id stringlengths 14 14 | text stringlengths 21 1.85k | source stringlengths 6 8 |
|---|---|---|
b4d58aa6fbff-0 | TABLE OF CONTENTS COVER TITLE PAGE COPYRIGHT DEDICATION ABOUT THE AUTHORS PREFACE PURPOSE OF THIS BOOK WHAT’S NEW IN THIS EDITION LAB EXERCISES ONLINE SUPPLEMENTS FOR INSTRUCTORS E-BOOK ACKNOWLEDGMENTS PART ONE: INTRODUCTION CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS 1.1 INTRODUCTION 1.2 DATA COMMUNICATIONS NETWORK... | Page 2 |
e391b8e6f60f-0 | HANDS-ON ACTIVITY 2A HANDS-ON ACTIVITY 2B CHAPTER 3: PHYSICAL LAYER 3.1 INTRODUCTION 3.2 CIRCUITS 3.3 COMMUNICATION MEDIA 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA 3.5 ANALOG TRANSMISSION OF DIGITAL DATA 3.6 DIGITAL TRANSMISSION OF ANALOG DATA 3.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MIN... | Page 3 |
b1e7cb882b08-0 | EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 5A HANDS-ON ACTIVITY 5B HANDS-ON ACTIVITY 5C HANDS-ON ACTIVITY 5D HANDS-ON ACTIVITY 5E HANDS-ON ACTIVITY 5F PART THREE: NETWORK TECHNOLOGIES CHAPTER 6: NETWORK DESIGN 6.1 INTRODUCTION 6.2 NEEDS ANALYSIS 6.3 TECHNOLOGY DESIGN 6.4 COST ASSESSMENT 6.5 IMPLICATIONS FOR CYB... | Page 4 |
8f88312a9525-0 | 8.4 VIRTUAL LANS 8.5 THE BEST PRACTICE BACKBONE DESIGN 8.6 IMPROVING BACKBONE PERFORMANCE 8.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 8A HANDS-ON ACTIVITY 8B CHAPTER 9: WIDE AREA NETWORKS 9.1 INTRODUCTION 9.2 DEDICATED-CIRCUIT NETWORKS 9.3 PACKET-SW... | Page 5 |
de7b896e0401-0 | HANDS-ON ACTIVITY 10C PART FOUR: NETWORK MANAGEMENT CHAPTER 11: NETWORK SECURITY 11.1 INTRODUCTION 11.2 RISK ASSESSMENT 11.3 ENSURING BUSINESS CONTINUITY 11.4 INTRUSION PREVENTION 11.5 BEST PRACTICE RECOMMENDATIONS 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HA... | Page 6 |
ed169bd4e5a7-0 | FIGURE 1-3 Network architecture components FIGURE 1-4 Network models. OSI = Open Systems Interconnection Reference FIGURE 1-5 Message transmission using layers. IP = Internet Protocol; HTTP =... FIGURE 1-6 Some common data communications standards. HTML = Hypertext Marku... FIGURE 1-7 A security robot on the IOT FIGURE... | Page 7 |
ed169bd4e5a7-1 | (Simple Mail Transfer Protocol) email works. IMAP = Int ... FIGURE 2-14 Inside the Web. HTTP = Hypertext Transfer Protocol ; IMAP = I ... FIGURE 2-15 An example of an email message using the SMTP (Simple Mail Trans... FIGURE 2-16 A Cisco telepresence system FIGURE 2-17 Desktop videoconferencing FIGURE 2-18 Viewing t... | Page 7 |
10d65135a745-0 | FIGURE 3-10 Binary numbers used to represent different characters using ASCI... FIGURE 3-11 Parallel transmission of an 8-bit code FIGURE 3-12 Serial transmission of an 8-bit code FIGURE 3-13 Unipolar, bipolar, and Manchester signals (digital) FIGURE 3-14 Sound wave FIGURE 3-15 Amplitude modulation FIGURE 3-16 Frequenc... | Page 8 |
10d65135a745-1 | Ethernet 802.3ac frame layout FIGURE 4-8b Ethernet II frame layout FIGURE 4-9 PPP frame layout FIGURE 4-10 Frame size effects on throughput FIGURE 4-11 Capturing packets with Wireshark FIGURE 4-12 Analyzing packets with Wireshark Chapter 5 FIGURE 5-1 Message transmission using layers. SMTP = Simple Mail Transfer Pr ..... | Page 8 |
452917c0cf36-0 | FIGURE 5-9 IPv4 public address space FIGURE 5-10 IPv4 private address space FIGURE 5-11 Address subnets FIGURE 5-12 How the DNS system works? FIGURE 5-13 A small corporate network FIGURE 5-14 Sample routing tables FIGURE 5-15 Routing on the Internet with Border Gateway Protocol (BGP), Open... FIGURE 5-16 Anatomy of a r... | Page 9 |
452917c0cf36-1 | using switches FIGURE 7-6 Types of Ethernet FIGURE 7-7 A wireless Ethernet frame FIGURE 7-8 Design parameters for Wi-Fi access point range FIGURE 7-9 A Wi-Fi design (the numbers indicate the channel numbers) FIGURE 7-10 A Wi-Fi design in the three dimensions (the numbers indicate the... FIGURE 7-11 The data center at I... | Page 9 |
5da1a8f0c5d0-0 | FIGURE 7-19 WLANs at Indiana University FIGURE 7-20 Plans for Floors 3–8 of Apollo Residence FIGURE 7-21 LAN equipment price list Chapter 8 FIGURE 8-1 Rack-mounted switched backbone network architecture FIGURE 8-2 An MDF with rack-mounted equipment. A layer 2 chassis switch with... FIGURE 8-3 MDF network diagram. MDF =... | Page 10 |
5da1a8f0c5d0-1 | 9-5 T-carrier services FIGURE 9-6 SONET and SDH services. OC = optical carrier (level); SDH = synch... FIGURE 9-7 Packet-switched services. PAD = packet assembly/disassembly devic... FIGURE 9-8 Virtual private network (VPN) services FIGURE 9-9 A virtual private network (VPN) FIGURE 9-10 Using VPN software. Shaded area ... | Page 10 |
