<p><strong>Preface <br></strong> <strong>About the Author</strong><br> <strong>Chapter 0 Guide for Readers and Instructors</strong><br> 0.1 Outline of the Book<br> 0.2 A Roadmap for Readers and Instructors<br> 0.3 Internet and Web Resources<br> 0.4 Standards</p> <p><strong>UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING</strong></p> <p><strong>PART ONE OVERVIEW</strong></p> <p><strong>Chapter 1 Data Communications, Data Networks, and the Internet</strong><br> 1.1 Data Communications and Networking for Today's Enterprise<br> 1.2 A Communications Model<br> 1.3 Data Communications<br> 1.4 Networks<br> 1.5 The Internet<br> 1.6 An Example Configuration</p> <p><strong>Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications</strong><br> 2.1 The Need for a Protocol Architecture<br> 2.2 A Simple Protocol Architecture<br> 2.3 The TCP/IP Protocol Architecture<br> 2.4 Standardization within a Protocol Architecture<br> 2.5 Traditional Internet-Based Applications<br> 2.6 Multimedia<br> 2.7 Sockets Programming<br> 2.7 Recommended Reading<br> 2.8 Key Terms, Review Questions, and Problems<br> Appendix 2A The Trivial File Transfer Protocol</p> <p><strong>PART TWO DATA COMMUNICATIONS</strong></p> <p><strong>Chapter 3 Data Transmission</strong><br> 3.1 Concepts and Terminology<br> 3.2 Analog and Digital Data Transmission<br> 3.3 Transmission Impairments<br> 3.4 Channel Capacity<br> 3.5 Recommended Reading<br> 3.6 Key Terms, Review Questions, and Problems<br> Appendix 3A Decibels and Signal Strength</p> <p><strong>Chapter 4 Transmission Media</strong><br> 4.1 Guided Transmission Media<br> 4.2 Wireless Transmission<br> 4.3 Wireless Propagation<br> 4.4 Line-of-Sight Transmission<br> 4.5 Recommended Reading<br> 4.6 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 5 Signal Encoding Techniques</strong><br> 5.1 Digital Data, Digital Signals<br> 5.2 Digital Data, Analog Signals<br> 5.3 Analog Data, Digital Signals<br> 5.4 Recommended Reading<br> 5.5 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 6 Error Detection and Correction</strong><br> 6.1 Types of Errors<br> 6.2 Error Detection<br> 6.3 Parity Check<br> 6.4 The Internet Checksum<br> 6.5 Cyclic Redundancy Check (CRC)<br> 6.6 Forward Error Correction<br> 6.7 Recommended Reading<br> 6.8 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 7 Data Link Control Protocols</strong><br> 7.1 Flow Control<br> 7.2 Error Control<br> 7.3 High-Level Data Link Control (HDLC)<br> 7.4 Recommended Reading<br> 7.5 Key Terms, Review Questions, and Problems<br> Appendix 7A Performance Issues</p> <p><strong>Chapter 8 Multiplexing</strong><br> 8.1 Frequency-Division Multiplexing<br> 8.2 Synchronous Time-Division Multiplexing<br> 8.3 Cable Modems<br> 8.4 Asymmetric Digital Subscriber Line<br> 8.5 xDSL<br> 8.6 Multiple Channel Access<br> 8.7 Recommended Reading<br> 8.8 Key Terms, Review Questions, and Problems</p> <p><strong>PART THREE WIDE AREA NETWORKS</strong></p> <p><strong>Chapter 9 WAN Technology and Protocols</strong><br> 9.1 Switched Communications Networks<br> 9.2 Circuit Switching Networks<br> 9.3 Circuit Switching Concepts<br> 9.4 Softswitch Architecture<br> 9.5 Packet-Switching Principles<br> 9.6 Asynchronous Transfer Mode<br> 9.7 Recommended Reading<br> 9.8 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 10 Cellular Wireless Networks</strong><br> 10.1 Principles of Cellular Networks<br> 10.2 Cellular Network Generations<br> 10.3 LTE-Advanced<br> 10.4 Recommended Reading<br> 10.5 Key Terms, Review Questions, and Problems</p> <p><strong>PART FOUR LOCAL AREA NETWORKS</strong></p> <p><strong>Chapter 11 Local Area Network Overview</strong><br> 11.1 Bus and Tree