Networking Explained

Front Cover

Networking Explained 2e offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.

Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.

  • Wireless networks
  • Convergence of voice and data
  • Multimedia networking
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 2 Network Topologies Architectures and the OSI Model
31
Chapter 3 The Internet and TCPIP
55
Chapter 4 Physical Layer Concepts
139
Chapter 5 Data Link Layer Concepts and IEEE Standards
181
Chapter 6 Network Hardware Components Layers 1 and 2
213
Chapter 7 WANS Internetworking and Network Layer Concepts and Components
237
Chapter 8 Ethernet Ethernet and More Ethernet
287
Chapter 9 Token Ring
337
Chapter 15 Dialup and Home Networking
443
Chapter 16 Network Security Issues
471
Chapter 17 Network Convergence
505
Chapter 18 Wireless Networking
537
Vendor Ethernet8023 Prefixes
563
Using Parity for SingleBit Error Correction
565
Guidelines for Installing UTP Cable
567
Network Design and Analysis Guidelines Network Politics
569

Chapter 10 Fiber Distributed Data Interface FDDI
351
Chapter 11 Integrated Services Digital Network ISDN
365
Chapter 12 Frame Relay
383
Chapter 13 Switched Multimegabit Data Service SMDS
407
Chapter 14 Asynchronous Transfer Mode ATM
423
X25
575
Glossary
581
Bibliography
631
Index
653
Copyright

Other editions - View all

Common terms and phrases

About the author (2001)

William M. Hancock, PhD, CISSP, CISM, is VP of Security and Chief Security Officer of Cable & Wireless, one of the largest telecom and hosting companies in the world. He has over 30 years of experience in networking, security and related technologies and is the author of many books and articles on security, networking and technology strategy.

Bibliographic information