For undergraduate, graduate , and MBA courses in Business Data Communications, Introduction to Data Communications, Telecommunications, and Introduction to Networking. The most current data communications text on the market, this comprehensive book uses a unique modular approach. Most teachers will want to cover the material in the 12 core chapters. This will leave time for hands-on work or additional conceptual material. The 8 advanced modules have extra material that some teachers will wish to cover depending on their particular course goals. Companion Website offers even more material. This approach allows selective emphasis without requiring the teacher to assemble his or her own additional material.
"synopsis" may belong to another edition of this title.
The third edition of Business Data Communications and Networking, like its two predecessors, is based on extensive discussions with network administrators, reflects published data about what technologies are really used in organizations, and incorporates the comments of many teachers. The goal is to focus on what students really need to know for today's and tomorrow's networking jobs, including such things as LAN switching, security, and quality of service (QoS). The current edition is an 85 percent rewrite, although it generally follows the same flow as the second edition. A UNIQUELY FLEXIBLE TEXTBOOK
Every teacher has different ideas about what to cover in a networking course. This book is designed to let teachers teach the course their way.
Covering the Basics in the 12 Core Chapters. Most teachers will wish to cover much or all of the 12 core chapters, which cover key networking concepts. Even within these chapters, more advanced material is placed in boxes for easy exclusion.
Free Time to Cover Your Special Topics. Teaching only the core chapters will leave one to three weeks free in a one-semester course. This leaves time for hands-on exercises or for the covering of additional topics.
Tools to Help You Cover Your Special Topics. To minimize the work that teachers have to do to prepare for this "extra time," there are eight advanced modules that cover more specialized topics. There is additional supplementary material at the book's website. For hands-on exercises, the book's website has Internet exercises that provide some options. The idea is to help teachers cover selected material without the need for them to create packets of special material.
End-of-Chapter Questions to Tie Things Together. End-of-chapter questions help students focus on what material to study. For instance, when I cover Chapter 7, which covers hub-based and switch-based Ethernet networking, I also include some material on older 10Base2 and 10Base5 technologies, which are covered in Module C. For homework, in addition to assigning questions from Chapter 7,1 also assign relevant questions from Module C.
Also, end-of-chapter (and end-of-module) questions are divided into core review questions, detailed review questions, and thought questions. For faster coverage, teachers can assign core review questions and only selected detailed review questions or thought questions. INSTRUCTOR RESOURCES
This book supports instructors intensively, again with a goal of minimizing the work that instructors have to do. PowerPoint Presentations
Full Lecture Presentations. For each chapter and module, there is a detailed PowerPoint presentation. This is a full lecture, not just "a few selected figures." Each presentation is created by the author and is closely tied to the material in the chapter itself.
Change Them to Fit Your Needs. Instructors are invited to change the presentations to fit their needs. For instance, they can drop slides, add their own, or copy slides from advanced modules into core modules. (Advanced modules use the same presentation formats as the core chapters they support.) The only restrictions are that only adopters may use the presentations, that teachers must not remove the copyright notice, and that teachers may not reuse the clip art.
Gold Stars for Emphasis. Gold stars in the PowerPoint presentations indicate material that is especially important or especially difficult. In either case, gold stars tell students that the material merits special care in study.
Transparencies, Too. If instructors prefer transparencies or like to use transparencies selectively, there are transparency masters in Microsoft® Word for Windows format for every figure and table in the book, plus a few extra transparencies for material not presented in figures and tables. The Companion Website: Updates
The book comes with a companion website, prenhall/panko. The third edition website will be directly controlled by the author and will be updated monthly.
Rather than putting material that ages quickly in the printed textbook, the companion website allows the author to disseminate rapidly changing and new information.
Case Studies. Most importantly, the companion website has several case studies for all chapters (and for some modules). These are short cases with discussion questions to help students focus on the cases. Many cases are links to online trade journal articles on specific innovations in specific companies.