795a42e5278f-0 | FIGURE 10-2 Basic Internet architecture. ISP = Internet service provider; IX... FIGURE 10-3 A typical Internet backbone of a major ISP FIGURE 10-4 DSL architecture. DSL = digital subscriber line; ISP = Internet ... FIGURE 10-5 Some typical digital subscriber line data rates FIGURE 10-6 Cable modem architecture. ISP = I... | Page 11 |
795a42e5278f-1 | FIGURE 11-18 Two-factor authentication with the Duo app for mobile phones FIGURE 11-19 Intrusion prevention system (IPS). DMZ = demilitarized zone; DN... FIGURE 11-20 Commonly used security controls FIGURE 11-21 BitLocker FIGURE 11-22 Selecting the encryption mode FIGURE 11-23 Starting the encryption FIGURE 11-24 Syste... | Page 11 |
c35d27f899e1-0 | FIGURE 12-3 Network with load balancer FIGURE 12-4 Capacity management software FIGURE 12-5 Network with content engine FIGURE 12-6 Network with content delivery FIGURE 12-7 Network configuration diagram FIGURE 12-8 Part of the Network Operations Center at Indiana University FIGURE 12-9 Network traffic versus network m... | Page 12 |
274952c87f8f-0 | Business Data Communications and Networking Fourteenth Edition Jerry FitzGerald Jerry FitzGerald & Associates Alan Dennis Indiana University Alexandra Durcikova University of Oklahoma | Page 13 |
287e829cbd9a-0 | VP AND EDITORIAL DIRECTOR Mike McDonald PUBLISHER Lise Johnson EDITOR Jennifer Manias EDITORIAL ASSISTANT Kali Ridley SENIOR MANAGING EDITOR Judy Howarth DIRECTOR OF CONTENT OPERATIONS Martin Tribe SENIOR MANAGER OF CONTENT OPERATIONS Mary Corder PRODUCTION EDITOR Umamaheswari Gnanamani ASSISTANT MARKETING MANAGER Rach... | Page 14 |
287e829cbd9a-1 | in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment... | Page 14 |
287e829cbd9a-2 | (PBK) ISBN: 978-1-119-71365-4 (EVALC) Library of Congress Cataloging-in-Publication Data: Names: FitzGerald, Jerry, 1936- author. | Dennis, Alan, author. | Durcikova, Alexandra, author. Title: Business data communications and networking / Jerry FitzGerald, Alan Dennis, Alexandra Durcikova. Description: Fourteenth editi... | Page 14 |
287e829cbd9a-3 | the ISBN on this page, the one on the back cover is correct. | Page 14 |
f6aaba29d3da-0 | To my son Alec , Alan To all curious minds who want to know how today’s modern world works . Alexandra | Page 15 |
f5232e68c400-0 | ABOUT THE AUTHORS Alan Dennis is a Fellow of the Association for Information Systems and a professor of information systems in the Kelley School of Business at Indiana University. He holds the John T. Chambers Chair in Internet Systems, which was established to honor John Chambers, president and chief executive officer... | Page 16 |
f5232e68c400-1 | first book was Getting Started with Microcomputers , published in 1986. Alan is also an author of two systems analysis and design books published by Wiley. He is the cochair of the Internet Technologies Track of the Hawaii International Conference on System Sciences. He has served as a consultant to BellSouth, Boeing,... | Page 16 |
f5232e68c400-2 | to both undergraduate and graduate students for several years. In addition, she has been teaching classes on information technology strategy and most recently won the Dean’s Award for Undergraduate Teaching Excellence while teaching at the University of Arizona. Dr. Jerry FitzGerald wrote the early editions of this boo... | Page 16 |
a2214469c609-0 | PREFACE The field of data communications has grown faster and become more important than computer processing itself. Though they go hand in hand, the ability to communicate and connect with other computers and mobile devices is what makes or breaks a business today. There are three trends that support this notion. Firs... | Page 17 |
a2214469c609-1 | THIS BOOK Our goal is to combine the fundamental concepts of data communications and networking with practical applications. Although technologies and applications change rapidly, the fundamental concepts evolve much more slowly; they provide the foundation from which new technologies and applications can be understood... | Page 17 |
a2214469c609-2 | 5 ); (2) network technologies ( Chapters 6 – 10 ); and (3) network security and management ( Chapters 11 and 12 ). In the new edition, we removed older technologies and replaced them with new ones. Accordingly, new hands-on activities and questions have been added at the end of each chapter that guide students in und... | Page 17 |
454b4586a55b-0 | help students to expand their knowledge of cybersecurity and see how it relates to the material covered in the chapter. Second, we have revised Chapter 2 to use a new framework for application architecture that includes application services. Third, we have revised the WAN chapter ( Chapter 9 ) to include the rapidly ... | Page 18 |
