Additional Information
Book Details
Abstract
Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
Contents | 5 | ||
Online Resources | 12 | ||
Preface | 13 | ||
About the Authors | 20 | ||
Chapter 0 Reader’s and Instructor’s Guide | 21 | ||
0.1 Outline of This Book | 22 | ||
0.2 Topic Ordering | 22 | ||
0.3 Internet and Web Resources | 23 | ||
0.4 Useful Publications | 24 | ||
Chapter 1 Introduction | 26 | ||
1.1 Information and Communication | 27 | ||
1.2 Data Communications and Networking for Today’s Enterprise | 28 | ||
1.3 Convergence and Unified Communications | 32 | ||
1.4 The Nature of Business Information Requirements | 39 | ||
1.5 The Transmission of Information | 41 | ||
1.6 Distributed Data Processing | 42 | ||
1.7 The Internet and Distributed Applications | 43 | ||
1.8 Networks | 45 | ||
1.9 Management Issues | 51 | ||
1.10 Standards | 53 | ||
1.11 Key Terms, Review Questions, and Problems | 54 | ||
Appendix 1A Prefixes for Numerical Units | 55 | ||
PART ONE: REQUIREMENTS | 57 | ||
Chapter 2 Business Information | 57 | ||
2.1 Audio | 59 | ||
2.2 Data | 62 | ||
2.3 Image | 65 | ||
2.4 Video | 70 | ||
2.5 Performance Measures | 73 | ||
Application Note: File Sizes | 80 | ||
2.6 Summary | 81 | ||
2.7 Key Terms, Review Questions, and Problems | 81 | ||
Chapter 3 Distributed Data Processing | 85 | ||
3.1 Centralized Versus Distributed Processing | 87 | ||
3.2 Forms of Distributed Data Processing | 102 | ||
3.3 Distributed Data | 105 | ||
3.4 Networking Implications of DDP | 111 | ||
3.5 Big Data Infrastructure Considerations | 113 | ||
Application Note: Distributed Computing Support | 115 | ||
3.6 Summary | 116 | ||
3.7 Key Terms, Review Questions, and Problems | 117 | ||
PART TWO: DATA COMMUNICATIONS | 121 | ||
Chapter 4 Data Transmission | 121 | ||
4.1 Signals for Conveying Information | 122 | ||
4.2 Transmission Impairments and Channel Capacity | 133 | ||
Application Note: Analog Signals | 140 | ||
4.3 Summary | 142 | ||
4.4 Key Terms, Review Questions, and Problems | 142 | ||
Chapter 5 Data Communication Fundamentals | 144 | ||
5.1 Analog and Digital Data Communications | 145 | ||
5.2 Data Encoding Techniques | 149 | ||
5.3 Asynchronous and Synchronous Transmission | 161 | ||
5.4 Error Detection | 165 | ||
Application Note: Devices, Encoding, Communication Parameters, and Protocols | 168 | ||
5.5 Summary | 169 | ||
5.6 Key Terms, Review Questions, and Problems | 170 | ||
Chapter 6 Data Link Control and Multiplexing | 173 | ||
6.1 Flow Control and Error Control | 175 | ||
6.2 Motivation for Multiplexing | 177 | ||
6.3 Frequency-Division Multiplexing | 178 | ||
6.4 Synchronous Time-Division Multiplexing | 185 | ||
Application Note: Changing Communications | 192 | ||
6.5 Summary | 193 | ||
6.6 Key Terms, Review Questions, and Problems | 194 | ||
Appendix 6A: High Level Data Link Control Protocol | 196 | ||
PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS | 202 | ||
Chapter 7 The Internet | 202 | ||
7.1 The Structure of the Internet | 203 | ||
7.2 Internet Domains | 213 | ||
7.3 Dynamic Host Configuration Protocol | 219 | ||