New Information. Networking is changing at the speed of light, and new information is appearing constantly. The website will present new information selectively. This new information will range from new developments in the field to new data and forecasts about the use of key technologies and standards.
Supplementary Information. In some cases, material will be offered that, while not entirely new, is a useful supplement that some teachers will wish to use in their classes. For instance, Chapter 1's supplementary reading page has a short tutorial on Base 2 arithmetic. The Companion Website: Student Support
The website will also be a place for students to go to for interactive support.
Internet Exercises. All chapters and some modules will have Internet exercises to provide hands-on learning. For instance, do students know how to learn their PC's IP address? Do they know how many routers there are between themselves and their favorite websites? Do they know how fast their Internet connection really is? In the Internet exercises, they'll be able to find out.
End-of-Chapter/Module Question Downloads. Each chapter and module ends with a series of review questions that test students in their understanding of the material. Students can download the end-of-chapter and end-of-module questions. They can type in their answers and then give their work to the teacher on paper or electronically.
PowerPoint Presentation Downloads. For teachers who use PowerPoint presentations, students can download them from the website. In addition, adopters of the book are free to copy the presentations to their local sites for easier access. Even if the teacher does not use the presentations in class, many students will wish to download them as study guides. Other Support for Instructors
Instructor's CD-ROM Disk with Test Bank and Answer Keys. An instructor's CD-ROM disk contains support materials you may use without the work of downloading material:
PowerPoint presentations Transparency masters Computerized test bank and answer key Answers to end-of-chapter/module questions.
Contact the Author. Do you have a question or comment? Please contact the author at Ray@Panko.
Instructor's Mailing List for News. Also, if you adopt the book, send Ray an e-mail, and he will put you on a mailing list for adopters. You will get notices of updates to material. COVERAGE AND PEDAGOGY Topical Coverage
As noted earlier, the goal in writing this book was to cover the technology and standards that corporations actually use and will use, so that students will have the knowledge they really need.
TCP/IP and OSI. TCP/IP and OSI often are taught as competitors. In reality, however, they have become partners. On the Internet and within corporations today, the dominant "architecture" is really a hybrid of TCP/IP and OSI. Computers increasingly use TCP/IP at higher layers (internet, transport, and application) while using OSI at the data link and physical layers. This book takes this hybrid TCP/IPCSI architecture as its basic architectural model. It does introduce full OSI layering, and it introduces IPX/SPX-0SI communication in Chapter 7 and SNA-OSI communication in Chapter 11. No matter what standards are used at upper layers, OSI standards are always used at the physical and data link layers.
In the first three chapters, students become very familiar with TCP/IP standards. In Chapter 3, for instance, they learn to think like a muter by comparing the destination address of incoming packets with entries in a muter forwarding table. They learn OSI physical and data link layer standards throughout the book, in appropriate places.
LAN Switching. LANs, including large site networks, are now "switch rich." We now introduce Ethernet switches and hubs equally in Chapters 6 and 7, and Chapter 8 discusses large switch-based site networks. The focus is Ethernet switching, but ATM switching is also covered. Chapter 8 covers switch selection, switch learning, VLANs, Layer 3 switches, Layer 4 switches, and other crucial LAN switching topics.
Quality of Service (QoS). As networks get larger and more complex, quality of service (QoS) is an increasing concern. Chapter 1 introduces QoS in terns of latency and reliability. Chapter 8 looks at QoS for latency in depth, covering overprovisioning, priority, full QoS guarantees, and traffic shaping.
Wide Area Networking. In wide area networking, leased lines and public switched data networks are used about equally, so both are covered. However, in public switched data networking, Frame Relay is used much more than ATM. Consequently, Chapter 9 concentrates more heavily on Frame Relay, including its flexible virtual circuit numbering scheme and how to purchase Frame Relay service.
Security. Security has grown in importance and also, unfortunately, complexity. Chapter 10 treats security in depth, including authentication, public key infrastructures, and automatic integrated security systems (using SSL as an example). Module F, among other things, discusses IPsec, Kerberos, and PPTP.