Topologies<br> 11.2 LAN Protocol Architecture<br> 11.3 Bridges<br> 11.4 Hubs and Switches<br> 11.5 Virtual LANs<br> 11.6 Recommended Reading<br> 11.7 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 12 Ethernet</strong><br> 12.1 Traditional Ethernet<br> 12.2 High-Speed Ethernet<br> 12.3 IEEE 802.1Q VLAN Standard<br> 12.4 Recommended Reading<br> 12.5 Key Terms, Review Questions, and Problems<br> Appendix 12A Digital Signal Encoding for LANs<br> Appendix 12B Scrambling</p> <p><strong>Chapter 13 Wireless LANs</strong><br> 13.1 Overview<br> 13.2 IEEE 802.11 Architecture and Services<br> 13.3 IEEE 802.11 Medium Access Control<br> 13.4 IEEE 802.11Physical Layer<br> 13.5 Gigabit Wi-Fi<br> 13.6 IEEE 802.11 Security Considerations<br> 13.7 Recommended Reading<br> 13.8 Key Terms, Review Questions, and Problems</p> <p><strong>PART FIVE INTERNET AND TRANSPORT LAYERS</strong></p> <p><strong>Chapter 14 The Internet Protocol</strong><br> 14.1 Principles of Internetworking<br> 14.2 Internet Protocol Operation<br> 14.3 Internet Protocol<br> 14.4 IPv6<br> 14.5 Virtual Private Networks and IP Security<br> 14.6 Recommended Reading<br> 14.7 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 15 Transport Protocols</strong><br> 15.1 Connection-Oriented Transport Protocol Mechanisms<br> 15.2 TCP<br> 15.3 UDP<br> 15.4 Recommended Reading<br> 15.5 Key Terms, Review Questions, and Problems</p> <p><strong>UNIT TWO ADVANCED TOPICS IN DATA COMMUNICATIONS AND NETWORKING</strong></p> <p><strong>PART SIX DATA COMMUNICATIONS AND WIRELESS NETWORKS</strong></p> <p><strong>Chapter 16 Advanced Data Communications Topics</strong><br> 16.1 Analog Data, Analog Signals<br> 16.2 Forward Error Correction Codes<br> 16.3 ARQ Performance Issues<br> 16.4 Recommended Reading<br> 16.5 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 17 Wireless Transmission Techniques</strong><br> 17.1 MIMO Antennas<br> 17.2 OFDM, OFDMA, and SC-FDMA<br> 17.3 Spread Spectrum<br> 17.4 Direct Sequence Spread Spectrum<br> 17.5 Code-Division Multiple Access<br> 17.6 Recommended Reading<br> 17.7 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 18 Wireless Networks</strong><br> 18.1 Fixed Broadband Wireless Access<br> 18.2 WiMAX/IEEE 802.16<br> 18.3 Bluetooth Overview<br> 18.4 Bluetooth Radio Specification<br> 18.5 Bluetooth Baseband Specification<br> 18.6 Bluetooth Logical Link Control and Adaptation Protocol<br> 18.7 Recommended Reading<br> 18.8 Key Terms, Review Questions, and Problems</p> <p><strong>PART SEVEN INTERNETWORKING</strong></p> <p><strong>Chapter 19 Routing</strong><br> 19.1 Routing in Packet-Switching Networks<br> 19.2 Examples: Routing in ARPANET<br> 19.3 Internet Routing Protocols<br> 19.4 Least-Cost Algorithms<br> 19.5 Recommended Reading<br> 19.6 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 20 Congestion Control</strong><br> 20.1 Effects of Congestion<br> 20.2 Congestion Control<br> 20.3 Traffic Management<br> 20.4 Congestion Control in Packet-Switching Networks<br> 20.5 TCP Congestion Control<br> 20.6 Datagram Congestion Control Protocol<br> 20.7 Recommended Reading<br> 20.8 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 21 Internetwork Operation</strong><br> 21.1 Multicasting<br> 21.2 Software Defined Networks<br> 21.3 OpenFlow<br> 21.4 Mobile IP<br> 21.5 Recommended Reading<br> 21.6 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 22 Internetwork Quality of Service</strong><br> 22.1 QoS Architectural Framework<br> 22.2 Integrated Services Architecture<br> 22.3 Resource Reservation Protocol<br> 22.4 Differentiated Services<br> 22.5 Service Level Agreements<br> 22.6 IP Performance Metrics<br> 22.7 Recommended Reading<br> 22.8 