Menu Expand
Business Data Communications: International Edition

Business Data Communications: International Edition

William Stallings | Thomas L. Case

(2013)

Additional Information

Book Details

Abstract

Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.


The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Table of Contents

Section Title Page Action Price
Cover Cover
Contents 5
Online Resources 12
Preface 13
About the Authors 20
Chapter 0 Reader’s and Instructor’s Guide 21
0.1 Outline of This Book 22
0.2 Topic Ordering 22
0.3 Internet and Web Resources 23
0.4 Useful Publications 24
Chapter 1 Introduction 26
1.1 Information and Communication 27
1.2 Data Communications and Networking for Today’s Enterprise 28
1.3 Convergence and Unified Communications 32
1.4 The Nature of Business Information Requirements 39
1.5 The Transmission of Information 41
1.6 Distributed Data Processing 42
1.7 The Internet and Distributed Applications 43
1.8 Networks 45
1.9 Management Issues 51
1.10 Standards 53
1.11 Key Terms, Review Questions, and Problems 54
Appendix 1A Prefixes for Numerical Units 55
PART ONE: REQUIREMENTS 57
Chapter 2 Business Information 57
2.1 Audio 59
2.2 Data 62
2.3 Image 65
2.4 Video 70
2.5 Performance Measures 73
Application Note: File Sizes 80
2.6 Summary 81
2.7 Key Terms, Review Questions, and Problems 81
Chapter 3 Distributed Data Processing 85
3.1 Centralized Versus Distributed Processing 87
3.2 Forms of Distributed Data Processing 102
3.3 Distributed Data 105
3.4 Networking Implications of DDP 111
3.5 Big Data Infrastructure Considerations 113
Application Note: Distributed Computing Support 115
3.6 Summary 116
3.7 Key Terms, Review Questions, and Problems 117
PART TWO: DATA COMMUNICATIONS 121
Chapter 4 Data Transmission 121
4.1 Signals for Conveying Information 122
4.2 Transmission Impairments and Channel Capacity 133
Application Note: Analog Signals 140
4.3 Summary 142
4.4 Key Terms, Review Questions, and Problems 142
Chapter 5 Data Communication Fundamentals 144
5.1 Analog and Digital Data Communications 145
5.2 Data Encoding Techniques 149
5.3 Asynchronous and Synchronous Transmission 161
5.4 Error Detection 165
Application Note: Devices, Encoding, Communication Parameters, and Protocols 168
5.5 Summary 169
5.6 Key Terms, Review Questions, and Problems 170
Chapter 6 Data Link Control and Multiplexing 173
6.1 Flow Control and Error Control 175
6.2 Motivation for Multiplexing 177
6.3 Frequency-Division Multiplexing 178
6.4 Synchronous Time-Division Multiplexing 185
Application Note: Changing Communications 192
6.5 Summary 193
6.6 Key Terms, Review Questions, and Problems 194
Appendix 6A: High Level Data Link Control Protocol 196
PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS 202
Chapter 7 The Internet 202
7.1 The Structure of the Internet 203
7.2 Internet Domains 213
7.3 Dynamic Host Configuration Protocol 219
Application Note: Fitting DNS into Your Organizational Structure 222
7.4 Summary 223
7.5 Key Terms, Review Questions, and Problems 224
Chapter 8 TCP/IP 226
8.1 A Simple Protocol Architecture 228
8.2 The TCP/IP Architecture 235
8.3 Internetworking 242
8.4 Virtual Private Networks and IP Security 246
Application Note: Practical Guide to Networking 250
8.5 Summary 251
8.6 Key Terms, Review Questions, and Problems 252
Appendix 8A: TCP, UDP, and IP Details 255
Appendix 8B: The Trivial File Transfer Protocol 259
Chapter 9 Client/Server, Intranet, and Cloud Computing 264
9.1 The Growth of Client/Server Computing 265
9.2 Client/Server Applications 268
9.3 Middleware 274
9.4 Intranets 282
9.5 Extranets 286
9.6 Service-Oriented Architecture 287
9.7 Cloud Computing 290
Application Note: To Be Fat or Thin—That Is the Question 296
9.8 Summary 298
9.9 Key Terms, Review Questions, and Problems 299
Chapter 10 Internet-Based Applications 301
10.1 Electronic Mail 302
10.2 Web Access and HTTP 312
10.3 Web Security 318