Wireless Networking and Non-PC User Devices. Wireless networking has long been a promising way to support mobile devices. However, wireless networking at the LAN and metropolitan area levels is just now reaching the maturity it will need for explosive growth. In addition, desktop and notebook PCs will be joined by a large number of other different-size devices for user access. Chapters 5, 7, and 12 discuss wireless networking and Internet access. Chapter 4 spends considerable time on radio propagation, and Module B goes into even more detail.
Microsoft Windows Networking Setup. Given the dominance of Microsoft Windows, Chapter 2 presents netwqork steup for Internet access, and Chapter 6 discusses network setup for client PCs.
Telephony. Telephony is introduced throughout the book, including telephony's hierarchy of switches and circuit switching in Chapter 1, carriers in Chapter 9, IP telephony in Chapter 11, and cellular principles in Chapter 12. Many adopters choose to cover the telephony module, Module D.
Web-Enabled Database Access and Mainframes. Contrary to popular belief, mainframes are not dying. Chapter 11 discusses web-host integration and offers a box covering mainframe communication and SNA.
Pedagogy. As much as possible has been done to make the student's learning easier and more effective. The previous sections already discussed the use of end-of-chapter questions to guide student learning and the use of gold stars to mark important or difficult material in the PowerPoint presentations. The book has several other innovations.
Vignettes. All chapters open with vignettes to pique student interest. Most vignettes raise issues that the student must address in an end-of-chapter thought question, using material learned in the chapter.
Begin with the Familiar and Concrete. Many textbooks begin with wide area networks, which few students have experienced personally. Business Data Communications and Networking, in contrast, begins with two very familiar situations: Internet access (Chapters 2-5) and small PC networks (Chapters 6 and 7). Within these familiar and comfortable environments, students learn concepts in ways to which they can relate. Later, when more unfamiliar types of networking are encountered, students have the knowledge they need to approach them.
Layering Is Treated Early and Often. Layering is the most difficult material in the course. Many textbooks introduce one layer at a time, only giving the whole picture very late in the book. Business Data Communications and Networking introduces networking at the beginning of the book and repeats it in several contexts, such as Internet access and PC networking. This repetition is needed to learn this difficult material.
Illustrations. The book's extensive illustrations are tightly integrated into the text. Many have numbered items corresponding to items discussed in the text.
Case Studies and Internet Exercises. As noted earlier, there case studies with discussion questions at the book's companion website. There are also Internet exercises for hands-on work. CHANGES FROM THE SECOND EDITION More but Smaller Chapters and the Same General Flow
The third edition looks somewhat different from the second edition. This edition has 12 core chapters, while the second edition only had eight. This has resulted largely from breaking Chapters 2 through 6 into smaller units for easier digestibility.
The mapping between the second and third editions is very direct at the first six chapters of the second edition, which map rather directly into chapters of the third.
Chapter 1 of the second edition generally matches Chapter 1 of the third edition. Chapter 2, on layering and TCP/IP, is now Chapters 3 and 4. Chapter 3, on physical layer technology and devices, is now Chapters 4 and 5. Chapter 4, on PC networks, is now Chapters 6 and 7. Chapter 5, on large network transmission, is now Chapters 8 and 9. Chapter 6, on managing large networks, corresponds to Chapter 10 and parts of Chapter 12.
In the second edition, Chapters 7 and 8 covered applications, and there was no definitive "closing chapter." Chapters 11 and 12 now cover applications but do so more selectively. Chapter 11 focuses on crucial current applications, including web-based database applications, electronic mail, and IP telephony. Chapter 12 focuses on future applications, including wireless applications and networked object oriented programming.
Chapter 12 also covers product selection and purchasing considerations, which some teachers will wish to cover early in the course. The last chapter also provides closure to the book. Topic Differences
TCP/IP. In some sense, the TCP/IP material in early chapters in simplified for easier digestibility. For instance, fragmentation, flow control, and some other TCP details are now moved to Appendix A. However, UDP is now introduced with TCP, and there is now a section on how routers actually decide what to do with incoming IP packets by comparing destination addresses with entries in the router's forwarding table.