454b4586a55b-1 | have access to interactive images and embedded podcasts. Visit www.wiley.com/go/fitzgerald/datacommunications14e for more information. ACKNOWLEDGMENTS Our thanks to the many people who helped in preparing this edition. Specifically, we want to thank the staff at John Wiley & Sons for their support. Alan Dennis Bloomin... | Page 18 |
7fda7dcc2e1c-0 | PART ONE INTRODUCTION | Page 19 |
4949bf1ccc46-0 | CHAPTER 1 INTRODUCTION TO DATA COMMUNICATIONS This chapter introduces the basic concepts of data communications. It describes why it is important to study data communications, how data communications fit within the discipline of Management Information Systems (MIS), and introduces you to the three fundamental questions... | Page 20 |
4949bf1ccc46-1 | Wireless LAN and BYOD 1.5.2 The Internet of Things 1.5.3 Massively Online 1.6 Implications for Cyber Security Summary | Page 20 |
02815cc2f0c5-0 | 1.1 INTRODUCTION What Internet connection should you use? Cable modem or DSL (formally called Digital Subscriber Line)? Cable modems are supposedly faster than DSL, providing data speeds of 50 Mbps to DSL’s 1.5–25 Mbps (million bits per second). One cable company used a tortoise to represent DSL in advertisements. So w... | Page 21 |
02815cc2f0c5-1 | way it merges the physical, digital, and biological worlds is unprecedented. It is deeply rooted in the Internet and digitization. Digitization enables us to build a world where interactions can happen in real time across different continents (think about email, instant messaging, and exchange of data between different... | Page 21 |
02815cc2f0c5-2 | universities and exploded into mainstream popular culture because of a development at an American research lab. One of the problems in studying a global phenomenon lies in explaining the different political and regulatory issues that have evolved and currently exist in different parts of the world. Rather than attempt ... | Page 21 |
02815cc2f0c5-3 | request and then sends the page back to you in the same way—by composing a message using HTTP, TCP/IP, and Ethernet and then sending it as a series of smaller packets back through the Internet that the software on your computer puts together into the page | Page 21 |
9a01246025dc-0 | you requested. You might have heard a news story that the U.S. or Chinese government can read your email or see what websites you’re visiting. A more shocking truth is that the person sitting next you at a coffee shop might be doing exactly the same thing—reading all the packets that come from or go to your laptop. How... | Page 22 |
9a01246025dc-1 | manage my network to make sure it is secure, provides good performance, and doesn’t cost too much? This is the focus of Chapters 11 and 12 . Would it surprise you to learn that most companies spend between $1,500 and $3,500 per computer per year on network management and security? Yup, we spend way more on network m... | Page 22 |
9a01246025dc-2 | IT strategy—a plan for buying and/or building IT to help the organization accomplish its goals. For most companies, this means increasing revenues and/or decreasing costs. Companies must deploy the right IT to support their business operations. IT has four core capabilities within organizational settings: 1 . Storing ... | Page 22 |
9a01246025dc-3 | buy or build using a variety of programming languages. 4 . Protecting Data—The first three core capabilities are designed to make it easy to store and access data. However, this means that an intruder or malicious employee could also access the data. Therefore, organizations must spend resources to protect their data ... | Page 22 |
87eb1eb198e6-0 | FIGURE 1-1 What is MIS? In order for the IT strategy to implement the core capabilities, data communications and networking infrastructure must be available. You are using this infrastructure anytime you use the Internet on your laptop and even your cell phone. MIS core capabilities and the IT strategy rest on a solid... | Page 23 |
87eb1eb198e6-1 | the network infrastructure has to support the data that flow from these devices as well as to make sure that they don’t pose a security risk. | Page 23 |
9c8779c51130-0 | With a few years of experience, there is the possibility to work as an information systems manager, for which the median annual pay is as high as $117,780. An information systems manager plans, coordinates, and directs IT-related activities in such a way that they can fully support the goals of any business. Thus, this... | Page 24 |
9c8779c51130-1 | and how to manage networks. You won’t be an expert, but you’ll be ready to enter an organization and have an educated conversation about the role of data communications and networks or move on to more advanced courses and workshops. 1.2 DATA COMMUNICATIONS NETWORKS Data communications is the movement of computer infor... | Page 24 |