10.4 Multimedia Applications 320
10.5 Acceptable Use Policies 323
Application Note: To Serve or Not to Serve 326
10.6 Summary 327
10.7 Key Terms, Review Questions, and Problems 328
Chapter 11 Internet Operation 330
11.1 Internet Addressing 331
11.2 Internet Routing Protocols 336
11.3 Multicasting 341
11.4 Quality of Service 344
11.5 Differentiated Services 348
11.6 Service Level Agreements 352
11.7 IP Performance Metrics 354
Application Note: Where Does My Network Address Come From? 356
11.8 Summary 357
11.9 Key Terms, Review Questions, and Problems 358
PART FOUR: LOCAL AREA NETWORKS 360
Chapter 12 LAN Architecture and Infrastructure 360
12.1 Background 361
12.2 LAN Configuration 366
12.3 Guided Transmission Media 369
12.4 LAN Protocol Architecture 378
Application Note: Cabling Infrastructure 383
12.5 Summary 385
12.6 Key Terms, Review Questions, and Problems 385
Appendix 12A: Decibels and Signal Strength 387
Chapter 13 Ethernet, Switches, and Virtual LANs 390
13.1 Traditional Ethernet 391
13.2 Bridges, Hubs, and Switches 397
13.3 High-Speed Ethernet 404
13.4 Virtual LANs 411
13.5 Power over Ethernet 416
Application Note: Networking with Ethernet 418
13.6 Summary 419
13.7 Key Terms, Review Questions, and Problems 420
Chapter 14 Wireless LANs 422
14.1 Overview 423
14.2 Wi-Fi Architecture and Services 426
14.3 IEEE 802.11 MAC and Physical Layer Standards 431
14.4 Gigabit WLANs 437
14.5 IEEE 802.11 Security Considerations 438
Application Note: Deploying WLANs 439
14.6 Summary 441
14.7 Key Terms, Review Questions, and Problems 441
PART FIVE: WIDE AREA NETWORKS 443
Chapter 15 WAN Technology and Protocols 443
15.1 Switching Techniques 444
15.2 Circuit-Switching Networks 446
15.3 Packet-Switching Networks 451
15.4 Traditional Wide Area Network Alternatives 456
15.5 Voice Over IP 460
15.6 Presence 465
15.7 Summary 467
15.8 Key Terms, Review Questions, and Problems 468
Chapter 16 WAN Services 470
16.1 Wide Area Networking Alternatives 472
16.2 Frame Relay 476
16.3 Asynchronous Transfer Mode (ATM) 483
16.4 Multiprotocol Label Switching (MPLS) 490
16.5 Wide Area Ethernet 493
Application Note: Off-Site Connectivity Solutions 495
16.6 Summary 496
16.7 Key Terms, Review Questions, and Problems 497
Chapter 17 Wireless WANs 499
17.1 Cellular Wireless Network 501
17.2 Multiple Access 508
17.3 Third-Generation Wireless Communication 511
17.4 Fourth-Generation Wireless Communication 516
17.5 Satellite Communications 519
Application Note: Laptops, Netbooks, PDAs, and Cell Phones 525
17.6 Summary 527
17.7 Key Terms, Review Questions, and Problems 527
PART SIX: MANAGEMENT ISSUES 530
Chapter 18 Computer and Network Security Threats 530
18.1 Computer Security Concepts 531
18.2 Threats, Attacks, and Assets 533
18.3 Intruders 538
18.4 Malicious Software Overview 542
18.5 Viruses, Worms, Bots, and Spam 546
18.6 Keyloggers, Phishing, Spyware 556
18.7 Computer Security Trends 558
18.8 Summary 560
18.9 Key Terms, Review Questions, and Problems 560
Chapter 19 Computer and Network Security Techniques 564
19.1 Virtual Private Networks and IPsec 565
19.2 SSL and TLS 568
19.3 Wi-Fi Protected Access 570
19.4 Intrusion Detection 573
19.5 Firewalls 576
19.6 Malware Defense 581
Application Note: Security Layers 583
19.7 Summary 585
19.8 Key Terms, Review Questions, and Problems 586
Appendix A: Projects for Teaching Business Data Communications 589
A.1 Animations and Animation Projects 590
A.2 Practical Exercises 591
A.3 Wireshark Projects 592
A.4 Research Projects 592
A.5 Security Case Studies 593
A.6 Reading/Report Assignments 593
A.7 Writing Assignments 593
Glossary 594
A 594
B 594
C 594
D 595
E 596
F 596
G 597
H 597
I 597
L 597
M 597
N 598
O 598
P 598
Q 599
R 599
S 599
T 600
U 600
V 600
W 600
References 601
Index 604
A 604
B 604
C 605
D 606
E 607
F 608
G 609
H 609
I 609
J 611
K 611
L 611
M 612
N 613
O 613
P 613
Q 614
R 614
S 615
T 616
U 617
V 618
W 618
X 619