Application Note: Fitting DNS into Your Organizational Structure | 222 | ||
7.4 Summary | 223 | ||
7.5 Key Terms, Review Questions, and Problems | 224 | ||
Chapter 8 TCP/IP | 226 | ||
8.1 A Simple Protocol Architecture | 228 | ||
8.2 The TCP/IP Architecture | 235 | ||
8.3 Internetworking | 242 | ||
8.4 Virtual Private Networks and IP Security | 246 | ||
Application Note: Practical Guide to Networking | 250 | ||
8.5 Summary | 251 | ||
8.6 Key Terms, Review Questions, and Problems | 252 | ||
Appendix 8A: TCP, UDP, and IP Details | 255 | ||
Appendix 8B: The Trivial File Transfer Protocol | 259 | ||
Chapter 9 Client/Server, Intranet, and Cloud Computing | 264 | ||
9.1 The Growth of Client/Server Computing | 265 | ||
9.2 Client/Server Applications | 268 | ||
9.3 Middleware | 274 | ||
9.4 Intranets | 282 | ||
9.5 Extranets | 286 | ||
9.6 Service-Oriented Architecture | 287 | ||
9.7 Cloud Computing | 290 | ||
Application Note: To Be Fat or Thin—That Is the Question | 296 | ||
9.8 Summary | 298 | ||
9.9 Key Terms, Review Questions, and Problems | 299 | ||
Chapter 10 Internet-Based Applications | 301 | ||
10.1 Electronic Mail | 302 | ||
10.2 Web Access and HTTP | 312 | ||
10.3 Web Security | 318 | ||
10.4 Multimedia Applications | 320 | ||
10.5 Acceptable Use Policies | 323 | ||
Application Note: To Serve or Not to Serve | 326 | ||
10.6 Summary | 327 | ||
10.7 Key Terms, Review Questions, and Problems | 328 | ||
Chapter 11 Internet Operation | 330 | ||
11.1 Internet Addressing | 331 | ||
11.2 Internet Routing Protocols | 336 | ||
11.3 Multicasting | 341 | ||
11.4 Quality of Service | 344 | ||
11.5 Differentiated Services | 348 | ||
11.6 Service Level Agreements | 352 | ||
11.7 IP Performance Metrics | 354 | ||
Application Note: Where Does My Network Address Come From? | 356 | ||
11.8 Summary | 357 | ||
11.9 Key Terms, Review Questions, and Problems | 358 | ||
PART FOUR: LOCAL AREA NETWORKS | 360 | ||
Chapter 12 LAN Architecture and Infrastructure | 360 | ||
12.1 Background | 361 | ||
12.2 LAN Configuration | 366 | ||
12.3 Guided Transmission Media | 369 | ||
12.4 LAN Protocol Architecture | 378 | ||
Application Note: Cabling Infrastructure | 383 | ||
12.5 Summary | 385 | ||
12.6 Key Terms, Review Questions, and Problems | 385 | ||
Appendix 12A: Decibels and Signal Strength | 387 | ||
Chapter 13 Ethernet, Switches, and Virtual LANs | 390 | ||
13.1 Traditional Ethernet | 391 | ||
13.2 Bridges, Hubs, and Switches | 397 | ||
13.3 High-Speed Ethernet | 404 | ||
13.4 Virtual LANs | 411 | ||
13.5 Power over Ethernet | 416 | ||
Application Note: Networking with Ethernet | 418 | ||
13.6 Summary | 419 | ||
13.7 Key Terms, Review Questions, and Problems | 420 | ||
Chapter 14 Wireless LANs | 422 | ||
14.1 Overview | 423 | ||
14.2 Wi-Fi Architecture and Services | 426 | ||
14.3 IEEE 802.11 MAC and Physical Layer Standards | 431 | ||
14.4 Gigabit WLANs | 437 | ||
14.5 IEEE 802.11 Security Considerations | 438 | ||
Application Note: Deploying WLANs | 439 | ||
14.6 Summary | 441 | ||
14.7 Key Terms, Review Questions, and Problems | 441 | ||