9c8779c51130-2 | Some computer names have several parts separated by periods, so some addresses have the format computer.computer.computer.domain. For example, the main university Web server at Indiana University (IU) is called www.indiana.edu, whereas the Web server for the Kelley School of Business at IU is www.kelley.indiana.edu. Si... | Page 24 |
03195941931b-0 | As networks in other countries were connected to the Internet, they were assigned their own domain names. Some international domain names are as follows: CA for Canada AU for Australia UK for the United Kingdom DE for Germany New top-level domains that focus on specific types of businesses continue to be introduced, su... | Page 25 |
03195941931b-1 | It typically provides users with access to the network and the data and software on the server. The circuit is the pathway through which the messages travel. It is typically a copper wire, although fiber-optic cable and wireless transmission are becoming common. There are many devices in the circuit that perform spec... | Page 25 |
03195941931b-2 | Web server stores documents and graphics that can be accessed from any Web browser, such as Internet Explorer. The Web server can respond to requests from computers on this network or any computer on the Internet. The mail server handles and delivers email over the network. Servers are usually personal computers (of... | Page 25 |
be03635f50ed-0 | FIGURE 1-2 Example of a local area network (LAN) FIGURE 1-3 Network architecture components There are three computers that make networks what they are. These are the client, the server, and the router. The client initiates a communication with the server by sending a request to the server. Once the server receives th... | Page 26 |
96e46a4ee84d-0 | connection possible. All three devices are computers, and their hardware is pretty much the same—they have a motherboard with CPU (central processing unit), memory, and some storage space. However, only the client had a screen, keyboard, and mouse. Why? Are the server and router less deserving? No. Their purpose is not... | Page 27 |
96e46a4ee84d-1 | local area networks (LANs), backbone networks (BNs), and wide area networks (WANs). The distinctions among these are becoming blurry because some network technologies now used in LANs were originally developed for WANs, and vice versa. Any rigid classification of technologies is certain to have exceptions. A local are... | Page 27 |
96e46a4ee84d-2 | . Wide area networks (WANs) connect BNs and MANs (see Figure 1-1 ). Most organizations do not build their own WANs by laying cable, building microwave towers, or sending up satellites (unless they have unusually heavy data transmission needs or highly specialized requirements, such as those of the Department of Defen... | Page 27 |
96e46a4ee84d-3 | faculty expense budgets, class scheduling for future semesters (e.g., room, instructor), and discussion forums. An extranet is similar to an intranet in that it, too, uses the same technologies as the Internet but instead is provided to invited users outside the organization who access it over the Internet. It can prov... | Page 27 |
0b77f2f9f5dc-0 | 1.3 NETWORK MODELS There are many ways to describe and analyze data communications networks. All networks provide the same basic functions to transfer a message from sender to receiver, but each network can use different network hardware and software to provide these functions. All of these hardware and software produc... | Page 28 |
0b77f2f9f5dc-1 | by one vendor (remember that the Internet was in use at the time but was not widespread and certainly was not commercial). During the late 1970s, the International Organization for Standardization (ISO) created the Open System Interconnection Subcommittee, whose task was to develop a framework of standards for computer... | Page 28 |
0b77f2f9f5dc-2 | voltages of electricity, number of bits sent per second, and the physical format of the cables and connectors used. Layer 2: Data Link Layer The data link layer manages the physical transmission circuit in layer 1 and transforms it into a circuit that is free of transmission errors as far as layers above are concerne... | Page 28 |
87895fef14c4-0 | FIGURE 1-4 Network models. OSI = Open Systems Interconnection Reference Layer 3: Network Layer The network layer performs routing. It determines the next computer to which the message should be sent, so it can follow the best route through the network and finds the full address for that computer if needed. Layer 4: ... | Page 29 |
