Chapter 1 - Introduction. This chapter addresses four issues: data communications, networks, protocols and standards, and standards organizations. First, we give a broad definition of data communications. We then define networks as a highway on which data can travel. We also discuss different types of protocols and the difference between protocols and standards. Then, we give a brief review of the standards organizations that we refer to throughout the book. Finally, we discuss network models.
Chapter 5 - Data link layer. After reading this chapter, the reader should be able to: Understand the functions of the data link layer, understand the concept of hop-to-hop delivery compared to host-to-host delivery and application-to-application delivery, understand the concept of access method and define different access methods used in LANs and WANs.
Chapter 6 - Physical layer. In this chapter, we study the duties of the physical layer, first as a converter that converts data to signals, then as a manager that controls the medium. After reading this chapter, the reader should be able to: Distinguish between analog and digital data, distinguish between analog and digital signals, understand the concept of bandwidth and the relationship between bandwidth and data transmission speed,...
Chapter 9 - Local area networks part I: Basic concepts and Wired Ethernet LANs. In this chapter, we discuss how the first two layers of the OSI model (physical and data link) are used to implement local area networks (LANs). In this chapter, we discuss the basics of LANs and Ethernet, the dominant LAN technology.
Doing Business 2011 : Making a Difference for Entrepreneurs is the eighth in a series of annual reports investigating
regulations that enhance business activity and those that constrain it. Doing Business presents quantitative indicators
on business regulations and the protection of property rights that can be compared across 183 economies, from
Afghanistan to Zimbabwe, over time.
This module focuses on data exchange formats and how to exchange data
between diverse systems. The module covers Extensible Markup Language
(XML) and explains it as the most ideal and universal format for exchanging
business data. The module also goes into details about how XML, as an
industry standard, is supported by Microsoft. Specific products covered here are
Microsoft® SQL Server™ 2000 and Microsoft BizTalk™ Server 2000.
A step-by-step guide to backing up your business data using Microsoft Data Protection Manager 2010 in this practical book. Discover how to back up and restore Microsoft applications that are critical in many of today's businesses. Understand the various components and features of Data Protection Manager 2010. Gain valuable insight into using Data Protection Manager through the author's real world experience.
The lecture "Applied statistics for business" provides students with the knowledge: Introduction to the Course, Course Materials, requirements for Students, Main Contents. Invite you to refer to the disclosures.
Lectures "Applied statistics for business - Chapter 1: Data and statistics" provides students with the knowledge: Applications in business and economics, data, data sources, descriptive Statistics, statistical Inference, computer and statistical analysis, data mining, ethical guidelines for statistical practice. Invite you to refer to the disclosures.
Chapter 2 - Application layer. his chapter explores the different application programs, or services, available at the topmost layer, layer five, of the Internet model. In this chapter, we introduce the application layer and its relationships to the other layers. We discuss the client-server paradigm, the only one used today in the Internet. We also discuss addressing, a feature inseparable from the application layer.
Chapter 3 - Transport layer. After reading this chapter, the reader should be able to: Understand the position of the transport layer in the internet model; understand the rationale for the existence of the transport layer; understand the concept of application-to-application delivery; understand the duties of the transport layer: packetizing, addressing, connection creation, and reliable delivery.
Chapter 4 - Network layer. After reading this chapter, the reader should be able to: Understand the position of the network layer in the Internet model, understand the rationale for the existence of the network layer, understand the concept of host-to-host delivery,...
Chapter 7 - Transmission media. In this chapter we discuss different kinds of transmission media, their use, and their advantages and disadvantages. After reading this chapter, the reader should: Understand the difference between guided and unguided media, be familiar with twisted-pair cable and the rationale for twisting, be familiar with shielded twisted-pair cable and the rationale for shielding, be familiar with coaxial cable, understand how the air (or vacuum) can be a transmission medium for signals.
Chapter 8 - Telephone and cable TV networks: Residential connection to the internet. After reading this chapter, the reader should: Understand the structure of the telephone network, understand the services provided by the telephone network and how these services allow us to connect to the Internet, understand the structure of the cable TV network, understand the services provided by the cable TV network and how these services allow us to connect to the Internet.
Chapter 10 - Local area networks part 2: Wireless and Virtual LANs. After reading this chapter, the reader should be able to: Understand the different transmission techniques used in wireless LANs, understand the main characteristics of IEEE 802.11 wireless LANs, understand the applications of IEEE 802.11, understand the characteristics of 802.15 LANs and the Bluetooth technology that implements this standard.
Chapter 11 - Wide area networks. In this chapter, we first discuss point-to-point WANs, WANs that do not use switches. Then we discuss switched WANs. We focus especially on ATM, the dominant WAN technology. Finally, we discuss ATM LANs, LANs that use ATM WAN technology.
Chapter 12 - Connecting LANs and WANs: Making backbone networks. In this chapter, we discuss devices that connect LANs and WANs and devices used for connection within a network. Backbone networks, networks that connect other networks, are also a topic of this chapter.
Chapter 13 - The internet. In this chapter we first give a brief history of the Internet. We formally introduce the TCP/IP protocol suite (Internet model) that we used as a networking model throughout the book. We then discuss briefly the next generation protocol. Access to the Internet, both residential and organizational, is also discussed. Finally we introduce private networks, intranets, and extranets.
Chapter 14 - Network security: Firewalls and VPNs. In this chapter, we look at four issues of security: privacy, authentication, integrity, and nonrepudiation. We show how the first can be achieved through secret-key or private-key encryption. We discuss a concept called digital signature that satisfies the three other conditions. We talk about how security is implemented in the Internet.
Chapter 15 - Network analysis, design, and implementation. In this chapter, we discuss the network development life cycle (NDLC) which consists of three phases: analysis, design, and implementation. We first discuss the cycle itself. We then discuss the steps in the analysis phase, the steps in the design phase, and finally the steps in the implementation phase.