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 23 Multiprotocol Label Switching</strong><br> 23.1 The Role of MPLS<br> 23.2 Background<br> 23.3 MPLS Operation<br> 23.4 Labels<br> 23.5 FECs, LSPs, and Labels<br> 23.6 Label Distribution<br> 23.7 Traffic Engineering<br> 23.8 Virtual Private Networks<br> 23.9 Recommended Reading<br> 23.10 Key Terms, Review Questions, and Problems</p> <p><strong>PART EIGHT INTERNET APPLICATIONS</strong></p> <p><strong>Chapter 24 Electronic Mail, DNS, and HTTP</strong><br> 24.1 Electronic Mail: SMTP and MIME<br> 24.2 Internet Directory Service: DNS<br> 24.3 Web Access: HTTP<br> 24.4 Recommended Reading<br> 24.5 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 25 Internet Multimedia Support</strong><br> 25.1 Real-Time Traffic<br> 25.2 Voice Over IP<br> 25.3 Session Initiation Protocol<br> 25.4 Real-Time Transport Protocol<br> 25.5 Recommended Reading<br> 25.6 Key Terms, Review Questions, and Problems</p> <p><strong>APPENDICES</strong> <br> <strong>Appendix A Fourier Analysis</strong><br> A.1 Fourier Series Representation of Periodic Signals<br> A.2 Fourier Transform Representation of Aperiodic Signals<br> A.3 Recommended Reading</p> <p><strong>Appendix B Projects and Other Student Exercises for Teaching Data and Computer Communications</strong><br> B.1 Animations and Animation Projects<br> B.2 Practical Exercises<br> B.3 Sockets Projects<br> B.4 Wireshark Projects<br> B.5 Simulation and Modeling Projects<br> B.6 Performance Modeling<br> B.7 Research Projects<br> B.8 Reading/Report Assignments<br> B.9 Writing Assignments<br> B.10 Discussion Topics</p> <p>References <br>Index</p> <p><strong>ONLINE CHAPTERS AND APPENDICES[1]</strong> <strong>PART NINE NETWORK SECURITY</strong></p> <p><strong>Chapter 26 Computer and Network Security Threats</strong><br> 26.1 Computer Security Concepts<br> 26.2 Threats, Attacks, and Assets<br> 26.3 Intruders<br> 26.4 Malicious Software Overview<br> 26.5 Viruses, Worms, and Bots<br> 26.6 Recommended Reading<br> 26.7 Key Terms, Review Questions, and Problems</p> <p><strong>Chapter 27 Computer and Network Security Techniques</strong><br> 27.1 Virtual Private Networks and IPsec<br> 27.2 SSL and TLS<br> 27.3 Wi-Fi Protected Access<br> 27.4 Intrusion Detection<br> 27.5 Firewalls<br> 27.6 Malware Defense<br> 27.7 Recommended Reading<br> 27.8 Key Terms, Review Questions, and Problems</p> <p><strong>Appendix C Standards Organizations</strong> <br><strong>Appendix D Asynchronous and Synchronous Transmission</strong><br><strong>Appendix E The OSI Model</strong> <br> <strong>Appendix F The International Reference Alphabet</strong> <br><strong>Appendix G Proof of the Sampling Theorem</strong> <strong><br>Appendix H Ones Complement Representation and Addition</strong><br><strong>Appendix I Statistical TDM</strong> <strong><br>Appendix J The Spanning Tree Algorithm</strong><br><strong>Appendix K LAN Performance Issues</strong><br> <strong>Appendix L Matrix Multiplication and Determinants</strong><br> <strong>Appendix M Queuing Effects</strong><br> <strong>Appendix N Orthogonality, Correlation, and Autocorrelation</strong><br> <strong>Appendix O TCP/IP Example</strong> <br> <strong>Appendix P Queue Management and Queueing Discipline</strong><br> <strong>Appendix Q Cryptographic Algorithms</strong><br> <strong>Appendix R Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)</strong><br> <strong>Appendix S Augmented Backus-Naur Form</strong> <strong><br>Appendix T Derivations of Equations and Examples</strong> <br> <strong>Glossary</strong></p> <p> Online chapters and appendices are Premium Content, available via the access card at the front of the book.</p>