87895fef14c4-1 | in case of failure. The session layer also handles session accounting so the correct party receives the bill. Layer 6: Presentation Layer The presentation layer formats the data for presentation to the user. Its job is to accommodate different interfaces on different computers so the application program need not worr... | Page 29 |
73ce0f93710c-0 | utilities for application programs. Each user program determines the set of messages and any action it might take on receipt of a message. Other network-specific applications at this layer include network monitoring and network management. 1.3.2 Internet Model The network model that dominates current hardware and softw... | Page 30 |
73ce0f93710c-1 | radio waves, or light pulses that pass through it. Chapter 3 discusses the physical layer in detail. Layer 2: The Data Link Layer The data link layer is responsible for moving a message from one computer to the next computer in the network path from the sender to the receiver. The data link layer in the Internet mo... | Page 30 |
73ce0f93710c-2 | responsible for breaking long messages into several smaller messages to make them easier to transmit and then recombining the smaller messages back into the original larger message at the receiving end. The transport layer can also detect lost messages and request that they be resent. Chapter 5 discusses the transport... | Page 30 |
471e59af2126-0 | The layers in the Internet are often so closely coupled that decisions in one layer impose certain requirements on other layers. The data link layer and the physical layer are closely tied together because the data link layer controls the physical layer in terms of when the physical layer can transmit. Because these tw... | Page 31 |
471e59af2126-1 | Chapter 2 ). In general, all messages sent in a network pass through all layers. All layers except the physical layer create a new Protocol Data Unit (PDU) as the message passes through them. The PDU contains information that is needed to transmit the message through the network. Some experts use the word packet to... | Page 31 |
b04b82e1dc6e-0 | Application Layer First, the user creates a message at the application layer using a Web browser by clicking on a link (e.g., get the home page at www.somebody.com). The browser translates the user’s message (the click on the Web link) into HTTP. The rules of HTTP define a specific PDU—called an HTTP packet—that all We... | Page 32 |
b04b82e1dc6e-1 | in turn, contains the message) to the network layer. Network Layer The network layer on the Internet uses a protocol called IP (Internet Protocol), which has its rules and PDUs. IP selects the next stop on the message’s route through the network. It places the TCP segment inside an IP PDU, which is called an IP packet,... | Page 32 |
b04b82e1dc6e-2 | hardware translates the electrical pulses into computer data and passes the message to the data link layer. The data link layer uses the start and stop markers in the Ethernet frame to identify the message. The data link layer checks for errors and, if it discovers one, requests that the message be resent. If a message... | Page 32 |
869734c0a63d-0 | encapsulation , because the PDU at a higher level is placed inside the PDU at a lower level so that the lower-level PDU encapsulates the higher-level one. The major advantage of using different software and protocols is that it is easy to develop new software, because all one has to do is write software for one level a... | Page 33 |
869734c0a63d-1 | and software that conform to the same standard. Without standards, it would be virtually impossible for computers to communicate. Third, the major disadvantage of using a layered network model is that it is somewhat inefficient. Because there are several layers, each with its own software and PDUs, sending a message in... | Page 33 |
869734c0a63d-2 | difficult—if not impossible—to develop networks that easily share information. Standards also mean that customers are not locked into one vendor. They can buy hardware and software from any vendor whose equipment meets the standard. In this way, standards help to promote more competition and hold down prices. The use o... | Page 33 |
869734c0a63d-3 | often become de jure standards once they have been widely accepted. | Page 33 |
a3b4c46377a3-0 | The de jure standardization process has three stages: specification, identification of choices, and acceptance. The specification stage consists of developing a nomenclature and identifying the problems to be addressed. In the identification of choices stage, those working on the standard identify the various sol... | Page 34 |