PART FIVE: WIDE AREA NETWORKS | 443 | ||
Chapter 15 WAN Technology and Protocols | 443 | ||
15.1 Switching Techniques | 444 | ||
15.2 Circuit-Switching Networks | 446 | ||
15.3 Packet-Switching Networks | 451 | ||
15.4 Traditional Wide Area Network Alternatives | 456 | ||
15.5 Voice Over IP | 460 | ||
15.6 Presence | 465 | ||
15.7 Summary | 467 | ||
15.8 Key Terms, Review Questions, and Problems | 468 | ||
Chapter 16 WAN Services | 470 | ||
16.1 Wide Area Networking Alternatives | 472 | ||
16.2 Frame Relay | 476 | ||
16.3 Asynchronous Transfer Mode (ATM) | 483 | ||
16.4 Multiprotocol Label Switching (MPLS) | 490 | ||
16.5 Wide Area Ethernet | 493 | ||
Application Note: Off-Site Connectivity Solutions | 495 | ||
16.6 Summary | 496 | ||
16.7 Key Terms, Review Questions, and Problems | 497 | ||
Chapter 17 Wireless WANs | 499 | ||
17.1 Cellular Wireless Network | 501 | ||
17.2 Multiple Access | 508 | ||
17.3 Third-Generation Wireless Communication | 511 | ||
17.4 Fourth-Generation Wireless Communication | 516 | ||
17.5 Satellite Communications | 519 | ||
Application Note: Laptops, Netbooks, PDAs, and Cell Phones | 525 | ||
17.6 Summary | 527 | ||
17.7 Key Terms, Review Questions, and Problems | 527 | ||
PART SIX: MANAGEMENT ISSUES | 530 | ||
Chapter 18 Computer and Network Security Threats | 530 | ||
18.1 Computer Security Concepts | 531 | ||
18.2 Threats, Attacks, and Assets | 533 | ||
18.3 Intruders | 538 | ||
18.4 Malicious Software Overview | 542 | ||
18.5 Viruses, Worms, Bots, and Spam | 546 | ||
18.6 Keyloggers, Phishing, Spyware | 556 | ||
18.7 Computer Security Trends | 558 | ||
18.8 Summary | 560 | ||
18.9 Key Terms, Review Questions, and Problems | 560 | ||
Chapter 19 Computer and Network Security Techniques | 564 | ||
19.1 Virtual Private Networks and IPsec | 565 | ||
19.2 SSL and TLS | 568 | ||
19.3 Wi-Fi Protected Access | 570 | ||
19.4 Intrusion Detection | 573 | ||
19.5 Firewalls | 576 | ||
19.6 Malware Defense | 581 | ||
Application Note: Security Layers | 583 | ||
19.7 Summary | 585 | ||
19.8 Key Terms, Review Questions, and Problems | 586 | ||
Appendix A: Projects for Teaching Business Data Communications | 589 | ||
A.1 Animations and Animation Projects | 590 | ||
A.2 Practical Exercises | 591 | ||
A.3 Wireshark Projects | 592 | ||
A.4 Research Projects | 592 | ||
A.5 Security Case Studies | 593 | ||
A.6 Reading/Report Assignments | 593 | ||
A.7 Writing Assignments | 593 | ||
Glossary | 594 | ||
A | 594 | ||
B | 594 | ||
C | 594 | ||
D | 595 | ||
E | 596 | ||
F | 596 | ||
G | 597 | ||
H | 597 | ||
I | 597 | ||
L | 597 | ||
M | 597 | ||
N | 598 | ||
O | 598 | ||
P | 598 | ||
Q | 599 | ||
R | 599 | ||
S | 599 | ||
T | 600 | ||
U | 600 | ||
V | 600 | ||
W | 600 | ||
References | 601 | ||
Index | 604 | ||
A | 604 | ||
B | 604 | ||
C | 605 | ||
D | 606 | ||
E | 607 | ||
F | 608 | ||
G | 609 | ||
H | 609 | ||
I | 609 | ||
J | 611 | ||
K | 611 | ||
L | 611 | ||
M | 612 | ||
N | 613 | ||
O | 613 | ||
P | 613 | ||
Q | 614 | ||
R | 614 | ||
S | 615 | ||
T | 616 | ||
U | 617 | ||
V | 618 | ||
W | 618 | ||
X | 619 |