Increased Emphasis. Throughout the book, greater emphasis is given to several emerging topics, including the following:
Quality of Service (QoS). See Chapters 1 and 8. LAN Switching. See Chapters 6-8, especially 8. Security. See the all-new treatment in Chapter 10 and Module F. Wide Area Networking. See Chapter 9. Wireless Networking. See Chapters 7 and 12 especially. Microsoft Windows Setup for Networking. See Chapters 2 and 7.
Integrating Telephony. The telephone module was very popular in the second edition. As noted earlier, some basic telephone material is now integrated into the core chapters, including some information about carriers, the telephone switching hierarchy, circuit switching, cellular basics, and IP telephony. Design and Pedagogy Differences
More Open Book Design. Prentice Hall has nicely given the book a more "open" design so that the text will not feel cramped to students.From the Back Cover:
Because of the author's extensive research with network administrators and published data on what technologies firms actually use, Business Data Communications and Networking, Third Edition focuses on what students really need to know in today's networking jobs, such as LAN switching, security, and quality of service (QoS).
The Right Information Right When You Need It
This uniquely flexible textbook has a novel design. Its twelve core chapters cover key networking concepts, with less basic material placed in boxes. To provide additional flexibility, instructors who wish to emphasize particular areas in more detail can incorporate material from the book's eight advanced modules into the course.
New to this Edition
Business Data Communications and Networking, Third Edition includes twelve core chapters instead of the second edition's eight. At the request of adopters and other reviewers, the author divided several of the longer core chapters from the second edition into two chapters in the third edition. The basic flow remains the same, although there are changes in emphasis in response to market trends and adopter comments.
Technologies come and go rapidly in networking, and although the book covers general networking principles, it illustrates them using the latest technologies. Updating these technologies results in the greatest portion of changes from the second to third edition. In addition to these updates, the author has expanded coverage of and emphasis on topics such as Quality of Service; LAN Switching; Product Selection, Procurement, and Cost Analysis; Security; Windows Networking Setup; Wireless Communication and New Access Devices; Web-Enabled Database Access; Frame Relay; and Systems Administration.
"About this title" may belong to another edition of this title.
Book Description Prentice Hall. Hardcover. Book Condition: New. 0130882623 Your book ships within 24 hours of ordering. Bookseller Inventory # SKU0006065
Book Description Prentice Hall, 2000. Hardcover. Book Condition: New. New item. May have light shelf wear. Bookseller Inventory # 170118203
Book Description Prentice Hall, 2000. Hardcover. Book Condition: New. 3rd. Bookseller Inventory # DADAX0130882623
Book Description Prentice Hall, 2000. Hardcover. Book Condition: New. book. Bookseller Inventory # 0130882623
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801308826221.0
Book Description Prentice Hall, 2000. Hardcover. Book Condition: New. New item. Bookseller Inventory # QX-200-32-2892102
Book Description Prentice Hall 1, US. Hardcover. Book Condition: New. HARDCOVER Legendary independent bookstore online since 1994. Reliable customer service and no-hassle return policy. Computers and Internet>Artificial Intelligence>General. Book: NEW, New. Bookseller Inventory # 64978013088262200. Bookseller Inventory # 64978013088262200
Book Description Book Condition: New. New. US edition. Perfect condition. Ship by express service to USA, Canada, Australia, France, Italy, UK, Germany and Netherland. Customer satisfaction our priority. Bookseller Inventory # ABE-190516-154506
Book Description Book Condition: Brand New. New. US edition. Customer Satisfaction guaranteed!!. Bookseller Inventory # SHAK154506
Book Description Book Condition: New. Brand New Book In Mint Condition. Shipping With Trackable Method. No APO/FPO Addresses Please. Bookseller Inventory # 9780130882622NHS