a3b4c46377a3-1 | members among public- and private-sector organizations who operate computer or communications networks (e.g., RBOCs) or build software and equipment for them (e.g., AT&T). American National Standards Institute The American National Standards Institute (ANSI) is the coordinating organization for the U.S. national syst... | Page 34 |
a3b4c46377a3-2 | to study it. The working group examines the protocol to identify potential problems and possible extensions and improvements, and then issues a report to the IETF. If the report is favorable, the IETF issues a Request for Comment (RFC) that describes the proposed standard and solicits comments from the entire world. ... | Page 34 |
c6b6c7963512-0 | Usually, several vendors adopt the proposed standard and develop products based on it. Once at least two vendors have developed hardware or software based on it and it has proven successful in operation, the proposed standard is changed to a draft standard. This is usually the final specification, although some protoco... | Page 35 |
c6b6c7963512-1 | for users of this book is the website for this book, which contains updates to the book, additional sections, teaching materials, and links to useful websites. Second, there are literally hundreds of thousands of websites with data communications and networking information. Search engines can help you find them. A good... | Page 35 |
3b4399929f6e-0 | FIGURE 1-6 Some common data communications standards. HTML = Hypertext Markup Language; HTTP = Hypertext Transfer Protocol; IMAP = Internet Message Access Protocol; IP = Internet Protocol; LAN = Local Area Network; MPEG = Motion Picture Experts Group; POP = Post Office Protocol; TCP = Transmission Control Protocol Ins... | Page 36 |
3b4399929f6e-1 | in Figure 1-6 . At this point, these models are probably just a maze of strange names and acronyms to you, but by the end of the book, you will have | Page 36 |
72400f1bb7f0-0 | a good understanding of each of these. Figure 1-6 provides a brief road map for some of the important communication technologies we discuss in this book. For now, there is one important message you should understand from Figure 1-6 : For a network to operate, many different standards must be used simultaneously. The... | Page 37 |
72400f1bb7f0-1 | work email. This movement, called bring your own device, or Bring Your On Device (BYOD) , is a great way to get work quickly, saves money, and makes employees happy. But BYOD also brings its own problems. Employers need to add or expand their Wireless Local Area Networks (WLANs) to support all these new devices. Anoth... | Page 37 |
72400f1bb7f0-2 | have to be added to the general security practices of the company. Employees need to have apps to allow their employer to wipe their phones clean in case of loss so that no company data are compromised (e.g., SOTI’s MobiControl). In some cases, companies require the employee to allow monitoring of the device at all tim... | Page 37 |
d7c272ca71be-0 | this interaction between IoT devices will happen seamlessly, without human intervention. And you might already be asking Alexa or Siri for advice on where to eat, lock, and unlock your apartment, turn on/off your lights, or change the thermostat setting. For this to happen, Alexa/Siri must be able to communicate with y... | Page 38 |
b2e0f75f907e-0 | FIGURE 1-7 A security robot on the IOT IoT technologies are not restricted to consumer use. To the contrary, they are used in many places such as manufacturing, process automation, decision analytics, and smart electrical grids. However, the underlying principle of all the applications is that IoT devices are connecte... | Page 39 |
0db7b569ea4f-0 | Ten years ago, network managers would never have thought about the need to manage robots over their networks. 1.5.3 Massively Online You have probably heard of massively multiplayer online games, such as World of Warcraft, where you can play with thousands of players in real time. Well, today not only games are massive... | Page 40 |
0db7b569ea4f-1 | off in the 2016 elections. Finally, massively online allows activists to reach masses of people in a very short period of time to initiate change. Examples of use of YouTube videos or Facebook for activism include the Arab Spring, Kony 2012, or the use of sarin gas in Syria. So what started as a game with thousands of ... | Page 40 |
0db7b569ea4f-2 | as well as implications for cyber security of an individual and an organization. There are three key implications for management from this chapter. First, networks and the Internet change almost everything. Computer networks and the Internet are designed to quickly and easily move information from distant locations and... | Page 40 |
871a4ed56207-0 | information we generate will open new market opportunities. Today, Google has almost a million Web servers (see Figure 1-8 ). If we assume that each server costs an average of $1,000, the money large companies spend on storage is close to $1 billion. Capital expenditure of this scale is then increased by money spent o... | Page 41 |
871a4ed56207-1 | separately, to enable vendors to develop software and hardware that can work together in the overall network. In this book, we use a five-layer model. The application layer is the application software used by the network user. The transport layer takes the message generated by the application layer and, if necessary, b... | Page 41 |
df10dfcc438f-0 | physical layer, adds a Protocol Data Unit (PDU) to the message. Standards Standards ensure that hardware and software produced by different vendors can work together. A de jure standard is developed by an official industry or a government body. De facto standards are those that emerge in the marketplace and are sup... | Page 42 |
df10dfcc438f-1 | Open Systems Interconnection Reference model (OSI model) | Page 42 |
cae7bc58b752-0 | OSI model peer-to-peer networks physical layer Protocol Data Unit (PDU) protocol stack protocol Request for Comment (RFC) router server Standards switch transport layer Web server wide area networks (WANs) wireless access point QUESTIONS 1 . How can data communications networks affect businesses? 2 . How do data comm... | Page 43 |
cae7bc58b752-1 | Discuss three trends in communications and networking. 19 . Why has the Internet model replaced the OSI model? 20 . In the 1980s, when we wrote the first edition of this book, there were many, many more protocols in common use at the data link, network, and transport layers than there are today. Why do you think the ... | Page 43 |
e4dff957820d-0 | continue? What are the implications for those who design and operate networks? 21 . The number of standardized protocols in use at the application layer has significantly increased since the 1980s. Why? Do you think this trend will continue? What are the implications for those who design and operate networks? 22 . Ho... | Page 44 |
e4dff957820d-1 | program. E . Investigate the IoT. What IoT devices are you most interested in? Why? F . Investigate the networks in your school or organization. Describe the important LANs and BNs in use (but do not describe the specific clients, servers, or devices on them). G . Visit the Internet Engineering Task (IETF) website (... | Page 44 |
e4dff957820d-2 | package from group A for one type of financial analysis and one package from group B for a different type of financial analysis. The problem, of course, is that then the two packages cannot communicate and GC’s staff would end up having to type the same data into both packages. The alternative is to buy two packages fr... | Page 44 |
0318c6fa8121-0 | they would have (e.g., LANs, BNs, WANs) and where they are likely to be located. (2) What types of standard protocols and technologies do you think they are using at each layer (e.g., see Figures 1-3 and 1-5 )? III . Consolidated Supplies Consolidated Supplies is a medium-sized distributor of restaurant supplies t... | Page 45 |
0318c6fa8121-1 | the year after, so that some warehouses will benefit from the expected future improvements in networking technologies? IV . Asia Importers Caisy Wong is the owner of a small catalog company that imports a variety of clothes and houseware from several Asian countries and sells them to its customers over the Web and by... | Page 45 |
0318c6fa8121-2 | unencrypted, or phishing attacks (emails that pretend to be real) that ask you to download a file or click on link and can cause lot of harm to you and your data. But, when did this start? What was the evolution of attacks on the Internet? How did individuals, business, and governments respond to these attacks? What is... | Page 45 |
32c734320f8e-0 | 5 . How does it relate to material covered in class so far (and in the future) 6 . Additional material/books/links where to learn more about this topic 7 . Credits 8 . List of References 9 . Memo addressed to your professor describing all of the above information HANDS-ON ACTIVITY 1A Internet as We Know It Today W... | Page 46 |
32c734320f8e-1 | the most surprising thing you learned during your investigation? HANDS-ON ACTIVITY 1B Seeing the PDUs in Your Messages We talked about how messages are transferred using layers and the different PDUs used at each layer. The objective of this activity is for you to see the different PDUs in the messages that you send. T... | Page 46 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 3