Business Data Communications and
Networking 13th Edition by FitzGerald, Dennis
and Durcikova all chapters covered
,1. PARTqONE:qINTRODUCTION
2. CHAPTERq1:qINTRODUCTIONqTOqDATAqCOMMUNICATIONS
3. 1.1qINTRODUCTION
4. 1.2qDATAqCOMMUNICATIONSqNETWORKS
5. 1.3qNETWORKqMODELS
6. 1.4qNETWORKqSTANDARDS
7. 1.5qFUTUREqTRENDS
8. 1.6qIMPLICATIONSqFORqCYBERqSECURITY
9. SUMMARY
10. KEYqTERMS
11. QUESTIONS
12. EXERCISES
13. PARTqTWO:qFUNDAMENTALqCONCEPTS
14. CHAPTERq2:qAPPLICATIONqLAYER
15. 2.1qINTRODUCTION
16. 2.2qAPPLICATIONqARCHITECTURES
17. 2.3qWORLDqWIDEqWEB
18. 2.4qELECTRONICqMAIL
19. 2.5qOTHERqAPPLICATIONS
20. 2.6qIMPLICATIONSqFORqCYBERqSECURITY
21. SUMMARY
22. KEYqTERMS
23. QUESTIONS
24. EXERCISES
25. CHAPTERq3:qPHYSICALqLAYER
26. 3.1qINTRODUCTION
27. 3.2qCIRCUITS
28. 3.3qCOMMUNICATIONqMEDIA
29. 3.4qDIGITALqTRANSMISSIONqOFqDIGITALqDATA
30. 3.5qANALOGqTRANSMISSIONqOFqDIGITALqDATA
31. 3.6qDIGITALqTRANSMISSIONqOFqANALOGqDATA
32. 3.7qIMPLICATIONSqFORqCYBERqSECURITY
33. SUMMARY
34. KEYqTERMS
35. QUESTIONS
36. EXERCISES
37. CHAPTERq4:qDATAqLINKqLAYER
38. 4.1qINTRODUCTION
39. 4.2qMEDIAqACCESSqCONTROL
40. 4.3qERRORqCONTROL
41. 4.4qDATAqLINKqPROTOCOLS
42. 4.5qTRANSMISSIONqEFFICIENCY
43. 4.6qIMPLICATIONSqFORqCYBERqSECURITY
44. SUMMARY
45. KEYqTERMS
46. QUESTIONS
47. EXERCISES
,48. CHAPTERq5:qNETWORKqANDqTRANSPORTqLAYERS
49. 5.1qINTRODUCTION
50. 5.2qTRANSPORTqANDqNETWORKqLAYERqPROTOCOLS
51. 5.3qTRANSPORTqLAYERqFUNCTIONS
52. 5.4qADDRESSING
53. 5.5qROUTING
54. 5.6qTCP/IPqEXAMPLE
55. 5.7qIMPLICATIONSqFORqCYBERqSECURITY
56. SUMMARY
57. KEYqTERMS
58. QUESTIONS
59. EXERCISES
60. PARTqTHREE:qNETWORKqTECHNOLOGIES
61. CHAPTERq6:qNETWORKqDESIGN
62. 6.1qINTRODUCTION
63. 6.2qNEEDSqANALYSIS
64. 6.3qTECHNOLOGYqDESIGN
65. 6.4qCOSTqASSESSMENT
66. 6.5qIMPLICATIONSqFORqCYBERqSECURITY
67. SUMMARY
68. KEYqTERMS
69. QUESTIONS
70. EXERCISES
71. CHAPTERq7:qWIREDqANDqWIRELESSqLOCALqAREAqNETWORKS
72. 7.1qINTRODUCTION
73. 7.2qLANqCOMPONENTS
74. 7.3qWIREDqETHERNET
75. 7.4qWIRELESSqETHERNET
76. 7.5qTHEqBESTqPRACTICEqLANqDESIGN
77. 7.6qIMPROVINGqLANqPERFORMANCE
78. 7.7qIMPLICATIONSqFORqCYBERqSECURITY
79. SUMMARY
80. KEYqTERMS
81. QUESTIONS
82. EXERCISES
83. CHAPTERq8:qBACKBONEqNETWORKS
84. 8.1qINTRODUCTION
85. 8.2qSWITCHEDqBACKBONES
86. 8.3qROUTEDqBACKBONES
87. 8.4qVIRTUALqLANS
88. 8.5qTHEqBESTqPRACTICEqBACKBONEqDESIGN
89. 8.6qIMPROVINGqBACKBONEqPERFORMANCE
90. 8.7qIMPLICATIONSqFORqCYBERqSECURITY
91. SUMMARY
92. KEYqTERMS
93. QUESTIONS
94. EXERCISES
95. CHAPTERq9:qWIDEqAREAqNETWORKS
, 96. 9.1qINTRODUCTION
97. 9.2qDEDICATED-CIRCUITqNETWORKS
98. 9.3qPACKET-SWITCHEDqNETWORKS
99. 9.4qVIRTUALqPRIVATEqNETWORKS
100. 9.5qTHEqBESTqPRACTICEqWANqDESIGN
101. 9.6qIMPROVINGqWANqPERFORMANCE
102. 9.7qIMPLICATIONSqFORqCYBERqSECURITY
103. SUMMARY
104. KEYqTERMS
105. QUESTIONS
106. EXERCISES
107. CHAPTERq10:qTHEqINTERNET
108. 10.1qINTRODUCTION
109. 10.2qHOWqTHEqINTERNETqWORKS
110. 10.3qINTERNETqACCESSqTECHNOLOGIES
111. 10.4qTHEqFUTUREqOFqTHEqINTERNET
112. 10.5qIMPLICATIONSqFORqCYBERqSECURITY
113. SUMMARY
114. KEYqTERMS
115. QUESTIONS
116. EXERCISES
117. PARTqFOUR:qNETWORKqMANAGEMENT
118. CHAPTERq11:qNETWORKqSECURITY
119. 11.1qINTRODUCTION
120. 11.2qRISKqASSESSMENT
121. 11.3qENSURINGqBUSINESSqCONTINUITY
122. 11.4qINTRUSIONqPREVENTION
123. 11.5qBESTqPRACTICEqRECOMMENDATIONS
124. 11.6qIMPLICATIONSqFORqYOURqCYBERqSECURITY
125. SUMMARY
126. KEYqTERMS
127. QUESTIONS
128. EXERCISES
129. CHAPTERq12:qNETWORKqMANAGEMENT
130. 12.1qINTRODUCTION
131. 12.2qDESIGNINGqFORqNETWORKqPERFORMANCE
132. 12.3qCONFIGURATIONqMANAGEMENT
133. 12.4qPERFORMANCEqANDqFAULTqMANAGEMENT
134. 12.5qENDqUSERqSUPPORT
135. 12.6qCOSTqMANAGEMENT
136. 12.7qIMPLICATIONSqFORqCYBERqSECURITY