170 6.2.5 Deliverables 171 6.3 Technology Design 171 6.3.1 Designing Clients and Servers 171 6.3.2 Designing Circuits 171 6.3.3 Network Design Tools 174 6.3.4 Deliverables 174 6.4 Cost Assessment 174 6.4.1 Request for Proposal 175 6.4.2 Selling the Proposal to Management 175 6.4.3 Deliverables 176 6.5 Implications for Cyber Security 176 Chapter 7 Wired and Wireless Local Area Networks 182 7.1 Introduction 182 7.2 LAN Components 183 7.2.1 Network Interface Cards 183 7.2.2 Network Circuits 184 7.2.3 Network Hubs, Switches, and Access Points 185 7.2.4 Network Operating Systems 188 7.3 Wired Ethernet 189 7.3.1 Topology 190 7.3.2 Media Access Control 192 7.3.3 Types of Ethernet 193 7.4 Wireless Ethernet 194 7.4.1 Topology 194 7.4.2 Media Access Control 194 7.4.3 Wireless Ethernet Frame Layout 196 7.4.4 Types of Wireless Ethernet 196 7.4.5 Security 198 7.5 The Best Practice LAN Design 199 7.5.1 Designing User Access with Wired Ethernet 200 7.5.2 Designing User Access with Wireless Ethernet 200 7.5.3 Designing the Data Center 203 7.5.4 Designing the e-Commerce Edge 206 7.5.5 Designing the SOHO Environment 206 7.6 Improving LAN Performance 207 7.6.1 Improving Server Performance 208 7.6.2 Improving Circuit Capacity 210 7.6.3 Reducing Network Demand 210 7.7 Implications for Cyber Security 210 Chapter 8 Backbone Networks 220 8.1 Introduction 220 8.2 Switched Backbones 221 8.3 Routed Backbones 224 8.4 Virtual LANs 227 8.4.1 Benefits of VLANs 227 8.4.2 How VLANs Work 229 8.5 The Best Practice Backbone Design 232 8.6 Improving Backbone Performance 233 8.6.1 Improving Device Performance 233 8.6.2 Improving Circuit Capacity 234 8.6.3 Reducing Network Demand 234 8.7 Implications for Cyber Security 234 Chapter 9 Wide Area Networks 243 9.1 Introduction 243 9.2 Dedicated-Circuit Networks 244 9.2.1 Basic Architecture 245 9.2.2 T-Carrier Services 248 9.2.3 SONET Services 249 9.3 Packet-Switched Networks 250 9.3.1 Basic Architecture 250 9.3.2 Frame Relay Services 251 9.3.3 MPLS Services 252 9.3.4 Ethernet Services 252 9.4 Virtual Private Networks 254 9.4.1 Basic Architecture 254 9.4.2 VPN Types 255 9.4.3 How VPNs Work 256 9.5 The Best Practice WAN Design 258 9.5.1 Software Defined WAN 258 9.5.2 Choosing WAN Circuits 259 9.6 Improving WAN Performance 261 9.6.1 Improving Device Performance 261 9.6.2 Improving Circuit Capacity 261 9.6.3 Reducing Network Demand 262 9.7 Implications for Cyber Security 262 Chapter 10 The Internet 274 10.1 Introduction 274 10.2 How the Internet Works 275 10.2.1 Basic Architecture 275 10.2.2 Connecting to an ISP 277 10.2.3 The Internet Today 278 10.3 Internet Access Technologies 279 10.3.1 Digital Subscriber Line 279 10.3.2 Cable Modem 280 10.3.3 Fiber to the Home 282 10.4 The Future of the Internet 283 10.4.1 Internet Governance 283 10.4.2 Building the Future 284 10.5 Implications for Cyber Security 285 Part Four Network Management 292 Chapter 11 Network Security 292 11.1 Introduction 292 11.1.1 Why Networks Need Security 294 11.1.2 Types of Security Threats 294 11.1.3 Network Controls 295 11.2 Risk Assessment 296 11.2.1 Develop Risk Measurement Criteria 297 11.2.2 Inventory IT Assets 298 11.2.3 Identify Threats 299 11.2.4 Document Existing Controls 301 11.2.5 Identify Improvements 304 11.3 Ensuring Business Continuity 304 11.3.1 Virus Protection 304 11.3.2 Denial-of-Service Protection 305 11.3.3 Theft Protection 308 11.3.4 Device Failure Protection 309 11.3.5 Disaster Protection 310 11.4 Intrusion Prevention 313 11.4.1 Security Policy 314 11.4.2 Perimeter Security and Firewalls 314 11.4.3 Server and Client Protection 320 11.4.4 Encryption 323 11.4.5 User Authentication 329 11.4.6 Preventing Social Engineering 332 11.4.7 Intrusion Prevention Systems 333 11.4.8 Intrusion Recovery 335 11.5 Best Practice Recommendations 336 11.6 Implications for Your Cyber Security 338 Chapter 12 Network Management 352 12.1 Introduction 352 12.2 Designing for Network Performance 353 12.2.1 Managed Networks 353 12.2.2 Managing Network Traffic 357 12.2.3 Reducing Network Traffic 358 12.3 Configuration Management 361 12.3.1 Configuring the Network and Client Computers 361 12.3.2 Documenting the Configuration 362 12.4 Performance and Fault Management 364 12.4.1 Network Monitoring 364 12.4.2 Failure Control Function 366 12.4.3 Performance and Failure Statistics 368 12.4.4 Improving Performance 370 12.5 End User Support 371 12.5.1 Resolving Problems 371 12.5.2 Providing End User Training 372 12.6 Cost Management 373 12.6.1 Sources of Costs 373 12.6.2 Reducing Costs 375 12.7 Implications for Cyber Security 377 Appendices (Online) Glossary (Online) Index I-1


Best Sellers


Product Details
  • ISBN-13: 9781119702849
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 252 mm
  • No of Pages: 416
  • Spine Width: 15 mm
  • Width: 203 mm
  • ISBN-10: 1119702844
  • Publisher Date: 08 Apr 2021
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Weight: 771 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Business Data Communications and Networking
John Wiley & Sons Inc -
Business Data Communications and Networking
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Business Data Communications and Networking

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA