- Shopping Bag ( 0 items )
* Provides frameworks and methodology for solving problems as technology continues to advance
* Starts with the overall business problem, and then shows how technology can solve the problem
* Provides an in-depth applied understanding of the technology covered and is targeted to the IT employees who actually build the networks
* Business-oriented, problem-solving approach, including real business case studies stressing the business impact of data communications
This undergraduate text in data communications approaches problem solving with a practical, business perspective. With case studies and process modeling, the author introduces data/voice communication concepts, issues and technologies. He then focuses on three major networking areas: LANs, enterprise networking and network administration. In a top down approach, he first introduces concepts and then details hardware, architectures, operating systems, technologies and applications. Chapters include 'Managerial Perspective' sections that use a "bottom-line" approach to network analysis and design. This is especially valid within the context of network administration and the network development live cycle. The associated Web site contains additional information, references and links. An instructor's resource guide is also available.
PART 1: DATA COMMUNICATION FUNDAMENTALS.
Chapter 1. The Data Communications Industry.
Chapter 2. Data Communications Concepts.
Chapter 3. Basic Data Communication Technology.
PART 2: NETWORK TRANSMISSION TECHNOLOGIES.
Chapter 4. Local Area Networks.
Chapter 5. Voice Communication Concepts and Technology.
Chapter 6. Wide Area Networking Concepts, Architectures, and Services.
PART 3: NETWORK PROTOCOLS AND ADMINISTRATION.
Chapter 7. Local Area Network Communications Protocols.
Chapter 8. Advanced TCP/IP Network Design.
Chapter 9. Local Area Network Operating Systems and Remote Access.
PART 4: NETWORK DEVELOPMENT AND MANAGEMENT.
Chapter 10. The Network Development Life Cycle.
Chapter 11. Network Management.
Chapter 12. Network Security.